1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
babunello [35]
3 years ago
12

Which of the following is a potential hazard

Computers and Technology
2 answers:
Nina [5.8K]3 years ago
8 0

Answer:

Chemicals – can be unstable, making them reactive and prone to explosion. Potential injuries include skin and eye burns, respiratory problems, allergic reactions, skin, eye, and mucous membrane irritation, and illnesses.

Hope this helps.

REY [17]3 years ago
7 0

Answer:

To be short and sweet

Explanation:

Just about every thing

You might be interested in
In the lab, the Ethernet II detail of the provided packet capture file indicated that Wireshark had determined that the ________
Norma-Jean [14]

Answer:

Type of traffic carried in the next layer

Explanation:

Ethernet II can be regarded as standard protocol, it allows capturing.

It should be noted that in the lab, the Ethernet II detail of the provided packet capture file indicated that Wireshark had determined that the Type of traffic carried in the next layer

was IPv4 multicast

4 0
3 years ago
The _______ valve protects the air pump from reverse-exhaust pressure.
alexandr402 [8]
D. The answer for this is the gulp
7 0
3 years ago
Opposite word of reassembling​
Marysya12 [62]
<h3>OPPOSITE WORDS OF REASSEMBLING</h3>

  • disperse
  • disband
  • separate
8 0
3 years ago
Read 2 more answers
A DNS server on your client's network is receiving a large number of DNS queries from what appears to be a workstation on their
drek231 [11]

Answer:

The answer is reflective DNS attack

Explanation:

Reflective DNS Attack is used in many distributed DDoS attacks to knock down an internet pipe. The attack is divided in two stages: first  the attacker sends lots of requests to one  or more legitimate DNS servers  while using spoofed source IP of the target person, and then, in the second stage, the DNS server receiving the semi-legitimate requests replies to the spoofed IP, thereby unknowingly lauching an attack on the target computer with responses to requests never sent by the victim.

4 0
4 years ago
Hi, I just ate a hot banana that I cooked in the oven.
mrs_skeptik [129]
Banana fish .. pain. all i know is pain.
4 0
4 years ago
Read 2 more answers
Other questions:
  • The key requirement in selection of the facilitator is one who is the end-user.
    8·1 answer
  • TRUE OR FALSE!!!!!
    6·2 answers
  • 3. The channel bit error rate is 0.00001, and each packet’s total length is 1024 bytes including all overheads. Assume there are
    12·2 answers
  • A web feed:
    7·2 answers
  • In the movie Charlie and The Chocolate Factory, why did Augustus Gloop go against Mr. Wonka’s instructions and drink from the ch
    15·1 answer
  • Expresa tu reflexión sobre la necesidad de un código de etica para la IA (inteligencia artificial) , oponia sobre los bots en la
    15·1 answer
  • Carbohydrates are a huge source of
    7·2 answers
  • 2) List three (3) negative impact of Technology on society
    14·1 answer
  • What is the most appropriate data type for each of these items?
    15·1 answer
  • An outpatient provides the following id: barbara jones, birth date 8/15/63. should a specimen be collected for this lab order?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!