1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marysya12 [62]
2 years ago
14

Scenario: As you walk into an empty class, you see a bag on the floor under the desk what will you do next

Computers and Technology
1 answer:
Keith_Richards [23]2 years ago
5 0
I'm not sure on what you mean by this however lets say that it may contain a device, when entering DO NOT TOUCH ANYTHING, there are different methods on how a device could be triggered either from light switches or by trip wire which its best to leave the facility over all however lets say you cannot then stop listen for any ticking if not then have a flash light, if the room lights are turned off leave them off use a flash light but be careful where you shine it there could be light sensors on the device that trigger when a light hits it hence why the lights are off. when having a flash light you could be able to see a glare of a wire which could be a trip wire. there are many possibilities in how the device was made from timers, trip wire, sound,light,pressure, switches, electronic waves from phones may effect the device and could activate it as well. But anyways this is all a factor and its best to be careful and if able evacuate if the device is in a weird location at a odd time you know its not suppose to be there, and or items moved that are never moved and if it is never moved then there is dust that could have a odd shape like a hand print. Anyways im not sure if your looking for this type of answer but its good to know!
You might be interested in
To ensure rapid recovery and security of data, backup data should be ________.
Nataly [62]

Answer:B kept at a secure location at the facility

Explanation:

8 0
3 years ago
Write a Python function called simulate_observations. It should take no arguments, and it should return an array of 7 numbers. E
Bas_tet [7]

Answer:

import random

def simulate_observations():

   #this generates an array of 7 numbers

   #between 0 and 99 and returns the array

   observations = random.sample(range(0, 100), 7)

   return observations

#here,we call the function created above and print it

test_array = simulate_observations()

print(str(test_array))

6 0
3 years ago
When first defining the cloud, NIST gave three service models, which can be viewed as nested service alternatives: software as a
irakobra [83]

Answer:

Infrastructure.

Explanation:

In Computer science, Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives. It offers individuals and businesses a fast, effective and efficient way of providing services.

Simply stated, Cloud computing are services or programs located on the Internet, they are usually remote resources making use of cloud storage.

When first defining the cloud, National Institute of Standards and Technology (NIST) gave three (3) service models, which can be viewed as nested service alternatives;

1. Software as a Service (SaaS).

2. Platform as a Service (PaaS)

3. Infrastructure as a Service (IaaS).

According to NIST, the five (5) characteristics of a cloud computing service are;

1. On-demand self-service .

2. Broad network access .

3. Resource pooling .

4. Rapid elasticity .

5. Measured service.

Additionally, the cloud service can either be deployed as private, public, hybrid or community service.

6 0
3 years ago
What is the first character for a file or directory names if they should not be displayed by commands such as ls unless specific
riadik2000 [5.3K]

Answer: The .(dot) character

Explanation: in Linux, the period (dot) is short hand for the bash built in source. It will read and execute commands from a file in the current environment and return the exit status of the last command executed.

The .(dot) character is the first character for a file or directory names if they should not be displayed by commands such as ls unless specifically requested

4 0
3 years ago
Specify either "Write Through" or "Write Back" as the policy which best corresponds to each of the conditions below.
Mariulka [41]

Answer:

1. Write through

2. Write back

3. Write back

4. Write through.

Explanation:

The answers are given accordingly as above.

4 0
3 years ago
Other questions:
  • When using vlookup, the _____argument is optional?
    8·1 answer
  • It is important for a writter to include voice and point of view in writting because _______
    11·1 answer
  • Do you think our attitude (whether positive or negative) is something we are born with or that we have power to control within o
    5·2 answers
  • Nam june paik’s ________ combines recognizable and distorted images made using a synthesizer to modulate video signals.
    9·1 answer
  • For a new version of processor, suppose the capacitive load remains, how much more energy will the processor consume if we incre
    11·1 answer
  • The decimal number 3 is ___ in binary the 2s column plus the 1s column.
    11·1 answer
  • Please help me ASAP!
    11·2 answers
  • Which are the 2 main elements that’s make up computer architecture?
    6·2 answers
  • Choose all of the items that represent functions of an operating system.
    11·1 answer
  • You want to store, organize, and manipulate your photos. what type of software do you need?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!