Loading...



Category: CSS245

0

CSS245

1 / 120

The triangular theory of
industrial loss is
symbolically thus ______

2 / 120

The breach of corporate
security is called

3 / 120

How the security
departments should
discharge its function is part
of the

4 / 120

Public security refers to
security as ______

5 / 120

The demand for
identification card for
anybody claiming to be
from water works is a hint
on

6 / 120

Agencies like customs
immigration Nigeria security
land civil defense corps, etc
are called _______

7 / 120

All appliances must be
properly switched off before
leaving the establishment is
_______

8 / 120

Electronic devices
constitute the fastest
growing category of
security

9 / 120

The aim to detect less
wanderers in the office
environment is known as

10 / 120

The public security refers to
security (loss prevention
activities) is undertaken by
the

11 / 120

The records in security
practice used for record
keeping or to issue out
instructions are called

12 / 120

The records in security
practice used to keep
permanent information are
called

13 / 120

The attribute of Ethics is
_________

14 / 120

The armed forces and
Nigeria police are agencies
under the term

15 / 120

The Nigeria police force is a
public institution
established by the Act CAP
of _____

16 / 120

Unsafe attitude or Act is a
behaviour which resulted in
____

17 / 120

Every business enterprise
or company is exposed to

18 / 120

The protection and
preservation of lives and
property against wastage in
a premises is called

19 / 120

The private security is
employed to perform the
services of _____

20 / 120

Example of unsafe
conditions in industrial loss
is______

21 / 120

The private Guards Degree
of _______

22 / 120

The private security is
characterized by ______

23 / 120

Aberdeen patrol system is a
patrol where there is
______

24 / 120

The valuable management
tool in the process of risk
analysis which proceed
from threat assessment
(identifying risk) to the
threat evaluation
(determing the criticality
and cost of that risk) to the
selction of security counter
measure is known as

25 / 120

The constitutional body
responsible for advising the
president on matters
relating to public security is

26 / 120

The evaluation of protection
programme is associated
with loss and
analysis.

27 / 120

The effective control and
the monitor of movements
of both visitors and internal
staff requires

28 / 120

The craftworker assumed
the role of

29 / 120

The public security is
invariably a

30 / 120

The prevention and
detection of crime and the
apprehension of an
offender is the sole duty of

31 / 120

Professional security
practitioners must not only
be people of integrity they
must also be seen to be so
it is a ________

32 / 120

This is one of the several
systems of organizing
effective patrol ______

33 / 120

The bourgeois class
assumed the role of

34 / 120

The act of watching,
protecting a facility by
moving continually around
is

35 / 120

The security survey report
tries to reveal the areas of
______

36 / 120

At the apex of the structural
organization of the
industrial security
management is
____________-

37 / 120

There are
types of records in security
practice

38 / 120

Ensure that all gates and
other entrances are closed
and locked it is the
responsibility of________

39 / 120

The unnecessary
exposures to risk - bearing
are the suffering harm or
losses and
of protection programmes

40 / 120

The process by which
individuals assess
information from the
environment, organise it
and make meaning of it is

41 / 120

The functions of the Nigeria
police council
include_______

42 / 120

The behaviour or actions
that expose life and
property to danger or
security risks is called

43 / 120

A process of establishing
objectives, allocating
resources within prescibed
budgeting limitations is

44 / 120

The Jesse Oil Spill of
October 1998 in which
NNPC loss thousands of
naira is ______

45 / 120

An incorporated company
as an artificial person in the
eye of the law, is entitled to

46 / 120

The private security is
characterised by

47 / 120

The loss prevention and
control as a selection of
counter measures such as
_______

48 / 120

The limit and extents of
powers to be conferred on
security managers,
supervisors, etc entails
_______

49 / 120

The security manager must
comply with the decree
______ In the training
functions of the security
staff

50 / 120

The Nigeria police council
comprises one of the
following _____

51 / 120

Super numerary police
officer is a police officer
from the _____

52 / 120

The latin translation of the
word 'moris' is

53 / 120

An incorporated company
as a natural person is
entitled to security of the

54 / 120

To acknowledge standards
and criteria for training
induction and deployment
of staff is _______

55 / 120

Endeavour not to spray
your money at public
functions such marriages,
etc is _______

56 / 120

Security survey is aimed at
_______

57 / 120

The word 'ethic' is derived
from the Greek word

58 / 120

The chairman of the
National Security council is

59 / 120

How the security of
retrenchment information
should be protected against
leakage, is_______

60 / 120

Fighting do occur because
of poor communication
between the security, staff
and
at the guard - post

61 / 120

The private guards
companies decree no 33 of
was enacted to safeguard
the conducts of private
operators.

62 / 120

______ is one of the
proforma schedule of duty
for security staff

63 / 120

The National Security
Council is a ________ body
responsible for advising the
president on matters of
public security

64 / 120

The public sector security is
an agency of the

65 / 120

Uniforms, Cap, Badge, or
other identification marks to
be must be approved by the
minister of internal affairs
before _______ be in
operation

66 / 120

The technological
innovations were the main
factors of the industrial
revolution in Great Britain
and ___________

67 / 120

One of the four major types
of patrol is ______

68 / 120

The state or circumstatnces
or place not providing good
protection or not free from
danger is called

69 / 120

Industrial Revolution
affluence causes______

70 / 120

The security equipment
manufacture safes and
services is a type of
company that _____

71 / 120

The formulation of security
policy is the sole
responsibility of
management at ________

72 / 120

To have a visitor's access
control, guard post at every
access point is very
important to check their
entry and

73 / 120

The security that is privately
owned and managed is
called

74 / 120

The persons associated
with economic gains and
profits are known as

75 / 120

The most popularly Guard
Dog used is the German
shepherd, also known as
the_____

76 / 120

The act of performing the
services of watching,
guarding, patrolling or
carrying of money is the
sole duty of

77 / 120

Industrial Revolution is
associated with ______

78 / 120

The relationship between
the employer and the
employee becomes

79 / 120

The qualities of industrial
security manager includes
______

80 / 120

Causes of industrial loss
include __

81 / 120

Any person may be
ineligible to own security
guards company in Nigeria
if ______

82 / 120

To protect lives' are the sole
responsibility of
management at board level
to formulate

83 / 120

The act which is related to
the conduct of security
practitioners is

84 / 120

The understanding of
security problems and the
measures to solve them is

85 / 120

The basis of security is the
need to know the
and reaction in industrial
security

86 / 120

The modern security
hardware which is remotely
controlled by an intrusion
alarm is

87 / 120

______ Should not act as a
member of the police force
or perform the duties

88 / 120

Security agencies in Nigeria
include _____

89 / 120

When an environment
induces actions or events
that can result in losses to
the company it is called

90 / 120

Another aspect of the
revolution is that it is based
upon _______

91 / 120

The subject matter of ethics
is concerned with what is
right or

92 / 120

Perception is the process in
the problem of security
industry where individuals
assess _____

93 / 120

and timely account of
events provides both hind
sight and forsight to
security management

94 / 120

The detail legal framework
for the establishment of
company in Nigeria is
scheduled in ______

95 / 120

______ is the government
arrangement for the
protection of lives and
property

96 / 120

The purpose of professional
ethics is to_____

97 / 120

The decree that was
enacted by the government
to regulate private guards
operators is ______

98 / 120

The electronic system
which enunciated at the
security duty room from
where a designated
response force is
dispatched is

99 / 120

The develop forecasts in
planning process is aimed
at_____

100 / 120

A system of patrol adopted
when the area is large and
there is shortage of
manpower is

101 / 120

The protection of company
assets from fire, fraud,
damage and trepass is the
role of ____

102 / 120

___ is a member of the
Nigeria National Council

103 / 120

The private security firms
are private companies
required by law to be
registered with

104 / 120

The process of security
planning involves the
establishment of _____

105 / 120

The policy on employee
dishonesty and crimes is
aimed at ______

106 / 120

Dearth of modern
equipment, technology and
methods is the problem of
___________

107 / 120

The private security firms
are private companies
required by law to be
registered with _____

108 / 120

A system where the
security operative is
detailed to patrol along a
given route is known as

109 / 120

The industrial revolution
contributed to a
production

110 / 120

Avoiding leaving your visitor
alone in the office is a hint
on

111 / 120

While in a bank, make sure
you do not use your
residential address is a hint
on

112 / 120

By constitutional
responsibility, the Nigeria
police is answerable to the
_______

113 / 120

The philosophy of security
is an ideology from the time
of

114 / 120

The duties of the Nigeria
police include the ______

115 / 120

When some employees are
dismissed, they may resort
to dangerous maneuvers$
against the company or
to settle embittered scores.

116 / 120

This is one of the features
of security planning _____

117 / 120

is the primary mode of
production during the
industrial revolution.

118 / 120

The method to control any
activity carried out and to
prevent any violation of the
policy is

119 / 120

The police service
commission is responsible
for ______

120 / 120

In modern applications,
security hardware is often
combined with

Rate this quiz