Trivia Questions Quiz: What Do You Know About Mobile Data Terminal?

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Wwiirations
W
Wwiirations
Community Contributor
Quizzes Created: 1 | Total Attempts: 84
Questions: 40 | Attempts: 84

SettingsSettingsSettings
Trivia Questions Quiz: What Do You Know About Mobile Data Terminal? - Quiz

What Do You Know About Mobile Data Terminal? This terminal is used by different vehicles so as to distribute the data they have on different occasions, for example, communication between police cars. Do you know how to install the system or use it effectively? How about you take up this quiz and get to find out for sure. All the best!


Questions and Answers
  • 1. 

    What information must be included in an inquiry of the article file?

    • A.

      Type of article

    • B.

      Serial Number

    • C.

      Owner Applied Number

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    An inquiry of the article file must include all of the above information, which includes the type of article, serial number, and owner applied number. This information is crucial for identifying and retrieving the specific article being inquired about. The type of article helps categorize and locate it within the file, while the serial number and owner applied number serve as unique identifiers that ensure accuracy and prevent confusion. Including all of this information in the inquiry helps streamline the process and ensures that the correct article is being addressed.

    Rate this question:

  • 2. 

    Which one of these would NOT be addressed by the agency written policy concerning the MDT?

    • A.

      Security of the MDT

    • B.

      Acceptable use of information

    • C.

      Passwords

    • D.

      Shift Scheduling

    Correct Answer
    D. Shift Scheduling
    Explanation
    The agency written policy concerning the MDT would address security of the MDT, acceptable use of information, and passwords. However, shift scheduling would not be addressed by this policy as it is unrelated to the use and security of the MDT. Therefore, the correct answer is shift scheduling.

    Rate this question:

  • 3. 

    How long is the message log maintained?

    • A.

      5 Years

    • B.

      1 Year

    • C.

      2 Years

    • D.

      6 Months

    Correct Answer
    B. 1 Year
    Explanation
    The message log is maintained for a period of 1 year. This means that all messages sent or received within the system will be stored and accessible for a duration of 1 year before being deleted. This timeframe allows for a reasonable amount of time to review and reference past messages, while also ensuring that the log does not become too cluttered with outdated information.

    Rate this question:

  • 4. 

    Who is the person primarily responsible for the security of information from the MDT?

    • A.

      Your agency

    • B.

      Your supervisor

    • C.

      You

    • D.

      Your partner

    Correct Answer
    C. You
    Explanation
    The person primarily responsible for the security of information from the MDT is "You." This implies that the individual being addressed in the question is the one who holds the main responsibility for ensuring the security of information from the MDT. It suggests that the individual must take proactive measures to safeguard the information and prevent any unauthorized access or breaches.

    Rate this question:

  • 5. 

    How long is a temporary felon record in NCIC?

    • A.

      24 Hours

    • B.

      36 Hours

    • C.

      48 Hours

    • D.

      72 Hours

    Correct Answer
    C. 48 Hours
    Explanation
    A temporary felon record in NCIC is valid for 48 hours. This means that the information regarding a felony offense will be retained in the NCIC database for a period of 48 hours before it is removed. After this time, the record will no longer be accessible or available for reference.

    Rate this question:

  • 6. 

    What agency is responsible for NCIC operations and maintenance?

    • A.

      KSP

    • B.

      FBI

    • C.

      CIA

    • D.

      OSU

    Correct Answer
    B. FBI
    Explanation
    The Federal Bureau of Investigation (FBI) is responsible for NCIC (National Crime Information Center) operations and maintenance. The NCIC is a computerized database that provides law enforcement agencies with information on wanted persons, stolen property, and other criminal records. As a federal law enforcement agency, the FBI oversees the management and functioning of the NCIC, ensuring its effectiveness and security in supporting criminal justice activities nationwide.

    Rate this question:

  • 7. 

    What agency is responsible for LINK operations and maintenance?

    • A.

      FBI

    • B.

      KSP

    • C.

      OSU

    • D.

      CIA

    Correct Answer
    B. KSP
    Explanation
    The correct answer is KSP. KSP stands for Kentucky State Police. They are responsible for the operations and maintenance of LINK, which refers to the Law Enforcement Information Network. This network is used for sharing information among law enforcement agencies in Kentucky.

    Rate this question:

  • 8. 

    A _________________ is defined as a postive response to an inquiry transaction.

    • A.

      Verification

    • B.

      Hit

    • C.

      Response

    • D.

      Thump

    Correct Answer
    B. Hit
    Explanation
    A "hit" can be defined as a positive response to an inquiry transaction.

    Rate this question:

  • 9. 

    The foreign fugitive file, Convicted person on supervised release, convicted sex offender, immigration violations file, absconder category, NSEERS (National Security Entry Exit registration System), and __________________  are additional files that are checked in NCIC when running a wanted person inquiry.

    • A.

      INTERPOL

    • B.

      Deported Felon

    • C.

      FBI Wanted Persons

    • D.

      Dept. Homeland Security

    Correct Answer
    B. Deported Felon
    Explanation
    When running a wanted person inquiry in NCIC, in addition to the foreign fugitive file, convicted person on supervised release, convicted sex offender, immigration violations file, absconder category, and NSEERS, the Deported Felon file is also checked. This means that the NCIC system will search for any records or information related to individuals who have been deported due to committing felonies. These individuals may pose a potential risk or threat, and therefore their records are included in the wanted person inquiry.

    Rate this question:

  • 10. 

    Frequent INLETS transactions include interstate messages, out of state inquires, and __________________________.

    • A.

      Interstate transportation and commerce

    • B.

      Transmitting booking photos

    • C.

      Hazardous materials inquiries

    • D.

      Law enforcement directory assistance

    Correct Answer
    C. Hazardous materials inquiries
    Explanation
    Frequent INLETS transactions include interstate messages, out of state inquires, and hazardous materials inquiries. This suggests that one of the common types of transactions handled by INLETS is related to inquiries about hazardous materials. This could involve requests for information, reporting of incidents, or any other communication related to hazardous materials.

    Rate this question:

  • 11. 

    The Law Information Network of Kentucky maintains records on vehicle and boat registration, driver's licenses, and _______________.

    • A.

      Hunting licenses

    • B.

      Carry concealed weapon permits

    • C.

      Voter registration

    • D.

      District and Circuit court records

    Correct Answer
    B. Carry concealed weapon permits
    Explanation
    The Law Information Network of Kentucky maintains records on vehicle and boat registration, driver's licenses, and carry concealed weapon permits. This means that the network keeps track of individuals who have been granted permits to carry concealed weapons in Kentucky. This information is important for law enforcement and public safety purposes, as it allows for the monitoring and regulation of concealed weapons in the state.

    Rate this question:

  • 12. 

    NCIC services are available to all criminal justice agencies in all fifty states.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    NCIC (National Crime Information Center) is a computerized database that provides criminal justice agencies with information on wanted persons, stolen property, and other criminal records. It is a nationwide system that is accessible to all criminal justice agencies in all fifty states. Therefore, the statement that NCIC services are available to all criminal justice agencies in all fifty states is true.

    Rate this question:

  • 13. 

    In Kentucky, the Kentucky State Police has the statewide responsibility for AMBER Alert activation.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The given statement is true. In Kentucky, the Kentucky State Police is indeed responsible for the statewide activation of AMBER Alerts. AMBER Alerts are emergency messages that are issued in the most serious child abduction cases. They are intended to quickly alert the public and solicit their help in locating the abducted child and the suspect. The Kentucky State Police play a crucial role in coordinating and disseminating these alerts to ensure the safety and swift recovery of abducted children.

    Rate this question:

  • 14. 

    What is a type of offline search that allows the officer to search transaction made by other NCIC users?

    • A.

      Purged records search

    • B.

      Transaction log search

    • C.

      Hot file search

    • D.

      All of the answers are correct

    Correct Answer
    B. Transaction log search
    Explanation
    A transaction log search is a type of offline search that allows an officer to search for transactions made by other NCIC users. This search can provide valuable information about previous transactions and activities conducted by other users, aiding in investigations and gathering evidence. By accessing the transaction log, officers can track and analyze the actions of individuals and identify any suspicious or illegal activities.

    Rate this question:

  • 15. 

    What are the three types of offline searches available through NCIC?

    • A.

      Purged records search

    • B.

      Transaction log search

    • C.

      Hot file search

    • D.

      All of the answers are correct

    Correct Answer
    D. All of the answers are correct
    Explanation
    The three types of offline searches available through NCIC are purged records search, transaction log search, and hot file search. These searches allow users to access information that is not currently available online. Purged records search involves searching for information that has been removed from the online database but is still stored in the system. Transaction log search allows users to retrieve information about previous transactions and activities. Hot file search involves searching for information related to wanted persons, stolen property, or other urgent matters. All of these types of searches are correct and can be used to retrieve specific information from the NCIC system.

    Rate this question:

  • 16. 

    Usernames are assigned by the agency and passwords are chosen by individual officer.  Which of the following is true about passwords?

    • A.

      Must be changed every month

    • B.

      Must be at least five characters long

    • C.

      Must be changed every ten days

    • D.

      Must be at least ten characters in length

    Correct Answer
    B. Must be at least five characters long
    Explanation
    Passwords must be at least five characters long. This means that the minimum requirement for a password is to have five characters. There is no mention of any other specific requirements such as special characters or numbers, so as long as the password has at least five characters, it would be considered valid.

    Rate this question:

  • 17. 

    Areas of concern that written policies must address are passwords, security, logging information, and ________________.

    • A.

      Written Agency Policy

    • B.

      Records Management

    • C.

      Dial Up/Remote Access

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    The correct answer is "All of the above". When it comes to written policies, it is important to address various areas of concern. This includes passwords to ensure secure access to systems, security measures to protect sensitive information, logging information to track and monitor activities, and dial-up/remote access policies to regulate remote connections. By addressing all of these areas, organizations can establish comprehensive policies that promote security and compliance.

    Rate this question:

  • 18. 

    All LINK transactions are logged electronically.  These logs include which of the following?

    • A.

      Transaction requested

    • B.

      Date and Time

    • C.

      Operator termianl device

    • D.

      All of the answers are correct

    Correct Answer
    D. All of the answers are correct
    Explanation
    The correct answer is that all of the answers are correct. This means that all of the mentioned information - transaction requested, date and time, and operator terminal device - is included in the electronically logged transactions.

    Rate this question:

  • 19. 

    The system automatically logs all transmissions from the MDT and maintains a message log for at least one year.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The given statement states that the system automatically logs all transmissions from the MDT (Mobile Data Terminal) and keeps a message log for at least one year. This means that every communication or message sent through the MDT is recorded and stored for a minimum of one year. Therefore, the answer "True" is correct as it aligns with the information provided in the statement.

    Rate this question:

  • 20. 

    A query of the NCIC Vehicle file can be made using what information?

    • A.

      Vehicle Identification Number

    • B.

      License Plate Number

    • C.

      Serial Number

    • D.

      All of the answers are correct

    Correct Answer
    D. All of the answers are correct
    Explanation
    The NCIC Vehicle file can be queried using various types of information, including the Vehicle Identification Number (VIN), License Plate Number, and Serial Number. All of these options are correct because any of these pieces of information can be used to search for and retrieve relevant data from the NCIC Vehicle file.

    Rate this question:

  • 21. 

    A query of NCIC Gun file can result in records for stolen guns or what other classification of gun record?

    • A.

      Lost gun

    • B.

      Recovered gun

    • C.

      Felony gun

    • D.

      All of the answers are correct

    Correct Answer
    D. All of the answers are correct
    Explanation
    A query of the NCIC Gun file can result in records for stolen guns, lost guns, recovered guns, or felony guns. All of these classifications of gun records can be retrieved from the NCIC Gun file when querying it.

    Rate this question:

  • 22. 

    A query of the NCIC Gun file must contain the serial number of the gun and  _______________.

    • A.

      Make of the Gun

    • B.

      Caliber of the gun

    • C.

      Make and caliber of the gun

    • D.

      All of the answers are correct

    Correct Answer
    D. All of the answers are correct
    Explanation
    The query of the NCIC Gun file must contain the serial number of the gun and all of the answers are correct. This means that in order to retrieve information from the NCIC Gun file, the query must include not only the serial number of the gun but also the make of the gun and the caliber of the gun. All three pieces of information are necessary to accurately identify and retrieve the desired information from the database.

    Rate this question:

  • 23. 

    A query of the NCIC Article file can contain a brand name.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The NCIC Article file is a database that contains information about stolen or missing articles. It is primarily used by law enforcement agencies to track and recover stolen property. Since the purpose of the database is to identify and locate specific items, it does not include information about brand names. Therefore, a query of the NCIC Article file cannot contain a brand name.

    Rate this question:

  • 24. 

    A query of the NCIC Article file must contain either the serial number of the article or an owner applied number and _____________.

    • A.

      Type of article

    • B.

      Brand name of the article

    • C.

      Model number of the article

    • D.

      All of the answers are correct

    Correct Answer
    A. Type of article
    Explanation
    To query the NCIC Article file, it is necessary to include either the serial number of the article or an owner applied number. In addition to this requirement, the query must also include the type of article being searched for. This means that the correct answer is "Type of article." Including the type of article in the query helps to narrow down the search and retrieve more accurate results from the NCIC Article file.

    Rate this question:

  • 25. 

    What data is needed to query a KY driver's license?

    • A.

      Name and date of birth

    • B.

      Driver's license number

    • C.

      Social security number

    • D.

      All of the answers are acceptable

    Correct Answer
    D. All of the answers are acceptable
    Explanation
    All of the answers are acceptable because querying a KY driver's license requires multiple pieces of data to accurately identify and retrieve the information. The name and date of birth can be used to search for the license, the driver's license number is a unique identifier for the license, and the social security number can also be used to verify the identity of the individual. Therefore, any combination of these data points can be used to query a KY driver's license.

    Rate this question:

  • 26. 

    A positive response on a Kentucky driver's license will also produce a wanted person check on the individual?

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    A positive response on a Kentucky driver's license means that there is some kind of issue or alert associated with the individual's license. This could be due to various reasons such as outstanding warrants, unpaid fines, or other legal issues. Therefore, it is likely that a positive response on a Kentucky driver's license will trigger a wanted person check on the individual to determine if they are wanted by law enforcement.

    Rate this question:

  • 27. 

    An out of state driver's history query is not available on the MDT.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The given statement states that an out of state driver's history query is not available on the MDT. This means that the MDT (Mobile Data Terminal) does not have access to the driving history of out of state drivers. Therefore, the correct answer is True, indicating that the statement is true and out of state driver's history query cannot be accessed on the MDT.

    Rate this question:

  • 28. 

    What data is needed to query an out of state driver's license?

    • A.

      Name, Date of Birth, and Sex

    • B.

      Driver's license number

    • C.

      Social Security Number

    • D.

      A and B only

    Correct Answer
    D. A and B only
    Explanation
    To query an out-of-state driver's license, both the name, date of birth, and sex of the driver, as well as the driver's license number are required. The name, date of birth, and sex help in identifying the specific individual, while the driver's license number is necessary to access the driver's license record. The social security number is not needed for this query.

    Rate this question:

  • 29. 

    A driver's history will be returned on a KY driver's license response but not always returned on an out of state driver's license response.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The explanation for the given correct answer is that when a KY driver's license is requested, the driver's history will always be returned as part of the license response. However, when an out of state driver's license is requested, there is no guarantee that the driver's history will be included in the license response. Therefore, it is true that a driver's history will be returned on a KY driver's license response but not always on an out of state driver's license response.

    Rate this question:

  • 30. 

    In order to verify all the information contained in the response the entering agency must be contacted to confirm the status of the record.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The statement suggests that in order to confirm the accuracy of the information provided in the response, it is necessary to contact the entering agency to verify the status of the record. This implies that the entering agency is the authoritative source of information and can provide the most reliable confirmation. Therefore, the answer "True" is correct as it aligns with the statement.

    Rate this question:

  • 31. 

    All hit confirmation procedures for MDT operators will be handled through their LINK terminal agency.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The statement suggests that all hit confirmation procedures for MDT operators will be conducted through their LINK terminal agency. This implies that the LINK terminal agency is the designated platform or system through which MDT operators will verify and confirm hits. Therefore, the statement is true as it indicates that the hit confirmation process will exclusively occur via the LINK terminal agency.

    Rate this question:

  • 32. 

    A potential hit becomes a valid hit once the inquiring agency has:

    • A.

      Ensured the person or property is identical to information contained in the response.

    • B.

      Ensured the case file and/or warrant are active or outstanding and if extradition is authorized.

    • C.

      Both A and B are correct

    • D.

      None of the above

    Correct Answer
    C. Both A and B are correct
    Explanation
    A potential hit becomes a valid hit once the inquiring agency has confirmed that the person or property matches the information provided in the response (option A). Additionally, they need to ensure that the case file and/or warrant are active or outstanding and that extradition is authorized (option B). Both of these conditions need to be met for a potential hit to be considered a valid hit.

    Rate this question:

  • 33. 

    A hit is a positive response to an inquiry transaction.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    A hit refers to a positive response received when making an inquiry transaction. This means that when someone makes an inquiry, they will receive a hit as a confirmation or acknowledgement that their inquiry has been successfully processed. Therefore, the statement that a hit is a positive response to an inquiry transaction is true.

    Rate this question:

  • 34. 

    A query of the NCIC Boat file can be made using what information?

    • A.

      Boat Hull Number

    • B.

      Registration Number

    • C.

      Owner's Name

    • D.

      Both A and B

    Correct Answer
    D. Both A and B
    Explanation
    A query of the NCIC Boat file can be made using both the Boat Hull Number and the Registration Number. Both of these pieces of information can be used to search for and retrieve relevant data and records from the NCIC Boat file. The Boat Hull Number is a unique identifier assigned to each boat, while the Registration Number is a unique identifier assigned to each registered boat. By using either of these numbers, one can access information about the boat, its owner, and any associated records in the NCIC Boat file.

    Rate this question:

  • 35. 

    Statistics from recent years show a steady increase in the numbers and in some cases the numbers top weapons as the number one killer of on-duty officers.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The statement is true because statistics from recent years indicate that the numbers of on-duty officers being killed have been steadily increasing. In some cases, these numbers even surpass the deaths caused by weapons, making it the leading cause of death for on-duty officers.

    Rate this question:

  • 36. 

    Officer safety concerns with use of mobile data terminal and vehicle operation continue to be a great concern facing today's law enforcement officers, administrators, and trainers.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The statement is true because officer safety concerns with the use of mobile data terminal and vehicle operation are indeed a significant issue for law enforcement officers, administrators, and trainers. The use of mobile data terminals in vehicles can be distracting and potentially dangerous, as it diverts the officer's attention away from the road. This can increase the risk of accidents and compromise officer safety. Therefore, it is crucial for law enforcement agencies to address these concerns and implement appropriate measures to ensure the safety of their officers.

    Rate this question:

  • 37. 

    A wanted person query also searches which of the following files?

    • A.

      Foreign Fugitive File

    • B.

      Violent Gang and Terrorist Organization File

    • C.

      Missing Person File

    • D.

      All of the answers are correct

    Correct Answer
    D. All of the answers are correct
    Explanation
    The correct answer is "All of the answers are correct". A wanted person query searches all of the mentioned files, including the Foreign Fugitive File, Violent Gang and Terrorist Organization File, and Missing Person File. This is because these files contain information about individuals who are wanted or have outstanding warrants for various reasons. Therefore, conducting a wanted person query would involve searching all of these files to gather relevant information.

    Rate this question:

  • 38. 

    An inquiry of the Wanted Person File may be made by name and one, more than one, or all of the following identifiers:

    • A.

      DOB

    • B.

      SSN

    • C.

      OLN

    • D.

      Scars

    Correct Answer(s)
    A. DOB
    B. SSN
    C. OLN
    Explanation
    The correct answer is DOB, SSN, OLN. When making an inquiry of the Wanted Person File, one can search by the person's name and any combination of the following identifiers: Date of Birth (DOB), Social Security Number (SSN), and Operator's License Number (OLN). This means that in order to find information on a wanted person, one can use their name along with their date of birth, social security number, and/or operator's license number to narrow down the search and obtain accurate results.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 30, 2013
    Quiz Created by
    Wwiirations
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.