Class 12 Private Security Chapter 5 Security Through Surveillance And Protection Systems

Class 12 Private Security Chapter 5 Security Through Surveillance And Protection Systems Solutions English Medium As Per New Syllabus to each chapter is provided in the list so that you can easily browse through different chapters AHSEC Class 12 Private Security Chapter 5 Security Through Surveillance And Protection Systems Question Answer and select need one. Class 12 Private Security Chapter 5 Security Through Surveillance And Protection Systems Notes Download PDF. AHSEC Class 12 Elective Private Security Question Answer English Medium.

Class 12 Private Security Chapter 5 Security Through Surveillance And Protection Systems

Also, you can read the NCERT book online in these sections Solutions by Expert Teachers as per Central Board of Secondary Education (CBSE) Book guidelines. AHSEC Class 12 Private Security Textual Solutions are part of All Subject Solutions. Here we have given AHSEC Class 12 Private Security Textbook Solutions English Medium for All Chapters, You can practice these here.

Chapter: 5

SESSION1: RECORDING OF VISITOR INFORMATION
ASSESSMENT

A. Short Answer Questions:

Answer the following questions by completing the sentences: 

(a) It is easier to register a pre-scheduled visitor into the visitor management system because.

Ans: Prior intimation is available, these visitors can be quickly and efficiently registered into the system. Prior to a guest’s arrival, a designated person could record pertinent visitor data, an employee could be assigned to host the visitor, time for the person’s scheduled visit could also be pre-apportioned and access privileges specified.

(b) If I inform the organisation of my arrival, well in advance, it helps the organisation in the following ways: 

Ans: (i) A designated person could record pertinent visitor data.

(ii) An employee could be assigned to host the visitor.

(iii) Time for the person’s scheduled visit could be pre-apportioned.

(iv) Access privileges could be specified.

(c) All the visitors who visit a Shopping Mall fall in the category of _____________ visitors. 

Ans: Unscheduled visitors.

(d) The basic duties of the security staff.

(i) At the entrance is to _____________________.

Ans: Frisking and checking of all such personnel and their vehicles to preclude any security threat.

(ii) At the visitors shop is to ________________________. 

Ans: Recording of foot-fall and facilitating their way around the establishment.

(iii) During his stay in the Mall is to ___________________.

Ans: Monitoring to prevent any untoward incident.

(e) A visitor arrives in his car. He looks at the visitors sign and drives in that direction. A few minutes later he returns and is angry because the parking lot is full. What do you think he should done to avoid such scenes? 

Ans: He should have obtained guidance from the security staff at the entrance regarding the status of the parking lot, as to whether it has space to park or is already full, so that guidance to an alternate site is done without causing confusion.

(f) It is necessary to keep a record of all visitors vehicles both while entering and learning the facility because:- 

Ans: (i) To obviate any threat.

(ii) To maintain a proper record of entry/exit of all vehicles.

(iii) To monitor the movement and activities of visitors and drivers after they park their vehicles.

(iv) To prevent theft or other nefarious activities in parking areas.

CHECKLIST FOR ASSESSMENT ACTIVITY

Use the following checklist to see if you have met all the requirements for assessment activity.

Part A

(a) Differentiated between scheduled and unscheduled visitors. 

Ans:

Scheduled (Pre-Scheduled) VisitorsUnscheduled Visitors
(i) Those who have either sought an appointment earlier or have been invited by the organisation or its employees.(i) All other visitors who have not sought prior appointment.
(ii) Since prior intimation is available, they can be quickly and efficiently registered into the system.(ii) They fall into a potentially high-threat category as no prior information is available about them.
(iii) Their visit can be pre-planned — visitor data recorded, host assigned, time apportioned and access privileges specified.(iii) Handling requires more effort, resources, time for registration, and monitoring till final exit.
SESSION 2: MONITORING OF VISITORS
ASSESSMENT

A. Short Answer Questions:

(a) List the differences between the pen and paper visitor management system and computer based visitor management system. 

Ans:

Pen and Paper Visitor Management SystemComputer-Based Visitor Management System
(i) Records basic information about visitors in a logbook.(i) Uses a computer network and custom-made software to record information and monitor visitors.
(ii) Visitors enter details like name, reason, date, time manually in a book.(ii) Capable of automatically capturing visitor information directly from a visitor’s driver license, passport or other government-issued ID.
(iii) Low-cost, easy to train, but time-consuming and prone to misuse as passes rarely have photo identification.(iii) Improves upon most of the negative points of a pen and paper system, allows real-time monitoring, and can custom print photo ID cards.
(iv) Requires physical storage and manual retrieval of data.(iv) Uses email and electronic devices for fixing appointments, confirmations, and real-time tracking.
(v) Difficult to maintain and retrieve information; lacks data security.(v) More expensive, requires training, and needs data confidentiality safeguards.

(b) What are the drawbacks of a pen and paper management system? 

Ans: Drawbacks of a Pen and Paper Management System are:

(i) Visitors must physically write entries thus creating a hold-up effect.

(ii) The problem gets accentuated in case of large groups or simultaneous arrivals.

(iii) Visitor passes rarely have photo identification and can easily be misused.

(iv) Considerable effort is required to manually enter logbook information or store it safely.

(v) Retrieving information is time-consuming and strenuous.

(c) List the three things a computer based management system software does. 

Ans: (i) Visitor registration.

(ii) Visitor card printing.

(iii) Reporting.

(d) The database of the visitor management system helps an organisation in many ways. Write about two of them.

Ans: (i) It can be used to protect sensitive areas from potential threats such as terrorists or criminal activity by feeding in details beforehand of unwanted elements.

(ii) It can check the visitor’s information against criminal databases maintained by the Police department.

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Scroll to Top