Security Sales & Integration

November 2012

SSI serves security installing contractors providing systems and services; surveillance, access control, biometrics, fire alarm and home control/automation. Coverage in commercial and residential product applications, designs, techniques, operations.

Issue link: https://securitysales.epubxp.com/i/90752

Contents of this Issue

Navigation

Page 73 of 83

SCIENCE WITH JEFF ZWIRN SECURITY Jeffrey D. Zwirn, CPP, CFPS, CFE, DABFET, CHS-III, SET, RI, is a forensic alarm industry expert and President of Teaneck, N.J.-based IDS Research & Development Inc. He can be reached at (201) 287-0900 or jeffzwirn@alarmexpert.com. Quick QUIZ 1. WHAT ACTIONS WILL CAUSE THE CURRENT THROUGH AN ELECTRICAL CIRCUIT TO INCREASE? a) Decrease the voltage with a potentiometer b) Decrease the resistance c) Increase the resistance d) Increase the capacitance 2. OHMS LAW IS DEFINED AS: a) The relationship between power, current, voltage and resistance b) A local ordinance affecting alarm systems c) A scientifi c theory utilized to quantify smoke movement in buildings d) A scientifi c theory utilized to quantify parts per million (ppm) in carbon monoxide detection 3. NFPA 730 IS THE GUIDE FOR: a) Natural gas detectors b) Premises security c) Household burglar alarm systems d) Life-safety systems for colleges and universities 4. NFPA 731 IS THE STANDARD FOR: a) Premises security b) Crime prevention through environmental design of security systems c) Installation of electronic premises security systems d) Installation of holdup and panic alarm systems 5. EVD IS DEFINED AS: a) Electrical volumetric detection b) Electronic vibration detection c) Electronic volumetric detection d) Electronic vibration contact detection 6. AN EVD SYSTEM IS BEST SUITED FOR INTRUSION DETECTION ON A: a) File cabinet b) Door c) Overhead garage door d) Safe 7. A NORMALLY-CLOSED PROTECTIVE LOOP CIRCUIT ALLOWS ELECTRONS TO FLOW WHEN: a) The circuit is normally closed b) The circuit is normally open c) The circuit is a double circuit with an open circuit d) The circuit is a feed and return loop with an open circuit 8. A NORMALLY-OPEN PROTECTIVE LOOP CIRCUIT ALLOWS ELECTRONS TO FLOW WHEN: a) The circuit is normally open b) The circuit is a double circuit c) The circuit is a feed and return circuit d) The circuit is normally closed 9. THE 4 Ds OF SECURITY ARE DEFINED AS: a) Detect, deter, delay, deny b) Deter, delay deny, detect c) Delay the adversary, deter the intruder, delay the perpetrator and deny access to any unauthorized criminal event or perpetrator d) Detection system, foreseeability, preventability and delay 10. THE CRIME TRIANGLE IS DEFINED AS: a) Criminal action, criminal acts, criminal demographics b) Motive, intent, opportunity c) Secure all perimeter windows, leave INSURANCE 1. Carefully review your insurance policy and all exclu- sions. To the extent that you do not understand any part of your insurance policy, get expert assistance. 2. Only utilize an insurance broker that specializes in the alarm industry. 3. Make sure that the full scope of your operations is disclosed to your insur- ance company. 4. Make sure that you have adequate coverage and an umbrella policy in the event of a catastrophic claim. Adequate coverage should be based on the amount of subscribers you have, and the type of risks you are electronically protecting. 5. Have your alarm contracts and all alarm company paperwork reviewed annually by a lawyer who specializes in the alarm industry. This should include all versions of the contracts you have utilized over the years. lights on at night and install monitored security systems d) Install monitored security system, provide volumetric detection and insure the protected premises 11. A POINT-TO-POINT DETECTION DEVICE THAT IS DESIGNED TO DETECT AN INTRUDER IS KNOWN AS: a) Passive infrared motion (PIR) detector b) Microwave motion detector c) Dual technology motion detector d) Active infrared (IR) beam 72 / SECURITYSALES.COM / NOVEMBER 2012 Security Science ANSWER KEY 1. B 2. A 3. B 4. C 5. B 6. D 7. A 8. D 9. A 10. B 11. D

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Sales & Integration - November 2012