1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitriy789 [7]
3 years ago
6

Which major NIMS Component describes systems and methods that help to ensure that incident personnel and other decision makers h

ave the means and information they need to make and communicate decisions?
Computers and Technology
2 answers:
Elodia [21]3 years ago
9 0

Answer:

Communication Management and Information Management is the correct answer.

Explanation:

Because this explains the functions and the systems that help to make secure that decisions which are taken by the other and also for that incident personnel which have the data they want to communication and information decision. These are the components of the NIMS. So, that's why the following answer is correct.

frutty [35]3 years ago
4 0

Answer:

1.Communication Management

2.Information Management

Explanation:

NIMS has introduced COMMUNICATION management system that determines if the decision makers has the ways to communicate decisions. It has standards that defines the ways that can be used by the personnel to communicate the decisions in a better and efficient manner.

NIMS has also a system which is primarily introduced to check the the personnel has the information to make and communicate decisions called Information management. Again, it also has the templates that defines that how information should be spread considering the confidentiality of the information.

You might be interested in
6. Assume there are three small caches, each consisting of four one-word blocks. One cache is fully associative, a second is two
AURORKA [14]

Answer:

Explanation:

jk...v bbbb n jk

5 0
3 years ago
Create a public class Dog that stores a single double age set by the constructor. (Reject negative ages using assert.) Dog shoul
hjlf

Answer:

Explanation:

The following is written in Java and has the methods as requested in the question...

class Dog {

   private double age;

   public Dog(double v) {

       assert v >= 0:" Not valid";

       this.age = v;

   }

   public boolean isOlder(Dog dog1, Dog dog2) {

       if (dog1.age > dog2.age) {

           return true;

       } else {

           return false;

       }

   }

}

7 0
3 years ago
Explain what a surrogate key is.
Irina18 [472]

answer - surrogate key is a unique identifier used in databases for a modeled entity or an object. It is a unique key whose only significance is to act as the primary identifier of an object or entity and is not derived from any other data in the database and may or may not be used as the primary key.

4 0
3 years ago
If 2 people use my code D9R2M on fetch reward and scan receipts I will give brainliest ​
Ganezh [65]

Answer:

kay

Explanation:

5 0
3 years ago
Read 2 more answers
Define the types of objects that can be stored in active directory, such as user or computer accounts.
nevsk [136]
<span>Schema classes define all objects that AD can handle.</span>
8 0
4 years ago
Other questions:
  • ________ errors may indicate that an attacker is trying to send invalid data to the server. 404 303 500 512
    11·1 answer
  • Using illustration how input, process and output in latest wearable devices
    10·1 answer
  • The hotspot created by MiFi is password protected and can be used to connect Wi-Fi devices located within ____ feet of the MiFi
    9·1 answer
  • You use worksheets to perform calculations. How do you perform these calculations? ______ are used for performing calculations i
    12·2 answers
  • If totalMonths has a string value of "13", what does the code that follows display?var years = parseInt ( totalMonths / 12 );var
    6·1 answer
  • Question 3.3. Which of the following is NOT a computer protocol? FTP SMTP ISP TCP
    11·1 answer
  • Assume that Precinct Report is a structured type with these fields,address (a string),and three int fields which are counts of c
    12·1 answer
  • Select all the correct answers.
    5·1 answer
  • Private notes about individual slides that you leave for yourself or for others who might use the presentation file is called __
    13·1 answer
  • Which addresses represent valid local loopback addresses? check all that apply.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!