1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Molodets [167]
3 years ago
12

When responding to an incident in which explosive materials are suspected, is it safe to use wireless communication devices?

Computers and Technology
1 answer:
Nataly [62]3 years ago
8 0

Answer:

No

Explanation:

Wireless communication devices like the cell phones transmits signals using radio or electromagnetic wave, which would trigger a bomb. An example of this kind of bomb is the home-made bomb also known as IED (improved explosive device).

The most common type of this IED is the radio controlled IED, which uses electromagnetic wave from a cell phone or a radio controlled type firing circuit. Insurgents, criminals etc, make use of such devices, since the materials are easy to get and are affordable.

You might be interested in
Selling someone else's art, writing, music, or recording for your sole benefit is a copyright violation.
KATRIN_1 [288]
True urcifjwjcjkwjsjgv
8 0
4 years ago
Read 2 more answers
"NOTE: write an algorithm, not a code" You are given a file called "std" and composed of "Number, Name, Address" fields. (You ca
Inessa05 [86]

Answer:

1. get the absolute path to the file

2. load the file as a table (dataframe in python)

3. to insert a row;

  • create a dataframe of the same field type
  • concatenate the new dataframe horizontally with the same dataframe

4. to delete a row, select and drop the row where the 'Number' field matches a value.

5. to update the values in row, use the number field as a key to replace the existing values.

6. print of save to a variable the rows where the number field matches a given value.

Explanation:

Follow the report template to create a report for the algorithm.

The algorithm gets the absolute path to the file and loads the file as a tabular file from there the data can be queried without accessing the main file. The insert algorithm creates a new dataframe and appends it to the main dataframe.

The delete, update and retrieve all use the same subalgorithm, getting the rows with the number field as the key value.

5 0
3 years ago
Name five different windows password policies.
rodikova [14]

The five different windows password policies are:

1. Enforce password history.

2. Minimum password length.

3. Minimum password age.

4. Maximum password age.

5. Password must meet complexity requirements. (contain symbols, numbers, letters,...) 

6 0
3 years ago
What is an example of new technology having a positive impact on sustainability?
allsm [11]

Answer: Examples.

Explanation: Technology now a days uses more biodegradable materials, and non-renewable resources to more renewable resources. The most modern technology has shifted to being easier on our environment. I hope this helps.

3 0
3 years ago
45 points
Korolek [52]

Answer:

5 its either a or b and 6 is b 7 is d  and 8 t 9 f 10 f

Explanat ion:

5 0
3 years ago
Other questions:
  • When widgets, or portable chunks of code, are embedded on html pages and thereby help increase the functionality of those pages,
    9·1 answer
  • A researcher wants to do a web-based survey of college students to collect information about their sexual behavior and drug use.
    11·2 answers
  • During an investigation of a cybercrime, the law enforcement officers came across a computer that had the hard drive encrypted.
    5·1 answer
  • When measuring an unknown voltage with an analog VOM, you should first A. ground the circuit. B. set the switch to the lowest ra
    5·1 answer
  • Write a program that takes a date as input and outputs the date's season. The input is a string to represent the month and an in
    6·1 answer
  • 1)Ce procent de grasimi putem găsi in lapte ?
    10·1 answer
  • What will the output be from the following program?
    5·1 answer
  • Need help developing code!!
    9·1 answer
  • I have a Dell laptop and last night it said that it needed to repair it self and asked me to restart it. So I did but every time
    11·1 answer
  • In Full Screen Reading View, which area is reduced?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!