1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Molodets [167]
3 years ago
12

When responding to an incident in which explosive materials are suspected, is it safe to use wireless communication devices?

Computers and Technology
1 answer:
Nataly [62]3 years ago
8 0

Answer:

No

Explanation:

Wireless communication devices like the cell phones transmits signals using radio or electromagnetic wave, which would trigger a bomb. An example of this kind of bomb is the home-made bomb also known as IED (improved explosive device).

The most common type of this IED is the radio controlled IED, which uses electromagnetic wave from a cell phone or a radio controlled type firing circuit. Insurgents, criminals etc, make use of such devices, since the materials are easy to get and are affordable.

You might be interested in
What is the benefit of the load balancing logic to end-user?
Alborosie

Answer:

<em>It can minimize response time, and minimize the costs for the end user.</em>

Explanation

Load balancing is a form of workload distribution across several computers or resources. It allows each segment of the system to process a smaller task, minimizing respond time, helping to avoid overload, and contributing to optimize resource use.

6 0
2 years ago
Using the syntax in section 2.3, write a command delete_all_rights (p, q, s). this command causes p to delete all rights the sub
aalyn [17]
<span>command delete_all_rights(p, q, s)
delete read from a[q, s];
delete write from a[q, s];
delete execute from a[q, s];
delete append from a[q, s];
delete list from a[q, s];
delete modify from a[q, s];
delete own from a[q, s];
end</span>
6 0
3 years ago
What is the name of the FOLDER in which the file named "script" is contained?
yulyashka [42]

Answer:

The default location for local logon scripts is

  • the Systemroot\System32\Repl\Imports\Scripts folder

5 0
2 years ago
Which of the following is a geolocation service on an Internet browser?
seropon [69]
It may be D) because it is actually a simplified version of Google maps.
7 0
3 years ago
Read 2 more answers
__________ are variables that store data for direct or indirect processing. A IPO DiagramsB Flow chartsC Data structuresD Progra
likoan [24]
C. Data structures






---------------------------------
7 0
2 years ago
Other questions:
  • ________ is a software that interprets java bytecode.
    12·1 answer
  • Consider this data sequence: "fish bird reptile reptile bird bird bird mammal fish". let's define a singleton to be a data eleme
    5·1 answer
  • PLEASE DON'T DELETE THIS QUESTION!!!!
    15·2 answers
  • PowerPoint allows you to input files from variety of sources, such as Microsoft access.
    6·1 answer
  • I have lost the watch (that,which) you gave me​
    12·1 answer
  • What component of a processor holds instructions waiting to be processed by the alu?
    11·1 answer
  • It is possible to change the shape of a text box.
    10·1 answer
  • The purpose of Appetizers on the menu​
    6·2 answers
  • Paisa pay is facilitated in which e commerce website​
    15·1 answer
  • which of the following protocols allows hosts to exchange messages to indicate problems with packet delivery?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!