1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gizmo_the_mogwai [7]
3 years ago
10

I need help with workplace safety systems please help

Computers and Technology
1 answer:
AfilCa [17]3 years ago
5 0

Answer:

Just ask the manager for more help and get clues to help you with the answer to your question.

Explanation:

You might be interested in
Which of the following is the Boolean logical operator for OR in C#?
VashaNatasha [74]
This would be &&

Hope this helped
8 0
2 years ago
Read 2 more answers
Prominent is another word for stands out. True False
earnstyle [38]
The answer is TRUE.

There you go.
6 0
3 years ago
Smartart and shapes are useful tools because they allow you to
charle [14.2K]
Organize data within a document..draw any shape you wants within a document... easily create manipulate shapes within a document. hope this helps
4 0
3 years ago
Which of the following will most likely result in a decrease in population?
balu736 [363]
The correct answer is B
4 0
3 years ago
Read 2 more answers
A ________________ uses multiple systems to attack one or more victim systems or websites with the intent of denying service to
Advocard [28]

Answer:

4. A Denial of Service attack (DDOS attack).

Explanation:

A DDOS attack is a malicious attempt to disrupt the normal traffic to a service.

In essence, it sends an enormous amount of requests to the service, until the server is overwhelmed because it can't handle that much traffic, and collapses in an overflow.

Thus, regular users are not able to access their services.

Usually, attackers use a botnet, a network of "zombie" computers that have been previously infected with a malware that allows the attacker to remotely control them, then the botnet starts to send a flood of traffic from different locations, and make the attacker difficult to detect or track.

6 0
3 years ago
Other questions:
  • Information management examines the organizational resource of information and regulates its definitions, uses, value, and distr
    11·1 answer
  • How do you know if you get a phone call that is a scam
    8·2 answers
  • Consider the following code segment. int[] seq = {3, 1, 8, 4, 2, 5}; for (int k = 1; k < seq.length; k++) { if (seq[k] >=
    5·1 answer
  • Without entering into the internet cloud or intranet cloud, how many icons in the topology represent endpoint devices (only one
    6·1 answer
  • 1.Input device which transfers information and images from physical documents to computer files.
    14·1 answer
  • How to get the home button on your screen?
    13·1 answer
  • Which city is the largest within the Andean and midlatitude countries? A. Buenos Aires, Argentina B. La Paz, Bolivia C. Santiago
    11·2 answers
  • Which property of a text element controls how the browser handles text that does not fit within the element box?
    13·1 answer
  • Write the algorithm and draw a flowchart to display the greatest number among any two different numbers....
    5·1 answer
  • The function that overloads the ____ operator for a class must be declared as a member of the class.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!