Answer:
The answer is below
Explanation:
Hazard is something or condition that can cause injury to individuals. If properties are not managed appropriately, the hazard can be inevitable. Every hazard comes with its own risk. And Risk of hazard is the degree to which hazard can affect individuals when exposed to hazards.
Identifying hazards in the surrounding are essential. Also, identifying the risk associated with hazards can't be overemphasized. Hence, the need to identifying both the hazards and the risks associated with it.
There are various reasons it is important to identify risks and hazards inside kitchen and home and business properties. They include the following reasons:
1. It is important to identify hazards in the kitchen, home, and business properties because they may cause injury.
2. Identifying hazards will make us know how to eliminate the hazards
3. When we identify hazards we can easily prevent its future occurrence
4. Identifying hazards in the kitchen such as a bad electric cooker can prevent potential electrical shock
5. When a hazard such as leaking gas is identified, we prevent potential fire outbreak
6. Identifying hazard early is a preventive measure and it is cheaper.
7. Failure to identify hazards in business properties will lead to a great loss of profits.
8. To identify the risk of hazards is the best way to eliminate the hazards.
9. Identifying the risk of hazards can make us anticipate and quickly remove the hazards effectively.
10. It is cheaper to eliminate the risk of hazards when identified than performing repairs after hazards have caused damages.
11. Understanding and identifying the risk of hazard can help save lives, whether kitchen, home, or in business properties.
12. Identifying the risk of hazards, can lead us to have a solution in place against the hazard.
Most portable devices, and some computer monitors have a special steel bracket security slot built into the case, which can be used in conjunction with a:
Answer:
Instead of using a key or entering a code to open a door, a user can use an object, such as an ID badge, to identify themselves in order to gain access to a secure area. What term describes this type of object?
Explanation:
Anyone know the logic notation of this following logic circuit?
Answer:
Concept: Logic Circuit
You have two variables A and B A and B go to the XOR logic command.B goes to the NOT operator Lastly the result of both XOR & NOT go to the OR operator Please rate positively and give brainlistWhat is one way to make a presentation stand out by using PowerPoint Online?
Use different images and videos throughout the presentation.
Use a plain white background throughout the presentation.
Use the same font and font size throughout the presentation.
Use the same slide format throughout the presentation.
Answer:
Answer: Use different images and videos throughout the presentation.
Explanation:
I just took this test and got it correct :)
Answer:
give person on top brainlist they are right i got 100 percent
Explanation:
thank you
Whenever you are designing a project for commercial use (making money) and need to use photographs with people in them you must obtain a__________release.
Answer:
Copyright
Explanation:
6
development with reference to Nepal.
Mention the objectives of sustainable development,
How can you relate the role of environment while can
Answer:
objective of sustainable development are:
Explanation:
1.to help in poverty alleviation
2.to conserve the environment effectively
3.to gain human development and progress
4.to use resources and means carefully
Select the correct answer
Which filter enhances the color contrast around the edges of an image?
A. Texture filters
B.Sharpen filters
C.Blur filters
D.Noise filters
Answer: C. Blur filters
Explanation:
The unsharp mask filters or blur filters can be used for professional color correction. This will adjust the contrast of the image. Edge details and may produce a darker and lighter line on all side of the edges. This helps in creating illusion or blur image giving a sharp contrast and sharper image.
So, the color answer C. Blur filters
Answer:
B, Sharpen Filters
Explanation:
i got it right lol
If you got band from a local library, what would be the reason for it besides shouting and talking? You're answer has to fit you're personality?
Answer:
I would get a band from the library because I check out ten books and returned them in a week. I also would just be in the library all the time and they would get frustrated. That or I would spend hours talking to a librarian about my favorite books and they would get fed up with me.
The Internet:
O A. only gives us access to our local communities.
O B. hinders our ability to influence people.
O C. limits us to local social networking sites.
O D. enables us to join global online communities.
Answer:
D- it enables us to join global online communities.
Explanation:
Thanks to social media and other websites, content you produce can be seen all over the world.
In which situation is coauthoring of presentations primarily utilized?
A reviewer must be able to make changes to a presentation after an author creates it.
Multiple authors must be able to simultaneously make changes to a presentation.
Multiple reviewers have to be able to view one another’s changes after they are made.
One author and one reviewer work on a presentation at different times.
Answer:
A i belive
Explanation:
Answer:
B) Multiple authors must be able to simultaneously make changes to a presentation.
Explanation:
Co indicates being part of a whole. So this means that two or more authors are working on this project simultaneously. Such as co-management; two bosses working together in an equal position.
Can someone help me I am coding.
Answer:
i will help u
Explanation:
what did you want
Write pseudocode for washing a car using at least five steps.
Answer:
Step 1: Prepare the Cleaner
Pour a capful of car wash cleaner into a bucket and fill it a little over halfway with tap water. Car wash soap is specially designed to clean a car's exterior surfaces without stripping off wax, and it is typically sold alongside wax and car-detailing products in stores. Toss the first sponge in the bucket to let it soak up water and cleaner.
Step 2: Use the Garden Hose First
Spray water all over the car, starting at the top and working down the body of the car.
Step 3: Wash the Roof
Wash the top of the car first by squishing most of the excess water out of the sponge, then begin washing. Rinse the top as soon as you finish to ensure that the cleaning product does not dry on your car's paint. Blot the excess water off with your chamois or a terry cloth towel.
Step 4: Wash the Car's Body
Wash the car's body in sections, one panel at a time. Spray each panel with the garden hose again before washing with the sponge and cleaner. Rinse immediately after washing.If the water is not drying too fast, complete one whole side of the car before drying. If the water is drying quickly, dry each panel as soon as you finish washing.
Step 5: Wash the Wheel and Tires
Spray the wheel and tire cleaner on the wheels and tires.Using the second sponge, a brush or a rag, rub the cleaner into the tires to remove any remaining road dirt.
Step 6: Drying Your Car
Check your product's label to see if it needs to be washed off with water or buffed with a clean rag to complete the project.
can someone please help its late
Answer:
The correct answer to this question is given below in the explanation section.
Explanation:
The labels to AS engine are given below from left to right respectively.
FanCompressorCombustionTurbineMixer NozzleFan: Drawer air into the engine
Compressor: Compressor spins the air very fast. This sequeezes or compresses the air
Combustion: Air and fuel are mixed together and ignited in the combustor and it gets super hot and gas expanded.
Turbine: The hot gases enter the turbine, causing the blade on it to spin.
Mixer: The mixer combines the hot air with outside air in the engine. This reduces the heat and noise that is coming from the engine.
Nozzle: nozzle is where the exhaust is coming out from the engine, creating thrust. It works according to newton's third law.
What are some legal issues that can arise from the use of all social media?
Answer:
CopyrightDefamationCyberbullyingExplanation:
The first issue, that I would like to explain is Copyright. If you are imposing as a company on Social Media with a real name that is Copyrighted, the company will file a DMCA takedown notice which is the Digital Millennium Copyright Act
. Which can result in your Social Media being taken down, or by getting a fine, sued or even jailtime.
The second issue is Defamation, what Defamation is basically spreading false information about a company / business in real or online that hurts a companies reputation. If you commit this crime online you can face a lawsuit or even jailtime for one year.
Thirdly, cyberbullying. This is illegal in most states in the US. Cyberbullying is a serious matter and depending on your states laws can be charged with criminal harassment.
Sources:
Quora: (Website)
Miclaw: (Website)
Statista: (Website)
Kerri is adding text and graphics to her presentation. She does this work in the _____. Normal (Slide) view Task pane Formatting toolbar Slide Sorter
Answer:
The answer to this question is given below in the explanation section.
Explanation:
The correct answer to this question is Normal View.
Kerri can add text and graphics to her presentation. She does this work easily in the Normal view of the slides. In normal view, you can edit your slide by slide and navigate with the thumbnail.
while other options are not correct because:
Task pan is used to show information about the current slide.
Formatting toolbar is used for formatting the contents in the slide
Slide sorter is a view that is used to see the thumbnail of all slides in your presentation to easily rearrange them.
how are web design & web development different from each other?
Answer:
Developers are people who build a website's core structure using coding languages, while designers are more visually creative and user-focused. Developers use their programming knowledge to breathe life into the designer’s creative vision.
You could think of developers as construction workers, and web designers as architects – both necessary, but different, skill sets.
I hope this helped :D
Explanation:
Which scenarios are examples of students managing their time well? Check all that apply. A student studies while watching her favorite television shows. A student sets aside time to study every afternoon at his desk. O A student writes down some goals that she hopes to achieve in school. A student drafts a study schedule that includes breaks. A student uses her desk calendar to record the due dates for her homework assignments. O A student rushes through his homework while sending text messages to friends. 3). Intro
Answer:
b,c,d, and e
Explanation:
Hope this helps
Answer:
BCDE
Explanation:
EDG 2021
What do you mean by word-wrap?
Answer:
it is also know as line breaking
Explanation:
is breaking a section of text into lines so that it will fit into the available width of a page, window or other display area
What are the most common forms of information?
Answer: web search
Explanation:
Give short answers.
h.
How have computers affected education?
i.
What roles do computers play at home?
j.What effects have computers had on the practice and enforcement of law?
k. How have computers changed entertainment?
Answer:
H) Well it depends how you put it. I'm Doing virtual School for my education. And it is so easy when we have technology out their to provide the help that we need. So I think it has affected education pretty good. You can Also google the answers.
I) Looking up Answers at home
J) Parents can check up on their child's school work and see if they can help them. Also The law is involved in Education.
K) It depend's on how you put it
Explanation:
Short Answers
what is wrong with this picture?????
“you got a tight little-“
uhm y’know everything is wrong with it terrifying really is uhm but yeah.
oh god that leg tho
Linux implements _________ to determine how a user is to be authenticated and whether there are password policies associated with password databases.
Answer:
Pluggable authentication modules (PAM).
Explanation:
These are schemes that are seen to be used in API authentication. It is relyed on to provide high authentification protocool in any correct form it is seen to be in use. also its ability to grant access to each other within two people interface are reasons big user clients refer to it in most of their policies that deals with their working system passwords and their database passwords to most of their files. This is why the company in the context which is a big firm rely on it for its services.
Name the stringed instrument that's known for its haunting sound, wide pitch capability, and large numbers in the orchestra.
A. Harp
B. Violin
C. Viola
D. Clarinet
The subject is Music Technology.
Answer:
VIOLIN
Explanation:
The VIOLIN is the stringed instrument that's known for its haunting sound, wide pitch capability, and large numbers in the orchestra.
Which of the following is an object-oriented language?
A. C
B. C++
C. BASIC
D. COBOL
Answer:
C++
Explanation:
Significant object-oriented languages include: (list order based on TIOBE index) Java, C++, C#, Python, R, PHP, Visual Basic.NET, JavaScript, Ruby, Perl, Object Pascal, Objective-C, Dart, Swift, Scala, Kotlin, Common Lisp, MATLAB, and Smalltalk.
The programs' structure is made obvious via OOP. OOP makes the C++ code easier to maintain, alter, and debug by encouraging “Don't Repeat Yourself” (DRY) programming practices. OOP allows for quicker development times and less code needed to create fully reusable apps. Thus, option B is correct.
What role of C++ as an object-oriented language?The following are several justifications for calling C++ a partial or semi-object oriented language. The primary action is not a class action.
Object-oriented programming is supported by C++, but it is not a feature of the language itself. You don't even need to use an object once to construct a legitimate, well-coded, and brilliantly styled C++ program.
Therefore, Object-oriented programming can be implemented using C++'s core features. It contains classes and objects as well as the OOP principles of inheritance, encapsulation, abstraction, and polymorphism. It also has access to specifiers.
Learn more about language here:
https://brainly.com/question/29751978
#SPJ2
Match the terms with their definitions
Answer:
Malware goes with the third definition, single sign-on goes to the fourth definition, phishing goes to the second definition, and clickjacking goes to the first definition.
Hope this helps! :)
Help with my Nintendo DS please I now it’s not school related but I need it for my little sister
Answer:Go to settings and do factory reset!
Explanation:
The First Amendment of the Constitution is one of the most important parts of the Bill of Rights. What specific rights does this amendment guarantee to every American citizen?
Answer:
The First Amendment to the U.S. Constitution protects the freedom of speech, religion and the press. It also protects the right to peaceful protest and to petition the government
Explanation:
if this answer is correct make me as brainlelist
Answer:
its guarantees the freedom of speech, religion, and the freedom of the press.
Explanation:
Soft skills are more likely to be transferable than hard skills?
True or false
Answer:
The correct answer is true.
Explanation:
Examples of Soft skills are
Communication TeamworkPositive Attitude etc.These skill can be applied to any job. That is why we have said that soft skill are transferrable.
Now let look at hard skill,
Hard skill like programming in python. Making the architecture of computer. These skill can not be transferred to a new job like authoring a book.
so, hard skills are not easily transferrable.
Could u give me brief summary of New Years
....................................
Answer:
happy new year friend
sorry for late..
b) Describe the computer processing that is required to maintain the correct growing
conditions.
Answer:
Explanation:To get the best plant growing conditions, the temperature and humidity (moisture in the air) have to be controlled.
The greenhouse therefore has temperature and humidity sensors linked to a computer, and the computer has a control program storing details of the correct temperature and humidity settings. The greenhouse is fitted with a heater, sprinkler and window motor which are also linked to the computer.
If the humidity falls below the values stored in the program, the computer activates the sprinklers and closes the windows. If the temperature falls outside the values stored in the program, the heater is activated by the computer.
Read the following scenario. How might Sarah correct successfully complete her task?
To permanently remove a file from her computer, Sarah doubled-clicked on the My Computer icon and searched for her
file under the “Uninstall or change a program" menu option. A
Answer:
Explanation:
A: To permanently remove a file from her computer, Sarah doubled-clicked on the My Computer icon and searched for her file under the “Uninstall or change a program” menu option.
or
b: empty the recycle bin : You can permanently delete a program file installed in the computer by following the procedure in option A. The option above will take you to the control panel and you'll be able to select the program you'd want to permanently remove. If you had initially deleted a file like a picture or a document or anything else that you necessarily do not need, it will go to recycle bin. You can head over there and select the Empty the Recycle Bin option to permanently delete the file.