____ is the use of video cameras to monitor activities of individuals, typically for work-related or crime-prevention purposes.

A. Risk monitoring
B. Incident surveillance
C. Multimedia monitoring
D. Video surveillance


Answer: D

Computer Science & Information Technology

You might also like to view...

The CSS comment begins with a(n) ____________________ and an asterisk.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which is not a format control string flag?

a) – b) space c) newline d) #

Computer Science & Information Technology

It’s possible to view the order in which all controls on a form will receive the focus by __________.

a. clicking TabOrder in the Properties window b. pressing the Esc key c. clicking View on the menu bar and then Tab Order d. all of the above

Computer Science & Information Technology

Why is a bastion host the system most likely to be attacked?

A. it has weak security B. it contains company documents C. it is available to external users D. it contains the default administrator account

Computer Science & Information Technology