b'Arming Sequence: The amount of timeBiometric Code: Used on some locks; provides between when a security system is armed andgreater security than a numbered code on a then subsequently disarmed.standard lock. Only the individual with the exact Audio Verification: A type of alarm verificationfingerprint, DNA, or different type of identifying that uses audio detection to allow a centralinput can open the lock. station operator to listen in at the alarmedBurglar Alarm System: An electronic system premise to verify that the alarm event is anconsisting of alarm devices that are connected actual alarm and not a false alarm.to a control panel via either a low-voltage Audible Alarm: An alarm that sets off one orhardwire or narrowband RF wireless signal. A more of the sirens of a security system.burglar alarm system becomes a monitored security system when connected to a central Authority Level: A designation assigned to eachmonitoring station. user code that determines which specificBurglary: A forced entry of a secure location functions can be assessed by that user.resulting in the damage or theft of property. Auxiliary Panic Keys: Programmed to activateBusiness Security: Securing the property and different types of distress signals (Burglar, Fire,assets of a business or organization using Holdup/Panic, Medical). Always work,burglar alarm systems, access control systems, regardless of whether or not the main securityand/or video surveillance. Businesses, due to system is armed.the large number of people using the security Back-Up Alarm Battery: A type of alarm batterysystems, often need multiple user codes and that ensures your security system will continuesometimes utilize scheduled arming and to work after losing AC power. Back-up alarmdisarming. batteries typically power a system for a 24-hourBypass: To remove a zone from service by period.causing the security system to ignore a zone. Bandwidth: The capacity of the transmissionAutomatically removed when the security medium stated in bits per second and as asystem is disarmed. frequency. It can also be the amount of dataCall Verification: A type of alarm verification in that can be transmitted in a fixed amount ofwhich a central station operator places one or time. For digital devices, the bandwidth ismore phone calls in an attempt to verify that a usually expressed in bits per second (bps) orreal alarm has occurred and not a false alarm. bytes per second. For analog devices, theTypically, the first call placed is to the alarmed bandwidth is expressed in cycles per second, orpremise, where the operator asks for a false Hertz (Hz).alarm password if there is an answer. If there is Babysitter Code: A user code that can arm theno answer, depending on the local alarm security system anytime, but can only disarmdispatch procedures, the operator may try one the system if the babysitter code was used toor more additional phone numbers in an arm it for that arming sequence. Once theattempt to reach someone. Eventually without system has been armed with a normal useran answer, the operator will dispatch the code the babysitter code will not disarm it.authorities to the non-verified alarm. Local jurisdictions that utilize enhanced call Biometrics: The science of identifying anverification (operator must place 2 phone calls individual based on physiological or behavioralbefore dispatching an alarm event) have found inputs. 78'