1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tangare [24]
2 years ago
8

Types of Hazards Mitigation Measures

Computers and Technology
2 answers:
Fynjy0 [20]2 years ago
4 0

Answer:

auto mechanics

Explanation:

keeps dirt and grease off hands

Nat2105 [25]2 years ago
4 0
Yes I did but I didn’t know if I got my phone number but auto mechanics
You might be interested in
A general rule for adding text to a slide is ____.
KiRa [710]

A general rule for adding text to  a slide is to use not more than two fonts in a presentation and vary the font  size. Besides adding text you can also import text, photographs, numerical data, and facts from files created in programs such as Microsoft word, excel and access.

5 0
3 years ago
Read 2 more answers
The SQL SELECT built-in function COUNT ____.
tia_tia [17]

The SQL SELECT built-in function COUNT none of the above options.

<h3>What is a SELECT query?</h3>

A select query is known to be a kind of a database object that depicts the information that is shown in Datasheet view.

Note that A query does not save data, it shows data that is saved in tables.  The SELECT statement is known to be one that is often used to select data from what we call a database.

Hence, The data returned is said to be saved in a result table, known to be the result-set.

Based on the above, the SQL SELECT built-in function COUNT none of the above options.

Learn more about  SQL SELECT from

brainly.com/question/10097523

#SPJ1

5 0
1 year ago
What could prevent ping or traceroute responses from reaching the originating device beside network connectivity issues?
zysi [14]
Many admins set their firewalls to drop echo-request packets to prevent their networks from being mapped via "Ping Sweeps".

A remote possibility is that there's too many hops between the source and target and the packet's TTL expires.
3 0
3 years ago
Suggest why people might not want the government to carry out Internet surveillance?​
Vadim26 [7]
Suggest why people might not want the government to carry out Internet surveillance?
To see your history all that p o r n ya watch
Pls mark me brainliest;p
3 0
2 years ago
Read 2 more answers
13 POINTS! Which option is used to ensure the integrity and authenticity of a Word document but requires additional services to
Ksju [112]

A. digital encryption

5 0
3 years ago
Read 2 more answers
Other questions:
  • Sorry to bother you guys but for some reason it wont let me comment. How can i fix this?
    5·2 answers
  • Whats the difference between search engine and web browser?
    6·2 answers
  • What is a data broker?
    6·1 answer
  • Which of the following controls will provide an area in the form for the user to enter a name? a. button b. label c. text box d.
    8·1 answer
  • PLZ HELP ME ITS URGENT PlZ PLZ PLZ
    11·1 answer
  • Easy coding question, please help.
    13·1 answer
  • What is the next line?
    6·2 answers
  • NumA = 3 <br>numB = 2<br>Result = numA ** numB
    12·1 answer
  • Please tell fast plzzzzzzz​
    11·1 answer
  • Identify congruent triangles. Justify why these triangles are congruent?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!