Cpp Some Concepts (phase I)

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Thames
T
Thames
Community Contributor
Quizzes Created: 6820 | Total Attempts: 9,511,256
| Questions: 27
Please wait...
Question 1 / 27
0 %
0/100
Score 0/100
1. What is another term for a capacitance sensor used to protect a perimeter fence?

Explanation

A capacitance sensor used to protect a perimeter fence is often referred to as an Electric Field sensor as it detects changes in the electric field caused by a disturbance near the perimeter.

Submit
Please wait...
About This Quiz
CPP Some Concepts (Phase I) - Quiz

Explore foundational and advanced concepts in C++ through this focused assessment. Designed to enhance understanding and proficiency in C++ programming, this evaluation is ideal for individuals preparing for... see moreprofessional certifications or aiming to deepen their software development skills. see less

2. The job of managing involves 5 basic functions. They are:

Explanation

The correct answer is based on the classic management functions identified by Henri Fayol. Planning involves setting goals and determining the best course of action. Organising involves arranging resources and tasks to achieve those goals. Directing involves leading and motivating employees. Coordinating involves ensuring all parts of the organization work together smoothly. Controlling involves monitoring performance and taking corrective actions.

Submit
3. Which term best describes the concept: 'To prevent confusion during an organized effort, no subordinate should report to more than one supervisor'?

Explanation

Unity of Command is a principle in management and organizational theory stating that each employee should report to only one supervisor to avoid conflicting instructions and confusion during tasks.

Submit
4. One of the greatest liabilities an organization faces involves issuing deadly weapons to security officers. Liability is obvious when the weapons are issued to:

Explanation

The correct answer refers to security officers who are directly employed by the organization. Contract security guards work for third-party security firms, local law enforcement officers are part of government agencies, and military personnel belong to the armed forces.

Submit
5. In an emergency, who is responsible for the initial implementation of the plan?

Explanation

During an emergency, the senior manager present on site is typically the best individual to take charge and initiate the emergency plan due to their experience and authority within the organization.

Submit
6. According to whom, traditional organizational principles, structures, and procedures are incompatible with the mental health of employees?

Explanation

Argvris is known for his views that traditional organizational principles can have negative impact on the mental health of employees by making them passive and submissive. Max Weber is more associated with bureaucratic theory, Frederick Winslow Taylor is known for scientific management, and Elton Mayo is linked to the Hawthorne studies.

Submit
7. Oscar Newman argued that physical construction of a residential environment could elicit from residents behaviour that would, itself, contribute in a major way toward their security. What did he call this concept?

Explanation

Oscar Newman's concept of 'defensible space' refers to the physical design of a space that influences resident behavior to enhance security measures.

Submit
8. What is the most consistent predictor of employee theft?

Explanation

The correct answer focuses on the employee's perceived risk of getting caught, which directly correlates with their likelihood of committing theft. The incorrect answers do not address the core issue of theft prediction.

Submit
9. Which type of bond requires that an employee(s) be investigated to limit the risk of dishonesty for the insured?

Explanation

Fidelity Bond specifically covers losses that result from dishonest acts by specified individuals. This type of bond is designed to handle employee theft and fraud.

Submit
10. A security countermeasure should be planned if the loss event will produce an actual loss, measurable in some standard medium such as dollars; and:

Explanation

In order to decide on implementing a security countermeasure, it is crucial to ensure that the loss event is not speculative and would result in an actual loss that can be quantified. This helps in making an informed decision to protect the organization from potential harm.

Submit
11. What is the most important measure for loss impact (or criticality)?

Explanation

The correct answer is DOLLAR because it represents the actual monetary value of the loss impact, making it the most crucial measure in assessing criticality.

Submit
12. According to the formula by astronomer Marquis de Laplace, when events are independent of each other, the probability of their simultaneous occurrence is the product of their separate probabilities. Which of the following sentences best illustrates this?

Explanation

The correct answer illustrates the concept of independent events based on Laplace's formula, where the separate probabilities of component events influence the overall probability of their simultaneous occurrence.

Submit
13. Complete the following sentence: The time has come to:

Explanation

The correct answer focuses on enhancing collaboration between security and police personnel to improve overall safety and security measures. The three incorrect answers propose alternative solutions that do not specifically address the coordination between security and police personnel as the main priority.

Submit
14. What is a financial strategy?

Explanation

A financial strategy involves the overall approach to financial decision-making and resource allocation within an organization, focusing on the expected returns and risks associated with investments.

Submit
15. Which financial statement summarizes an organization’s investing and financing activities, following the equation assets = liabilities + shareholder equity?

Explanation

The balance sheet provides a snapshot of a company's financial position at a specific point in time by listing its assets, liabilities, and shareholders' equity. The other options do not encompass the full financial structure of the company like the balance sheet does.

Submit
16. What is the primary limitation of financial statement analysis?

Explanation

Financial statement analysis is a valuable tool for evaluating the financial health of a business, but its primary limitation is that it does not take into account the impact of changes in market conditions which can significantly affect the performance and value of a company.

Submit
17. Fill in the missing word(s). ................... are based on standard operating procedures (SOPs), which should be site-specific. The SOPs are a compendium of procedures for the security group to follow in day-to-day operations. They may also include emergency response procedures.

Explanation

Post orders are specific instructions given to security personnel regarding their duties and responsibilities at a particular site. They outline the procedures to be followed in various situations and are an essential part of security operations.

Submit
18. Staffing decisions should be measured against a detailed:

Explanation

Staffing decisions should be based on a detailed job requirements analysis to ensure that candidates are the best fit for the position based on the necessary skills, qualifications, and experience. Considering company profits, employee opinions, or office location alone may not provide an accurate assessment of staffing decisions.

Submit
19. When recruiting, to deal with the many resumes that may be submitted in response to a public listing, staff must filter the resumes and invite only the most viable candidates for an interview. One recommended way to reduce this labour is:

Explanation

Hiring external recruiters can help alleviate the burden of filtering resumes by outsourcing the initial screening process to professionals who specialize in recruitment. Using automated resume screening software can also be an effective way to streamline the process by automating the initial review of resumes. Conducting blind interviews without reviewing resumes would not efficiently identify the most viable candidates, and setting up a committee to individually review all resumes would be time-consuming and resource-intensive.

Submit
20. In the course of an investigation, what is profiling used for?

Explanation

Profiling in investigations is the process of using specific characteristics or behavior patterns to exclude individuals from suspicion or potential involvement, helping conserve resources by narrowing down the pool of subjects. The incorrect answers provided misrepresent the purpose and role of profiling in investigations.

Submit
21. What is the name given to the document that is composed of three elements: functions of a job, responsibility and authority vested in the job, and relationships of the job?

Explanation

A job description outlines the key components of a job, including its functions, responsibilities, authority, and relationships. Job Analysis involves the process of examining individual jobs to determine the duties, tasks, and responsibilities involved. A Work Plan typically refers to a detailed outline of tasks, deadlines, and resources needed to complete a project. Position Specification is a document that details the qualifications, requirements, and expectations for a specific job role.

Submit
22. Which management theorist is known for proposing Theory X and Theory Y regarding worker motivation?

Explanation

The correct answer is McGregor, as he is the one who developed Theory X and Theory Y which are contrasting views on worker motivation.

Submit
23. According to whom, traditional organizational principles, structures, and procedures are incompatible with the mental health of employees? Such ideas as task specialization, chain of command, unity of direction, tight budgets, and controls are calculated to make subordinates passive and submissive, allowing them to have little direction of their own work. As a result, workers become apathetic, engage in self-protective defence mechanisms, or just fight the system.

Explanation

This question is based on the research and theories of Argvris, who argued that traditional organizational practices can have negative impacts on the mental health of employees.

Submit
24. When reviewing applications for employment, all gaps in employment or life history of more than what duration should be investigated?

Explanation

Employers typically investigate any gaps in employment longer than 1 month as it can help in understanding an applicant's work history and reasons for unemployment.

Submit
25. What is the name of the device used to detect lying during the course of an investigation that records voice stress without the need for a hook-up, allowing it to be used covertly?

Explanation

The correct answer is Psychological Stress Evaluator, as it accurately describes the device used for detecting lying by recording voice stress without needing a physical connection. The incorrect answers may sound plausible but do not specifically refer to the device described in the question.

Submit
26. What should be specifically developed during an advance?

Explanation

During an advance, it is crucial to develop strong law enforcement contacts to ensure safety and security during any operations or events. While local cuisine knowledge, tourist attractions information, and language skills can be beneficial in different scenarios, they are not the specific focus during an advance process.

Submit
27. When should a vulnerability assessment be performed?

Explanation

A vulnerability assessment should be conducted after the threats and assets are clearly identified to effectively identify and prioritize potential weaknesses in the system.

Submit
View My Results

Quiz Review Timeline (Updated): Aug 4, 2025 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Aug 04, 2025
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 04, 2025
    Quiz Created by
    Thames
Cancel
  • All
    All (27)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What is another term for a capacitance sensor used to protect a...
The job of managing involves 5 basic functions. They are:
Which term best describes the concept: 'To prevent confusion during an...
One of the greatest liabilities an organization faces involves issuing...
In an emergency, who is responsible for the initial implementation of...
According to whom, traditional organizational principles, structures,...
Oscar Newman argued that physical construction of a residential...
What is the most consistent predictor of employee theft?
Which type of bond requires that an employee(s) be investigated to...
A security countermeasure should be planned if the loss event will...
What is the most important measure for loss impact (or criticality)?
According to the formula by astronomer Marquis de Laplace, when events...
Complete the following sentence: The time has come to:
What is a financial strategy?
Which financial statement summarizes an organization’s investing and...
What is the primary limitation of financial statement analysis?
Fill in the missing word(s). ................... are based on standard...
Staffing decisions should be measured against a detailed:
When recruiting, to deal with the many resumes that may be submitted...
In the course of an investigation, what is profiling used for?
What is the name given to the document that is composed of three...
Which management theorist is known for proposing Theory X and Theory Y...
According to whom, traditional organizational principles, structures,...
When reviewing applications for employment, all gaps in employment or...
What is the name of the device used to detect lying during the course...
What should be specifically developed during an advance?
When should a vulnerability assessment be performed?
Alert!

Advertisement