1.
Remote control panels are often instlled when the single power supply within the central control panel is not sufficient to service all of the FA devices in the system.
Correct Answer
A. True
Explanation
Remote control panels are installed when the single power supply within the central control panel is not sufficient to service all of the FA devices in the system. This means that there is a need for additional power supply sources to ensure that all the devices in the system can be properly serviced. Therefore, the statement is true.
2.
Crime Prevention through Environmental Design (CPTED) spaces are typically defined as:
Correct Answer(s)
A. Public
B. Semi-public
C. Semi-private
D. Private
Explanation
Crime Prevention through Environmental Design (CPTED) spaces are categorized into four types: public, semi-public, semi-private, and private. Public spaces are accessible to everyone and are often open and highly visible, such as parks or plazas. Semi-public spaces have limited access and are usually associated with specific organizations or groups, like office buildings or schools. Semi-private spaces have controlled access and are typically associated with residential areas, like apartment complexes or gated communities. Private spaces have restricted access and are exclusively for the use of individuals or specific groups, like private homes or offices.
3.
The Frame rate is based on the U.S. power standard of ______ hertz?
Correct Answer
C. 60 Hz
Explanation
The frame rate is based on the U.S. power standard of 60 Hz. This means that the screen refreshes 60 times per second, resulting in smoother motion and a more immersive viewing experience. The higher the frame rate, the smoother the motion appears to the human eye.
4.
What is the normal frame rate for an analog camera?
Correct Answer
B. 30 frames per second
Explanation
An analog camera typically records video at a frame rate of 30 frames per second. This frame rate is considered the standard for analog cameras as it provides smooth and fluid motion in the recorded video. Higher frame rates, such as 60 frames per second, are commonly used in digital cameras and provide even smoother motion, but analog cameras generally operate at 30 frames per second.
5.
What are some of the primary applications of CCTV?
Correct Answer(s)
A. Investigation
B. Prosecution
C. Deterrence
D. Observaion
E. Intrusion detection
Explanation
CCTV, or closed-circuit television, is widely used for various purposes. One primary application is investigation, as CCTV footage can be reviewed to gather evidence or identify suspects in criminal cases. Prosecution is another application, as the recorded footage can be presented as evidence in court. CCTV also serves as a deterrent, as the presence of cameras can discourage potential criminals. Additionally, it is used for observation purposes, such as monitoring public areas or traffic. Lastly, CCTV is utilized for intrusion detection, allowing for the immediate identification of unauthorized access or suspicious activities.
6.
CCTV is the extension of human vision to areas requiring surveillance.
Correct Answer
A. True
Explanation
The statement suggests that CCTV (Closed-Circuit Television) serves as an extension of human vision by providing surveillance in areas that require monitoring. This implies that CCTV systems are designed to enhance human vision and enable surveillance in places where direct human presence may not be possible or practical. Therefore, the answer "True" is correct as it aligns with the given explanation.
7.
Evolution of electronic access control (EAC) system structure the host computer runs what?
Correct Answer
E. All the above
Explanation
The correct answer is "All the above". In the evolution of electronic access control (EAC) system structure, the host computer is responsible for running proprietary EAC software, managing the system parameters, maintaining the system database, and controlling all the communication with the control panels.
8.
Risk = (Threat x Vulnerability)/ Countermeasures. What is this formula referred as?
Correct Answer
A. Risk formula
Explanation
The given formula, Risk = (Threat x Vulnerability)/ Countermeasures, is referred to as the Risk formula. This formula is used to calculate the level of risk by multiplying the threat and vulnerability and then dividing it by the countermeasures in place. It helps in assessing and quantifying the potential risks associated with a particular situation or system.
9.
What are the primary roles involved in the design and installation of an ESS system?
Correct Answer(s)
A. Consultant/practitioner
B. ESS designer
C. Installer
D. Integrator
Explanation
The primary roles involved in the design and installation of an ESS system are the consultant/practitioner, ESS designer, installer, and integrator. The consultant/practitioner provides expert advice and guidance on the overall system design and implementation. The ESS designer is responsible for creating the detailed design plans and specifications for the system. The installer is in charge of physically installing and connecting all the components of the system. The integrator ensures that all the different components of the system work together seamlessly and are properly integrated.
10.
The components of a fire consist of:
Correct Answer(s)
A. Smoke
B. Heat
C. Light radiation
Explanation
The components of a fire consist of smoke, heat, and light radiation. Smoke is produced when materials burn and release particles into the air. Heat is generated through the combustion process, providing the energy necessary for a fire to sustain itself. Light radiation is emitted as a result of the high temperatures reached during a fire. However, the match and lighter mentioned in the question are not components of a fire, but rather tools used to initiate the combustion process.
11.
Due to the smaller strand core and the ability to carry higher bandwidth, singlemode fiber has geater advantages over multimode fiber. What are those advantages?
Correct Answer(s)
A. Outside-plant type and in-door-rated outer sheaths may be purchased. The inner composition of the cables includes metallic armored, general-purpose metallic, and all-nondielectric.
C. Multimode fiber cable strand inner core sizes are available in 50/125 and 62.5/125 micron (um). The singlemode cable strand core sizes is 9/125 um
Explanation
The advantages of singlemode fiber over multimode fiber include the ability to purchase outside-plant type and in-door-rated outer sheaths, as well as the availability of different inner compositions such as metallic armored, general-purpose metallic, and all-nondielectric. Additionally, singlemode fiber has a smaller strand core size of 9/125 um, which allows it to carry higher bandwidth compared to the larger core sizes of multimode fiber (50/125 and 62.5/125 um).
12.
What are the two main types of cable used for transmitting video signals?
Correct Answer(s)
A. Unbalanced (Coaxial)
C. Balanced (twisted-pair)
Explanation
The two main types of cable used for transmitting video signals are unbalanced (coaxial) and balanced (twisted-pair). Unbalanced cables, such as coaxial cables, use a single conductor surrounded by a shield to carry the signal. They are commonly used for shorter distances and can transmit both analog and digital video signals. On the other hand, balanced cables, like twisted-pair cables, use two conductors twisted together to carry the signal. They are more resistant to interference and are commonly used for longer distances, especially in professional audio and video applications.
13.
The distance that a CCTV signal may be run is determined by the:
Correct Answer(s)
A. Signal strengty at the source (e.g., camera)
B. Required signal strengty at the receiving end (e.g., monitor)
C. Signal loss over the distance of the cable run
Explanation
The distance that a CCTV signal may be run is determined by the signal strength at the source (e.g., camera), the required signal strength at the receiving end (e.g., monitor), and the signal loss over the distance of the cable run. These factors play a crucial role in determining the quality and reliability of the CCTV signal transmission. The stronger the signal at the source and the higher the required signal strength at the receiving end, the shorter the distance the signal can be transmitted effectively. Additionally, the signal loss over the distance of the cable run also affects the maximum distance the CCTV signal can be transmitted without significant degradation.
14.
Direct hold and Shear locks are what type of locks?
Correct Answer
C. Megnetic locks
Explanation
Direct hold and shear locks are types of magnetic locks. These locks use an electromagnetic force to secure doors, making them highly secure and commonly used in commercial and high-security settings. They are often installed on glass doors or doors with metal frames, and they provide a strong holding force to prevent unauthorized entry.
15.
Can you idendify the basic lock types?
Correct Answer(s)
A. Bored Locks
B. Rim Locks
C. Mortise Locks
D. Vertical rod locks
Explanation
The basic lock types include bored locks, rim locks, mortise locks, and vertical rod locks. Bored locks are installed within the door, while rim locks are mounted on the surface of the door. Mortise locks are recessed into the door, providing a higher level of security. Vertical rod locks have rods that extend vertically from the lock into the door frame, providing additional stability. Twist locks are not mentioned in the question and therefore are not considered as one of the basic lock types.
16.
The host computer receives all the event and alarm transactions from the control panels.
Correct Answer
A. True
Explanation
The statement is true because the host computer is responsible for receiving all the event and alarm transactions from the control panels. This means that any events or alarms triggered by the control panels will be transmitted to the host computer for monitoring and further action.
17.
Electronic safety secruity systems can be identified as performing the following primary functions:
Correct Answer(s)
A. Access contorl
B. Surveillance
C. Intrusion detection
D. Fire Alarm (FA) and detection
Explanation
The correct answer is a list of primary functions performed by electronic safety security systems. These functions include access control, surveillance, intrusion detection, and fire alarm and detection. Access control refers to the ability to restrict or grant access to certain areas or resources. Surveillance involves monitoring and recording activities within a given space. Intrusion detection involves alerting or preventing unauthorized entry or activity. Fire alarm and detection systems detect and alert occupants of a fire or smoke presence.
18.
Magnetic locks are available in a range of holding forces. What are the common holding forces?
Correct Answer(s)
A. 700 lbs
C. 1200 lbs
D. 1650 lbs
Explanation
Magnetic locks are available in a range of holding forces, including 700 lbs, 1200 lbs, and 1650 lbs. These holding forces refer to the amount of weight that the magnetic lock can securely hold. Different applications may require different holding forces depending on the size and weight of the door or gate that needs to be secured.
19.
What does ESS stand for?
Correct Answer
B. Electronic safety and security
Explanation
The correct answer is "Electronic safety and security." This is because ESS stands for Electronic Safety and Security, which refers to the use of electronic systems and technology to ensure the safety and security of individuals, properties, and information. It encompasses various aspects such as surveillance systems, access control, alarm systems, and fire safety systems, among others.