1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
algol13
3 years ago
13

What is the purpose of the 300 Log?

Computers and Technology
1 answer:
egoroff_w [7]3 years ago
4 0

Answer:

The OSHA Form 300 is a form for employers to record all reportable injuries and illnesses that occur in the workplace, where and when they occur, the nature of the case, the name and job title of the employee injured or made sick, and the number of days away from work or on restricted or light duty, if any.

Explanation: brainliest plzzzz!

You might be interested in
What are the uses of DVD Ram​
Verdich [7]

Answer:

Like ordinary random access memory (RAM), it can be repeatedly read, written to, and erased. Intended mostly for removable computer storage, DVD-RAM provides the capabilities of Rewriteable CD (CD-RW) - users can run programs from the discs, copy files to them and rewrite or delete them.

4 0
3 years ago
Read 2 more answers
Lindsey also needs to calcite the commissions earned each month. If the company earns $200,000 or more in a month, the commissio
IrinaK [193]

Answer:

srry dont know

Explanation:

8 0
3 years ago
Dress4Win has asked you to recommend machine types they should deploy their application servers to.
tensa zangetsu [6.8K]

Answer:

Option A is the correct option.

Explanation:

Because Dress4Win is the online web organization that asked to the consultant to advice that type of machines that they want to expand their server for those application which perform the work of the mapping on the basis of the premises physical hardware cores and also in the clouds softwares that is nearest machines types of RAM.

7 0
3 years ago
What type of data causes concern for institutions or business when collected, stored, and not secured properly
expeople1 [14]

Answer:

personal identeifying information

Explanation:

hope this is right and it helped

4 0
2 years ago
Richard wants to create a cloud-based system that will be a centralized repository of log files from various servers in the orga
jeyben [28]

Answer:

CAD ( d )

Explanation:

Richard should use CAD to create a cloud-based system, since he wants it to be a centralized repository of log files to be taken from the different servers associated with the organization

CAD ; Computer aided design software is the best software to be used because files created using CAD can be easily stored in cloud and it is easily accessible.

4 0
3 years ago
Other questions:
  • Markup is best defined as
    11·1 answer
  • Which ONE of these usability goals is more important when designing software that someone would use only once or twice, such as
    13·1 answer
  • if an open cut or wound is exposed to contamination washing it in hot water and hand soap is not sufficient to keep safe
    14·2 answers
  • Let T be the statement: The sum of any two rational numbers is rational. Then T is true, but the following "proof is incorrect.
    14·1 answer
  • #Write a function called alter_list. alter_list should have#two parameters: a list of strings and a list of integers.##The list
    11·1 answer
  • Dave has to create animations for a game. Which tool can Dave use?
    6·1 answer
  • Define the missing function. licenseNum is created as: (100000 * customID) licenseYear, where customID is a function parameter.
    12·1 answer
  • PLEASE HELP!
    5·1 answer
  • Miley met up with a bunch of her college friends after several years. She told them that she works for the sound department of a
    5·1 answer
  • Is this a desktop or a computer, or are they the same thing
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!