1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kazeer [188]
3 years ago
10

In the __________ Standard, chemical manufacturers, importers, and distributors are required to provide hazard information by wa

y of Safety Data Sheets (SDSs) and labels on containers.
A.
Chemical Knowledge
B.
Chemical Manufacture
C.
Hazard Communication
Computers and Technology
1 answer:
Bas_tet [7]3 years ago
5 0
The correct answer is C
You might be interested in
Which best describes IMEI?
Delicious77 [7]

Answer:

A unique identifier for a mobile phone

Explanation:

There are different codes and tracking number assigned to different devices such as laptop, mobiles and other devices. The purpose of this task is to make sure the security of device in all aspects. The tracking number that is used to track mobile phone is named as IMEI that stands for International Mobile Equipment Identity.

IMEI is the the unique identity of mobile phone device that consists of 15 digits. It is the unique number that is assigned to phones.

8 0
3 years ago
A(n) ____________ is a private data network that creates secure connections over regular internet lines.
Setler79 [48]
VPN is the correct answer
5 0
3 years ago
A competitor goes to your public website and discovers that they can get into a directory that you did not know could be reached
Ivan

Answer:

Yes, directory traversal attack.

Explanation:

A website is a collection big web pages hosted on a web server. It contains contents like links and sometimes directory root paths. This a vulnerability attacks an exploit to access the information in a database.

There are two access to a database. One is the authentication process issued for authorised user access and the other is the root access only accessible to the network administrator. It contains paths to directories in the servers.

A directory traversal attack or path attack is done through a web browser by an attacker, who seeks for a weak path link on the public's website and accesses the information in the server.

5 0
3 years ago
Alisha appears to be overconfident which makes her unapproachable to her employees. Which negative quality is she displaying?
sergeinik [125]

As the question states Alisha is displaying the quality of overconfidence. This can effect not only herself in her work but also others. She can be demotivated and may even lose confidence completely. This behavior can be fixed by approaching towards her. you can call her very assuming, boldfaced or impertinent

HOPE THIS HELPS. PLEASE THANK AND MARK AS BRAINLIEST : )

7 0
3 years ago
Read 2 more answers
IM can only be sent to conacts who are currently
lesya692 [45]

what is the question???

4 0
3 years ago
Other questions:
  • What car dealership websites did you use to conduct your research?​
    8·1 answer
  • Casting is one of the oldest known manufacturing processes. <br> True or false
    6·2 answers
  • A game’s ______ is what contains its directions and calculations; some refer to it as the “engine” that drives the game.
    12·1 answer
  • IblMessage.txt=welcome to fiji.what is the error in the coding and what type of error is it?(explain)​
    5·1 answer
  • Which of the following was the first full-length film to be done completely in 3-D imaging
    6·2 answers
  • In what year was the 1st zelda game released
    5·2 answers
  • What type of error results from an error in the formatting of the program code?
    13·1 answer
  • If a= ‘ Stay home, Stay safe’ , print its value
    9·1 answer
  • Which is the best information to determine an athlete's abilities and needed areas of improvement?
    12·2 answers
  • How to create a network of relevant prospects?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!