Deck 8: Agency Systems
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/30
Play
Full screen (f)
Deck 8: Agency Systems
1
Second tier systems can be described as those of technologies that are complex and customized for the user.
False
2
Privacy can be defined as the right of an individual to be secure from unauthorized disclosure of information about oneself that is contained in documents.
True
3
A law that requires the U.S. Government to give out certain information to the public when it receives a written request. FOIA applies only to records of the Executive Branch of the Federal Government, not to those of the Congress or Federal courts, and does not apply to state governments, local governments, or private groups.
True
4
An occupation may give the individual the need to know information, but the right to know is derived from the situation.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
5
A criminal justice information system contains information that is used for decision making at every level of the criminal justice process whereas a police records management system is primarily used by a law enforcement agency.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
6
Encryption is a means of preventing unauthorized access to the transmission of data.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
7
Computer systems in the 21st Century are at risk because of their size and portability. They are small enough to be easily lost or stolen. Security breaches via lost or stolen equipment can be minimized by using passwords, educating employees and having clear rules and regulations regarding the use of technology in the field.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
8
Information about someone is not private property and therefore can never be subject to the restrictions of the 4th Amendment.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
9
In a fully integrated records management system, the system is unlikely to consist of several smaller systems that exchange information with a master server.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
10
How a relational database is designed will impact its future usefulness.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
11
Operator security is a combination of ________ and policies or practices designed to ensure database security.
A) flagging records
B) privacy
C) procedures
D) physical practices
A) flagging records
B) privacy
C) procedures
D) physical practices
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
12
A ________ is a hardware and software system used to manage all records maintained by a police agency.
A) Criminal Justice Information Systems
B) Communications Dispatch Center
C) Record Management System
D) Jail Management System
A) Criminal Justice Information Systems
B) Communications Dispatch Center
C) Record Management System
D) Jail Management System
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
13
Typically, large agencies purchase first tier products and middle to small sized agencies purchase second tier products. The products are often incompatible and lead to greater ________.
A) interoperability
B) record keeping
C) understanding
D) fragmentation
A) interoperability
B) record keeping
C) understanding
D) fragmentation
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
14
One of the roles of a ________ is to supply information so good decisions can be made about investigations, offenders and deployment.
A) Record Management System
B) Evidence Management System
C) Geographic Information Systems (GIS)
D) Computer Aided Dispatch (CAD) system
A) Record Management System
B) Evidence Management System
C) Geographic Information Systems (GIS)
D) Computer Aided Dispatch (CAD) system
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
15
Police information management can be said to have development in stages, ________, ________, internal network and full integration.
A) personal computer, partial network
B) paperwork, external network
C) personal computer, external network
D) paperwork, personal computer
A) personal computer, partial network
B) paperwork, external network
C) personal computer, external network
D) paperwork, personal computer
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
16
The ________ involves documenting, handling, storage and analysis of evidence so that the court is satisfied the evidence has not changed since it was taken into police custody.
A) chain of evidence
B) chain of custody
C) log of evidence
D) log of custody
A) chain of evidence
B) chain of custody
C) log of evidence
D) log of custody
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
17
The number of state and local law enforcement agencies using in-field computers is ________.
A) decreasing
B) static
C) increasing
D) not known
A) decreasing
B) static
C) increasing
D) not known
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
18
A/An ________ police records management system is going to have access to all of the other records maintained by the different criminal justice organizations.
A) fragmented
B) conventional
C) integrated
D) unconventional
A) fragmented
B) conventional
C) integrated
D) unconventional
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
19
Information is privileged or confidential because it might ________ an investigation or it is confidential and ________ by law.
A) compromise; secret
B) aide; not protected
C) aide; secret
D) compromise; protected
A) compromise; secret
B) aide; not protected
C) aide; secret
D) compromise; protected
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
20
Some password systems provide for different levels of access to databases. Most police officers have access to agency information, but they cannot ________.
A) change information
B) delete information
C) add information
D) all of the above
A) change information
B) delete information
C) add information
D) all of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
21
All information collected by the criminal justice system and used to make decision as every level and stage of the criminal justice system best describes:
A) Evidence Management System
B) Jail Management System
C) Record Management System
D) Criminal Justice Information Systems
A) Evidence Management System
B) Jail Management System
C) Record Management System
D) Criminal Justice Information Systems
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
22
The process of alerting managing authorities that a certain record has been accessed is called:
A) Operator Security
B) Flagging Records
C) Privacy
D) none of the above
A) Operator Security
B) Flagging Records
C) Privacy
D) none of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
23
Generally, commercial hardware or software that requires no unique government modifications or maintenance over the life cycle of the product to meet the needs of the procuring agency is called:
A) Second Generation
B) Second Tier
C) First Generation
D) First Tier
A) Second Generation
B) Second Tier
C) First Generation
D) First Tier
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
24
An algorithm that converts a name into code or key consisting of the first letter followed by several numbers that are assigned based upon a predetermined grouping of consonants. It is one way to search a large database.
A) SoundExes
B) Numerological Search
C) Tier Search
D) Alphabetical Search
A) SoundExes
B) Numerological Search
C) Tier Search
D) Alphabetical Search
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
25
Police records must be:
A) Readily Available
B) Held confidentially
C) Retained a long time
D) all of the above
A) Readily Available
B) Held confidentially
C) Retained a long time
D) all of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
26
Which of the following is NOT a benefit of police records automation?
A) increased fragmentation
B) reduced staff costs
C) better decisions about resource allocation
D) increased officer safety
A) increased fragmentation
B) reduced staff costs
C) better decisions about resource allocation
D) increased officer safety
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
27
Which of the following might be an example of a flagged record?
A) A warrant for a serial murderer wanted by multiple agencies
B) The president's driver's license information
C) The home address of the governor of the State of Florida
D) all of the above
A) A warrant for a serial murderer wanted by multiple agencies
B) The president's driver's license information
C) The home address of the governor of the State of Florida
D) all of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
28
In addition to passwords, networks and databases are usually designed to keep a log of use. In some cases, each time a user accesses a database for records, the node, time, user and nature of the request is recorded. What is the node?
A) The Workstation
B) The user's password
C) The network
D) The user's Named Officer's Detailed Explanation (NODE)
A) The Workstation
B) The user's password
C) The network
D) The user's Named Officer's Detailed Explanation (NODE)
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
29
Which of the following is true regarding field interview cards?
A) They are one of the most widely used documents in policing.
B) They would benefit by being automated into a relational database.
C) As an investigative tool, they are underutilized because of the lack of automation.
D) all of the above
A) They are one of the most widely used documents in policing.
B) They would benefit by being automated into a relational database.
C) As an investigative tool, they are underutilized because of the lack of automation.
D) all of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
30
Which of the following is NOT a benefit of digital imaging?
A) Digital images are more easily manipulated than conventional photography.
B) The images can be stored in a database.
C) Digital images can be transmitted as data files.
D) Digital photography can be less expensive than conventional photography.
A) Digital images are more easily manipulated than conventional photography.
B) The images can be stored in a database.
C) Digital images can be transmitted as data files.
D) Digital photography can be less expensive than conventional photography.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck

