The leak detection method that consists of calculating the difference between volume of fluid entering the pipe and volume of fluid leaving the pipe
What is “Volume balance”?
In WIFI technology, it is still transmitted and discoverable, even when broadcast of it is disabled.
The SSID. The (Service Set Identifier) must still be used in transmissions between clients and the WAP and is easily discoverable with a wireless sniffer.
The number of wrungs on the top of a ladder that must not be used to work from
What is 2?
This notification type represents an abnormal operating condition that requires a timely operator response
What is an alarm?
What SCADA stands for.
What is Supervisory, Control and Data Acquisition
The highest flying form of leak detection.
What is “aerial patrol”?
The number of days it takes to crack an 8 character long password with a basic hardware.
What is 1 day or less?
When lifting heavy objects, what you should never bend at
What is the waist?
A means to convey the seriousness of an alarm, based on time to respond and consequence of inaction
What is an alarm priority?
This database stores information on the users and components of a domain.
What is Active Directory?
If the leak detection balance is rising and falling cyclically every 24 hours, what type of sensor is having what kind of failure?
What is a temperature sensor is changing with ambient temperature?
The main reason that the MySpace data breach that long ago affected roughly 380 million accounts is still very much a concern today.
What is the poor practice of people reusing their passwords? (Email addresses and passwords were within that data.)
The form that must be filled in and submitted when medical treatment is required beyond first aid
What is Workers Compensation Board (WCB) form?
To report a workplace injury in Alberta and Saskatchewan:
• Step 1: Tell your employer the details of your injury. After receiving notice, the employer must report the incident to the WCB within the provincial timeline if medical treatment is required, or if the Worker cannot do their job beyond the day of incident.
• Step 2: Tell your doctor you were injured at work.
• Step 3: Tell the WCB. Obtain forms from your employer or any WCB office, and once completed, immediately send your Report of Injury Form to the WCB
A classification of nuisance alarms that annunciate and clear at least 3 times in one minute
What is a chattering alarm?
The four core services that the OASys DNA 7.5 Network Management Console displays.
What is Realtime, Historical Services, ISPS (Inter-System PubSub), RCS (Remote client service)?
How long a control center operator has to shut down a line flowing at 100 m3/h if there is an unexplained leak alarm.
What is “ 2 hours”?
The method used to bypass even the best security practices.
What is social engineering?
According to IPLs hearing conservation standard, the suspected noise level at a work site in which noise measurements must be taken.
What is 80dBA? (e.g. the sound of a vacuum cleaner or diesel truck)
This type of nuisance alarm are in an alarm state continuously for more than 24 hours
What is a stale alarm?
The three main components of a control system architecture.
What are:
RTU (Remote Telemetry units), PLC (Programmable logic controls,
Network data communication
GUI (graphical user interface) HMI (Human machine interface)
The retention period changed/defined for all leak detection records within CSA Z662 Annex E in 2019.
What is the “life of pipeline”?
The principle that can prevent malware from assuming full administrative capabilities, by limiting user account privileges.
What is the principle of least privilege?
When working alone at the ECR for an entire day, the time(s) you must check-in with your contact at a minimum?
What is in the morning, at mid-day, and at the end of the day?
This database contains the authorized list of rationalized alarms and their associated configuration
What is the Master Alarm Database?
The definitions of 5 of 10 types networks:
11 Types of Networks in Use Today:
1. Personal Area Network (PAN)
The smallest and most basic type of network, a PAN is made up of a wireless modem, a computer or two, phones, printers, tablets, etc., and revolves around one person in one building. These types of networks are typically found in small offices or residences, and are managed by one person or organization from a single device.
2. Local Area Network (LAN)
We’re confident that you’ve heard of these types of networks before – LANs are the most frequently discussed networks, one of the most common, one of the most original and one of the simplest types of networks. LANs connect groups of computers and low-voltage devices together across short distances (within a building or between a group of two or three buildings in close proximity to each other) to share information and resources. Enterprises typically manage and maintain LANs.
Using routers, LANs can connect to wide area networks (WANs, explained below) to rapidly and safely transfer data.
3. Wireless Local Area Network (WLAN)
Functioning like a LAN, WLANs make use of wireless network technology, such as WiFi. Typically seen in the same types of applications as LANs, these types of networks don’t require that devices rely on physical cables to connect to the network.
4. Campus Area Network (CAN)
Larger than LANs, but smaller than metropolitan area networks (MANs, explained below), these types of networks are typically seen in universities, large K-12 school districts or small businesses. They can be spread across several buildings that are fairly close to each other so users can share resources.
5. Metropolitan Area Network (MAN)
These types of networks are larger than LANs but smaller than WANs – and incorporate elements from both types of networks. MANs span an entire geographic area (typically a town or city, but sometimes a campus). Ownership and maintenance is handled by either a single person or company (a local council, a large company, etc.).
6. Wide Area Network (WAN)
Slightly more complex than a LAN, a WAN connects computers together across longer physical distances. This allows computers and low-voltage devices to be remotely connected to each other over one large network to communicate even when they’re miles apart.
The Internet is the most basic example of a WAN, connecting all computers together around the world. Because of a WAN’s vast reach, it is typically owned and maintained by multiple administrators or the public.
7. Storage-Area Network (SAN)
As a dedicated high-speed network that connects shared pools of storage devices to several servers, these types of networks don’t rely on a LAN or WAN. Instead, they move storage resources away from the network and place them into their own high-performance network. SANs can be accessed in the same fashion as a drive attached to a server. Types of storage-area networks include converged, virtual and unified SANs.
8. System-Area Network (also known as SAN)
This term is fairly new within the past two decades. It is used to explain a relatively local network that is designed to provide high-speed connection in server-to-server applications (cluster environments), storage area networks (called “SANs” as well) and processor-to-processor applications. The computers connected on a SAN operate as a single system at very high speeds.
9. Passive Optical Local Area Network (POLAN)
As an alternative to traditional switch-based Ethernet LANs, POLAN technology can be integrated into structured cabling to overcome concerns about supporting traditional Ethernet protocols and network applications such as PoE (Power over Ethernet). A point-to-multipoint LAN architecture, POLAN uses optical splitters to split an optical signal from one strand of singlemode optical fiber into multiple signals to serve users and devices.
10. Enterprise Private Network (EPN)
These types of networks are built and owned by businesses that want to securely connect its various locations to share computer resources.
11. Virtual Private Network (VPN)
By extending a private network across the Internet, a VPN lets its users send and receive data as if their devices were connected to the private network – even if they’re not. Through a virtual point-to-point connection, users can access a private network remotely.