1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bess [88]
4 years ago
9

What part of an emergency operations plan typically documents the methods, procedures, actions, and responsibilities for a criti

cal operational function (such as communications or mass care) during emergency operations?
A. Threat/hazard/incident-specific annexB. Supporting annexC. Implementing instructionsD. Basic plan
Computers and Technology
1 answer:
KatRina [158]4 years ago
5 0

Answer:

D. Basic Plan

Explanation:

Basic plan simply involves the keeping record of methods and actions with responsibilities of an important operational function at the course of emergency operations.

You might be interested in
Write a subclass called SavingsAccount that extends Account and adds an interest rate variable. Write a constructor with 3 argum
AveGali [126]
Okayama sintered Nuni 19371
5 0
3 years ago
A normal HDMI signal has a colour depth of 8 bits per each of RGB colour. The maximum number
Marysya12 [62]

Answer: B

Explanation:

if each color can be represented as 8 bits and you have 3 colors total that would mean you would need 24 bits to represent the entirety of the RGB spectrum. And each bit can either be on or off so you have two choices for each one. So the total amount of colors you can have for 8bit RGB would be 2^{24} which is 16,777,216.

6 0
3 years ago
To add the word "confidential" to the background of a page, users would need to _____.
KengaRu [80]
I beleive you need to insert a watermark
3 0
3 years ago
Defeating authentication follows the method–opportunity–motive paradigm.
sashaice [31]

Answer:

Method:- This is related to hackers technique and way of accessing to copy other data. It also includes the skill, knowledge, tools and other things with which to be able to pull off the attack.

Opportunity:- this is related to how a user gives way to access to the hackers. It includes the time, the chance, and access to accomplish the attack.

Motive:- This may relate to the hacker to destroy the reputation of another or for money. It is reason to want to perform this attack against this system

3 0
3 years ago
calculate how much memory is needed to store a foir minute music trackusing the of bytes needed per second from above​
sergeinik [125]

Answer:

1400 bytes

hope that helps!

4 0
3 years ago
Other questions:
  • Which of the following is NOT a search engine ( Bing, Yahoo, Ask, Twitter)
    6·2 answers
  • What allows user to double click with the mouse in a document to move the insertion point to a new location.?
    8·1 answer
  • A network host with an IP address of 192.168.10.200 wants to send a message to a destination computer with an assigned IP addres
    6·1 answer
  • A table is a predesigned database that includes professionally designed database objects.
    12·1 answer
  • Write a program that produces this output:
    10·1 answer
  • FOR ALL PLATO USERS:
    10·2 answers
  • Please help with attached file
    8·2 answers
  • What factors contribute to food wastage
    12·1 answer
  • When you move a paragraph in a document that includes text with a footnote, what happens to the footnote reference?
    14·1 answer
  • The introduction of an academic paper must include a:
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!