SlideShare a Scribd company logo
1 of 19
Protective
locks and
Law kenefoyrcsement
administration II
What is lock?
A lock is a mechanical or
electronic fastening device
that is released by a physical
object (such as a key, keycard,
fingerprint, and RFID)
designed to prevent entry into
building, room, container or
hiding place.
KINDS OF LOCKS
WARDED LOCK
• is a type of lock that
uses a set of
obstructions, or
wards, to prevent
the lock from
opening unless the
correct key is
inserted.
Disc tumbler lock
is a lock
composed of
slotted
rotating
detainer discs.
Pin tumbler lock
a lock mechanism that
uses pins of varying
lengths to prevent the
lock from opening
without the correct key
widely used in doors of
offices and houses.
Lever lock
is a type of lock
that uses a set
of levers to
prevent the
bolt from
moving in the
lock.
Combination lock
- is a
sequence of
numbers or
symbols is
used to open
the lock.
Code-operated lock
this opens by
pressing a series
of numbers
buttons in
proper
sequence.
Card-operated lock
coded cards
whether notched,
embossed or
embedded with
magnetic-fuels are
inserted to open
Padlock
are portable or
detachable locks
with a movable
shackle
What is key?
A key is a device that is used to
operate a lock. A typical key is a small
piece of metal consisting of two parts:
the blade, which slides into the keyway
of the lock and distinguishes between
different keys, and the bow, which is
left protruding so that torque can be
applied by the user.
Types of keys
1.Change key-a specific key, which operates the lock
and has a particular combinations of cuts which
match the arrangement of the tumblers in the lock.
2.Sub master key- a key that will open all the lock
within a particular area or grouping in given facility.
3.Master key- a special key capable of opening series
of lock.
4.Grand master key- a key that will open everything
in a system involving two or more master key groups.
Key control
Key Control refers to various
methods for making sure that
certain keys are only used by
authorized people. This is
especially important for master key
systems with lots of users.
on measur b responsible per
What is the purpose of Key
Control?
1.To control the issue, use and storage of
keys and reserve key locks
2. To control reproduction of duplicate keys
3. To control lock rotation and or replacement
4. To maintain record on all of the above
5.To ensures proper supervisions of key
control measures by responsible persons.
PREPARED BY: GROUP 4
CALVA
PASAYLON
TABIN
SERAC
BANARES

More Related Content

Similar to lawenforcementadministrationii-140112075537-phpapp02.pptx

Lock Picking and Bypass Techniques - Understanding the Art of Locksmithing
Lock Picking and Bypass Techniques - Understanding the Art of LocksmithingLock Picking and Bypass Techniques - Understanding the Art of Locksmithing
Lock Picking and Bypass Techniques - Understanding the Art of LocksmithingDxMinds
 
Lock Picking and Bypass Techniques - Understanding the Art of Locksmithing
Lock Picking and Bypass Techniques - Understanding the Art of LocksmithingLock Picking and Bypass Techniques - Understanding the Art of Locksmithing
Lock Picking and Bypass Techniques - Understanding the Art of LocksmithingDxMinds
 
LOCK REKEYING.pdf
LOCK REKEYING.pdfLOCK REKEYING.pdf
LOCK REKEYING.pdfPrathushaR1
 
Burglar alarm basics-4
Burglar alarm basics-4Burglar alarm basics-4
Burglar alarm basics-4grantlerc
 
24 hour Locksmith Dublin Ireland PPT (2).pdf
24 hour Locksmith Dublin Ireland PPT (2).pdf24 hour Locksmith Dublin Ireland PPT (2).pdf
24 hour Locksmith Dublin Ireland PPT (2).pdfvishwanathzasu
 
Safety and Security
Safety and SecuritySafety and Security
Safety and SecurityMohd Hazique
 
HIRMS COMPLETE DOOR LOCK LIST
HIRMS COMPLETE DOOR LOCK LIST HIRMS COMPLETE DOOR LOCK LIST
HIRMS COMPLETE DOOR LOCK LIST HARIS K.E.
 
Efficient Keys Management with Key Boxes
Efficient Keys Management with Key BoxesEfficient Keys Management with Key Boxes
Efficient Keys Management with Key BoxesLockout India
 
Securing blockchain assets
Securing blockchain assetsSecuring blockchain assets
Securing blockchain assetsSimon Wilson
 
Best Self Storage Security Cameras Solutions
Best Self Storage Security Cameras SolutionsBest Self Storage Security Cameras Solutions
Best Self Storage Security Cameras SolutionsNexlar Security
 
Maipu smart lock solution for industrial business
Maipu smart lock solution for industrial businessMaipu smart lock solution for industrial business
Maipu smart lock solution for industrial businessling fu
 
Elevate Home Protection with Superior Door Cylinder Locks
Elevate Home Protection with Superior Door Cylinder LocksElevate Home Protection with Superior Door Cylinder Locks
Elevate Home Protection with Superior Door Cylinder LocksHarrison Locks
 
Anti-Shoplifting Devices
Anti-Shoplifting DevicesAnti-Shoplifting Devices
Anti-Shoplifting DevicesHarsh1012
 
Types Of Proactive Security Solutions For Self-storage
Types Of Proactive Security Solutions For Self-storageTypes Of Proactive Security Solutions For Self-storage
Types Of Proactive Security Solutions For Self-storageNexlar Security
 
How does a home security system work
How does a home security system work How does a home security system work
How does a home security system work nishiyath
 
How does a home security system work
How does a home security system work How does a home security system work
How does a home security system work nishiyath
 
Master Key Systems
Master Key Systems Master Key Systems
Master Key Systems RaniPatil47
 
KEY REPLACEMENT IN DUBLIN
KEY REPLACEMENT IN DUBLINKEY REPLACEMENT IN DUBLIN
KEY REPLACEMENT IN DUBLINtisnatisna2
 

Similar to lawenforcementadministrationii-140112075537-phpapp02.pptx (20)

Lock Picking and Bypass Techniques - Understanding the Art of Locksmithing
Lock Picking and Bypass Techniques - Understanding the Art of LocksmithingLock Picking and Bypass Techniques - Understanding the Art of Locksmithing
Lock Picking and Bypass Techniques - Understanding the Art of Locksmithing
 
Lock Picking and Bypass Techniques - Understanding the Art of Locksmithing
Lock Picking and Bypass Techniques - Understanding the Art of LocksmithingLock Picking and Bypass Techniques - Understanding the Art of Locksmithing
Lock Picking and Bypass Techniques - Understanding the Art of Locksmithing
 
LOCK REKEYING.pdf
LOCK REKEYING.pdfLOCK REKEYING.pdf
LOCK REKEYING.pdf
 
Burglar alarm basics-4
Burglar alarm basics-4Burglar alarm basics-4
Burglar alarm basics-4
 
24 hour Locksmith Dublin Ireland PPT (2).pdf
24 hour Locksmith Dublin Ireland PPT (2).pdf24 hour Locksmith Dublin Ireland PPT (2).pdf
24 hour Locksmith Dublin Ireland PPT (2).pdf
 
SMART DOOR LOCKS FOR HOTELS AND RESIDENCES
SMART DOOR LOCKS FOR HOTELS AND RESIDENCESSMART DOOR LOCKS FOR HOTELS AND RESIDENCES
SMART DOOR LOCKS FOR HOTELS AND RESIDENCES
 
Safety and Security
Safety and SecuritySafety and Security
Safety and Security
 
HIRMS COMPLETE DOOR LOCK LIST
HIRMS COMPLETE DOOR LOCK LIST HIRMS COMPLETE DOOR LOCK LIST
HIRMS COMPLETE DOOR LOCK LIST
 
Efficient Keys Management with Key Boxes
Efficient Keys Management with Key BoxesEfficient Keys Management with Key Boxes
Efficient Keys Management with Key Boxes
 
Securing blockchain assets
Securing blockchain assetsSecuring blockchain assets
Securing blockchain assets
 
Best Self Storage Security Cameras Solutions
Best Self Storage Security Cameras SolutionsBest Self Storage Security Cameras Solutions
Best Self Storage Security Cameras Solutions
 
Maipu smart lock solution for industrial business
Maipu smart lock solution for industrial businessMaipu smart lock solution for industrial business
Maipu smart lock solution for industrial business
 
Elevate Home Protection with Superior Door Cylinder Locks
Elevate Home Protection with Superior Door Cylinder LocksElevate Home Protection with Superior Door Cylinder Locks
Elevate Home Protection with Superior Door Cylinder Locks
 
Anti-Shoplifting Devices
Anti-Shoplifting DevicesAnti-Shoplifting Devices
Anti-Shoplifting Devices
 
Types Of Proactive Security Solutions For Self-storage
Types Of Proactive Security Solutions For Self-storageTypes Of Proactive Security Solutions For Self-storage
Types Of Proactive Security Solutions For Self-storage
 
How does a home security system work
How does a home security system work How does a home security system work
How does a home security system work
 
How does a home security system work
How does a home security system work How does a home security system work
How does a home security system work
 
Master Key Systems
Master Key Systems Master Key Systems
Master Key Systems
 
ppt2 (1).pptx
ppt2 (1).pptxppt2 (1).pptx
ppt2 (1).pptx
 
KEY REPLACEMENT IN DUBLIN
KEY REPLACEMENT IN DUBLINKEY REPLACEMENT IN DUBLIN
KEY REPLACEMENT IN DUBLIN
 

More from ArhakirAlpapara

Criminology review FORENSIC SCIENCE.pptx
Criminology review FORENSIC SCIENCE.pptxCriminology review FORENSIC SCIENCE.pptx
Criminology review FORENSIC SCIENCE.pptxArhakirAlpapara
 
CRIMINOLOGY REVIEW CRIMINAL PROCEDURE RULE 111 ROC.pptx
CRIMINOLOGY REVIEW CRIMINAL PROCEDURE RULE 111 ROC.pptxCRIMINOLOGY REVIEW CRIMINAL PROCEDURE RULE 111 ROC.pptx
CRIMINOLOGY REVIEW CRIMINAL PROCEDURE RULE 111 ROC.pptxArhakirAlpapara
 
TRAFFIC_MANAGEMENT___ACCIDENT_INVESTIGATION.pptx
TRAFFIC_MANAGEMENT___ACCIDENT_INVESTIGATION.pptxTRAFFIC_MANAGEMENT___ACCIDENT_INVESTIGATION.pptx
TRAFFIC_MANAGEMENT___ACCIDENT_INVESTIGATION.pptxArhakirAlpapara
 
CRIMINOLOGY REVIEW FINAL-DRILLS-FOR-CDI.pptx
CRIMINOLOGY REVIEW FINAL-DRILLS-FOR-CDI.pptxCRIMINOLOGY REVIEW FINAL-DRILLS-FOR-CDI.pptx
CRIMINOLOGY REVIEW FINAL-DRILLS-FOR-CDI.pptxArhakirAlpapara
 
CRIMINOLOGY REVIEW 2019_CRIMINAL_LAW_1.ppt
CRIMINOLOGY REVIEW 2019_CRIMINAL_LAW_1.pptCRIMINOLOGY REVIEW 2019_CRIMINAL_LAW_1.ppt
CRIMINOLOGY REVIEW 2019_CRIMINAL_LAW_1.pptArhakirAlpapara
 
Character-Formation-2.pptx
Character-Formation-2.pptxCharacter-Formation-2.pptx
Character-Formation-2.pptxArhakirAlpapara
 
1. Med.hum.II-Human rights.ppt
1. Med.hum.II-Human rights.ppt1. Med.hum.II-Human rights.ppt
1. Med.hum.II-Human rights.pptArhakirAlpapara
 
4-Human-Rights-powerpoint.pptx
4-Human-Rights-powerpoint.pptx4-Human-Rights-powerpoint.pptx
4-Human-Rights-powerpoint.pptxArhakirAlpapara
 
Q_&_A_TRAFFIC_MANAGEMENT.pptx
Q_&_A_TRAFFIC_MANAGEMENT.pptxQ_&_A_TRAFFIC_MANAGEMENT.pptx
Q_&_A_TRAFFIC_MANAGEMENT.pptxArhakirAlpapara
 
BALLISTICS-BY-BRILLO.pptx
BALLISTICS-BY-BRILLO.pptxBALLISTICS-BY-BRILLO.pptx
BALLISTICS-BY-BRILLO.pptxArhakirAlpapara
 
probation_review-new.ppt
probation_review-new.pptprobation_review-new.ppt
probation_review-new.pptArhakirAlpapara
 
NON-INSTITUTIONAL_CORRECTION_-2.pptx
NON-INSTITUTIONAL_CORRECTION_-2.pptxNON-INSTITUTIONAL_CORRECTION_-2.pptx
NON-INSTITUTIONAL_CORRECTION_-2.pptxArhakirAlpapara
 
4-Human-Rights-powerpoint.pptx
4-Human-Rights-powerpoint.pptx4-Human-Rights-powerpoint.pptx
4-Human-Rights-powerpoint.pptxArhakirAlpapara
 
5.MOCKBOARD_IN_CRIMINALISTICS.ppt
5.MOCKBOARD_IN_CRIMINALISTICS.ppt5.MOCKBOARD_IN_CRIMINALISTICS.ppt
5.MOCKBOARD_IN_CRIMINALISTICS.pptArhakirAlpapara
 

More from ArhakirAlpapara (20)

Criminology review FORENSIC SCIENCE.pptx
Criminology review FORENSIC SCIENCE.pptxCriminology review FORENSIC SCIENCE.pptx
Criminology review FORENSIC SCIENCE.pptx
 
CRIMINOLOGY REVIEW CRIMINAL PROCEDURE RULE 111 ROC.pptx
CRIMINOLOGY REVIEW CRIMINAL PROCEDURE RULE 111 ROC.pptxCRIMINOLOGY REVIEW CRIMINAL PROCEDURE RULE 111 ROC.pptx
CRIMINOLOGY REVIEW CRIMINAL PROCEDURE RULE 111 ROC.pptx
 
TRAFFIC_MANAGEMENT___ACCIDENT_INVESTIGATION.pptx
TRAFFIC_MANAGEMENT___ACCIDENT_INVESTIGATION.pptxTRAFFIC_MANAGEMENT___ACCIDENT_INVESTIGATION.pptx
TRAFFIC_MANAGEMENT___ACCIDENT_INVESTIGATION.pptx
 
CRIMINOLOGY REVIEW FINAL-DRILLS-FOR-CDI.pptx
CRIMINOLOGY REVIEW FINAL-DRILLS-FOR-CDI.pptxCRIMINOLOGY REVIEW FINAL-DRILLS-FOR-CDI.pptx
CRIMINOLOGY REVIEW FINAL-DRILLS-FOR-CDI.pptx
 
CRIMINOLOGY REVIEW 2019_CRIMINAL_LAW_1.ppt
CRIMINOLOGY REVIEW 2019_CRIMINAL_LAW_1.pptCRIMINOLOGY REVIEW 2019_CRIMINAL_LAW_1.ppt
CRIMINOLOGY REVIEW 2019_CRIMINAL_LAW_1.ppt
 
Character-Formation-2.pptx
Character-Formation-2.pptxCharacter-Formation-2.pptx
Character-Formation-2.pptx
 
1. Med.hum.II-Human rights.ppt
1. Med.hum.II-Human rights.ppt1. Med.hum.II-Human rights.ppt
1. Med.hum.II-Human rights.ppt
 
4-Human-Rights-powerpoint.pptx
4-Human-Rights-powerpoint.pptx4-Human-Rights-powerpoint.pptx
4-Human-Rights-powerpoint.pptx
 
Q_&_A_TRAFFIC_MANAGEMENT.pptx
Q_&_A_TRAFFIC_MANAGEMENT.pptxQ_&_A_TRAFFIC_MANAGEMENT.pptx
Q_&_A_TRAFFIC_MANAGEMENT.pptx
 
FIREARMS LAW.ppt
FIREARMS LAW.pptFIREARMS LAW.ppt
FIREARMS LAW.ppt
 
BALLISTICS-BY-BRILLO.pptx
BALLISTICS-BY-BRILLO.pptxBALLISTICS-BY-BRILLO.pptx
BALLISTICS-BY-BRILLO.pptx
 
Evidence.ppt
Evidence.pptEvidence.ppt
Evidence.ppt
 
RPC-Book-2_JRM.ppt
RPC-Book-2_JRM.pptRPC-Book-2_JRM.ppt
RPC-Book-2_JRM.ppt
 
poluce.ppt
poluce.pptpoluce.ppt
poluce.ppt
 
probation_review-new.ppt
probation_review-new.pptprobation_review-new.ppt
probation_review-new.ppt
 
NON-INSTITUTIONAL_CORRECTION_-2.pptx
NON-INSTITUTIONAL_CORRECTION_-2.pptxNON-INSTITUTIONAL_CORRECTION_-2.pptx
NON-INSTITUTIONAL_CORRECTION_-2.pptx
 
Evidence.ppt
Evidence.pptEvidence.ppt
Evidence.ppt
 
4-Human-Rights-powerpoint.pptx
4-Human-Rights-powerpoint.pptx4-Human-Rights-powerpoint.pptx
4-Human-Rights-powerpoint.pptx
 
2019_CRIMINAL_LAW_1.ppt
2019_CRIMINAL_LAW_1.ppt2019_CRIMINAL_LAW_1.ppt
2019_CRIMINAL_LAW_1.ppt
 
5.MOCKBOARD_IN_CRIMINALISTICS.ppt
5.MOCKBOARD_IN_CRIMINALISTICS.ppt5.MOCKBOARD_IN_CRIMINALISTICS.ppt
5.MOCKBOARD_IN_CRIMINALISTICS.ppt
 

Recently uploaded

DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 

Recently uploaded (20)

DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 

lawenforcementadministrationii-140112075537-phpapp02.pptx

  • 2. What is lock? A lock is a mechanical or electronic fastening device that is released by a physical object (such as a key, keycard, fingerprint, and RFID) designed to prevent entry into building, room, container or hiding place.
  • 4. WARDED LOCK • is a type of lock that uses a set of obstructions, or wards, to prevent the lock from opening unless the correct key is inserted.
  • 5. Disc tumbler lock is a lock composed of slotted rotating detainer discs.
  • 6.
  • 7. Pin tumbler lock a lock mechanism that uses pins of varying lengths to prevent the lock from opening without the correct key widely used in doors of offices and houses.
  • 8.
  • 9. Lever lock is a type of lock that uses a set of levers to prevent the bolt from moving in the lock.
  • 10. Combination lock - is a sequence of numbers or symbols is used to open the lock.
  • 11. Code-operated lock this opens by pressing a series of numbers buttons in proper sequence.
  • 12. Card-operated lock coded cards whether notched, embossed or embedded with magnetic-fuels are inserted to open
  • 13. Padlock are portable or detachable locks with a movable shackle
  • 14. What is key? A key is a device that is used to operate a lock. A typical key is a small piece of metal consisting of two parts: the blade, which slides into the keyway of the lock and distinguishes between different keys, and the bow, which is left protruding so that torque can be applied by the user.
  • 15. Types of keys 1.Change key-a specific key, which operates the lock and has a particular combinations of cuts which match the arrangement of the tumblers in the lock. 2.Sub master key- a key that will open all the lock within a particular area or grouping in given facility. 3.Master key- a special key capable of opening series of lock. 4.Grand master key- a key that will open everything in a system involving two or more master key groups.
  • 16.
  • 17. Key control Key Control refers to various methods for making sure that certain keys are only used by authorized people. This is especially important for master key systems with lots of users.
  • 18. on measur b responsible per What is the purpose of Key Control? 1.To control the issue, use and storage of keys and reserve key locks 2. To control reproduction of duplicate keys 3. To control lock rotation and or replacement 4. To maintain record on all of the above 5.To ensures proper supervisions of key control measures by responsible persons.
  • 19. PREPARED BY: GROUP 4 CALVA PASAYLON TABIN SERAC BANARES