____ is the use of video cameras to monitor activities of individuals, such as employees or individuals in public locations, for work-related or crime-prevention purposes.

A. Computer monitoring
B. Computer surveillance
C. Multimedia surveillance
D. Video surveillance


Answer: D

Computer Science & Information Technology

You might also like to view...

Describe the characteristics and purpose of fact and dimension tables and explain how you recognise that this data mart is based on a star schema design. Illustrate your answer using the data mart tables in Figure 32.3

What will be an ideal response?

Computer Science & Information Technology

When new programmers perform range checks, they are prone to using logic that includes too many decisions, entailing more work than is necessary.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The meta tag is a(n) ______ tag so it does not require a closing tag in HTML5.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Digital coding techniques such as binary with eight-zero substitution (B8ZS) are becoming more popular because they are designed to

a. provide error-free signaling. b. operate at higher data rates. c. eliminate bipolar violations. d. maintain ones density standards.

Computer Science & Information Technology