1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AveGali [126]
4 years ago
13

At the coffee shop where they work, Jen is the safety officer, Richard is in charge of administering first aid, Ashley is respon

sible for making any necessary phone calls, and George's task is to assess the situation. What have the employees of this coffee shop established?
Computers and Technology
2 answers:
Dafna1 [17]4 years ago
7 0
They have etablished a good first aid system.
schepotkina [342]4 years ago
4 0

Answer: Safety hierarchy

Explanation:

Safety hierarchy is defined as the ordering of the steps to take measure against the hazard to control an manage it. It helps in removal of risk and avoiding hazardous situations.This structure includes elimination of hazards ,substitution,engineering controls ,administrative controls and personal protective equipment.

According to the question, employees working at the coffee shop are describing the scenario of safety hierarchy.As Jen is responsible for improving safety, Richard is handling administrative controlling, Ashley is managing engineering controls and George is eliminating the risk.

You might be interested in
Explain block diagram of. computer architure​
ozzi

Answer:

A block diagram is a diagram of a system in which the principal parts or functions are represented by blocks connected by lines that show the relationships of the blocks. They are heavily used in engineering in hardware design, electronic design, software design, and process flow diagrams.

Explanation:

In your question you asked architure but maybe it is architecture (•;

5 0
3 years ago
When widgets, or portable chunks of code, are embedded on html pages and thereby help increase the functionality of those pages,
Anna11 [10]
<span>When widgets, or portable chunks of code, are embedded on html pages and thereby help increase the functionality of those pages, consumers embrace one of the greatest virtues of social media known as Collaboration.</span>
5 0
3 years ago
Select the word or phrase from the drop-down menu to complete each sentence. File names consist of a ______ and a file extension
Law Incorporation [45]

Answer:

base file name, file format, bitmap image

Explanation:

8 0
3 years ago
Write a program that reads whitespace delimited strings (words) and an integer (freq). Then, the program outputs the strings fro
Lesechka [4]

Answer:

See explaination for the code

Explanation:

def wordsOfFrequency(words, freq):

d = {}

res = []

for i in range(len(words)):

if(words[i].lower() in d):

d[words[i].lower()] = d[words[i].lower()] + 1

else:

d[words[i].lower()] = 1

for word in words:

if d[word.lower()]==freq:

res.append(word)

return res

Note:

First a dictionary is created to keep the count of the lowercase form of each word.

Then, using another for loop, each word count is matched with the freq, if it matches, the word is appended to the result list res.

Finally the res list is appended.

3 0
4 years ago
Which daemon manages the physical memory by moving process from physical memory to swap space when more physical memory is neede
Anastasy [175]

Answer:

Swap daemon

Explanation:

Swap daemon manages the physical memory by moving process from physical memory to swap space when more physical memory is needed. The main function of the swap daemon is to monitor processes running on a computer to determine whether or not it requires to be swapped.

The physical memory of a computer system is known as random access memory (RAM).

A random access memory (RAM) can be defined as the internal hardware memory which allows data to be read and written (changed) in a computer.Basically, a random access memory (RAM) is used for temporarily storing data such as software programs, operating system (OS),machine code and working data (data in current use) so that they are easily and rapidly accessible to the central processing unit (CPU).

Additionally, RAM is a volatile memory because any data stored in it would be lost or erased once the computer is turned off. Thus, it can only retain data while the computer is turned on and as such is considered to be a short-term memory.

There are two (2) main types of random access memory (RAM) and these are;

1. Static Random Access Memory (SRAM).

2. Dynamic Random Access Memory (DRAM).

6 0
3 years ago
Other questions:
  • Write a program that estimates the approximate number of times the user’s heart has beat in his/her lifetime using an average he
    12·1 answer
  • This common technique, employed at the edge of a network, eliminates the need for public IP addresses on a private network while
    8·1 answer
  • Your company has a wireless network for its small office network. The wireless network does not broadcast its service set identi
    11·1 answer
  • Use the drop-down menus to complete each sentence about the layers of the atmosphere.
    14·2 answers
  • What adaptation Judy and her parents have that help them run from predators coming?​
    6·1 answer
  • If a 9V, 7W radio is on from 9am to 12pm. Calculate the amount of charge that flows through it, hence or otherwise the total num
    8·1 answer
  • You receive an email that appears to legitimately be from your Bank. The email indicates the need for verification of your infor
    15·2 answers
  • Why is operating system important software for computer?give 3 reasons
    8·1 answer
  • A multinational organization that offers web-based services has datacenters that are located only in the United State; however,
    6·1 answer
  • 1.Which of the serves as the basis for determining whether an object has moved or not?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!