Counseling Chapter 14 Ncic Means National Crime Investigation Center National Criminal Information Center National Crime

Document Type
Test Prep
Book Title
An Introduction to Policing 9th Edition
Authors
John S. Dempsey, Linda S. Forst, Steven B. Carter
Name:
Class:
Date:
Copyright Cengage Learning. Powered by Cognero.
Page 1
Indicate whether the statement is true or false.
1. The domestic use of drones, and even their consideration of use, has become the subject of national debate, including
filibuster in the U.S. Senate.
a.
True
b.
False
2. The BlackBerry can be loaded with specialized law enforcement programs allowing the user to query the NCIC
database as well as other state and motor vehicle department databases.
a.
True
b.
False
3. Composite sketches of suspects can be prepared by computers without the assistance of a police artist.
a.
True
b.
False
4. There are six classifications of fingerprints.
a.
True
b.
False
5. The latest in night vision technology includes infrared (IR) technology and thermal imaging (TI). This technology
requires no light at all to see objects in total darkness.
a.
True
b.
False
6. ViCAP contains information on unsolved burglaries.
a.
True
b.
False
7. Mitochondrial DNA is more useful for identification than nuclear DNA.
a.
True
b.
False
8. Automated fingerprint identification systems began to be developed in the 1980s.
a.
True
b.
False
9. Age-progression photographs are prepared by forensic artists rather than computers.
a.
True
b.
False
10. Police officers with in-car data access technology make more than eight times as many inquiries on driving records,
vehicle registrations, and wanted persons or property per 8-hour shift than do officers without in-car computers.
a.
True
b.
False
Name:
Class:
Date:
Copyright Cengage Learning. Powered by Cognero.
Page 2
11. DNA collection needs to improve because crime labs are ill-equipped to deal with the influx of DNA samples.
a.
True
b.
False
12. The Violent Criminal Apprehension Program (ViCAP) is maintained by DHS.
a.
True
b.
False
13. Because computer-aided investigation systems have not proven to be very effective in the criminal investigation
process, they are being abandoned by many police departments in the United States.
a.
True
b.
False
14. Less-than-lethal technology is the perfect weapon available that will immediately stop unlawful resistance and will
cause absolutely no harm to the receiver.
a.
True
b.
False
15. Lasers can be used to lift fingerprints from surfaces that often defy traditional powder or chemical techniques,
including glass, paper, cardboard, rubber, wood, plastic, leather, and even human skin.
a.
True
b.
False
16. It is impossible to change one’s fingerprints.
a.
True
b.
False
17. Computers have not yet been used for patrol allocation operations.
a.
True
b.
False
18. PCR-STR procedures for the analysis of DNA evidence allow samples that have degraded or broken down to be
analyzed.
a.
True
b.
False
Indicate the answer choice that best completes the statement or answers the question.
19. Deoxyribonucleic acid is otherwise known as __________.
a.
DMA.
b.
DEA.
c.
DYA.
d.
DNA.
20. Those systems that provide information needed for supervisory, allocation, strategic, tactical, policy, and
administrative decisions are ___________.
Name:
Class:
Date:
Copyright Cengage Learning. Powered by Cognero.
Page 3
a.
administrative information systems
b.
integrative information systems
c.
automated administrative systems
d.
management information systems
21. What is used in the examination of guns and bullets?
a.
Ballistics
b.
Serology
c.
Criminalistics
d.
Chemistry
22. The computer-aided investigation system developed for British investigators is called ___________.
a.
CATCH
b.
HITS/SMART
c.
HOLMES
d.
SHERLOCK
23. Live Scan is a(n) ____________ scanning system.
a.
ink and
b.
optical fingerprint
c.
retinal
d.
data entry
24. What is used in the examination of blood, semen, and other body fluids?
a.
Ballistics
b.
Serology
c.
Criminalistics
d.
Chemistry
25. The NCIC is operated by the _________.
a.
Secret Service
b.
U.S. Marshals Service
c.
Federal Bureau of Investigation
d.
National Criminal Justice Reference Service
26. The examination of skeletal remains is called forensic ________.
a.
toxicology
b.
pathology
c.
physical anthropology
d.
odontology
27. The analysis of poisons and other toxic substances in a person’s body is called forensic ___________.
Name:
Class:
Date:
Copyright Cengage Learning. Powered by Cognero.
Page 4
a.
toxicology
b.
pathology
c.
physical anthropology
d.
odontology
28. Fingerprint ridge impressions left on a soft material such as putty, wax, soap, or dust are called __________.
a.
plastic prints
b.
latent prints
c.
acoustic prints
d.
seated prints
29. The computer database used by Washington State investigators to analyze characteristics of murders and
sexual offenses is called _________.
a.
CATCH
b.
HITS/SMART
c.
HOLMES
d.
SHERLOCK
30. The Violent Criminal Apprehension Program (ViCAP) database contains information on ______.
a.
persons arrested for violent crime
b.
persons wanted for violent crime
c.
victims of violent crime
d.
unsolved homicides
31. Which of the following systems have not increased the ability of departments to control and monitor their
patrol functions through the CAD and MDT?
a.
GPS
b.
GIS
c.
AVL
d.
ADP
32. Mug shot ____________ is a system of digitizing a picture and storing its image on a computer so that it can
be retrieved at a later time.
a.
digitizing
b.
storing
c.
imaging
d.
xeroxing
33. NCIC means ___________.
a.
National Crime Investigation Center
b.
National Criminal Information Center
c.
National Crime Information Center
Name:
Class:
Date:
Copyright Cengage Learning. Powered by Cognero.
Page 5
d.
National Criminal Investigation Center
34. The 911 emergency telephone number system was introduced by AT&T in ______.
a.
1968
b.
1945
c.
1973
d.
1986
35. The examination of dead bodies is called forensic ______.
a.
toxicology
b.
pathology
c.
physical anthropology
d.
odontology
36. Which of the following is not a benefit provided by either enhanced 911 or enhanced CAD systems that
utilize mobile digital terminals (MDTs)?
a.
Direct interface between the patrol unit and local, county, state, and federal criminal justice
information system computers
b.
Dramatic increase in response time
c.
Elimination of responses to nonlife-threatening emergency calls
d.
Better coordination of all emergency agencies, since their movements can be monitored visually by
both officers at the scene and dispatchers
37. What can be used in the examination of possible forgeries?
a.
Serology
b.
Criminalistics
c.
Chemistry
d.
Document analysis.
38. Marks made by fingers touching a surface after the ridges have been in contact with a colored material such
as blood, paint, grease, or ink are called ___________.
a.
visible prints
b.
latent prints
c.
plastic prints
d.
acoustic prints
39. For law enforcement purposes, the acronym CAD means _______.
a.
computer-assisted department
b.
computer-aided dispatch
c.
computer-automatic dispatch
d.
centralized audio dispatch
Name:
Class:
Date:
Copyright Cengage Learning. Powered by Cognero.
Page 6
40. The branch of forensic science that identifies corpses through dental examination is called forensic _____.
a.
toxicology
b.
pathology
c.
physical anthropology
d.
odontology
41. Today, computerization is suitable for ____________.
a.
only police departments serving cities with a population of one million citizens or more
b.
only police departments serving cities with a population of 100,000 or more
c.
any police department, regardless of size
d.
organizations such as businesses, not police departments
42. ___________ can be used to lift prints from surfaces that often defy traditional powder or chemical
techniques, including glass, paper, cardboard, rubber, wood, and even human skin.
a.
Microchips
b.
Robotics
c.
X-rays
d.
Lasers
43. AFIS means _______.
a.
automated fingerprint identification systems
b.
automatic fingerprint identification systems
c.
automated fingerprint information systems
d.
automatic fingerprint information systems
44. In using the computerized database referred to as CATCH, detectives feed in the suspect’s
______________.
a.
description and last-known location
b.
description and modus operandi
c.
fingerprints and last-known location
d.
photograph and method of operation
45. Fraudulently acquiring private or sensitive information using computer program expertise and techniques is
called _________.
a.
spyware
b.
Trojan horse attack
c.
phishing
d.
malware
46. What is used in the examination of marijuana, cocaine, and heroin?
a.
Serology
b.
Criminalistics
Name:
Class:
Date:
Copyright Cengage Learning. Powered by Cognero.
Page 7
c.
Chemistry
d.
Document analysis
47. The first police department with a computer system (in 1964) was _________.
a.
New York City
b.
San Francisco
c.
Los Angeles
d.
St. Louis
48. Which of the following is not a nonlethal weapon being used by the police today?
a.
Chemical sprays
b.
Irritant sprays
c.
Tasers
d.
Lasers
49. The first scientist to use DNA profiling in a criminal case was _______.
a.
Alec Jeffreys
b.
Joseph Wambaugh
c.
Barry Scheck
d.
Gerald Sheindlin
50. Thermal imaging detectors are used _________.
a.
to measure skid marks at crash scenes
b.
for perimeter surveillance
c.
to locate fugitives and for search and rescue
d.
All of these choices.
51. Thermal imaging is a form of ___________.
a.
radio communication
b.
oleoresin capsicum
c.
infrared technology
d.
computer database programming
52. The computerized mug shot database created by the New York City Police Department and used to
investigate robberies is called __________.
a.
CATCH
b.
HITS/SMART
c.
HOLMES
d.
SHERLOCK
53. Which of the following is not one of the major issues involved in patrol allocation?
a.
Determining which officer to assign to each beat
Name:
Class:
Date:
Copyright Cengage Learning. Powered by Cognero.
Page 8
b.
Determining the number of patrol units needed in each precinct, at each time of the day, and for each
day of the week
c.
Designing patrol beats
d.
Developing policies to dispatch and redeploy patrol units
54. What is used in the examination of hairs, fibers, and fingernail scrapings?
a.
Ballistics
b.
Serology
c.
Criminalistics
d.
Chemistry
55. In 2009, the National Academy of Sciences issued a 328-page report, Strengthening Forensic Science in
the United States: A Path Forward. The report found serious problems with ______.
a.
much of the evidence collected by patrol officers at crime scenes
b.
genetic profiling
c.
much of the work performed by crime laboratories in the United States
d.
expired certifications of forensic examiners
56. The National Crime Information Center (NCIC) collects and retrieves data about _________.
a.
persons wanted for crimes anywhere in the United States
b.
stolen and lost property
c.
criminal history files
d.
All of these choices.
57. The use of the Taser was upheld in court in _________.
a.
Nolte v. United States
b.
King v. Taser, Inc.
c.
Michenfelder v. Sumner
d.
Scott v. Maryland
Enter the appropriate word(s) to complete the statement.
58. The forerunner in the use of modern sophisticated automated crime analysis was the New York City Police
Department’s __________ program.
59. DNA is very useful in solving cold cases due to its hardiness and ability not to break down easily.
60. Alcohol and drugs or controlled substances are analyzed by the __________ section of the crime lab.
61. _________ is one branch of forensic science that deals with the study of physical evidence related to crime.
62. The _________ is a handheld electronic stun gun that discharges a high-voltage, low-amperage, pulsating current via
tiny wires and darts, which can be fired from up to 15 feet away.
Name:
Class:
Date:
Copyright Cengage Learning. Powered by Cognero.
Page 9
63. __________are devices put into police vehicles that allow the electronic transmission of messages between the police
dispatcher and the officers in the field.
64. NCIC stands for __________.
65. DNA is the abbreviation for ____________.
66. Handwriting analysis is performed by the ______ section of the crime lab.
67. FATS stands for __________.
68. Gun and bullet evidence is analyzed by the _____________ section of the crime lab.
69. The majority of cases involve the fraudulent uses of credit card or bank information.
70. CAI stands for __________.
71. _______ is the science of identifying, collecting, preserving, documenting, examining, analyzing, and presenting
evidence from computers, computer networks, and other electronic devices.
72. _________ technology enables a print technician to enter unidentified latent prints into the computer.
73. OC in pepper spray stands for ______.
74. ViCAP stands for __________.
75. ______ prints are fingerprint impressions left at a crime scene.
76. Blood and semen evidence is analyzed by the ______ section of the crime lab.
77. __________ prints are the result of the process of rolling each finger onto a ten-print card using fingerprinting ink.
78. Trace evidence is analyzed by the ________ section of the crime lab.
79. is that part of science applied to answering legal questions.
80. In law enforcement, CAD stands for ________.
81. Discuss advances in fingerprint technology and the impact they’ve had on police investigations.
82. Explain the controversy surrounding the use of cell phone technology in police investigations. What guidance has the
Supreme Court provided regarding cell phone technology?
83. List the major sections of a police crime lab and discuss the evidence each examines.
84. Explain the concerns about the effects of technological advances in policing on civil liberties.
85. How safe are less-than-lethal weapons? In what situations would a less-than-lethal weapon be used? Do suspects have
the right to know that you are about to use a less-than-lethal weapon on them? Explain your answers.
Name:
Class:
Date:
Copyright Cengage Learning. Powered by Cognero.
Page 10
86. Explain how automated databases have revolutionized police work and give examples of databases law enforcement
uses.
87. Discuss the credibility issues with crime labs and the importance of crime lab accreditation.
88. Discuss biometric identification, including the biometric systems available to police and their accuracy.
89. Explain the science of DNA and discuss the effects of technological advances on DNA profiling.
90. Discuss how the proliferation of electronic video surveillance cameras is changing police work and the pros and cons
of surveillance cameras.
91. Explain how technology has changed the way composite sketches are prepared and the controversy over the value of
forensic artistry versus the use of digital imaging composite software.
Name:
Class:
Date:
Copyright Cengage Learning. Powered by Cognero.
Page 11
1. True
2. True
3. True
4. False
5. True
6. False
7. False
8. True
9. False
10. True
11. True
12. False
13. False
14. False
15. True
16. True
17. False
18. True
19. d
20. d
21. a
22. c
23. b
24. b
25. c
Name:
Class:
Date:
Name:
Class:
Date:
Copyright Cengage Learning. Powered by Cognero.
Page 13
52. a
53. a
54. c
55. c
56. d
57. c
58. CompStat
59. Mitochondrial
60. chemistry
61. Criminalistics
62. Taser
63. Mobile digital terminals (MDTs), MDTs (Mobile digital terminals), Mobile digital terminals, MDTs
64. National Crime Information Center
65. deoxyribonucleic acid
66. document analysis
67. Firearms Training System
68. ballistics
69. identity theft
70. computer-assisted instruction
71. Computer/digital forensics
72. Automated fingerprint identification system (AFIS), AFIS (Automated fingerprint identification system), Automated
fingerprint identification system
73. oleoresin capsicum
74. Violent Criminal Apprehension Program
75. Latent
76. serology
Name:
Class:
Date:
Copyright Cengage Learning. Powered by Cognero.
Page 14
77. Inked
78. criminalistics
79. Forensic science
80. computer-aided dispatch
81. Student responses will vary.
82. Student responses will vary.
83. Student responses will vary.
84. Student responses will vary.
85. Student responses will vary
86. Student responses will vary.
87. Student responses will vary.
88. Student responses will vary.
89. Student responses will vary.
90. Student responses will vary.
91. Student responses will vary.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.