1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AveGali [126]
3 years ago
13

At the coffee shop where they work, Jen is the safety officer, Richard is in charge of administering first aid, Ashley is respon

sible for making any necessary phone calls, and George's task is to assess the situation. What have the employees of this coffee shop established?
Computers and Technology
2 answers:
Dafna1 [17]3 years ago
7 0
They have etablished a good first aid system.
schepotkina [342]3 years ago
4 0

Answer: Safety hierarchy

Explanation:

Safety hierarchy is defined as the ordering of the steps to take measure against the hazard to control an manage it. It helps in removal of risk and avoiding hazardous situations.This structure includes elimination of hazards ,substitution,engineering controls ,administrative controls and personal protective equipment.

According to the question, employees working at the coffee shop are describing the scenario of safety hierarchy.As Jen is responsible for improving safety, Richard is handling administrative controlling, Ashley is managing engineering controls and George is eliminating the risk.

You might be interested in
The opening of the throttle plate can be delayed as long as
blsea [12.9K]
<h2>I'm trying to adjust the sawtooth throttle on my H. I can open the throttle to 8 notches from the top and it is at the 1815 rated rpm. When I go above that it will overspeed, up to 2500rpm! At the last notch on the quadrant. I have tried the adjustments in the governor, the only thing I have been able to do is set the high rpm screw so it stops at the 8th notch from the top. I should be able to have full use of the quadrant and not go over the 1815 rpm, right? Does anyone have a pic of the throttle linkage under the hood and how to adjust it? I've also tried adjusting the rod in the governor between it and the carb, it is tightened all the way up now. Any ideas what I am missing?</h2>
6 0
3 years ago
How do you use loops in code?
Keith_Richards [23]

Answer:

A loop in a computer program is an instruction that repeats until a specified condition is reached. In a loop structure, the loop asks a question. If the answer requires action, it is executed. ... A computer programmer who needs to use the same lines of code many times in a program can use a loop to save time

Explanation:

4 0
3 years ago
Write a while loop that prints 1 to user_num. Sample output for the given program: 1 2 3 4
Scorpion4ik [409]
Given 1234
i=1
user num=4#assume positive
while (user-num>=i);
print(i)
i+=1
#include <iostream>
using namespace std;
int main()
{int userNum=0;
int i=0;
userNum=4; ##assume positive
i=1;
while (i <=userNum){
cout<<i>>" ";
i=i+1;
cout <<endl;
return0;
}
6 0
3 years ago
Read 2 more answers
Tony purchases virtual machines from microsoft azure and uses them exclusively for use by his organization. what model of cloud
ioda

Tony buys virtual machines from Microsoft azure and uses them solely for use by his community. A model of cloud computing is the public cloud

<h3>What is the public cloud?</h3>

A public cloud is a shadow deployment model where computing resources are owned and managed by a provider and shared across multiple tenants via the Internet.

These providers deliver their uses over the internet or through saved connections, and they use a whole pay-per-use approach. Each provider delivers a range of products oriented toward additional workloads and business needs.

To learn more about public cloud, refer to:

brainly.com/question/19057393

#SPJ4

4 0
1 year ago
The alternative to encapsulating security protocol (esp) is _________.
Lina20 [59]
The alternative to Encapsulating Security Protocol (ESP) is Authentication Header (AH). Hope this helped!
8 0
3 years ago
Other questions:
  • How did mechanical clocks assist in completing work? How was work done previously?
    12·1 answer
  • If you press the Tab key when you're in in the last cell of a table,
    10·2 answers
  • 3. Which one of the following statements is correct? _____ variables are those whose storage bindings are created when their dec
    12·1 answer
  • Which of the following function headings arevalid? If they are invalid, explain why.
    12·1 answer
  • A chef writing up her famed recipe for beef stew realizes she has switched parsley and oregano everywhere in the recipe. The che
    13·1 answer
  • Next, Leah wants to add a content slide that allows her to insert a table.
    8·2 answers
  • Which elements of a myth appear in this story from early babylon
    14·1 answer
  • Please help me with this
    6·1 answer
  • Examples of email use that could be considered unethical include _____.
    14·2 answers
  • How does natural gas move through pipelines from the well head to the end user thousands of miles away
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!