Deck 8: Agency Systems

ملء الشاشة (f)
exit full mode
سؤال
Second tier systems can be described as those of technologies that are complex and customized for the user.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Privacy can be defined as the right of an individual to be secure from unauthorized disclosure of information about oneself that is contained in documents.
سؤال
A law that requires the U.S. Government to give out certain information to the public when it receives a written request. FOIA applies only to records of the Executive Branch of the Federal Government, not to those of the Congress or Federal courts, and does not apply to state governments, local governments, or private groups.
سؤال
An occupation may give the individual the need to know information, but the right to know is derived from the situation.
سؤال
A criminal justice information system contains information that is used for decision making at every level of the criminal justice process whereas a police records management system is primarily used by a law enforcement agency.
سؤال
Encryption is a means of preventing unauthorized access to the transmission of data.
سؤال
Computer systems in the 21st Century are at risk because of their size and portability. They are small enough to be easily lost or stolen. Security breaches via lost or stolen equipment can be minimized by using passwords, educating employees and having clear rules and regulations regarding the use of technology in the field.
سؤال
Information about someone is not private property and therefore can never be subject to the restrictions of the 4th Amendment.
سؤال
In a fully integrated records management system, the system is unlikely to consist of several smaller systems that exchange information with a master server.
سؤال
How a relational database is designed will impact its future usefulness.
سؤال
Operator security is a combination of ________ and policies or practices designed to ensure database security.

A) flagging records
B) privacy
C) procedures
D) physical practices
سؤال
A ________ is a hardware and software system used to manage all records maintained by a police agency.

A) Criminal Justice Information Systems
B) Communications Dispatch Center
C) Record Management System
D) Jail Management System
سؤال
Typically, large agencies purchase first tier products and middle to small sized agencies purchase second tier products. The products are often incompatible and lead to greater ________.

A) interoperability
B) record keeping
C) understanding
D) fragmentation
سؤال
One of the roles of a ________ is to supply information so good decisions can be made about investigations, offenders and deployment.

A) Record Management System
B) Evidence Management System
C) Geographic Information Systems (GIS)
D) Computer Aided Dispatch (CAD) system
سؤال
Police information management can be said to have development in stages, ________, ________, internal network and full integration.

A) personal computer, partial network
B) paperwork, external network
C) personal computer, external network
D) paperwork, personal computer
سؤال
The ________ involves documenting, handling, storage and analysis of evidence so that the court is satisfied the evidence has not changed since it was taken into police custody.

A) chain of evidence
B) chain of custody
C) log of evidence
D) log of custody
سؤال
The number of state and local law enforcement agencies using in-field computers is ________.

A) decreasing
B) static
C) increasing
D) not known
سؤال
A/An ________ police records management system is going to have access to all of the other records maintained by the different criminal justice organizations.

A) fragmented
B) conventional
C) integrated
D) unconventional
سؤال
Information is privileged or confidential because it might ________ an investigation or it is confidential and ________ by law.

A) compromise; secret
B) aide; not protected
C) aide; secret
D) compromise; protected
سؤال
Some password systems provide for different levels of access to databases. Most police officers have access to agency information, but they cannot ________.

A) change information
B) delete information
C) add information
D) all of the above
سؤال
All information collected by the criminal justice system and used to make decision as every level and stage of the criminal justice system best describes:

A) Evidence Management System
B) Jail Management System
C) Record Management System
D) Criminal Justice Information Systems
سؤال
The process of alerting managing authorities that a certain record has been accessed is called:

A) Operator Security
B) Flagging Records
C) Privacy
D) none of the above
سؤال
Generally, commercial hardware or software that requires no unique government modifications or maintenance over the life cycle of the product to meet the needs of the procuring agency is called:

A) Second Generation
B) Second Tier
C) First Generation
D) First Tier
سؤال
An algorithm that converts a name into code or key consisting of the first letter followed by several numbers that are assigned based upon a predetermined grouping of consonants. It is one way to search a large database.

A) SoundExes
B) Numerological Search
C) Tier Search
D) Alphabetical Search
سؤال
Police records must be:

A) Readily Available
B) Held confidentially
C) Retained a long time
D) all of the above
سؤال
Which of the following is NOT a benefit of police records automation?

A) increased fragmentation
B) reduced staff costs
C) better decisions about resource allocation
D) increased officer safety
سؤال
Which of the following might be an example of a flagged record?

A) A warrant for a serial murderer wanted by multiple agencies
B) The president's driver's license information
C) The home address of the governor of the State of Florida
D) all of the above
سؤال
In addition to passwords, networks and databases are usually designed to keep a log of use. In some cases, each time a user accesses a database for records, the node, time, user and nature of the request is recorded. What is the node?

A) The Workstation
B) The user's password
C) The network
D) The user's Named Officer's Detailed Explanation (NODE)
سؤال
Which of the following is true regarding field interview cards?

A) They are one of the most widely used documents in policing.
B) They would benefit by being automated into a relational database.
C) As an investigative tool, they are underutilized because of the lack of automation.
D) all of the above
سؤال
Which of the following is NOT a benefit of digital imaging?

A) Digital images are more easily manipulated than conventional photography.
B) The images can be stored in a database.
C) Digital images can be transmitted as data files.
D) Digital photography can be less expensive than conventional photography.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/30
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 8: Agency Systems
1
Second tier systems can be described as those of technologies that are complex and customized for the user.
False
2
Privacy can be defined as the right of an individual to be secure from unauthorized disclosure of information about oneself that is contained in documents.
True
3
A law that requires the U.S. Government to give out certain information to the public when it receives a written request. FOIA applies only to records of the Executive Branch of the Federal Government, not to those of the Congress or Federal courts, and does not apply to state governments, local governments, or private groups.
True
4
An occupation may give the individual the need to know information, but the right to know is derived from the situation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
5
A criminal justice information system contains information that is used for decision making at every level of the criminal justice process whereas a police records management system is primarily used by a law enforcement agency.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
6
Encryption is a means of preventing unauthorized access to the transmission of data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
7
Computer systems in the 21st Century are at risk because of their size and portability. They are small enough to be easily lost or stolen. Security breaches via lost or stolen equipment can be minimized by using passwords, educating employees and having clear rules and regulations regarding the use of technology in the field.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
8
Information about someone is not private property and therefore can never be subject to the restrictions of the 4th Amendment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
9
In a fully integrated records management system, the system is unlikely to consist of several smaller systems that exchange information with a master server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
10
How a relational database is designed will impact its future usefulness.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
11
Operator security is a combination of ________ and policies or practices designed to ensure database security.

A) flagging records
B) privacy
C) procedures
D) physical practices
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
12
A ________ is a hardware and software system used to manage all records maintained by a police agency.

A) Criminal Justice Information Systems
B) Communications Dispatch Center
C) Record Management System
D) Jail Management System
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
13
Typically, large agencies purchase first tier products and middle to small sized agencies purchase second tier products. The products are often incompatible and lead to greater ________.

A) interoperability
B) record keeping
C) understanding
D) fragmentation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
14
One of the roles of a ________ is to supply information so good decisions can be made about investigations, offenders and deployment.

A) Record Management System
B) Evidence Management System
C) Geographic Information Systems (GIS)
D) Computer Aided Dispatch (CAD) system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
15
Police information management can be said to have development in stages, ________, ________, internal network and full integration.

A) personal computer, partial network
B) paperwork, external network
C) personal computer, external network
D) paperwork, personal computer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
16
The ________ involves documenting, handling, storage and analysis of evidence so that the court is satisfied the evidence has not changed since it was taken into police custody.

A) chain of evidence
B) chain of custody
C) log of evidence
D) log of custody
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
17
The number of state and local law enforcement agencies using in-field computers is ________.

A) decreasing
B) static
C) increasing
D) not known
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
18
A/An ________ police records management system is going to have access to all of the other records maintained by the different criminal justice organizations.

A) fragmented
B) conventional
C) integrated
D) unconventional
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
19
Information is privileged or confidential because it might ________ an investigation or it is confidential and ________ by law.

A) compromise; secret
B) aide; not protected
C) aide; secret
D) compromise; protected
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
20
Some password systems provide for different levels of access to databases. Most police officers have access to agency information, but they cannot ________.

A) change information
B) delete information
C) add information
D) all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
21
All information collected by the criminal justice system and used to make decision as every level and stage of the criminal justice system best describes:

A) Evidence Management System
B) Jail Management System
C) Record Management System
D) Criminal Justice Information Systems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
22
The process of alerting managing authorities that a certain record has been accessed is called:

A) Operator Security
B) Flagging Records
C) Privacy
D) none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
23
Generally, commercial hardware or software that requires no unique government modifications or maintenance over the life cycle of the product to meet the needs of the procuring agency is called:

A) Second Generation
B) Second Tier
C) First Generation
D) First Tier
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
24
An algorithm that converts a name into code or key consisting of the first letter followed by several numbers that are assigned based upon a predetermined grouping of consonants. It is one way to search a large database.

A) SoundExes
B) Numerological Search
C) Tier Search
D) Alphabetical Search
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
25
Police records must be:

A) Readily Available
B) Held confidentially
C) Retained a long time
D) all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
26
Which of the following is NOT a benefit of police records automation?

A) increased fragmentation
B) reduced staff costs
C) better decisions about resource allocation
D) increased officer safety
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
27
Which of the following might be an example of a flagged record?

A) A warrant for a serial murderer wanted by multiple agencies
B) The president's driver's license information
C) The home address of the governor of the State of Florida
D) all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
28
In addition to passwords, networks and databases are usually designed to keep a log of use. In some cases, each time a user accesses a database for records, the node, time, user and nature of the request is recorded. What is the node?

A) The Workstation
B) The user's password
C) The network
D) The user's Named Officer's Detailed Explanation (NODE)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
29
Which of the following is true regarding field interview cards?

A) They are one of the most widely used documents in policing.
B) They would benefit by being automated into a relational database.
C) As an investigative tool, they are underutilized because of the lack of automation.
D) all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
30
Which of the following is NOT a benefit of digital imaging?

A) Digital images are more easily manipulated than conventional photography.
B) The images can be stored in a database.
C) Digital images can be transmitted as data files.
D) Digital photography can be less expensive than conventional photography.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.