1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
icang [17]
3 years ago
6

Mention three types of pipeline hazards​

Computers and Technology
2 answers:
kaheart [24]3 years ago
7 0

Answer:

Structural Hazards.

Data Hazards.  

Control Hazards.

Explanation:

boyakko [2]3 years ago
3 0

Answer:

Structural Hazards, Data Hazards, Control Hazards

Explanation:

You might be interested in
Pros and cons of access to a wide range of online services when it comes to an individual's safety?
Contact [7]
Talk about cyber bullying but also all of the advancement and conviences of technology
Hope that helps
6 0
3 years ago
The ________letter of the first word in the Complimentary Closing has a capital letter, everything else is keyed in lower case o
Alona [7]

Answer: enter

\

Explanation:

yes

5 0
3 years ago
Write a function named shareALetter that takes one parameter, wordList – a list of words. Create and return a dictionary in whic
Arte-miy333 [17]
Can u send anything to understand it
7 0
3 years ago
Write about virus in five points.​
kvasek [131]
A computer virus is a malicious software program loaded onto a user's computer without the user's knowledge and performs malicious actions. It can self-replicate, inserting itself onto other programs or files, infecting them in the process.
5 0
3 years ago
Two-factor authentication can best be breached by the adversary using:________. a. social engineering attack b. using sniffers l
tiny-mole [99]

Answer:

a. social engineering attack

Explanation:

Two-factor authentication requires that the user/owner of the account enter a second verification code alongside their password in order to access the account. This code is usually sent to a personal phone number or email address. Therefore in order to breach such a security measure the best options is a social engineering attack. These are attacks that are accomplished through human interactions, using psychological manipulation in order to trick the victim into making a mistake or giving away that private information such as the verification code or access to the private email.

6 0
3 years ago
Other questions:
  • Why is it important to be a good digital citizen??
    11·1 answer
  • What is the smallest unit of data on the hard drive?
    5·1 answer
  • Of the sequences listed below, which shows the correct order of the steps in the incident management workflow: (1) authenticate
    14·1 answer
  • Which of the following is a default letter assigned for the primary hard drive
    6·2 answers
  • Written Hawaiian also has fairly simple spelling rules for determining if a word is a valid word in the language (even if the me
    9·1 answer
  • Which of the following code is correct? I: print("Programming is fun") print("Python") print("Computer Science") II: print("Prog
    11·1 answer
  • . What type of computer implementation does the following code represent? Load A,10 Load B,1:5 Add A,B STORE A, [20]
    5·1 answer
  • DRAG DROP -A manager calls upon a tester to assist with diagnosing an issue within the following Python script:#!/usr/bin/python
    11·1 answer
  • 25 Points Asap <br> Write a Java program named Light.java that displays a light bulb shown below:
    14·1 answer
  • Help help help help help!!!
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!