1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Molodets [167]
3 years ago
12

When responding to an incident in which explosive materials are suspected, is it safe to use wireless communication devices?

Computers and Technology
1 answer:
Nataly [62]3 years ago
8 0

Answer:

No

Explanation:

Wireless communication devices like the cell phones transmits signals using radio or electromagnetic wave, which would trigger a bomb. An example of this kind of bomb is the home-made bomb also known as IED (improved explosive device).

The most common type of this IED is the radio controlled IED, which uses electromagnetic wave from a cell phone or a radio controlled type firing circuit. Insurgents, criminals etc, make use of such devices, since the materials are easy to get and are affordable.

You might be interested in
What company or individual is responsible for developing the linux operating system?
Arisa [49]
The guy is Linus Torvalds.,
If this was helpful, please mark me as brainliest.
3 0
4 years ago
दूलह श्री रघुनाथ बने दुलही सिय सुंदर मंदिर माहीं।
svetlana [45]

Answer:

The bridegroom Shri Raghunath, Gavati Geet Sabai Mili Sundar Bed Juwa Jury Vipra Padhahin, Janaki, and Kankan.

Explanation:

8 0
3 years ago
The atmosphere can produce the same effects as a
IceJOKER [234]
The answer is prism, The atmosphere can produce the same effects<span> as a </span>prism<span> when the </span>Sun is low in the sky<span>.  </span>
3 0
4 years ago
You have posted some embarrassing photos of a friend onto the Internet. After
e-lub [12.9K]

Answer:

C

Explanation:

4 0
3 years ago
You observe scrub jays hiding food and notice that one particular individual only pretends to hide food. What kind of experiment
o-na [289]

Answer:

Theorize a group of signals that will possibly produce this type of behavior and align the signals with the behaviors.

Explanation:

6 0
3 years ago
Other questions:
  • If you have an application that is not responding and you want to force it to shut down, whichsystem utility can you use?
    8·1 answer
  • Information security is defined as practice of preventing unauthorized access, use, disclosure, disruption, modification, or ___
    6·1 answer
  • Explain the importance of calculating a robot’s ability to extend its arm
    15·1 answer
  • 1. You have just upgraded memory on a computer from 4 GB to 8 GB by adding one DIMM. When you first turn on the PC, the memory c
    13·2 answers
  • Which two of the following skills are important for a meteorologist
    12·1 answer
  • What is the decrypted binary
    9·1 answer
  • Which item is used for formatting in responsive web design?
    14·2 answers
  • Charlie makes pizza at a restaurant. The customers always compliment how great the pizza tastes. But Charlie takes a long time t
    7·2 answers
  • HELPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP!!!
    12·1 answer
  • Which workbook view is used most often in Excel?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!