1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leni [432]
4 years ago
11

An organization has opened a new office in a somewhat risky neighborhood. The office manager installs a CCTV system to monitor t

he perimeter and main entrance 24 hours a day.
This an example of a _____________ control.

a. Detective
b. Corrective
c. Preventive
d. Administrative
Computers and Technology
1 answer:
lorasvet [3.4K]4 years ago
5 0

Answer:

Option A i.e., Detective.

Explanation:

When an organization, in a very bad area, recently started a new office. The manager installs a CCTV device for 24-hour surveillance of the area and entrance. So, the following scenario is about the detective control because If users start understanding that their actions are registered and tracked through authenticating into the computer to execute a function.

You might be interested in
2.7 code practice question 1 edhesive
Virty [35]

I will edit this if you edit your question..

Im confused. This is not a question..

8 0
4 years ago
Read 2 more answers
1: define about information system in computer?
kobusy [5.1K]

Explanation:

1. Information system is a collection of people, procedures, software, hardware, and data to provide essential information to run an organization.

2. Thesaurus is a software tool used in Microsoft Word document to provide synonyms and antonyms for a selected word.

3. Computer component refers to a basic physical element that is required by the computer to function.

5 0
3 years ago
Keystroke loggers are stealth software packages that are used to monitor keyboard activities. Which is the best location to plac
irina [24]

Answer: Keyboard hardware & the operating system

Explanation:Keystroke loggers is also referred as the monitoring system which is a for the inspection of the every key pressed on an operating system. This technology monitors the activities of keypad devices such as smart phones etc. It is also used for the surveillance of the unauthorized activities that are done by the hackers or criminals.

Thus the correct option is keyboard hardware and the operating system is the location of the placement of the key loggers.

7 0
3 years ago
A cyber community is different than a physical community because _________________. A.people can go to restaurants to meet frien
jeka94
I believe the question is asking which of the options is true about a cyber community. In that case, only D is true, as a cyber community, such as facebook or instagram, gives you that ability. The rest of the options only apply to a physical community.
7 0
3 years ago
Why does the position of drawCircle(x, y, r) in the answer choices matter?
Andrei [34K]

Answer:

B and C

Explanation:

xPos and yPos determine the center of the circle, and rad determines the radius of the circle drawn.

It cannot be A because it starts drawing a circle with the center of (4, 1). None of the circles ahve a center at (4, 1). It is B because while it does start at (4, 1), the repeat function adds one to the y and radius. While ti repeats 3 times it ends up drawing all 3 circles. C also works because it starts by drawing the biggest circle and then subtracting the values to make the other two. It cannot be D because in the repeat function it subtracts from the y value and radius too early, it doesn't draw the biggest circle.

6 0
2 years ago
Other questions:
  • Behaving in an acceptable manner in a workplace environment is referred to as workplace etiquette.
    12·2 answers
  • What is the solubility of an empty soda can
    10·1 answer
  • What is ucspi-tcp pakage in qmail??
    5·1 answer
  • Create a detail report that will display all SCR courses in alphabetical order, with the course name and the instructor name in
    5·1 answer
  • Some computer engineering students decided to revise the LC-3 for their senior project. In designing the LC-4, they decided to c
    13·1 answer
  • Go online and research the computer topic
    6·1 answer
  • ____________ is a script or a tool that obtains privileges of a root
    8·1 answer
  • In the table below, identify the data type that would be most suitable for the second field.
    10·2 answers
  • Analog computers are general purpose computers : true ? or false ?​
    8·1 answer
  • Instructions: Write a program that calculates the amount of ingredients needed for various flavors of cheesecake.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!