1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Savatey [412]
3 years ago
15

Which information purpose uses video from a security camera?

Computers and Technology
1 answer:
jarptica [38.1K]3 years ago
7 0

Answer:

robbery

Explanation:

it records a robbery so that police can later find out who did it

You might be interested in
List and briefly describe passive and active security attacks.
Rama09 [41]

Answer:

Passive security attack are the unauthorized disclosure in the network attack. In this type of security attack a system are use for monitoring and sometimes scanning the open port. It basically include the monitoring the unprotected data and traffic analysis.

On the other hand, active security system modify the transmitted data and gain the unauthorized access from the computer system.

This type of security attack basically monitor the file transfer and electronic mail from the attacks which can be pass in the form of viruses in the computer system.

4 0
3 years ago
A search engine searches what to find a match for the query
mylen [45]

Answer:

your keyword

Explanation:

3 0
3 years ago
3. Answer the following questions.
stiks02 [169]

Answer:

Computers use the binary number system to store data and perform calculations.

Explanation:

4 0
3 years ago
a 83. is a transition method that encapsulates ipv6 traffic inside ipv4 packets. a. tunneling c. natting b. scheduling d. dual s
finlep [7]

Tunneling  is a transition method that encapsulates ipv6 traffic inside ipv4 packets.

<h3>What is Tunneling?</h3>

Tunneling is known to be a term that connote a kind of a protocol that gives room for the secure transmission of data from a single network to another.

Note that the act of Tunneling involves giving room also to private network transmission to be sent across a given public network, such as the Internet, via a process known to be encapsulation.

Hence, based on the above, Tunneling  is a transition method that encapsulates ipv6 traffic inside ipv4 packets.

Learn more about Tunneling   from

brainly.com/question/18994946

#SPJ4

8 0
1 year ago
Please help! Research the critical new developments in telescopes, and telescopic lenses. Write a 200 word paper on the new deve
maxonik [38]
Well start off explaining what the new developments in telescopes are and go from there. Here's an example: Telescopes are evolving with new developments lets talk about them.
-
-
Please Mark Brainliest!!
4 0
3 years ago
Read 2 more answers
Other questions:
  • PLEASE HELP PROGRAMMING WILL GIVE BRAINLIEST
    11·2 answers
  • You are researching RAM for a computer you are building for a friend who will be using the system as a home office server for he
    13·1 answer
  • 18 Select the correct answer.
    5·1 answer
  • Match the spreadsheet features with their respective descriptions.
    9·2 answers
  • The following relation schema can be used to register information on the repayments on micro loans.
    13·1 answer
  • Where are the worksheet tabs located
    7·1 answer
  • The metric unit used for length
    5·1 answer
  • Digital learning can help students who enjoy
    14·1 answer
  • FOR A BRAINLIEST
    14·1 answer
  • What special enterprise VPN supported by Cisco devices creates VPN tunnels between branch locations as needed rather than requir
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!