1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mazyrski [523]
3 years ago
11

What type of gloves protects your hands from hazardous chemicals?

Computers and Technology
2 answers:
Airida [17]3 years ago
7 0

Answer:

Nitrile gloves

Explanation:

hazardous chemicals can cause alot of damages to its handlers no matter how careful they might be hence as part of the protective measures at work it is advisable to wear protective gloves while working or handling such hazardous/corrosive chemicals at work.

Although there are many types of Hand gloves that can be worn to protect your hands while at work some of these gloves are made mainly for the purpose of protecting the hands against hazardous chemicals.

some of the types of gloves that are made for this purpose are latex gloves, Nitrile gloves, viton and rubber gloves. the best of these types of gloves are the gloves made of Nitrile because Nitrile gloves are protective against most very hazardous chemical.

zepelin [54]3 years ago
3 0
Gloves from the People that have gas masks
You might be interested in
Order the steps needed to design a relational database.
tia_tia [17]

Answer:

1. List the fields needed to gain information

2. Break down the date into smaller parts

3. identify the fields holding stored data

4.distribute the fields into tables by subject

5. identify the common fields for linking tables

Explanation:

edge 2021

5 0
3 years ago
Remote authentication has always been a concern because the person is coming from a public network, and many companies require t
g100num [7]

Answer:

Incomplete Question.

I'll answer this question based on general terms

Explanation:

Two Factor Authentication, abbreviated as 2FA.

It is a type of authentication that requires the presentation of two credentials for access to personal data and information.

The credentials needed for a 2FA are

1. Either of the following; PIN, Password or Pattern

2. Your device or gadget which could be an ATM Card, Mobile Phone

3. Biometrics such as fingerprint, voice input

Number one is often referred to as "Something you know"

Number two is referred to as "Something you have"

Number three is referred to as "Something you are"

The 2FA doesn't require the three aforementioned credentials. It only needs just two of the credentials to provide its authentication.

8 0
3 years ago
Read 2 more answers
Write a C++ Program to generate the following output using a loop structure(s).(Do not hardcode the output values!) Include suff
Gemiola [76]

Answer:

Following are the program in the C++ Programming Language.

#include <iostream> // header file  

using namespace std; // namespace

int main() // main function

{

int n=8; //variable declaration

for(int k=n;n>=0;n-=2) // iterating over the loop to print the format

{

int n1=n;

for(int j=n1;n1>=0;n1-=2)

{

cout<<n1<<" "; // display the format  

}

cout<<endl; // next line  

}

return 0;

}

<u>Output</u>:

8 6 4 2 0

6 4 2 0

4 2 0

2 0

0

Explanation:

Following are the description of the program.

  • Set an integer type variable "n" and initialize in it to 8.
  • Set two for loop, the first loop iterate from the variable "n" that is 8 to 0 with decrement by 2 and next for loop also iterate from 8 to 0 then, print the value of the variable "n1".
  • Finally, we break line after the second for loop.
5 0
2 years ago
Information security is defined as practice of preventing unauthorized access, use, disclosure, disruption, modification, or ___
Elena-2011 [213]

Answer:

destruction

Explanation:

destruction is also the property of information in which unintended users sabotage the information so that it becomes useless for both the owner and the user as well.

5 0
3 years ago
Brian’s father drives a car that uses voice commands for navigation. Which AI application field is Brian’s father using?
sergeinik [125]

Answer:

Linguistics.

Explanation:

It is  the scientific study of language and its structure, including the study of morphology, syntax, phonetics, and semantics. Specific branches of linguistics include sociolinguistics, dialectology, psycholinguistics, computational linguistics, historical-comparative linguistics, and applied linguistics.

Please mark as Brainliest! :)

6 0
3 years ago
Other questions:
  • Jenny needs to record the names of 30 students, write down the subjects they studied, and note their grades in each subject afte
    8·2 answers
  • Create a class named Person that holds the following fields: two String objects for the person’s first and last name and a Local
    5·2 answers
  • Using a personal computer to produce high quality printed documents.
    10·1 answer
  • Select the statements that identify benefits of programming design. Choose all that apply. It ensures that programmers working o
    8·1 answer
  • Why did scientists who study weather need more advanced technology? Check all that apply.
    14·2 answers
  • In Microsoft Word you can access the _______ command from the "Mini toolbar". A. insert citation B. save as C. underline D. word
    11·2 answers
  • Write a program that prompts the user to enter their name store this value in a variable called name Prompt the user for their c
    10·1 answer
  • How do i work this out? does anyone do programming?
    7·1 answer
  • The web design teams of a company are working on designing websites for various companies, Pick the ideas that employ proper use
    13·1 answer
  • Take any software or Application that you have recently purchased, this can be a video game or any other application helping you
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!