1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bingel [31]
3 years ago
6

Any material that comes into contact with the body must be __________.

Computers and Technology
1 answer:
Degger [83]3 years ago
3 0

Answer:

]Disinfect using a fresh bleach solution or other disinfectant. ... If you have been exposed to blood or potentially infectious materials at work, what actions ... How should you dispose of contaminated sharps, such as glass or needles that ... ( )Body openings - infected material comes into contact with your eyes, nose or mouth.

Explanation:

You might be interested in
2. How has the internet changed the way that people get news?
yuradex [85]

Answer:

Explanation:

you can access news from anywhere and know what is going on

6 0
3 years ago
Read 2 more answers
Which of the following is a major difference between XSS attacks and remote code exploits?
Dafna1 [17]

Answer:

Option (c) Remote code exploits aim to escalate attackers’ privileges, while XSS attacks aim to gain access only

Explanation:

  • XSS stands for Cross-site Scripting. In this types of attacks, a malicious code is injected in the trusted web sites and it sends the malicious code into the users. The users think that the genuine code was sent but not.
  • This involves sending server side scripts which are executed by the user and these may even change the html pages too.
  • Remote code exploitation means the user can inject the code and try to gain access. Usually, all the programming languages have evaluation functions if used the user can try to gain the access with this evaluation functions.
  • This can lead to the compromise of the whole web server too.So, it is not a good practice to use the evaluation functions by the developers.
  • In this type of attack, the attacker tries to inject the code remotely.
  • Option (c) is correct and options (a),(b) and (d) are wrong options.
4 0
3 years ago
Assume there is a variable, h already associated with a positive integer value. Write the code necessary to compute the sum of t
lions [1.4K]

Answer:

int i=1  // initialized i to 1

int q=0  // initialized q to 10

while((i*i)<h) // iterating the while loop

{

q=(i*i)+q  // calculating the sum of square

i=i+1 //Increment of i

}

Explanation:

Following are the description of Program

  • Initialized the variable "i" which is "int" type to 1.
  • Initialized the variable "q" which is "int" type to 0.
  • Iterating the while loop to less then variable "h".
  • In this loop we calculate the sum of square and holding the result in the variable "q".
  • Finally increment the value to "i" by 1 to iterating the loop.
6 0
3 years ago
A three-tier web application is deployed using cloudformation template. how can the cloudformation developer ensure that the dat
Vladimir79 [104]

Set the DeletionPolicy to Retain in the CloudFormation template.

<h3>What is Three-tier web application?</h3>

A 3-tier application architecture exists as a modular client-server architecture that consists of a presentation tier, an application tier, and a data tier. The three-tier architecture stands as the most popular implementation of a multi-tier architecture and consists of a single presentation tier, logic tier, and data tier.

If a resource exists deleted, the DeletionPolicy retains the physical resource but confirms that it's deleted from CloudFormation's scope. If a resource exists updated such that a new physical resource is created to replace the old resource, then the old resource stands completely deleted, including from CloudFormation's scope.

Hence,  Set the DeletionPolicy to Retain in the CloudFormation template.

To learn more about Three-tier web application refer to:

brainly.com/question/12627837

#SPJ4

8 0
1 year ago
How does one skip videos on edgenuit
rodikova [14]

Answer:

start the video and begin watching it as normal

press the pause button

disconnect and reconnect your Wi-Fi

refresh your page with the video

8 0
3 years ago
Other questions:
  • What is a technology that exists inside another device called
    11·1 answer
  • 15. What type of presentation includes information created in a different Office application?
    7·1 answer
  • Which of the acronyms listed below refers to a series of basic hardware diagnostic tests performed by the startup BIOS after the
    13·1 answer
  • When a rectangular region is defined using an appropriate style, which value matches the specified edge of the clipping region t
    7·1 answer
  • 5x + 2y = 3<br>2x + 3y = 13​
    7·1 answer
  • What is profession explain with example​
    13·2 answers
  • What do we call the distribution and access of illegal copies of digital books??
    9·2 answers
  • Linda is the owner of Souvenirstop, a chain of souvenir shops. One of the shops is located at the City Centre Mall. Though the s
    15·1 answer
  • How's your day :D I hope its goin well you amazing person :D
    14·2 answers
  • A student can improve performance by decreasing
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!