Class 12 Private Security Chapter 2 Introduction To Technological Aids In Security Operations

Class 12 Private Security Chapter 2 Introduction To Technological Aids In Security Operations Solutions English Medium As Per New Syllabus to each chapter is provided in the list so that you can easily browse through different chapters AHSEC Class 12 Private Security Chapter 2 Introduction To Technological Aids In Security Operations Question Answer and select need one. Class 12 Private Security Chapter 2 Introduction To Technological Aids In Security Operations Notes Download PDF. AHSEC Class 12 Elective Private Security Question Answer English Medium.

Class 12 Private Security Chapter 2 Introduction To Technological Aids In Security Operations

Join Telegram channel
Follow us:
facebook sharing button
whatsappp sharing button
instagram sharing button

Also, you can read the NCERT book online in these sections Solutions by Expert Teachers as per Central Board of Secondary Education (CBSE) Book guidelines. AHSEC Class 12 Private Security Textual Solutions are part of All Subject Solutions. Here we have given AHSEC Class 12 Private Security Textbook Solutions English Medium for All Chapters, You can practice these here.

Chapter: 2

SESSION 1: ACCESS CONTROL EQUIPMENT
ASSESSMENT

A. Short Answer Questions:

Answer the following questions:

1. Describe the access control system. 

Ans: Access control system: It is an integrated functioning of a number of networked gadgets, which is used to control and regulate access and movement of people and vehicles in any premises. An access control system can generate data regarding movement of people and vehicles with day, date, time and door-wise or gate-wise details. This data is of immense value for security, administration and investigation purposes.

2. List the types of access control system. 

Ans: Types of Access Control System:

WhatsApp Group Join Now
Telegram Group Join Now
Instagram Join Now

(i) Card-based Access Control System – Uses an access card that acts like a key and allows or denies entry or exit.

(ii) Biometric Access Control System – Uses fingerprint or iris recognition through a biometric reader to verify identity.

(iii) Magnetic Lock-based Access Control System – Uses magnetic locks to physically secure entry points, which open only after authentication.

(iv) Controller-based Access Control System – Uses a controller that processes input from readers and generates commands for access.

3. Identify the main parts of access control system.

Ans: Main parts of an access control system: 

(i) Access card – It is a device which acts like a key and allows or denies entry or exit. It contains pre-stored data regarding the authorized user, such as photo, name, employee number, department and access rights. 

(ii) Card/Bio-metric reader – A gadget that receives the data from a card after a swipe and transmits it to the system. Similarly, in a biometric system the finger print scanner receives data of a finger and transmits it to the system. 

(iii) Magnetic lock – A magnetic lock is a part of the access control system which ensures physical security by keeping the entry point locked. 

(iv) Controller – It is a device which controls all the functions of the access control system. 

(v) Central processing unit (CPU) and Monitor – It is a unit in the network where all the events are logged and stored.

CHECKLIST FOR ASSESSMENT ACTIVITY

Use the following checklist to see if you have met all the requirements for assessment activity: 

Part A

(a) Access card and Bio metric card. 

Ans:

Access CardBiometric Card / Reader
(i) It is a device which acts like a key and allows or denies entry or exit.(i) It is a gadget that records biometric data such as a fingerprint or iris pattern for authentication.
(ii) Works on pre-stored data like photo, name, employee number, department, and access rights stored in the card.(ii) Works on unique biological features of the individual — fingerprint, iris, or face.
(iii) The card is swiped or inserted into a reader to transmit data to the system.(iii) The person places a finger or eye near the scanner; the reader captures and transmits the data.
(iv) Can be lost, stolen, or shared with another person(iv) Cannot be shared or duplicated easily because it depends on personal biometric traits.

(b) Magnetic lock and a Turnstile.

Ans:

Magnetic LockTurnstile
(i) A part of the access control system which ensures physical security by keeping the entry point locked.(i) A mechanical barrier that allows one person at a time to pass after verification.
(ii) It demagnetizes for a few seconds to allow entry or exit when the controller confirms authenticity.(ii) It rotates or flips open after receiving permission from the controller to permit entry.
(iii) Installed on doors or gates where electronic locking is required.(iii) Installed in high-traffic entry points like office lobbies, metro stations, or secure zones.
(iv) Works on electromagnetic locking and releasing.(iv) Works on mechanical rotation and physical barrier control.

(c) Controller and Central Processing Unit. 

Ans:

ControllerCentral Processing Unit (CPU)
(i) It is a device which controls all the functions of the access control system.(i) It is a network unit where all events are logged and stored.
(ii) Based on inputs from card/biometric readers, it analyses data and generates commands for permitting or denying access.(ii) It records and stores data like name, day, date, time, and access logs of all entry/exit points.
(iii)  Acts as the operational brain that makes real-time decisions for access.(iii) Acts as the data center and monitoring hub that keeps event records and triggers alarms.
(iv) Enables entry/exit through magnetic doors, turnstiles, flaps, boom barriers and bollards(iv) Sounds an alarm in case of breakdown and disarms the system during emergencies for evacuation.
SESSION 2: SCANNING AND FRISKING
ASSESSMENT 

A. Short Answer Questions:

1. List the scanning equipments.

Ans: Following are some of the scanning equipment used on people and vehicles:

(i) Hand held metal detector (HHMD).

(ii) Door frame metal detector (DFMD).

(iii) Under chassis inspection mirror (UCIM).

(iv) Luggage/cargo/vehicle X-ray machine.

(v) Explosive vapour detector (EVD).

2. Explain the purpose of HHMD and DFMD.

Ans: Hand held metal detector: An HHMD is a device to sense and detect the presence of metals (ferrous and nonferrous). HHMD is used for detection of weapons like knives, guns, pistols, revolvers, etc. These are extensively used at the airports, malls, hospital, banks and manufacturing units.

Door frame metal detector (DFMD): DFMD (Fig.6) or walk through detectors is ideal for building entrances, malls, airports and factory entries. It is used where there is constant and heavy flow of visitors.

3. Explain the use of Explosive Vapour Detector and sniffer dogs.

Ans: Explosive vapour detector: EVD is a simple detection unit which is designed to enable searching of people, luggage and parcels for hidden explosives. On activation of the unit, it draws a continuous stream of air through its nozzle. In case explosive vapours are detected in the sampled air, an alarm rings. In advanced version of EVD, the equipment can also indicate the type of explosive detected.

Sniffer dogs: Sniffer dogs are of special breed which are trained to detect persons, stolen items, explosives, weapons, narcotics, etc. These dogs undergo specialized training through a dedicated dog handler. Sniffer dogs are helping military, police and investigation agencies at the airport, railway station and sensitive installations.

4. Explain the use of Under Chassis Inspection Mirror.

Ans: Under chassis inspection mirror: A UCIM is a mirror mounted on caster wheels. It has a long handle by which it is slipped under any vehicle to detect the presence of any concealed items such as bombs, explosives, arms and any prohibited items. A torch/light source can also be attached to UCIM for night operations.

5. Explain the circumstances that justify frisking. 

Ans: Circumstances that justify frisking:

(i) Concern for safety of security person and others.

(ii) Suspicion that the subject is armed or dangerous.

(iii) Suspicion that the subject is about to commit a crime using a weapon.

(iv) Suspicion that subject is carrying stolen/missing item/s.

6. Describe the standard procedure of frisking men and women. 

Ans: The standard procedure of frisking for men and women:

(i) The subject is made to stand with hands interlocked behind the head, legs apart and toes pointed out.

(ii) Light patting with hands on the outer garment of the subject on the sides of the body from head to toe.

(iii) Women are frisked only by lady security personnel.

(iv) Women suspects will be frisked in a closed cubicle to maintain privacy. This is done only by an authorized lady security personnel.

(v) Women suspects will not be frisked in the presence of other male security personnel.

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.

This will close in 0 seconds

Scroll to Top