Chapter 14 Which The Following Systems Have Not

subject Type Homework Help
subject Pages 9
subject Words 2370
subject Authors John S. Dempsey, Linda S. Forst

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
True / False
1. Police officers with in-car data access technology make more than eight times as many inquiries on driving records,
vehicle registrations, and wanted persons or property per 8-hour shift than do officers without in-car computers.
a.
True
b.
False
2. The Violent Criminal Apprehension Program (ViCAP) is maintained by DHS.
a.
True
b.
False
3. ViCAP contains information on unsolved burglaries.
a.
True
b.
False
4. Because computer-aided investigation systems have not proven to be very effective in the criminal investigation
process, they are being abandoned by many police departments in the United States.
a.
True
b.
False
5. Computers have not yet been used for patrol allocation operations.
a.
True
b.
False
page-pf2
6. Automated fingerprint identification systems began to be developed in the 1980s.
a.
True
b.
False
7. Lasers can be used to lift fingerprints from surfaces that often defy traditional powder or chemical techniques, including
glass, paper, cardboard, rubber, wood, plastic, leather, and even human skin.
a.
True
b.
False
8. There are six classifications of fingerprints.
a.
True
b.
False
9. The latest in night vision technology includes infrared (IR) technology and thermal imaging (TI). This technology
requires no light at all to see objects in total darkness.
a.
True
b.
False
page-pf3
10. Age-progression photographs are prepared by forensic artists rather than computers.
a.
True
b.
False
11. Composite sketches of suspects can be prepared by computers without the assistance of a police artist.
a.
True
b.
False
12. It is impossible to change one’s fingerprints.
a.
True
b.
False
13. PCR-STR procedures for the analysis of DNA evidence allow samples that have degraded or broken down to be
analyzed.
a.
True
b.
False
14. The BlackBerry can be loaded with specialized law enforcement programs allowing the user to query the NCIC
database as well as other state and motor vehicle department databases.
a.
True
b.
False
page-pf4
15. Less-than-lethal technology is the perfect weapon available that will immediately stop unlawful resistance and will
cause absolutely no harm to the receiver.
a.
True
b.
False
16. Mitochondrial DNA is more useful for identification than nuclear DNA.
a.
True
b.
False
17. The domestic use of drones, and even their consideration of use, has become the subject of national debate, including
filibuster in the U.S. Senate.
a.
True
b.
False
18. DNA collection needs to improve because crime labs are ill-equipped to deal with the influx of DNA samples.
a.
True
b.
False
page-pf5
19. The first police department with a computer system (in 1964) was:
a.
New York City .
b.
San Francisco.
c.
Los Angeles.
d.
St. Louis.
20. Today, computerization is suitable for:
a.
only police departments serving cities with a population of one million citizens or more.
b.
only police departments serving cities with a population of 100,000 or more.
c.
any police department, regardless of size.
d.
organizations such as businesses, not police departments.
21. For law enforcement purposes, the acronym CAD means:
a.
computer-assisted department.
b.
computer-aided dispatch.
c.
computer-automatic dispatch.
d.
centralized audio dispatch.
22. The 911 emergency telephone number system was introduced by AT&T in:
a.
b.
c.
d.
page-pf6
23. . Enhanced 911 or enhanced CAD utilizes mobile digital terminals (MDTs). Which of the following is nota benefit
provided by these systems?
a.
direct interface between the patrol unit and local, county, state, and federal criminal justice information system
computers
b.
dramatic increase in response time
c.
elimination of responses to non-life-threatening emergency calls
d.
better coordination of all emergency agencies, since their movements can be monitored visually by both
officers at the scene and dispatchers
24. Which of the following systems have not increased the ability of departments to control and monitor their patrol
functions through the CAD and MDT?
a.
GPS
b.
GIS
c.
AVL
d.
ADP
25. In 2009, the National Academy of Sciences issued a 328-page report, Strengthening Forensic Science in the
United States: A Path Forward. The report found serious problems with:
a.
much of the evidence collected by patrol officers at crime scenes.
b.
genetic profiling.
c.
much of the work performed by crime laboratories in the United States.
d.
expired certifications of forensic examiners.
26. The National Crime Information Center (NCIC) collects and retrieves data about:
a.
persons wanted for crimes anywhere in the United States.
b.
stolen and lost property.
page-pf7
c.
criminal history files.
d.
all of these choices
27. NCIC means:
a.
National Crime Investigation Center.
b.
National Criminal Information Center.
c.
National Crime Information Center.
d.
National Criminal Investigation Center.
28. The NCIC is operated by the:
a.
Secret Service.
b.
U.S. Marshals Service.
c.
Federal Bureau of Investigation.
d.
National Criminal Justice Reference Service.
29. The Violent Criminal Apprehension Program (ViCAP) database contains information on:
a.
persons arrested for violent crime.
b.
persons wanted for violent crime.
c.
victims of violent crime.
d.
unsolved homicides.
30. Marks made by fingers touching a surface after the ridges have been in contact with a colored material such as blood,
paint, grease, or ink are called:
page-pf8
a.
visible prints.
b.
latent prints.
c.
plastic prints.
d.
acoustic prints.
31. The computer-aided investigation system developed for British investigators is called:
a.
CATCH
b.
HITS/SMART
c.
HOLMES
d.
SHERLOCK
32. The computer database used by Washington State investigators to analyze characteristics of murders and sexual
offenses is called:
a.
CATCH
b.
HITS/SMART
c.
HOLMES
d.
SHERLOCK
33. The computerized mug shot database created by the New York City Police Department and used to investigate
robberies is called:
a.
CATCH
b.
HITS/SMART
c.
HOLMES
d.
SHERLOCK
page-pf9
34. Mug shot is a system of digitizing a picture and storing its image on a computer so that it can be
retrieved at a later time.
a.
digitizing
b.
storing
c.
imaging
d.
xeroxing
35. In using the computerized database referred to as CATCH, detectives feed in the suspect’s:
a.
description and last-known location.
b.
description and modus operandi.
c.
fingerprints and last-known location.
d.
photograph and method of operation.
36. Those systems that provide information needed for supervisory, allocation, strategic, tactical, policy, and
administrative decisions are:
a.
administrative information systems.
b.
integrative information systems.
c.
automated administrative systems.
d.
management information systems.
37. . Which of the following is not one of the major issues involved in patrol allocation?
a.
determining which officer to assign to each beat
b.
determining the number of patrol units needed in each precinct, at each time of the day, and for each day of the
week
c.
designing patrol beats
d.
developing policies to dispatch and redeploy patrol units
page-pfa
38. AFIS means:
a.
automated fingerprint identification systems.
b.
automatic fingerprint identification systems.
c.
automated fingerprint information systems.
d.
automatic fingerprint information systems.
39. Live Scan is a(n) scanning system.
a.
ink and
b.
optical fingerprint
c.
retinal
d.
data entry
40. can be used to lift prints from surfaces that often defy traditional powder or chemical techniques,
including glass, paper, cardboard, rubber, wood, and even human skin.
a.
Microchips
b.
Robotics
c.
X-rays
d.
Lasers
41. Which of the following is nota nonlethal weapon being used by the police today?
a.
chemical sprays
b.
irritant sprays
c.
Tasers
page-pfb
d.
lasers
42. The use of the Taser was upheld in court in:
a.
Nolte v. United States
b.
King v. Taser, Inc.
c.
Michenfelder v. Sumner.
d.
Scott v. Maryland.
43. Fingerprint ridge impressions left on a soft material such as putty, wax, soap, or dust are called:
a.
plastic prints.
b.
latent prints.
c.
acoustic prints.
d.
seated prints.
44. Thermal imaging is a form of:
a.
radio communication.
b.
oleoresin capsicum.
c.
infrared technology.
d.
computer database programming.
45. Thermal imaging detectors are used:
a.
to measure skid marks at crash scenes.
b.
for perimeter surveillance.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.