A high-security defense installation recently begun utilizing large guard dogs that bark very loudly and excitedly at the slightest provocation. Which of the following types of controls does this BEST describe?

A. Deterrent
B. Preventive
C. Detective
D. Compensating


Answer: A. Deterrent

Computer Science & Information Technology

You might also like to view...

When you use the arrow keys to move very small distances, it is called ____.

a. scaling b. baseline shifting c. trapping d. nudging

Computer Science & Information Technology

In MySQL Administrator, you can use the ____ section to manage user privileges.

A. Server Connections B. Server Information C. Catalogs D. User Administration

Computer Science & Information Technology

In the figure above, the number 4 refers to the ____________________ control.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

When the derived class gets all the member variables from the base class, we say that they are _________ from the base class.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology