1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
inessss [21]
3 years ago
15

Every workplace should have an emergency plan of action.

Computers and Technology
2 answers:
pochemuha3 years ago
6 0

Answer:

yes i agree with that the answer is in fact true

Explanation:

follow my in sta gram at grac.ehihi

stira [4]3 years ago
6 0

Answer:

The answer would be true.

Explanation:

You might be interested in
Series-connected 11-pF and 21-pF capacitors are placed in parallel with series-connected 22- pF and 30-pF capacitors. Determine
Naya [18.7K]

Answer:

19.9 pF

Explanation:

Given that:

Series connection :

11pF and 21pF

C1 = 11pF ; C2 = 21pF

Cseries = (C1*C2)/ C1 + C2

Cseries = (11 * 21) / (11 + 21)

Cseries = 7.21875 pF

C1 = 22pF ; C2 = 30pF

Cseries = (C1*C2)/ C1 + C2

Cseries = (22 * 30) / (22 + 30)

Cseries = 12.6923 pF

Equivalent capacitance is in parallel, thus,

7.21875pF + 12.6923 pF = 19.91105 pF

= 19.9 pF

8 0
3 years ago
What is the common name for the growth rate function N?
kolezko [41]

Answer:

Linear.

Explanation:

The common name for the growth rate function N is linear.N growth rate is directly proportional to the input.So it grows linearly.It does not grow rapidly like other growth functions like quadratic,exponential and cubical.

Constant growth does not grow over time it stays as it is.

Hence the answer to this question is linear.

3 0
3 years ago
Windows server 2012 r2 supports two types of folder shares. what are those two types?
larisa [96]
<span>Windows server 2012 r2 supports the following two types of folder shares: </span>Network File System and Server Message Blocks. Correct answer: D
Network File System<span> (</span>NFS) is a distributed file system protocol for <span>storing and updating files on a remote computer. </span>
The Server Message Block<span> (SMB) Protocol is a </span>network file sharing protocol.
7 0
3 years ago
Suppose you want to find a specific piece of hardware at the lowest price, and you don't mind if it's used. Which type of purcha
tino4ka555 [31]

Answer:

consumer-to-consumer auction site

Explanation:

The best type of purchase for this scenario would be a consumer-to-consumer auction site. These sites allow anyone to make a publication selling their product. This publication can be seen by anyone around the world. It is the best way of finding the cheapest prices for a specific item. The condition of the items on these sites can vary. The majority of the time they are used items in good conditions, but can also be new items or very worn out items being sold for parts.

7 0
3 years ago
Which of the following detects unauthorized user activities, attacks, and network compromises, alerts of the detected attacks, a
Anit [1.1K]

The answer is IPS (Intrusion Prevention Systems)

The Intrusion Prevention Systems and Intrusion Detection Systems (IDS) are two security technologies that secure networks and are very similar in how they work. The IDS detects unauthorized user activities, attacks, and network compromises, and also alerts. The IPS, on the other hand, as mentioned, is very similar to the IDS, except that in addition to detecting and alerting, it can also takes action to prevent breaches.


3 0
3 years ago
Other questions:
  • What does an approved project summary document indicate?
    13·1 answer
  • A main reason careers in Information Technology are growing faster than average is
    6·1 answer
  • How does math help you determine the amount of watts a turbine produces?
    13·1 answer
  • What is the lowest layer of the OSI model at which LANs and WANs support the same protocols?
    5·1 answer
  • What is an antispamming approach where the receiving computer launches a return attack against the spammer, sending email messag
    9·2 answers
  • Why security must be planned, tested, and ready by the time the erp implementation is at go-live?
    11·1 answer
  • Choose the correct term to complete the sentence.
    10·1 answer
  • Computer is a major source of informarion why​
    8·1 answer
  • Which of the following scenarios falls into the category of network crimes?
    8·2 answers
  • The Internet is a worldwide communications network. Which device connects computer networks and computer facilities?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!