1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dsp73
3 years ago
14

The EPA requires the use of precise forms called ?

Computers and Technology
1 answer:
Natalka [10]3 years ago
8 0

Answer:

Uniform Hazardous Waste Manifest

Explanation:

It is a requirement for those working with or owners of transporters and generators of waste materials deemed hazardous to acquire an EPA form 8700-22 called the uniform hazardous waste manifest. This form contains details like the type of waste being moved from the generator facility to rules that should be adhered to when handling hazardous waste that should be filled. All parties involved must then agree amongst themselves by putting signature lines and making extra copies of the manifest for easier accountability.

You might be interested in
What can your employer do to protect you from overhead power lines?
bazaltina [42]
Both 2 and 3

Your employer is able to contact the power companies for further protection.
6 0
2 years ago
Which type of optical scanner works in a manner similar to a copy machine?
Aloiza [94]
Flatbed scanner I think
6 0
3 years ago
Explain three specific & major security threats to internet users. In each case, address whether or not the vulnerabilities
kherson [118]

Answer:

See explaination

Explanation:

We already know that people all over the world are using the internet to communicate with each other to store their personal data, for the entrainment working in internet, doing online shopping and a lot of things. The user can faced with many threats. These threats are of different form.

The listed and explained below are some of the threats;

a) Compromised browser:-

Most popular browser are targeted and any security flaws exploited immediately. Criminals uses the flaws to gain access to sensitive document and shadow users browsing activity.

Phishing:-

Phishing is simply referring to the spam email or websites. Most times it is used to steal ones data, identity and funds. It looks genuine, this is what makes it hard to detect .

Poisoned websites:-

These are the fake link with hidden malware where the malware creator create a juicy news /video link which attract the user but the destination affect the PCs and the PC give a big virus alert and then compelled a visitor to be aware of the malware.

Misused social media sites:- These are often used in work place these are misused to spread Trojans and malware User download file and put the corporate network at risk .

These threats are not meaningful to the internet of Things (IOT) but there are different things like if you have a CCTV camera and it is connected to internet so by the threads anyone can take control over the cameras it can shut down the camera delete the recording of the camera and other things. There are the other threats.

7 0
3 years ago
Which logging category does not appear in event viewer by default?
Ulleksa [173]

I believe this should have some multiple choice options: Application, System, Volume, Security.


The correct answer is volume.

7 0
3 years ago
Whats the answer to this question?
Naddika [18.5K]
Eat a a dong dong edi35(
6 0
3 years ago
Other questions:
  • Where does the term for a star network describe? A) a network for Department of Defense scientists to share data about the stars
    13·2 answers
  • 12. When trying to identify the sorted column in a table, you would look for the column where A. an arrow is displayed in the fi
    10·2 answers
  • Fact about energy that will make a knex car move
    7·2 answers
  • Explain what middleware is. Name a common middleware in two-tier client/server architecture for database applications.
    10·1 answer
  • Suppose you present a project and your supervisor comments that the graphics need to be a higher quality and suggests you replac
    9·2 answers
  • Plz tell the answer I I'll mark u as the brainliest
    14·1 answer
  • What is the value of the variable result after these lines of code are executed?
    11·1 answer
  • The sun can be an excellent source of natural light.<br> True.<br> False.
    8·2 answers
  • Please i relly need this! ​
    11·1 answer
  • 1. Give one reason why data is represented in binary in a computer [1]
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!