A high-security defense installation recently begun utilizing large guard dogs that bark very loudly and excitedly at the slightest provocation. Which of the following types of controls does this BEST describe?
A. Deterrent
B. Preventive
C. Detective
D. Compensating
Answer: A. Deterrent
Computer Science & Information Technology
You might also like to view...
When you use the arrow keys to move very small distances, it is called ____.
a. scaling b. baseline shifting c. trapping d. nudging
Computer Science & Information Technology
In MySQL Administrator, you can use the ____ section to manage user privileges.
A. Server Connections B. Server Information C. Catalogs D. User Administration
Computer Science & Information Technology
In the figure above, the number 4 refers to the ____________________ control.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
When the derived class gets all the member variables from the base class, we say that they are _________ from the base class.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology