1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arisa [49]
2 years ago
7

Your employer gives you a list of all chemicals in the entire building and the location of the SDS collection, and he asks you t

o sign off that you completed the safety training program. What else is required of an employer training program?
Select all that apply.

SDS interpretation


Training for Chemical Handling in your area


PPE needed for work area


Physical and health hazard information for the chemicals in your work area.
Computers and Technology
2 answers:
Whitepunk [10]2 years ago
8 0

Answer:

SDS interpretation  and PPE  needed for Work area.

Explanation:

SDS interpretation  is missing. Employee is new and he/she does not know how to interpret SDS. The employer must explain this to the employee.

The training for chemical handling in your area is given through SDS collection, Hence it is not required.

The PPE protected equipment needs to be provided definitely.

Physical and health hazard information for the chemicals in your work area is provided in SDS collection.

And remember SDS is safety data sheet. And PPE is personal protective equipment.

Lina20 [59]2 years ago
4 0

Answer:PPE needed for work area ONLY

Explanation:OSHA

You might be interested in
Write a program that continually prompts the user for an integer input until input is entered that is less than 0. Each input th
professor190 [17]

Answer:

Following are the program in the C++ Programming Language:

#include <iostream>//header file

using namespace std;//namespane

//set main method

int main() {  

int a[100]; //set integer type array variable

int value, i = 0; //set integer variables

cout<<"Enter less than 0 to exit:"<<endl; //message for exit

cout<<"Enter the integer numbers:"<<endl; //message to enter numbers

do{ //set do while

cin>>value; //get input from the user

a[i++] = value; //append elements in array

}while(value>=0);

i--;  

cout<<"\nArray are:"<<endl;//message for array

for(int k = 0;k<i;k++){ //set for loop

cout<<a[k]<<" "; //print array

}

return 0;

}

<u>Output</u>:

Enter less than 0 to exit:

Enter the integer numbers:

1

2

3

4

5

-1

Array are:

1 2 3 4 5

Explanation:

Here, we set the integer data type main method "main()" and inside it:

  • we set integer type array variable with index value 100.
  • we set two integer type variable "value" and "i" initialize value 0.
  • we set the do-while loop in which we get the input from the user and and append in the array and pass condition if the value is greater then equal to 0.
  • Finally, set for loop and print the elements of an array.

 

7 0
3 years ago
.in the array based list implementation of the ADT what is the worst case time efficiency of the getEntry method?
kenny6666 [7]

Answer:

c.O(n)

Explanation:

In the array based list implementation of the ADT the worst case time complexity of the getEntry method is O(n).In the worst case it has to travel upto n elements then it has to do the operation.In doing so  the time complexity will come out to be O(n).So we conclude that the answer to this question is O(n).

5 0
3 years ago
Cuando se creo argentina​
vekshin1

Answer:

Argentina se creó tras su independencia respecto de España el 9 de julio de 1816, tras 6 años de guerra por la independencia del país, donde líderes como Manuel Belgrano, Martín Miguel de Güemes y José de San Martín derrotaron a los españoles.

La unidad nacional de los argentinos, a su vez, se originó tras las invasiones inglesas de 1806 y 1807, y se consolidó tras la conquista de España por parte de los Bonaparte, que dio origen a la Revolución de Mayo de 1810, donde los argentinos decidieron imponer un gobierno propio.

7 0
3 years ago
There are local administrators for each of the departments, excluding the IT. These local administrators will use the local admi
torisob [31]

Answer:

Listed below are the few ways Linux Server can be secured

1. Group policies: This is a way to ensure security by applying group policies and permissions both on the group level and the files level. Through proper permission configuration we can easily restrict other users from accessing those files and directories.

2. Implementation of the firewall: Implementing firewall in each of the Linux server will definitely help in securing your machine from outside threats. Iptables will help in filtering the network traffic that are entering into the system and even going out of the system.

3.Enabling SELINUX: Enabling SELINUX is another way to secure your system especially a Linux Server. Selinux is a powerful security that checks and allows applications to run into the system. It won't allow any untrusted application to run into the system.

6 0
3 years ago
Size of the information in each field of the database
bonufazy [111]

It can approximately be around 20 basically it depends on your text how long or short the text is

3 0
2 years ago
Other questions:
  • Arpanet was developed by the united states so that there was a communication network that would survive a nuclear war. True or F
    11·1 answer
  • When typing the Works Cited in a report, set a .5" ______ indent. *
    12·1 answer
  • Which location-sharing service offers items for users as a gaming component and also allows them to collectively link their chec
    9·2 answers
  • A firm can survive and succeed in the long run if it successfully develops strategies to confront the _______________ that shape
    9·1 answer
  • Who is on ig and would like to be friends?​
    8·2 answers
  • Initialized the variable with the value 0
    11·2 answers
  • Can you help me with this question please ​
    13·1 answer
  • How do you put text in MS publisher?<br><br> When do you use text wrapping?
    14·1 answer
  • Current flow is the same through all the elements of a series circuit.<br><br> true or false?
    15·1 answer
  • The three main objectives of information security are
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!