1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aleksandrvk [35]
4 years ago
12

In the __________ Standard, chemical manufacturers, importers, and distributors are required to provide hazard information by wa

y of Safety Data Sheets (SDSs) and labels on containers.
a. Chemical Knowledge
b. Chemical Manufacture
c. Hazard Communication
Computers and Technology
2 answers:
Mekhanik [1.2K]4 years ago
8 0
<span>According to the Occupational Safety and Health Administration, the Hazard Communication Standard requires Safety Data Sheets to provide and communicate information about potential hazards. They must be user friendly and easy to understand. It must include potential hazards, protections and preventions.</span>
STatiana [176]4 years ago
7 0

Answer is C: Hazard Communication

Hazard Communication Hazard (HCS 2012) provides a coherent and standardized approach to communicating the hazards of chemicals by way of Safety Data Sheets (SDSs) and labels on containers. However, Occupational Safety and Health Administration (OSHA) revised its HCS 2012. In it, they revised criteria for classification of chemical hazards, labeling provisions, hazard statements, and precautionary statements.  In addition, modifications were made to health standards substances to ensure requirements for labels and SDSs are consistent with the HCS 2012. According to OSHA’S standards, SDSs should periodically be reviewed and updated.

You might be interested in
What security principle does a firewall implement with traffic when it does not have a rule that explicitly defines an action fo
NemiM [27]

Answer:

Implicit deny

Explanation:

A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

When a firewall encounters a traffic it does not have a rule that explicitly defines an action for that communication, it implicit deny.

7 0
3 years ago
Suppose you can access the caches in the local DNS servers of your department. Can you propose a way to roughly determine the We
lubasha [3.4K]

Answer:

We can periodically take a snapshot of the Domain Name System (DNS) caches in the local  Domain Name System (DNS) servers.

Explanation:

We can periodically take a snapshot of the Domain Name System (DNS) caches in the local  Domain Name System (DNS) servers. The Web server that appears most frequently in the  Domain Name System (DNS) caches is the most popular server. This is because if more users are interested in a Web server, then Domain Name System (DNS) requests for that server are more frequently sent by users. Thus, that Web server will appear in the  Domain Name System (DNS) caches more frequently.  

6 0
4 years ago
The ____ object can trigger a selectedindexchanged event when a selection is made
Maslowich

The objects that can trigger a selected index changed event when a selection is made are the following;

<span>·         </span>Combo box – This allows the user to type or select value

<span>·         </span>Drop down list – This allows the data entry to be placed easier and to limit entries

<span>·         </span>List box – this is considered to be a control in which contains a collection of more than one items

<span> </span>

4 0
3 years ago
When computers connect to one another to share information, but are not dependent on each other to work, they are connected thro
kap26 [50]
A peer-to-peer network, I believe.
6 0
4 years ago
Victor has been murdered, and Art, Bob, and Carl are suspects. Art says he did not do it. He says that Bob was the victim's frie
professor190 [17]

20 characters yes no

7 0
3 years ago
Other questions:
  • Write a static method named textcount that takes a scanner representing a file as a parameter and that reports various statistic
    11·1 answer
  • The malicious use of computer code to modify the normal operations of a computer or network is called a ___ .
    13·1 answer
  • What general strategies can the network managers use to reduce congestions?
    7·1 answer
  • Problem statement: Using loop, write a program that will ask the user to enter a character for left or right. Then, the user wil
    13·1 answer
  • federal law requires public libraries to install filtering software on computers to prevent children from accessing adult conten
    14·1 answer
  • Write a C program that will load entries from a file containing details of books and prints them.
    14·1 answer
  • Point out the wrong statement.
    10·1 answer
  • Edhesive code practice 6.3
    14·2 answers
  • What is the correct sequence in which a computer operates​
    6·1 answer
  • In which directory would a system administrator store scripts that should be run monthly by the cron daemon?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!