Walk around your house and locate at least ten hazards. Classify them according to type. Explain why these things that you have identified or listed pose danger to the members of your family.

Answers

Answer 1

Answer:

1. Falls

2. Poisoning

3. Carbon Monoxide

4. Fire Hazards

5. Drowning

6. Choking

7. Sharp Objects

8. Stoves

9. Dishwashers

10. Suffocation

  Examples :

Walk Around Your House And Locate At Least Ten Hazards. Classify Them According To Type. Explain Why
Walk Around Your House And Locate At Least Ten Hazards. Classify Them According To Type. Explain Why
Walk Around Your House And Locate At Least Ten Hazards. Classify Them According To Type. Explain Why
Walk Around Your House And Locate At Least Ten Hazards. Classify Them According To Type. Explain Why
Walk Around Your House And Locate At Least Ten Hazards. Classify Them According To Type. Explain Why

Related Questions

A gap or weakness in a security program that allows a threat to find a way into the system is called a

Answers

vulnerability

hope this helped <3

If a report contains financial data that you want to analyze, you can export the report as a(n) _____ file.

Answers

Answer:

A CSV file is the correct answer.

What were the specifications of the first computer you owned?

Answers

Answer:

an

Explanation:

i owned a  acer aspire 1

Utility software, such as virus checker, screen saver, and security software, is usually installed on a PC ____.

Answers

Answer:

Operating System

Explanation:

The operating system is meant to run software.

Help pls I don’t exactly remember this L

Answers

Answer:

This is because when the codes are viewed by someone else or the code is getting too big, it gets confusing, hence it is easier if the ID has a meaningful name.

What is CPU known as in the computer?

Answers

Answer:

It is also known as the processor of the computer

Explanation:

The CPU is what retrieves and executes instructions, causing it to oftenly be referred to as processor.

Answer:

It is known as the brain of the computer

Explanation:

CPU stands for central process unit. It is responsible for processing the information to the computer just like how human brains process the information in their brains first then act. Thus, why CPU is known as the brain of the computer.

Hope this helps!

Write a method called distance that (1) accepts four integer coordinates: x1, y1, x2, y2 as parameters, (2) computes the distance between points (x1, y1) and (x2, y2) on the map, and (3) returns that distance.


The equation for the distance is: sqrt ((x2 - x1)2 + (y2 - y1)2).


Test out your program by writing a main method that calls the distance method for each of the following pairs of cities. Your main method should output the value returned by the distance method.


Distance from Baltimare to Manehattan =

Distance from Los Pegasus to Neighagra Falls =

Distance from the Badlands to Ponyville =


in python

Answers

Answer:

import math

def distance(x1, y1, x2, y2):

 return sqrt( (x2-x1)*2 + (y2-y1)*2 )

The processing language was developed to make programming more accessible to:

Answers

Answer:

creative and artistic people

Explanation:

The context here doesn't specify what exactly is the answer you require but if it matches the context which I'm understanding, then I hope this might be the correct answer

which tool would you use to configure the paging file location and size on a windows system?

Answers

Advanced System Settings in Control Panel.

In many cases, the software in the PCM's memory can be updated by uploading software updates, called a ________ process.

Answers

The process of electronically updating the software component of a PCM by transferring approved file to the PCM's memory is called reflashing.

The PCM is called the Powertrain Control Module influences the working operation of a system. Hence, through the process of reflashing, software updates could be installed on the PCM memory electronically.

This process is used in many Over - the - air software updates whereby vendor approved files are downloads and installed without having manually reconfigure the PCM.

Hence, the process is called reflashing.

Learn more : https://brainly.com/question/25576453

A design exhibits __________ when it uses newer styles in modern browsers while displaying a usable layout and all page content in older browsers.

Answers

Answer:

graceful degradation

Explanation:

If a city is experiencing very high temperatures, what action would allow the city to become cooler?

Answers

Answer:

Explanation:

1. Shut off the air conditioners.

2. Have a picnic at the nearest park in the shade.

3. Go swimming

4. Sleep outside.

one security component that doubles as a network component

Answers

Answer:

is the sentence above the question?

Answer:

It is to enter the site and then it will protect you in terms of form and appearance, and so on as required

Storage that is wiped clean when power is cut off from a device is known as _____. Question 24 options:

Answers

Answer:

Volatile memory

Explanation:

Storage that is wiped clean when power is cut off from a device is known as votatile memory

How electrical current manifests itself?

Thermal

Mechanic

Magnetic

Radiation (electromagnetic)

All listed

Answers

Answer:

Mechianic

Explanation:

Collecting data, interpreting information gleaned from a database, and preparing reports for senior management are tasks that are typically assigned to a ________.

Answers

Functions which include data collection, interpretation, report creation using information or collected data are assigned to the data analyst.

Data Analysts are often charged with the functions which has to do with collection, interpretation and reporting of information to superiors.

The analyst analyses collated information and reports the generated model or report to the senore management of the organization.

Hence, the missing phrase is Data analyst.

Learn more : https://brainly.com/question/25698028

The memory address that is saved by the system when a method is called and is the location to which the system should return after a method ends is known as the ________.

Answers

Answer:

Return point

Explanation:

Vector images generally do not permit fonts

True or False

Answers

Answer:

false

Explanation:

You can use fonts on a majority of programs

Wireless vulnerability assessment begins with the planning, scheduling, and notification of all Internet connections, and is usually performed on the organization's networks using every possible approach to penetration testing. a. True b. False

Answers

Wireless vulnerability assessment begins with the planning, scheduling, and notification of all Internet connections, and is usually performed on the organization's networks using every possible approach to penetration testing: B. False.

Vulnerability assessment can be defined as a systematic analysis and review of any form of security weakness in an information system (IS).

Hence, vulnerability assessment is used to determine if an information system (IS) is susceptible (prone) to attacks from users within and outside the network.

On a related note, wireless vulnerability assessment involves the analysis and review of a wireless network to verify its level of security.

Hence, it begins with planning and scheduling of the assessment of the organization's networks using every possible approach to penetration testing, at regular intervals.

However, you shouldn't notify all Internet connections when conducting a wireless vulnerability assessment because it defeats the aim and objective of security assessment.

Read more: https://brainly.com/question/24112967

What do you call applying and reconciling updates from various copies of a database with the master copy

Answers

Data can be replicated in different ways. The act of applying and reconciling updates from various copies of a database with the master copy is called synchronization.

Database synchronization is simply known as the ways of keeping data steadily between two or more databases. It is known to have all round spontaneous copying.

Data synchronization is therefore known as the synchronizing of data between two or more devices and keeping up with the new updates immediately between them to keep consistency within systems.

Conclusively, with synchronization, one can have all copies of data and their updates.

Learn more about synchronization from

https://brainly.com/question/25541016

Raina is putting finishing touches on her ph. D. Thesis report. She feels she should emphasize the keywords throughout the thesis. How can she do this in the word processor she is using?.

Answers

Raina can emphasize the keywords throughout the thesis by: Changing font size, style, and color of the keywords.

A word processor can be defined as a processing software application that is typically designed for typing and formatting text-based documents. Thus, it is an application software that avail end users the ability to type, format and save text-based documents such as .docx, .txt, and .doc files.

In Computers and Technology, some examples of a word processor include:

Microsoft WordNotepadSublime text

In this scenario, Raina should use the word processor to emphasize the keywords throughout the thesis by doing the following:

1. Changing font size.

2. Changing font style.

3. Changing font color for the keywords only.

For example, this formatting method is usually adopted by most expert tutors while answering questions on Brainly.

Read more on word processor here: https://brainly.com/question/24043728

A(n) ______ database is a huge database used to analyze transactions. a. object-oriented b. relational c. data warehouse d. distributed

Answers

Answer:

c. Data warehouse

Explanation:

Data warehouse is a system used for reporting and data analysis. As you need to analyze transactions, so that is the database that fits better for your case.

What are the top 10 most dangerous computer viruses ?

Answers

Answer:

MydoomSobigKlezILOVEYOUWannaCryZeusCode RedSlammerCryptoLockerSasser

Explanation:

CUAL ES LA FUNCION EN LA TECNOLOGIA ACTUAL, DE LAS TARJETAS DE DESARROLLO?

Answers

Las tarjetas de desarrollo juegan un papel fundamental en la tecnología actual, ya que son capaces de brindar seguridad y confidencialidad a la información contenida en la memoria, haciendo que los procesos sociales y organizacionales sean más sencillos y seguros.

Un circuito integrado de tarjeta es capaz de actuar como microprocesador, donde se ejecuta la lógica programada, con diversas aplicaciones como:

Tarjetas de control de accesoTarjetas de identificación de alta seguridadTarjeta de crédito

Por tanto, las tarjetas de desarrollo son capaces de almacenar información y proteger datos mediante cifrado, siendo un recurso que combina funcionalidad y seguridad para diversas capacidades técnicas y aplicaciones.

Aprende más aqui:

https://brainly.com/question/10571894

besides entering a url to go directly to a website, what else can you enter in a browser address bar to explore the internet?

Answers

Besides entering a URL to go directly to a website, what you can also enter in a browser address bar to explore the internet is an: IP address.

DNS is an acronym for domain name system and it can be defined as a naming database in which internet domain names or website URLs are stored and translated into their respective internet protocol (IP) address.

This ultimately implies that, a domain name system (DNS) is used to connect a uniform resource locator (URL) or a web address with its internet protocol (IP) address.

On a related note, you can either enter a uniform resource locator (URL) or an internet protocol (IP) address in a web browser address bar to explore the internet.

Read more: https://brainly.com/question/17273205

25POINTS
Bias in the development of computational artifacts often arises from _____.
SELECT 2 answeres

A. testing software

B. including outliers

C. conscious bias

D. unconscious stereotyping

E. accurate data

Answers

Answer:

the answer would be A

Explanation:

Answer: unconscious stereotyping & conscious bias

Explanation: have a good day/ night <3!

According to Chargaff's data, ________ must pair with ________, and ________ must pair with ________.

Answers

The Chargaff's rule state that in DNA, equality often exist in quantity between the bases A and T and between the bases G and C. According to Chargaff's data, adenine must pair with thymine and guanine must pair with cytosine.

Chargaff's gave rules for the pairing of bases. The rule is made up of base pairs in the DNA double helix.

He stated that there is a relation of A with T. The Pyrimidine Thymine (T) will always pairs with the Purine Adenine (A)

and also there is a relation of C with G and thus the Purine Guanine (G) always pair with the Pyrimidine Cytosine (C)

Erwin Chargaff was an Austrian-American biochemist. He lived from 1905-2002. It was at Columbia University that he discovered this rule.

Learn more from

https://brainly.com/question/22955213

Write the function prototype for a void function named getSquare. It should accept a pointer to an integer as an argument.

Answers

Answer:

void getSquare(int*);

Explanation:

The void is because it does not return a value.

Next is the name of the function "getSquare".

Then inside the ( ) you add the data types you want the function to accept, in this case its int*.

Finally you end with a ; because it is a function prototype.

___refers to the process of software using the data in an image to determine what
color a pixel should be when the user enlarges the image.

A) Feathering

B) Layering

C) Interpolation

D) Magnification

Answers

Answer:

C Interpolation

Explanation:

interpolation uses previously known data to guess unknown data. so if you went to paint.net, took a small image and resized it humongously, it uses interpolation to guess the rest of the image (but not really guess since it uses preexisting data)

magnification doesnt really determine what color a pixel should be, instead it should already know to resize accordingly

but your teacher could have the answer as D as a technicality. its really confusing without knowing which textbook you are using

To participate in a video conference, what additional equipment do you need attached to your computer

Answers

Answer:

you need a mic, and head phones

Explanation:

you need a mic so you may speak with others, and headphones to hear them and so you wont distrub others

Other Questions
Graph y + 1 = -3/5(x + 5) How does a bond sale by the Fed affect the money supply?It does not affect the money supply.The sale decreases the money supply.The sale increases the money supply.The sale increases the money supply but not in the proportion that the multiplier effect would suggest. (n+8)+(n-12)Find the sum a 36 oz. container of punch costs 2.99 and a 48 oz. container costs $3.75 which is the better buy Which of the following was a characteristic of Indian cities Marcos and his sister Yvette record their age each year in an annual scrapbook. The table below shows their recorded ages for the past three years.Which equation correctly shows the relationship between Marcos's age, m, and Yvette's age, y? in a hypothesis test, if the computed p-value is less than 0.001, there is very strong evidence to Determine the energy conversion for the following: a. Light bulb b. Firework c.flute d. Leaf Cmo se dice en ingls qu haces de bueno One goal of themen and women.movement was to ensure economic equality betweenA. LGBTQB. disability rightsC. feministD. Chicano A sample of 10.5 g of nitrogen reacts with 20.2 g of hydrogen to produce ammonia.3H2 (g) + N2 (g) 2NH3 (g)I need help answering these questions Why did the author write time to graduate from electoral college Segn el artculo, qu se espera de esta tec-nologa en el futuro?(A) Se podr adherir a otros objetos.(B) Ayudar a mejorar la escritura.(C) Ser mucho ms precisa.(D) Podr adaptarse a otros aparatos.Actividades 8 Select all of the coordinate pairs that are solutions to the equation: 3xy=111. (1,14)2. (4,4)3. (7,9)4. (5,4)5. (8,13) Which innovation specifically reduces nitrogen oxide from vehicle emissions? Catalytic converters Transmission clutches Engine injections Diesel filters One of the following substances is neither a good conductor of electricity nor an insulator. This substance isa.keroseneb.airc.alcohol d.petrol(pls give answer fast) The Industrial Revolution saw the setting up of many factories. lmagine you are one of the child workers shown in the photographThe Industrial Revolution saw the setting up of many factories. lmagine you are one of the child workers shown in the photograph 4. The limits of the court's authority t+9.35=12 1/4 helppppppp the arithmetic sequence x , x , -3 , 2x what is the value of x