1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
den301095 [7]
3 years ago
13

What dod regulation governs the use of commercial wireless devices within the global information grid?

Computers and Technology
1 answer:
NemiM [27]3 years ago
5 0
The <span>dod regulation that governs the use of commercial wireless devices within the global information grid is:</span>DOD 8100.2
The regulation was first enacted in 2004.  The regulations established several ground rules on the <span>use of commercial wireless devices, services, and technologies</span>
You might be interested in
Organizations can face criminal or civil penalties for being ______ in protecting their sensitive data.
MakcuM [25]
The answer to this question is A. hope this helped thanks.
6 0
3 years ago
Read 2 more answers
What are the common camera hazards? When might you encounter these hazards in your life, and what do you plan to
jok3333 [9.3K]

Answer:

Common Camera hazards are dust, sand, non-microfiber cloths, oil, water, shocks, and blunt force. In order to avoid them, be sure to use lens covers, microfiber cloths, camera cases, camera jackets (can be improvised using a towel), and keep the neck strap on your neck.

4 0
3 years ago
The bantu and arabic languages blended, creating what new language?
Anon25 [30]
The answer is swahili

Basically, the Swahili language is of an African Bantu origin with borrowed words from other languages like Arabic. It dates back to the interactions between the Arabian traders and the inhabitants of the east coast of Africa. The language was often thought to be an interaction between Bantus and Arabs. Arab cultures had a huge influence on the Swahili language.




5 0
4 years ago
Read 2 more answers
The term composite would be used to describe an image that was altered by the Crop tool.
patriot [66]

Answer:

Would it be false?

5 0
3 years ago
You need to view the contents of /var/log/auth.log to get information about the users that have been logging on to the system. T
leva [86]

Answer:

more /var/log/auth.log

less /var/log/auth.log

Explanation:

The commands that can be used to view the content of the auth.log file page by page are:

more /var/log/auth.log

less /var/log/auth.log

5 0
3 years ago
Other questions:
  • It is safe to stand on the top step of a ladder provided it is braced property
    10·1 answer
  • Morena has been assigned to develop a program that will analyze data for a real estate firm. She needs to study the patterns in
    11·1 answer
  • Create a project named ClassicBookSelector that contains a Form with a ListBox that lists at least five classic books that you t
    10·1 answer
  • The conversion of decimal 0.0625 into its binary equivalent. Explain.
    7·1 answer
  • All of the following municipal securities are quoted on a yield basis EXCEPT: A) term bonds. B) secured bonds. C) tax-anticipati
    10·1 answer
  • 2. Write a Python regular expression to replace all white space with # in given string “Python is very simple programming langua
    14·1 answer
  • Which of the following describes a characteristic of organic light-emitting diodes (OLEDs) used in clothing?
    6·2 answers
  • Question 3 (8 marks): Write a program that takes a string from the user and splits it into a list using a space (" ") as the del
    13·1 answer
  • What are the importance of rules in the computer lab ?​
    12·1 answer
  • Differentiate between off the shelf software and bespoke software
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!