Who do many employees think is responsible for safety in the workplace

Answers

Answer 1

Answer:

Supervisors.

Explanation:

Supervisors have an overall responsability to ensure the safety of the workers. They must take every precaution reasonable in the circumstances the worker is found in.


Related Questions

1) If a security pays $133 in three years, its present value is
$100 if the interest rate is A) 13. B) 12 percent. C) 11percent. D)
10 percent.

Answers

If the interest rate is 12 percent, the present value would be equal to $100 because the future cash flow is discounted at a rate that matches the cash flow. Therefore, option B) 12 percent is the correct answer.

To determine the present value of a security that pays $133 in three years, we need to discount the future cash flow at a given interest rate.

Let's evaluate each option:

A) If the interest rate is 13 percent, the present value would be less than $100 because the future cash flow is discounted at a higher rate. This means that the value of receiving $133 in three years would be lower than $100 in today's terms.

B) If the interest rate is 12 percent, the present value would be equal to $100 because the future cash flow is discounted at a rate that matches the cash flow. This implies that receiving $133 in three years is equivalent to having $100 today.

C) If the interest rate is 11 percent, the present value would be greater than $100 because the future cash flow is discounted at a lower rate. This indicates that the value of receiving $133 in three years would be higher than $100 today.

D) If the interest rate is 10 percent, the present value would also be greater than $100 because the future cash flow is discounted at a lower rate. This suggests that the value of receiving $133 in three years would be higher than $100 today.

Based on the given options, the interest rate of 12 percent (option B) is the one that would result in a present value of $100 for the security that pays $133 in three years. Therefore, option B) 12 percent is the correct answer.

It's important to note that the present value calculation considers the time value of money and the interest rate. Different interest rates will yield different present values, reflecting the varying value of money over time.

Learn more about cash flow here:-

https://brainly.com/question/33655563

#SPJ11

wardialing is a technique that is used: a. to find other hackers on the internet. b. by telemarketers to automatically call phone numbers. c. to locate modem tones. d. to create a brute force attack.

Answers

(C)  to locate modem tones. The right response is c. Finding the modem tones that computers and other devices use to connect over a phone line is a technique known as wardialing.

In order to find a suitable target, the technique includes dialling a variety of phone numbers and listening for the sound of a modem tone. Security experts and hackers have in the past utilised wardialing to find weak computer systems connected to phone lines. However, it is illegal and unethical to utilise it for evil intent. It's not frequently used to find other hackers online, by telemarketers to contact phone numbers automatically, or to launch a brute force attack.

learn more about wardialing here:

https://brainly.com/question/31928152

#SPJ4

A policy framework includes different types of documents that capture the domain security control requirements. One document is known as a __________, which explains processes used to implement control and baseline standards

Answers

The document referred to in the question is known as a "Security Implementation Guide (SIG)."

What is the purpose of a Security Implementation Guide (SIG)?

A Security Implementation Guide (SIG) is a policy document that outlines the processes and procedures required to implement domain security controls and establish baseline standards. It provides guidance on how to effectively implement security controls within an organization to ensure the confidentiality, integrity, and availability of information systems and data.

The SIG typically includes detailed instructions, best practices, and specific requirements for implementing various security controls. It may cover areas such as access control, authentication, encryption, network security, incident response, and more. The document helps organizations align their security practices with industry standards and regulatory requirements.

Learn more about Implementation

brainly.com/question/32181414

#SPJ11

Which action is applicable only to tables?

Answers

Answer:

the answer is adding and deleting rows

Amanda needs to manually calculate an open worksheet.Which of the following options should she click on in the Formulas tab in the Calculation group?
A) Calculate Now
B) Calculate Sheet
C) Watch Window
D) Calculation Options

Answers

The option that Amanda should click on in the Formulas tab in the Calculation group to manually calculate an open worksheet is "Calculate Now" (option A).

The "Calculate Now" option is used to manually initiate the calculation of all formulas in the worksheet. By clicking on this option, Amanda can ensure that all formulas are recalculated and updated with the latest values.

Options B, C, and D are not directly related to manually calculating the worksheet. "Calculate Sheet" (option B) is used to recalculate the selected sheet within the workbook. "Watch Window" (option C) is used to monitor specific cells or formulas for changes. "Calculation Options" (option D) allows for customization of the calculation settings, but it does not trigger a manual recalculation of the worksheet.

To know more about visit:

https://brainly.com/question/29733252

#SPJ11

Give at leat one example in practice where confidentiality protection of the data
i not needed, but integrity and availability protection to the data are neceary. Explain
your anwer

Answers

One of the example in practice where confidentiality protection of the data is  various access control methods, like two-factor authentication, passwordless sign-on, and other access control. The function of two factor authentication is to keeping certain files inaccessible.

In computer and technology, Confidentiality generally can be defined as all forms of information including personal information about people using services or employees or volunteers, information about the organization. The examples of confidentiality protection of the data is its plans or finances and information about other organizations, whether the information is recorded or not.

Here you can learn more about confidentiality protection https://brainly.com/question/30099467

#SPJ4

A network packet contains two kinds of information. what are they?

geolocation data and user data

control information and user password

control information and user data

geolocation data and user password

Answers

Answer:

C) control information and user data

Hope this helped you, and have a good day!

_________ is the systematic collection and analysis of publicly available information about consumers, competitors, and developments in the marketing environment.

Answers

Marketing intelligence is the systematic collection and analysis of publicly available information about consumers, competitors, and developments in the marketing environment.

What is marketing intelligence?

Gathering information from multiple data sources, analyzing it, dissecting it into manageable subsets, and distributing it to the appropriate company department are all components of marketing intelligence.

Thus, the methodical gathering and examination of data about customers, rivals, and changes in the marketing environment is known as marketing intelligence.

To learn more about marketing intelligence, refer to the link:

https://brainly.com/question/14340717

#SPJ1

Please help!!
comp sci

Please help!!comp sci

Answers

What is the ifconfig utility in linux? What can you do with that
(describe couple of scenario; if you can, give commands to do
that)

Answers

The ifconfig utility in Linux is used to configure and display network interfaces. It can be used to assign IP addresses, enable/disable interfaces, check interface statistics, and change MAC addresses.

The ifconfig utility in Linux is a command-line tool used to configure and display network interfaces on a Linux system. It allows users to view and manipulate network interface settings, such as IP addresses, netmasks, broadcast addresses, and more. Here are a couple of scenarios where ifconfig can be useful:

1. Configuring Network Interface: To assign an IP address to a network interface, you can use the following command:

  ```

  ifconfig eth0 192.168.1.100 netmask 255.255.255.0

  ```

  This command configures the eth0 interface with the IP address 192.168.1.100 and the netmask 255.255.255.0.

2. Enabling or Disabling Network Interfaces: To enable or disable a network interface, use the up or down option with ifconfig. For example, to bring up the eth0 interface, use:

  ```

  ifconfig eth0 up

  ```

  To bring it down, use:

  ```

  ifconfig eth0 down

  ```

3. Checking Interface Statistics: You can use ifconfig to view statistics related to network interfaces. For example, to display information about all active interfaces, including the number of packets transmitted and received, use the following command:

  ```

  ifconfig -a

  ```

4. Changing MAC Address: With ifconfig, you can modify the MAC address of a network interface. For instance, to change the MAC address of eth0 to 00:11:22:33:44:55, use:

  ```

  ifconfig eth0 hw ether 00:11:22:33:44:55

  ```

Remember, ifconfig is being gradually deprecated in favor of the newer ip command. It is recommended to familiarize yourself with the ip command for network interface configuration and management in modern Linux distributions.

Learn more about Linux:

https://brainly.com/question/12853667

#SPJ11

Allie is choosing a URL for her band’s website, which is the best method of making the URL easy to understand?

Answers

Answer:

Making a URL that is readable by humans. That is the best way and if it will be readable like that, it will meet the URL protocol requirements as well.  

Hope this helps!

Answer:

Making a URL that is readable by humans.

The _____ function is used to acquire data from the user.
Display()
Input()
Print()

Answers

Answer:

The input() function is used to acquire data from the user.

Explanation:

We will explain the purpose of each function one by one.

display() and print() functions are output functions that are used to display outputs in python.

Acquiring data from user means that the user has to give some data as input.

Python provides the input() function with a prompt of string to display a message to take input from user.

Hence,

The input() function is used to acquire data from the user.

Answer:

A. input()

Explanation:

I took the quiz

URGENT! I know it has to be one of these answers, but I cannot tell the difference between them for the life of me. Help.

URGENT! I know it has to be one of these answers, but I cannot tell the difference between them for the

Answers

I don't see a difference. Otherwise, they both are correct.

The base 10 number 18 is equal to which base 16 number?

10

12

14

16

Answers

Answer:

1 2 base 16

Explanation:

To convert to base 16 you divide the number with 16. 18/16=1 remainder 2;1 divide by 16 is =1

From bottom to top :1 2

Sistema binario, realizar el pasaje de binario a decimal; 00110011 11101100 11100001 11001100 10010101 11001111 10000001 10001100 11111111 01111110 11110101 00101000 11111100 00000011 00001111 11100000 11000011 10000000 11111000 00111100

Answers

Explanation:

MULTIPLY EACH OF THE NUMBER WITH 2 THEN RAISE TO THE POWER OF THE NUMBER'S POSITION

EXAMPLE: 1 X 2'5

Question 1 (5 points) When you are at a job interview, you should use effective communication strategies, like formal language. What is formal language and why do we use it? Formal language helps create the impression that the speaker is an expert on the topic. It suggests to audience members that the speaker's points deserve respectful consideration, and it presents the ideas of the speech in the most polished possible way.. Formal language is archaic and derived from Shakespeare to help us sound fancy in order to ensure that an employer can see that we are versatile Formal language is our ability to speak more than just one language. If we are bilingual, we have a better chance at being hired.​

Answers

This prompt is about formal oanguage and styles of communication. See the explanation below.

What is formal language and why do we use it ?

Formal language refers to a style of communication that follows specific grammatical and linguistic conventions, typically associated with academic, professional, or formal settings. It is characterized by the use of proper grammar, syntax, and vocabulary, and avoids slang or colloquial expressions.

We use formal language in job interviews to convey professionalism, competence, and respect for the setting and the interviewer. It also helps to convey our ideas in a clear and concise manner, without the distractions of informal language.

Contrary to the notion that formal language is archaic or derived from Shakespeare, it is a contemporary and widely used mode of communication in formal settings. It is not related to bilingualism, which refers to the ability to speak two languages fluently.

Learn more about formal language:
https://brainly.com/question/24222916
#SPJ1

70s music or russian music

Answers

Explanation:

BB cgbfyhcthcfgvxdrgjyfddg

Don’t listen to any

why has base 2 been accepted and used as the basis for computing?​

Answers

Answer:

Binary numbers which are essentially in base 2 has been accepted and used as the basis for computing because they consist of 0s and 1s, which are the only language the computer recognizes and understands.

Explanation:

In Computer science, a bit is a short word for the term binary digit and is primarily the basic (smallest) unit measurement of data or information.

A bit is a logical state which represents a single binary value of either one (1) or zero (0). This ultimately implies that, a single bit in computer science represents a boolean value of;

1. True or ON, which is equal to one (1).

2. False or OFF, which is equal to zero (0).

Machine and assembly are referred to as a low level programming language used in writing software programs or applications with respect to computer hardware and architecture. Machine language is generally written in 0s and 1s, and as such are cryptic in nature, making them unreadable by humans but understandable to computers.

On the other hand, assembly language use commands written in English such as SUB, MOV, ADD, etc.

A binary numbering system represents all numeric values that are to be written in sequences of ones (1s) and zeroes (0s).

Binary numbers which are essentially in base 2 has been accepted and used as the basis for computing because they consist of 0s and 1s, which are the only language the computer recognizes and understands.

would you be comfortable with a robot adjusting your investment portfolio if it came with significantly lower fees than a human financial advisor? Why or why not

Answers

Answer:

Sure, as long as it gets the job done and doesn't screw things up & is user friendly. I would also want to be able to turn it on and off at will.

Explanation:

Complete the CipherTest class by adding a constructor to initialize a cipher item. The constructor should initialize the shift to 0, and the direction to 'r' for right shift. If the constructor is called with a shift value, and direction, the constructor should assign each instance attribute with the appropriate parameter value. Complete the following TODO's: (1) create input for text, shift value, and direction (use lower( )) to keep l and r lower case (2) create a cipher item and use the constructor with the above input values (3) use control structures to call shifttoright() if direction is right and call shifttoleft if direction is left. Make sure you print out the return encrypted message inside the control structures.

Answers

To complete the CipherTest class by adding a constructor to initialize a cipher item, you need to follow the steps below: First, you need to add a constructor to the Cipher class. The constructor should take two optional parameters for the shift value and the direction.

In order to add a constructor to initialize a cipher item, you need to define a constructor method in the Cipher class. The constructor takes two optional parameters, shift and direction, and assigns them to the corresponding instance attributes. By default, the shift is set to 0 and the direction is set to 'r'. You can then use the constructor to create a cipher object with the appropriate shift and direction values.

To get input from the user, you can use the input() function and store the values in variables. You can then use the lower() method to convert the direction to lower case, ensuring that it is either 'r' or 'l'. To call the shifttoright() or shifttoleft() method based on the direction, you can use an if statement to check the value of the direction attribute. If it is 'r', you can call the shifttoright() method and print out the encrypted message. If it is 'l', you can call the shifttoleft() method and print out the encrypted message.

To know more about CipherTest visit:

https://brainly.com/question/27502806

#SPJ11

a binary representation is used to store the genomic data on a digital computer. how many bits are required to represent each nucleotide in the genetic code

Answers

Each nucleotide in the genetic code requires 2 bits to be represented in binary form.

In the genetic code, nucleotides are represented by four different bases: adenine (A), cytosine (C), guanine (G), and thymine (T). In binary representation, each base can be encoded using a combination of bits. Since there are four possible bases, we need at least two bits to represent each nucleotide.

With 2 bits, we can create four different combinations: 00, 01, 10, and 11. Each combination can be assigned to one of the four nucleotides. For example, we can assign 00 to represent adenine, 01 to represent cytosine, 10 to represent guanine, and 11 to represent thymine.

Using two bits per nucleotide allows us to accurately represent all possible combinations of bases in the genetic code. This binary representation is essential for storing and processing genomic data on a digital computer.

Learn more about Genetic code

brainly.com/question/17306054

#SPJ11

You would like to enhance your incident-response process and automate as much of it as possible. Which of the following elements would you need to include? (Select two.)
- Whitelisting
- Playbooks
- Runbooks
- Blacklisting
- Quarantining

Answers

To enhance your incident-response process and automate as much of it as possible, the following elements would you need to include: Playbooks and Quarantining

Playbooks are a documentation of a comprehensive approach for responding to incidents. Playbooks are intended to be executable and automated, providing users with step-by-step instructions on how to respond to an event or security threat. These plans assist security professionals in managing a range of issues, from phishing assaults to ransomware assaults.

Quarantining is the practice of isolating an infected file or device from the rest of the network to prevent the spread of malware or viruses. If the file or device can be cured, it will be disinfected before being reintegrated into the system. If it is irreparably destroyed, it must be eliminated to prevent additional harm or loss of data. The correct answer is Playbooks and Quarantining.

Learn more about Quarantining visit:

https://brainly.com/question/26551499

#SPJ11

If you want to delete all the temporary files created by the operating system use______ ________.

Answers

If you want to delete all the temporary files created by the operating system, use the "Disk Cleanup" utility.

The "Disk Cleanup" utility is a built-in tool in the Windows operating system that allows users to delete unnecessary files from their computer. It specifically targets temporary files, such as those created during software installations, system updates, and internet browsing. To access the utility, you can search for "Disk Cleanup" in the Start menu, and then select the appropriate result. Once opened, you can choose the disk drive you want to clean up and select the temporary files option. The utility will calculate the amount of space that can be freed up and give you the option to delete those files, helping to optimize your system's performance and free up storage space.

Learn more about Disk Cleanup here:

https://brainly.com/question/28649440

#SPJ11

which of the following is not true regarding primary keys? multiple choice primary keys are required in each table in a relational database. a primary key is typically a sequential number instead of something truly descriptive about each record. the purpose of the primary key is to uniquely identify each column in a table. primary keys do not provide meaningful business information.

Answers

The option that is not true regarding primary keys is b) A primary key is typically a sequential number instead of something truly descriptive about each record.

This statement is incorrect because a primary key does not necessarily have to be a sequential number.

While it is common to use auto-incrementing integers as primary keys for simplicity and efficiency, it is not a requirement.

A primary key can be any unique identifier that uniquely distinguishes each record in a table.

In fact, primary keys can be composed of one or more columns, forming a composite primary key.

These columns can be of various data types, including strings, dates, or even a combination of different data types.

The purpose of a primary key is to ensure the uniqueness and integrity of the data within a table.

The primary key serves as a means to identify and relate records across tables in a relational database.

It guarantees the uniqueness of each row in a table and allows for efficient data retrieval, updates, and deletion operations.

Primary keys also play a vital role in establishing relationships between tables through foreign keys.

While primary keys do not provide meaningful business information directly, they are essential for maintaining data integrity and enabling efficient data management in a relational database.

For more questions on primary keys

https://brainly.com/question/30115057

#SPJ8

Question: which of the following is not true regarding primary keys?  a)primary keys are required in each table in a relational database.

b) a primary key is typically a sequential number instead of something truly descriptive about each record.

c) the purpose of the primary key is to uniquely identify each column in a table.

d)primary keys do not provide meaningful business information.

images that are made up of pixels and cannot be resized without losing quality?

Answers

Answer:

there are no known pictures that can be zoomed in and not lose quality. they will all be pixelized. mostly everything on a computer is made of pixels.

Explanation:

hope this helps!

~evita

the ____ sound file format is used primarily on unix workstations. a) RealAudiob) AUc) AIFFd) MIDI

Answers

The AU sound file format is used primarily on Unix workstations. Thus, the correct option is:

b) AU.

The AU file format is used primarily on Unix workstations. It was developed by Sun Microsystems and is commonly used on Sun and other Unix-based platforms. AU files are typically used to store simple audio data such as speech or music, and are often used in conjunction with the Sun Audio hardware and software systems.

AU files are typically uncompressed, and use a relatively simple file format that is easy to manipulate and process. Because they are uncompressed, AU files can be quite large, and are generally not used for streaming or online applications. Instead, they are commonly used for storing and archiving audio data, or for transferring audio files between different Unix-based systems.

Therefore, the correct option is : (b) AU

To learn more about Unix visit : https://brainly.com/question/29648132

#SPJ11

Ismael would like to insert a question mark symbol in his document. What steps will he need to follow to do that?

1. Hold down the Ctrl key while pressing the required key.
2. Hold down the Shift key while pressing the required key.
3. Hold down the key containing the character needed.
4. Hold down the Spacebar while pressing the required key

Ismael would like to insert a question mark symbol in his document. What steps will he need to follow

Answers

Answer:

2

Explanation:

Which of the following is the most accurate definition of a botnet? a small text file passed to a Web browser on a user's computer by a Web server destructive software robots working together on a collection of zombie computers via the Internet spider software used by a search algorithm to crawl various Web sites to return a query a common platform used by search engines to index the contents of a Web site a fraudulent e-mail attack that targets a specific person or organization by personalizing the message

Answers

Answer:

destructive software robots working together on a collection of zombie computers via the Internet

Explanation:

Botnets are devices controlled via the internet to achieve a goal that requires multiple computers working towards a shared task. e.g. Denial of service attacks and mass email messaging.

To finish the work safety and early, what OHSP should be done?

Answers

Answer: Always power off and unplug the computer before working on it.

Explanation:

A _______ is a graph of each data value plotted as a point.

Answers

A dotplot is a graph of each data value plotted as a point.

What is the name of the group of values used to plot the graph?A histogram is a graph where the horizontal axis represents the values of the observations, and the vertical axis represents the frequency with which each value appears in the data set. The values of one variable are displayed against the values of another variable to create a histogram.The dotplot is a graph in which each data point (or dot) is shown along a scale of values. 4. A stem-and-leaf plot, often known as a stemplot, divides each value into two parts: a stem (such as the leftmost digit) and a leaf to depict quantitative data (such as the rightmost digit).

To learn more about dotplot refer to:

https://brainly.com/question/15853311

#SPJ4

Other Questions
2(x-5)=6(2-1/2x) solve for x please help with questions 1-7 I will give brainiest to the person who answers it correctly! D = m/v, solve for m on december 18, intel receives $240,000 from a customer toward a cash sale of $2.4 million for computer chips to be completed on january 23. the computer chips had a total production cost of $1.4 million. what journal entries should intel record on december 18 and january 23? assume intel uses the perpetual inventory system. which type of analysis assists with defining how to optimize performance based on a potential constraint A particle is moving with the given data. Find the position of the particle.a(t) = 2t + 9, s(0) = 8, v(0) = 4 Kim bought a pair of shoes on sale for 39.60. The sale price was 45% of the original price. What was the original price of the shoes in dollars Which throwing cue includes flicking the wrist?HugExtendThrow/ReleaseFollow Through Is US a closed economy? Which organizations seek to improve wages and working conditions through various strategies, including collective bargaining and strikes A programmer notices the following two procedures in a library. The procedures do similar, but not identical, things.Procedure MaxTwo (x, y) returns the greater of its two integer parameters.Procedure MaxThree (x, y, z) returns the greatest of its three integer parameters.Which of the following procedures is a generalization of the MaxTwo and MaxThree procedures?Selected Answer: [None Given]Answers:Procedure OverMax (numList, max), which returns the number of integers in numList that exceed the integer value maxProcedure MaxFour (w, x, y, z), which returns the greatest of its four integer parametersProcedure Max (numList), which returns the maximum value in the list of integers numListProcedure Min (x, y), which returns the lesser of its two integer parameters Write a Problem statement of the causes and effects of earthquakes on the enviroment. Aurora has been working on a visual for her sales presentation to her senior management team. She has tested it with a few coworkers. It took them several minutes to understand the message shes trying to convey. Which two options should Aurora consider to improve the effectiveness of her presentation? Use black and white instead of colors. Simplify the visual. Remove the visual from the presentation. Use a different graphic or chart. Make the title of the visual longer. What is the sum of the series infinity e n-1 -3(3/8)^n? what made it possible for the Ashanti people to control most of the territory of Ghana The kingdoms of Ghana, Mali, and Songhai were economically successful because of their A. exchanges with Indian ports.B. direct access to the Arabian Sea.C. control of trade routes.D. abundance of diamonds. what is ONE way in which these proposals favored the slave holding states, mostly located in the South and West? T/F: a speech presenting an award to a solider for valor in battle is an example of a commemorative speech Heyy everyone,HELP ME WITH THIS EXERCISE PLEASE!!!IM NEEDING YOUR ANSWERS NOW,PLEASE HELP ME:)I WILL GIVE YOU THE BRAINLIEST IF YOU ANSWERS MY QUESTIONS VERY GOOD AND EXCALTY,PleaseDo MEMORY GAME PLEASE write a short note on need for disarmament