TCIC/TLETS MOBILE ACCESS WITH CCH
RECERTIFICATION TEST STUDY GUIDE EXAM
QUESTIONS WITH VERIFIED SOLUTONS 2025/2026
NEW UPDATE
The social security number is mandatory information in the Continuity of Care
inquire -- ANSWER--False
The Nlets query for Criminal History Supplemental Information 'AQ' should be
used for requests for fingerprint cards, photos and for disposition information. --
ANSWER--True
Texas Law Enforcement Telecommunication System and the International
Justice and Public Safety Network are designed exclusively for use by --
ANSWER--Criminal Justice Agencies in conducting their lawfully authorized
duties.
Nlets System Agency (NSA) is -- ANSWER--All of the Above
The purpose of the Continuity of Care information is to: -- ANSWER--Ensure
continuity of care for individuals involved in the criminal justice system who
are ill and to provide local post-booking jail diversion opportunities.
Page | 1
,If a positive response is received from INTERPOL on an initial inquiry, the
operator should submit a full inquiry to get more detail using the EID number
provided in the initial response. -- ANSWER--True
How many images can be associated with a NCIC property file record? --
ANSWER--1
What is indicated by placing a "Y" in the NOA Field? -- ANSWER--Notify ORI
of All Hits
Senate Bill 839 helped to automate communication between jail and local
mental health authorities -- ANSWER--True
An officer has the right to run anyone they want to for no particular reason? --
ANSWER--False
Once a vehicle record is entered into the NCIC Vehicle File, it remains in NCIC
forever, or until the entering agency removes the record from NCIC. --
ANSWER--True
The Client ID, Community Center Component (facility name), Community
Center phone number and case ID are included in the response of a Continuity
of Care Query (CCQ) -- ANSWER--True
Page | 2
, What NCIC file if any should livestock be entered into? -- ANSWER--Article
File
The computer site and/or terminal area must have adequate physical security to
protect against any unauthorized personnel gaining access to the computer
equipment or to any of the stored data. To protect against unauthorized access
the terminal must be located: -- ANSWER--In a secure location to which only
authorized personnel have access.
A wanted person inquiry (QW/ZW) will not automatically cross-search the
missing person file record -- ANSWER--False
There are two types of Administrative Message formats used in teletype
operations: -- ANSWER--Informal and Formal
The accuracy, timeliness, and completeness of records entered in TCIC/NCIC is
the responsibility of: -- ANSWER--Entering Agency
To obtain a specific criminal history via the III, a criminal history record record
request (QR) transaction must be transmitted using both the FBI and SID
number -- ANSWER--True
Page | 3