1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anit [1.1K]
2 years ago
12

What happen if ignore the unsafe markings in hand tools in ict​

Computers and Technology
1 answer:
Snowcat [4.5K]2 years ago
4 0

Answer:

Getting it right will not only protect employees and visitors from harm, it will also help to create a safe, productive workplace and mean that businesses can avoid any unnecessary financial loss.

You might be interested in
Consider the following code which deletes all the nodes in a linked list. void doublyLinkedList::destroy() { nodeType *temp; //p
Lera25 [3.4K]

Answer:

The answer is "delete temp;".

Explanation:

  • In the given code a class "doublyLinkedList" is defined that contains a method that is destroy(). This code uses a scope resolution operator to define the method outside the class.
  • To access this method write return type of function then class name:: (use scope resolution operator) and function name.
  • In this function, nodeType temp is a pointer variable that is used to delete the node.
  • In method definition, a loop is declared that check value that is first not equal to nullptr. which means the first node is not equal to null. In this loop, a temp variable holds the first variable value and the first variable value is holding another variable value and then use the "delete temp" statement to delete a node in the list.
  • Outside a loop, the last variable holds nullptr variable value and the count variable assigns a value that is 0.
5 0
3 years ago
What is the advantage of defining a target user?
spayn [35]
3) helps the designer develop a website tailored to the desired audience
4 0
3 years ago
A company has an Aruba solution. The company wants to host a guest login portal with this solution, and the login portal must gi
mariarad [96]

Answer: D. Choose ClearPass or the other external captive portal option for the guest WLAN.

Explanation:

The Aruba Instant On mobile app allows the configuration and monitoring of a network from anywhere. It provides an affordable solution to small businesses and they're reliable and secure.

Based on the criteria given in the question, the network administrator can meet the criteria by choosing a ClearPass or the other external captive portal option for the guest WLAN.

8 0
3 years ago
There are three types of value for money. Which of the following is not a method of value?
AlladinOne [14]
The answer to this question is c
4 0
3 years ago
My 2 in 1 laptop/tablet
katovenus [111]

"My 2 in 1 laptop/tablet  goes black and does this weird glitching thing..."

2-in-1 has a bunch of connections bet the keyboard n screen. its weaker than a laptop cuz' the keyboard is detachable. bad news if u have a flaky connection there.

if its brand new or under warranty, i wuld send it back. good luck!


8 0
3 years ago
Other questions:
  • Many malware attacks are ____ attacks, which involve more than one type of malware and/or more than one type of transmission met
    6·1 answer
  • Proxy data:
    12·1 answer
  • A company is utilizing servers, data storage, data backup, and software development platforms over an Internet connection.
    14·1 answer
  • Company policies require that all network infrastructure devices send system level information to a centralized server. Which of
    6·1 answer
  • design aDesign a queue abstract data type for float elements in a language that you know, including operations for enqueue, dequ
    10·1 answer
  • ____________ are collected from several entities at the same point in time.
    13·1 answer
  • According to the stage-gate process developed by Robert G. Cooper, _____ are the results of the previous stage and are the input
    15·1 answer
  • Peripeteia is also referred to as __________.
    5·2 answers
  • Which job role requires you to create user guides for computer products and services?
    11·1 answer
  • Given an initialized variable fileName, write a sequence of statements that create a file whose name is given by the variable an
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!