1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dafna11 [192]
2 years ago
5

You have been asked to report on the feasibility of installing an IP CCTV camera system at your organization. Detail the pros an

d cons of an IP CCTV system and how you would implement the system.
Computers and Technology
1 answer:
Vinil7 [7]2 years ago
7 0

Answer and Explanation:

IP CCTV:

New dangers are acquainted with the security world as frameworks move from conventional simple to IP organize empowered frameworks especially in video reconnaissance. Web Protocol (IP) give an open stage to incorporation at the information level of various security and life wellbeing gadgets and applications.

Pros: of IP CCTV :

  • Lower starting expense: Harnessing the IT framework decreases establishment costs in cabling, related control and electrical plugs.
  • Wide-spread similarity
  • Gives adaptability and versatility
  • Higher security and versatility
  • The tight programming joining between frameworks make them progressively canny and diminishes security holes, accelerate the reaction time.

Cons of IP CCTV

  • It rotates around system security and programmers danger.
  • The hazard increments if camera is gets to from the portable or telephone.
  • The hazard increments if camera is gets to from the portable or telephone.
You might be interested in
"You are on a service call to fix a customer’s printer when she asks you to install a software package. The software is on a per
pickupchik [31]

Answer:

Ask her to get a genuine software

Explanation:

if i will install, it can cause the following problems:

1. Prated software makes your system Vulnerable to the security attacks because the activities of the software are not monitored by any organization and no one is responsible for anything bad happened to your system.

2. It may stop working anytime because there would not be maintenance patches available for it so that it can work properly.

3. It cannot be updated and may cause problems in core functionalities of it.

4.Serious legal actions can be taken against anyone using them because  economy has drastic decrease due ti use of it.

7 0
2 years ago
Getting access to web browsing software to install it on a computer or to update your existing software is called _________ .
Ivenika [448]

Answer:

Downloading and/or Burning it on to your computer

Hope this helped! if so please mark it as brainliest

Explanation:

8 0
2 years ago
Read 2 more answers
Which term describes the second core IPSec security protocol; it can perform authentication to provide integrity protection, alt
Sphinxa [80]

Answer:

Encapsulating Security Payload (ESP)

Explanation:

Encapsulating Security Payload is also known as ESP, it is a protocol that exists within IPSec, it helps in determining the authentication, integrity and how confidential network pack data / Payload in IPV4 and IPV6 networks are.

ESP supplies messages /Payload encipher, it also helps in authenticating Payload as well as where it originated from in the IPSec protocol suite.

6 0
3 years ago
Who developed the Great Compromise ​
Nostrana [21]

Answer:

Roger Sherman

The solution came in the form of a compromise proposed by statesmen Roger Sherman and Oliver Ellsworth of Connecticut. The Great Compromise created two legislative bodies in Congress.

Explanation:

comment how it helps

7 0
2 years ago
What is the code for Pong that would work on Khan Academy?
Rashid [163]
Draw = function() {
if () {
if (keyCode === ){
();
}
else if (keyCode === ) {
();
}
}
};
7 0
2 years ago
Other questions:
  • What is Least effective at preventing a computer virus
    10·1 answer
  • Which strategy are you using when you only read the title, section headings, and captions?
    12·2 answers
  • After placing her insertion point after Grandma’s Kitchen, order the steps Danica needs to follow to insert and format the regis
    8·2 answers
  • Which of the following definitions describes a chemical hazard?
    8·2 answers
  • How is a correction made to an Electronic health record?
    14·1 answer
  • When including multiple images in a report, it may help to create a _____ on each image so you can cross reference them througho
    11·1 answer
  • Question 4 (Multiple Choice Worth 5 points)
    6·1 answer
  • Which of the following is not part of the four ways you can avoid problems with email communication?
    12·1 answer
  • How do I create a powershell script to make a Windows user account that is a non-admin user
    7·1 answer
  • Greg is concerned about the use of ddos attack tools against his organization, so he purchased a mitigation service from his isp
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!