1e Exam Questions Ch.11 Homeland Security Tech Pitfalls - Homeland Security 1e | Test Bank Givens by Austen D. Givens. DOCX document preview.

1e Exam Questions Ch.11 Homeland Security Tech Pitfalls

Chapter 11: Test Bank

Multiple Choice

  1. The doubling of processing power coupled with declines in prices over time became known as .
    1. Rand’s Law
    2. Elbit Systems
    3. Moore’s Law
    4. Predictive Principle
  2. Which of the following things was NOT considered to be an innovation or technological failure?
    1. virtual fence
    2. chemical puffer machine
    3. automated commercial environment
    4. specially trained dogs
  3. Which technology did the TSA begin to phase out in 2008?
    1. Magnetometer
    2. Predictive analytics
    3. Puffer machines
    4. Radiometric scanners
  4. ______________ is a multi-year effort to protect civilian government agencies from cyber threats.
    1. Anduril
    2. DARPA
    3. EINSTEIN
    4. BolaWrap
  5. Which of the following emits an overpowering bad smell and can be used for crowd control?
    1. deodorant
    2. malodorant
    3. pepper spray
    4. tear gas
  6. Which of the following terms describes the capability of different government agencies to speak directly with one another over a common radio frequency?
    1. Automated Commercial Environment
    2. Interoperability
    3. Legacy Systems
    4. Operability

True/False

  1. Canines continue to be the most reliable and effective instruments available to detect the presence of explosives in numerous environments
    1. True
    2. False
  2. Advancing explosive detection technologies continues to be a low priority within the homeland security community.
    1. True
    2. False
  3. Although smart cities have the potential to help their citizens live more enjoyable lives, their use of Internet-connected devices introduces risks.
    1. True
    2. False
  4. The TSA operates its own multimillion dollar canine training facility.
    1. True
    2. False
  5. The implementation of puffer machines brought very low maintenance costs for use.
    1. True
    2. False
  6. Columbus, OH is considered to be a Smart City.
    1. True
    2. False

Short Answer

  1. Explain some of the technologies used to aid law enforcement.
    1. Body-worn cameras increasingly make it possible for law enforcement agencies to resolve disputes and hold their own officers, as well as members of the public, accountable. A second law enforcement technology that has risen in popularity is the automated license plate reader (LPS). Less-than-lethal weapons have the potential to stop or immobilize potentially dangerous individuals.
  2. Give an example of a prominent failure in homeland security technology.
    1. Student answers may vary, but may include the “Virtual Fence”, puffer machines, and/or the automated commercial environment (ACE).
  3. Explain what is meant by the phrase “smart city”.
    1. Smart cities are communities that use Internet of Things (IoT) devices and data analysis to make decisions that improve inhabitants’ lives. For example, a smart city might use artificial intelligence embedded in traffic cameras to assess peak travel times, then leverage this information to open high-occupancy vehicle lanes or adjust traffic light wait times. A smart city might decide to work with municipal water authorities to reduce water consumption based upon measurements of daytime demand.
  4. Describe the use of predictive analytics in homeland security enterprises.
    1. Unlike data analysis, which seeks to understand what was or what is, predictive analytics attempt to forecast the future. Past experience has shown that big data sets can potentially offer insights into future behavior. For example, scholarly analyses show that Twitter data could be used to anticipate major protests during the Arab Spring of 2011 and the Egyptian coup of 2013. In general, these studies find that the presence of certain key terms in social media posts that indicate coordination across a wide scale predict public protests the next day. But predictive analytics are not infallible. In 2008 technology giant Google launched a service it called Google Flu. The firm claimed that by sifting through search terms and overlaying these search terms with geographic data, it could forecast the movement of flu pandemics across the United States—data which would be of interest to public health authorities.
  5. Explain how facial recognition programs can be used in securing borders.
    1. Big data analyses can potentially be used to identify the faces of persons of interest who are crossing land borders. By scanning millions of faces in databases, it may be possible for homeland security agencies to identify and interdict dangerous persons who attempt to cross the border faster.

Short Essay

  1. How have advancements in technology impacted law enforcement?
  2. Explain what you perceive to be the biggest technology failure in the homeland security enterprise?

Document Information

Document Type:
DOCX
Chapter Number:
11
Created Date:
Aug 21, 2025
Chapter Name:
Chapter 11 Homeland Security Tech Pitfalls
Author:
Austen D. Givens

Connected Book

Homeland Security 1e | Test Bank Givens

By Austen D. Givens

Test Bank General
View Product →

$24.99

100% satisfaction guarantee

Buy Full Test Bank

Benefits

Immediately available after payment
Answers are available after payment
ZIP file includes all related files
Files are in Word format (DOCX)
Check the description to see the contents of each ZIP file
We do not share your information with any third party