Chapter 15
Quiz yourself by thinking what should be in
each of the black spaces below before clicking
on it to display the answer.
Help!
|
|
||||
|---|---|---|---|---|---|
| 1. In many cases, _______ ________ form the backbone of a facility’s physical protection program. a. Alarm Systems b. Covert Surveillance c. Report writing d. Physical force | a. Alarm Systems●
b. Covert Surveillance
c. Report writing
d. Physical force
🗑
|
||||
| 2. The primary purpose of an alarm system is: a. To conduct area surveillance b. To serve as a physical barrier c. To provide early warning of an intruder d. To lower insurance rates | a. To conduct area surveillance
b. To serve as a physical barrier
c. To provide early warning of an intruder●
d. To lower insurance rates
🗑
|
||||
| 3. According to the text material, the most effective security is provided with a: a. Technical approach b. Layered approach c. Large security force d. Key and lock program | a. Technical approach
b. Layered approach●
c. Large security force
d. Key and lock program
🗑
|
||||
| 4. In more alarm systems, sensors are interfaced with electronic entry-control devices, CCTV, alarm reporting displays (both visual and audible), and ________ ________ a. Police patrols b. Aerial units c. Sniper teams d. Security lighting | a. Police patrols
b. Aerial units
c. Sniper teams
d. Security lighting●
🗑
|
||||
| 5. How many different types of alarm monitoring were examined in the text? a. Two b. Three c. Four d. Six | a. Two
b. Three
c. Four●
d. Six
🗑
|
||||
| 6. Which of the following is not a type of alarm monitoring? a. Central system b. Direct fire and police c. Satellite d. Proprietary | a. Central system
b. Direct fire and police
c. Satellite●
d. Proprietary
🗑
|
||||
| 7. Logging devices are used for: a. Recording system activities and faults b. Controlling CCTV cameras c. Recording time and attendance of security staff d. Access control to computer networks | a. Recording system activities and faults●
b. Controlling CCTV cameras
c. Recording time and attendance of security staff
d. Access control to computer networks
🗑
|
||||
| 8. Alarm printers are typically: a. Of the color laser type b. Of the high-speed, continuous-feed type c. black and white and medium speed d. Extremely expensive | a. Of the color laser type
b. Of the high-speed, continuous-feed type●
c. black and white and medium speed
d. Extremely expensive
🗑
|
||||
| 9. A glass-break sensor is an example of: a. A perimeter sensor b. A spot sensor c. An area sensor d. A volumetric device | a. A perimeter sensor●
b. A spot sensor
c. An area sensor
d. A volumetric device
🗑
|
||||
| 10. A duress alarm is also sometimes called: a. A reset button b. A panic button c. Activation switch d. A silent partner | a. A reset button
b. A panic button●
c. Activation switch
d. A silent partner
🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
dagger9701