1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leni [432]
4 years ago
11

An organization has opened a new office in a somewhat risky neighborhood. The office manager installs a CCTV system to monitor t

he perimeter and main entrance 24 hours a day.
This an example of a _____________ control.

a. Detective
b. Corrective
c. Preventive
d. Administrative
Computers and Technology
1 answer:
lorasvet [3.4K]4 years ago
5 0

Answer:

Option A i.e., Detective.

Explanation:

When an organization, in a very bad area, recently started a new office. The manager installs a CCTV device for 24-hour surveillance of the area and entrance. So, the following scenario is about the detective control because If users start understanding that their actions are registered and tracked through authenticating into the computer to execute a function.

You might be interested in
The physical parts of the computer that you can see and touch are called______.
Tatiana [17]
Physical parts of computer: Computer Hardware
5 0
3 years ago
The frame header at the Data Link layer includes hardware addresses of the source and destination NICs. What is another name for
Trava [24]

Answer:

The answer is "MAC address"

Explanation:

In the given statement some information is missing, that is the choices of the question, which can be described as follows:

A. MAC address

B. DAC  address

D. PAC  address

It is a unique id, that allocates to a routing protocol device for use as a network handle a network group interactions. Its use is popular in many other IEEE 802, like Lan, Wi-Fi, and other wireless technology, and certain alternative was wrong, which can be defined as follows:

  • In option B, DAC stands for both digital and data access control, that's why it is not correct.
  • In option C, It is used to access transmission medium, that's why it is wrong.
8 0
3 years ago
What is signature in an E-mail​
Ber [7]

Answer:

sincerely, Your Name it has its own line at the very end of the email

4 0
4 years ago
Which are examples of embedded systems? Choose two answers.
SVEN [57.7K]

Answer:

An operating system inside a virtual machine

Smart TVs

Explanation:

We can explain an embedded systems like a system within other system, in this case we have two examples, the smart TV have an operative system in some cases an Android system, and this system is within the television system, the virtual machine is the same concept, we can have an Android system running in a windows system.

7 0
3 years ago
Problem of Nigeria under primary education
Artist 52 [7]
Primary school education in Nigeria is bisected with myriads of problems including: poor funding, poor educational infrastructures, overcrowding, inadequate classrooms and poor/polluted learning environment
8 0
4 years ago
Other questions:
  • To resize an embedded chart, ____. select one:
    5·1 answer
  • To protect your answers after completing an assignment, what should you do? close your browser window. let someone else start wo
    14·1 answer
  • What is the lowest layer of the osi model at which wired and wireless transmissions share the same protocols?
    11·1 answer
  • You want to find information about Paris, France in the last five years, written in English. What is the best way to search for
    5·2 answers
  • Which of the following is the formula used to calculate the risk that remains after you apply controls? a. ALE=SLExARO b. Total
    9·1 answer
  • While doing online research you enter this keyword search with a truncation character: man* Which of the following would not be
    15·1 answer
  • Body paragraphs in a report have a first-line indent of _____ inch. *
    9·1 answer
  • Alright, so I have a wireless mouse that uses a dongle (it's not Bluetooth nor wired). But recently I realized that none of the
    12·1 answer
  • Which of the following does NOT describe the characteristics of cyberbullying?
    15·2 answers
  • Ok it is important aspects which is perfect
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!