TCIC/NCIC EXAM 2023 ACTUAL EXAM 150 QUESTIONS
AND CORRECT ANSWERS (VERIFIED ANSWERS) |
AGRADE
The National Crime Information Center - ANSWER: NCIC
TCIC - ANSWER: Texas Criminal Information Center
NLETS - ANSWER: The international Justice and Public Safety Network
TLETS - ANSWER: Texas Law Enforcement Telecommunications System
Who is responsible for all the records entered into the system? - ANSWER: local law
enforcement
Who enforces policy and procedure within the State of Texas? - ANSWER: CSA-DPS
When was NCIC launched & how many files/ records did it have? - ANSWER:
Launched January 27, 1967 with 5 files & over 300,000 records
How many files and records does NCIC currently have? - ANSWER: 11.7 million active
records and 21 files
In 2011 the NCIC processed ____________ transactions per day - ANSWER: 7.9
million
The goal of the NCIC is to help the criminal justice community to preform its duties
by providing and maintaining a computerized filing system of _________________
and ________________ documented criminal justice information. - ANSWER:
accurate & timely
TxDPS has designated the Law Enforcement Support/
______________________________________ (LES/CRS) division as the state's CSA -
ANSWER: Crime Records Service
Agencies must conduct a fingerprint based record check to verify identification
within ___________ days of assignment for direct access or direct responsibility of
networks - ANSWER: 30
What are permanent disqualifiers for the system access policy? (5 total) - ANSWER:
Felony Conviction
Felony Deferred Adjunction
Class A Misdemeanor conviction
Class A Misdemeanor Deferred Adjudication
Family Violence
, What are the 10 year disqualifiers for the system access policy? (2 total) - ANSWER:
Class B misdemeanor conviction
Class B misdemeanor deferred adjudication
Terminal Access Policy
Law Enforcement and criminal Justice sensitive facilities and restricted/controlled
areas shall be ______________________ posted and separated from non-sensitive
and non-restricted/controlled areas by ________________ that restrict
unauthorized access - ANSWER: prominently & physical barriers
Relationship of TCIC/NCIC to TLETS/NLETS
(The international justice and public safety network)
Data obtained over the TLETS/NLETS may only be disseminated to
_______________________________________________________ agencies -
ANSWER: authorized criminal justice
Automatic Removal of Records
Each record in the database is assigned a specific retention period. For example,
temporary Felony Warrants are automatically removed after ____ hours - ANSWER:
48
Record Responsibility
Agencies lacking staff support for a ____________ party check should require the
____________ assigned to the case to check the record for accuracy - ANSWER:
second & Officer
Transaction Codes
Enter a Gun:____ - ANSWER: G
Transaction Codes
Query a Vehicle: ______ or _________ - ANSWER: ZV or QV
Transaction codes
Modify a stolen security: ______ - ANSWER: MS
VIN searches are based on the last _____ characters of the VIN - ANSWER: 8
__________________ alphabetic characters in a serial number are not considered
for matching purposes - ANSWER: embedded
Querying the wanted person file will _________________ many files and may result
in a response from NCIC/ TCIC - ANSWER: cross-search
Wanted Person Query responses - ANSWER: wanted person
immigration violator
foreign fugitive
AND CORRECT ANSWERS (VERIFIED ANSWERS) |
AGRADE
The National Crime Information Center - ANSWER: NCIC
TCIC - ANSWER: Texas Criminal Information Center
NLETS - ANSWER: The international Justice and Public Safety Network
TLETS - ANSWER: Texas Law Enforcement Telecommunications System
Who is responsible for all the records entered into the system? - ANSWER: local law
enforcement
Who enforces policy and procedure within the State of Texas? - ANSWER: CSA-DPS
When was NCIC launched & how many files/ records did it have? - ANSWER:
Launched January 27, 1967 with 5 files & over 300,000 records
How many files and records does NCIC currently have? - ANSWER: 11.7 million active
records and 21 files
In 2011 the NCIC processed ____________ transactions per day - ANSWER: 7.9
million
The goal of the NCIC is to help the criminal justice community to preform its duties
by providing and maintaining a computerized filing system of _________________
and ________________ documented criminal justice information. - ANSWER:
accurate & timely
TxDPS has designated the Law Enforcement Support/
______________________________________ (LES/CRS) division as the state's CSA -
ANSWER: Crime Records Service
Agencies must conduct a fingerprint based record check to verify identification
within ___________ days of assignment for direct access or direct responsibility of
networks - ANSWER: 30
What are permanent disqualifiers for the system access policy? (5 total) - ANSWER:
Felony Conviction
Felony Deferred Adjunction
Class A Misdemeanor conviction
Class A Misdemeanor Deferred Adjudication
Family Violence
, What are the 10 year disqualifiers for the system access policy? (2 total) - ANSWER:
Class B misdemeanor conviction
Class B misdemeanor deferred adjudication
Terminal Access Policy
Law Enforcement and criminal Justice sensitive facilities and restricted/controlled
areas shall be ______________________ posted and separated from non-sensitive
and non-restricted/controlled areas by ________________ that restrict
unauthorized access - ANSWER: prominently & physical barriers
Relationship of TCIC/NCIC to TLETS/NLETS
(The international justice and public safety network)
Data obtained over the TLETS/NLETS may only be disseminated to
_______________________________________________________ agencies -
ANSWER: authorized criminal justice
Automatic Removal of Records
Each record in the database is assigned a specific retention period. For example,
temporary Felony Warrants are automatically removed after ____ hours - ANSWER:
48
Record Responsibility
Agencies lacking staff support for a ____________ party check should require the
____________ assigned to the case to check the record for accuracy - ANSWER:
second & Officer
Transaction Codes
Enter a Gun:____ - ANSWER: G
Transaction Codes
Query a Vehicle: ______ or _________ - ANSWER: ZV or QV
Transaction codes
Modify a stolen security: ______ - ANSWER: MS
VIN searches are based on the last _____ characters of the VIN - ANSWER: 8
__________________ alphabetic characters in a serial number are not considered
for matching purposes - ANSWER: embedded
Querying the wanted person file will _________________ many files and may result
in a response from NCIC/ TCIC - ANSWER: cross-search
Wanted Person Query responses - ANSWER: wanted person
immigration violator
foreign fugitive