1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kozerog [31]
3 years ago
11

What items should you evaluate when scouting the facilities at a shooting location?

Computers and Technology
1 answer:
Fiesta28 [93]3 years ago
3 0

I would evaluate baggage and personal belongings, rooms or closets, people's clothing, and if anyone has a weapon.

You might be interested in
Select the correct answer.
Anastasy [175]

Answer:

B:Flexability

Explanation:

He wants some one flexable so they fit in with the schedule and jobs he has for the employee

5 0
3 years ago
Read 2 more answers
List two reasons why “buying a computer is no easy task” ?
ValentinkaMS [17]
The price of it and the quality of it.
6 0
3 years ago
Read 2 more answers
Declare a typedef struct named jumper_t that will have four parts: character array name that is 16 in length, double array of tr
Maurinko [17]

Answer:

The typedef struct is as follows:

typedef struct jumper_t {

  char name[16];

  double tries[N_TRIES];

  double best_jump;

  double deviation;

} jumper_t;

The declaration of jlist is:

jumper_t jlist[10];

Explanation:

This defines  the typedef structure

typedef struct jumper_t {

The following declares the variables as stated in the question

<em>   char name[16]; </em>

<em>   double tries[N_TRIES]; </em>

<em>   double best_jump; </em>

<em>   double deviation; </em>

}

This ends the typedef definition

jumper_t;

(b) The declaration of array jlist is:

jumper_t jlist[10];

6 0
3 years ago
Which model emphasizes the risk analysis phase of development
lana66690 [7]
Where are the models
3 0
3 years ago
What are the advantages of using a vpn?​
Fantom [35]

Answer:

Changing ip address to avoid ip ban. keeping your personal info safe while on public connections

Explanation:

Looked it up.

5 0
2 years ago
Other questions:
  • Two different names that refer to the same data item best defines:
    12·1 answer
  • The purpose of the ________ element is to describe the contents of a table.
    15·1 answer
  • Stealing passwords by using software code to run through various password schemes with numbers, symbols, capital letters, and ch
    6·1 answer
  • What type of network is capable of delivering voice, video streams, text, and graphics between many different types of devices o
    15·1 answer
  • Although designed to support remote dial-in access to a corporate network, what service below is commonly used with 802.1x port
    12·1 answer
  • What is the name of the unique identifier assigned to any personal computer that is connected to the internet?
    11·1 answer
  • when files on storage are scattered throughout different disks or different parts of a disk, what is it called
    10·1 answer
  • How do you change the order of the slides in your presentation in the slide pane 
    15·2 answers
  • Do pc players ever go outside?
    11·2 answers
  • Write a python program that should determine from the range you choose to enter :
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!