1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
____ [38]
3 years ago
8

Disconnecting or making the equipment safe involves the removal of all energy sources and is known as _____________. A) Isolatio

n B) De-isolation C) Reconnection D) Disconnection
Computers and Technology
2 answers:
Burka [1]3 years ago
6 0

Answer

option A) isolation

Explanation:

Disconnecting or making the equipment safe involves the removal of all energy sources and is known as  isolation.


there are four types of isolation and those are defined as under

Behavioral Isolation.

Temporal Isolation.

Mechanical or Chemical Isolation.

Geographical Isolation.


Ray Of Light [21]3 years ago
5 0

Isolation. Also is known as Lockout-Tagout. I hope this helps.

You might be interested in
When was the bible of luke written​
Gelneren [198K]
85 C.E. I think that is when it was written, but I’m not 100% sure.
3 0
3 years ago
WILL MARK BRAINLIEST!!! 50 POINTS!!! What options does the Table Tools Layout contextual tab contain? Select three options. modi
mash [69]

Answer:

Insert rows and colums

Explanation:

6 0
3 years ago
Read 2 more answers
Technology is the tool, but without proper IG policies and a culture of compliance that supports the knowledge workers following
choli [55]

Answer:

The answer is letter B. Will fail without user commitment

Explanation:

With an old IT adage in mind, even a perfect IT program<em> Will fail without user commitment. Because the glaring vulnerability in the security architeture of ECM systems is that few protections exist once the information is legitimately accessed. These confidential information  often can be printed, e-mailed, or faxed to unauthorized parties without any security attached.</em>

4 0
4 years ago
Given the following Python function, find out an asymptotically tight bound of the algorithm in term of n (the input parameter).
alexandr1967 [171]

Answer:

Explanation:

There are two loops in the given code snippet:

1. Both the loops are nested

2. The outer loop which is for loop is running n number of times linearly.

3. The inner loop which is while loop is jumping in the power of 2, which makes it run log n number of times.

So the overall complexity of the code will be= n * log n

Time complexity(or upper bound)= O(n log n).

Hit the thumbs up if you liked the answer. :)

6 0
4 years ago
How do you get verified?
jolli1 [7]

Answer:

you keep going

Explanation:

first you keep working then it will pop up

7 0
3 years ago
Read 2 more answers
Other questions:
  • Suppose a system administrator at sls happened to read the details of this case. what steps should he or she take to improve the
    10·1 answer
  • How would you describe by adding comments to the coding explaining that you know what int num1 = 10; int ave = (num1+num2+num3)/
    10·1 answer
  • Alessandro wants to use his desktop computer to video chat with his mother. What hardware does he need to accomplish this?
    9·1 answer
  • Jim maintains attendance records for his employees for the year. Row B includes the dates of attendance, and column A includes t
    5·2 answers
  • C++
    11·2 answers
  • How can you change your mindset ? What are some fears you have had to overcome related to school ?
    10·1 answer
  • Tipos de lenguajes relacionados con c++?
    7·1 answer
  • Exercise : Randomizer In this exercise, we are going to create a static class Randomizer that will allow users to get random int
    14·1 answer
  • Places where computer are used​
    11·2 answers
  • What makes a recipe for a meal an example of an algorithm?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!