1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Akimi4 [234]
3 years ago
14

if an open cut or wound is exposed to contamination washing it in hot water and hand soap is not sufficient to keep safe

Computers and Technology
2 answers:
Marta_Voda [28]3 years ago
5 0

True

Washing the wound with soap and water is not sufficient to keep it safe. Properly wash the wound with clear warm water and use tweezers to remove any dirt that still appears after washing. Next is to use direct pressure to control bleeding and swelling. Wrap the wound with sterile bandage and monitor your wound for any infections.

Serggg [28]3 years ago
3 0
True u need to cover the would so it does not get contaminated again it also depends how long it been exposed and if it’s already infected
You might be interested in
__________ is a single set of hardware, databases, networks, people, and procedures configured to collect, manipulate, store, an
sergiy2304 [10]

Answer:

Computer-based Information System

Explanation:

According to my research on information technology, I can say that based on the information provided within the question the term being described is called a Computer-based Information System (CBIS). This is (like mentioned in the question) a data processing system into a high-quality information and can be used to support decision-making, coordination and control as well as visualizing and analyzing data.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

6 0
4 years ago
A newer kind of mobile site can do a lot of what only apps used to do, so the line has blurred between sites and apps. what are
denis23 [38]
The answer is Progressive Website Applications. This specific type of website allows the user to have a particular website function similarly as to when you download the app natively on your device. One main advantage is that you wouldn't need to download the actual app to use its functions. As the applications we use in our mobile phone increase, the more application we need to download, and could be troublesome to have hundreds of app installed on your mobile device.
6 0
4 years ago
What does the “MIN” and “MAX” functions allow you to do when inserted in a spreadsheet?
Norma-Jean [14]

Answer:

The MIN and MAX functions are just what the names imply. MIN will find the lowest number in a range, while MAX finds the largest number in a range. One advantage to these functions is that they can be combined with the IF function.

Explanation:

7 0
3 years ago
Types of Hazards Mitigation Measures
Fynjy0 [20]

Answer:

auto mechanics

Explanation:

keeps dirt and grease off hands

4 0
3 years ago
Read 2 more answers
Test prints can help you determine the exposure time for a print as well as help you identify any issues in the negative. True F
Dahasolnce [82]
I'd say TRUE

It is always important to have a correct exposure in rendering a highlight tone on a print. To find the correct highlight exposure, make test strips using pieces of paper separately to the area of the negative containing the most the most critical highlight. Once you have enough test strips, you should pick the one that contains the best highlight rendering. Exposure time of that test strip is the correct exposure.



5 0
3 years ago
Read 2 more answers
Other questions:
  • Suppose a subnet has a prefix 128.119.44.128/26. Give an example of an IP address from this subnet. If an ISP owns a block of ad
    14·2 answers
  • which of the following scenarios is a circumstance in which it would be ethical to practice confidentiality?
    8·1 answer
  • Which ofthe following is the most correct statement about the interestsection of the indirect plan for persuasion?
    8·1 answer
  • A/an ________is a device used to protect computers against surges and spikes in power.
    14·1 answer
  • 3. Matthew captures traffic on his network and notices connections using ports 20, 22, 23, and 80. Which port normally hosts a p
    14·1 answer
  • PLEASEEE HELPPP
    7·1 answer
  • Assume myString and yourString are variables of type String already declared and initialized. Write ONE line of code that sets y
    15·1 answer
  • David Griffin on How Photography Connects Us
    11·1 answer
  • 25 points select 3 options!!!!!!!!!!!!!!!!!!!!!!!!!
    5·2 answers
  • How do I type in bold on brainly?
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!