1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sesenic [268]
3 years ago
13

For Adults/Adolescents, you should call/activate EMS: Before providing CPR. After providing CPR for 2 minutes. After an AED has

been administered. Or, none of the above.
Computers and Technology
1 answer:
defon3 years ago
6 0

Answer:

Before providing CPR is the correct option.

Explanation:

CPR refers to the cardiopulmonary resuscitation in which the user follows the emergency treatment of respiration from mouth to mouth and chest compression. If any person complete training of Adults/Adolescents then they have to activate or call the EMS before providing cardiopulmonary resuscitation.

You might be interested in
Which act requires enterprises to guard protected health information and implement policies and procedures to safeguard it?
bogdanovich [222]

Answer:

D. HIPAA (Health Insurance Portability and Accountability Act)

Explanation:

HIPAA which stands for Health Insurance Portability and Accountability Act, is an act designed by the US government in 1996 to guard patients' confidential health information and also implement policies and procedures to safeguard it. The act contains the required information and instruction for handling patients' medical health information. The law however gives patients (or their representatives) the right to access these information which as a matter of fact must be made available within 30 days from the day of request.

PS: Not sure why the option D in the question contains ' FTF '. I have taken it to be a typo because without it, the option is in itself complete.

7 0
3 years ago
is an online collaborative event that may include such features as chat, slideshows, and PowerPoint presentations.
Lilit [14]

Answer

is number 4 or 3

Explanation:

5 0
3 years ago
Why is information literacy so important?
olga_2 [115]
It promotes problem solving approaches and thinking skills
6 0
2 years ago
A network engineer is troubleshooting a newly deployed wireless network that is using the latest 802.11 standards. When users ac
Lerok [7]

Answer:

it will make the wireless network faster and it is a performance network i am pretty sure.

Explanation:

5 0
3 years ago
A software or hardware that checks information coming from the Internet and depending on the applied configuration settings eith
photoshop1234 [79]

Answer:

1. Firewall.

2. Router.

3. Proxy.

4. SMTP, 25.

Explanation:

1. A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

Furthermore, firewalls are typically bidirectional, it checks all sent and received data and only allow authorized traffic through.

2. A router can be defined as a network device that is designed typically for forwarding data packets between two or more networks based on a well-defined routing protocol.

A routing protocol refers to a set of defined rules or algorithms used by routers to determine the communication paths unto which data should be exchanged between the source router and destination or host device.

Additionally, in order for packets to be sent to a remote destination, these three parameters must be configured on a host.

I. Default gateway.

II. IP address.

III. Subnet mask.

3. A proxy can be defined as a computer network service designed to avail end users (clients) the ability to connect indirectly to other network services. For example, a reverse proxy is a type of server that is placed right in front of other servers such as a web server and it forwards or routes the user's (client) requests to those servers sitting behind it. When properly configured, reverse proxy helps to ensure security, reliability and performance of a network.

4. A spam filter can be defined as a software program designed to process all incoming electronic messages (e-mails) and prevents any unsolicited or unwanted mail (spam) from entering the inbox of a client.

Generally, a spam filter uses SMTP with port number 25 to carry out its services.

SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.

3 0
3 years ago
Other questions:
  • 6.Decreasing a telescope's eyepiece focal length will:
    7·1 answer
  • If you were the IT manager for a large manufacturing company,what issues might you have with the use of opensource software? Wha
    10·1 answer
  • What is the different between ethical and legal issues?​
    6·1 answer
  • ​Lara is the chief editor of "Laughter and Life," an online magazine. Lara has assigned Jenny the task of redesigning the magazi
    5·1 answer
  • A form letter can be customized by using different fields in a __________.
    15·2 answers
  • All of the Internet in your country disappears. What happens next?
    13·1 answer
  • 1. Railroad tracks present no problems for a motorcyclist.
    8·1 answer
  • The U.S. consumes lots of energy. Which fuel provides the most energy?
    15·2 answers
  • Examples of 15 viruses in computer
    10·1 answer
  • Why does my internet keep disconnecting and reconnecting.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!