RCDD Chapter 18 Electronic Safety And Security (Non-core Areas)

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Letad1
L
Letad1
Community Contributor
Quizzes Created: 13 | Total Attempts: 5,886
Questions: 19 | Attempts: 245

SettingsSettingsSettings
RCDD Quizzes & Trivia

Registered Communications Distribution Designer (RCDD)


Questions and Answers
  • 1. 

    Remote control panels are often instlled when the single power supply within the central control panel is not sufficient to service all of the FA devices in the system.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Remote control panels are installed when the single power supply within the central control panel is not sufficient to service all of the FA devices in the system. This means that there is a need for additional power supply sources to ensure that all the devices in the system can be properly serviced. Therefore, the statement is true.

    Rate this question:

  • 2. 

    Crime Prevention through Environmental Design (CPTED) spaces are typically defined as:

    • A.

      Public

    • B.

      Semi-public

    • C.

      Semi-private

    • D.

      Private

    Correct Answer(s)
    A. Public
    B. Semi-public
    C. Semi-private
    D. Private
    Explanation
    Crime Prevention through Environmental Design (CPTED) spaces are categorized into four types: public, semi-public, semi-private, and private. Public spaces are accessible to everyone and are often open and highly visible, such as parks or plazas. Semi-public spaces have limited access and are usually associated with specific organizations or groups, like office buildings or schools. Semi-private spaces have controlled access and are typically associated with residential areas, like apartment complexes or gated communities. Private spaces have restricted access and are exclusively for the use of individuals or specific groups, like private homes or offices.

    Rate this question:

  • 3. 

    The Frame rate is based on the U.S. power standard of  ______ hertz?

    • A.

      30 Hz

    • B.

      40 Hz

    • C.

      60 Hz

    • D.

      50 Hz

    Correct Answer
    C. 60 Hz
    Explanation
    The frame rate is based on the U.S. power standard of 60 Hz. This means that the screen refreshes 60 times per second, resulting in smoother motion and a more immersive viewing experience. The higher the frame rate, the smoother the motion appears to the human eye.

    Rate this question:

  • 4. 

    What is the normal frame rate for an analog camera?

    • A.

      20 frames per second

    • B.

      30 frames per second

    • C.

      40 frames per second

    • D.

      60 frames per second

    Correct Answer
    B. 30 frames per second
    Explanation
    An analog camera typically records video at a frame rate of 30 frames per second. This frame rate is considered the standard for analog cameras as it provides smooth and fluid motion in the recorded video. Higher frame rates, such as 60 frames per second, are commonly used in digital cameras and provide even smoother motion, but analog cameras generally operate at 30 frames per second.

    Rate this question:

  • 5. 

    What are some of the primary applications of CCTV?

    • A.

      Investigation

    • B.

      Prosecution

    • C.

      Deterrence

    • D.

      Observaion

    • E.

      Intrusion detection

    Correct Answer(s)
    A. Investigation
    B. Prosecution
    C. Deterrence
    D. Observaion
    E. Intrusion detection
    Explanation
    CCTV, or closed-circuit television, is widely used for various purposes. One primary application is investigation, as CCTV footage can be reviewed to gather evidence or identify suspects in criminal cases. Prosecution is another application, as the recorded footage can be presented as evidence in court. CCTV also serves as a deterrent, as the presence of cameras can discourage potential criminals. Additionally, it is used for observation purposes, such as monitoring public areas or traffic. Lastly, CCTV is utilized for intrusion detection, allowing for the immediate identification of unauthorized access or suspicious activities.

    Rate this question:

  • 6. 

    CCTV is the extension of human vision to areas requiring surveillance.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The statement suggests that CCTV (Closed-Circuit Television) serves as an extension of human vision by providing surveillance in areas that require monitoring. This implies that CCTV systems are designed to enhance human vision and enable surveillance in places where direct human presence may not be possible or practical. Therefore, the answer "True" is correct as it aligns with the given explanation.

    Rate this question:

  • 7. 

    Evolution of electronic access control (EAC) system structure the host computer runs what?

    • A.

      Proprietary EAC software

    • B.

      Manages the system parameters

    • C.

      Maintains the system database

    • D.

      Controls all the communication with the control panels

    • E.

      All the above

    Correct Answer
    E. All the above
    Explanation
    The correct answer is "All the above". In the evolution of electronic access control (EAC) system structure, the host computer is responsible for running proprietary EAC software, managing the system parameters, maintaining the system database, and controlling all the communication with the control panels.

    Rate this question:

  • 8. 

    Risk = (Threat x Vulnerability)/ Countermeasures.  What is this formula referred as?

    • A.

      Risk formula

    • B.

      Problem formula

    • C.

      Cost formula

    Correct Answer
    A. Risk formula
    Explanation
    The given formula, Risk = (Threat x Vulnerability)/ Countermeasures, is referred to as the Risk formula. This formula is used to calculate the level of risk by multiplying the threat and vulnerability and then dividing it by the countermeasures in place. It helps in assessing and quantifying the potential risks associated with a particular situation or system.

    Rate this question:

  • 9. 

    What are the primary roles involved in the design and installation of an ESS system?

    • A.

      Consultant/practitioner

    • B.

      ESS designer

    • C.

      Installer

    • D.

      Integrator

    Correct Answer(s)
    A. Consultant/practitioner
    B. ESS designer
    C. Installer
    D. Integrator
    Explanation
    The primary roles involved in the design and installation of an ESS system are the consultant/practitioner, ESS designer, installer, and integrator. The consultant/practitioner provides expert advice and guidance on the overall system design and implementation. The ESS designer is responsible for creating the detailed design plans and specifications for the system. The installer is in charge of physically installing and connecting all the components of the system. The integrator ensures that all the different components of the system work together seamlessly and are properly integrated.

    Rate this question:

  • 10. 

    The components of a fire consist of:

    • A.

      Smoke

    • B.

      Heat

    • C.

      Light radiation

    • D.

      Match

    • E.

      Lighter

    Correct Answer(s)
    A. Smoke
    B. Heat
    C. Light radiation
    Explanation
    The components of a fire consist of smoke, heat, and light radiation. Smoke is produced when materials burn and release particles into the air. Heat is generated through the combustion process, providing the energy necessary for a fire to sustain itself. Light radiation is emitted as a result of the high temperatures reached during a fire. However, the match and lighter mentioned in the question are not components of a fire, but rather tools used to initiate the combustion process.

    Rate this question:

  • 11. 

    Due to the smaller strand core and the ability to carry higher bandwidth, singlemode fiber has geater advantages over multimode fiber.  What are those advantages?

    • A.

      Outside-plant type and in-door-rated outer sheaths may be purchased. The inner composition of the cables includes metallic armored, general-purpose metallic, and all-nondielectric.

    • B.

      Multimode is harder to install

    • C.

      Multimode fiber cable strand inner core sizes are available in 50/125 and 62.5/125 micron (um). The singlemode cable strand core sizes is 9/125 um

    Correct Answer(s)
    A. Outside-plant type and in-door-rated outer sheaths may be purchased. The inner composition of the cables includes metallic armored, general-purpose metallic, and all-nondielectric.
    C. Multimode fiber cable strand inner core sizes are available in 50/125 and 62.5/125 micron (um). The singlemode cable strand core sizes is 9/125 um
    Explanation
    The advantages of singlemode fiber over multimode fiber include the ability to purchase outside-plant type and in-door-rated outer sheaths, as well as the availability of different inner compositions such as metallic armored, general-purpose metallic, and all-nondielectric. Additionally, singlemode fiber has a smaller strand core size of 9/125 um, which allows it to carry higher bandwidth compared to the larger core sizes of multimode fiber (50/125 and 62.5/125 um).

    Rate this question:

  • 12. 

    What are the two main types of cable used for transmitting video signals?

    • A.

      Unbalanced (Coaxial)

    • B.

      Singlemode

    • C.

      Balanced (twisted-pair)

    • D.

      Multimode

    Correct Answer(s)
    A. Unbalanced (Coaxial)
    C. Balanced (twisted-pair)
    Explanation
    The two main types of cable used for transmitting video signals are unbalanced (coaxial) and balanced (twisted-pair). Unbalanced cables, such as coaxial cables, use a single conductor surrounded by a shield to carry the signal. They are commonly used for shorter distances and can transmit both analog and digital video signals. On the other hand, balanced cables, like twisted-pair cables, use two conductors twisted together to carry the signal. They are more resistant to interference and are commonly used for longer distances, especially in professional audio and video applications.

    Rate this question:

  • 13. 

    The distance that a CCTV signal may be run is determined by the:

    • A.

      Signal strengty at the source (e.g., camera)

    • B.

      Required signal strengty at the receiving end (e.g., monitor)

    • C.

      Signal loss over the distance of the cable run

    • D.

      Location

    • E.

      Cost

    Correct Answer(s)
    A. Signal strengty at the source (e.g., camera)
    B. Required signal strengty at the receiving end (e.g., monitor)
    C. Signal loss over the distance of the cable run
    Explanation
    The distance that a CCTV signal may be run is determined by the signal strength at the source (e.g., camera), the required signal strength at the receiving end (e.g., monitor), and the signal loss over the distance of the cable run. These factors play a crucial role in determining the quality and reliability of the CCTV signal transmission. The stronger the signal at the source and the higher the required signal strength at the receiving end, the shorter the distance the signal can be transmitted effectively. Additionally, the signal loss over the distance of the cable run also affects the maximum distance the CCTV signal can be transmitted without significant degradation.

    Rate this question:

  • 14. 

    Direct hold and Shear locks are what type of locks?

    • A.

      Bored locks

    • B.

      Rim locks

    • C.

      Megnetic locks

    • D.

      Vertical rod locks

    Correct Answer
    C. Megnetic locks
    Explanation
    Direct hold and shear locks are types of magnetic locks. These locks use an electromagnetic force to secure doors, making them highly secure and commonly used in commercial and high-security settings. They are often installed on glass doors or doors with metal frames, and they provide a strong holding force to prevent unauthorized entry.

    Rate this question:

  • 15. 

    Can you idendify the basic lock types?

    • A.

      Bored Locks

    • B.

      Rim Locks

    • C.

      Mortise Locks

    • D.

      Vertical rod locks

    • E.

      Twist locks

    Correct Answer(s)
    A. Bored Locks
    B. Rim Locks
    C. Mortise Locks
    D. Vertical rod locks
    Explanation
    The basic lock types include bored locks, rim locks, mortise locks, and vertical rod locks. Bored locks are installed within the door, while rim locks are mounted on the surface of the door. Mortise locks are recessed into the door, providing a higher level of security. Vertical rod locks have rods that extend vertically from the lock into the door frame, providing additional stability. Twist locks are not mentioned in the question and therefore are not considered as one of the basic lock types.

    Rate this question:

  • 16. 

    The host computer receives all the event and alarm transactions from the control panels.

    • A.

      True

    • B.

      Fals

    Correct Answer
    A. True
    Explanation
    The statement is true because the host computer is responsible for receiving all the event and alarm transactions from the control panels. This means that any events or alarms triggered by the control panels will be transmitted to the host computer for monitoring and further action.

    Rate this question:

  • 17. 

    Electronic safety secruity systems can be identified as performing the following primary functions:

    • A.

      Access contorl

    • B.

      Surveillance

    • C.

      Intrusion detection

    • D.

      Fire Alarm (FA) and detection

    Correct Answer(s)
    A. Access contorl
    B. Surveillance
    C. Intrusion detection
    D. Fire Alarm (FA) and detection
    Explanation
    The correct answer is a list of primary functions performed by electronic safety security systems. These functions include access control, surveillance, intrusion detection, and fire alarm and detection. Access control refers to the ability to restrict or grant access to certain areas or resources. Surveillance involves monitoring and recording activities within a given space. Intrusion detection involves alerting or preventing unauthorized entry or activity. Fire alarm and detection systems detect and alert occupants of a fire or smoke presence.

    Rate this question:

  • 18. 

    Magnetic locks are available in a range of holding forces.  What are the common holding forces?

    • A.

      700 lbs

    • B.

      800 lbs

    • C.

      1200 lbs

    • D.

      1650 lbs

    • E.

      2121 lbs

    Correct Answer(s)
    A. 700 lbs
    C. 1200 lbs
    D. 1650 lbs
    Explanation
    Magnetic locks are available in a range of holding forces, including 700 lbs, 1200 lbs, and 1650 lbs. These holding forces refer to the amount of weight that the magnetic lock can securely hold. Different applications may require different holding forces depending on the size and weight of the door or gate that needs to be secured.

    Rate this question:

  • 19. 

    What does ESS stand for?

    • A.

      Electronic security and safety

    • B.

      Electronic safety and security

    Correct Answer
    B. Electronic safety and security
    Explanation
    The correct answer is "Electronic safety and security." This is because ESS stands for Electronic Safety and Security, which refers to the use of electronic systems and technology to ensure the safety and security of individuals, properties, and information. It encompasses various aspects such as surveillance systems, access control, alarm systems, and fire safety systems, among others.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 29, 2012
    Quiz Created by
    Letad1

Related Topics

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.