1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
muminat
3 years ago
15

WHO WANTS TO PLAY AMONG US

Computers and Technology
2 answers:
Elza [17]3 years ago
8 0

Answer:

Explanation:

ME

e-lub [12.9K]3 years ago
3 0
Alright, Give me a code
You might be interested in
Easy 25 points answer what is it called that you use only 1 and 0 like this 1010010011001100011110001010010101001010101010010101
Arlecino [84]
Binary. Is the correct answe
3 0
4 years ago
Sergio knows that to meet the project requirements, it is essential to have
zhenek [66]

Answer:

I need a better explanation??

4 0
3 years ago
Protecting a sheet means ?
larisa86 [58]

To prevent other users from accidentally or deliberately changing, moving, or deleting data in a worksheet, you can lock the cells on your Excel worksheet and then protect the sheet with a password.

8 0
3 years ago
Learning Task 5. Identify the terms being described below. Write your answer in your answer
Charra [1.4K]

Answer:

1. Waste management.

2. Substitution.

3. Personal hygiene practices.

4. Emergency preparedness.

5. Elimination.

6. Flammability limit.

7. Occupational safety and health (OSH).

8. Engineering controls.

9. Personal protective equipment (PPE).

10. Administrative controls.

Explanation:

1. <u>Waste management</u>: this refers to the collection, transportation, processing or disposal, managing and monitoring of waste materials.

2. <u>Substitution</u>: this refers to the hazard control which involves the measure of replacing one hazardous agent or work process with less dangerous one.

3. <u>Personal hygiene practices</u>: a very important method of controlling hazards which involves proper washing of your hair, skin, body and even your clothes.

4. <u>Emergency preparedness</u>: this refers to the preparedness for the first and immediate response in case of any type of emergency.

5. <u>Elimination</u>: this hazard control refers to the removal of a specific hazard or hazardous work process.

6. <u>Flammability limit</u>: is the term used to call the range of concentration over which a flammable vapor mixed with air will flash or explode if an ignition is present.

7. <u>Occupational safety and health (OSH)</u>: a cross-disciplinary area concerned with protecting the safety, health and welfare of people engaged in work or employment.

8. <u>Engineering controls</u>: the term used in hazard control which involves changing a piece of machinery or work process.

9. <u>Personal protective equipment (PPE)</u>: the term used to call any piece of equipment which is used to protect the different parts of the body such as ears and eyes such as respirators, face mask, face shield, gloves, boots, etcetera.

10. <u>Administrative controls</u>: this is a form of hazard control which involves manipulation of worker/employee’s schedule and job rotation.

7 0
3 years ago
Whenever they are passed as parameters to a function, the IO classes istream and ostream must be passed using a pass-by-referenc
morpeh [17]

Answer:

b. TRUE

Explanation:

Whenever they are passed as parameters to a function, the IO classes istream and ostream must be passed using a pass-by-reference parameter passing scheme.

This is because , assuming a pass by value semantics would require us to copy the value of the istream or ostream object which would be meaningless. In fact these objects don't even have a copy constructor at all. So such objects are always passed by reference.

7 0
3 years ago
Other questions:
  • What is a way to Procter your social security number and other sensitive information from identity theft
    9·1 answer
  • Define function print_popcorn_time() with parameter bag_ounces. If bag_ounces is less than 3, print "Too small". If greater than
    15·1 answer
  • How has science fiction influenced technology
    7·2 answers
  • Some IOS commands store passwords as clear text, but you can then encrypt the passwords with the service password-encryption glo
    10·1 answer
  • What is the Most popular game out today?
    6·2 answers
  • A blank operates as a standalone device and is shared by multiple users
    12·2 answers
  • Why are computers useful for modeling situations?
    13·2 answers
  • A business would use a website analytics tool for all of the following EXCEPT _____.
    9·1 answer
  • A reference parameter differs from an output parameter in that a reference parameter ______________________ but an output parame
    5·1 answer
  • Write a loop that continually asks the user what pets the user has until the user enters rock in which case the loop ends. It sh
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!