Final Exam CCJ3011

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Tactical uses of N-DEx include

Assess threat levels of persons or addresses , Enhance officer safety, Identify 'hotspots' of criminal activity

often includes mug shots or textual descriptions of the individual sought

BOLO

What is the view that appears when you start any Microsoft Office program?

Backstage

Helps track the status of calls and units assigned to calls

CAD

allowed users to develop their own files, searches and reports.

CASS

Used to store criminal history of individual offenders

CCH system

does not assign a frequency to each user

CDMA

provides data radio capability to access the departments record management systems

CDPD

includes actions taken by the field officers as well as the dispatch center personnel

CFS Module

What can you surmise from the following URL: https://bountifulbaskets.com.

A user may be paying for a purchase.

Allows the positive identification of a subject in the most accurate way

AFIS

one of the oldest and most widely used biometric technologies

AFIS

From which of the following areas in Windows 10 can you access Desktop customization settings?

Control Panel.

captures inmate ID, time, date and location of hearings

Court-scheduling pg 226

provides a spatial view of crime by allowing analysts to plot the locations of crime.

CrimeView

Which service enables users to access web sites by domain name instead of by IP address?

DNS

tracks a case from its assignment through final disposition

Case management system pg 145

XML standard designed for criminal justice information exchanges

GJXDM

Kelly has several documents open on her laptop, and is working concurrently in each one. She is about to leave for several hours to attend an off-site social function, but will return to her documents later in the day. Which option below would save the most power and still ensure that she can pick up right where she left off?

Hibernating the laptop.

supports user-definable record flags

FIR

In the NCIC, information flows from local to county to state systems.

False, Information flows from federal to state to county to local systems.

Since 9/11 sharing information between justice agencies has become more difficult.

False, it has become easier

Correction management systems transmit citation data directly to a collection system.

False, they do not transmit citation data directly

Which field would you use to change the file format so the document is compatible with Word 2000?

File type field

Which layer of the OSI model's encapsulation unit provides both a header and trailer?

Data link layer

provides the field officers the ability to photograph accident scenes

Digital photography

wireless radio broadband data standard

EVDO

served as communication devices to allow field units to indicate status to the dispatch center

Early MST System

captures information on persons who repeatedly commit crimes

Known Offender File

Promoted the development of crime analysis throughout the United States.

LEAA

addresses barriers to information sharing

LEISP

a secure, internet-based communications portal for law enforcement

LEO

Why would you enter labels into the worksheet?

Labels identify the values and help outline the mathematical relationships.

captures basic info such as make, model and color

MVI

Ann visited a site last Tuesday which contained a meatloaf recipe that she really wants to try, but now she can't remember the URL. What should she do?

Look for the URL in the History folder.

provides two-way communication between the dispatch and field unit

MDT

records and maintains a list of involvements with a particular location

MLI

maintains a list of persons and businesses that have involvement with the police agency

MNI

includes management of dental and psychiatric services provided to the inmate

Medical tracking

gives access to drivers-license data along with Interpol information

Nlets

Why might you prefer to apply a background color to a cell instead of applying a pattern?

Patterns can make it harder to read the data than using a solid color.

Which layer of the OSI model determines the characteristics of the media and devices the network will use?

Physical Layer

The Network Interface Layer in the TCP/IP model maps to which two layers in the OSI model?

Physical and Data Link

If your worksheet had a list of subjects along with the first crime that they had committed, what feature would you use to summarize the information to give you a list of the offenses and the number of people who committed those crimes?

PivotTable

includes mental health information, demographics and family history information

Pre-sentence investigation, probation report with sentencing recommendations. pg 229

Which view mode appears when you open a document sent as an attachment?

Read Mode

can tailor system based on code tables

Sentence compliance

contains information typically found within a crime report

Incident file

A correction management system typically consist of

Inmate Management, track inmates, find inmates, inmate release, cell checks, inmate movement, facility management, booking processing, commissary mangement, account management visitor management, Medical records.

tracks external obligations such as child support and restitution

Inmate accounting

tracks courses, faculty and trainers

Inmate rehabilitation training

Which layer in the TCP/IP protocol creates a header containing source and destination information for a particular packet?

Internet

captures individual involvements in any activity

Involvement file

How can you identify that an image or object has been selected for manipulation?

It displays handles around its perimeter.

Freezing a row means that you block any changes in the future on that row.

True, it does block any changes

An easy way to make all columns size to fit their contents is to select the entire worksheet and then double-click on a border between columns.

True, it is an easy way

provides the ability to enter persons wanted for questioning or with an outstanding warrant

Wants warrants and protective order modules

When will Word automatically open a document in Protected Mode?

When you open a document that was attached and sent via email.

allows the user to enter a name based on how it sounds rather than how it is spelled

Soundex

Which two frequency bands are used by wireless LANs?

The 2.4GHz band and the 5GHz band.

How can you identify the margins on the horizontal or vertical ruler?

The margins are the darker areas of either rulers.

Your computer wants to send a request for a web page to the web server at CCI Learning.com. Which address information will your computer include in those packets?

The web server's IP address

consist of a camera, workstation, computer, data storage device and printer

mug shot systems

occurs when the case is finally adjudicated

disposition of property

reduce dependency on radio communications

cellular phones

If you want to refer to cell A1 in tab called "first" within a file named "Totals.xlsx on your current worksheet, the reference would be:

[Totals.xlsx]first!A1

does not support a keyboard the same way a convertible does

tablet personal computer

provides the ability to scan license plates as a patrol car is patrolling through the city streets

wireless video technology

allowed detectives to search vast amounts of information

ad hoc query capabilities

one of the first enhancements to mobile computing brought about by laptop computers

field report writing

provides throughput of up to 4.8 gigabytes per second

700 MHz band

Which character automatically indicates the contents of a cell are a formula?

=

All of these are considered major crimes

Murder , Arson, Robbery

provides information on only serious criminal activity and offenders

NCIC

provides single fingerprint identification and imaging of subject photographs

NCIC-2000

an incident-based system, categorizes crimes into Group A and Group B offenses

NIBRS

New criminal justice software must use this standard for data interchange

NIEM

sets up and receives alerts on keywords

PAL

Which protocol is required to access the Internet?

TCP/IP

array of photographs, one of which is the suspect

six-pack

Cell A1 contains a value. You want to put a formula in B1 that evaluates the value of the number in A1, and does one of two things: If the value in A1 is <$5000, then B1 should be .01 * A1. If the value in A1 is >=$5000, then B1 should be 0. What formula should you enter into B1?

=IF(A1<5000, .01*A1,0)

Which new workbook option displays the title, Book1, when it is created?

A blank workbook.

captures information pertaining to the arrest of a subject

Arrest Module

Holds genetic profiles provided by state and other forensic labs.

CODIS

Harlene wants to pair her Bluetooth headset to her laptop. Which of the following is a step she must take?

Put the headset into discovery mode.

Provides management information such as crime statistics, the number of cases prosecuted and the number of inmates

RMS

You just changed the spacing after a paragraph to 10pt and would like this spacing on two other paragraphs on page 3 of the document. Which option would you use?

Repeat

"dddd" in a date format indicates:

The day of the week

Which file would not be of interest to an investigator looking for evidence of a vehicle 'chop shop'?

U.S. Secret Service protective file

divides crimes into major crimes (Part 1) and misdemeanor (Part 2) categories

UCR

provide the ability to search large databases of facial images for potential matches

facial recognition system

Strategic uses of N-DEx include

facilitate a de-confliction, Coordinate task forces ,Use geo-visualization and mapping features,identify crime trends pg 32


संबंधित स्टडी सेट्स

AP Psychology - Chapter 9 Multiple Choice

View Set

AP Human Geography Agriculture Vocabulary

View Set

AP Psych 12 - Psychological Disorders

View Set

Chapter 62: Management of Patients With Burn Injury

View Set

Chapter 29- Relationship of Principle and Agent

View Set