Show
Criminal Justice Information Services (CJIS)Public ServicesLaw Enforcement Services
Additional CJIS Programs
Compact CouncilThe National Crime Prevention and Privacy Compact Act of 1998 establishes a Council to promulgate rules and procedures…
Bioterrorism Risk Assessment GroupThe FBI’s Bioterrorism Risk Assessment Group helps evaluate whether a person or entity, such as scientific researchers, can have access to biological select agents and toxins. About the CJIS DivisionThe FBI’s Criminal Justice Information Services Division, or CJIS, is a high-tech hub in the hills of West Virginia that provides a range of state of-the-art tools and services to law enforcement, national security and intelligence community partners, and the general public. HistoryIn the summer of 1924, the FBI created an Identification Division (informally called “Ident” in the organization for many years to come) to gather prints from police agencies nationwide and to search them upon request for matches to criminals and crime evidence. The CJIS Division was established in February 1992 out of the former Identification Division to serve as the focal point and central repository for criminal justice information services in the FBI. It is the largest division in the FBI. Programs initially consolidated under the CJIS Division included the National Crime Information Center (NCIC), Uniform Crime Reporting (UCR), and Fingerprint Identification. In addition, responsibility for several ongoing technological initiatives was transferred to the CJIS Division, including the Integrated Automated Fingerprint Identification System (IAFIS), NCIC 2000, and the National Incident-Based Reporting System (NIBRS). The ComplexIn January 1991, the FBI purchased 986 acres of land in Clarksburg, West Virginia on which to construct the home of the CJIS Division. Construction started in October 1991 and was completed in July 1995, on time and under budget. The heart of the complex is the 500,000-square foot main office building. Constructed in a modular design, this building is nearly the length of three football fields. It features a 600-seat cafeteria, a 500-seat auditorium, atria for visitors and employees, and a 100,000-square-foot computer center. A computer used as a component of a larger system is called The discipline focused on the production of software, as well as the development
of tools, methodologies, and theories supporting software production, is most accurately called To avoid a repeat of the problems plaguing the 2000 U.S. Presidential election, Congress passed the Help America Vote Act of 2002, providing states with money to replace _____________________ systems. In 1999 computer errors led to the loss of two NASA probes to ______________. Between 1985 and 1987 the __________________ linear accelerator administered massive overdoses to six patients, causing the deaths of three of them. Computer simulations can C) save automobile manufacturers time and money as they develop new cars. Mizuho Securities lost $225
million when E) one of its employees mistyped a sell order, and a bug in the Tokyo Stock Exchange trading program made it impossible to cancel the order. The process of determining if a computer program correctly implements a mathematical model is called ________________. The Ariane 5 was a satellite launch vehicle designed by the ______________ space agency. Which mistake was not made by AECL, the manufacturer of the Therac-25? D) It continued to sell the Therac-25 after the FDA declared it to be defective. By making the PDP 11
minicomputer an integral part of the Therac-25, AECL was able to D) reduce costs by replacing hardware safety features with software safety features. Software engineers use a four-step process to develop a software product. These steps are called _________________________________________________________. specification, development, validation, evolution Which of these statements about the National Crime Information Center (NCIC) is true? A) The NCIC databases contain about 40 million records. The Mars Climate Orbiter crashed on the surface of Mars because A) one program output thrust in terms of foot-pounds, and another program expected thrust to be expressed in terms of newtons. Computers that process data from sensors as events occur are called The Ariane 5 satellite launch vehicle failed because C) code that worked correctly on the Ariane 4 failed on the Ariane 5. The Patriot missile system The process of determining if a model is an accurate representation of the real system is called Which of these problems was not encountered by BAE as it tried to install an automated baggage handling system at Denver International Airport? A) The system encountered all of these problems and more. Some computer experts have spoken out against the conversion to touch-screen voting machines because B) they do not have a paper audit trail. C) MCI loaned some equipment to
AT&T. B) not all the routing switches had been converted to the latest software. Is the process of determining if the model is an accurate representation of the real system?Validation is the process of determining the degree to which a model is an accurate representation of the real world from the perspective of the intended uses of the model.
What is the process of determining if the computer program correctly implements the model?Code verification is the process of determining whether a computer program (“code”) correctly implements the intended algorithms.
Which mistake was not made by the manufacturer of the therac 25?162. Which mistake was not made by AECL, the manufacturer of the Therac-25? a) It did not include software or hardware devices to detect and report overdoses.
Which of the following was accomplished in 1997 by the IBM supercomputer Deep Blue?IBM Research hired the two scientists and gave them the resources to build Deep Blue, a dedicated chess-playing supercomputer. In 1997, in a historic match, Deep Blue became the first computer to defeat a reigning world chess champion.
|