1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
murzikaleks [220]
3 years ago
11

According to policies and procedures, describe the process to report a hazard?

Computers and Technology
2 answers:
Gre4nikov [31]3 years ago
8 0
Acute hazards should be reported immediately to a supervisor and safety officer. Hazards that are less acute you should report by filling out a hazard report and turning it into the correct person.
trapecia [35]3 years ago
7 0
When u r in emergency
You might be interested in
What is the result of expression 15 > 10 > 5 in C? What is the result of the same expression in Java?
Inessa05 [86]

Answer:

java: error

C: false

Explanation:

In Java the compiler understand that you are trying to compare an integer (15) with a boolean (10 > 5) this generate the next error:

error: bad operand types for binary operator  

In C the compiler convert (15 > 10 > 5) in (15>10) > (10>5) which is equal to TRUE > TRUE, the compiler can also read it as 1 > 1 (since 1 is TRUE and 0 is FALSE).  like 1>1 is false then C program return false.

5 0
3 years ago
is a security design principle to direct the selection of control layers for an organization's computing enclave to ensure its r
Rina8888 [55]

Answer:

Defense in Depth (DiD).

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Defense in Depth (DiD) can be defined as a concept or framework in cyber security that typically involves the process of layering multiple defensive mechanisms and security control throughout an information technology (IT) system, so as to prevent data theft or an unauthorized access to user data.

Basically, this cyber security technique is designed such that when a layer of the defensive mechanism fails, another security layer step in to mitigate and prevent the attack. Thus, it causes redundancy when an attacker exploits a vulnerability in a system, a breach of security or when one of the security layers fail.

3 0
3 years ago
When mapping a drive, you can type in the path to the shared folder on the host computer. what is the syntax for the path?
fomenos
For SMB:  \\server\path\to\share
For CIFS: //server/path/to/share
3 0
4 years ago
Which of the following is the correct style tag for having the web page's text be aligned to the right?
uysha [10]

Answer:

B. style=text-align: right

Explanation:

text-align is a CSS property having 5 types of values. Each of values define below.

left - Aligns content to left.

right - Aligns content to right.

center - Centers the content.

justify - Depends on the width of the content, it will align itself to both left and righ

inherit - It specifies the the value of text-align should be taken from parent element.

8 0
3 years ago
Read 2 more answers
How do u type faster
eduard

Answer:

by learning the right home keys and how to place the fingers

Explanation:

the left hand side : A,S,D,F

the right hand side: :, L, K, J

the two little fingers are guide keys

guide keys: letter A and column

5 0
3 years ago
Other questions:
  • Which is the most important reason you should properly cite information that you obtain from an Internet search? Question 2 opti
    8·1 answer
  • Help!!! Who is this? Who is it from?
    14·2 answers
  • Critics of media consumption
    10·2 answers
  • In filmmaking, who is ultimately responsible for the creative process?
    15·1 answer
  • Where are options to add a border around the outside of a chart found?
    9·2 answers
  • Which deployment tool will you use to deploy metadata from one organization to another organization?
    6·1 answer
  • Sara Beth and Taylor have developed a new software that they plan to distribute for free, allowing other software professionals
    7·1 answer
  • Parts of a computer software
    12·1 answer
  • Anything a person writes or creates is __________
    6·2 answers
  • Which of the four factors of production are hit the hardest when high unemployment occurs ?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!