Professional Documents
Culture Documents
QUESTIONS
1. The term ________is used to describe all of the 7. With a mail cover in place, the post office will:
procedures used in consulting the various sources of
information in the search for persons. a. open the subject’s mail if it looks suspicious.
b. open the subject’s mail if it is requested by the
a. intelligence c. interrogation investigator.
b. tracking d. surveillance c. not open the subject’s mail, but will record the return
address and postmarks.
2. Because detectives have ready access to personal d. forward the subject’s mail to the investigator.
interviews, they often have a tendency to rely on them
exclusively and neglect to: 8. A mail cover is usually placed on mail by the post
office for a period of about:
a. telephone or visit the home.
b. contact their confidential informants. a. one year. c. two to four weeks.
c. conduct a research type of investigation. b. two to four months. d. two to four days.
d. canvass the neighborhood.
9. In a criss-cross or reverse directory, telephone
3. An important preliminary step in searching for people subscribers are listed according to their:
is to obtain the information necessary to:
a. first name. c. business address.
a. interrogate them successfully. b. last name. d. street address.
b. establish a mail cover.
c. locate their associates. 10. By looking up the address of the missing person in a
d. identify them beyond question. criss-cross directory or database, the investigator can
quickly compile a list of the names, addresses, and
4. The first action the investigator should take in telephone numbers of all of his:
locating missing or wanted persons is to:
a. relatives. c. friends.
a. telephone their home. c. setup a mail cover. b. neighbors. d. family.
b. visit their home. d. contact their relatives.
11. A pen register is a device that is attached to the
5. When inquiring about missing or wanted persons at telephone line which records:
their homes, it is particularly important to obtain
information concerning their: a. the phone numbers dialed.
b. the phone numbers of the calls received.
a. health. c. habits. c. both the phone numbers dialed and those of the calls
b. state of mind. d. occupation. received.
d. the phone numbers of long distance calls received.
6. By requesting the post office to maintain a mail
cover, the investigator will be able to keep track of the 12. The Federal Bureau of Investigation maintains all of
subject’s: the following sources of information except the:
a. incoming mail. c. incoming and outgoing mail. a. National Crime Information Center.
b. outgoing mail. d. package deliveries. b. National Firearms Tracing Center.
c. Fingerprint and Criminal Identification Files.
d. Known Professional Check Passers File. 19. MO files are maintained for all of the following
reasons except:
13. The National Crime Information Center exchanges
information with ________law enforcement agencies. a. to associate a group of crimes with a single
perpetrator.
a. only federal c. only state b. to predict a possible next target for a criminal.
b. federal and state d. federal, state, and local c. to understand why the criminal commits his crime.
d. to recognize a perpetrator from characteristics of his
14. A ________ is the name given to a computerized file criminal activity.
of instantly available information which can be rapidly
transmitted. 20. The MO file is most effective in crimes involving
personal contact between the criminal and the victim.
a. computer memory c. storage and retrieval system Therefore, it should be least effective against:
b. data bank d. personnel record
a. robbery. c. confidence games.
15. High-speed data retrieval systems are seen as a b. burglary. d. forgery.
threat to an individual’s right to:
21. All of the following were significant elements in the
a. security. c. prosperity. MO file arrangement devised by Atcherly except the:
b. privacy. d. an education.
a. nature of the stolen property in crimes involving
16. All of the following proposals can help provide larceny.
safeguards for the privacy of the individual except: b. verbal description of the criminal.
c. fingerprint and blood evidence from the crime scene.
a. Each person should be given access to his personal d. personal mannerisms and speech characteristics.
file to check for accuracy.
b. Notice should be given to an individual for any 22. A description of the personality and behavioral traits
request for personal information from his file. of a perpetrator (derived from a study of the behavioral
c. Personal data systems whose very existence is secret traits of other criminals who have committed the same
should be maintained. offense and the details of the crime scene) is called:
d. Data collected for one purpose should not be made
available for other purposes. a. the modus operandi. c. the portrait parle’.
b. artificial intelligence. d. the criminal profile.
17. Computer technology can facilitate on-the-street
investigation by quickly delivering information so that 23. The details of the crimes that are considered in
the investigator has: criminal profiling are primarily those that express:
a. personal information about a suspect.
b. an understanding of a suspect’s motivation. a. the attitude of the victim.
c. a legal basis for the apprehension of a suspect. b. the greed of the perpetrator.
d. a list of possible criminal activities of a suspect. c. the lack of concern for the law.
d. the personality of the perpetrator.
18. A summary of the habits, techniques, and
peculiarities of behavior of a criminal is often referred
to as:
a. organized c. either organized or disorganized a. can decipher massive amounts of data and reveal
b. disorganized d. both organized and disorganized patterns and trends.
b. is rarely cost effective.
c. is less effective than MO analysis.
d. is evolving into the more advance science of
anthropometry. 43. Dead persons whose true identities are unknown
37. An offender or victim associate with an unusual and whose friends and relatives cannot be located are
amount of crime is called a: called:
(ha? Ha? Hakdogg XD hahahaha) 44. A patient suffering from Alzheimer’s disease who
requires police attention, does not know who he is or
38. Approximately ________ of homicide cases will where he lives, and has not been reported missing may
remain unsolved after the first year. be classified as:
39. The Missing Persons Unit is concerned with all of the 45. Suicides are ordinarily motivated by:
following classes of persons except:
a. financial difficulties. c. the desire for change.
a. missing persons eighteen years of age or under. b. boredom. d. a disappointment in love.
b. missing persons over eighteen years of age in full
possession of their faculties. 46. In solving disappearance cases, the investigator
c. unidentified persons. should primarily be concerned with:
d. unidentified dead.
a. discovering possible motives.
40. A person who is sought by the police in connection b. checking out alibis.
with a crime is: c. establishing a corpus delicti.
d. collecting physical evidence.
a. a convict. c. a wanted person.
b. a missing person. d. an unidentified person. 47. A common motive for simulating suicide is: