1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
12345 [234]
3 years ago
8

In regard to protective actions for explosive devices, the area where the blast originates is referred to as ___________ perimet

er/isolation zone. select one: hot warm security cold
Computers and Technology
1 answer:
Lapatulllka [165]3 years ago
3 0
The hot perimeter or isolation zone would be the area wherein the blast coming from an explosive device originates. In addition, as the distance from the origin of the blast increases, in which these would now be the warm and cold zones, the damage of its surroundings decreases as well. 
You might be interested in
You have an application that you would like to run on your Windows workstation every Monday at 3:00 p.m. Which tool would you us
NikAS [45]

Answer:

Task Scheduler

Explanation:

Task Scheduler allows you to automate tasks in Windows 10

7 0
3 years ago
What laws are broken when you hack someone?
postnew [5]

Answer:

it depends

Explanation:

if you are hacking for a purpose that is benefiting the person being hacked, that is ethical hacking. ethical hacking is not illegal, as long as you get permission from the person being hacked.

if you hack someone without their knowledge, that is unethical hacking, and that is in many cases, a crime, and if it has enough of a detrimental effect on a companys process, it could land you into prison and earn you a hefty fine.

ethical hacking is good for testing a networks security, and if all is well, the ethical hacker shouldnt be able to get into a network if it is secured properly.

6 0
3 years ago
Which one of them are the correct answers?
Tpy6a [65]

Rapid prototyping! I am sure that is correct


6 0
3 years ago
A database is a collection of integrated and related _____.
ioda
C) files
Because technologys data goes into files
4 0
3 years ago
Read 2 more answers
The image uses a school of fish to symbolize leadership.
timurjin [86]
Front is the answer because the fish is in red while the rest are in blue
5 0
4 years ago
Read 2 more answers
Other questions:
  • Which is an example of withholding you might see on your pay stub
    14·2 answers
  • What was the partition style(s prior windows server 2008 and windows vista?
    13·1 answer
  • While a threat intelligence analyst was researching an indicator of compromise on a search engine, the web proxy generated an al
    7·1 answer
  • HOW IS THE AUTOFILL FEATURE HELPFUL? A.IT CREATE A NEW FORMULA FOR EVERY CELL IN THE DOCUMENT B.IT CAN SAVE TIME BY ALLOWING YOU
    13·1 answer
  • How can you ensure that your web pages are compliant with a w3c standard?
    9·1 answer
  • Which programming element is used by a game program to track and display score information
    12·2 answers
  • Please give me correct answer<br><br>please give me very short answer​
    13·1 answer
  • List any two different between primary memory and secondary memory.​
    8·2 answers
  • I connected to an external hard drive to transfer some photos from my vacation. When I try to drag the photo, it bounces right b
    14·1 answer
  • Enabling encryption of all data on a desktop or laptop computer is generally considered:______.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!