Blue Book Chapter 2 Questions Flashcards Preview

2nd year > Blue Book Chapter 2 Questions > Flashcards

Flashcards in Blue Book Chapter 2 Questions Deck (52):
1

List the common features/factors for security system design

1. detection for vulnerable perimeter entry
2. standby power
3. interior detection
4. security for control panel
5. notification suited for purpose
6. secure method of communication

2

What is a zone?

input on control panel that is individually identified by the control panel.

3

Define closed circuit/loop

While in alarm state, closed circuit devices (wire in series) permit the flow of current. Most common for security.

4

Define open circuit/loop

While in alarm state, does NOT permit current flow - closed circuit. Most common with fire alarm. Wired in panel.

5

What is the purpose of the EOLR?

provide supervision of the circuit

6

When using a 2000 ohm end of line resistor on a closed loop switch, what ohm values will you see during the following conditions?
Active
Secure

Active inifinite
Secure 2000 ohm

7

Define the following zone types:
a. entry/exit
b. perimeter
c. interior
d. interior follower
e. 24 hour
f. fire
g. keyswitch
h. panic

a. entry/exit - delay, allows system to be disarmed. used for doors
b. perimeter - activates instantly when violated - windows and infrequently, doors
c. interior - detects activity inside when armed - unoccuppied
d. interior follower - follows the entry/exit zone
e. 24 hour - constantly armed - environmental
f. fire - supports fire devices; constantly armed
g. keyswitch - arms and disarms panel
h. panic - active whether armed or disarmed; silent

8

Define the following common control panel features:
a. automatic arming
b. automatic bypass
c. automatic testing
d. force arming
e. lock out
f. opening and closing reports
g. partition
h. swinger shutdown
i. walk test/chime

a. automatic arming - arms burglar alarm system, if not already (ex: employee forgets)
b. automatic bypass - bypasses interior zones when system armed
c. automatic testing - sends signal to central monitor station at interval - checks in
d. force arming - bypasses zones that aren't ready when system armed
e. lock out - prevents others from reprogramming a system
f. opening and closing reports - sends signals to monitor when system is disarmed (arms and disarms)
g. partition - assigns zones to specific keypads.
h. swinger shutdown - bypasses zones that repeatedly go into alarm
i. walk test/chime - keypad sounder chirps when zone is violated

9

How are the system outputs controlled?

Follow inputs, inputs usually are programmed by installer of factory. Inputs control what outputs do.

10

What piece of equipment is used for the alarm system communication interface?

RJ31x jack & chord

11

The purpose of a system keypad is to:

provide an interface to the control unit for system use and programming.

12

Describe the difference between a duress code and a keypad panic.

Duress sends special signal (no audio alarm) to monitor
Panic programmed buttons are used as indications - needs someone at keypad.

13

What type contacts are typically wired in series configuration?

closed circuit

14

Most contacts are activated by what two means?

magnetic or mechanical

15

How is a heavy-duty switch different from a regular-duty switch?

Heavy-duty housings and around cable connections

16

What types of switches are used for banks, jewelry stores and some government facilities.

High security, biased

17

What is the most common form of space protection used in modern security systems?

motion detector - PIR and microwave

18

How does a PIR detect an intruder?

it detects changes in the background temp and any targets that enter the area

19

List three things that may cause false alarms on PIR's

radiant heating system, rodents and birds, forced air heating system

20

What are the two technologies used most in dual technology motion detection?

PIR and Microwave

21

How does a microwave detector work?

It transmits microwave signals and analyzes signals that are reflected back to the unit.

22

How does an audio glassbreak detector work?

If the sound of breaking glass frequency is detected, an alarm signal is generated. It has a built in microphone.

23

What is the range of most glassbreak detector

15 to 30 feet

24

Ca you mount a standard glassbreak detector above the window that is being protected?

NO - unless it is stated on the detector

25

What items could interfere with the operation of an audio glassbreak detector

curtains or blinds, line of sight

26

List three sources of false alarms for audio glassbreak detector

hand clapping, jingling keys, clanging pans

27

How do dual technology audio glassbreaks reduce false alarms?

It requires two frequencies to trigger alarm

28

Why are mechanical shock sensors more prone to false alarms?

lack of circuitry to analyze shocks

29

Were are shock sensors mounted?

depends on the type used and intended application - glass or window frame

30

What is the operating principle of photoelectric beam detectors?

transmits invisible, pulsing beam of light from one unit and receives at another.

31

What are the three main types of photoelectric beam detectors?

single, dual, reflective

32

Give an example of where you would have to use a reflective beam detector.

indoor entry chimes - can only get wire to one side

33

How can you reduce the occurrences of false alarms when using photoelectric beam detectors?

dual beam

34

Can smoke detectors or heat detectors be installed on any control panel?

NO - exception: the control panel MUST BE properly listed for fire alarm use.

35

List three types of environmental sensors and how they work.

water - increase of water above a certain level
humidity - monitor high or low humidity
power loss - presence of power or lack thereof

36

What is the difference between a speaker and a siren?

speakers reproduce sounds; sirens have built in siren driver

37

How many sires can be connected to a security panel?

cannot exceed current security panel allowances

38

What does the term "line seizure" mean?

Panel seizes phone line and disconnects devices until done communicating.

39

What color wires are used on a RJ31X cord?

red, green, brown and gray

40

What are three communication methods that are alternatives to standard telephone line communication?

cellular, radio, VOIP communication

41

What are the advantages to utilizing audio or video verification?

audio is two-way voice; video sends images

42

Why is system expansion necessary?

specific location of just because of the number of devices.

43

How do expansion modules communicate with the control panel?

communications expansion circuit or the keyboard circuit

44

How are addressable expansion devices typically connect to the control panel?

single two wire circuit

45

Is T-tapping the addressable circuits allowed? If so, how is supervision of the circuit maintained?

Yes, and by the control panel

46

Are standalone wireless receivers required to be made by the same manufacturer as the alarm panel.

No, but this one was circled, so not sure if correct

47

What are the advantages when using a supervised transmitter vs. an unsupervised model?

It reports to receiver when battery power is getting low

48

What devices are used to extend the range of a wireless device?

Repeaters

49

List three things that may interfere with wireless performance

metal, reflection, dense materials

50

What type of AC circuit is recommended for the transformer?

120V AC - connection to dedicated circuit on dedicated breaker

51

What gauge wire will I need to run if the transformer if 40 ft. from the control panel?

16 AWG

52

What will diminish the effectiveness of a surge protection device?

ineffective ground