Using 20 sentences, as a student, why is it important to identify risk and hazard inside kitchen and home and business properties?

Answers

Answer 1

Answer:

The answer is below

Explanation:

Hazard is something or condition that can cause injury to individuals. If properties are not managed appropriately, the hazard can be inevitable. Every hazard comes with its own risk. And Risk of hazard is the degree to which hazard can affect individuals when exposed to hazards.

Identifying hazards in the surrounding are essential. Also, identifying the risk associated with hazards can't be overemphasized. Hence, the need to identifying both the hazards and the risks associated with it.

There are various reasons it is important to identify risks and hazards inside kitchen and home and business properties. They include the following reasons:

1. It is important to identify hazards in the kitchen, home, and business properties because they may cause injury.

2. Identifying hazards will make us know how to eliminate the hazards

3. When we identify hazards we can easily prevent its future occurrence

4. Identifying hazards in the kitchen such as a bad electric cooker can prevent potential electrical shock

5. When a hazard such as leaking gas is identified, we prevent potential fire outbreak

6. Identifying hazard early is a preventive measure and it is cheaper.

7. Failure to identify hazards in business properties will lead to a great loss of profits.

8. To identify the risk of hazards is the best way to eliminate the hazards.

9. Identifying the risk of hazards can make us anticipate and quickly remove the hazards effectively.

10. It is cheaper to eliminate the risk of hazards when identified than performing repairs after hazards have caused damages.

11. Understanding and identifying the risk of hazard can help save lives, whether kitchen, home, or in business properties.

12. Identifying the risk of hazards, can lead us to have a solution in place against the hazard.


Related Questions

Which term refers to the portion of the hard drive where print jobs are stored before going to the print device

Answers

Answer:

Print Queue.

Explanation:

I majored in Technology

Printer spoolers, which queue print jobs and send them one at a time to a printer, should not be confused with printer drivers.

What print jobs are stored before going to the print device?

In order to enable control of print queue actions like stopping, restarting, or canceling tasks, a print queue provides users with printer management features. Some print queues let users rearrange the queue's order and assign print jobs a higher priority.

Messages that need to be printed are gathered in print queues. An Unspecific print queue can be started or canceled.

Applications can print with the help of printer drivers without having to be aware of the specific technical specifications of each printer model.

Therefore, The area of the hard disk where print jobs are kept before being sent to the printer is referred to as the print queue.

Learn more about print device here:

https://brainly.com/question/4005823

#SPJ6

plzz help me with this question.........

Write a program to input a number find the sum of digits and the number of digits. Display the output also.......

sample input - 7359
sample digits - 24
number of digits - 4​

Answers

Answer:

please mark as brainliest!!

Explanation:

public class SumOfDigits{ public static void main(String args[]) { Scanner sc = new Scanner(System.in); System.out.println("Please enter a number to calculate sum of digits"); int number = sc.nextInt(); // Remember number/10 reduces one digit from number // and number%10 gives you last digit int sum = 0; int input = number; while (input != 0) { int lastdigit = input % 10; sum += lastdigit; input /= 10; } System.out.printf("Sum of digits of number %d is %d", number, sum); // closing Scanner to prevent resource leak sc.close(); } }

Can someone help me get spotify premium

Answers

Answer:

Yes just go to spotify and pay for spotify premium.

Explanation:

Answer:

Buy it, go to the app store or google play and it will surely pop up like a sign saying premium.

Explanation:This is so hard :/

BRAINLIEST!!! HELP!!! 20 PNTS!!

Which is the correct way to add a border color?

A. border-color(red);

B. border-color: red;

C. red: border-color;

D. border-color = red;

Answers

Answer:

The answer you are looking for is "B.) border-color: red"

HTML and CSS coding is fairly simple, but to assign a border color to a certain tag, you would write

Tag Name (without <>'s)

{

border-color: red

}

Remember that your border color will affect all of the tags mentioned in this command.

Can we trust in Avast Antivirus ⊕?⊕

Answers

Answer:

yes we can

Explanation:

im also using avast antivirus and it was no fault in avast antivirus

Answer:

Avast is a good antivirus program. It is not a scam or malware. I personely use Avast a while back and they are now basically the same thing, only with a different user interface.

Explanation:

Hope It's answer you plz mark as Brainlist

Zack sees an online contest. He could win $10,000 instantly! On the sign-up form he enters his name and email address. He is also asked to enter his nickname, the name of any pets, and his mom's maiden name. Should he do it?

Answers

Answer:

Do not please! Online hackers and identity thieves can use such informations or clues to figure out Zack's passwords.

Explanation:

In this scenario, Zack sees an online contest stating that he could win $10,000 instantly! On the sign-up form he enters his name and email address. He is also asked to enter his nickname, the name of any pets, and his mom's maiden name.

Hence, it is advisable, that Zack shouldn't do it because online hackers and identity thieves can use such informations or clues to figure out Zack's passwords.

Basically, this type of cyber attack is simply known as baiting in social engineering.

Social engineering can be defined as a manipulative strategy or technique that involves the use of deceptive and malicious activities on unsuspecting victims in order to gain unauthorized access to their confidential or private information for fraud-related purposes. Some examples of social engineering are quid pro quo, phishing, baiting, tailgating etc.

The Internet:

O A. only gives us access to our local communities.

O B. hinders our ability to influence people.

O C. limits us to local social networking sites.

O D. enables us to join global online communities.​

Answers

Answer:

D- it enables us to join global online communities.

Explanation:

Thanks to social media and other websites, content you produce can be seen all over the world.

b) Describe the computer processing that is required to maintain the correct growing
conditions.​

Answers

Answer:

Explanation:To get the best plant growing conditions, the temperature and humidity (moisture in the air) have to be controlled.

The greenhouse therefore has temperature and humidity sensors linked to a computer, and the computer has a control program storing details of the correct temperature and humidity settings. The greenhouse is fitted with a heater, sprinkler and window motor which are also linked to the computer.

If the humidity falls below the values stored in the program, the computer activates the sprinklers and closes the windows. If the temperature falls outside the values stored in the program, the heater is activated by the computer.

What will you see on the next line?

>>> aList = [12, 3, 5, 7, 7]
>>> aList.index(7)

1

7

3

2

Answers

Answer:

its 3, just did it on edg 2020

Explanation:

sdfdsfdsfdsfsdfsdf vote me brainliest!

The next line after >>> aList = [12, 3, 5, 7, 7], >>> aList.index(7) is 3. The correct option is c.

What is an array?

A group of identical objects or pieces of data held near to one another in memory is referred to as an array. An array type is a user-defined data type that consists of an ordered collection of objects of a single data type. Ordinary array types have a set maximum number of elements they can hold and use the ordinal position as the array index.

The unordered list that is a part of the simple array is thus visible. The unordered list can be converted to an ordered list by executing the command "aList. sort()".

So, the next line will be:

>>> aList = [12, 3, 5, 7, 7]

>>> aList.index(7)

3

Therefore, the correct option is c. 3.

To learn more about array, refer to the link below:

brainly.com/question/14915529

#SPJ2

What kinds of circumstances would lead you to writing a function versus using a loop? please explain in simple terms

Answers

Answer:

1. You want to use parameters

2. You don't want your program to run multiple times

3. You want to call that snippet of code throughout your program

hope this helped :D


8.10 Code Practice Question 1

Write code that takes in two words from user input and stores them in the variables x and y respectively. Then, the programs the values in x and y, and print x and y).

Note: The variable names x and y are required for this question

Answers

x = input("Enter a word: ")

y = input("Enter a word: ")

x,y = y, x

print(x)

print(y)

I hope this helps

Since we need to perform some coding functions such as:

Asking for the input of a numberStoring them as individual variablesPrinting/Displaying the values independently.

First thing we need to do is to declare the unknown variables as x and y

Next would be to write the input this way:

x= input ("Put a word:")

y= input ("Put a second word:")

x,y = y, x

Print(x0

Print(Y)

Read more about programming here:

https://brainly.com/question/18900609

(Java)Write a program that calculates and displays the conversion of an entered number of dollars into currency denominations—20s, 10s, 5s, and 1s. Example output: $452 converted is 22 $20s, 1 $10s, 0 $5s, and 2 $1s.​

Answers

Answer:

Below!

Explanation:

This is the code I have. I am not sure what I am missing that it won't accept -  

import java.util.Scanner;

class Dollars {

   public static void main(String[] args) {

            int numTwenties,numTens,numFives,numOnes,dollarAmount;  

       Scanner sc= new Scanner(System.in);

       System.out.println("Please enter a dollar amount: ");  

       dollarAmount = sc.nextInt();

        numTwenties = dollarAmount/20;

        numTens = (dollarAmount - 20*numTwenties)/10;

        numFives = (dollarAmount - (10*numTens + 20*numTwenties))/5;

        numOnes = (dollarAmount - (10*numTens + 20*numTwenties + 5*numFives));

       System.out.println(+ dollarAmount + " converted is" + numTwenties + " $20s, " + numTens + " $10s, " + numFives + " $5s, and " + numOnes + " $1s.");  

   }

}

This is what it is giving me -

Test CaseIncomplete

Dollars 598

Input598

OutputPlease enter a dollar amount: 598

598 converted is29 $20s, 1 $10s, 1 $5s, and 3 $1s.

Results

$598 converted is 29 $20s, 1 $10s, 1 $5s, and 3 $1s

Expected Output

$598 converted is 29 $20s, 1 $10s, 1 $5s, and 3 $1s

It's mainly the price measure with one currency against the other, even as rate changes, money through one country can get relatively weak or powerful in comparison with the other currencies, and the further program can be defined as follows:

Program Explanation:

Import package.Defining a class Conversion .Defining an integer variable "twenties, tens, fives, ones, amount, n".After defining a variable, a Scanner class object is declared that inputs value in it.In the next step, a conditional statement is declared that checks value and hold its calcuated value.At the last, a print method is declared that prints its value.

Program:

import java.util.*;//import package  

public class Conversion //defining a class Conversion

{

   public static void main(String ar[])//defining a main method

   {

       int twenties, tens, fives, ones, amount, n;//defining an integer variable

       Scanner obcdf= new Scanner(System.in);//creating Scanner class object to input value

       System.out.println("Enter amount: ");//print message

       amount = obcdf.nextInt(); //input integer value

       n =  amount; //holding innput value

       if(amount > 20)//using if block that check amount value greater than 20

       {

           twenties = (int)(amount/20); //using twenties that divides amount value by 20 and hold its integer value  

           amount = amount % 20;// holding modules value in amount variable

       }

       else  //defining else block

       {

           twenties = 0;//holding 0 in twenties variable  

       }

       if(amount > 10)//using if that check amount value greater than 10

       {

           tens = (int)(amount/10);//using tens that divides amount value by 10 and hold its integer value

           amount = amount % 10;// holding modules value in amount variable

       }

       else  //defining else block

       {

           tens = 0;//holding 0 in tens variable  

       }

       if(amount > 5)//using if that check amount value greater than 5

       {

           fives = (int)(amount/5);//using tens that divides amount value by 5 and hold its integer value

           amount = amount % 5;// holding modules value in amount variable

       }

       else //defining else block

       {

           fives = 0;//holding 0 in fives variable  

       }

       if(amount > 1)//using if that check amount value greater than 1

       {

           ones = (int) amount;//holding amount value in ones variable

       }

       else //defining else block

       {

           ones = 0;//holding 0 in ones variable

       }  

       System.out.println("$"+n+" converted is "+twenties+" $20s, "+tens+" $10s, "+fives+" $5s, and "+ones+" $1s."); //print value

   }

}

Output:

Please find the attached file.

Learn more:

brainly.com/question/4448370

Which of the following best describes the protocol used on the internet?

Answers

Answer:

The protocols of the Internet are open and used by all devices connected to the network

Explanation:  

There are billions of devices connected to the Internet, and hundreds of different kinds of devices: laptops, tablets, phones, refrigerators, handheld credit card readers, and so on. Protocols (standards) ensure that the variety of devices interact with each other smoothly.  There are a lot of protocols! The Internet was designed with several layers of abstraction that sort the protocols according to what part of the process they support.

When do you use a for loop?

Answers

Answer:

You use a for loop when you know how many times you want to run the loop

Explanation:

if you dont know, use a while loop

What predefined match policy allows viewers to watch a claimed video but does not allow ads to display on the video

Answers

Answer:

The correct response is "Track".

Explanation:

Tracks encourage the individual that listens to that same music video to miss or ignore that same starting of almost any soundtrack at a certain moment. It might also impact an individual who accompanies a facility that implements or obeys guests.

For obvious reasons, a digital ad service can track client's internet search engine behavior patterns to continue providing accurate recommendations.

What is the function of a web browser, and what are the main components of a web address?

Answers

Answer:

The primary function of a web browser is to render HTML, the code used to design or "mark up" webpages. Each time a browser loads a web page, it processes the HTML, which may include text, links, and references to images and other items, such as cascading style sheets and JavaScript functions.

Function of a web browser: A web browser allows users to access and view websites on the internet, request web pages from servers, and display their contents.

Main components of a web address (URL):

1. Protocol

2. Domain

3. Subdomain

4. Path

5. Query parameters

6. Fragment identifier

The Function of a Web Browser:

1. Requesting Web Pages: The web browser sends requests to web servers to fetch specific web pages or resources (such as images, videos, and stylesheets) associated with those pages.

2. Rendering Web Pages: Once the web browser receives the requested content from the server, it interprets and renders the HTML, CSS, and JavaScript code to display the web page's content and structure.

3. Supporting Multimedia: Web browsers are capable of handling various multimedia elements, such as images, audio, and video, allowing users to experience a rich and interactive web environment.

4. Managing History and Bookmarks: Web browsers keep track of the browsing history, allowing users to revisit previously visited sites. They also provide features to bookmark and save favorite websites for quick access.

Main Components of a Web Address (URL):

A web address, also known as a URL (Uniform Resource Locator), is the unique address used to identify a specific web page or resource on the internet. It consists of several components:

1. Protocol: The protocol is the method used to access the resource.

2. Domain: The domain is the address of the website or server hosting the resource. It is typically the main part of the URL.

3. Subdomain (Optional): Subdomains are prefixes added before the main domain.

4. Path: The path specifies the location of the specific resource on the server. It may include directories and filenames.

5. Query Parameters (Optional): Query parameters are additional data passed to the web server for processing.

6. Fragment Identifier (Optional): The fragment identifier is used to specify a specific section or anchor within a web page.

Learn more about Web here:

https://brainly.com/question/27961981

#SPJ6

can some one please help

Answers

Answer: It probably will cost a lot of money

Explanation:

answer this now
and thanks

Answers

Answer:

the process of burning something

Answer:

Option D) the process of burning something

Explanation:

Combustion, or burning, is a high-temperature exothermic redox chemical reaction between a fuel and an oxidant, usually atmospheric oxygen, that produces oxidized, often gaseous products, in a mixture termed as smoke. 

How does entertainment relate to coding?

Answers

Answer:

not sure if this is the type of answer you're looking for but: Entertainment can relate to coding because in TV shows and movies, there is lots of editing. Especially with cartoons. Inorder to make these, we have to use coding. This can even relate to real life plays and preformenses depending on how much technology you use to preform them.

The type of medium used to hide data in steganography is referred to as __________. This may be a photo, video, sound file, or Voice over IP, for example.

Answers

Answer:

:L

Explanation:

Answer:

symmetric cryptography

Explanation:

Eli needs to export files from his mailbox into a single file that is portable and can be backed up to removable media. Which file type will he use?

Answers

Answer:

PST

Resource:

This question has already been answered here: https://brainly.com/question/18415952

Explanation:

PST is the personal storage table, which is a file built by Microsoft to store data from outlook and other services too.  Really quick, this may or may not be an option that you are looking for but, what I would do in my opinion would be to use the PST and export it on a removable USB, since USBs are removeable media.

What is a letter that is written by someone you know and is used by a college during the application process?

Answers

Letters of recommendation.

Answer:

Letters of recommedation ..

Explanation:

help plz (will give brainliest)

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

This is the python program in the question that is:

def sum(n1,n2):

n=n1+n2

return n

The question is: write a function CALL that displays the return value on the screen.

So, the correct program is written below:

*********************************************************************  

def sum(n1,n2):# it is function that define sum

 n=n1+n2 # variable n that store the result of n1 and n2

 return n # return the result

print(sum(3,5))# call the sum function with parameter 3 and 5 , it will print 8

print(sum(4,101))

# call the sum function with parameter 4 and 101 it will print 105

********************************************************************************

you can also store the sum result into another variable, because this function return the sum. So, you can store that return value into another vairable and using the print function, to print the value of this variable such as:

*****************************************************************************

def sum(n1,n2):# it is function that define sum

n=n1+n2 # variable n that store the result of n1 and n2

return n # return the result

result= sum(6,9) # store the sum result into another variable i.e result

print(result)# print the result variable value

*****************************************************************************

Which of the following is NOT true regarding fonts which should be used in memos?
O Typically serif fonts are used such as Times New Roman
O Typically sans-serif fonts are used such as Arial
O Headers should be 12-point font size
O Body text should be 10-point font size

Answers

Answer: Typically serif fonts are used such as Times New Roman.

Explanation: Have a gr8t day and pls mark me brainliest.

Which visual novels do you recommend and why?

Answers

Answer:

I rec recommend Fate/Stay Night. It's honestly so good!

Explanation:

Why would it be useful to split up the coding for creating an app between multiple programmers? Select 2 options.

greater innovation

greater control over the code.

faster development.

greater consistency between sections of code.

Answers

Answer: c

Explanation:

Answer:

I'd be willing to wager it is A and D but not 100% sure.

Explanation:

just hellllllp me plzzzzzzzzzzzzz

Answers

it should increase the amount of thrust

Answer:

It is C.

Explanation:

Hope this helped have an amazing day!

If you got band from a local library, what would be the reason for it besides shouting and talking? You're answer has to fit you're personality?

Answers

Answer:

I would get a band from the library because I check out ten books and returned them in a week. I also would just be in the library all the time and they would get frustrated. That or I would spend hours talking to a librarian about my favorite books and they would get fed up with me.

what do you understand by the term "Artificial Intelligence "?​

Answers

Answer:

Artificial Intelligence (AI) is the branch of computer sciences that emphasizes the development of intelligence machines, thinking and working like humans. For example, speech recognition, problem-solving, learning and planning.

What is the purpose of slicing?

a. To combine characters in order to form a single string
b. To combine two or more strings into one big string
c. To pull out a group of characters from a string
d. To pull out one specific character from a string

Answers

Answer:

C

Explanation:

Because a and b are talking about combining and when you slice you don't combine when you slice and when you slice something its into 2 or more parts, unlike what d says

Other Questions
I need help pls help the girl out pls help me :( 6th grade math i mark as brainliest A computer store buys a computer system at a cost of 357.60$. The selling price was first at 596$ , but then the store advertised a 40% markdown on the system. Answer parts a and b. 1. Why do you think the author told the story of the Holocaust in this symbolic way? Who is this story directed to?2. Why do you think the Terrible Things take away the animals one group at a time?3. In an allegory, people, places, and events are used as symbols. What can the clearing in the woods stand for? What about the different animals? The Terrible Things?4. What kind of excuses do the other animals offer to explain the fate of each group as it is taken away? How do these reactions help the Terrible Things?5. How are the Terrible Things described? What verbs are used to describe their actions? How do the descriptions affect your feelings about the Terrible Things?6. During the Holocaust, terrible things were done by real people, people with faces, names, and life histories. Why do you think the author shows the Terrible Things as anonymous?7. What choices do the animals in the clearing have when the Terrible Things come?8. What would you say to Big Rabbits statement, We are the White Rabbits. It couldnt happen to us?9. When the Terrible Things come for the rabbits, what do the rabbits do? What choice does Little Rabbit make? Why? What does this tell you about the Terrible Things?10. Little Rabbit hopes someone will listen to him. Why might no one listen?in Terrible Things Which of the following phrases BEST describes structured exercise? A. flexible, changing B. intense, competitive C. organized, follows a pattern D. competitive, flexible Over the summer, for every 12 okra seeds Dana planted, 7 grew into plants. If he planted 144 okra seeds, how many grew into plants?A. 69B. 84C. 139D. 247 Pls Pls Pls help me!!!Label the virus pictured below. Solve the system of equations. 3 x + 2 y = 56 5 x 2 y = 24 3x+2y=56 5x2y=24 please help asap i dont understand at all Read Marias brainstorming table.Beginning: My cat escaped the house when a window was left open. Middle: I searched everywhere for my cat and posted signs around my neighborhood. End: After a few days, I found my cat waiting for me on the porch after school.Which sentence would best introduce this series of events in a descriptive narrative?My dad drove me to the office supply store so I could make copies of the Lost Cat poster with my cats photograph on it.There was my cat, sitting by the door licking her paws.One hot summer day, my cat pushed the screen out from an open window and snuck out into the big outside world. My cat got lost one day by jumping out of an open window. help me figure out the icons numbers plzzz In 2010, Isaiah paid $6,910 in federal income tax. In 2011, he paid $8,292. What is the percent of increase in the amount paid? The cost of producing a smartphone is $42.73 per phone. Additionally, the smartphone company pays a flat rate of $175 to ship each store's order. Write an equation to model the costs for the smartphone company, y, to produce x number of smartphones and ship them to one store. help please A __ consists of wires connecting the CPU and other parts of the computer. The __ transfers the data between the CPU and the memory unit. Please hurry, best answer gets brainly PLS HELP What is the y-intercept of the linear function Y= 2/3 x + 1 is it -2 21-1 Briefly describe the three hypotheses formulated by 19th Century-evolutionists in an effort to explain the origin of human language. You people do be catfishing tho In a baseball game, Elena scored twice many pints as Tyler.Tyler scored four points fewer than Noah, and Noah scored three times as many points as Mai. If Mai scores 5 points, how many did Elena scored? Prompt1. What does Alice think of Humpty Dumpty?2. What has the King promised Humpty Dumpty if he falls?3. Alice asks why Humpty Dumpty sits there all alone, what does he say?4. What is the proper way to serve a lookingglass cake? How does this relate to the looking glass world as a wholo?5. In this chapter, the King talks about an animal twice. This is the same animal mentioned earlier in the book. What is it?