1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rudik [331]
3 years ago
8

Plsssssssss help me​

Computers and Technology
1 answer:
lakkis [162]3 years ago
3 0

Answer:

1. physical hazard

2. psychological hazard

3. biological hazard

4. physical and/or psychological hazard

5. chemical hazard

6. physical hazard

7. chemical hazard

8. biological hazard

Explanation:

You do the rest

You might be interested in
Problem 1 (Authentication): Consider the following authentication protocol, which uses a classical cryptosystem. Alice generates
Elis [28]

Answer:

Check the explanation

Explanation:

Yes, going by the question above, the protocol validates Bob to Alice for the reason that the key is only shared between Bob and Alice as well as the number which is being sent randomly. Therefore the invader won’t be able to predict and response to that number. Because of the authentication protocol, that makes use of a classical cryptosystem thereby resulting into the possibility of an argument such that key finding is attainable via invader.

5 0
3 years ago
What did Edison's device to view motion pictures inspire the Lumiere brothers to invent?
algol13

The <u>camera, projector</u>, invented by the Lumiere brothers in Paris included a <u>phonograph</u>.

  • camera, projector, phonograph

<u>Explanation:</u>

Lumiere brothers, French designers and pioneer producers of photographic gear who formulated the early movie camera and projector called the Cinématographe. A cinematograph is a movie film camera, which likewise fills in as a film projector and printer.

The key development at the core of the Cinématographe was the instrument through which film was moved through the camera. It shows moving pictures on a screen. Which goes rapidly enough, an image replaces another too rapidly for the eye to see the change, along these lines shaping a moving picture.

6 0
3 years ago
Which of the following statements about renting and owning
laila [671]
Renting means you sign a contract or a lease to live their owning means you bought the house and pay mortgage <span />
5 0
3 years ago
Fiona is creating a presentation with PowerPoint Online about how pencils are made. She would like to type an explanation about
777dan777 [17]

Answer:THE ANSWER IS A.

Explanation:I DID IT AND I GOT 100

6 0
3 years ago
Excel Enterprises uses a Web​ site, online social​ networks, and print advertisements to promote its products. Since Excel Enter
Nuetrik [128]

Answer:

Consistency

Explanation:

Bi integrating marketing communications, we can infer that the different brands working under Excel Enterprises have the same basic design, so the marketing department can sell their features easily, without having to create different campaigns or protocols for each individual product.

This homogeneous design then turns intuitive for the user, a textbook definition of consistent design, and the tone is maintained through the different brands.

Just like when you move from Microsoft's Excel to Microsoft's Word, you know the usage of each program is different, but the layout is the same, allowing you to understand the basics of the UX (user interface) of one, by understanding the other.  

4 0
3 years ago
Read 2 more answers
Other questions:
  • which tag does not display the text in the browser window and makes the sources code mode readable ?​
    6·1 answer
  • When elements are placed on the page so that text and graphic elements are evenly distributed you have:
    9·1 answer
  • A(n) ____ path is a path used for external links that includes the complete address for the destination page, including the prot
    12·1 answer
  • Which code will allow Joe to print Coding is fun. on the screen? print("Coding is fun.") print(Coding is fun.) print = (Coding i
    10·2 answers
  • What is the purpose of the operating system's processor management function?
    14·1 answer
  • Monica spent a lot of time preparing for her interview, but the hiring manager is not asking any of the questions she practiced.
    9·2 answers
  • Does anyone know a good reason WHY to change your username.
    5·1 answer
  • 1. You are given a database to create, however, you realize that in the instructions you are told to create relationships betwee
    5·1 answer
  • How does toothbrushes affect the world of technology?
    11·2 answers
  • a company recently implemented a secure sockets layer/transport layer security (ssl/tls) version that supports secure hashing al
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!