1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fiesta28 [93]
2 years ago
12

During an IFR flight in IMC, you enter a holding pattern (at a fix that is not the same as the approach fix) with an EFC time of

1530. At 1520 you experience complete two-way communications failure. Which procedure should you follow to execute the approach to a landing?
Computers and Technology
1 answer:
OLEGan [10]2 years ago
8 0
It’s firgeotos approach because it’s landing communication
You might be interested in
Which one of the following is true about employer responsibility in providing fall protection to workers? not selected A. Employ
Luda [366]

Option B is the correct answer, Employers have flexibility in choosing a fall protection system they believe will work best in a situation selected. It is the primary duty of employer to provide safety to its workers. Employers must setup a suitable protection system at workplace from falling off from overhead platforms and from elevated workstations during construction for safety of its employees.  

Further Explanation:

⦁ Employer must ensure compliance to OSHA-Fall protection in construction.

⦁ Generally, fall protection must be ensured by deploying guardrail systems at the edge of construction sites, safety systems built by nets or personal fall arrest.

⦁ OSHA requires to built fall protection system irrespective of fall distance to make sure safety conditions for workers/ employees.

Answer details:

Grade: High School

Subject: Computer Science and Technology.

Learn More:

Fall protection and compliance to OSHA rules and regulations

brainly.com/question/8910167

Employer responsibility in providing fall protection

brainly.com/question/5872956

Key Words: Fall protection, OSHA, workplace safety, guardrail systems etc.

Image of guardrail as an example is attached.

5 0
3 years ago
Read 2 more answers
A chief Information Security Officer (CISO) is performing a BIA for the organization in case of a natural disaster. Which of the
nataly862011 [7]

Answer:

The correct answer is option (D) Identify the impact on safety of the property

Explanation:

Solution

In every Business Impact Analysis, the first and the most important step is for the CISO is to identify and estimate the impact of the aftereffects on the business and property of an organization that may be occurred from the disaster.

Physical security is very important, but it is not noticed by most organizations. It is important if you do not want anyone to take  away your information or destroy it, in case of natural calamity. the reason could be that, the intruder is  doing it for his personal achievement, financial gain,or seeking revenge or when one is taken unaware and becomes a target. If this security is not maintained properly all the safety measures will not be useful once the attacker gets through by gaining physical access.

Example of property can be software, equipment, facilities, company’s assets.

4 0
3 years ago
I need help with coding in python!
Harlamova29_29 [7]

Answer:

B

Explanation:

3 0
3 years ago
An electric kettle has the resistance of 30ohms what will flow when it connected to a 240v supply... find also the power rating
SVEN [57.7K]

Answer:

Power = 1920 Watts or 1.92 Kilowatts

Explanation:

Given the following data;

Resistance = 30 Ohms

Voltage = 240 Volts

To find power rating of the kettle;

Mathematically, the power consumption of an electric device is given by the formula;

Power = voltage²/resistance

Substituting into the formula, we have;

Power = 240²/30

Power = 57600/30

Power = 1920 Watts or 1.92 Kilowatts

4 0
3 years ago
What internet access technology currently uses a technology called 4G?
Leya [2.2K]
Phone wireless data plans.
8 0
3 years ago
Other questions:
  • The work principle is not always true<br> T or F
    11·2 answers
  • For a class project, Jerome builds a simple circuit with a battery and three light bulbs. On his way to school, Jerome drops his
    9·1 answer
  • A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The c
    14·1 answer
  • ____ software is rights-protection software used to control the use of a work.
    9·1 answer
  • Robert works in a call center and receives a call from Kathy. Kathy says she can no longer access the online reporting applicati
    13·1 answer
  • Bob has 2 candy bars he is fat what hapennes
    5·2 answers
  • Whenever you press a key, click the mouse or start an application, you're sending instructions tow
    9·1 answer
  • Consider the following code.
    7·2 answers
  • What is the next line?
    7·1 answer
  • Which of the following is an example of phishing attack? csp
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!