1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Firlakuza [10]
3 years ago
15

Ted wants to follow the StartSafe philosophy when working around electricity. Which of the following steps would be consistent w

ith StartSafe?
Computers and Technology
2 answers:
Sindrei [870]3 years ago
8 0

Correct answer is:

Understand the basics of electricity.

Explanation:

To implement the StartSafe philosophy in restricting workplace intensity, the three steps to follow are:

Learn how to guard yourself, recall about protection in your surroundings, and intend your permissible replies to an extreme condition.

icang [17]3 years ago
4 0
The StartSafe philosophy is that you should use your knowledge, practice safety, and share safety. So the answer to your question is <span>A. Follow procedures established by his co-workers. In order to be safe when working with electricity, it is important to follow the instructions for you to be protected from grounded current.</span>
You might be interested in
When using the Internet, do not give out your __________ without your parents' permission. (Select all that apply.)
Dafna1 [17]

Answer:

IP address

Explanation:

if you do give out your IP address people can find you so you need to ask your parents to give out your IP address

8 0
2 years ago
The Polish mathematician Wacław Sierpiński described the pattern in 1915, but it has appeared in Italian art since the 13th cent
soldi70 [24.7K]

Answer:

/ Sierpinski.java

public class Sierpinski {

     // method to find the height of an equilateral triangle with side length =

     // length

     public static double height(double length) {

           // formula= length*sqrt(3)/2

           double h = (length * Math.sqrt(3)) / 2.0;

           return h;

     }

     // method to draw a filled triangle (pointed downwards) with bottom vertex

     // x,y

     public static void filledTriangle(double x, double y, double length) {

           // finding height

           double h = height(length);

           // filling triangle as a polygon

           // passing x, x-length/2, x+length/2 as x coordinates

           // and y, y+h, y+h as y coordinates

           StdDraw.filledPolygon(new double[] { x, x - (length / 2.0),

                       x + (length / 2.0) }, new double[] { y, y + h, y + h });

     }

     // method to draw an n level sierpinski triangle

     public static void sierpinski(int n, double x, double y, double length) {

           // checking if n is above 0 (base condition)

           if (n > 0) {

                 // drawing a filled triangle with x, y as bottom coordinate, length

                 // as side length

                 filledTriangle(x, y, length);

                 // drawing the triangle(s) on the top

                 sierpinski(n - 1, x, y + height(length), length / 2);

                 // drawing the triangle(s) on the left side

                 sierpinski(n - 1, x - (length / 2.0), y, length / 2);

                 // drawing the triangle(s) on the right side

                 sierpinski(n - 1, x + (length / 2.0), y, length / 2);

           }

     }

     public static void main(String[] args) {

           // parsing first command line argument as integer, if you dont provide

           // the value while running the program, this program will cause

           // exception.

           int n = Integer.parseInt(args[0]);

           // length of the outline triangle

           double length = 1;

           // finding height

           double h = height(length);

           // drawing a triangle (pointed upwards) to represent the outline.

           StdDraw.polygon(new double[] { 0, length / 2, length }, new double[] {

                       0, h, 0 });

           // drawing n level sierpinski triangle(s) with length / 2, 0 as x,y

           // coordinates and length / 2 as initial side length

           sierpinski(n, length / 2, 0, length / 2);

     }

}

7 0
2 years ago
A network technician cannot get a host to connect to the internet. running the ping command shows the apipa ip address. what is
Lunna [17]
The router will not connect to th network. This will keep it from connecting to the NEXUS
6 0
3 years ago
PLS HELP) Early word processors ran on devices that looked like digital _______?
stealth61 [152]
I looked it up it just says true
8 0
3 years ago
Read 2 more answers
What types of user permissions can you set up when adding a new team member in QuickBooks Online Accountant?
e-lub [12.9K]

Answer:

1. Standard User

2. Company Admin

3. Reports only

4. Time tracking only

5. Accountant

Explanation:

There are different types of user permissions one can set up when adding a new team member in QuickBooks Online Accountant. This includes the following:

1. Standard User: this can be utilized to specialize user's access right

2. Company Admin: this gives such users additional or access rights in the firm.

3. Reports only: this gives users the rights to reports only.

4. Time tracking only: this only gives users the ability to see the version that has timesheets and time reports

5. Accountant: this is designed for the firm's accountant.

6 0
2 years ago
Other questions:
  • A ____ is harmful computer code that spreads without your interaction, slipping from one network to another and replicating itse
    15·1 answer
  • Which of the following code segments could be used to skip the first two characters of an input line (they may or may not be whi
    13·1 answer
  • Which of the following code segments does not contain any errors?
    7·1 answer
  • If you were to create a new app for a smartphone or tablet that does not already exist, what would you create?
    10·1 answer
  • Which statement is not true? An audit objective for systems maintenance is to detect unauthorized access to application database
    8·1 answer
  • Which UML relationships should be used between a subclass and a superclass? For example, suppose there is an interface or abstra
    5·1 answer
  • Star and peer-to-peer are types of
    9·2 answers
  • What are some positive and nevative aspects of technology?
    11·1 answer
  • What Is The First Computer Brought In Nepal ? <br>​
    10·1 answer
  • PLEASE HELP!
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!