1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
OLga [1]
3 years ago
5

Tina reported a safety hazard at her workplace to OSHA. Representatives from OSHA

Computers and Technology
1 answer:
Anna11 [10]3 years ago
8 0

Answer:

The correct answer is: <em>Protection from Workplace Retaliation</em>

Explanation:

Protection from Workplace Retaliation is one of the 20 Whistleblower Laws enforced by OSHA. According to the Protection from Workplace Retaliation (PFWR) law, employers cannot treat employees unfairly in retaliation to employees reporting  workplace safety hazards to OSHA. The PFWR states that employers cannot retaliate by: denying employees leave, demoting them, firing them, reducing work hours, or denying them promotions.

In this case, Tina's employer violated the Protection from Workplace Retaliation law by giving her menial and difficult jobs in response to her reporting a safety hazard to OSHA.

You might be interested in
Nina's grades could be better. She gets about five hours of sleep every weeknight and ten hours per night on weekends. How much
aliya0001 [1]

Answer:

a research paper

Explanation:

8 0
3 years ago
Read 2 more answers
Assume you're presenting to a live audience. What's the best set up for this audience configuration?
Gelneren [198K]
C. Set up a slide show. Slide shows allow the most room for explanation and information when it comes to live presentations. 
7 0
4 years ago
Read 2 more answers
What is a placeholder for a piece of information that can change is called?
uranmaximum [27]

Answer:

Variable.

Explanation:

A placeholder for a piece of information that can change is called variable.

In Computer programming, a variable stores information which is passed from the location of the method call directly to the method that is called by the program.

For example, they can serve as a model for a function; when used as an input, such as for passing a value to a function and when used as an output, such as for retrieving a value from the same function.

Hence, when you create variables in a function, you can can set the values for their parameters.

For instance, to pass a class to a family of classes use the code;

\\parameter Name as Type (Keywords) = value;

\\procedure XorSwap (var a,b :integer) = "myvalue";

5 0
3 years ago
Which of the following best explains the different between Cut and Copy? a. When you copy text you are permanently deleting it,
Vilka [71]
B. When you copy text it remains in its original location and places it on the clipboard. Cutting text removes it from its original location and places it on the clipboard

5 0
3 years ago
Read 2 more answers
Haniyah drew a beautiful pencil sketch of a scenery. Her computer teacher asked her to convert it into a digital form and post i
Aleksandr-060686 [28]

Scanner.

<em> </em>A <em>scanner</em> is an input device that scans documents such as photographs and pages of text, when a document is scanned, it is converted into a digital format.

4 0
3 years ago
Other questions:
  • One of the earlier applications of crypto-graphic hash functions was the storage of passwords to authenticate usersin computer s
    13·1 answer
  • In object-oriented analysis, objects possess characteristics called _____.â
    14·1 answer
  • A _______ acts as a security buffer between a corporation's private network and all external networks.
    7·1 answer
  • Front office employees at the Melville Lodge use a computer-based system to manage, among other things, the central reservation
    13·1 answer
  • Information about a computer file, not the actual data that is contained in the file, is called ______
    8·2 answers
  • Create a subclass of Person called Lecturer that has 2 variables of its own: employeeNumber and salary. As in the above scenario
    12·1 answer
  • The various protocols in use on the internet are said to operate in layers in which the protocol(s) at each layer solve one prob
    5·2 answers
  • Is it important for a writer to include voice and point of view in writing because...<br> Plz help
    10·1 answer
  • During critical thinking, the evaluation of information should use
    15·2 answers
  • What methods could you use to set up printing in an organization?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!