Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

IDACS STUDY GUIDE

STUDY GUIDE

QuestionAnswer
To respond to all AQ's the __msg key should be used AR
When an approved non-criminal justice agency is approved to have access to system date on a limited bases ______________. only that data approved by the IDACS committee and approved by ISP
A response may take up to 20 mins when making an inquiry into ins however LESC will provide _______________. an automated acknowledgement notifying that his/ her inquiry has been received and is being processed
When a felony vehicle record is entered, what information should be entered into the MIS field? a brief description of the felony in which the vehicle is believed to be involved
A stolen VIN plate would be entered into which file vehicle parts file
Which one of the following is a valid purpose code to inquire into NCIC III? weapons related (CODE F)
Entries made into the Indiana Bulletin Board File must be _____. professional, businesslike, and qualify for one of the topics
When only 1 numeric ID is used in a QW, the response will include____. only the record file containing that specific numeric ID
The maximum number of images that a person record/ protection order can contain is________________. 1 MUG, 10 ID images, and 1 SIGNATURE
When a positive hit response is received from the Protective Interest File (Formerly the US Secret Service USSS file)_____. no arrest or detention should be made based on the information contained in the file
An inquiry into the article field file must include ___. the type of article and a manufacturers serial number or OLN
An inquiry can be made into the NLETS Hazmat file buy entering ____. UN number
Which of the following CHRI info request formats can be sent to specific state? AQ
What does the vehicle data in a wanted person record indicate? the entering agency has reasonable grounds to believe that he wanted person may be in possession of the vehicle
There are two types of records in the Foreign Fugitive File? Canadian and Interpol Warrants
What race is used when an inquiry into the wanted person file when race is unknown? U
Validating a record obliges the entering ORI to confirm the record is_______. Complete, Accurate, and Outstanding
Stolen aircraft should be entered as? Stolen vehicle
Which of the following cannot be entered into the Article File? Credit cards
Inquiries and records requests transmitted to III must include? The purposes for which the info is to be used
An inquiry into the Wanted/ Missing QW files__________. spawns inquiries into several other files, sex offender gang file and protection
If a locating agency intends to hold an individual on local changes, the locate transaction should indicate? DETN in the ext field
The hit confirmation policy states that an agency receiving an URGENT request or hit confirmation send a substantive response within _________. 10 minutes
The purpose of an IQ is? to request identity info from a state central repository
A secure location of a terminal is defined as?? secure from public access and view of the screen and/or printed data
When entering a stolen gun into IDACS and more than 1 number appears on the firearm________________. The serial number on the firearm or receiver should be placed in the serial number field and other number should be placed in the MIS field
to limit a search or reduce the amount of false positive responses on a gun inquiry enter_________. serial number, make, caliber
a file that does not have image capability is? security
Which of the following is not allowed access to the system data? private security companies and PI's
For CHRI/III info, Federal Title 28 states________________. No agency or individual shall confirm the existence r nonexistence of criminal hx record information to any person or agency that would not be eligible to receive the information itself
What agency is responsible for placing a locate on an IDACS/NCIC wanted entry? The recovering agency if other than the agency that entered the record
The purpose of a modification transaction is _____. to add, delete or change data
When there is an attempted breach of security, the terminal operator should___________. notify data operations and/or IDACS section to the attention of the IDACS security officer using admin message
According to IC240 IAC 5-2-10 Security and Confidentiality, what site must be in place around terminals accessing the system? must be in a site previously approved by IDACS committee
When inquiring on an IN-license plate, the LIY field should contain____. the year of expiration
A positive hit response from IDACS/NCIC is considered which of the following? must be considered at lead information only and verification with the originating agency is required
If there is a restriction concerning extradition on a Wanted Person entry, the information should be_________. entered in the MIS field of record
The gang file and known or appropriately suspected terrorist file KST have been designed to___. provide identifying info about violent gang and terrorist organizations and members of those gangs and organizations to alw enforcement personnel only
The purpose of NLETS is to provide interstate messages switching for all law enforcement and criminal justice agencies
A vehicle use3d in he commission f a felony may be entered into which of the following files providing the whereabouts of the vehicle is unknown vehicle file
a credit card can be entered into which file credit cards cannot be entered into any file
related search hits (RSH) will return all entries with the same ORI and OCA
users password must be changed ever ___ 90 days
The expanded name search (ENS) field defaults to N for No, if changed to Y, the ENS shall include what? combination of the surname, first name, and middle name
The purpose of an FQ inquiry is to ___ retrieve full record from a state repository when a positive response is received
When an agency fails to respond to a second request hit confirmation, the agency will generate ____ 3rd request which will be sent to the agency ORI, data operations, and NCIC
What is the max number of identifiers that an be used in the distribution field for an AM? 5
Paintball and BB guns are entered into which file? Article File
Confirming a hit means_____? the entering agency must be contacted to insure the person or property is identical and the case is still active
When inquiring into BMV drivers license files the preferred inquiry is by? NAME, DOB, and SEX
If more than one number appears on a weapon ____. the frame number should be inquired on first
When entering a stolen article (EA), and no brand name exists for the property, enter _____ in the BRA field. " NO BRA"
When sending a YQ to Canada what should be entered into the NIC field? "NONE"
Requests submitted to INTERPOL can be obtained by____. an AM MSG, agency letterhead by mail, or NLETS
Audit trail requests, manually or by automation, stipulate that AM sent and received shall be kept for a min of ___. 6 months
A temp felony want indicates that entering agency has ____________. reasonable ground to believe that the subject committed the crimes for which a warrant will be obtained as soon as possible
If subject is held on local charge or property is detained with no extenuating circumstances, which of the following hit confirmation priorities would be used? R for ROUTINE
During the IDACS inspection, the security officer will _______. verify that all new operators have been fingerprinted and issued a userID
All entries into IDACS/NCIC wanted persons files shall be supported by____. written documentation in the form of a case report
If on state in a multi state III response has reported the subject deceased_____. the response will indicate "deceased" with SID number of the state that reported the information
Located securities record will be returned from the system after_____. 10 days
Stolen license plate stickers should be entered into___. Article file
Which is required to be entered into the IDACS by Indiana Law? Missing Persons
An inquiry on a stolen boat (QB) may be made using the following identifiers? ALL OF THE ABOVE
Who may enter subjs into supervised release file? ALL OF THE ABOVE
A locate transaction should be made against the record of another agency only after the following conditions have been met ALL OF THE ABOVE
When all the information from a Canadian vehicle field hit has been confirmed, the locating agency should___. A AND B
When clearing a record from a file, a message is transmitted when ___. A AND B
Which of the following is NOT a precaution to prevent shoulder surfing? Keep passwords and other important information on sticky notes tacked to your monitor
When only one numeric identifier is used in a wanted person query (QW), the response will include ___. only the record on file containing that specific numeric identifier
Requests submitted to INTERPOL (international criminal police organization) can be obtained by? NLETS INQUIRY
How many agencies can place an investigative interest on an IDACS/NCIC record? 10
T or F? Records in a located status can be modified? False
T or F? an AQ (additional inquiry) cannot be sent to a specific agency utilizing their 9 character ORI False
A record must be cleared from file, when ___. A AND B
T or F? Protection orders are entered into the Protection Order Registry (POR) by the clerk of issuing Court and if the criteria for entry is met an automatic entry into IDACS/NCIC is made under IN049045J True
Which two (2) person files allow the entry of email addresses? supervised released AND sex offender
An example of digital media which should be protected and restricted to authorized individuals is ____. ALL OF THESE ARE CORRECT
T or F? You can find the agency phone number in an ORION file response. True
What message key (MKE) should be used if the entering agency of a stolen vehicle believes the occupants are armed and dangerous and also wants the vehicle held for latent fingerprints? EV-F
In an admin message, the sending agency field should contain? THE NAME OF THE SENDING AGENCY
Which one of the following crim hx record information request formats can be sent to a local agency, specific out-of-state agency, or a state central repository? AQ (additional information request inquiry)
If electronic media cannot be physically destroyed, it must be ___ to prevent unauthorized access to previously stored data. Overwritten at least 3 times
Created by: PCCC Training
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards