____ is the use of video cameras to monitor activities of individuals, such as employees or individuals in public locations, for work-related or crime-prevention purposes.
A. Computer monitoring
B. Computer surveillance
C. Multimedia surveillance
D. Video surveillance
Answer: D
You might also like to view...
Describe the characteristics and purpose of fact and dimension tables and explain how you recognise that this data mart is based on a star schema design. Illustrate your answer using the data mart tables in Figure 32.3
What will be an ideal response?
When new programmers perform range checks, they are prone to using logic that includes too many decisions, entailing more work than is necessary.
Answer the following statement true (T) or false (F)
The meta tag is a(n) ______ tag so it does not require a closing tag in HTML5.
Fill in the blank(s) with the appropriate word(s).
Digital coding techniques such as binary with eight-zero substitution (B8ZS) are becoming more popular because they are designed to
a. provide error-free signaling. b. operate at higher data rates. c. eliminate bipolar violations. d. maintain ones density standards.