Examples of this brilliant type of security system are often placed at building entryways and in parking lots.
What is illumination?
CCTV: A security system that transmits a signal to a specific, limited set of monitors.
What is Closed-Circuit Television?
The important but imperfect process of collecting, disassembling, and recovering valuable materials from discarded electronic devices.
What is Electronics Recycling?
This vertical or horizontal route can run above a ceiling, below access floors, or within modular furniture.
What is a Cable Pathway?
Commonly used in airport security, these devices generate a pulse of energy that creates a magnetic field, setting off an audio and visual alarm alerting personnel to check for guns and other unauthorized objects.
What is a metal detector?
Examples of this type of security system include fences, man-made berms, and moats.
What are barriers?
OSP: All of the equipment, cables, and infrastructure that are located outside of a building.
What is Outside Plant?
A growing global issue because it often contains toxic materials, this term encompasses discarded electronic appliances such as phones, computers, and televisions.
What is E-waste?
Before specifying an electrically-locked door, a designer should be aware of the IBC's codes regarding this action?
What is Egress?
These may be wired only to doors and sound an alarm when a person enters the space or may be hardwired to a security company that is alerted in the event of a fire, unauthorized entry, and other situations.
What is a burglar alarm?
Examples of this type of security system include motion sensors, audible alarms, and yappy dogs.
What is Intrusion Detection?
ISP: An umbrella term that encompasses systems and devices including computers, the internet, wireless networks, cell phones, and the applications that run on them.
What is Information and Communications Technology?
Widely used in electrical wiring due to its high conductivity, this metal requires an environmentally destructive extraction process.
What is copper?
Methods of getting power/data into furniture panels include floor cores, wall junction boxes, and these vertical, floor-to-ceiling columns used in commercial buildings.
What are Power Poles?
Commonly found in prisons, schools, and malls, these systems are used when it is desirable to close off a specific area in the event of an emergency or after hours of operation
What is a lockdown system?
Examples of this type of security system include cameras and site monitoring.
What is Video Surveillance?
WAP: A networking hardware device that allows for WiFi devices to connect to a wired network.
What is Wireless Access Point?
Physical facilities that house large amount of IT infrastructure, these spaces have been criticized for their high energy consumption, water usage, and greenhouse gas emissions.
What are data centers?
AC needs, door sizing, fire rating, and floor material are some of the considerations designers must take into account when designing one of these equipment and infrastructure hubs?
What is a Telecommunication Room?
Smoke detectors and carbon dioxide monitors fall into this category of systems that protect a building and its occupants from environmental hazards such as fires, flooding, gas leaks, or poor air quality.
What is Environmental Security?
Examples of this type of security system include doors, gates, and turnstiles.
What is Access Control?
WiFi: A facility allowing computers, smartphones, or other devices to connect to the internet or communicate with one another without cables.
What is Wireless Fidelity?
This green building certification awards points in categories including Energy & Atmosphere, Materials & Resources, and Water Efficiency.
What is Leadership in Energy and Environmental Design (LEED)?
Examples of this type of flooring include specially manufactured vinyl tiles, rubber, and epoxy coatings designed for environments with sensitive electronics or flammable materials.
What is Static Dissipative?
Practices and technologies that safeguard network infrastructure, data integrity, and confidentiality against unauthorized access, hacking, malware, and other attacks fall into this category.