1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
N76 [4]
3 years ago
5

You are working to bring a healthcare facility into compliance with the Safety Data Sheet–related provisions of OSHA’s Hazard Co

mmunication Standard. You interview administrative personnel at the facility. You learn that the facility has compiled a list of all hazardous chemicals to which workers in the facility might be exposed. An SDS corresponding to each chemical on the list has been obtained and filed. For full compliance, you advise that this facility also must:
a. verify the accuracy of all health hazard information contained in the sds fileb. ensure that the sds file is readily available to all workers in their work areas, at all timesc. review the sds file, in order to compile a list of manufacturer emergency phone numbersd. all of these are requirements under osha's hcse. none of these are requirements
Computers and Technology
1 answer:
Dafna11 [192]3 years ago
4 0

Answer:

d

Explanation:

OSHA requires to have SDS of all chemicals being used at site. The SDS must be readily available to all the chemical users. The SDS must have detailed chemical product identification along with the name and contact details of manufacturer and supplier.

You might be interested in
How does heat affect quantum computers ?
vitfil [10]
It could overheat and break
7 0
4 years ago
One vital component of your professional behavior with regard to computing systems today is the creation of​ _________.
zlopas [31]
<span>One vital component of your professional behavior with regard to computing systems today is the creation of​ strong passwords.
It is very important to have a good password on your computer, especially if you are dealing with sensitive data and information. It would be for the best to create such a password which won't be hacked into easily, in case somebody wants to steal your data.
</span>
3 0
3 years ago
Write the pseudocode for a program that will process attendance records of CA students. The students attend college five days a
Alenkasestr [34]

Using the knowledge of pseudocodes it will be possible to write a code that calculates the amount of hours worked and giving warnings about it.

<h3>Writing a pseudocode we have that:</h3>

<em>while </em>

<em>if number == 0</em>

<em>break</em>

<em>hours =0 </em>

<em>for i =1 to 5 </em>

<em>hours = hours + time_out[ i ] - time_in[ i ]</em>

<em> If hours >36 : </em>

<em>print ( "Name is " ,name)</em>

<em>print( "No of hours are ",hours)</em>

<em>print("Congratulaion! Your working hours are more than 36")</em>

<em>If hours <30 : #</em>

<em>print ( "Name is " ,name)</em>

<em>print( "No of hours are ",hours)</em>

<em>print("Warning !!!")</em>

<em>End loop</em>

See more about pseudocode at brainly.com/question/13208346

#SPJ1

3 0
2 years ago
3. List three common vector image file types.
nika2105 [10]
Constructed using mathematical formulas rather than individual colored blocks, vector file types such as EPS, AI and PDF* are excellent for creating graphics that frequently require resizing.
8 0
3 years ago
A search engine company needs to do a significant amount of computation every time it recompiles its index. For this task, the c
romanna [79]

Answer:

See attached pictures for detailed answer.

Explanation:

See attached pictures for explanation.

5 0
3 years ago
Other questions:
  • In cell F29, use an IF function to display the correct Shipping Charge, based on the amount of the Discounted Total. If the Disc
    9·1 answer
  • Which of the following are pointers? Select all that are correct. hub node router transmission media switch port interconnector
    7·2 answers
  • Internet-filtering software that electronically blocks out websites in specific rating categories is called _____________ by tho
    9·1 answer
  • Which of the following lists contains the five essential elements of a computer?
    5·1 answer
  • The device used to attach a microphone to a lectern is called a ____.
    10·1 answer
  • Indicate if the following statements are True or False. Statement Circle one Internet Service Providers (ISPs) are proprietary n
    13·1 answer
  • how to create a program that prime number include arraylist , and if not print the prime factors of the number.
    13·1 answer
  • Which of the following is an example of fine art? 1. fashion 2. interior design 3. painting 4. product design
    7·2 answers
  • Hello pls answer<br><br><br>what is the use of loop in java​
    5·1 answer
  • Say true or false. a)ICT in education is used as teaching learning aid
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!