1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arisa [49]
3 years ago
7

Your employer gives you a list of all chemicals in the entire building and the location of the SDS collection, and he asks you t

o sign off that you completed the safety training program. What else is required of an employer training program?
Select all that apply.

SDS interpretation


Training for Chemical Handling in your area


PPE needed for work area


Physical and health hazard information for the chemicals in your work area.
Computers and Technology
2 answers:
Whitepunk [10]3 years ago
8 0

Answer:

SDS interpretation  and PPE  needed for Work area.

Explanation:

SDS interpretation  is missing. Employee is new and he/she does not know how to interpret SDS. The employer must explain this to the employee.

The training for chemical handling in your area is given through SDS collection, Hence it is not required.

The PPE protected equipment needs to be provided definitely.

Physical and health hazard information for the chemicals in your work area is provided in SDS collection.

And remember SDS is safety data sheet. And PPE is personal protective equipment.

Lina20 [59]3 years ago
4 0

Answer:PPE needed for work area ONLY

Explanation:OSHA

You might be interested in
What is the ls option to list entries by lines instead of by columns?​
gogolik [260]

Sometimes I just meet some Unintelligen ppl

7 0
3 years ago
Why is the transmission of information impartial on websites?
Alex777 [14]
I believe that the best answer among the choices provided by the question is <span>B.Websites cannot manage the amount of information they receive. </span>
Hope my answer would be a great help for you.    If you have more questions feel free to ask here at Brainly.
4 0
3 years ago
Read 2 more answers
What is the boundary folding method?
Romashka [77]

Answer:

 Boundary folding method is basically used in the java algorithm and in the hash table. In the hash function, the left and the right value are basically folded in the fixed boundary between the given center values by using the boundary folding methods.

There are basically two types of folding method in the hashing that are:

  • Folding shift
  • Folding boundary

In the folding boundary method the outside value are get reversed and the alternate values are get flipped at the boundary folding method.

4 0
4 years ago
Identity theft, where people steal personal information, continues to be a problem for consumers and businesses. Assume that you
svetlana [45]

Answer:

Secure the personal information with complex multi-factor authentication and configure intrusion detection and prevention and a firewall.

Explanation:

Multi-factor authentication is a method of securing a client's personal information from the client's side to the data centre. It uses more than one security processes not policies. There key be three authentications process like a password, security token and biometrics or two authentications like password and biometrics or token.

The firewall and intrusion detection and prevention are vulnerability preventive method to detect and stop cyber attacks.

5 0
3 years ago
Intel® Core™ i5-7500 is one of Intel's 7th generation of microprocessors and was launched earlier in 2017 and has been used in m
Ket [755]

Answer:

A. 4 CPUs and 6 megabyte cache memory

B. 1.3157 x10^-9 nanoseconds

Explanation:

The Intel core i5 7500 is a seventh generation central processing unit with a 4 CPU core and a 6 megabyte cache memory. It executes task at a clock cycle of 5 clock cycle at a speed of 3.8 GHz.

The relationship between frequency and clock cycle is,

Clock cycle = 1 / ( frequent).

So, One clock cycle = 1 / 3.8 GHz

= 0.3 x10^-9

For five clock cycles = 5 x 0.3 x10^-9

= 1.3157 x10^-9 nanoseconds.

5 0
3 years ago
Other questions:
  • Which functions are performed by server-side code??​
    10·1 answer
  • In Paint, which of the following are ways to use a picture that you have saved on your computer? (Select all that apply.)
    8·1 answer
  • James Hutton:
    8·1 answer
  • Which of the below statements describes the nature of HTML elements - check as many as apply
    6·1 answer
  • How do you change brightness on acer laptop?
    7·1 answer
  • What is indentation?
    8·2 answers
  • Which questions should you ask yourself when performing research online?
    9·1 answer
  • What are some positive impacts technology has on the environment?​
    5·2 answers
  • People’s personal information is collected _____. Select 4 options.
    7·2 answers
  • A health care provider approaches Accenture to help them increase their efficiency through an advanced data science platform.Wha
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!