SEBA Class 9 Private Security Chapter 4 Access Control Solutions English Medium, SEBA Class 9 Private Security Question Answer, SEBA Class 9 Private Security Chapter 4 Access Control Question Answer to each chapter is provided in the list so that you can easily browse throughout different chapter SEBA Class 9 Private Security Chapter 4 Access Control English Medium Solutions and select needs one.
SEBA Class 9 Private Security Chapter 4 Access Control
Also, you can read the SCERT book online in these sections Solutions by Expert Teachers as per SCERT (CBSE) Book guidelines. SEBA Private Security Elective Class 9 Question Answer. These solutions are part of SCERT All Subject Solutions. Here we have given SEBA Class 9 Private Security Chapter 4 Access Control Solutions for All Chapter, You can practice these here.
Access Control
Chapter – 4
Session – 1: Search And Seizure |
Check Your Progress |
A. Fill in the Blanks:
1. For the purpose of scanning baggage, ____________ scanning machine is used.
Ans: X-ray.
2. A _________ held ____________ detector is used for detecting weapons and metal objects like knife on a person or in a bag.
Ans: Hand held metal.
B. Multiple Choice Questions:
1. Strip search, which refers to the removal of clothes for searching suspicious articles in clothes or body of an individual ___________.
(a) Can always be done by private security guards.
(b) Can be done only in certain circumstances by private security guards.
(c) Can never be done by private security guards.
(d) None of the above.
Ans: (b) Can be done only in certain circumstances by private security guards.
2. In the event of a loud beep sound from a metal detector, the security personnel will be able to ascertain whether _________.
(a) It is the buckle of a belt.
(b) It is a harmful metal.
(c) Both a and b.
(d) None of the above.
Ans: (c) Both a and b.
C. Short Answer Questions:
1. Explain the process of conducting a search with the help of a handheld metal detector. What is the relevance of maintaining the same pattern while conducting searches on different persons?
Ans: Process of Conducting a Search with a Handheld Metal Detector:
(i) Preparation: Ensure that the handheld metal detector (HHMD) is in good working condition by performing a quick functionality check. Adjust the sensitivity according to the security requirements.
(ii) Positioning: Stand at a comfortable distance from the person being searched, maintaining a non-threatening posture. Clearly inform the person about the search process to maintain cooperation and compliance.
(iii) Starting the Scan: Begin scanning from the top of the body, typically from the shoulders downwards. Move the detector slowly and steadily without making abrupt movements. Maintain a consistent distance of about 1 to 2 inches from the body.
(iv) Systematic Scanning: Follow a pre-defined pattern to cover all areas, starting from one shoulder, moving down the arm, then to the torso, legs, and feet. Repeat the process symmetrically on both sides.
Relevance of Maintaining Pattern:
(i) Ensures thoroughness: Following a consistent pattern ensures that all areas are checked, reducing the likelihood of missing potential threats.
(ii) Develops efficiency and routine: Maintaining a pattern helps security personnel develop muscle memory, making the search process more efficient.
(iii) Minimizes the chance of missing items: A consistent pattern reduces the risk of overlooking potential threats or items.
(iv) Enhances reliability and consistency: Following a standard procedure ensures that searches are conducted consistently, enhancing the reliability of the process.
2. What are the norms to be followed while dealing with persons found carrying suspicious articles or weapons?
Ans: Norms to Follow While Dealing with Persons Carrying Suspicious Articles or Weapons:
(i) Stay Calm and Composed: Remain calm and composed to avoid escalating the situation. Panic or aggressive behavior may provoke the individual or create chaos.
(ii) Assess the Threat: Quickly evaluate whether the person poses an immediate threat. Determine if the weapon or suspicious article is openly displayed or concealed.
(iii) Maintain a Safe Distance: Keep a safe distance to minimize personal risk. Never attempt to confront or disarm the person directly, especially if you are unarmed or untrained.
(iv) Inform Security Authorities: Immediately alert nearby security personnel or law enforcement agencies. Provide accurate and concise information about the person’s location, description, and the suspicious article or weapon observed.
(v) Call for backup: Request assistance from authorities or additional security personnel if necessary. Having more resources can help manage the situation more effectively and ensure safety.
(vi) Prioritize safety: The safety of all individuals involved should be the top priority. Take steps to protect yourself, the individual in question, and bystanders.
Session – 2: Structures And Techniques For Access Control |
Check Your Progress |
A. Fill in the Blanks:
1. People standing at a fixed place in a predictable manner like supermarket checkouts is a _________ queue.
Ans: Linear.
2. Other than malfunction, ___________ can be a cause for false alarm.
Ans: Human error.
3. Bright _______ deters anti-social elements from intruding into a property. It enhances personal safety during patrol.
Ans: Lighting.
4. If a company has a ________ policy, it is relatively easy to distinguish an employee or a visitor from an intruder.
Ans: Uniform.
B. Multiple Choice Questions:
1. Access control ensures in ___________.
(a) Preventing crowding.
(b) Enhancing security.
(c) Preventing chaos.
(d) All of the above.
Ans: (d) All of the above.
2. Suppose you are a sales representative and want to gain access to an industrial site for showcasing some of the products that you have come to sell. When a security guard at the entry gate of the site asks your name and asks you to show your Aadhaar card so as to check the name mentioned there, s/he is said to be engaged in ______ process.
(a) Authorisation.
(b) Authentication.
(c) Both (a) and (b).
(d) None of the above.
Ans: (b) Authentication.
3. After checking your Aadhaar card at the gate, the security guard calls up the concerned authorities to check if you should be allowed access, then s/he is said to be engaged in ______ process.
(a) Authorisation.
(b) Authentication.
(c) Both (a) and (b)’
(d) None of the above.
Ans: (a) Authorisation.
C. Short Answer Questions:
1. Are alarm systems always reliable? Give two causes for false alarms.
Ans: No, alarm systems are not always reliable. Despite being designed for security and safety, they can sometimes trigger false alarms due to various reasons.
Two Common Causes for False Alarms:
(i) Malfunction or Technical Issues: Alarm systems can sometimes malfunction due to faulty sensors, outdated software, or electrical issues. For example, a damaged motion sensor might trigger an alarm without any actual intrusion.
(ii) User Error: Simple mistakes like entering the wrong code, forgetting to disarm the system, or accidentally triggering the panic button can all lead to false alarms.
2. List the areas to be searched in a vehicle when a thorough check is being conducted.
Ans: When conducting a thorough vehicle search, the following areas should be checked:
(a) Exterior:
(i) Tires: Check for tread depth, pressure, cuts, and proper wheel alignment.
(ii) Lights: Verify that headlights, taillights, brake lights, and turn signals are functioning correctly.
(iii) Mirrors: Ensure mirrors are clean and adjusted properly.
(iv) Windshield: Inspect for cracks or damage that may affect visibility.
(v) Body: Check for dents, scratches, or other signs of damage.
(b) Interior:
(i) Seats: Check seatbelts for proper function and inspect the seating area for any damage or obstructions.
(ii) Dashboard: Verify that gauges and warning lights are functioning correctly.
(iii) Trunk/Cargo Area: Look for any unusual items or packages.
(iv) Under the Seats: Inspect for any hidden items or compartments.
(v) Floorboards: Check for any signs of water leaks or damage.
(c) Trunk and Cargo Area:
(i) Inside the spare tire compartment.
(ii) Tool kits, jack storage, and side panels.
(iii) Behind any removable panels or covers.
(d) Special Compartments:
(i) Hidden or modified areas, like false floors or hidden panels.
(ii) Custom storage compartments, if any.
(e) Miscellaneous:
(i) Any bags, containers, or personal belongings inside the vehicle.
(ii) Roof racks and external storage boxes.
3. What are the principal components of an electronic access control system? In the absence of an electronic system, how does manual access control system function?
Ans: Principal Components of an Electronic Access Control System:
(a) Identification Devices:
(i) Card Readers: Scans ID cards or proximity cards.
(ii) Biometric Scanners: Uses fingerprints, facial recognition, or iris scanning.
(iii) Keypads: Allows entry through a code or password.
(iv) Mobile Access: Uses smartphones via Bluetooth or NFC.
(b) Control Panel:
(i) The brain of the system that processes access requests.
(ii) Connects identification devices to the locking mechanism.
(c) Locking Mechanism:
(i) Electromagnetic Locks: Use magnetic force to secure doors.
(ii) Electric Strikes: Mechanically latch and unlatch doors.
(iii) Smart Locks: Can be controlled remotely.
(d) Database/Server:
(i) Stores authorized personnel data and access logs.
(ii) Facilitates data management and report generation.
(e) Monitoring and Alert System:
(i) Integrated with CCTV for real-time surveillance.
(ii) Sends alerts during unauthorized access attempts.
Manual Access Control System:
In the absence of an electronic system, a manual access control system functions through:
(i) Guards: Trained personnel controlling entry and exit.
(ii) Visitor Logs: Manual registration of visitors and guests.
(iii) ID Verification: Visual verification of identification documents.
(iv) Authorization: Verbal or written permission for access.
4. What should a security guard take note of while examining a manual ID card?
Ans: When examining a manual ID card, a security guard should take note of:
(i) Photo Verification: Ensure the photo matches the individual’s appearance.
(ii) ID Card Validity: Check the expiration date or validity period.
(iii) Name and Designation: Verify the name and designation match the individual’s information.
(iv) Physical Condition of the ID Card: Check for signs of tampering, damage, or alterations.
(v) Personal Details: Verify the name, date of birth, and other personal information against the person’s appearance.
(vi) Expiration Date: Make sure the ID card is valid and not expired.
(vii) Issuing Authority: Verify that the issuing authority is legitimate and recognized.
(viii) Consistency with Supporting Documents: If the person also presents supporting documents, ensure they match the details on the ID card.
5. What is the relevance of having a badge policy in an organisation such that employees and visitors both wear badges? Do you think it has an effect on security within the premises? Explain in detail with examples.
Ans: Relevance of a Badge Policy in an Organization:
A badge policy requiring both employees and visitors to wear identification badges serves as a crucial security measure within an organization. It helps in maintaining a secure environment and ensures that only authorized personnel have access to specific areas.
Key Benefits and Effects on Security:
(i) Identification and Authentication: Badges help security personnel quickly identify who belongs on the premises and who does not.
(ii) Access Control: Badges often integrate with electronic access control systems, allowing entry only to specific areas based on the holder’s authorization level.
(iii) Visitor Management: Visitors are typically issued temporary badges that include their name, photograph, and purpose of visit.
(iv) Accountability and Traceability: By recording badge usage, organizations can track who accessed particular areas and at what times.
(v) Enhanced Safety: In emergencies, badges help identify personnel to ensure their safety during evacuation.
Examples:
(i) Employee Badges: Color-coded badges indicating access levels (e.g., admin, employee).
(ii) Visitor Badges: Distinct badges for visitors, often with escort requirements.
(iii) Temporary Badges: Limited-duration badges for contractors or temporary staff.
A well-implemented badge policy enhances security, promotes a safe environment, and streamlines access control.

Hi! my Name is Parimal Roy. I have completed my Bachelor’s degree in Philosophy (B.A.) from Silapathar General College. Currently, I am working as an HR Manager at Dev Library. It is a website that provides study materials for students from Class 3 to 12, including SCERT and NCERT notes. It also offers resources for BA, B.Com, B.Sc, and Computer Science, along with postgraduate notes. Besides study materials, the website has novels, eBooks, health and finance articles, biographies, quotes, and more.