1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
suter [353]
3 years ago
6

A ____ by a design professional is used to determine the best system to provide the appropriate level and type of protection.

Computers and Technology
1 answer:
AleksAgata [21]3 years ago
8 0
A HAZARD EVALUATION by a design professional is used to determine the best system to provide the appropriate level and type of protection. Hazard evaluation involves systematic identification and analysis of hazards that are associated with a particular product or process. This gives one the opportunity to avoid these hazards.  
You might be interested in
To stored three characters a computer occupies. Bytes memory space
klio [65]

Answer:

The computer represents all characters and numbers internally in the same fashion. In practice, memory is measured in KiloBytes (KB) or MegaBytes (MB).

Explanation:

The computer represents all characters and numbers internally in the same fashion. In practice, memory is measured in KiloBytes (KB) or MegaBytes (MB).

4 0
3 years ago
Helen is working on her colleague’s photos. She came across this particular photo and was confused about which effect the photog
MAXImum [283]

Answer:

Blurring.

Explanation:

The effect used in the photo is blurring.

<em>Hope this helps!</em>

<em />

<em>xoxo,</em>

<em />

<em>cafeology</em>

4 0
3 years ago
Read 2 more answers
The __________ is the continuity of control of evidence that makes it possible to account for all that has happened to evidence
Free_Kalibri [48]

Answer:

chain of custody

Explanation:

According to my research on the criminal investigation process, I can say that based on the information provided within the question the term being described is called the chain of custody. This is the process of documenting every person that handles a piece of evidence from the moment it was discovered to the moment that it gets presented in court.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

5 0
3 years ago
Read 2 more answers
What is the full form of computer​
Annette [7]

Answer:

Common Operating Machine Purposely Used for Technological and Educational Research

Explanation:

4 0
3 years ago
Read 2 more answers
Administrators who are wary of using the same tools that attackers use should remember that a tool that can help close an open o
In-s [12.5K]

Answer:

False.

Explanation:

Administrators showing caution in using the same tools that are used by the attackers remember that tool that can help to close a poorly configured or open firewall will help network defender and it will minimize the risk from the attack.

Hence the answer to this question is false.

6 0
3 years ago
Other questions:
  • You have been hired to set up a network for XYZ Enterprises. What factors will you consider to determine the type of network nee
    7·2 answers
  • Fill in the blanks.
    6·2 answers
  • which of these should be reportable diseases to protect public health? A. Obesity B. Diabetes C.Measles D. Lung Cancer
    10·2 answers
  • 25 POINTS! Complete each sentence to describe the Excel interface.
    12·2 answers
  • Write a Java program that reads two numbers from the console. Based on the example in the textbook, write five methods (min, max
    14·2 answers
  • To help determine to which application a transmission should be delivered on a particular computer, TCP uses the application lay
    8·2 answers
  • I have put the question in twice and I cannot get a answer for it .. this site isn’t great in my view..
    9·1 answer
  • Who is responsible for developing the physical background for the characters by creating buildings, landscapes, and interiors?
    14·1 answer
  • What is computer system<br>explain the role of bank in computer<br>​
    15·2 answers
  • What are the advantages of Radio waves over micro waves?​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!