1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
suter [353]
3 years ago
6

A ____ by a design professional is used to determine the best system to provide the appropriate level and type of protection.

Computers and Technology
1 answer:
AleksAgata [21]3 years ago
8 0
A HAZARD EVALUATION by a design professional is used to determine the best system to provide the appropriate level and type of protection. Hazard evaluation involves systematic identification and analysis of hazards that are associated with a particular product or process. This gives one the opportunity to avoid these hazards.  
You might be interested in
Gary says, "Ports are where data enter a network before reaching a gateway. The data travel via transmission media." Explain why
Romashka [77]

Answer:

He is wrong, it is the communication endpoint.

4 0
4 years ago
Read 2 more answers
Cuando hablamos de entornos digitales de enseñanza aprendizaje a que nos estamos refiriendo
olga2289 [7]

Answer:

Al hablar de entornos digitales de enseñanza y aprendizaje, la frase apunta al avenimiento de medios informáticos y tecnológicos al proceso metodológico de enseñanza de los distintos sistemas educativos a nivel mundial.

Así, la irrupción del internet como medio de búsqueda de información y las herramientas digitales como vídeos, diapositivas y libros electrónicos como métodos de presentación de información han facilitado el acceso de los alumnos y docentes al conocimiento a través de la generación de un entorno digital que permite a estos un acceso mas rápido y abarcativo al conocimiento.

7 0
3 years ago
January 16, 2018 Q1: This question is worth 99 points and a brainliest. It is a one part question. Medium difficulty.
Naddik [55]
Well, some countries think of the Internet like as if it was a weapon. The Internet to them does not seem like what the Internet is to us. Internet features like the Dark Web or Deep web has given them enough reasons on why they should be prohibiting it.
6 0
3 years ago
Read 2 more answers
Which of the following was the most significant impact the NEA had on the performing arts industry? W
Sedaia [141]

Answer:

The NEA’s focus on building new performing arts centers led to an increased production of arts.

5 0
3 years ago
Which of the following lists the stages of the four-stroke engine cycle in the correct order of operation?
kvasek [131]
The answer is (a) Intake, Compression, Power, Exhaust.
The fourth-stroke engine cycle or the commonly known as the four cycle is a type of engine that completes four separate strokes while turning a crankshaft. First is the Intake where the piston begins at TDC. Second is the compression where it begins at BDC and the piston compresses the air-fuel mixture for ignition. Third is combustion where the second revolution of the cycle starts. Last is the exhaust where the piston once again returns to TDC from BDC.
6 0
3 years ago
Other questions:
  • Write a function "hailstone"that takes an int "n2"and prints the hailstone sequence. Hailstone Numbers:This sequence takes the n
    15·1 answer
  • Choose the two main capabilities involved in visual literacy
    13·1 answer
  • Sending packets with false ip source addresses is called ____. ip address spoofing a port scanning attack a ip address scanning
    11·1 answer
  • A company that offers services for accessing and using the Internet is: *
    10·1 answer
  • To paste text with the same formatting as the document in which it is entered, select _____ from the Paste menu. Keep Source For
    12·2 answers
  • What does “default” refer to? the ability to be used as, or directly converted to, cash. the failure to pay back a loan. the amo
    8·1 answer
  • Which studio produced the film the jazz singer the first of many talkies
    11·1 answer
  • Define the following:-<br><br>1) cryptography<br><br>2) Quantum Cryptography​
    10·2 answers
  • Write a function that receives a one-dimensional array of integers and returns a Python tuple with two values - the minimum and
    10·1 answer
  • When a file is used by a program, there are three steps that must be taken:
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!