1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tekilochka [14]
4 years ago
12

To apply the StartSafe philosophy to preventing workplace violence, what are the three steps to follow? A. Plan for your job req

uirements, act safely, and share your knowledge. B. Think about what could happen, plan for the worst, and act responsibly. C. Understand how to protect yourself, think about safety in your surroundings, and plan your possible responses to a violent situation.
Computers and Technology
2 answers:
Sonbull [250]4 years ago
8 0
<span>C)Understand how to protect yourself, think about safety in your surroundings, and plan your possible responses to a violent situation.</span>
VashaNatasha [74]4 years ago
6 0

c i just took the test

You might be interested in
How do you make a 'does not equal' symbol on the computer? you know the equal sign with a line through it..?
Novay_Z [31]
In computer programming, most language use '=' only to assign a value (some use :=). Usually "==" is to compare equality. And "!=" is used for not equal. I checked UTF8 encoding and there's no equal with a line through it character.
5 0
3 years ago
PYTHON!
Lyrx [107]

Answer:

hi Po konbanwa sayo I'm pilipino I'm live in philippines

5 0
2 years ago
Select the correct answer.
Naddika [18.5K]

Answer:

E

Explanation:

4 0
3 years ago
Which of the following is a Web browser? Exit Test A Windows B Comcast High-Speed C Microsoft Internet Explorer D Modem
yulyashka [42]
C. Internet explorer
Hope this helps :) please thank!
8 0
3 years ago
What types of items can tab be used to complete once you start typing the entities' name?
White raven [17]
The answer to this question is <span>file, command, or directory names
File is the part of the program that could be used to store various information. The command is part of the program that give abilities for user to run a certain program within the system operation. Directory names will create some sort and arrangement on collection of files</span>
3 0
3 years ago
Other questions:
  • What are the basic steps of programing??
    9·2 answers
  • How many generations of computer languages have there been since the middle of the 20th century?
    9·2 answers
  • True or false: in order to keep yourself and co workers safe, you must be able to recognize electrical hazards
    8·2 answers
  • Which of the following statements about federal student loans is true?
    7·1 answer
  • A user complains because the social media apps on his mobile device always note his location. The user is worried about privacy,
    12·1 answer
  • Who watches the show gravity falls, if you do, if you play the theme song for the first episode backwards you get a hiding messi
    11·2 answers
  • _________________ component defines the correct granularity for access controls and oversees the relationships between identitie
    13·1 answer
  • Here you guys go im back didnt die or any thing gg for who ever gets this
    11·2 answers
  • Select the correct answer from each drop-down menu. The following diagram shows four resistors. What is the effective resistance
    9·1 answer
  • How to assign some object key values to other name react const.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!