1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Molodets [167]
3 years ago
12

When responding to an incident in which explosive materials are suspected, is it safe to use wireless communication devices?

Computers and Technology
1 answer:
Nataly [62]3 years ago
8 0

Answer:

No

Explanation:

Wireless communication devices like the cell phones transmits signals using radio or electromagnetic wave, which would trigger a bomb. An example of this kind of bomb is the home-made bomb also known as IED (improved explosive device).

The most common type of this IED is the radio controlled IED, which uses electromagnetic wave from a cell phone or a radio controlled type firing circuit. Insurgents, criminals etc, make use of such devices, since the materials are easy to get and are affordable.

You might be interested in
A _____ is a modeling tool used in structured systems analysis and design (SSAD) analysis model that helps break down a complex
Shalnov [3]

A <em>"DATA FLOW DIAGRAM"</em> is a modeling tool used in structured systems analysis and design (SSAD) analysis model that helps break down a complex process into simpler, more manageable, and more understandable subprocesses

8 0
4 years ago
Computers that are joined together are called networks true or false
natali 33 [55]

Answer:

True

Explanation:

hope this helps if not sorry :(

7 0
3 years ago
Once you complete your profile on LinkedIn, the next step is to
Cerrena [4.2K]
Make it stand out. Add a pic and stuff 
7 0
4 years ago
Read 2 more answers
Who is better at fortnite mc creamy or mau?
Mama L [17]

Answer:

neither

Explanation:

fortnite sucks

8 0
3 years ago
Read 2 more answers
What are the two different frequencies WiFi operates on?
puteri [66]
Try to read this mate

3 0
4 years ago
Read 2 more answers
Other questions:
  • Which letters appear in the home row on a keyboard?
    14·2 answers
  • Given that an integer variable i and a floating-point variable f have already been declared and given values: Write a statement
    8·1 answer
  • Where are options to add a border around the outside of a chart found?
    9·2 answers
  • Distributed computing is a term that describes the work that autonomous computers can do to achieve a common goal, especially in
    10·1 answer
  • A program uses two classes: dog and poodle. which class is the base class and which is the derived class?
    7·2 answers
  • Write a program named Deviations.java that creates an array with the deviations from average of another array. The main() method
    8·1 answer
  • IN C++ PLEASE!!! Read integers from input and store each integer into a vector until -1 is read. Do not store -1 into the vector
    15·1 answer
  • What is anequality query​
    6·1 answer
  • What is the function of ROM?
    10·1 answer
  • at the command prompt, type ls -l myscript and press enter. what permissions does the myscript file have? next, type bash myscri
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!