1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nataliya [291]
4 years ago
5

What is considered necessary to establish OSHA

Computers and Technology
1 answer:
irakobra [83]4 years ago
4 0
OSHA (the Occupational Safety and Health Administration) is a part of the US Department of Labor that establishes, issues, and enforces national workplace safety regulatio…ns. These are designed to make job areas and practices safer for US workers.
You might be interested in
Why are people's visions of utopias and dystopias subjective?
Leno4ka [110]

Answer:

D. Because the technology needed for one person's utopia may be what creates disaster for another person's dystopia.

Explanation:

3 0
3 years ago
someone who protects valuable online information, like phone numbers and passwords would be considered​
charle [14.2K]

Answer: i believe a digital citizen

i am not 100% sure about that answer but i reaserached a little and thats what i found :)

I hope this helps u out a little a thank and a brainlist would be greatly appreciatecd :)

6 0
3 years ago
outline 4 IDE features that makes software development much faster and more convenient than other alternatives.​
mr_godi [17]

Answer:

IDEs can let you code without internet.

Explanation:

1. you can code without wifi.

2. it combines common developer tools into 1 GUI (grafic user interface).

3. it gives a warning about memory leaks.

4. it can correct synaxes.

Hope This Helps! :)

3 0
3 years ago
A network administrator wants to authenticate server machines using Transport Layer Security (TLS). What can the administrator i
raketka [301]

Answer:

When enabling TLS 1.2 for your Configuration Manager environment, start by ensuring the clients are capable and properly configured to use TLS 1.2 before enabling TLS 1.2

Explanation:

When enabling TLS 1.2 for your Configuration Manager environment, start by ensuring the clients are capable and properly configured to use TLS 1.2 before enabling TLS 1.2

4 0
2 years ago
The mechanism for preventing traffic that is perceived to be dangerous to the network is known as a a0.
nikklg [1K]
I would go with firewall
6 0
3 years ago
Other questions:
  • Study the editorial cartoon Participation in Youth Sports Down by Dan Landgren Jr.
    6·2 answers
  • Why is a port scan detected from the same ip on a subnet an alarming alert to receive from yourids?
    5·1 answer
  • Write a for loop to print all elements in courseGrades, following each element with a space (including the last). Print forwards
    10·1 answer
  • 3.1.5 Which network component connects a device to transmission media and allows the device to send and receive messages?
    6·1 answer
  • What is a algorithm
    6·1 answer
  • How long does it take rblx to re open deleted acc
    8·2 answers
  • 1. Hypothesis: It is easier to establish an ethical work environment in a non-profit organization than in a for-profit organizat
    9·1 answer
  • A Personal Fitness Tracker is a wearable device that tracks your physical activity, calories burned, heart rate, sleeping patter
    13·1 answer
  • The Word feature that would allow you to insert fields from an Access database into multiple copies of a Word document is called
    12·1 answer
  • Create a CourseException class that extends Exception and whose constructor receives a String that holds a college course’s depa
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!