



Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
TIES Certification Study Guide 2025-2026. Questions & Correct Verified Answers. Graded A
Typology: Study Guides, Projects, Research
1 / 7
This page cannot be seen from the preview
Don't miss anything!
A _______ message must be transmitted when an agency other than the originating agency of the record finds the missing person. - ANSLocate A record should be ______ when it's determined to be invalid. - ANScancelled All III QH and QR transactions must include the ______ for which the criminal history record is used. Additionally, all users are required to provide the _____ for all II transactions. - ANSPurpose code, reason An agency is required to verify and update NCIC Missing Person record entries...... within ___ ______ - ANS6 months An article record containing a TYP Field code beginning with "____" or "___", or "_____" will be retained in the NCIC Article File indefinitely. - ANSQ. T, or 2 An unidentified person record may be entered using one of the following categories: _______, _____, ______. - ANSdeceased, living, catastrophe Approved disposal methods are: - ANSShredding and burning
Are stolen or lost credit cards, bank drafts, and checks to be entered in the NCIC Article File? - ANSNo Computerized criminal history arrests contained in all state repositories and the FBI Interstate Identification (III) are based on ______ _______. - ANSFingerprint submission Criminal history logs must be maintained in a secure file for a minimum of ____ ______ from the date of the transaction. - ANS1 year Criminal Justice Information (CJI) - ANSterm used to refer to all of the FBI CJIS provided data necessary for L.E and civil agencies to perform their missions For state or local law enforcement officers to fly armed the employing agency must send an AM to the: - ANSFederal Air Marshal Service In addition to the identity theft victims profile information, a ______ is established and entered into the Identity Theft File. The victim should select a ____ that he/she can readily recall. - ANSpassword, password Information derived via the TIES can only be provided outside the terminal agency if a valid ____ _____ - ANSUser agreement Inquires on TN "specialized" license plates may provide multiple responses. The ____ ____ returned in each response identifies the type of license. - ANSClass code
Pursuant to the Adam Walsh Child Protection and Safety Act..... one of the appropriate categories within ______ _______ of receipt of the minimum data. - ANS2 hours Secondary Dissemination - ANSis the re-dissesmination of CJI from an authorized agency Tennessee driver license file information is created, maintained, and managed by the Tennessee ______ of _______. - ANSDepartment of Safety Tennessee vehicle registration is maintained by the _____ _____ of _______. - ANSTN Department of Revenue The _____ message key performs a check of NCIC person files (QWA). - ANSQWI The ______ _____ ______ _____ was created to hep locate missing individuals who have wandered away due to dementia or physical impairment. - ANSMissing Citizens Alert Program The ______ ______ File contains information on persons wanted in connection with offenses committed outside of the U.S. - ANSForeign Fugitive
The ______ _______ _______ _______ File includes records for individuals who have been convicted of a sex-related crime against a minor. - ANSNational Sex Offender Registry The CJIS Security Policy requires that the CJIS System Officer ensures that _____ ____ _____ is provided at least once every 2 years to all personnel. - ANSSecurity Awareness Training The Gang File is comprised of two components or "capabilities". The _____ _____ _______ (GRC). The _____ ______ ______ (GMC). - ANSGroup Reference Capability, Group Member Capability The Identification Query will be used to request ID information, these messages may be sent to up to ____ 2-character state codes. - ANS The protection order must be entered _____ _____ , regardless of whether the order has been served, this includes expert orders. - ANSupon receipt The purpose of a ______ message is to add, delete, or change a portion of data. - ANSModify The purpose of the ____ ____ ____ transaction is to identify persons and/or vehicles involved in the illicit transportation of smuggling of bulk currency or monetary instruments. - ANSBulk Cash Smuggling
When entering or querying a boat registered in TN, always enter "____" as the first characters of the RQ. - ANSTN