1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
miss Akunina [59]
3 years ago
14

All of these are required categories on a safety data sheet except

Computers and Technology
2 answers:
mario62 [17]3 years ago
6 0
<h2>Answer:</h2>

<u>The odd option among these options is </u><u>D. manufacturer's trade name</u>.

<h2>Explanation:</h2>

When someone purchases a chemical or any chemical product, one must handle it safely. I order to keep the substance or chemical safe a sheet is provided which shows the precautions that are required for the safety purpose. This data sheet include the characteristics of the product plus the manufacturer;s details. The trade of manufacturer is not required because it is already understood that chemicals are related to chemists.

ale4655 [162]3 years ago
3 0

I think it is D because you would need there contact information in case something happens not there trade name

You might be interested in
On tool hackers use to get sensitive information from victims is/are:
Feliz [49]
Pretty sure it’s keyloggers because it’s the only one that makes sense to me but I’m not 100% sure on that one
5 0
3 years ago
Read 2 more answers
What is an effective technique for searching the web? Choose one.
kakasveta [241]
Option B is what i would say 

if you are searching something and want a specific answer you are going to need to be specific on how you search it
4 0
3 years ago
Read 2 more answers
11
siniylev [52]

Answer:

need help too

Explanation:

7 0
2 years ago
In the main function, define five variables of type int, named: first, second, third, fourth, and total. Also in the main functi
fiasKO [112]

Answer:

  1. import java.util.Scanner;
  2. public class num8 {
  3.    public static void main(String[] args) {
  4.    int first, second, third, fourth,total;
  5.    double decimalOne, decimalTwo, decimalTotal;
  6.    }
  7.    public static void getData(int first, int second, int third, int fourth, double decimalOne, double decimalTwo){
  8.        System.out.println("Enter the Values");
  9.        Scanner in = new Scanner(System.in);
  10.        first=in.nextInt();
  11.        second=in.nextInt();
  12.        third=in.nextInt();
  13.        fourth=in.nextInt();
  14.        decimalOne = in.nextDouble();
  15.        decimalTwo = in.nextDouble();
  16.    }
  17.    public static int computeTotal(int first, int second, int third){
  18.        return first+second+third;
  19.    }
  20.    public static int computeTotal(int first, int second, int third, int fourth){
  21.        return first+second+third+fourth;
  22.    }
  23.   public static double computeTotal(double decimalOne, double decimalTwo){
  24.        return decimalOne+decimalTwo;
  25.    }
  26.    public static void printAll( int first, int second, int third){
  27.        System.out.println("Number one, two and three are: "+first+" "+second+" "+third);
  28.    }
  29.    public static void printAll( int first, int second, int third, int fourth){
  30.        System.out.println("Number one, two and three and four are: "+first+" "+second+
  31.                " "+third+" "+fourth);
  32.    }
  33.   public static void printAll( int first, int second, int third, int fourth, int fifth){
  34.        System.out.println("Number one, two and three and four are: "+first+" "+second+
  35.                " "+third+" "+fourth+" "+fifth);
  36.    }
  37.    public static void printAll( double first, double second, double third){
  38.        System.out.println("Number one, two and three and four are: "+first+" "+second+
  39.                " "+third);
  40.    }
  41. }

Explanation:

This solution is provided in Java:

All the variable declarations are done in the main method (lines 3-6)

Eight methods as specified in the question are created (Lines 7, 17, 20, 23, 26, 29, 33 and 37).

Observe the concept of Method Overloading (i.e. methods with same name and return types but different parameter list)

8 0
3 years ago
How far is florida from oklahoma?
leonid [27]
Florida is 1,344.8 miles from oklahoma
7 0
3 years ago
Read 2 more answers
Other questions:
  • Find the gear ratio of the gear in the picture. <br><br> 25 points+brainliest
    13·1 answer
  • Which folder is the default choice for saving bitmap or JPEG files created by a user?
    9·1 answer
  • Your company sent several staff members for UML training. An outside vendor provided the training. Everyone who attended the tra
    5·1 answer
  • What is the term for a calculation (using encryption technologies) based on the contents of a disk or file that are engineered s
    8·1 answer
  • Select all that apply.
    10·1 answer
  • What form of communication are they using​
    6·1 answer
  • Fill in the blanks to make the factorial function return the factorial of n. Then, print the first 10 factorials (from 0 to 9) w
    6·1 answer
  • Select the correct answer from each drop-down menu.
    10·2 answers
  • How are satellite radio, Internet radio, and podcasting different?
    11·1 answer
  • National ISPs usually offer fewer services and have a smaller technical support staff than regional ISPs.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!