1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dafna11 [192]
3 years ago
10

Select the correct answer from each drop-down menu. Which two factors do ergonomic principles consider a part of a job? Ergonomi

c principles consider (physical stress, mental stress, or social stress) and (traveling factors, relationship factors, or environmental factors) Pls answer quickly I have a Mastery test and my brain is a little rusty so pls help me! I would really appreciate it and thank you so much in advance and have a good day! Btw, I'll give 55 points if it's answered correctly :D​
Computers and Technology
1 answer:
Rudiy273 years ago
4 0

Answer:mental stress

Explanation:

You might be interested in
Whose work is responsible for the invention of the air bag? Scientist, Engineers or both?
jenyasd209 [6]

The scientist and the engineers were both responsible for the invention of the airbag.

  • Peter Florhancicn was a scientist and he invented the airbag because of the Dutch people who drowned when they drove into the canals

  • Also, John Hetrick who was an engineer filed for the patent of airbags when he saw that deers were running across the road. He believed that it could cause an accidentthat led to the invention.

In conclusion, both the engineers and the scientists were responsible.

Read related link on:

brainly.com/question/24686827

3 0
2 years ago
You work as a Network Administrator for wwwpany Inc. You have suspected a bad driver or perhaps malware. Which of the following
vichka [17]

Answer:

Explanation:

There is a solution called ETA (Encrypted Traffic Analytics) this is a security advanced network that helps us to identify malware between the encrypted data, but with this tool is no necessary to break any protection and privacy chain.

This technology use machine learning to read all the traffic without deciphering it, in this way we can detect a difference between reliable and malicious traffic.

En windows we can use Microsoft Security Essentials like antivirus and detect virus, we can use Process Explorer, analyze the traffic, we can use Microsoft Network Monitor.

8 0
3 years ago
Throughout the reflection, make sure you have a copy of the Student Guide and your data tables. Complete the
Brut [27]

Answer:

"ph" is the first one, "ground" is the second one

Explanation:

i just took the quiz

3 0
3 years ago
Read 2 more answers
Write a C program to find the sum of 10 non-negative numbers entered by user​
valentina_108 [34]

Answer:

Explanation:

#include <stdio.h>

void main()

{

   int  j, sum = 0;

   printf("The first 10 natural number is :\n");

 

   for (j = 1; j <= 10; j++)

   {

       sum = sum + j;

       printf("%d ",j);    

   }

   printf("\nThe Sum is : %d\n", sum);

}

8 0
2 years ago
Name the cell range selected in the given worksheet? <br>plzzz helppppp​
Monica [59]

Answer:

B2:E6,,,,,,,,,,,,,,,,

6 0
2 years ago
Other questions:
  • What is working with others to find a mutually agreeable outcome?
    6·1 answer
  • Selecting the option to control Widows and Orphans will prevent _________. A single line from appearing at the top or bottom of
    10·1 answer
  • How to reinstall windows 7 on my pc,without format,because i don't want to loose my data,and can u give me a windows 7 setup ple
    8·1 answer
  • The possible states of a process are:
    6·2 answers
  • Which statement will properly start the main() function? def main(): def Main def main# def main[]
    14·2 answers
  • The Windows taskbar is generally found _____. at the top of the screen in the Start menu at the bottom of the screen at the righ
    14·2 answers
  • Use the drop-down menus to complete each sentence about the layers of the atmosphere.
    14·2 answers
  • Assume you are given a boolean variable named isNegative and a 2-dimensional array of ints that has been created and assigned to
    8·1 answer
  • A company is looking for an employee to assign passwords to all of its
    5·1 answer
  • failed logins or instances of denial of access to restricted files may be indicators of compromise. suggest where records of suc
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!