1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Angelina_Jolie [31]
3 years ago
12

When is a handrail required for stairs

Computers and Technology
2 answers:
ch4aika [34]3 years ago
5 0

Answer: when is not able to get up the stairs like a normal person

Explanation:

shtirl [24]3 years ago
3 0

Answer:

The purpose of a handrail is to provide guidance. It is required on stairs with two or more risers and ADA ramps with a rise of 6". In commercial applications, handrail is required on both sides of stairs and ramps. Handrails are not required on walking surfaces with running slope less than 1:20.

Explanation:

hopes this helps D:

You might be interested in
Give ways on how to effectively save.​
sp2606 [1]

Answer:

Explanation:

say goodbye to debt. Monthly debt payments are the biggest money suck when it comes to saving. ...

Cut down on groceries. ...

Cancel automatic subscriptions and memberships.

4 0
2 years ago
Which support function under Tech Mahindra is governing data privacy and protection related requirements
Alex Ar [27]

Answer:

Privacy Policy

Explanation:

PRIVACY POLICY is the support function under Tech Mahindra that is governing data privacy and protection-related requirements.

Given that support functions are functions which assist and in a way contribute to the company goal.

Other support functions are human resources, training and development, salaries, IT, auditing, marketing, legal, accounting/credit control, and communications.

The above statement is based on the fact that the Privacy Policy clarifies all the data protection rights, such as the right to object to some of the production processes that TechM may carry out.

7 0
3 years ago
Recently, a serious security breach occurred in your organization. An attacker was able to log in to the internal network and st
natulia [17]

Answer: Geotagging was enabled on her smartphone

Explanation:

The security weakness that is the most likely cause of the security breach is that geotagging was enabled on the vice president's smartphone.

Geotagging, occurs when geographical identification metadata are added to websites, photograph, video, etc. Geotagging can be used to get the location of particular place.

In this case, since geotagging was enabled on her smartphone, it was easy for the attacker to locate her house.

8 0
3 years ago
click the view lab button. restart the computer and press the f2 or delete key on your keyboard to enter the bios setup program.
IgorLugansk [536]

The brand of processor that is known to be installed are:

  • Intel
  • 4096
  • 1610
  • -3
  • Enabled
  • -Diskette Drive

<h3>What a processor means?</h3>

A processor (CPU) is known to be a kind of logic circuitry that  is known to answer to and work on the basic instructions that tends to drive a computer.

Note that the CPU is seen as the key  and most crucial integrated circuitry (IC) chip and the intel process is known to be one of the most common forms of processor.

Therefore, The brand of processor that is known to be installed are:

  • Intel
  • 4096
  • 1610
  • -3
  • Enabled
  • -Diskette Drive

Learn more about bios settings from

brainly.com/question/13103092

#SPJ1

Click the View Lab button. When the simulated computer starts, press the F2 or Delete key on your keyboard to enter the BIOS setup program. Explore the current BIOS settings to find the answers to the following questions.

What brand of processor is installed?

4 0
1 year ago
which of the following present the most significant obstacle to developing IT security if we consider commerce and marketing?
Dmitry_Shevchenko [17]

Answer:

There is no direct return on investment in building security systems.

Security systems are detrimental to usability and can make IT systems less functional, and therefore less attractive to the customer.

There is pressure to reduce the time it takes to get a new IT product or system onto the market, so security systems are sacrificed in order to reduce the time-to-market.

Explanation:

Cyber security has always been challenging for the organizations. There have been groups which are always looking for loop holes in cyber security and hacks the details and asks the ransom to restore. IT systems have now been more complex in this era. Users are increasing every new day and network accounts security is more demanding. Computer connection are more complex and require special attention to control them. The obstacles in IT systems are of concern as there is need for dynamic IT solution to counter the challenging hackers.  New programs and customized demand of IT systems need customized IT security systems.

4 0
3 years ago
Other questions:
  • Selecting the option to control Widows and Orphans will prevent _________. A single line from appearing at the top or bottom of
    10·1 answer
  • Which column and row references are updated when you copy the formula: =F$5+12? Value 12 Column F Column F and row 5 Row 5
    8·1 answer
  • What is an unique text-based internet address corresponding to a computer's unique numeric IP address called
    8·1 answer
  • Write the definition of a function named printstarbucks that receives a non-negative integer n and prints a line consisting of n
    6·1 answer
  • Join my discord server! CODE IS (CebjBXN)​
    12·2 answers
  • _______ allows you to add formatting such as shapes and colors to text.
    14·1 answer
  • (9.10 Code Practice: Question 1)
    12·1 answer
  • Phil wants to make a dark themed superhero movie. What could be his target demographic
    11·2 answers
  • Please answer that and i'll gave you branlliest
    15·1 answer
  • Guys how can i video my self from my laptop <br> my laptop is (lenovo)
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!