1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rus_ich [418]
3 years ago
13

The acronym pies is used to describe improvised explosive devices (ied) components. pies stands for:

Computers and Technology
2 answers:
evablogger [386]3 years ago
8 0
PIES stands for Power Initiator Explosive and Switch.
Korvikt [17]3 years ago
5 0
Generally, Improvised explosive devices (IED) is composed of four basic components. PIES is an acronym used to easily remember these components. PIES stands for, power, initiator, explosive and switch. Each component may come in different forms and sizes depending on the explosive device.
You might be interested in
Rectangle perimeter is 72 .Find the new perimeter if length is doubled and breadth is tripled​
777dan777 [17]

Answer:

Is it related to technology and computers?

3 0
2 years ago
Help 25 points!!!!!!!
Len [333]

Answer:

can u say what the word bank is plz?

Explanation:

3 0
3 years ago
Read 2 more answers
How fast will a viral meme spread if it is not contained within 24 hours?
sveta [45]
Well a viral meme would spread very fast, it's a VIRAL meme which means it would spread faster than a normal meme. Even if it is contained in the 24 hour time period it would still become rather popular.
6 0
3 years ago
Read 2 more answers
Select the correct answer.
Vsevolod [243]

Answer:

A.  inspection

Explanation:

To find - Monica, a reviewer, wants to use a formal review for the SQA process. Which review should Monica use for this purpose?

A.  inspection

B . internal audit

C.  test review

D . walkthrough

Proof -

SQA process - Software Quality Assurance process

The correct option is - A.  inspection

Reason -

Formal review in software testing is a review that characterized by documented procedures and requirements. Inspection is the most documented and formal review technique.

The formality of the process is related to factors such as the maturity of the software development process, any legal or regulatory requirements, or the need for an audit trail.

The formal review follows the formal process which consists of six main phases – Planning phase, Kick-off phase, the preparation phase, review meeting phase, rework phase, and follow-up phase.

3 0
2 years ago
EBay is an example of an online company that has been faced with numerous security issues. For example, imagine you purchase a d
Bond [772]

Answer: d)Phishing

Explanation: Phishing is the activity that is used by the attackers or unauthorized parties to steal confidential information of individuals through emails, messages or calls.This activity is considered as cyber-crime as the unauthorized source present themselves as the legal and actual party to gain private information such as credit card details, personal details , etc.

The example mentioned in the question about eBay's security issue is also related with phishing  where the fraud mails are sent to the users to gain or steal their personal information.

Other options are incorrect because insider is a threat that happens in the organization or business field regarding the organizational data,dumpster diving is reviving data to execute an attack on operating system and social engineering is gaining personal information from an individual through manipulation .Thus, the correct option is option(d).

Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.

7 0
3 years ago
Other questions:
  • This is a free point thing!! I am giving 100 points!! Anyone wanna talk!!!!
    11·2 answers
  • Submit your 300-word essay describing the equipment usedI in a well-equipped studio’s audio department and the training and expe
    8·2 answers
  • Gunther is filling in his own input mask. He wants to format the Social Security numbers of his clients. The field must contain
    5·1 answer
  • A program written in a(n) procedural language consists of sequences of statements that manipulate data items. __________________
    9·1 answer
  • Marginal ________ shows how much money can be made if a producer sells one additional unit of a good.
    7·2 answers
  • Within the seven domains of a typical IT infrastructure, there are particular roles responsible for data handling and data quali
    10·1 answer
  • I nees the meaning of these words even just one of them would help out ( pixel megapixel colour depth bit and byte)
    15·2 answers
  • Viết thuật toán, chương trình xử lý hạn chế trong việc xử lý số liệu phần nguyên để hiển thị lên lcd
    14·1 answer
  • What will be the output of the following code?
    14·1 answer
  • How you use ict today and how will you use it tomorrow
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!