1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Effectus [21]
4 years ago
5

George is a specialist in security and protective services for a large security firm that has contracts at shopping malls nation

wide. which tasks does George most likely perform for his employer? he patrols and guards property, designs security systems, and files police reports. He patrols and guards property, investigates crimes, and prosecutes shoplifters. He monitors alarms and cameras, puts out fires, and arrests suspicious people. He monitors alarms and cameras, interviews people, and designs security systems.
Computers and Technology
1 answer:
slava [35]4 years ago
7 0

Answer: (D) He monitors alarms and cameras, interviews people, and designs security systems.

Explanation: A security and protective service employee would benefit in monitoring and designing security systems.

You might be interested in
U.S. cybersecurity experts and government officials are increasingly concerned about breaches from __________ into corporate net
Triss [41]

Answer:

Organized crime syndicates based in the United State

Explanation:

U.S. cybersecurity experts and government officials are increasingly concerned about breaches from organized crime syndicate based in the United States into corporate networks, either through mobile devices or by other means.

The crime syndicate can go to any length to access corporate network through mobile device or any other means in order to commit crimes that is why the US cyber security expert and government officials are increasingly concerned.

Cyber security specialists or expert in the US are been employed to protect information or data that the crime syndicate may want to gain access to by using different variety of techniques by critically monitoring the systems network for attempted breaches by the crime syndicates and then dealing with any of them that is found guilty.

5 0
3 years ago
What is a feature of Print Preview?
Snezhnost [94]
Fit to page i believe
6 0
3 years ago
_______________ provides options for getting access to your old password or resetting the account to a temporary password; users
gtnhenbr [62]

Answer:

account recovery

Explanation:

account recovery, provides options for getting access to your old password or resetting the account to a temporary password; users will change to a permanent password upon first login.

3 0
2 years ago
True or false
ICE Princess25 [194]
1. True
2. Usually true, but it depends on the search engine you're using.  For example, Google lets you search for several words without commas.
3 0
3 years ago
Binary Number Cards
Sedaia [141]

Answer:

13: 1101

5: 0101

10: 1010

2: 0010

Explanation:

The binary system, on the other hand, is a base-2 number system. That means it only uses two numbers: 0 and 1. When you add one to one, you move the 1 one spot to the left into the twos place and put a 0 in the ones place

what is done with the dice is to have an example of how binary numbers are made until 15

5 0
3 years ago
Other questions:
  • Many computer users and some operating systems call subdirectories ____.
    10·1 answer
  • Why does esherick say the name of the boxer rebellion in inaccurate
    5·1 answer
  • Refer to the image below. The letter item indicated at 3. is_____________________ a Your Address - Where you are b The Letter Ad
    7·1 answer
  • Which payment type is best if you are trying to stick to a budget?
    6·1 answer
  • Which behavior demonstrates teamwork
    8·2 answers
  • What is the basic purpose of the International Space Station that will be completed in 2010?
    11·1 answer
  • how can you turn on a light switch and it not work, without turning off the power to the whole house?
    15·1 answer
  • Why media is far from government​
    6·2 answers
  • Write an if-else statement for the following: If user_tickets is less than 5, assign num_tickets with 1. Else, assign num_ticket
    9·1 answer
  • Wi-Fi Protected Access (WPA) fixes critical vulnerabilities in the earlier wired equivalent privacy (WEP) standard. Understandin
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!