1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gizmo_the_mogwai [7]
3 years ago
5

Improvised Explosive Devices (IED) may be deployed in any shape, form, or size. Some of the types of IEDs are package-type IED,

vehicle-borne IED, and _______ IED.
Computers and Technology
1 answer:
m_a_m_a [10]3 years ago
6 0

Answer:

Types of IEDs are<u> individual wearing explosive-type IED</u>, package-type IED and vehicle-borne IED.

Explanation:

Improvised Explosive Devices, commonly known as roadside bombs, are a type of explosives that are developed and used for purposes other than military action. IEDs can be deployed in any form, shape or size.

Improvised Explosive Devices can be of the following types:

1. Package-type IED

2. Vehicle-borne IED

3.<u> Individual wearing explosive-type IED</u>

You might be interested in
A manufacturing company has several one-off legacy information systems that cannot be migrated to a newer OS due to software com
Digiron [165]

The resiliency technique which would provide the aforementioned capabilities is: D. Full backups.

An operating system (OS) can be defined as a system software which is pre-installed on a computing device, so as to manage or control software application, computer hardware and user processes.

In this scenario, a manufacturing company cannot migrate its several one-off legacy information systems (IS) to a newer operating system (OS), due to software compatibility issues.

Resiliency can be defined as a measure of the ability of a network, server, storage system, computing system or data center, to recover quickly and continue operating when it experience adverse conditions such as:

  • Power failure.
  • Equipment failure.
  • Data loss.

In Computers and Technology, there are four (4) main resiliency technique and these include:

I. Redundancy.

II. RAID 1+5.

III. Virtual machines.

IV. Full backups.

Full backup is a resiliency technique which create backups of the systems for recovery and it allows operating system (OS) patches to be installed on computer systems.

Read more: brainly.com/question/17586013

3 0
3 years ago
2.8 Code Practice: Question 1
-BARSIC- [3]

Answer:

The program to this question can be given as:

Program:

#include <stdio.h> //define header file

int main() //define main method.

{

int a1,b1,c1; //define variable

printf("Enter three numbers:\n"); //message

scanf("%d",&a1); //input numbers.

scanf("%d",&b1);//input numbers.

scanf("%d",&c1);//input numbers.

if (a1>b1) //check condition

{

//check condition

if(a1>c1)//inner if block

{

printf("The largest number: %d", a1); //message

}

else  //inner else block

{

printf("The largest number: %d", c1);//message

}

}

else //else block

{

//check condition

if(b1>c1) //inner if block.

{

printf("The largest number: %d", b1);//message

}

else //else block

{

printf("The largest number: %d",c1);//message

}

}

return 0;  //return 0.

}

Output:

Enter three numbers:

22

44

11

The largest number: 44

Explanation:

The description of the above program can be given as:

  • In the C language program firstly we define the header file. Then we define the main function. In the main function, we define three variables that are "a1, b1 and c1". In this variable, we take input from the user.
  • Then we define the conditional statements. In the if block we check if the value of a1 is greater then the value of b1 if this condition is true so we use another condition that if the value of a1 is greater then the value of c1. so, it will print the largest value. If the above condition is not true then it will go to else section.
  • In the else part we check the condition that if the value of b1 is greater then the value of c1. if it is true it will print the largest number value.  
4 0
3 years ago
Read 2 more answers
For python how do I ask the user how many numbers they want to enter and then at the ending add those numbers up together?
Digiron [165]

I am not too familiar with the Python language, but the algorithm would be something like this:

1. create a variable for the sums of the number

2. read in how many numbers the user wants to enter (let's call it N)

and then create a for loop:

for N times

read in the next number

increase the sum variable by that number

Hopefully this helps!

8 0
3 years ago
_____ allow you to logically separate ports in switches to create subdomains without wiring your network as physical subdomains.
AlladinOne [14]

Answer:

The correct answer for the following question is VLAN.

Explanation:

It stands for Virtue Logical Area Network which allows you to group port on a switch logically. VLANs can be extend across (a period of time) multiple switches means you used to express on port that you're in that VLAN by changing the VLAN number.

We have the ability to improve our security with VLANs by controlling what VLAN is accessing with the other network of VLANs. So that this network is particularly helpful in office situation to create subdomain without wiring physical domain as your network.

6 0
3 years ago
A thin film transistor (TFT) is a/an______________.
Leviafan [203]

Answer:

Option a electronic switch used on FPDs

Explanation:

A thin film transistor (TFT) is an electronic switch which is commonly used in a liquid crystal display (LCD). TFT derives its name by the way how it is produced. It is produced by layering thin films of semiconductor.  TFT is a type of transistor which is used to control state every  individual pixel in a LCD. TCT can change the states of pixels (on and off) very quickly.

6 0
4 years ago
Other questions:
  • Match the following.
    8·2 answers
  • What is one way to maintain Internet safety? a) avoid interacting with people on the Internet. B) avoid giving out information a
    7·1 answer
  • Links to the four default folders can be found on the left side of the file explorer window under the _________ heading:
    5·2 answers
  • Creative Commons Question -- At home, you created a really great digital song, audio jingle, or music track using some software
    12·1 answer
  • In the writing and language test of the SAT, questions ask students to do which of the following? A. Write an essay B. Define a
    14·2 answers
  • What framework provides a simple API for performing web tasks?
    13·1 answer
  • The Monte Carlo method is commonly used to approximate areas or volumes of shapes. In this problem, we will use Monte Carlo to f
    12·1 answer
  • In PowerPoint, a picture might be a photograph, a shape you draw, a piece of clip art, or an illustration created using a graphi
    7·2 answers
  • A large retail company hires several new joiners and would like to incorporate Virtual Reality (VR) into their onboarding proces
    11·1 answer
  • Because his father _____ his ten-speed bike away to punish him for his failing grades, the boy sulked for two days.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!