1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mel-nik [20]
3 years ago
6

The OSHA standards for Construction and General Industry are also known as:

Computers and Technology
1 answer:
guajiro [1.7K]3 years ago
6 0
<span>a. Part 1926 and Part 1910. </span>
You might be interested in
When entering a formula into a cell, you begin with are calculations a spreadsheet program applies to data. are preset calculati
Ugo [173]

Answer:

When entering a formula into a cell, you begin with  an equal sign

Functions and formulas are calculations a spreadsheet program applies to data.

Functions are preset calculations within spreadsheet software.

Formulas are user-entered calculations that may contain cell references, numerical values, and preset calculations.

Explanation:

I did the assignment on Edge 2020.

7 0
3 years ago
An administrator has been working within an organization for over 10 years. He has moved between different IT divisions within t
rodikova [14]

Answer:

User roles and access authorization

(Explanation of this question is given below in the explanation section.

Explanation:

As noted in question that a terminated employee comeback in office and installed some malicious script on a computer that was scheduled to run a logic bomb on the first day of the following month. And, that script will change administrator passwords, delete files, and shut down over 100 servers in the data center.

The following problem can be with that account

  • Unauthorized user access and privileges

The user may be given unauthorized access to system resources. If a user has unauthorized access to system resource then he can modify or destroy the system function easily.

  • The firewall may be disabled to detect the malicious script

The firewall should be enabled to detect such types of attack from unauthorized access to the system

  • Role

May be user role is not defined properly. If role would be defined according to user role then there are very fewer chances in doing unauthorized changes in the system that will result in an unexpected outage.

5 0
4 years ago
From the standpoint of the governing bodies of .com, why is it important that owners of individual domains maintain authoritativ
mixer [17]

Answer:

Explanation:

A subdomain is really important on the internet, we can categorize our blog, e-commerce or simple informative website, for example, if we want to have a blog and e.commerce of the same topic, we can have a subdomain for each website, if we separate our website, and we administrate our content is a good signal for SEO, we could have more promotion in search engine.

4 0
4 years ago
Difference between entropy and enthalpy is
olchik [2.2K]

Answer:

Explanation:

Enthalpy is the measure of total heat present in the thermodynamic system where the pressure is constant. Entropy is the measure of disorder in a thermodynamic system.

3 0
3 years ago
What is another way to use the Help feature in Access 2016?
FinnZ [79.3K]

Answer:

I really don't know that 100% a question. But, Your answer will be C. Use the first command group under the Home tab to open a dialog box.​ Because, You got to use the first command group under screen computer. Then, You got use the click the help icon button that appears infront of the right interface. After that, If it shows a ok button press ok.

Um, Hope That Helps!!~

By Itsbrazts

4 0
3 years ago
Read 2 more answers
Other questions:
  • A proactive computer professional will _____. have a neutral outlook toward technology underestimate the impact of technology an
    13·2 answers
  • A document may wordwrap differently depending on the type of printer being used.
    8·1 answer
  • Under what circumstance should you always let Windows manage the paging file size when running Windows Server 2012 and newer?
    15·1 answer
  • Universal Containers is implementing a community of High-Volume Community users. Community users should be able to see records a
    12·1 answer
  • Suppose you have two tables: officer and gentleman. what question(s) can be asked by using the union operator?
    11·1 answer
  • If you were infiltrating a network (10.16.0.0/16), and searching for vulnerabilities (while trying to remain undetected), why wo
    11·2 answers
  • Soft skills are: A) Personal qualities, habits, attitudes, and social graces that make up a person B) Hereditary C) The ability
    5·2 answers
  • In Scheme, source code is data. Every non-atomic expression is written as a Scheme list, so we can write procedures that manipul
    8·1 answer
  • This is more a question for Brainly,
    5·2 answers
  • 1. Microsoft Excel, MS Excel, or simply Excel is a______application by Microsoft Corporation. 2. Excel allows you to organize an
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!