1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
icang [17]
2 years ago
14

Tina reported a safety hazard at her workplace to OSHA. Representatives from OSHA came to her work and inspected the issue, then

gave her employer a citation. The day after Tina's employer received the citation, Tina was given new jobs which were menial and difficult. Which of Tina's rights under OSHA was violated in this situation?
A) Freedom from retaliation for exercising safety and health rights

B) Knowledge of hazardous workplace conditions

C) Obtaining training as provided in the OSHA standards

D) Access to hazard exposure and medical records
Computers and Technology
1 answer:
earnstyle [38]2 years ago
6 0

Answer:

Knowledge of hazardous workspace conditions

You might be interested in
Define a public static method named s2f that takes two String arguments, the name of a file and some text. The method creates th
frez [133]

Answer:

Java solution (because only major programming language that has public static methods)

(import java.io.* before hand)

public static boolean s2f(String fileName, String text){

   try{

       PrintWriter out = new PrintWriter(new File(fileName));

       out.println(text);

       out.close();

       return true;

   }

   catch(Exception e){

       return false;

   }

}

6 0
2 years ago
What is the minimum number of bits required to store 11 different values?
yawa3891 [41]

Answer:

4 bits are required. 4 bits can represent 16 different values (2*2*2*2 or ). 3 bits can only represent 8 different values. In the general case n bits can represent values, or correspondingly m values can be represented by bits.

5 0
3 years ago
Every noticeable event, transaction, interaction, request and reply, and so on are being expectantly captured and saved in stora
Debora [2.8K]

Answer:

Every noticeable event, transaction, interaction, request and reply, and so on are being expectantly captured and saved in storage appliances and arrays for real-time as well as posterior investigations create something we call it <u>Big Data.</u>

<u></u>

Another way to look at is that it comprises massive amounts of data that keeps on growing exponentially over time so much so that it cannot be processed or analyzed using usual data processing techniques.

Cheers!

7 0
2 years ago
Windows uses a memory-management technique known as ________ to monitor which applications you frequently use and preloads them
ad-work [718]
Windows uses a memory-management technique known as SuperFetch to monitor which applications you frequently use and preloads them into your system memory.
This technique is designed to speed up app launching by preloading certain apps based on the usage patterns of the user.

4 0
2 years ago
I'm not sure if these are correct.
Basile [38]

Answer:

All the mention codes are correct.

Explanation:  

In the task1, a "name" variable is declared, that store a string, and in the next step, the built-in method "title, lower and upper" is defined, in which the title method capitalized the first character of the given word in each sentence, upper method change each character into upper case and the lower method changes each character into lower case.

In task2, a message variable is declared, that holds a string value in which the count method is used that counts the space character value.

In task3, a string value is used in the message variable, which uses a replace method to change the given string value.

In task3, a response variable is declared that uses an input method for input a string value, and inside the print method, len method is used that counts each input character number.

3 0
2 years ago
Other questions:
  • Which hypervisor works on older pcs without hardware virtualization support?
    9·2 answers
  • 2(x-5)-3(3-x)=1/2(x-2)
    9·1 answer
  • An optimal solution to a linear programming problem MUST lie A. somewere on the line between two corner points. B. somewhere out
    12·1 answer
  • Please help me ASAP
    6·1 answer
  • If your internet were to go out, what steps would you take to troubleshoot to restore your service?
    15·1 answer
  • You are the IT Administrator for a small corporate network. Until now, the network has consisted only of workstations accessing
    6·1 answer
  • A source mainly provides <br> from a text or piece of media.
    6·2 answers
  • what is example of application of machine learning that can be imposed in eduction. (except brainly.)
    9·1 answer
  • Please help I will mark brainliest ⚡️⚡️⚡️⚡️
    12·1 answer
  • Which of the following is not an operating system a) boss b) window xp c) linux d) bindux​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!