NLVPD Procedure CH 13 Flashcards
(136 cards)
New personal computers (PC) and software will be fiscally budgeted by ________.
Each Division
This indicates that each division is responsible for its own budgeting of PC and software expenses.
IT-related software, hardware, and the purchase of applications require approval from ________.
Both A and B
Approval is needed from both the Police Department IT Liaison and the CNLV IT Division.
The NLVPD will adhere to the pre-determined basic ________ standards provided by CNLV IT.
Software
Compliance with software standards is essential for maintaining operational consistency.
If a specific area needs distinctive hardware upgrades, the requesting Unit must submit them to the ________.
IT Liaison
The IT Liaison acts as the point of contact for hardware upgrade requests.
The requesting Unit is required to outline the needs and ________ from a particular software package.
Expected results
Clarifying expected results helps in evaluating the effectiveness of the software.
Uncommon or proprietary software requires research by the ________.
Requesting Unit
The requesting unit must conduct research to justify the need for uncommon software.
If a computer problem is encountered, it must be reported to the PD designee ________.
IT Liaison
Reporting issues to the IT Liaison ensures proper tracking and resolution.
Supervisors should maintain a record of the CMOS passwords and ________ passwords for computers in their area.
Screen Saver
Keeping track of screen saver passwords is crucial for security management.
The IT Liaison will perform a random review of all personal computers at least ________.
Annually
Regular reviews help ensure compliance and security of personal computers.
Field laptop passwords will be assigned by the ________.
Mobile Data Technician
The Mobile Data Technician is responsible for password management on field laptops.
Employees are not allowed to install passwords unless ________.
They are authorized by their supervisor
Authorization ensures controlled access and security measures are followed.
If computer problems occur after normal working hours, assistance can be obtained by calling ________.
415-7977
This number provides after-hours support for computer issues.
The Department IT Liaison is responsible for reviewing all personal computers to ensure compliance with policies, at least ________ annually.
Once
Annual reviews help maintain adherence to IT policies.
Computer-related problems must be documented in the ________ system with a priority assignment.
Request for Service (HEAT)
Proper documentation in the HEAT system is essential for tracking issues.
Supervisors will only know the passwords that access computers in their ________.
Work area
Limiting password knowledge helps enhance security within the department.
A ________ is a self-published diary or commentary on a particular topic that may allow visitors to post responses, reactions, or comments.
Blog
Blogs serve as platforms for personal expression and interaction.
A ________ is the specific portion of a social media website where content is displayed and managed by an individual or individuals with administrator rights.
Page
Pages are essential for organizing and sharing content on social media.
The act of publishing content on a social media site is known as a ________.
Post
Posting is the primary way users contribute content to social media.
________ is information that a user provides about himself or herself on a social networking site.
Profile
Profiles contain essential information about users on social networks.
________ refers to a category of Internet-based resources that integrate user-generated content and user participation, such as social networking sites, microblogging sites, and photo-sharing sites.
Social Media
Social media encompasses various platforms that promote user interaction.
________ are online platforms where users can create profiles, share information, and socialize with others using a range of technologies.
Social Networks
Social networks facilitate connections and interactions among users.
________ refers to the expression or communication of thoughts or opinions in spoken words, in writing, by expressive conduct, symbolism, photographs, videotape, or related forms of communication.
Speech
Speech encompasses various forms of communication beyond just spoken words.
The second generation of the World Wide Web, focused on shareable, user-generated content, is referred to as ________.
Web 2.0
Web 2.0 emphasizes user interaction and contribution.
A ________ is a web page(s) that can be edited collaboratively.
Wiki
Wikis allow multiple users to contribute and edit content collectively.