it is important to give the health and safety experience to new or inexperienced workers, including those that have been away from the workforce for some time
a. training
b.exposure
c.hygiene​

Answers

Answer 1

Answer:

a. training

Explanation:

"Training" is crucial when it comes to new workers or workers who are coming back after a long vacation or whatever reason. The risk of injuries and making mistakes is high for new workers because they are still adjusting to the company's processes. This is similar to a baby who's learning to walk. The baby makes several slips before mastering the skill. For a worker who has been away from the workforce, training should also be given because that worker needs to freshen up his skills and relearn what he needs to grasp before working.

This situation is especially true to construction workers who work under contractual projects. This means, they always have to be trained every time about their new jobsite before even working.


Related Questions

Andy wants to install a new Internet connection. He wants to take the fastest he can get. What are the maximum speeds for the following Internet access technologies?

Answers

Answer:

1. so if i wanted to build a linux server for web services(apache) with 1cpu and 2 gb of memory.-operating at 75% of memory capacity2. a windows server with 2 cpu/ 4gb memory- operating at 85% of memory capacity3. a storage server with 1 cpu/ 2gb memory- operating at 85% of memory capacityhow much memory do i have to add for each server. so that the utilization rate for both cpu and memory is at a baseline of 60%."the details for the cpu like its processor or the memory's speed isnt to be concerned" yeah i kept asking my teacher if he's even sure about the but the whole class seems to be confused and the project is due in 3 days..this is a virtualization project where i have to virtualize a typical server into an exsi hypervisor.

Answer:

PLATOOOOOO

Explanation:

How these technologies influence the user experience and knowledge?

Answers

Answer:

I don't know

Explanation:

Technology can help us study and stuff yet we can still look up the answers. It also allows to know what's happening in the world around us like if a girl gets kidnapped, we get Amber Alerts on our phones about the missing girl. Most of us people today have learned about George Floyd's death on the internet through technology. Technology doesn't really influence us as much as help us out but for some people it can cause us to change under the influence of seeing other people and how they dress and act and stuff.

Select the guidelines you should follow when creating a memo.
Write very long sentences.
At the top, type the date and start the message.
Get to the point at the beginning of the memo.
Single-space the paragraphs in the memo.
Keep the paragraph lengths short.
At the end, inform the readers if there are specific actions they need to take.

Answers

Answer:

Get to the point at the beginning of the memo.

Keep the paragraph lengths short.

At the end, inform the readers if there are specific actions they need to take.

Explanation:

Answer

Get to the point at the beginning of the memo.

Keep the paragraph lengths short.

At the end, inform the readers if there are specific actions they need to take.

What is the assignment operator?

Select the one choice that best answers the prompt above:
Answer 1
==

Answer 2
=

Answer 3
<=

Answer 4
===

Answers

I think hahahahaha Answer 1

Answer:

answer 3 is greater then or equal to, answer one is both equal, answer 2 is equal, answer 4 is all equal no mistakes,

Explanation for brainly please

answer 3

what is the first question you should ask yourself when analyzing an advertisement

Answers

How your presentation is gonna be

To allow a document to be opened easily on most computers, save the document as a _____.

a hyperlink
require a password
a template
read only

Answers

Answer:

PDF

Explanation:

Answer:read only

Explanation:

What is the major difference between a block style business letter and a modified block style letter? A modified block style letter has no specified alignment The placement of the return address, date, and complimentary closing The placement of the complimentary closing The placement of the date

Answers

Answer:

The placement of the return address, date, and complimentary closing

Explanation:

A business letter can be defined as a formal written form of communication used by business organizations to professionally communicate with other businesses, companies and clients.

There are two (2) main styles used when writing a business letter;

1. Block style business letter: all the texts contained in the letter are aligned to the left (left-aligned) and must be single spaced without any exception.

2. Modified block style business letter: it uses a format that differs from the block style in that the date, return address sign off or complementary close and signature lines are centered (center-aligned) to the page or body of the letter.

Hence, the major difference between a block style business letter and a modified block style letter is the placement of the return address, date, and complimentary closing.

!!!!!!!-------PLEASE HELP--------!!!!!!!
When writing a selection sort or insertion sort algorithm in a class, what type should the final main method be

Answers

Answer:

A cool little 40 Minutes Timer! Simple to use, no settings, just click start for a countdown timer of 40 Minutes. Try the Fullscreen button in classrooms and

Explanation:

what ppe can provide in exposure to heat and radiation?​

Answers

Examples of commonly used PPE for radiation protection from X-rays and gamma rays include:
Lead aprons or vests. Wearing lead aprons can reduce a worker's radiation dose. ...
Lead thyroid collar. ...
Lead gloves. ...
Safety goggles.

According to the video, what tasks do Foresters commonly perform? Check all that apply.

Answers

Common tasks that foresters perform are as follow.

Measuring trees

Supervising timber harvests

Planting seedlings (baby trees)

Hope I could help!!

Answer:

On edge its

receiving money

totaling bills

giving receipts

weighing produce and bulk food

Explanation:

1st row has 3 possible answers software program, web page, and web browser

2nd row has 3 possible answers a web browser, the internet, and a user’s computer

Answers

Answer:

1st row: software program

2nd row: a user's computer

hope i've helped.

which of the following is NOT a shortcoming of emails
A instant delivery
b information overload
c computer viruses
d ineffectiveness to communicate emotion ​

Answers

Answer:

A. instant delivery

Explanation:

someone please help me? Thanks!

Answers

Google the answer. L maoooo

Answer:

B

Explanation:

Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message.

how can we show that heat is liberated during respiration​

Answers

Answer:

To show that heat is liberated during respiration. Make a hole in the cork and insert a thermometer into cork and see the bulb of the thermometer is in the midst of the seeds. Record the temperature in both the flasks at every two or three hour intervals for about 24 hours.

Explanation:

Hope this helps:)

is techonalygy harmful or useful

Answers

Tech can be both harmful and useful. Some techs you can use for school or educational purposes. Some apps can harm your brain.

Answer:

both

Explanation:

both because tech. can be useful to anyone depending on what they need but harmful because you are hurting your eyes by looking at the scree for way to long, along with physical heath by sitting there for way to long and not being active.

What are users unable to do in the user interface of PowerPoint 2016?

Add additional tabs on the ribbon.
Customize the default tabs on the ribbon.
Fully customize newly added tabs on the ribbon.
Use global options to customize newly added tabs on the ribbon.

Answers

Answer:

B. Customize the default tabs on the ribbon

The other answer is in correct

Explanation:

I took the unit test review and got 100%

edge 2020

it’s customize, just took the test :)

Please helpp!! I need it quickly!

Answers

Answer:

a

Explanation:

Write a program that accepts a number as input, and prints just the decimal portion. Your program should also work if a negative number is input by the user

Answers

In python:

number = float(input("Enter a number "))

print(round(number - int(number), 2))

Answer:

To just print the decimal, use code (in python)

Explanation:

number = float(input("Enter a number "))

print(number - int(number))

This code should cause the system to print just the decimals at the end of the number.

Which sentences describe the value of a conditional statement? Check all that apply.

It allows a programmer to designate a portion of the code that will be run only when a condition is met.

It creates new program code when a condition is met.

It allows a programmer to set a condition that must be met.

It incorporates decision-making into a program.

Answers

Answer:

134

Explanation:

Edgenuity

Answer:

1. It allows a programmer to designate a portion of the code that will be run only when a condition is met.

3. It allows a programmer to set a condition that must be met.

4. It incorporates decision-making into a  program.

Explanation:

Select the correct answer.

What are the requirements to access email on the web?
А.
a webmail provider's URL and a password
B.
a webmail provider's URL, a username, and a password
C.
a credit or debit card, a username, and a password
D
an email server ID and a password

Answers

Answer:

a webmail provider's URL, a username, and a password

Explanation:

B is the answer to the question

For your biology class, you will be giving a presentation of the findings of a plant growth experiment. Which application is best suited for this presentation?


Writer or Word


Impress or PowerPoint


Notepad or Paint


Calc or Excel

Answers

Answer: Powerpoint

Explanation: Easy to give graphs and add pictures. You can also add shapes to create a bar graph if needed.

Answer:

Calc or Excel

Explanation:

4.1 Code Practice: Edhesive

Answers

In python 3:

while True:

   name = input("Please enter a name: (Nope to end) ")

   if name == "Nope":

       break

   print("Nice to meet you {}".format(name))

I hope this helps!

   

The program is an illustration of while loops.

While loops are used to perform iterative operations, until the condition is met

The program in Python, where comments are used to explain each line is as follows:

#This prompts the user for name

name = input("Please enter a name (Nope to end) ")

#This checks if input is "Nope"

while name.lower()!="nope":

   #If no, this prints the greetings

   print("Nice to meet you",name)

   #This prompts the user for another input

   name = input("Please enter a name (Nope to end) ")

Note that the loop is repeated until the user enters "Nope" or "nope"

Read more about while loops at:

https://brainly.com/question/18430675

What are some common security threats for our home devices and IoTs?

Answers

Answer:

Botnets. A botnet is a network that combines various systems together to remotely take control over a victim’s system and distribute malware.A denial-of-service (DoS) attack deliberately tries to cause a capacity overload in the target system by sending multiple requests. In a Man-in-the-Middle (MiTM) attack, a hacker breaches the communication channel between two individual systems in an attempt to intercept messages among them.Hackers use social engineering to manipulate people into giving up their sensitive information such as passwords and bank details.Ransomware attacks have become one of the most notorious cyber threats. In this attack, a hacker uses malware to encrypt data that may be required for business operations. An attacker will decrypt critical data only after receiving a ransom.

Explanation:

Question 3 :The easiest way to become a victim of malware, spyware or viruses is through:This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A

texting.
B

online chatrooms.
C

playing games.
D

downloads.

Answers

Answer:

downloads.

Explanation:

A test using various ransomware strains showed that 1,000 Word documents could be encrypted in anything from 18 seconds to 16 minutes.  Thus, option D is correct.

What easiest way to become a victim of malware download?

Phishing emails are by far the most popular way for hackers and state-sponsored hacking groups to disseminate malware.

Adware is malware that targets computer users with unwanted adverts. This makes it possible for the creator of the malware to obtain payment from the companies whose adverts are served by it.

However, certain viruses may be scheduled to begin infecting your computer a few days after they are downloaded. Other viruses may attempt to circumvent antivirus protection by downloading in chunks.

Therefore, Hackers have become adept at crafting emails that lead recipients to click on links or download files that contain malicious software.

Learn more about downloads here:

https://brainly.com/question/29328797

#SPJ2

What is the appropriate formula used to determine the area of a surface
using SI units? *
O m2
O m3
0 m/s
O m*kg

Answers

Answer:

om2

Explanation:

m2 is SI units I hope this help


3. Which of the following is used as a container to keep salted fish during the
process?
a. bistay
b. oil drum
c. mixing bowl
d.earthen pots​

Answers

Answer:

A. yes A is actually used as a container to keep salted fish

Explanation:

plzzzzzzzzzzzzz give me brainiest

Average of Grades - Write a program that stores the following values in five different variables: 98, 87, 84, 100, 94. The program should first calculate the sum of these grades and store the result in a variable named sum. Then, the program should divide the sum variable by 5 to get the average. Display the results on the screen. The program output should look similar to: The average of the grades is 92.6.

Answers

Answer:

Not sure what language, but in python a super basic version would be:

val1 = 98

val2 = 87

val3 = 84

val4 = 100

val5 = 94

sum = val1 + val2 + val3 + val4 + val5

avg = sum / 5

print(avg)

Explanation:

Enter an integer
5
6
7

Answers

/* This program prompts the user to enter an integer

* and then determines whether the integer is between 4-6. */

start();

function start(){

var int = readFloat("Enter an integer to print in this program: ");

println("An integer from 5-6 is entered (True/False)");

if(int <= 6 || int == 4){

println("True: " + int + " was entered.");

}else{

    println("False: " + int + " was entered.");

}

}

... If this isn't what you were looking for, I apologize.  I'm uncertain on what you really need help with, your question isn't quite clear... I answered to the best of my ability in simple js.

edit: brainly deletes my indents... just make sure to indent properly :-)

Two strings are anagrams if they are permutations of each other. For example, "aaagmnrs" is an anagram of "anagrams". Given an array of strings, remove each string that is an anagram of an earlier string, then return the remaining array in sorted order. For example, given the strings s = ['code', 'doce', 'ecod', 'framer', 'frame'], the strings 'doce' and 'ecod' are both anagrams of 'code' so they are removed from the list. The words 'frame' and 'framer' are not anagrams due to the extra 'r' in 'framer', so they remain. The final list of strings in alphabetical order is ['code', 'frame', 'framer'].

Answers

Answer:

Here is the Python program:

def removeAnagram(array):  #method to remove string from array of strings that is anagram of earlier string

   s = set()  #creates a set

   output = []  #creates an output list

   for string in array:  # iterates through each string in array of strings

       if ''.join(sorted(string)) not in s:  #if sorted string of array is not in s

           output.append(string)  #append that string to output list

           s.add(''.join(sorted(string)))  #add that sorted string to s set

   return sorted(output)  #returns output list

   

array = ['code', 'doce', 'ecod', 'framer', 'frame']  #creates a list of words

print(removeAnagram(array))  #calls method to remove each string that is an anagram of earlier string

Explanation:

I will explain the program with an example:

Suppose array = ['code', 'doce', 'ecod', 'framer', 'frame']

Now the for loop works as follows:

At first iteration:

first string of array is 'code'

if ''.join(sorted(string)) not in s: this is an if statement which has two method i.e. join() and sorted(). First each letter of the string i.e. 'code' is sorted in alphabetical order then these separated characters are joined together into a word with join() method. So

sorted(string) becomes:

['c', 'd', 'e', 'o']                                                                                                           and ''.join(sorted(string)) becomes:

cdeo

Now if ''.join(sorted(string)) not in s condition checks if cdeo is not in s set. This is true so the statement:

output.append(string) executes which appends the string to output list. So now output has:

['code']                                                                                                                         Next s.add(''.join(sorted(string))) statement  adds the sorted and joined string of array to s set. So the set has:

{'cdeo'}                                                                                                                        

So at each iteration each word from the array is sorted and joined and then checked if output array contains that word or not. If not then it is added to the output array otherwise not. For example at 2nd iteration the word 'doce' which is anagram of code and it is checked when it is sorted and joined and it becomes cdeo which is already in output array. So this is how the anagram is removed from the array. At the end the output array which returns the remaining array in sorted order is returned by this method. The screenshot of the program along with its output is attached.

The program is an illustration of loops.

Loops are used to perform repetitive and iterative operations.

The program in Python, where comments are used to explain each line is as follows:

#This initializes the list of words

myList = ['code', 'doce', 'ecod', 'framer', 'farmer']

#This creates a set

mySet = set()

#This creates a new list for output

newList = []

#This iterates through the list

for elem in myList:

   #This checks if a sorted list element is not in the set

   if ''.join(sorted(elem)) not in mySet:  

       #if yes, the list element is appended to the new list

       newList.append(elem)

       #And then added to the set

       newList.add(''.join(sorted(elem)))  

#This prints the anagram

print(sorted(output))

Read more about similar programs at:

https://brainly.com/question/19564485

To view data in a graphical format that is easier to understand, use Microsoft Excel
functions
formulas
pictures
charts

Answers

Answer:

i guess charts??

Explanation:

Other Questions
goodmorning have a great day:) Please help meeeeeee thank you too whoever does Restriction endonucleases cleave at __________ , which are sequences that read the same, 5 to 3 , on each DNA strand. There is a paper attached only 5 questions :) 100 POINTS PLEASE ANSWER ALL QUESTIONSIt's about the McCulloch v. Maryland case.Case background1. Identify the plaintiff and defendant in the case.2. Explain why the case was brought to the Supreme Court.3. Describe the goal of each side in the case. What type of decision was desired?Constitutional connections4. Explain the key rights or amendments involved in the case.5. Did the case primarily center on an issue of civil rights or civil liberties? Explain.Case outcomes6. Describe the majority decision of the court and several arguments as to why the justices ruled the way they did.7. If there was one dissenting decision of the court, explain it in detail. Why did some justices disagree with the majority?8. What precedent was set by the courts decision? What impact did it have on American society? A pizza restaurant has 632/3 cups of flour. Each batch of pizza dough uses 5 1/4 cups of flour. Part of analyzing a political cartoon is deciding whether or not you agree with its message. What is the BEST reason to include this in your analysis?A.The artist is attempting to persuade you to like his art.B.The artist is attempting to provoke humor about a political topic.C.The artist is attempting to provoke thought about a political topic.D.The artist is attempting to gain readers in many newspapers. Pablo mixes 6 units white paint and 1 unit black paint to make gray paint. What two equations show the relationship between units of white paint, w, and units of black paint, b? Streams compensate for changes in their systems by adjusting other factors in order to return to _______ How was post-impressionism different from impressionism?a) it used elaborate ornamentation and detail. b) it emphasized distorted forms and non-realistic use of color. c) it used pointillism d) it depicted religious scenes any sort of help is highly appreciated please, thank you, and have a good day The __________ is in charge of food safety, meat and plant production for human consumption, and developing and exploring new technologies in farming and ranching. A.Department of AgricultureB.Council on Environmental QualityC.Department of Homeland SecurityD.Department of the Interior the leader of the Indian war of 1763 was a chief from the ______ tribe. his name was pontiac. Researchers conducted a study to determine the monthly rental cost of rent-controlled apartments in the five boroughs of New York City in 2012. The study randomly sampled 157 apartment records from the Bronx, obtained from a large collection of income- and expense-filing statements. The 95% confidence interval of rent-controlled apartment costs in the Bronx was $917.00 $22.10. The cost of all rent-controlled apartments in the Bronx has a standard deviation of $73.70. State the conclusion of the z-confidence interval for the mean. Researchers are certain that the interval ($894.90, $939.10) contains the mean. A hypothetical element has two main isotopes with mass numbers of 59 and 62. If 73.00% of the isotopes have a mass number of 59 amu, what atomic weight should be listed on the periodic table for this element? Answer in units of amu. Nate sees toys at the toy store. He sees more than 200 toys, but fewer than 300. How many toys could Nate see? Draw to show the number. Write the number in different ways. HELP PLS ASAP I MIGHT FAIL What are some nonverbal ways to show consideration for others?Imagine you have a friend who wants to copy your homework. You say no and the person posts a negative message about you on a social media site. Use I messages to respond. 1.191 mol N2O3 is put into a 2.00 L flask at 25C where it decomposes into NO2(g) and NO(g). What is the equilibrium constant (to 4 decimal places) if the reaction mixture contains 0.300 mol NO2 at equilibrium? 7. All physical forms of water (solid, liquid, and gas) make up thea. atmosphere.b. biosphere.C. hydrosphere.8. The living portion of the earth is contained within thea. lithosphere.b. biosphere.C. hydrosphere.9. The correct sequence of layers of the atmosphere from innermost to outermost isa. troposphere--stratosphere--mesosphere--thermosphere.b. mesosphere--stratosphere--thermosphere--troposphere.c. thermosphere--stratosphere--mesosphere--troposphere.10. Most of Earth's weather occurs in thea. mesosphere.b. troposphere.C. stratosphere. how can we show that heat is liberated during respiration