1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ksju [112]
3 years ago
6

There are three parts to OSHA inspection what are they?

Computers and Technology
1 answer:
zepelin [54]3 years ago
3 0

These parts are called:

  • "An opening conference
  • A walkaround
  • A closing conference"

A opening conference is when the OSHA inspector will talk about the purpose of the inspection and what he/she is there to do. A walkaround is when the inspector will walk around your business checking anything unsafe for their workers including: tools, workers themselves, and business conditions. Then the closing conference would be when the inspector will talk about all the problems he/she found and what needs to be done.

Hope this helps!

You might be interested in
The measure of the maximum amount of data that can travel through a computer’s communications path in a given amount of time is
STatiana [176]

Answer:

Bandwidth

Explanation:

Bandwidth is the rate of transfer of data in the given time. Its unit is Bit/sec.

It is used to measure the transfer rate of bit in a network.

4 0
3 years ago
Which of the statements below is false? Question 19 options: a) You can install a 64-bit operating system on a 64-bit machine. b
diamong [38]

you can install a 64 bit operating system on a 32 bit machine.

hope this helps!

5 0
4 years ago
How will 5G technology affect the current classroom? What are some concerns about 5G technology? Is 5G technology worth the risk
notsponge [240]

Answer:Death is a risk of 5g towers

Explanation:Someone caught a video of birds falling dead out of the sky because of the radiation from the 5g towers. There is enough radiation to make your eyes melt before you get close to it.

4 0
3 years ago
Free poi nts here you go
tatuchka [14]

Explanation:

<em>Thank</em><em> </em><em>you</em><em> </em>

<em>Bye</em><em> </em><em>and</em><em> </em><em>have</em><em> </em><em>a</em><em> </em><em>great</em><em> </em><em>day</em><em> </em>

4 0
3 years ago
Which two protocols can be used to gain remote access specifically to a server's command line interface, securely and unsecurely
padilas [110]
Telnet and SSH are two protocols that can be used to gain remote access specifically to a server's command line interface.
7 0
3 years ago
Other questions:
  • ___ refers to all aspects of managing and processing information using computers and computer networks
    13·1 answer
  • Which character goes at the end of a line of code that starts with if?
    8·1 answer
  • Suppose you are given a data set consisting of nominal attributes, such as color, which takes values such as red, blue, green et
    9·1 answer
  • The signature of a function is determined by
    5·1 answer
  • Explain what happens if you try to open a file for reading that does not exist.
    10·1 answer
  • An automatic transmission is a mechanism that _
    7·1 answer
  • What are advantages of using document templates?
    13·2 answers
  • Which Python expression results in 49?<br><br> 7 * 2<br><br> 7^2<br><br> 7 // 2<br><br> 7 ** 2
    12·2 answers
  • Which of the following best explains what happens when a new device is connected to the Internet?
    9·1 answer
  • Five uses of the operating system​
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!