RCDD Chapter 18 Electronic Safety and Security (Non-core Areas)

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Letad1
L
Letad1
Community Contributor
Quizzes Created: 13 | Total Attempts: 6,927
| Attempts: 260 | Questions: 19 | Updated: Mar 21, 2025
Please wait...
Question 1 / 20
🏆 Rank #--
Score 0/100

1. The host computer receives all the event and alarm transactions from the control panels.

Explanation

The statement is true because the host computer is responsible for receiving all the event and alarm transactions from the control panels. This means that any events or alarms triggered by the control panels will be transmitted to the host computer for monitoring and further action.

Submit
Please wait...
About This Quiz
Security Certifications Quizzes & Trivia

This quiz focuses on Chapter 18 of the RCDD certification, covering Electronic Safety and Security. It tests knowledge on remote control panels, CPTED spaces, CCTV applications, and frame rates. Essential for professionals in IT security systems.

2.

What first name or nickname would you like us to use?

You may optionally provide this to label your report, leaderboard, or certificate.

2. CCTV is the extension of human vision to areas requiring surveillance.

Explanation

The statement suggests that CCTV (Closed-Circuit Television) serves as an extension of human vision by providing surveillance in areas that require monitoring. This implies that CCTV systems are designed to enhance human vision and enable surveillance in places where direct human presence may not be possible or practical. Therefore, the answer "True" is correct as it aligns with the given explanation.

Submit

3. Risk = (Threat x Vulnerability)/ Countermeasures.  What is this formula referred as?

Explanation

The given formula, Risk = (Threat x Vulnerability)/ Countermeasures, is referred to as the Risk formula. This formula is used to calculate the level of risk by multiplying the threat and vulnerability and then dividing it by the countermeasures in place. It helps in assessing and quantifying the potential risks associated with a particular situation or system.

Submit

4. Evolution of electronic access control (EAC) system structure the host computer runs what?

Explanation

The correct answer is "All the above". In the evolution of electronic access control (EAC) system structure, the host computer is responsible for running proprietary EAC software, managing the system parameters, maintaining the system database, and controlling all the communication with the control panels.

Submit

5. Remote control panels are often instlled when the single power supply within the central control panel is not sufficient to service all of the FA devices in the system.

Explanation

Remote control panels are installed when the single power supply within the central control panel is not sufficient to service all of the FA devices in the system. This means that there is a need for additional power supply sources to ensure that all the devices in the system can be properly serviced. Therefore, the statement is true.

Submit

6. What are the two main types of cable used for transmitting video signals?

Explanation

The two main types of cable used for transmitting video signals are unbalanced (coaxial) and balanced (twisted-pair). Unbalanced cables, such as coaxial cables, use a single conductor surrounded by a shield to carry the signal. They are commonly used for shorter distances and can transmit both analog and digital video signals. On the other hand, balanced cables, like twisted-pair cables, use two conductors twisted together to carry the signal. They are more resistant to interference and are commonly used for longer distances, especially in professional audio and video applications.

Submit

7. Electronic safety secruity systems can be identified as performing the following primary functions:

Explanation

The correct answer is a list of primary functions performed by electronic safety security systems. These functions include access control, surveillance, intrusion detection, and fire alarm and detection. Access control refers to the ability to restrict or grant access to certain areas or resources. Surveillance involves monitoring and recording activities within a given space. Intrusion detection involves alerting or preventing unauthorized entry or activity. Fire alarm and detection systems detect and alert occupants of a fire or smoke presence.

Submit

8. The Frame rate is based on the U.S. power standard of  ______ hertz?

Explanation

The frame rate is based on the U.S. power standard of 60 Hz. This means that the screen refreshes 60 times per second, resulting in smoother motion and a more immersive viewing experience. The higher the frame rate, the smoother the motion appears to the human eye.

Submit

9. What does ESS stand for?

Explanation

The correct answer is "Electronic safety and security." This is because ESS stands for Electronic Safety and Security, which refers to the use of electronic systems and technology to ensure the safety and security of individuals, properties, and information. It encompasses various aspects such as surveillance systems, access control, alarm systems, and fire safety systems, among others.

Submit

10. What is the normal frame rate for an analog camera?

Explanation

An analog camera typically records video at a frame rate of 30 frames per second. This frame rate is considered the standard for analog cameras as it provides smooth and fluid motion in the recorded video. Higher frame rates, such as 60 frames per second, are commonly used in digital cameras and provide even smoother motion, but analog cameras generally operate at 30 frames per second.

Submit

11. Direct hold and Shear locks are what type of locks?

Explanation

Direct hold and shear locks are types of magnetic locks. These locks use an electromagnetic force to secure doors, making them highly secure and commonly used in commercial and high-security settings. They are often installed on glass doors or doors with metal frames, and they provide a strong holding force to prevent unauthorized entry.

Submit

12. What are some of the primary applications of CCTV?

Explanation

CCTV, or closed-circuit television, is widely used for various purposes. One primary application is investigation, as CCTV footage can be reviewed to gather evidence or identify suspects in criminal cases. Prosecution is another application, as the recorded footage can be presented as evidence in court. CCTV also serves as a deterrent, as the presence of cameras can discourage potential criminals. Additionally, it is used for observation purposes, such as monitoring public areas or traffic. Lastly, CCTV is utilized for intrusion detection, allowing for the immediate identification of unauthorized access or suspicious activities.

Submit

13. The components of a fire consist of:

Explanation

The components of a fire consist of smoke, heat, and light radiation. Smoke is produced when materials burn and release particles into the air. Heat is generated through the combustion process, providing the energy necessary for a fire to sustain itself. Light radiation is emitted as a result of the high temperatures reached during a fire. However, the match and lighter mentioned in the question are not components of a fire, but rather tools used to initiate the combustion process.

Submit

14. What are the primary roles involved in the design and installation of an ESS system?

Explanation

The primary roles involved in the design and installation of an ESS system are the consultant/practitioner, ESS designer, installer, and integrator. The consultant/practitioner provides expert advice and guidance on the overall system design and implementation. The ESS designer is responsible for creating the detailed design plans and specifications for the system. The installer is in charge of physically installing and connecting all the components of the system. The integrator ensures that all the different components of the system work together seamlessly and are properly integrated.

Submit

15. Due to the smaller strand core and the ability to carry higher bandwidth, singlemode fiber has geater advantages over multimode fiber.  What are those advantages?

Explanation

The advantages of singlemode fiber over multimode fiber include the ability to purchase outside-plant type and in-door-rated outer sheaths, as well as the availability of different inner compositions such as metallic armored, general-purpose metallic, and all-nondielectric. Additionally, singlemode fiber has a smaller strand core size of 9/125 um, which allows it to carry higher bandwidth compared to the larger core sizes of multimode fiber (50/125 and 62.5/125 um).

Submit

16. The distance that a CCTV signal may be run is determined by the:

Explanation

The distance that a CCTV signal may be run is determined by the signal strength at the source (e.g., camera), the required signal strength at the receiving end (e.g., monitor), and the signal loss over the distance of the cable run. These factors play a crucial role in determining the quality and reliability of the CCTV signal transmission. The stronger the signal at the source and the higher the required signal strength at the receiving end, the shorter the distance the signal can be transmitted effectively. Additionally, the signal loss over the distance of the cable run also affects the maximum distance the CCTV signal can be transmitted without significant degradation.

Submit

17. Crime Prevention through Environmental Design (CPTED) spaces are typically defined as:

Explanation

Crime Prevention through Environmental Design (CPTED) spaces are categorized into four types: public, semi-public, semi-private, and private. Public spaces are accessible to everyone and are often open and highly visible, such as parks or plazas. Semi-public spaces have limited access and are usually associated with specific organizations or groups, like office buildings or schools. Semi-private spaces have controlled access and are typically associated with residential areas, like apartment complexes or gated communities. Private spaces have restricted access and are exclusively for the use of individuals or specific groups, like private homes or offices.

Submit

18. Can you idendify the basic lock types?

Explanation

The basic lock types include bored locks, rim locks, mortise locks, and vertical rod locks. Bored locks are installed within the door, while rim locks are mounted on the surface of the door. Mortise locks are recessed into the door, providing a higher level of security. Vertical rod locks have rods that extend vertically from the lock into the door frame, providing additional stability. Twist locks are not mentioned in the question and therefore are not considered as one of the basic lock types.

Submit

19. Magnetic locks are available in a range of holding forces.  What are the common holding forces?

Explanation

Magnetic locks are available in a range of holding forces, including 700 lbs, 1200 lbs, and 1650 lbs. These holding forces refer to the amount of weight that the magnetic lock can securely hold. Different applications may require different holding forces depending on the size and weight of the door or gate that needs to be secured.

Submit
×
Saved
Thank you for your feedback!
View My Results
Cancel
  • All
    All (19)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
The host computer receives all the event and alarm transactions from...
CCTV is the extension of human vision to areas requiring surveillance.
Risk = (Threat x Vulnerability)/ Countermeasures.  What...
Evolution of electronic access control (EAC) system structure the host...
Remote control panels are often instlled when the single power supply...
What are the two main types of cable used for transmitting video...
Electronic safety secruity systems can be identified as performing the...
The Frame rate is based on the U.S. power standard of  ______...
What does ESS stand for?
What is the normal frame rate for an analog camera?
Direct hold and Shear locks are what type of locks?
What are some of the primary applications of CCTV?
The components of a fire consist of:
What are the primary roles involved in the design and...
Due to the smaller strand core and the ability to carry higher...
The distance that a CCTV signal may be run is determined by the:
Crime Prevention through Environmental Design (CPTED) spaces are...
Can you idendify the basic lock types?
Magnetic locks are available in a range of holding forces.  What...
play-Mute sad happy unanswered_answer up-hover down-hover success oval cancel Check box square blue
Alert!