1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
icang [17]
4 years ago
15

In some employment situations, not all personnel can immediately evacuate a work area per the eap. it may be that some equipment

and processes can only be shut down in stages or over time or that there is a requirement to remain briefly behind to secure gas, electric power or other specialize shut-offs. these personnel are referred to as what?
a. critical personnel
b. evacuation wardens
c. safety guides
d. wardens suspend assessment
Computers and Technology
1 answer:
Anika [276]4 years ago
8 0
I think the correct answer from the choices listed above is option A. These personnel are referred to as critical personnel. They are em<span>ployees who may remain to shut down critical operations before evacuating. Hope this answers the question. Have a nice day.</span>
You might be interested in
Why are rules required for a number system to be useful?
evablogger [386]

Answer

This is because without them no one would know how much each symbol represents, and no one would be able to decipher the message.

Explanation

Number system is a way to represent numbers. It  is a writing system for expressing numbers; that is, a mathematical notation for representing numbers of a given set, using digits or other symbols in a consistent manner.

In computing or in a computer number systems are the techniques which represents numbers in the computer system architecture where   every value that you are saving or getting into/from computer memory has a defined number system.Computer architecture supports  . Binary number system,Octal number system and Decimal number system.

5 0
3 years ago
Read 2 more answers
Type the correct answer in the box. In which phishing technique are URLs of the spoofed organization misspelled? _____ is a phis
vodka [1.7K]

Answer:

Link manipulation

Explanation:

With the link manipulation the phisher manipulate the URL link, in this case, the URL can seem similar to an original website, but this link sends you to a fake website, and you enter for example your bank or personal information, the phisher use this data to steal money or delicate data, sometimes these links are sent by email or text messages.

4 0
4 years ago
Read the integer numbers in the text file "1000 Random Number from 0 to 100.txt" into a list
Marianna [84]

Answer:

random_number_file = open("1000 Random Number from 0 to 100.txt", 'r')

random_number_list = random_number_file.readlines()

print('random_number_list)

Explanation:

The name of the file containing the random integer text is ; "1000 Random Number from 0 to 100.txt"

The random_number_file variable stores the opened file ("1000 Random Number from 0 to 100.txt") using the open keyword and reads it ('r')

This file stored in the random_number_file variable is the read into a list by using the readlines() method on the random_number_file

6 0
3 years ago
The linux/unix command __________ can be used to search for files or contents of files.
Nana76 [90]
The `grep` command is used for this. https://man7.org/linux/man-pages/man1/grep.1.html
8 0
2 years ago
Which of the following may present a problem for Linux users?
motikmotik
Tendancy to crash hope that helped
6 0
4 years ago
Read 2 more answers
Other questions:
  • What piece of software tells the operating system how to use a specific hardware device? a. User interface b. System service c.
    14·1 answer
  • Which of the following is an open-source web browser?
    8·2 answers
  • federal law requires public libraries to install filtering software on computers to prevent children from accessing adult conten
    14·1 answer
  • In which circumstances would the view side by side feature be useful or helpful.
    15·2 answers
  • A logistics company's vulnerability scan identifies the following vulnerabilities on Internet-facing devices in
    8·1 answer
  • So whenever I play among us, I always get killed. Like always. I want to know some Technics to being a crew mate and an impostor
    9·1 answer
  • pharmaceutical company is using blockchain to manage their supply chain. Some of their drugs must be stored at a lower temperatu
    5·2 answers
  • What happen if file server stops working?
    5·1 answer
  • PLEASE ANSWER! I NEED IN 30 MIN.
    10·1 answer
  • Printed versions of your presentation that contain the slides and blank lines below are called
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!