Scenario: While driving, use of cellphone by the driver can result in penalty (challan) and for corresponding evidence & tracking purposes, Traffic Police Division has deployed digital cameras on the roads, which are connected to the main control room. You are working as an Information Technology Officer in Traffic Police Division. Q.1.                                                                                                                              If any of these road-side digital cameras is offline, i.e. not able to transmit to control room, describe which technologies can you use to transfer images from such a digital camera to a computer/ laptop (not mobile). Enlist any 5 wired & wireless technologies, both. Briefly, provide assumptions for each technology, if any. Answer:   Technology Name Assumptions 1.     2.     3.

Management Of Information Security
6th Edition
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:WHITMAN, Michael.
Chapter2: Compliance: Law And Ethics
Section: Chapter Questions
Problem 1EDM
icon
Related questions
Question

Scenario:

While driving, use of cellphone by the driver can result in penalty (challan) and for corresponding evidence & tracking purposes, Traffic Police Division has deployed digital cameras on the roads, which are connected to the main control room. You are working as an Information Technology Officer in Traffic Police Division.

Q.1.                                                                                                                             

If any of these road-side digital cameras is offline, i.e. not able to transmit to control room, describe which technologies can you use to transfer images from such a digital camera to a computer/ laptop (not mobile). Enlist any 5 wired & wireless technologies, both. Briefly, provide assumptions for each technology, if any.

Answer:

 

Technology Name

Assumptions

1.

 

 

2.

 

 

3.

 

 

4.

 

 

5.

 

 

Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Internet
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Management Of Information Security
Management Of Information Security
Computer Science
ISBN:
9781337405713
Author:
WHITMAN, Michael.
Publisher:
Cengage Learning,