Chapter 3: Communications

Outline

Volume 1, Version 2011.07

Status: Completed

328 Questions & Answers

Updated, Sunday, July 17, 2011

1) Communications Quiz

1. 106. Introduction

1) Officers use various forms of communication: ______.

a) radios

b) telephones

c) computers

d) writing

e) face to face conversation

*f) all

2) Miscommunication often occurs and creates ______.

a) solutions

*b) problems

c) prepositions

d) obstacles

3) Miscommunication happens for different reasons: ______.

a) unclear expression

b) communication barriers

c) dissimilar backgrounds

*d) all

4) Communication chapter covers ______.

a) telecommunications

b) communications and interpersonal skills

c) human interaction issues

d) interviewing ideology

e) report writing principles and mechanics

*f) all

2. 106. Telecommunications: Florida Crime Information Center/National Crime Information Center

5) Law enforcement officers will often have to obtain information quickly through a system called ______.

*a) Florida Crime Information Center (FCIC).

b) National Center for Crisis and Continuity Coordination

c) Office for Domestic Preparedness

d) National Crime Information Center (NCIC)

6) Florida Crime Information Center (FCIC) is connected to the ______.

a) Office for Victims of Crime

*b) National Crime Information Center (NCIC)

c) Weapons of Mass Destruction First Responders

d) University Forensic Education

7) Information contained in the FCIC database includes but is not limited to the following:

a) Statewide information on persons and property

b) Driver’s license and registration information

c) Wanted and missing

d) Persons

e) Stolen guns

f) Vehicles

g) Property

h) Persons’ status files

i) Computerized criminal history

*j) All

8) National Crime Information Center (NCIC) and Florida Crime Information Center (FCIC) system are available ______.

a) 12 hours a day, seven days a week

b) 8 hours a day, 5 days a week

c) 10 hours a day, 6 days a week

*d) 24 hours a day, seven days a week

9) Florida Crime Information Center (FCIC) is housed at the Florida Department of Law Enforcement (FDLE) in ______.

*a) Tallahassee, Florida

b) Gainesville, Florida

c) Miami, Florida

d) Boca Raton, Florida

10) National Crime Information Center (NCIF) system is maintained by ______in Clarksburg, West Virginia.

a) U.S. Marshals Service

*b) Federal Bureau of Investigation (FBI)

c) Profiling

d) Fire Science

11) ______system contains stolen, abandoned, and recovered property and wanted and missing person files for all 50 states, Canada, the U.S. Virgin Islands, the Commonwealth of Puerto Rico, and the District of Columbia.

a) Blood Stain Pattern Analysis

b) Forensic Dentistry

*c) National Crime Information Center (NCIC)

d) Federal Bureau of Investigation

12) The National Crime Information Center (NCIC) system contains ______.

a) stolen

b) abandoned

c) recovered property

d) wanted person

e) missing person

f) includes files for all 50 states

g) Canada, the U.S. Virgin Islands, the Commonwealth of Puerto Rico, and the District of Columbia

*h) All

13) The National Crime Information Center (NCIC) system makes Florida data available to ______criminal justice agencies.

a) few

b) two

c) four

*d) all

14) Most information entered in Florida Crime Information Center (FCIC) is also ______in National Crime Information Center (NCIC).

*a) recorded

b) advised

c) mentioned

d) concluded

15) Agencies are encouraged to enter all ______into both state and national systems for officer use and public safety.

a) wireless

*b) warrants

c) writ of replevin

d) wig wags

16) Florida Crime Information Center (FCIC) and National Crime Information Center (NCIF) systems enable officers to gather criminal ______or stolen property information so they can appropriately deal with many incidents.

a) law

b) information

*c) history

d) behavior

17) All information obtained from Florida Crime Information Center and National Crime Information Center systems is for criminal justice purposes ______.

a) few

b) peerless

c) read-only-memory

*d) only

18) Using the Florida Crime Information Center and/or the National Crime Information Center for noncriminal justice purposes is considered a misuse of the system and may result in ______consequences for the person responsible.

*a) serious

b) few

c) a couple of

d) altercations

19) A major Florida Crime Information Center (FCIC) ______is that it connects to the National Law Enforcement Telecommunication System (NLETS), an international justice and public safety information sharing network.

a) structure

*b) feature

c) appearance

d) option

20) The National Law Enforcement Telecommunication System (NLETS) is an ______information sharing network.

a) verbal communication

b) runoff

*c) international justice and public safety

d) strategic intelligence

21) A ______, nationwide message switching communications network, NLETS allows for interstate and interagency information exchange.

a) act

b) moving

c) internet connection

*d) high-speed

22) National Law Enforcement Telecommunication System (NLETS) has the capability to ______, store, and forward message traffic to and from its user agencies.

*a) receive

b) contact

c) use

d) return

23) NLETS means ______.

a) National Law Enforcement Telecommunication Standards

*b) National Law Enforcement Telecommunication System

c) National Law Enforcement Television System

d) National Law Enforcement Telemarketing System

24) The ______(NLETS) supports inquiries into out-of-state motor vehicle and driver’s license files, criminal histories, and agency identification information.

a) National Law Enforcement Telecommunication Standards

*b) National Law Enforcement Telecommunication System

c) National Law Enforcement Television System

d) National Law Enforcement Telemarketing System

25) The National Law Enforcement Telecommunication System (NLETS) supports inquiries into ______.

a) out-of-state motor vehicle

b) driver’s license files

c) criminal histories

d) agency identification information

*e) all

26) The NLETS file provides users with online information about ______materials.

a) disease

b) chemical & biological

*c) hazardous

d) homeland security

27) Inquiries are run using the ______normally found on the placard of a vehicle such as a railroad car or semi-trailer.

a) table

b) computer

*c) four-digit number

d) software

28) The NLETS response to an inquiry contains a variety of information such as chemical name, personal safety precautions, general handling procedures, disposal methods, degree of hazard to ______health, and availability of countermeasure materials.

a) private

b) citizens

c) hospital

*d) public

29) The NLETS response to an inquiry contains a variety of information such as ______.

a) Chemical name

b) Personal safety precautions

c) General handling procedures

d) Disposal methods

e) Degree of hazard to public

f) Health

g) Availability of countermeasure materials

*h) All

30) The U.S. ______, Office of Hazardous Materials Safety supplies information (name, personal safety precautions, general handling procedures, disposal methods, degree of hazard to public health, and availability of countermeasure materials).

*a) Department of Transportation

b) Department of Agriculture and Consumer Services

c) Public Safety Departments

d) Office of Attorney General

31) The ______contains records of vehicles or vessels/boats registered in Florida and driver license or Florida identification card information.

a) Department of Transportation

*b) Department of Highway Safety and Motor Vehicles (DHSMV)

c) Public Safety Departments

d) Office of Attorney General

32) ______information is also available through the Department of Highway Safety and Motor Vehicles (DHSMV).

a) Vehicle

b) Driver license

*c) Insurance

d) Passport

33) The ______maintains the Concealed Weapon Permit Files. Inquiries are made using a person’s Social Security number or concealed weapon permit number. Information available includes name, date of birth, sex, race, license number, and expiration date.

a) Department of Transportation (DOT)

b) Department of Highway Safety and Motor Vehicles (DHSMV)

c) Public Safety Departments

*d) Department of Agriculture and Consumer Services (DOACS)

3. 107. FCIC Information Sources

34) _____ agencies that maintain a 24 hour a day, seven day a week operation are allowed to make entries into the FCIC/NCIC systems.

*a) Only

b) Sheriff’s Office

c) Florida Department of Law Enforcement (FDLE)

d) Police Academy

35) The entered information includes stolen items, boats, guns, vehicles, securities, and missing person’s record. The entering agency is ______for the accuracy, timeliness, and completeness of the records entered.

a) assumption

*b) responsible

c) reference

d) interpretation

36) A ______is created by the booking agency submitting fingerprints and arrest information for an arrested person.

a) Office for Victims of Crime

b) Center for Defense Information

*c) Computerized Criminal History (CCH)

d) Center for Security Policy

37) ______the record is created, information must first be processed and verified by fingerprint review at FDLE.

a) After

b) Permanent

c) Temporarily

*d) Before

38) Additional charges, arrests, dispositions, and other information will be added by the State Attorney’s Office, Clerk of the Court, and ______.

*a) Department of Corrections

b) Florida Department Law Enforcement (FDLE)

c) Computerized Criminal History (CCH)

d) Center for Security Policy

39) ______information constantly changes; when officers finish using retrieved information, they should destroy it by shredding or burning.

a) Department of Corrections

*b) Computerized Criminal History (CCH)

c) Center for Security Policy

d) Florida Department of Law Enforcement (FDLE)

40) When a ______is disseminated to an authorized individual of another agency, a secondary dissemination (spread around) log must be maintained for four years.

a) Department of Corrections

*b) Computerized Criminal History (CCH)

c) Center for Security Policy

d) Florida Department of Law Enforcement (FDLE)

41) A record’s reliability from ______depends on the agency’s accuracy when entering the information.

a) Computerized Criminal History (CCH)

b) Nuclear Threat Initiative

*c) Florida Crime Information Center (FCIC)

d) Florida Department of Law Enforcement (FDLE)

42) It is extremely important that the information entered at ______included in arrest reports or on fingerprint cards is correct, from the spelling of suspects’ names to the laws they violated.

a) Computerized Criminal History (CCH)

b) Nuclear Threat Initiative

c) Florida Department of Law Enforcement (FDLE)

*d) Florida Crime Information Center (FCIC)

4. 107. FCIC/NCIC

43) Due to the sensitive nature and sheer volume of information included in the FCIC/NCIC systems, officers must strictly follow ______when conducting a records check.

*a) policies

b) rules

c) regulations

d) norms

44) System users must attend the ______certification class and pass the certification exam.

a) Florida Crime Information Center (FCIC)

*b) Criminal Justice Information Services (CJIS)

c) Florida Department of Law Enforcement (FDLE)

d) Computerized Criminal History (CCH)

45) System users must also submit a state and national fingerprinted-based background check within ______days of employment or terminal assignment.

a) 10

b) 20

*c) 30

d) 40

46) Information obtained through FCIC/NCIC may be used only for criminal justice purposes, and the agency that enters the data is responsible for maintaining and ______it.

*a) removing

b) giving

c) preparing

d) fixing

47) The only ______to give information obtained through FCIC/NCIC is registration and lien information may be given to towing companies per §715.05, F.S.

a) rule

*b) exception

c) transaction

d) opportunity

48) Computers accessing Criminal Justice Information Services (CJIS) information must have adequate physical security to prevent ______.

a) authorized

b) request

*c) unauthorized access

d) deny

49) ______of the FCIC/NCIC system can result in both disciplinary and legal action including termination against the officers involved.

a) Use

b) Improper use

c) hurtful manner

*d) Misuse

50) An agency involved in misuse of the FCIC/NCIC system could ______its certification as an FCIC terminal site.

*a) lose

b) deprivation

c) obtain

d) gain

2) Communications Quiz

51) All FCIC/NCIC transactions are logged and can be ______retrieved upon request.

a) written

*b) electronically

c) visually

d) verbally

52) The FCIC/NCIC logs can be used for criminal investigations, suspected system misuse, system compliance, public records requests, and ______purposes.

*a) administrative

b) educational

c) training

d) professional

5.108. System Usage

53) ______is required to request a records check through FCIC/NCIC.

a) Date of birth

*b) Certain information

c) Social Security

d) First and last name

54) To request a records check through FCIC/NCIC depends on the ______an officer wants to receive from the system.

a) age

b) race

c) sex

*d) type of information

55) When requesting information on a ______, officers should provide all identification data available, such as name, race, sex, date of birth, physical features, approximate height and weight, etc.

a) a child

b) adult

*c) wanted or missing person

d) male or female

56) For ______identification information, an officer should provide the vessel name, manufacturer, license, tag/decal number, year of make, etc.

a) boat

b) motorcycle

*c) vehicle or vessel

d) skateboard

57) For stolen ______requests, the name, manufacturer, description of property, shape, etc., should be provided.

*a) property

b) motorcycles

c) boats

d) vehicles

58) If the FCIC/NCIC database contains data that is the same as or similar to the information requested, a list of possible ______will be returned.

a) hit

b) equivalent

c) twin

*d) matches

59) Additional information may be needed to determine an ______match.

a) approximate

b) correct

*c) exact

d) inaccurate

60) An exact match, called a _____, must be confirmed before an officer arrests a wanted person or recovers a missing person or stolen property.

a) perfect

*b) hit

c) particular

d) right

61) The hit confirmation process ensures that system information remains valid and is ______to the person or property of interest to the officer.

a) accurate

b) similar

*c) identical

d) particular

62) The hit confirmation process prevents arrests based on outdate or invalid _____.

a) arrest

b) accusation

c) detention

*d) warrants

63) The hit confirmation process also provides more details about the action the entering agency wants taken upon location of the ______.

*a) person or property

b) person

c) subject

d) suspect

64) For example, the entering agency can ______if a wanted person will be extradited or what should be done if only part of an entered record has been recovered (e.g., a stolen vehicle entry where only the transmission was recovered).

a) suggest

b) determine

*c) confirm

d) guess

65) When data must be entered into FCIC/NCIC, the officer must provide the ______to the person at the agency responsible for making such data entries.

a) police report

*b) original report and supplemental documentation

c) witness testimony

d) rationale