1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Savatey [412]
3 years ago
15

Which information purpose uses video from a security camera?

Computers and Technology
1 answer:
jarptica [38.1K]3 years ago
7 0

Answer:

robbery

Explanation:

it records a robbery so that police can later find out who did it

You might be interested in
The move toward access instead of ownership is a sign of collaborative consumption.
Nina [5.8K]

Answer:

the answer is true

Explanation:

8 0
3 years ago
What is key to remember when handling linked lists?
djyliett [7]

Answer:

Some key points to remember, when handling the linked list are as follow:

  • Linked list is the linear data structure in which each of the elements contain separate object.
  • Linked list components are not store in a contiguous location.
  • In the linked list the elements or components are basically use the pointers for linked with another elements.
  • The last node of the linked list must contain null value.
  • In the linked list, the allocation of the memory is equal to upper node limit.
7 0
3 years ago
How to do the for loop in python
shusha [124]

Answer:

To loop through a set of code a specified number of times, we can use the range() function, The range() function returns a sequence of numbers, starting from 0 by default, and increments by 1 (by default), and ends at a specified number.

Explanation:

hope this helps

8 0
3 years ago
A(n) _______ attack attempts to make a server or network unavailable to serve legitimate users by flooding it with attack packet
malfutka [58]

Answer:

DoS or Denial of Service

Explanation:

Have a nice day! :)

3 0
3 years ago
Project 1-1: Set Up a Small Network
Wewaii [24]

Answer:

a. peer-to-peer

b star topology

Explanation:

3 0
3 years ago
Other questions:
  • Allan needs to ensure that an object is in a very precise location on a slide. He decides to use the Ruler option to achieve thi
    5·2 answers
  • Write a program that will askthe user to enter the amount of a purchase. The program should thencompute the state and county sal
    5·1 answer
  • Why do most laptops have LCD rather than OLED displays, which are found on mobile devices?
    9·1 answer
  • How do you record yourself on a macbook pro
    9·1 answer
  • Which is slower RAM or the CPU?
    11·2 answers
  • Is downloading like installing?
    13·1 answer
  • A 1000 elements array is used to store integers ascending order . The array is used to search binary search algorithm for the in
    14·1 answer
  • Today, scientists agree that good research is ethical in nature and is guided by basic respect for human dignity and safety. How
    6·1 answer
  • Which of the following describe audio-editing software? Choose all that apply.
    5·2 answers
  • You arrive at school on Friday for a field trip ! What a lucky day!You need to figure out what room you are in before leaving. Y
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!