1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tangare [24]
2 years ago
8

Types of Hazards Mitigation Measures

Computers and Technology
2 answers:
Fynjy0 [20]2 years ago
4 0

Answer:

auto mechanics

Explanation:

keeps dirt and grease off hands

Nat2105 [25]2 years ago
4 0
Yes I did but I didn’t know if I got my phone number but auto mechanics
You might be interested in
Using features on demand results in saving potentially significant amounts of disk space. features on demand becomes a third ins
larisa86 [58]
The answer is <span>Disabled with payload removed
The development is extremely crucial in the age where we contstantly receive access to overload of content.
Large hardisk means that we could store much more of the amount of data that we could put without compromising the performance.</span>
5 0
3 years ago
Which password attack method uses long lists of words that have been predefined and can be quickly downloaded for use to break a
vova2212 [387]

Answer:

A dictonary attack.

Explanation:

Dictionaries hold many words that can be downloaded and used. Word or name passwords are usually just one word or maybe two. In other words, predefined words being used as a password? Not safe. When someone attempts to crack it, they use brute force attacks. Among these are dictionary attacks, which focus on the actual words rather than numbers.

3 0
2 years ago
An Oven Is Just A Spicy Refrigerator? Yes Or No??
Marianna [84]

Answer:

No

Explanation:They both have different actions

3 0
2 years ago
Read 2 more answers
What is done when Python complies your program
alexgriva [62]

Answer:

It makes

Explanation:

it run the program

4 0
3 years ago
Read 2 more answers
A cell reference with only one dollar sign before either the column or the row is called an absolute reference.
BlackZzzverrR [31]
False, absolute references have two dollar signs
4 0
3 years ago
Other questions:
  • Create a funtion makeStudent(studentlist) where studentlist is your list of Student namedtuples The function should do the follo
    13·1 answer
  • The interaction between information technology and organizations is influenced___________.A) solely by the decision making of mi
    12·1 answer
  • You can apply several different worksheet themes from which tab?
    10·2 answers
  • A user calls to report that she is experiencing intermittent problems while accessing the wireless network form her laptop compu
    9·1 answer
  • The invention of the transistor was important to the development of computers because
    14·1 answer
  • Which command can be used to find errors on a hard drive​
    6·1 answer
  • The average price of milk increased from $3.00 last year to $3.50 this year. This is most likely due to:
    14·1 answer
  • In 200 words or more, please describe the Cyber Security Enhancement Act. Include when it was implemented and what it's purpose
    12·1 answer
  • Mingji is working to transfer photos from her digital camera to her computer. While
    11·1 answer
  • What are 3 of the most important things about internet safety that you would recommend and why
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!