____ is the use of video cameras to monitor activities of individuals, typically for work-related or crime-prevention purposes.
A. Risk monitoring
B. Incident surveillance
C. Multimedia monitoring
D. Video surveillance
Answer: D
You might also like to view...
The CSS comment begins with a(n) ____________________ and an asterisk.
Fill in the blank(s) with the appropriate word(s).
Which is not a format control string flag?
a) – b) space c) newline d) #
It’s possible to view the order in which all controls on a form will receive the focus by __________.
a. clicking TabOrder in the Properties window b. pressing the Esc key c. clicking View on the menu bar and then Tab Order d. all of the above
Why is a bastion host the system most likely to be attacked?
A. it has weak security B. it contains company documents C. it is available to external users D. it contains the default administrator account