Which law requires employers to provide safe working environments for their employees? A. Civil Rights Act B. Fair Labor Standards Act C. Occupational Safety and Health Act D. Wagner Act

Answers

Answer 1

Answer:

C. Occupational Safety and Health Act (OSHA).

Explanation:

This law requires employers to provide safe and healthy working conditions for their employees.


Related Questions

You can remove selected text from a slide by pressing the CTRL+X keyboard shortcut keys.

Answers

Okayyyyyyyyyyyyyyyyyyyyy

What is the output of the AWK program?

BEGIN {
a[1]="CST"
a[2]="CST"
for(i=1;i<4;i++) {
print a[i]
}
}

etc.

Answers

Luckily your file uses YYYY-MM-SS HH:MM:SS timestamps, which sort alphabetically. Those can be compared with < > <= etc without worrying about any date math. MIN="..." and MAX="..." are where those values are input into awk.

Andy would like to create a bulleted list on his resumé. How should he do this?

Answers

he should go to Microsoft Word and type his Resume'

Answer:

Andy should follow these steps to creating a bulleted list to a resume on Microsoft word

click on the point where the bullet list should startclick on the insert menu and choose the bullet symbolselect the font for the bullets from the font drop downdouble click on the bullet character to insert it into the resume.  after this he can close the tab

Explanation:

Addition of bullets to resume is used mainly to highlight educational qualifications or previous work experiences that are relevant to the job been applied for. Andy adding a bulleted list to his resume should done on Microsoft word because that is the best place to write a resume if he is using the  Microsoft office package. and not on Microsoft power point because that is used mainly to do write ups meant for presentation to a specific audience.

The _____ can be used to paste text in any order.

Answers

The answer is Clipboard

The Clipboard in Microsoft Office products stores text copied or cut from anywhere and allows you to paste the stored items into the current or another Office document. This tool can allow you to copy items and paste them the way you want in the document.

Answer:

clipboard

Explanation:

the clipboard can be used to paste text ion any order either by copying it or cutting it (not 100% the answer but still acurrate)

what are some differences between film and digital cameras?

Answers

The main difference is that digital cameras don't have film but they use memory cards instead, also while in film cameras the ligh sensitive part is the film, in digital cameras there is the CCD/CMOS sensor which captures the light and transforms it into a picture.

google


please help
3MB how much Kilobites
5GB how much megabites
2048KB how much megabites
3TB how much gigabites
10GB how much kilobites

Answers

1 3000

2 5000

3 2.048

4 3000

5 10000000


Which action is good business etiquette? A. switching your cell phone off before you enter a meeting B. keeping your cell phone on low volume before you enter a meeting C. setting a pleasant ring tone on your cell phone before you enter a meeting D. setting a standard ringtone on your cell phone before you enter a meeting

Answers

A.

Having your phone shut off shows you care about what is being said or displayed, as you have no distraction which shows this is the most important thing right now.

Answer:

The correct answer is: "A. switching your cell phone off before you enter a meeting".

Explanation:

Letter A is the only correct option because it is more advisable to turn off completely mobiles, watches, or any other kind of technology tool which may cause some noise and interrupt a business meeting and others. All other options are lacking in some way because they do not sound or seem like real good business etiquette for they are incomplete or present the opposite idea of turning tools totally off.

Scenario 1:

Aiden comes in from work. Jane had cooked dinner and is waiting for him so they could eat. However, Aiden is tired and just wants to go to bed. Jane is furious and refuses to speak to him. In response, he merely goes to their room and sleeps.

Scenario 2:

Aiden comes in from work. Jane cooked dinner and is waiting for him so they could eat. However, Aiden is tired and just wants to go to bed. Jane is furious and tells him how she feels whenever he does this to her. Aiden empathizes with Jane’s feelings and offers a compromise; the next time he would be in late for dinner, he promises to call ahead of time.

In the supportive scenario, what do Aiden and Jane do in order to alleviate the conflict?
a.
They asked open ended questions.
b.
They strove to promote equality.
c.
List all problems and annoyances.
d.
They empathized with each other.

Answers

d.
They empathized with each other

Answer:

1. c. List all problems and annoyances.

2. Option d.  They empathized with each other.

Explanation:

In the first scenario, the two characters are frustrated at each other as they misunderstand each other. Jane does not understand why Aiden is late. On the same note Aiden expects Jane to understand why he is late. This creates a scene of the problems and annoyances in the house.

In the second scenario, we see a different picture. There is clear communication. Aiden gives his side of the story and Jane gives her side too. They both understand why they were frustrated with each other. They then make a resolution to solve the conflict. In other words, they empathize with each other.

Which statements are true about satellite internet access

Answers

Answer:

it is cheap it is the slowest internet access technology it can be used in rural and remote areas. it requires direct line-of-sight to work it requires major installation of new infrastructure. it covers a large geographical area. reset next - Soetrust

when you take a long trip, you should drive for no more than ______ in a day
A. Six hours
B. Eight hours
C. Twelve hours

Answers

Final answer:

For a long road trip, it's recommended to drive no more than eight hours in a day to stay alert and minimize the risk of fatigue-related accidents. Taking regular breaks is also crucial for safety.

Explanation:

When planning a long road trip, it is generally recommended that you drive for no more than eight hours in a day. This recommendation is in place to ensure that drivers maintain alertness and reduce the risks of accidents caused by fatigue.

It is also essential for drivers to take regular breaks throughout their journey, at least every two hours or 100 miles, to stretch their legs, rest, and stay hydrated and nourished. While there might be personal and situational variations, sticking to an eight-hour limit can help ensure overall safety on the road.

Kayla is working on a document for her school project. She wants to save this document with another name. Which option should she use? Kayla should use the
________ command to save her document with another name.

Answers

Save As Command in MS Word

Answer:

Kayla should use the “save as” command in other to save the file with another name.

Explanation:

Kayla should use the “save as” command in other to save the file with another name. When you’re working on a file and press the “save” command, all the changes made are going to be saved in the current file. However, you may need to make some changes preserving the original file. Or you may need to save the file with another name for some reason. In those cases, the “save as” command  duplicates de file as it lets you save it with another name while keeping the previous file.

What Word feature is seen below?

a.
a ScreenTip
b.
the QAT
c.
the Ribbon
d.
submenu

Answers

hi there


!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!





it c the ribbon tab. just want  to help .





!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!


hope this helps. if you want please mark brainlyist. enjoy





A well-diversified portfolio needs about 20-25 stocks from different categories is this True or False?

Answers

Answer:

The statement is true that well-diversified portfolio from different categories which needs about 20-25 stocks.

Explanation:

In United States, investors need about 20-30 stocks from different categories for a well-diversified portfolio. For this to be easy enough, index funds and ETFs provide quick diversification across different market groups as these allow us to purchase many stocks within single transaction. More than the number of stocks, number of well performing industries really matter.

Diversification across the industry sectors will serve the purpose of investing. With diversification, the systematic risks can be outgrown. For potential higher returns and systematic risks need to be accepted.

It is false that a well-diversified portfolio needs about 20-25 stocks from different categories.

The statement that a well-diversified portfolio needs about 20-25 stocks from different categories is not necessarily true or false.

The number of stocks required for a well-diversified portfolio can vary depending on several factors, including the investor's risk tolerance, investment goals, and the specific stocks or categories being considered.

The key is to have a mix of investments that collectively provide exposure to a range of companies, sectors, and asset classes, based on the individual investor's risk profile and investment objectives.

It is important to conduct thorough research, consider professional advice if needed, and construct a portfolio that aligns with one's specific circumstances and goals.

Thus, the given statement is false.

For more details regarding portfolio, visit:

https://brainly.com/question/17165367

#SPJ6

A well-diversified portfolio needs about 20-25 stocks from different categories.

Answers

Correct.  

The ideal number of stocks to have in a portfolio is entirely dependent on a number of factors like country of residence, your investment time horizon, and your prosperity for reading market news. Therefore, there no single correct answer to this question. However, investors in the United States, where stocks are less correlated to the overall market than anywhere else, the figure is about 20-30 stocks.

The subject of the question relates to a well-diversified portfolio in Business and Finance, suggesting the strategy of including 20-25 stocks from different sectors to reduce risk through asset variety.

The concept of a well-diversified portfolio pertains to investment strategy and risk management within the sphere of Business and Finance. The idea behind diversification is to invest in a variety of assets to reduce the overall risk of the investment portfolio, hence the recommendation of 20-25 stocks from different sectors or categories. By doing so, an investor can mitigate the impact of a decline in any single stock or sector, as the others can potentially remain stable or grow. This strategy takes advantage of the fact that different industries and sectors can respond differently to the same market conditions. For instance, while tech stocks may decline, consumer staples may hold steady or even increase, thus balancing the portfolio performance.

In practice, building a diversified portfolio goes beyond just the number of stocks; it includes consideration of asset classes (such as bonds, real estate, and commodities), geographical regions, and market capitalizations. However, the underlying principle remains the same: don't put all your eggs in one basket.

What services are used to help speed the development and deployment of internal custom applications?
A. Protocol
B. Paas
C. Satellite
D. Session Player

Answers

The other answer is wrong its actually PaaS

Explanation:

I used the other answer given but it marked it wrong and showed me that PaaS is the right answer.

Paas services are used to help speed the development and deployment of internal custom applications. Hence option B is correct.

What is custom application?

Custom application is defined as a collection of UI widgets and elements that boost the Merchant Center's current functionality. The term "custom application software" refers to the software modules or components created for WORLDTRAVEL that carry out the tasks and adhere to the recommendations and requirements mentioned or outlined in the Design Specifications.

A cloud computing concept known as Platform as a Service (PaaS) enables customers to access hardware and software resources from a third party provider online. PaaS is a cloud computing service that provides developers and organizations with an application-development platform through virtualization.

Thus, Paas services are used to help speed the development and deployment of internal custom applications. Hence option B is correct.

To learn more about custom application, refer to the link below:

https://brainly.com/question/16880138

#SPJ5

What of the following can a cell contain? A number a word a function of these

Answers

A function of these

Technicans A says the engine camshaft converts reciprocating motion of the piston into rotary montion for power output. Technician B disagrees and says the crankshaft performs this function who is right?

Answers

It doesn't say what Technician B thinks, but I can tell you what the camshaft does and then you can decide who is right on your own. The camshaft is little metal rounded triangles above the piston that times when the intake and exhaust valve open and close.

Technician A is very wrong, the camshaft doesn't do that.

Final answer:

In a four-stroke internal combustion gasoline engine, both the crankshaft and camshaft play important roles in converting the reciprocating motion of the piston into rotary motion for power output.

Explanation:

In a four-stroke internal combustion gasoline engine, both the engine's crankshaft and camshaft play important roles in converting the reciprocating motion of the piston into rotary motion for power output.

The crankshaft converts the up-and-down motion of the piston into a rotating motion, which is then used to transfer power to the wheels of a vehicle or other devices.

The camshaft is responsible for opening and closing the engine's valves at the correct times, allowing for the intake of fuel-air mixture and the exhaust of combustion byproducts.

Items that represent features of smartphones apps

Answers

Smartphone apps, available on devices such as iPhones and tablets, offer a multitude of capabilities through their applications, from location-sharing with GPS to cross-media integration. The App Store's growth illustrates the wide range of assistive functions apps can provide. Yet, there may still be functions requiring other devices, showing technology's evolving role.

The discussion is centered around items that represent features of smartphone apps. Smartphones and tablets have become integral parts of our daily lives, serving various functions through applications, commonly known as apps. These mobile devices are equipped with a range of capabilities, thanks to technological advancement.

Applications such as those for location-sharing utilize GPS functionality to help users find and check-in at venues, while cross-media apps tie in with TV shows or music stations for an integrated entertainment experience. The iPhone's App Store, a pioneer in the industry, has seen exponential growth in the number of downloadable applications available to users, thereby assisting in numerous daily activities and creating a new cultural language encapsulating these functions.

For instance, apps have been designed to help with navigation, identify stars in the night sky, manage social media, or even learn new things. However, despite a phone's vast functionalities, there might still be some functions for which we need other devices. This speaks to the evolution and diversification of app functions, which continue to reshape our interaction with technology and each other.

How many 4 GB movies could you store on a 500 GB hard drive?

Answers

125 movies and maybe some kb sized movies (depends on the amount of kb)

in order to figure this out you must divide the amount of space by the space a single movie take. This will give you the amount of movies you could have. 500/4=125. therefore you could have 125 movies

Match each malware type to its description

Answers

1. Trojan Horse

2. Worm

3. Virus

The infection of files by malicious programs, software and files could take different forms. The expressions given represents programs capable of damaging computer files.

Trojan horse WormVirus

Trojan horse are described as programs which are appears to be innocuous or harmless. Hence, using these medium to penetrate into our computer files.

Worms describes malwares which are capable of splitting from one single or independent malware so theu could spread through a network of computers.

Viruses creeps into a computer when they become attached to a file or program. This infecting computers upon the installation or download of such file.

Therefore, all stated programs causes damage to computer and file system.

Learn more :https://brainly.com/question/2203272

what kind of decoration did artists use on tutankhamen's statue

Answers

Final answer:

Tutankhamun's statue and his death mask are lavishly adorned with gold, colorful inscriptions from the Book of the Dead, and protective deities, showcasing the opulence and detailed craftsmanship of Egyptian art.

Explanation:

The decorations on Tutankhamun's statue and the artifacts associated with his tomb are renowned for their intricate workmanship and lavish use of materials. The death mask of Tutankhamun is particularly famous; it is constructed from two sheets of gold hammered together, weighing 22.5 pounds. The mask features the nemes headdress, a broad collar with falcon head terminals, a false beard, and is adorned with the goddesses Nekhbet and Wadjet, showcasing an incredible level of detail and luxury. Reflecting the artistic norms of the period, the mask also carries inscriptions from the Book of the Dead. Additionally, sculptures and reliefs from various tombs, including those of other pharaohs and notable figures, were painted with an array of colors derived from local rocks and minerals, emphasizing certain features or parts of the narrative depicted.

Can someone please check if I’m correct? Code is in Java

Answers

You are right. Option 1 would give 11 iterations.

how to read blueprints?

All answers are appreciated​.​

Answers

Blueprints are 2-dimensional architectural design drawings that indicate the size of a planned building, the materials to be used in its construction, and the placement of its features. Learning to read blueprints is essential not only for construction workers but also for the people who hire architects to draft them.

What happens if too many elements within the photograph demand equal attention

Answers

The hierarchical development consists of a dominant and subordinate visual elements and no visual element is insignificant; each and every one contributes to communication of the message and it depends on complementing and contrasting of visual elements. If the design has a clear focal point which initiates viewers interaction with the design and then clear subordinate elements to support the focal point–the design maintains fixed attention of the eye. But if all visual elements demand equal attention, the eye is destructed and wonders around the page without any direction.
Hierarchy begins by rating visual elements by importance: what needs to be seen first, second, third, etc. Dominant elements will reside in a foreground while subordinate elements will activate the background in support of dominant elements.
Examples:

which protocol sends a request to view or download a website or file

Answers

i this it is HTTP protocol. It is also assumed that you have some basic knowledge of URLs. (A URL is the address of a document, what you need to be able to get hold of the document.)

Answer:

HTTP protocol

Explanation:

The HTTP protocol is the base for the communication in the World Wide Web and it is used to transfer hypermedia documents which helps computers to communicate with customers requesting data and servers answering to these requests which allows to have access to a website. According to this, the protocol that sends a request to view or download a website or file is the HTTP protocol.

Shelby is the operations manager for a public-works project. She is revising several of the procedures used. A number of people must review the procedures and add revisions. The best telecommunications tool for Shelby to use to manage this project is a(n) _____. blog
e-mail
fax machine
wiki

Answers

Answer:

Email

Explanation:

Bc it's telecommuting to multiple people

what does copyright and trademark both have in common

Answers

copyright is the exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.  

trade mark is A trademark, trade mark, or trade-mark is a recognizable sign, design, or expression which identifies products or services of a particular source from those of others, although trademarks used to identify services are usually called service marks.

The security administrator for Corp.com wants to provide wireless access for employees as well as guests. Multiple wireless access points and separate networks for internal users and guests are required. Which of the following should separate each network? (Choose all that apply.)



A - Security protocols

B - Physical security

C - SSIDs

D - Channels

Answers

SSIDs and Physical security

It is always recommended to have separate networks. And in this case, the SSID (Network Name) of the guest network should be separate from the main network. It is best to enable a guest account on your router and assign a new SSID. You can leave this network open or password-protect it. Visitors will be locked out from accessing the main network’s devices like printers and other sensitive information.

Physical security.

In terms of a secure network, nothing is safer than having your guest network installed on a separate hardware. By having a few access points set up for the guest network, your guests could entirely be segregated from the main business network.


Answer:

Security protocolsSSIDs

Explanation:

In other to protect a network data from unauthorized access the security administrator would assign a security protocol to the different networks so as to separate the networks which the Internal users should have access to and the network the Guests should have access to such protocols is SFTP ( secure file transfer protocol)

The use of SSIDs ( network name ) this is technically the name given to various networks in order to separate/distinguish them from each other and also to who whom to grant access to for each network .

What is the method whereby computing resources are successively abstracted from the layer preceding it?
A. Cloud
B. EDU
C. Virtualization
D. RFP

Answers

A. Cloud

this is the answer because, cloud computing environments use configurations of network software to emulate a physical infrastructure. A virtual server takes the place of a real physical server. A virtual desktop takes the place of a physical desktop.

Answer:

Your answer is A A. Cloud

Explanation:

You have just finished entering field names for your database . You need to choose the primary key or key field but none of your fields are unique. What should you do ?
A. Save the database without a key field
B. Use one of the existing fields even if it is not unique
C. Let the database assign a unique number in a new field
D. Use a spreadsheet instead

Answers

C. Let the database assign a unique number in a new field

Answer:

Option C is the correct answer to the following question.

Explanation:

In the following option is true because when once the entering of the fields name is done and you didn't choose any of the fields as primary but you want to choose field as primary and you also not choose any field as unique then, you should do one thing, you have to assign a unique number in your database in a new field.

Other Questions
on pg 125 and 126 of lord of the flies what is the conflict between jack and ralph Assign oxidation numbers to each element in this compound. NO l-15l __ l15l is it or =? Many people in Quebec want to be _________ of Canada because it is heavily influenced by its ___________ past, whereas the rest of Canada has stronger ties to either Great Britain or its native past. What is the division property of exponents? I need to know how to do this!! Urgent ab is tangent to circle o at b. find the length of the radius r fur ab=5 and ao=8.6 Did WW1 begin in 1992True or False Three friends each have some ribbon. Carol has 90 inches of ribbon, Tino has 4.5 feet of ribbon, and Baxter has 5.5 yards of ribbon. Express the total length of ribbon the three friends have in inches, feet, and yards. inches = feet = yards In what way did the Platt amendment affect Cuba can someone help me with this biology please Select ALL true statements about Jesus' miracles.A. Jesus performed miracles of healing and forgiveness, and miracles of nature. B. Through his miracles, Jesus showed that God's Kingdom had begun.C. Jesus performed miracles to bring people to faith. D. Everyone who witnessed the miracles of Jesus became a believer. E. Jesus' miracles were signs of God's love active in the world. why did the Byzantine empire have such a successful economy Is this correct? HELP ME PLEASE!!! WILL MARK BRAINLIEST basketball goal 10 ft high casts a shadow 36 ft long. Find the elevation to the sun According to maslow, what did abraham lincoln, albert einstein, mahatma ghandi, and eleanor roosevelt have in common? After precipitation falls , the water moves into the lithosphere openings in the rock an soil . Whats is this process called After a direct blow to the eyeball with a soccer ball, your athlete complains of double vision and numbness in her cheek. you also notice that she has noticeable swelling and a downward displacement of the injured eye. what injury might you suspect? Redacteaza o compunere de 10-15 randuri (100-150 de cuvinte) in care sa povestesti o intamplare care sa ilustreze semnificatia proverbului "cand stapanul nu-i acasa soarecii joaca pe masa".In compunerea ta trebuie: sa precizezi doua lelmente ale cadrului spatio-temporal sa respecti succesiunea logica a evenimentelor sa respecti tipul de text si cerinta formulata sa respecti normele de exprimare de ortografie si de punctuatie limita de spatiu dau coroana pe cea mai buna compunere va rog este urgent HELP IVE FALLEN AND I CANT GET UP! just kidding bUT I DO NEED HELP SO PLEASE HELP ME FOR BRAINLIEST!! Noelle went shopping and bought each of his nine nephews a gift, either a video costing $14.95 or a CD costing $16.88. She spent $140.34 on the gifts. How many videos and how many CDs did he buy? Steam Workshop Downloader