1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
OLga [1]
3 years ago
5

Tina reported a safety hazard at her workplace to OSHA. Representatives from OSHA

Computers and Technology
1 answer:
Anna11 [10]3 years ago
8 0

Answer:

The correct answer is: <em>Protection from Workplace Retaliation</em>

Explanation:

Protection from Workplace Retaliation is one of the 20 Whistleblower Laws enforced by OSHA. According to the Protection from Workplace Retaliation (PFWR) law, employers cannot treat employees unfairly in retaliation to employees reporting  workplace safety hazards to OSHA. The PFWR states that employers cannot retaliate by: denying employees leave, demoting them, firing them, reducing work hours, or denying them promotions.

In this case, Tina's employer violated the Protection from Workplace Retaliation law by giving her menial and difficult jobs in response to her reporting a safety hazard to OSHA.

You might be interested in
Jennifer has her own business. Recently, she has ventured into creation of a new line of apparel. She has created a new symbol t
Zolol [24]
I am think that is the anwer trademark
3 0
3 years ago
Read 2 more answers
How might your use of computers and knowledge after technology systems affect your personal and professional success
vlabodo [156]
You can get a job working as a software/ computer engineer. You can maintain servers at google. These people make lots and lots of money
7 0
3 years ago
What do you think is the most important factor affecting the collection of digital data and what impact do you think that this f
borishaifa [10]

<u>Answer:</u>

<u>Privacy concerns.</u>

<u>Explanation:</u>

Privacy concerns have played an important role in how we collect digital data. For example, privacy activists believe that an individual has the right to know how his or her information is being used and that such an individual also has the right to withhold such information.

Such issues have affected the ability of law enforcement agencies to investigate criminal activities. For example, an individual who is accused of a crime may claim a <em>right to withhold his personal information, such as his mobile device, and thus he refuses to give out such information.</em>

4 0
3 years ago
Which CGI technology uses the Java programming language to process data received from a Web form?This task contains the radio bu
Rufina [12.5K]

Answer:

B. JSP

Explanation:

CGI, or Common Gateway Interface, is a specification for transferring information between a World Wide Web server and a CGI program.

JSP (Java Server Pages)  is a universal CGI technology that uses the Java interpreter. JSP is used for developing Webpages that supports dynamic content.

4 0
3 years ago
Logical are functions used when looking for an entry or value in the spreadsheet. what is it?
Mila [183]

Explanation:

Logical functions provide decision-making tools for information in a spreadsheet. They allow you to look at the contents of a cell, or to perform a calculation, and then test that result against a required figure or value.

5 0
3 years ago
Other questions:
  • Ann wants to create a bookmark. She should
    9·2 answers
  • Determine whether the relation represents a function. If it is a​ function, state the domain and range.
    6·1 answer
  • Write a method isSorted that returns true if the list is in sorted (nondecreasing) order and returns false otherwise. An empty l
    12·1 answer
  • An isotope of an element has:
    11·2 answers
  • Marco is ready to create his first slide. He wants to put the title of the
    11·1 answer
  • 1A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The
    5·1 answer
  • Which of the following is similar to defense in depth and supports multiple layers of security?a. Defense in depthb. Diversity o
    7·1 answer
  • Drag each tile to the correct box.
    8·1 answer
  • Write a program that creates a Date object, sets its elapsed time to 10000, 100000, 1000000, 10000000, 100000000, 1000000000, 10
    9·1 answer
  • Please help me!! (two questions)
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!