1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
arlik [135]
3 years ago
14

What is the safety for working ina facility that performs xrays?

Computers and Technology
1 answer:
mylen [45]3 years ago
7 0

Hey and thanks for giving me the chance to serve u

For the nuclear industry, the NRC, amongst other things, dictates exposure limits to both workers dealing with radioactive material, called the occupationally exposed, and the general public, or non-occupationally exposed.  For an occupationally exposed worker, such as someone at a nuclear power plant or in nuclear medicine at a hospital (if they’re licensed by the NRC), the limit is 5 rem a year.  Surprisingly, while most nuclear power workers never receive anywhere close to that amount, some workers in the medical field, such as those working with X-ray fluoroscopy machines, are amongst the highest occupationally exposed workers.  Pregnant women who are occupationally exposed may choose to (but are not required to) declare their pregnancy and receive lower dose limits throughout the term of the pregnancy.

For members of the public, the annual limit from the NRC (which is matched by the EPA for areas not covered by NRC guidelines) is 100 mrem.  Licensed facilities have to have programs in place to limit exposure, and be able to demonstrate that procedures are in place that members of the public would not be exceeding those levels. 

You might be interested in
Ed wants to make sure that his system is designed in a manner that allows tracing actions to an individual. Which phase of acces
tatiyna

The phase of access control that one can say that Ed is more concerned about is called Accountability.

<h3>What is accountability?</h3>

Accountability is known to be one that removes the time and effort you that is used on distracting activities and a lot of unproductive behavior and it makes one to be more focused.

Hence, The phase of access control that one can say that Ed is more concerned about is called Accountability.

Learn more about Accountability from

brainly.com/question/27958508

#SPJ1

7 0
2 years ago
During the processing stage what does the computer do
Ann [662]
<span>The finished product is "output." In the electronic computer, data are the raw material or input to the computer.</span>
5 0
4 years ago
Will, there be any presents this year
garri49 [273]

Answer:

no why

Explanation:

8 0
3 years ago
Carlos works in the IT department at Sample Bank. He uses a cloud-based e-mail system and has been asked by his manager to estab
vodomira [7]

Answer:

Option (A) i.e., Chargeback is the correct answer to the following question.

Explanation:

In the cloud-computing, Chargebacks is used for the metrics on the e-mail box which is used by the departments or the organizations, by this system, department budgets has been billed for the costs of entertain the department e-mails. It is applied on the expenses of the IT sectors or services for the strategies of the accounting.

Option B is incorrect because billback it is an application that are used in organization for needs to determining the resources of IT.

Option C is incorrect because Showback is the policy that is used by the IT for rise the expenses.

7 0
3 years ago
Which label belongs in the area marked Z? Producers Science Question
Bad White [126]
Idk dont  ask me i thank its c
5 0
3 years ago
Read 2 more answers
Other questions:
  • Compare and contrast the various options that exist for acquiring software.
    12·1 answer
  • In excel, a cell is referred to by its cell __________, which is the coordinates of the intersection of a column and a row. answ
    14·1 answer
  • Which step is common to both creating a new document and saving a document?
    11·2 answers
  • Using ________ data mining, the user usually begins by telling the data mining software to look and test for specific patterns a
    15·1 answer
  • Which device prints large, three-dimensional high-quality color graphics?
    15·1 answer
  • The ____ computing device had a memory capacity of 72 numbers and could be programmed to perform a 23-digit multiplication in ju
    6·1 answer
  • A ______ or workstation computer is typically used by one or a small number of people to perform everyday productivity tasks, su
    10·1 answer
  • tls Explain in your own words how, by applying both asymmetric and symmetric encryption, your browser uses TLS to protect the pr
    8·1 answer
  • If I am working in a document and wish to follow a hyperlink, what should I do?
    7·1 answer
  • What are the importance of Help and Support feature of Windows​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!