1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rus_ich [418]
3 years ago
13

The acronym pies is used to describe improvised explosive devices (ied) components. pies stands for:

Computers and Technology
2 answers:
evablogger [386]3 years ago
8 0
PIES stands for Power Initiator Explosive and Switch.
Korvikt [17]3 years ago
5 0
Generally, Improvised explosive devices (IED) is composed of four basic components. PIES is an acronym used to easily remember these components. PIES stands for, power, initiator, explosive and switch. Each component may come in different forms and sizes depending on the explosive device.
You might be interested in
What's a common mistake that young people in relationships make?
allochka39001 [22]
B, i say b because oversharing something personal could result in somebody you thought you loved going back telling someone else, causing rumors to be spread out
3 0
2 years ago
* HELP FAST*Which Section do you need to go on in the Ribbon, to get to the button that will allow you Create a Link between tex
ankoles [38]

Answer:

Insert

Explanation:

Take with a pinch of salt cuz I'm not a coder or anything, but I've got a few skillz.

6 0
3 years ago
I need help with coding, why isn't this command working pls help
astraxan [27]

Answer:

You type error word

8 0
3 years ago
Read 2 more answers
Offering 20 points for this iCloud related question!
Bezzdna [24]
1. Factory Reset
2. Jailbreak
3. To delete iCloud you need to turn of find my iphone
8 0
3 years ago
A common approach for managing the issuance of asymmetric keys is based on the _____________________________ mechanism, which ex
Nady [450]

Answer: RSA infrastructure

Explanation:

Using this infrastructure we can implement asymmetric cryptography using a pair of public key and private key. It works on the mechanism that if one of the key is used for encryption the other key is used to decrypt the message.

3 0
3 years ago
Other questions:
  • Assume that word is a variable of type String that has been assigned a value. Assume furthermore that this value always contains
    13·2 answers
  • Theâ ______ is a large worldwide collection of networks that use a common protocol to communicate with one another.
    5·1 answer
  • You browsing internet and you realize that its not responding what do you do with out rebooting the computer
    10·1 answer
  • Software obtained illegally is called open-source software. true / false
    15·1 answer
  • What important information is needed if you are installing an oem version of windows 7?
    6·1 answer
  • The _____ handles the instructions for your computer to start up before the operating system is loaded.
    10·1 answer
  • Which components exist in the contextual tab for tables called Design? Check all that apply. Table Styles Export Table Data Prop
    11·2 answers
  • (Please answer both parts, please)
    8·2 answers
  • Corey wrote a code that will display his name every time he presses the down arrow key but there is a bug in it. Display letter
    13·1 answer
  • A(n) ______is like an intranet except it shares its resources with users from a distant location. Select your answer, then click
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!