Burglar Alarm Systems Flashcards Preview

2nd year > Burglar Alarm Systems > Flashcards

Flashcards in Burglar Alarm Systems Deck (52):
1

List the six common features/factors for security system design.

Perimeter detection
Interior detection
Secure control panel
Stand-by power
Notifications
Communication to monitoring facility

2

What is a zone?

An input on a panel to monitor devices.

3

Define closed circuit/loop:

Opens the circuit upon activation

4

Define open circuit/loop:

Closes the circuit upon activation

5

What is the purpose of the EOLR?

To provide supervision of the circuit.

6

When using a 2000 ohm end of line resistor on a closed loop switch, what ohm values will you see during the following conditions? Active: Secure:

Active: infinite resistance
Secure: 2 kΩ

7

Define the following zone types:
1. Supports fire alarm devices.
2. Delays sounding an alarm for a programmed amount of time. Entry 30-45 seconds/ Exit 60 seconds.
3. System arming and disarming.
4. Detects activity inside the building.
5. Similar to 24-hour zones - causes the panel to communicate to monitoring system.
6. "Follows" the entry/exit zone.
7. (instant zones) Activates instantly when violated.
8. Constantly armed.

Fire
entry/exit
keyswitch
interior
panic
interior follower
perimeter
24 hr

8

Define the following common control panel features:
a. Automatic arming
b. Automatic bypass
c. Automatic test
d. Force arming
e. Lock out
f. Opening and closing reports
g. Partition
h. Swinger shutdown
i. Walk test/chime
1. Sends a test signal to central monitoring station at pre-programmed intervals.
2. Automatically by-passes zones that are not ready (violated) when system is armed.
3. Functions as a separate system; assigns specific zones to specific keypads or users.
4. Prevents others from re-programming the system if not authorized.
5. Automatically arms by preprogrammed time.
6. Key pad chirps when zone is violated.
7. Automatically by-passes interior zones when entry/exit zone is not violated during exit time.
8. Reports to monitoring station when the system is armed and disarmed.
9. Bypasses zones that repeatedly go into alarm; constantly goes alarm, typically set at 3-10 times.

a-5. Automatic arming - Automatically arms by preprogrammed time.
b-7. Automatic bypass - Automatically by-passes interior zones when entry/exit zone is not violated during exit time.
c-1. Automatic test - Sends a test signal to central monitoring station at pre-programmed intervals.
d-2. Force arming - Automatically by-passes zones that are not ready (violated) when system is armed.
e-4. Lock out - Prevents others from re-programming the system if not authorized.
f.-8 Opening and closing reports - Reports to monitoring station when the system is armed and disarmed.
g-3. Partition - Functions as a separate system; assigns specific zones to specific keypads or users.
h-9. Swinger shutdown - Bypasses zones that repeatedly go into alarm; constantly goes alarm, typically set at 3-10 times.
i-6. Walk test/chime - Key pad chirps when zone is violated.

9

How are the system outputs controlled?

Programmed to follow the inputs on the control panel.

10

What piece of equipment is used for the alarm system communication interface?

RJ31X cord and jack

11

The purpose of a system keypad is to......

Provide an interface to the control unit for system use and programming.

12

Describe the difference between a duress code and a keypad panic.

Duress alerts the monitoring station with no alarm sounding
Panic alerts the monitoring station but sounds the siren.

13

What type contacts are typically wired in series configuration?

Closed circuit devices

14

Most contacts are activated by what two means?

Magnet or pressure

15

How is a heavy duty switch different from a regular duty switch?

It is heavier, is more durable and uses screws.

16

What types of switches are used for banks, jewelry stores, and some government facilities?

High security/biased

17

What is the most common form of space protection used in modern security systems?

PIR - Passive Infrared (motion)

18

How does a PIR detect an intruder?

It detects changes between the background temperature and targets when a different temperature enters the area.
When an object, such as a human, passes in front of the background, such as a wall, the temperature at that point in the sensor's field of view will rise from room temperature to body temperature, and then back again. The sensor converts the resulting change in the incoming infrared radiation into a change in the output voltage, and this triggers the detection.

19

List three things that may cause false alarms on PIR's.

Fans, change in room temperatures, shadows, insects

20

What are the two technologies used most in dual technology motion detection?

PIR and microwave

21

How does a microwave detector work?

Transmits microwave signals (very high frequency radio waves) and analyzes the signals that are reflected back to the unit (doplar shift)

22

How does an audio glassbreak detector work?

They detect the specific frequency of broken glass.

23

What is the range of most glassbreak detectors?

15-30 feet

24

Can you mount a standard glassbreak detector above the window that is being protected?

Yes, but not recommended.

25

What items could interfere with the operation of an audio glassbreak detector?

Curtains, blinds, soft furniture, carpeting

26

List three sources of false alarms for audio glassbreaks.

Dishwashers, garage door openers, dropping/clanging pots and pans, high-pitch dog barking

27

How do dual technology audio glassbreaks reduce false alarms?

High frequency (breaking glass), low frequency (impact)

28

Why are mechanical shock sensors more prone to false alarms?

Lack of circuitry to analyze the shocks.

29

Where are shock sensors mounted?

Depends on the type used and intended application *

30

What is the operating principle of photoelectric beam detectors?

Uses light sensitive elements to detect objects and are made up of an emitter (light source) and a receiver. When emitted light is interrupted or reflected by the sensing object, it changes the amount of light that arrives at the receiver. The receiver detects this change and converts it to an electrical output.

Piezoelectric sensor, electricity, *

31

What are the three main types of photoelectric beam detectors?

Single beam, dual beam, reflective

32

Give an example of where you would have to use a reflective beam detector.

Indoor entry chimes

33

How can you reduce the occurrences of false alarms when using photoelectric beam detectors?

Use dual beam

34

Can smoke detectors or heat detectors be installed on any control panel?

No, must be installed on a properly listed panel.

35

List three types of environmental sensors and how they work.

Temperature, water, humidity, power loss

36

What is the difference between a speaker and a siren?

Speaker only generates sounds by other devices (siren).
Siren driver produces electric tones that are reproduced by the speaker.

37

How many sirens can be connected to a security panel?

Multiple - just cannot exceed the available current.

38

What does the term "line-seizure" mean?

Takes control of the phone line in order to call out to the control center.

39

What color wires are used on an RJ31X cord?

Red, green, brown, gray

40

What are three communication methods that are alternatives to standard telephone line communication?

Cellular, radio internet, VolP

41

What are the advantages to utilizing audio or video verification?

Audio uses monitor station to listen and talk back to monitored locations.
Video sends still images or video clips.

42

Why is system expansion necessary?

Unable to get wire to specific location or too many wires it needs to get expanded.

43

How do expansion modules communicate with the control panel?

Special communication expansion circuit or the keypad circuit

44

How are addressable expansion devices typically connected to the control panel?

Connected to an addressable circuit; each device has individual I.D.

45

Is T-tapping the addressable circuits allowed? If so, how is the supervision of the circuit maintained?

Yes, through individual I.D. - must be addressed.

46

Are stand-alone wireless receivers required to be made by the same manufacturer as the alarm panel?

No

47

What are the advantages when using a supervised transmitter vs. an unsupervised model?

Supervised: Reports status to receiver on a regular basis; gives report if does not report.
Unsupervised: Only reports when there is an alarm.

48

What devices are used to extend the range of a wireless device?

Repeater

49

List three things that may interfere with wireless performance:

RF, EM, Metal, dense materials

50

What type of AC circuit is recommended for the transformer?

120 VAC or dedicated outlet

51

What gauge wire will I need to run if the transformer is 40 feet from the control panel?

16 gauge

52

What will diminish the effectiveness of a surge protection device?

bad system ground