1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lianna [129]
3 years ago
5

Some jobs have a greater risk of workplace violence. Which of the following are factors that lead to an increased risk of workpl

ace violence?A. All of the answer choices are correct B. Making deliveries and having extensive contact with the public. C. Working in a high-crime area. D. Working in places where alcohol is served. E. Working late night or early morning hours and handling money or other valuables.
Computers and Technology
1 answer:
Aliun [14]3 years ago
3 0
Im not sure about B.  but if you can choose mutiple pick C,D,E  but if you can shoose only one than pick A 
You might be interested in
____allow(s) visually impaired users to access magnified content on the screen in relation to other parts of the screen.
Ksenya-84 [330]
I think the answer is Screen Magnifiers
5 0
3 years ago
Why coaxial cable is called coaxial cable?
lyudmila [28]

Answer: Coaxial Cable got its name as "coaxial cable" as it has two physical layer of channel in same cable axis.

Explanation: Coaxial cable is the cable that is basically composed of copper and shield of other materials.They have two physical channels and having a insulating layer between them and the outer layer serving as the ground layer. Both the channel of physical layer have the same axis that why it is termed as "coaxial".These cables are commonly used in the cable televisions , sometimes in telephone line etc.

3 0
3 years ago
Jack, a skillful hacker targeted a major banking services firm located in Japan, using the LOIC (Low Orbit Ion Cannon) tool, Jac
Elenna [48]

Answer:

denial-of-service attack (DoS attack) and distributed denial-of-service attack (DDoS attack)

Explanation:

Denial-of-service attack -

It is a type of cyber attack , where the hacker can create a machine or any network resource , which is capable to disrupt the server of the host , with the help of the internet , is referred to as the denial of service attack .

The task is accomplished with by flooding the host with many superfluous requests , which can overload the system .

In case of the distributed denial-of-service attack , the flooding is done by many different sources .

Hence , from the given scenario of the question ,

The correct answer is  denial-of-service attack (DoS attack) and distributed denial-of-service attack (DDoS attack) .

4 0
3 years ago
Which of the these is tool for creating mobile apps? A:C# B:Apple Pie C:Appy Pie D:C++​
Ratling [72]

Answer:

bhsjsbsbsb

Explanation:

<h3><em>bejwnsusb</em></h3>
4 0
2 years ago
Read 2 more answers
Which item is used for formatting in responsive web design?
trapecia [35]

Answer:

4. Removing horizontal scroll

Explanation:

Horizontal scroll can be super annoying when you're trying to view someone's web page. It can cut off part of your view and ruin the whole experience. It's best to eliminate horizontal scroll completely wherever you can.

5 0
3 years ago
Other questions:
  • In the scene where we see Don and Lina acting in a silent film (beginning at time code 11:05), describe the silent film. How is
    7·1 answer
  • What are characteristics of the Advanced Calendar options in Outlook? Check all that apply.
    9·1 answer
  • The latest form of personal communication that most resembles a public journal is a _____.
    15·2 answers
  • A communications objective is:
    12·1 answer
  • Which technology is predominately used for contactless payment systems?
    11·1 answer
  • Should the use of hacktivists by a country against enemy organizations be considered an act of war? Why or why not? How about th
    8·1 answer
  • Write a program in python to test if given number is prime or not.
    6·2 answers
  • A disk drive has 2000 cylinders, numbered 0 to 1999. The drive is currently servicing a request at cylinder 783, with the previo
    6·1 answer
  • Create a text file content.txt and copy-paste following text (taken from Wikipedia) into it: A single-tasking system can only ru
    7·1 answer
  • Which of the following best explains what happens when a new device is connected to the Internet?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!