1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gala2k [10]
4 years ago
12

In real-world environments, risks and their direct consequences will most likely span across several domains. However, in the la

b, you selected only the domain that would be most affected. What was the primary domain impacted by the following risk, threat, and vulnerability?
Service provider has a major network outage
Computers and Technology
1 answer:
Evgesh-ka [11]4 years ago
8 0
J’mealea oiu toava granega sesis.
You might be interested in
Explain what it means to have good file management skills.
sammy [17]
I think it means that people are good with files and organizing the files.
8 0
3 years ago
2. How do cell phone users stay connected to the network as users move between cells?
kramer

Answer: Cell phones use radio waves to communicate

Explanation:

Radio waves carry the information and travel in air at the speed of light. Cell phones transmit radio waves in all directions.

5 0
3 years ago
What is the deck of a suspension bridge called​
Allushta [10]

Answer:

that would be the tension in the cables and compression in the towers I believe, my aunt and my uncle work on technology stuff and I'm learning from them.

8 0
3 years ago
It is not possible to use keywords to search for themes
ivolga24 [154]
Yes it is you just need to know what you are doing

6 0
3 years ago
ASAP: Type the correct answer in the box. Spell all words correctly.
DerKrebs [107]

Answer:

has?

Explanation:

i think i need a few more details then we can talk

4 0
3 years ago
Other questions:
  • The variable sentence stores a string. Write code to determine how many words in sentence start and end with the same letter, in
    13·1 answer
  • You would like the user of a program to enter a customer’s last name. Write a statement thaUse the variables k, d, and s so that
    5·1 answer
  • What is the efficiency (Big O Notation) of quicksort algorithm?
    15·1 answer
  • What is distribution hardware?
    14·1 answer
  • Functions can accept any number of arguments.
    8·1 answer
  • A local bank has just one branch. It sets up a peer-to-peer network for all devices on the system. The bank would like to be abl
    12·1 answer
  • I’m gonna ask this again because I REALLY need an answer.
    10·2 answers
  • WHAT TYPES OF ACTIVITIES ARE PERFORMED BY HEALTH CARE SOFTWARES
    8·1 answer
  • 3. Comparing the Utopian and dystopian views of Technology according to Street (1992) which one in your view is more applicable
    9·1 answer
  • WHO WANT P O I N T S.................................................
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!