I think 1492. but i could be wrong.
Answer:Vulnerability to Hacking
Disabled Voters & Electronic Voting Machines
Voter Verified Paper Audit Trails
Accuracy in Capturing Voters’ Intent
Political Ties of Manufacturers
Secure Storage of Votes
Malicious Software Programming
Physical Security of Machines
Susceptibility to Fraud
Federal Legislation
Explanation:
<span>When searching captured or detained personnel, the guard as one of the member of the search team is positioned on the opposite side of the detainee. The guard’s responsibility is to make sure that the detainee does not run off and cause problems, and provides security for the researcher.
</span>