Cpp Some Concept (phase Ii)

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Thames
T
Thames
Community Contributor
Quizzes Created: 6820 | Total Attempts: 9,511,149
| Questions: 26
Please wait...
Question 1 / 26
0 %
0/100
Score 0/100
1. Smoke detectors are of either the photoelectric or ionization type. The ionization sensor is of particular value for installation in:

Explanation

The ionization sensor in smoke detectors is best suited for areas where slow, smouldering fires are more likely to occur rather than fast, flaming fires. Therefore, it is not ideal for locations where false alarms might be triggered easily.

Submit
Please wait...
About This Quiz
CPP Some Concept (Phase II) - Quiz

Explore key concepts of C++ in this engaging phase II quiz. Enhance your understanding of programming structures, syntax, and application in real-world scenarios. This quiz is ideal for... see morelearners aiming to deepen their C++ skills and apply them efficiently. see less

2. When looking for standard PPS equipment with no need for detailed design, what procurement approach is recommended?

Explanation

When the needs are well-defined and no detailed design is required, an Invitation for Bid is the recommended approach as it allows for competitive bidding based on specific requirements.

Submit
3. What is the name of the process of intercepting conversations on a telephone line by capturing the radiating electromagnetic energy which flows in the line, and which does not require a physical connection to the line?

Explanation

Inductive coupling is the process of intercepting conversations on a telephone line without physical connection, while frequency modulation, amplitude modulation, and pulse-code modulation are different methods of encoding information on a signal.

Submit
4. What type of microphone operates as a loudspeaker in reverse, and is often used as an eavesdropping device due to its lack of power source requirement and small size?

Explanation

Dynamic microphones are commonly used as eavesdropping devices due to their unique properties.

Submit
5. What is the best definition of proprietary information?

Explanation

Proprietary information is unique to the possessor and holds value in its exclusivity and ownership, providing competitive advantage and protection against unauthorized use or disclosure.

Submit
6. What is the main cause of proprietary information loss?

Explanation

The main cause of proprietary information loss is generally due to the failure to establish and maintain effective control systems, which can lead to unauthorized access or leaks.

Submit
7. Access to internal information should be restricted to:

Explanation

Access to internal information should be limited to individuals who are authorized and have signed legal agreements to maintain confidentiality.

Submit
8. What is the name given to the portable microwave transceiver used to locate electronic eavesdropping devices by detecting the semiconductor components—such as transistors, diodes, etc.—which comprise their electronic circuits?

Explanation

A Non-linear junction detector is used specifically for detecting semiconductor components in electronic eavesdropping devices, making it the correct answer in this context. Frequency modulator, Signal jammer, and Wireless scanner are not devices designed for this specific purpose.

Submit
9. At what stage of a PPS project should the project team begin to develop countermeasures?

Explanation

Countermeasures should be developed during the conceptual design phase to address potential risks and challenges early on in the project lifecycle.

Submit
10. What criteria are necessary for using in-house resources for TSCM inspections?

Explanation

For effective TSCM inspections using in-house resources, having at least one qualified full-time employee and proper instrumentation tailored to the organization's needs is crucial. Part-time employees, basic instruments, and complete reliance on external contractors may result in subpar security measures.

Submit
11. In the event of an emergency, who should be responsible for equipment shutdown?

Explanation

In the event of an emergency, those familiar with the process or the designated shut down crew should be responsible for equipment shutdown as they have the knowledge and training to do so efficiently and safely.

Submit
12. Which of the following would not be a feature of public sector emergency planning?

Explanation

Public sector emergency planning focuses on protecting the welfare of the community and government services rather than profit forecasting or business-related impact analysis.

Submit
13. What are the three words that summarise what to do in the event of an earthquake?

Explanation

During an earthquake, the recommended actions are to duck, cover and hold in order to protect yourself from falling debris and structural damage.

Submit
14. What is the name given to an accusatory meeting between an investigator and a person suspected of committing a crime or act of misconduct?

Explanation

An interrogation is a formal meeting between an investigator and a suspect, where questions are asked to obtain information or elicit the truth. It is a crucial part of the investigative process in criminal cases.

Submit
15. When conducting an investigation, who should be interviewed first?

Explanation

It is important to interview hostile witnesses first as they may be less willing to cooperate as the investigation progresses, therefore it is crucial to gather their statements early on.

Submit
16. Compared to non-abusing employees, employees who engage in substance abuse may be absent sixteen times more often, claim three times as many sickness benefits, and file how many times as many workers’ compensation claims?

Explanation

Employees who engage in substance abuse may be absent sixteen times more often, claim three times as many sickness benefits, and file five times as many workers’ compensation claims compared to non-abusing employees.

Submit
17. Which schedule of drug or substance has a high potential for abuse and currently has no accepted use in medical treatment in the United States? Examples are hashish, marijuana, heroin, and lysergic acid diethylamide (LSD).

Explanation

Schedule 1 drugs are considered the most dangerous due to their high potential for abuse and lack of accepted medical use. Examples include illegal drugs like marijuana, heroin, and LSD.

Submit
18. Which one of the following types of drugs is a depressant?

Explanation

Methaqualone is a central nervous system depressant, while LSD, Cocaine, and MDMA are stimulants.

Submit
19. After alcohol, which is the second most common drug of abuse in the workplace?

Explanation

Marijuana is the second most common drug of abuse in the workplace based on studies and surveys conducted on substance abuse in work environments.

Submit
20. Drug testing is a scientific examination of a biological specimen for the presence of a specific drug or its metabolite. The type of specimen analyzed most often is:

Explanation

Urine is the most commonly used specimen for drug testing due to its non-invasiveness, ease of collection, and longer detection window for many substances.

Submit
21. Under which one of the following circumstances would an undercover investigation be prohibited?

Explanation

Undercover investigations are prohibited in cases where the investigation may interfere with legally protected activities, such as labor organizing and union activities.

Submit
22. In the context of undercover investigations, what is meant by the term 'cold hire'?

Explanation

In undercover investigations, a 'cold hire' refers to the investigator applying for a position and going through the hiring process just like any other applicant, without any special treatment or prior arrangement.

Submit
23. The design or redesign of a venue to reduce crime opportunity and fear of crime through natural, mechanical, and procedural means – a crime prevention theory grounded in environmental criminology – is known as:

Explanation

Crime Prevention through Environmental Design (CPTED) focuses on altering the physical environment to make it less conducive to criminal activity, ultimately reducing the likelihood of crime occurrence.

Submit
24. The Big Five model of personality categorises personality traits into one of five types: Surgency, Agreeableness, Adjustment, Conscientiousness, and Openness to Experience. Which of the following best describes Surgency?

Explanation

The term 'Surgency' in the Big Five model of personality actually refers to leadership and extroversion, traits associated with assertiveness, dominance, enthusiasm, and sociability.

Submit
25. The C.I.A. triad is an abbreviation that is used to determine the security requirements of Information Systems (computers). What does the letter A stand for?

Explanation

The C.I.A. triad consists of three components - Confidentiality, Integrity, and Availability. In this case, the correct answer is Availability as it represents the accessibility of the information system and its resources.

Submit
26. Where is the best location to install acoustic glass break detectors for optimal detection?

Explanation

Acoustic glass break detectors work best when installed on a wall opposite the protected glass because it allows the sensor to detect the sound waves produced by breaking glass more effectively. Placing the detector on the same wall as the glass or on the ceiling may result in reduced detection accuracy. Installing it on a different floor can also compromise the detector's ability to reliably detect glass breakage.

Submit
View My Results

Quiz Review Timeline (Updated): Aug 4, 2025 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Aug 04, 2025
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 04, 2025
    Quiz Created by
    Thames
Cancel
  • All
    All (26)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Smoke detectors are of either the photoelectric or ionization type....
When looking for standard PPS equipment with no need for detailed...
What is the name of the process of intercepting conversations on a...
What type of microphone operates as a loudspeaker in reverse, and is...
What is the best definition of proprietary information?
What is the main cause of proprietary information loss?
Access to internal information should be restricted to:
What is the name given to the portable microwave transceiver used to...
At what stage of a PPS project should the project team begin to...
What criteria are necessary for using in-house resources for TSCM...
In the event of an emergency, who should be responsible for equipment...
Which of the following would not be a feature of public sector...
What are the three words that summarise what to do in the event of an...
What is the name given to an accusatory meeting between an...
When conducting an investigation, who should be interviewed first?
Compared to non-abusing employees, employees who engage in substance...
Which schedule of drug or substance has a high potential for abuse and...
Which one of the following types of drugs is a depressant?
After alcohol, which is the second most common drug of abuse in the...
Drug testing is a scientific examination of a biological specimen for...
Under which one of the following circumstances would an undercover...
In the context of undercover investigations, what is meant by the term...
The design or redesign of a venue to reduce crime opportunity and fear...
The Big Five model of personality categorises personality traits into...
The C.I.A. triad is an abbreviation that is used to determine the...
Where is the best location to install acoustic glass break detectors...
Alert!

Advertisement