Trivia Questions Quiz: What Do You Know About Mobile Data Terminal?

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Wwiirations
W
Wwiirations
Community Contributor
Quizzes Created: 1 | Total Attempts: 84
| Attempts: 84 | Questions: 40
Please wait...
Question 1 / 40
0 %
0/100
Score 0/100
1. Officer safety concerns with use of mobile data terminal and vehicle operation continue to be a great concern facing today's law enforcement officers, administrators, and trainers.

Explanation

The statement is true because officer safety concerns with the use of mobile data terminal and vehicle operation are indeed a significant issue for law enforcement officers, administrators, and trainers. The use of mobile data terminals in vehicles can be distracting and potentially dangerous, as it diverts the officer's attention away from the road. This can increase the risk of accidents and compromise officer safety. Therefore, it is crucial for law enforcement agencies to address these concerns and implement appropriate measures to ensure the safety of their officers.

Submit
Please wait...
About This Quiz
Trivia Questions Quiz: What Do You Know About Mobile Data Terminal? - Quiz

What Do You Know About Mobile Data Terminal? This terminal is used by different vehicles so as to distribute the data they have on different occasions, for example,... see morecommunication between police cars. Do you know how to install the system or use it effectively? How about you take up this quiz and get to find out for sure. All the best! see less

2. How long is a temporary felon record in NCIC?

Explanation

A temporary felon record in NCIC is valid for 48 hours. This means that the information regarding a felony offense will be retained in the NCIC database for a period of 48 hours before it is removed. After this time, the record will no longer be accessible or available for reference.

Submit
3. In Kentucky, the Kentucky State Police has the statewide responsibility for AMBER Alert activation.

Explanation

The given statement is true. In Kentucky, the Kentucky State Police is indeed responsible for the statewide activation of AMBER Alerts. AMBER Alerts are emergency messages that are issued in the most serious child abduction cases. They are intended to quickly alert the public and solicit their help in locating the abducted child and the suspect. The Kentucky State Police play a crucial role in coordinating and disseminating these alerts to ensure the safety and swift recovery of abducted children.

Submit
4. The system automatically logs all transmissions from the MDT and maintains a message log for at least one year.

Explanation

The given statement states that the system automatically logs all transmissions from the MDT (Mobile Data Terminal) and keeps a message log for at least one year. This means that every communication or message sent through the MDT is recorded and stored for a minimum of one year. Therefore, the answer "True" is correct as it aligns with the information provided in the statement.

Submit
5. A query of NCIC Gun file can result in records for stolen guns or what other classification of gun record?

Explanation

A query of the NCIC Gun file can result in records for stolen guns, lost guns, recovered guns, or felony guns. All of these classifications of gun records can be retrieved from the NCIC Gun file when querying it.

Submit
6. A positive response on a Kentucky driver's license will also produce a wanted person check on the individual?

Explanation

A positive response on a Kentucky driver's license means that there is some kind of issue or alert associated with the individual's license. This could be due to various reasons such as outstanding warrants, unpaid fines, or other legal issues. Therefore, it is likely that a positive response on a Kentucky driver's license will trigger a wanted person check on the individual to determine if they are wanted by law enforcement.

Submit
7. A hit is a positive response to an inquiry transaction.

Explanation

A hit refers to a positive response received when making an inquiry transaction. This means that when someone makes an inquiry, they will receive a hit as a confirmation or acknowledgement that their inquiry has been successfully processed. Therefore, the statement that a hit is a positive response to an inquiry transaction is true.

Submit
8. A wanted person query also searches which of the following files?

Explanation

The correct answer is "All of the answers are correct". A wanted person query searches all of the mentioned files, including the Foreign Fugitive File, Violent Gang and Terrorist Organization File, and Missing Person File. This is because these files contain information about individuals who are wanted or have outstanding warrants for various reasons. Therefore, conducting a wanted person query would involve searching all of these files to gather relevant information.

Submit
9. NCIC services are available to all criminal justice agencies in all fifty states.

Explanation

NCIC (National Crime Information Center) is a computerized database that provides criminal justice agencies with information on wanted persons, stolen property, and other criminal records. It is a nationwide system that is accessible to all criminal justice agencies in all fifty states. Therefore, the statement that NCIC services are available to all criminal justice agencies in all fifty states is true.

Submit
10. What are the three types of offline searches available through NCIC?

Explanation

The three types of offline searches available through NCIC are purged records search, transaction log search, and hot file search. These searches allow users to access information that is not currently available online. Purged records search involves searching for information that has been removed from the online database but is still stored in the system. Transaction log search allows users to retrieve information about previous transactions and activities. Hot file search involves searching for information related to wanted persons, stolen property, or other urgent matters. All of these types of searches are correct and can be used to retrieve specific information from the NCIC system.

Submit
11. All LINK transactions are logged electronically.  These logs include which of the following?

Explanation

The correct answer is that all of the answers are correct. This means that all of the mentioned information - transaction requested, date and time, and operator terminal device - is included in the electronically logged transactions.

Submit
12. A driver's history will be returned on a KY driver's license response but not always returned on an out of state driver's license response.

Explanation

The explanation for the given correct answer is that when a KY driver's license is requested, the driver's history will always be returned as part of the license response. However, when an out of state driver's license is requested, there is no guarantee that the driver's history will be included in the license response. Therefore, it is true that a driver's history will be returned on a KY driver's license response but not always on an out of state driver's license response.

Submit
13. Who is the person primarily responsible for the security of information from the MDT?

Explanation

The person primarily responsible for the security of information from the MDT is "You." This implies that the individual being addressed in the question is the one who holds the main responsibility for ensuring the security of information from the MDT. It suggests that the individual must take proactive measures to safeguard the information and prevent any unauthorized access or breaches.

Submit
14. A _________________ is defined as a postive response to an inquiry transaction.

Explanation

A "hit" can be defined as a positive response to an inquiry transaction.

Submit
15. The Law Information Network of Kentucky maintains records on vehicle and boat registration, driver's licenses, and _______________.

Explanation

The Law Information Network of Kentucky maintains records on vehicle and boat registration, driver's licenses, and carry concealed weapon permits. This means that the network keeps track of individuals who have been granted permits to carry concealed weapons in Kentucky. This information is important for law enforcement and public safety purposes, as it allows for the monitoring and regulation of concealed weapons in the state.

Submit
16. What data is needed to query a KY driver's license?

Explanation

All of the answers are acceptable because querying a KY driver's license requires multiple pieces of data to accurately identify and retrieve the information. The name and date of birth can be used to search for the license, the driver's license number is a unique identifier for the license, and the social security number can also be used to verify the identity of the individual. Therefore, any combination of these data points can be used to query a KY driver's license.

Submit
17. A potential hit becomes a valid hit once the inquiring agency has:

Explanation

A potential hit becomes a valid hit once the inquiring agency has confirmed that the person or property matches the information provided in the response (option A). Additionally, they need to ensure that the case file and/or warrant are active or outstanding and that extradition is authorized (option B). Both of these conditions need to be met for a potential hit to be considered a valid hit.

Submit
18. A query of the NCIC Boat file can be made using what information?

Explanation

A query of the NCIC Boat file can be made using both the Boat Hull Number and the Registration Number. Both of these pieces of information can be used to search for and retrieve relevant data and records from the NCIC Boat file. The Boat Hull Number is a unique identifier assigned to each boat, while the Registration Number is a unique identifier assigned to each registered boat. By using either of these numbers, one can access information about the boat, its owner, and any associated records in the NCIC Boat file.

Submit
19. What agency is responsible for NCIC operations and maintenance?

Explanation

The Federal Bureau of Investigation (FBI) is responsible for NCIC (National Crime Information Center) operations and maintenance. The NCIC is a computerized database that provides law enforcement agencies with information on wanted persons, stolen property, and other criminal records. As a federal law enforcement agency, the FBI oversees the management and functioning of the NCIC, ensuring its effectiveness and security in supporting criminal justice activities nationwide.

Submit
20. In order to verify all the information contained in the response the entering agency must be contacted to confirm the status of the record.

Explanation

The statement suggests that in order to confirm the accuracy of the information provided in the response, it is necessary to contact the entering agency to verify the status of the record. This implies that the entering agency is the authoritative source of information and can provide the most reliable confirmation. Therefore, the answer "True" is correct as it aligns with the statement.

Submit
21. All hit confirmation procedures for MDT operators will be handled through their LINK terminal agency.

Explanation

The statement suggests that all hit confirmation procedures for MDT operators will be conducted through their LINK terminal agency. This implies that the LINK terminal agency is the designated platform or system through which MDT operators will verify and confirm hits. Therefore, the statement is true as it indicates that the hit confirmation process will exclusively occur via the LINK terminal agency.

Submit
22. A query of the NCIC Vehicle file can be made using what information?

Explanation

The NCIC Vehicle file can be queried using various types of information, including the Vehicle Identification Number (VIN), License Plate Number, and Serial Number. All of these options are correct because any of these pieces of information can be used to search for and retrieve relevant data from the NCIC Vehicle file.

Submit
23. Which one of these would NOT be addressed by the agency written policy concerning the MDT?

Explanation

The agency written policy concerning the MDT would address security of the MDT, acceptable use of information, and passwords. However, shift scheduling would not be addressed by this policy as it is unrelated to the use and security of the MDT. Therefore, the correct answer is shift scheduling.

Submit
24. How long is the message log maintained?

Explanation

The message log is maintained for a period of 1 year. This means that all messages sent or received within the system will be stored and accessible for a duration of 1 year before being deleted. This timeframe allows for a reasonable amount of time to review and reference past messages, while also ensuring that the log does not become too cluttered with outdated information.

Submit
25. What information must be included in an inquiry of the article file?

Explanation

An inquiry of the article file must include all of the above information, which includes the type of article, serial number, and owner applied number. This information is crucial for identifying and retrieving the specific article being inquired about. The type of article helps categorize and locate it within the file, while the serial number and owner applied number serve as unique identifiers that ensure accuracy and prevent confusion. Including all of this information in the inquiry helps streamline the process and ensures that the correct article is being addressed.

Submit
26. Frequent INLETS transactions include interstate messages, out of state inquires, and __________________________.

Explanation

Frequent INLETS transactions include interstate messages, out of state inquires, and hazardous materials inquiries. This suggests that one of the common types of transactions handled by INLETS is related to inquiries about hazardous materials. This could involve requests for information, reporting of incidents, or any other communication related to hazardous materials.

Submit
27. What data is needed to query an out of state driver's license?

Explanation

To query an out-of-state driver's license, both the name, date of birth, and sex of the driver, as well as the driver's license number are required. The name, date of birth, and sex help in identifying the specific individual, while the driver's license number is necessary to access the driver's license record. The social security number is not needed for this query.

Submit
28. Statistics from recent years show a steady increase in the numbers and in some cases the numbers top weapons as the number one killer of on-duty officers.

Explanation

The statement is true because statistics from recent years indicate that the numbers of on-duty officers being killed have been steadily increasing. In some cases, these numbers even surpass the deaths caused by weapons, making it the leading cause of death for on-duty officers.

Submit
29. What agency is responsible for LINK operations and maintenance?

Explanation

The correct answer is KSP. KSP stands for Kentucky State Police. They are responsible for the operations and maintenance of LINK, which refers to the Law Enforcement Information Network. This network is used for sharing information among law enforcement agencies in Kentucky.

Submit
30. Usernames are assigned by the agency and passwords are chosen by individual officer.  Which of the following is true about passwords?

Explanation

Passwords must be at least five characters long. This means that the minimum requirement for a password is to have five characters. There is no mention of any other specific requirements such as special characters or numbers, so as long as the password has at least five characters, it would be considered valid.

Submit
31. A query of the NCIC Gun file must contain the serial number of the gun and  _______________.

Explanation

The query of the NCIC Gun file must contain the serial number of the gun and all of the answers are correct. This means that in order to retrieve information from the NCIC Gun file, the query must include not only the serial number of the gun but also the make of the gun and the caliber of the gun. All three pieces of information are necessary to accurately identify and retrieve the desired information from the database.

Submit
32. Areas of concern that written policies must address are passwords, security, logging information, and ________________.

Explanation

The correct answer is "All of the above". When it comes to written policies, it is important to address various areas of concern. This includes passwords to ensure secure access to systems, security measures to protect sensitive information, logging information to track and monitor activities, and dial-up/remote access policies to regulate remote connections. By addressing all of these areas, organizations can establish comprehensive policies that promote security and compliance.

Submit
33. An out of state driver's history query is not available on the MDT.

Explanation

The given statement states that an out of state driver's history query is not available on the MDT. This means that the MDT (Mobile Data Terminal) does not have access to the driving history of out of state drivers. Therefore, the correct answer is True, indicating that the statement is true and out of state driver's history query cannot be accessed on the MDT.

Submit
34. An inquiry of the Wanted Person File may be made by name and one, more than one, or all of the following identifiers:

Explanation

The correct answer is DOB, SSN, OLN. When making an inquiry of the Wanted Person File, one can search by the person's name and any combination of the following identifiers: Date of Birth (DOB), Social Security Number (SSN), and Operator's License Number (OLN). This means that in order to find information on a wanted person, one can use their name along with their date of birth, social security number, and/or operator's license number to narrow down the search and obtain accurate results.

Submit
35. What is a type of offline search that allows the officer to search transaction made by other NCIC users?

Explanation

A transaction log search is a type of offline search that allows an officer to search for transactions made by other NCIC users. This search can provide valuable information about previous transactions and activities conducted by other users, aiding in investigations and gathering evidence. By accessing the transaction log, officers can track and analyze the actions of individuals and identify any suspicious or illegal activities.

Submit
36. A query of the NCIC Article file must contain either the serial number of the article or an owner applied number and _____________.

Explanation

To query the NCIC Article file, it is necessary to include either the serial number of the article or an owner applied number. In addition to this requirement, the query must also include the type of article being searched for. This means that the correct answer is "Type of article." Including the type of article in the query helps to narrow down the search and retrieve more accurate results from the NCIC Article file.

Submit
37. A query of the NCIC Article file can contain a brand name.

Explanation

The NCIC Article file is a database that contains information about stolen or missing articles. It is primarily used by law enforcement agencies to track and recover stolen property. Since the purpose of the database is to identify and locate specific items, it does not include information about brand names. Therefore, a query of the NCIC Article file cannot contain a brand name.

Submit
38. The foreign fugitive file, Convicted person on supervised release, convicted sex offender, immigration violations file, absconder category, NSEERS (National Security Entry Exit registration System), and __________________  are additional files that are checked in NCIC when running a wanted person inquiry.

Explanation

When running a wanted person inquiry in NCIC, in addition to the foreign fugitive file, convicted person on supervised release, convicted sex offender, immigration violations file, absconder category, and NSEERS, the Deported Felon file is also checked. This means that the NCIC system will search for any records or information related to individuals who have been deported due to committing felonies. These individuals may pose a potential risk or threat, and therefore their records are included in the wanted person inquiry.

Submit
39. Match the following terms.
Submit
40. Match the following:
Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 30, 2013
    Quiz Created by
    Wwiirations
Cancel
  • All
    All (40)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Officer safety concerns with use of mobile data terminal and vehicle...
How long is a temporary felon record in NCIC?
In Kentucky, the Kentucky State Police has the statewide...
The system automatically logs all transmissions from the MDT and...
A query of NCIC Gun file can result in records for stolen guns or what...
A positive response on a Kentucky driver's license will also...
A hit is a positive response to an inquiry transaction.
A wanted person query also searches which of the following files?
NCIC services are available to all criminal justice agencies in all...
What are the three types of offline searches available through NCIC?
All LINK transactions are logged electronically.  These logs...
A driver's history will be returned on a KY driver's license...
Who is the person primarily responsible for the security of...
A _________________ is defined as a postive response to an inquiry...
The Law Information Network of Kentucky maintains records on vehicle...
What data is needed to query a KY driver's license?
A potential hit becomes a valid hit once the inquiring agency has:
A query of the NCIC Boat file can be made using what information?
What agency is responsible for NCIC operations and maintenance?
In order to verify all the information contained in the response the...
All hit confirmation procedures for MDT operators will be handled...
A query of the NCIC Vehicle file can be made using what information?
Which one of these would NOT be addressed by the agency written policy...
How long is the message log maintained?
What information must be included in an inquiry of the article file?
Frequent INLETS transactions include interstate messages, out of state...
What data is needed to query an out of state driver's...
Statistics from recent years show a steady increase in the numbers and...
What agency is responsible for LINK operations and maintenance?
Usernames are assigned by the agency and passwords are chosen by...
A query of the NCIC Gun file must contain the serial number of the gun...
Areas of concern that written policies must address are passwords,...
An out of state driver's history query is not available on the...
An inquiry of the Wanted Person File may be made by name and one, more...
What is a type of offline search that allows the officer to search...
A query of the NCIC Article file must contain either the serial number...
A query of the NCIC Article file can contain a brand name.
The foreign fugitive file, Convicted person on supervised release,...
Match the following terms.
Match the following:
Alert!

Advertisement