1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
In-s [12.5K]
3 years ago
10

What does the acronym OSHA stand for? A. Occupational Safety and Health Administration B. Occupational Safety and Human Activiti

es C. Overlooking the Safety and Health of America
Computers and Technology
2 answers:
Brrunno [24]3 years ago
7 0
Occupational Safety and Health Administration. So A
poizon [28]3 years ago
4 0
The answer is A. Occupational Safety and health Administration.
You might be interested in
For this project you have been asked to write a program for a local store owner. The store owner wants to keep a record of the n
elena55 [62]

Answer:

see explaination

Explanation:

#include <iostream>

using namespace std;

void display (string* name, double* purchase, int n)

{

cout<<"Name Purchase"<<endl;

cout<<"------------------------"<<endl<<endl;

for(int i=0;i<n;i++)

{

cout<<name[i]<<" "<<purchase[i]<<endl;

}

}

double calculate(double* purchase,int n)

{

double avg, sum=0;

for(int i=0;i<n;i++)

{

sum=sum+purchase[i];

}

avg=sum/n;

return avg;

}

int main()

{

int n;

cout<<"How many customer will you enter? "<<endl;

cin>>n;

string *name=new string[n];

double *purchase=new double[n];

for(int i=0;i<n;i++)

{

cout<<"Enter the customer"<<i+1<<"'s name: "<<endl;

cin>>name[i];

cout<<"Enter that customer's purchase: "<<endl;

cin>>purchase[i];

}

display(name, purchase,n);

double avg=calculate(purchase,n);

cout<<"Average purchase: "<<avg<<endl;

}

See attachment for the screenshot

7 0
3 years ago
You have defined a scope on your DHCP server with the start address 172.16.1.1, end address 172.16.1.200, and prefix length 16.
Andre45 [30]

Answer:

B

Explanation:

prefix 16 got 255.555.0.0 subnet mask & 65,536 total host. so in your case it ill take 172.16.0.0 - 172.16.255.255 / subnet and your scope ill take the 172.16.1.1 - 172.16.1.200 . for the next subnet is 172.17.0.0 - 172.17.255.255 and same thing as your scope you ill take 172.17.1.1 - 173.17.1.200 . keep learning bro :)

7 0
3 years ago
Why do you need to cite your sources? (check all that apply)
Shalnov [3]

the answer to this is  2 and 3

Hope this helped

-scav

4 0
3 years ago
the block cipher attack technique that attempts to retrieve the key by performing decryption and encryption simultaneously on a
tankabanditka [31]

The block cipher attack strategy that attempts to retrieve the key by performing decryption and encryption simultaneously on a understood plaintext-ciphertext pair exists plaintext attack.

<h3>What is plaintext attack?</h3>

The known-plaintext attack is a type of cryptanalysis attack in which the attacker has access to both the encrypted and plaintext versions of the target data. These can be used to reveal additional hidden information, including code books and secret keys. An attack using known plaintext occurs when the attacker has access to pairs of known plaintexts and the ciphertexts that go with them.

The objective is to figure out the secret key (or keys) or to create an algorithm that would enable him to decrypt any additional messages. Ordinary readable text before it is converted into ciphertext in cryptography is known as plaintext, as is readable text that has been recovered from encryption. Not all data inputted into or outputted by encryption methods is plaintext.

Hence,  The block cipher attack strategy that attempts to retrieve the key by performing decryption and encryption simultaneously on a understood plaintext-ciphertext pair exists plaintext attack.

To learn more about cryptanalysis attack refer to:

brainly.com/question/19202523

#SPJ4

3 0
1 year ago
Does a BIOS reset erase data such as pictures, programs or other things like that?
Nonamiya [84]
The bios doesnt effect any data stored on the hard drive
4 0
4 years ago
Other questions:
  • How does machine learning help to make modern Web Application Firewalls more effective? (Choose two.)
    5·1 answer
  • The preferred means of creating multithreaded Java applications is by implementing the ________ interface. An object of a class
    9·1 answer
  • Which is the most common drive letter where Windows stores most data and programs? A. A B. B C. C D. E
    12·2 answers
  • 350 square feet requires 1 gallon of paint. Assign gallons_paint with the amount of paint required for wall_area. Sample output
    12·1 answer
  • Which is the purpose of adding B-Roll footage to a sequence?
    10·1 answer
  • How can a user remove or delete a Pivot Table?
    8·1 answer
  • Explain why this product was created?
    7·1 answer
  • What does Technology mean to you?​
    9·2 answers
  • A security event popped up, alerting security of a suspicious user gaining access to, and copying files from, the %systemroot%\n
    11·1 answer
  • What does this comparison block indicate?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!