1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
goblinko [34]
3 years ago
8

OSHA's mission is to: A. Ensure that all workers receive adequate workers' compensation payments B. Esnure that all workers rece

ive the federal minimum wage C. Protect the safety and health of America's workers. D. Protect the safety and health of the general public
Computers and Technology
2 answers:
umka2103 [35]3 years ago
4 0
Your answer is C, <span> 
The Occupational Safety and Health Act of 1970 protects working men's and women's safety.</span>
Sunny_sXe [5.5K]3 years ago
3 0

Answer:

The correct option to the following question is C.) Protect the safety and health of America's workers.

Explanation:

With the OSHA(Occupational Safety and Health Administration) Act of 1970's, Congress has created an OSHA(Occupational Safety and Health Administration) to ensures the safety and the healthful working condition of the working women and men by enforcing and setting the standard and providing outreach, training, assistance, and education.

You might be interested in
What component of effective feedback is demonstrated by giving examples of what an employee is doing right instead of just prais
Aleksandr [31]
It's specific
<span>"Instead of giving general praise or criticism, tell the person exactly what they did right or how they can improve."</span>
4 0
3 years ago
Read 2 more answers
2. An evil twin attack that broadcasts a legitimate SSID for an unauthorized network is an example of what category of threat? A
avanturin [10]

Answer:

A. Spoofing

Explanation:

Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source. Spoofing can apply to emails, phone calls, and websites, or can be more technical, such as a computer spoofing an IP address, Address Resolution Protocol (ARP), or Domain Name System (DNS) server.

IP spoofing involves an attacker trying to gain unauthorised access to a system by sending messages with a fake or "spoofed" IP address to make it look like the message came from a trusted source, such as one on the same internal computer network, for example.

Email spoofing often involves things like requests for personal data or financial transactions. The emails appear to be from trusted senders such as customers, coworkers, or managers but they are actually from cyber criminals who deliberately disguise themselves to gain your trust and your help with the action they want you to take

7 0
4 years ago
C:/Users/Documents/resume.docx Where is the "resume" document located in this file structure?
ASHA 777 [7]

Answer:

"resume.docx" is located in "Documents"

Explanation:

[<drive-letter:: represents drive name>]:/Main_Directory/Sub_Directory/ETC..

3 0
3 years ago
A _______ record is responsible for resolving an ip to a domain name.
katen-ka-za [31]
A DNS record <span>is responsible for resolving an IP to a domain name.
</span>The term DNS record denotes a database record, stored on DNS servers used to map a URL to an IP address. 
 The process is the following: the URL is entered and searched in the browser, that URL is forwarded to the DNS servers and then directed to the specific Web server<span>.</span>
3 0
3 years ago
how much should an organization consider moving into the cloud before full outsourcing starts making more business sense
PIT_PIT [208]

Answer:

47

Explanation:

capital steez

8 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following is a justification for giving a Page Quality (PQ) rating of Lowest? Select all that apply. True False The
    7·1 answer
  • As the driver it is not your responsibility that you are focused on the driving task with any possible distractions minimized. T
    9·2 answers
  • A(n) ____________________ is a set of programs that coordinates all the activities among computer or mobile device hardware.
    10·1 answer
  • Bill downloaded an antivirus software from the Internet. Under the Uniform Commercial Code (UCC), the software is a: Select one:
    15·1 answer
  • Write a loop that continually asks the user what pets the user has, until the user enters "rock", in which case the loop ends. I
    12·1 answer
  • Need help please will mark brainliest
    15·1 answer
  • Retype and run, note incorrect behavior. Then fix errors in the code, which should print num_stars asterisks.
    9·1 answer
  • Here is a nested loop example that graphically depicts an integer's magnitude by using asterisks, creating what is commonly call
    7·1 answer
  • Use the {blank} to view your presentation the way an audience will see it.
    13·2 answers
  • It would be at least two decades before some of
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!