Which of these statements about the national crime information center (ncic) is true?

Criminal Justice Information Services (CJIS)

Public Services 

Law Enforcement Services 

Additional CJIS Programs 

Compact Council

The National Crime Prevention and Privacy Compact Act of 1998 establishes a Council to promulgate rules and procedures…

Which of these statements about the national crime information center (ncic) is true?

Bioterrorism Risk Assessment Group

The FBI’s Bioterrorism Risk Assessment Group helps evaluate whether a person or entity, such as scientific researchers, can have access to biological select agents and toxins.

About the CJIS Division  

The FBI’s Criminal Justice Information Services Division, or CJIS, is a high-tech hub in the hills of West Virginia that provides a range of state of-the-art tools and services to law enforcement, national security and intelligence community partners, and the general public.

History

In the summer of 1924, the FBI created an Identification Division (informally called “Ident” in the organization for many years to come) to gather prints from police agencies nationwide and to search them upon request for matches to criminals and crime evidence. The CJIS Division was established in February 1992 out of the former Identification Division to serve as the focal point and central repository for criminal justice information services in the FBI. It is the largest division in the FBI. Programs initially consolidated under the CJIS Division included the National Crime Information Center (NCIC), Uniform Crime Reporting (UCR), and Fingerprint Identification. In addition, responsibility for several ongoing technological initiatives was transferred to the CJIS Division, including the Integrated Automated Fingerprint Identification System (IAFIS), NCIC 2000, and the National Incident-Based Reporting System (NIBRS).

The Complex

In January 1991, the FBI purchased 986 acres of land in Clarksburg, West Virginia on which to construct the home of the CJIS Division. Construction started in October 1991 and was completed in July 1995, on time and under budget. The heart of the complex is the 500,000-square foot main office building. Constructed in a modular design, this building is nearly the length of three football fields. It features a 600-seat cafeteria, a 500-seat auditorium, atria for visitors and employees, and a 100,000-square-foot computer center.

A computer used as a component of a larger system is called
A) an embedded system.
B) a network.
C) an operating system.
D) a personal computer.
E) a mainframe computer.

The discipline focused on the production of software, as well as the development of tools, methodologies, and theories supporting software production, is most accurately called
A) computer engineering.
B) software engineering.
C) computer science.
D) artificial intelligence.
E) software simulation.

To avoid a repeat of the problems plaguing the 2000 U.S. Presidential election, Congress passed the Help America Vote Act of 2002, providing states with money to replace _____________________ systems.

In 1999 computer errors led to the loss of two NASA probes to ______________.

Between 1985 and 1987 the __________________ linear accelerator administered massive overdoses to six patients, causing the deaths of three of them.

Computer simulations can
A) prove our planet is overpopulated.
B) All of these
C) save automobile manufacturers time and money as they develop new cars.
D) accurately predict the weather a month in advance.
E) None of these

C) save automobile manufacturers time and money as they develop new cars.

Mizuho Securities lost $225 million when
A) hackers broke into its trading system and raided the accounts of 10,000 of its most important customers.
B) a bug in its currency trading system caused it to sell yen and purchase dollars when it should have purchased yen and sold dollars.
C) a bug in its billing system caused it to send out improper invoices to 10,000 of its most important customers.
D) it tried unsuccessfully to automate the Tokyo Stock Exchange.
E) one of its employees mistyped a sell order, and a bug in the Tokyo Stock Exchange trading program made it impossible to cancel the order.

E) one of its employees mistyped a sell order, and a bug in the Tokyo Stock Exchange trading program made it impossible to cancel the order.

The process of determining if a computer program correctly implements a mathematical model is called ________________.

The Ariane 5 was a satellite launch vehicle designed by the ______________ space agency.

Which mistake was not made by AECL, the manufacturer of the Therac-25?
A) It did not tell other hospitals about possible overdose incidents.
B) It did not include software or hardware devices to detect and report overdoses.
C) AECL made all of these mistakes, and more.
D) It continued to sell the Therac-25 after the FDA declared it to be defective.
E) It reused code without proper testing.

D) It continued to sell the Therac-25 after the FDA declared it to be defective.

By making the PDP 11 minicomputer an integral part of the Therac-25, AECL was able to
A) All of these
B) increase the stock price of its subsidiary Digital Equipment Corporation.
C) shrink the size of the machine considerably.
D) reduce costs by replacing hardware safety features with software safety features.
E) eliminate the need for lead shielding.

D) reduce costs by replacing hardware safety features with software safety features.

Software engineers use a four-step process to develop a software product. These steps are called _________________________________________________________.

specification, development, validation, evolution

Which of these statements about the National Crime Information Center (NCIC) is true?
A) The NCIC databases contain about 40 million records.
B) All of these statements are true.
C) Local law enforcement agencies enter most of the information that is in the NCIC databases.
D) Improper use of the NCIC has led to about 1 million false arrests.
E) The Department of Homeland Security is in charge of the NCIC.

A) The NCIC databases contain about 40 million records.
B) All of these statements are true.

The Mars Climate Orbiter crashed on the surface of Mars because
A) one program output thrust in terms of foot-pounds, and another program expected thrust to be expressed in terms of newtons.
B) the probe lost contact with the Jet Propulsion Laboratory when it entered the Martian atmosphere.
C) before programmers went on strike at subcontractor Lockheed Martin, one of them sabotaged the flight control software.
D) a bug in the computer program caused the vehicle to consume too much fuel on the way to Mars, leaving an inadequate supply for landing.
E) the extreme cold of deep space caused the computer to crash.

A) one program output thrust in terms of foot-pounds, and another program expected thrust to be expressed in terms of newtons.

Computers that process data from sensors as events occur are called
A) event-driven simulations.
B) pseudo-sensory systems.
C) time-activated systems.
D) real-time systems.
E) distributed computers.

The Ariane 5 satellite launch vehicle failed because
A) faulty on-board computer caused the other computers in the network to crash repeatedly.
B) a bad sensor fed faulty information into the flight control computer, causing it to fail.
C) code that worked correctly on the Ariane 4 failed on the Ariane 5.
D) the rocket’s on-board computer sent back faulty information to ground control, causing the human controllers to destroy the rocket.
E) a software failure caused the rocket to self-destruct when in actuality the rocket’s flight was going perfectly.

C) code that worked correctly on the Ariane 4 failed on the Ariane 5.

The Patriot missile system
A) All of these
B) failed because it had been left running too long.
C) failed because of a computer error.
D) was designed to shoot down airplanes.
E) failed to shoot down a Scud missile that killed 28 U.S. soldiers in the Gulf War.

The process of determining if a model is an accurate representation of the real system is called
A) software engineering.
B) the null hypothesis.
C) validation.
D) synthesis.
E) verification.

Which of these problems was not encountered by BAE as it tried to install an automated baggage handling system at Denver International Airport?
A) The system encountered all of these problems and more.
B) Workers painted over electric eyes installed in the underground tunnels.
C) The bar code printers didn’t print tags clearly enough to be read by the scanners.
D) The automated baggage handlers shredded some of the luggage.
E) The system misrouted luggage carts.

A) The system encountered all of these problems and more.

Some computer experts have spoken out against the conversion to touch-screen voting machines because
A) a power failure could make it impossible for people to vote.
B) they do not have a paper audit trail.
C) there is no evidence that there have been any problems with punched card systems.
D) they are made in China, which does not even hold elections.
E) All of these

B) they do not have a paper audit trail.

C) MCI loaned some equipment to AT&T.
D) the U.S. Secret Service arrested the culprits before they could do any further damage.
E) AT&T technicians rapidly fixed the software bug in the routing switches.

B) not all the routing switches had been converted to the latest software.

Is the process of determining if the model is an accurate representation of the real system?

Validation is the process of determining the degree to which a model is an accurate representation of the real world from the perspective of the intended uses of the model.

What is the process of determining if the computer program correctly implements the model?

Code verification is the process of determining whether a computer program (“code”) correctly implements the intended algorithms.

Which mistake was not made by the manufacturer of the therac 25?

162. Which mistake was not made by AECL, the manufacturer of the Therac-25? a) It did not include software or hardware devices to detect and report overdoses.

Which of the following was accomplished in 1997 by the IBM supercomputer Deep Blue?

IBM Research hired the two scientists and gave them the resources to build Deep Blue, a dedicated chess-playing supercomputer. In 1997, in a historic match, Deep Blue became the first computer to defeat a reigning world chess champion.