Final answer:
Detective controls in computers and technology can discover unwanted or unauthorized activity after it has occurred. Examples include tracking cell phone connections and remotely activating phone features.
Step-by-step explanation:
A detective control is a type of control that is deployed to discover or detect unwanted or unauthorized activity. It operates after the fact and can only discover the activity after it has occurred.
In the context of computers and technology, a detective control can be likened to a security system that tracks and identifies all cell phones attempting to connect within a certain radius. Law enforcement and criminals can use specialized software to remotely activate a phone's microphone and camera, effectively planting a bug without the person's knowledge.