Class 12 Private Security Chapter 1 Security of Premises and Property

Class 12 Private Security Chapter 1 Security of Premises and Property Solutions English Medium As Per New Syllabus to each chapter is provided in the list so that you can easily browse through different chapters AHSEC Class 12 Private Security Chapter 1 Security of Premises and Property Question Answer and select need one. Class 12 Private Security Chapter 1 Security of Premises and Property Notes Download PDF. AHSEC Class 12 Elective Private Security Question Answer English Medium.

Class 12 Private Security Chapter 1 Security of Premises and Property

Join Telegram channel
Follow us:
facebook sharing button
whatsappp sharing button
instagram sharing button

Also, you can read the NCERT book online in these sections Solutions by Expert Teachers as per Central Board of Secondary Education (CBSE) Book guidelines. AHSEC Class 12 Private Security Textual Solutions are part of All Subject Solutions. Here we have given AHSEC Class 12 Private Security Textbook Solutions English Medium for All Chapters, You can practice these here.

Chapter: 1

SESSION 1: PERIMETER SECURITY
ASSESSMENT

A. Short Answer Questions: 

1. What is meant by a perimeter security system? 

Ans: Perimeter security is planned to cover a specified area. The layout and type of security system depend on the size of the premises, types of internal and external threats, layout, and availability of resources. It is the first layer of physical security designed to deny access to unauthorized personnel and protect the premises.

2. Explain the 3Ds of the perimeter security system.

Ans: The purpose of perimeter security can be abbreviated as 3Ds:

(i) Deter: A perimeter clearly defines the limits of the protected area and deters an easy access.

WhatsApp Group Join Now
Telegram Group Join Now
Instagram Join Now

(ii) Detect: A perimeter is helpful in detecting any authorized or unauthorized movement into the premises.

(iii) Delay: An unauthorized access to the premises is delayed by erecting gates, barriers and such other obstacles.

3. List the sensitive perimeter security points. 

Ans: The sensitive perimeter security points include:

(i) Fence.

(ii) Compound walls.

(iii) Driveways.

(iv) Main gate.

(v) Material gate.

CHECKLIST FOR ASSESSMENT ACTIVITY

Use the following checklist to see if you have met all the requirements for assessment activity. 

Part A

1. Differentiated between: 

(a) Fencing and compound walls.

Ans:

FencingCompound Walls
(i) Fencing is the most common form of perimeter protection made of barbed wires supported on metal or wooden stakes.(i) A compound wall is a well-erected solid wall that enhances perimeter security.
(ii) Prevents intrusion and marks boundaries but allows visibility through gaps.(ii) Prevents both observation and intrusion from outside.
(iii) Usually made of barbed wire, chain-link or concertina wire.(iii) Made of brick, concrete, or solid material.
(iv) Found around open fields, industrial areas, and temporary setups.(iv) Found around houses, factories, schools, and offices.

(b) Main gate and material gate. 

Ans: 

Main GateMaterial Gate
(i) It is the main entry or exit point to any premises for people and vehicles.(i) It is used where movement of large volumes of material takes place.
(ii) Checking of people and vehicles for security takes place here.(ii) Vehicles and materials passing through this gate are thoroughly checked to minimize threats and losses.
(iii) Found at the front of premises.(iii) Found in industrial or storage areas where goods move in and out frequently.

(c) Barbed wire fencing and electrified fencing.

Ans: 

Barbed Wire FencingElectrified Fencing
(i) It consists of barbed wires stretched on stakes for perimeter protection.(i) It is a wire fence with electric current passed through it for higher protection.
(ii) Provides physical resistance against trespass.(ii) Acts as a deterrent by giving electric shocks on contact and can be connected to an alarm.
(iii) Commonly used around general premises and fields.(iii) Used in high-security areas like sensitive installations or restricted zones.

(d) Observation tower and flood lighting tower.

Ans:

Observation TowerFlood Lighting Tower
(i) An elevated structure providing an overall view around the premises; acts as the “eyes” of the security system.(i) A tower equipped with flood lights to illuminate large areas, especially during night.
(ii) Used to monitor and detect intrusion visually.(ii) Used to improve visibility and assist observation from towers at night.
(iii) Found in army cantonments, jails, and important installations.(iii) Installed along with observation towers or around perimeters needing night surveillance.

(e) Intruder alarm and fire alarm.

Ans: 

Intruder AlarmFire Alarm
(i) It provides a warning against trespass and intrusion into premises.(i) It gives a warning in case of fire or smoke within the premises.
(ii) Detects unauthorized entry and alerts security personnel.(ii) Detects rise in temperature, smoke, or flames and alerts occupants.
(iii) Used in offices, strong rooms, banks, vaults, high-security areas, prison cells, residential houses, factories, and museums.(iii) Installed in buildings, offices, and industrial setups where fire hazards exist.
(iv) Triggered by motion, vibration, or contact sensors on fences or doors.(iv) Triggered by smoke detectors, heat sensors, or flame detectors.

(f) Security system required for unoccupied premises.

Ans:

Points of DifferenceSecurity System for Unoccupied Premises
MeaningAn unoccupied premise refers to a building or area without constant human presence or activity.
RequirementRequires a strong perimeter security system to prevent unauthorized access or theft.
ComponentsIncludes fencing, compound walls, gates, barriers, intruder alarms, and surveillance cameras.
PurposeTo ensure continuous protection against external and internal threats even when no personnel are present.
ExampleClosed shops, godowns, construction sites, and residential houses during long absences.
SESSION 2: ACCESS CONTROL
ASSESSMENT

A. Short Answer Questions:

1. What are the advantages of the electromagnetic card reader? 

Ans: The advantages of the electromagnetic card reader are as follows:

(i) Data is stored in the form of magnetic stripes and can be read easily by swiping or inserting the card.

(ii)The system provides useful data regarding entry and exit of the card holder.

(iii) Cards are reprogrammable and more convenient than keys which often get lost.

(iv) It is used extensively in commercial and industrial sectors.

2. What are the advantages of the proximity card reader?  

Ans: The advantages of the proximity card reader are as follows:

(i) Long card life.

(ii) Cards can be read through a purse or wallet.

(iii) Card and reader orientation is not critical.

(iv) Less operation time.

(v) The whole reading process is completed in microseconds.

3. List three biometric systems in use for access control and write a short note on any one of them. 

Ans: Three biometric systems:

(i) Fingerprint recognition.

(ii) Iris (eye) recognition.

(iii) Face recognition.

Fingerprint recognition: Biometric access control systems record and store the details of the human body such as finger prints, iris, and face. For gaining access, the user enters an ID number and presents the concerned body part to the biometric reader. The reader compares it with the stored template, and if the images match, it activates the access control system to permit entry to the premises.

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Scroll to Top