answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
UkoKoshka [18]
2 years ago
10

Choose the person responsible for each innovation.

Computers and Technology
1 answer:
shepuryov [24]2 years ago
5 0

Answer:

John Blankenbaker

Explanation:

You might be interested in
If parties in a contract are not ____, the contract can be canceled.
Anastasy [175]
Agreed to all the terms mentioned in the contract
5 0
2 years ago
List at least six things you would check for if you were asked to evaluate the workspace of an employee for ergonomics
Evgen [1.6K]

Assessing the risk that surrounds stationary work of employees spending hours at their stations is essential. Below is a list of fundamental ergonomic principles that help identify ergonomic risk factors.


<span>1.       </span>Are the employees maintained in a neutral posture?

<span>2.       </span>Does the stationery allow for movement and stretching?

<span>3.       </span>Is there adequate lighting?

<span>4.       </span>Are chairs adequately adjustable?

<span>5.       </span>Are there appropriate foot rest?

<span>6.       </span>Is there extra storage for better desk organization?






0 0
2 years ago
Which word in brackets is most opposite to the word in capitals? PROSCRIBE (allow, stifle, promote, verify)​
Sunny_sXe [5.5K]

the answer would be stifle

7 0
2 years ago
Read 2 more answers
Access to sensitive or restricted information is controlled describes which of the key communications and information systems pr
Viktor [21]

Answer:

C: Security

Explanation:

Communications and information systems principles need to be, among other things, secure. They need to be able to protect sensitive information from those who intentionally not need to know. Some incident information like voice, networks, and data, are very sensitive and thus, should be secure to the right levels and should comply with privacy laws and data protection.

4 0
2 years ago
Nathan wants to make the quotation stand out further. Which order of steps does he need to follow to do this task?
Alina [70]

Answer:

B.

Explanation:

Go to the Borders and Shading option, click the Shading tab, and click the color under the Fill option.

5 0
2 years ago
Read 2 more answers
Other questions:
  • bill and melinda have two young children ages 2 and 4 and they are not covered under any life insurance policy. Melinda is full
    8·1 answer
  • The final step of the DHCP Discovery process is known as...
    8·1 answer
  • A class car and its subclass bmw each have a method run(), which was written by the developer as part of the class definition. i
    10·1 answer
  • RFID tags are used in secure environments primarily due to the fact they are impossible to counterfeit.
    5·1 answer
  • Develop an sec (single error correction) code for a 16-bit data word. generate the code for the data word 0101000000111001. show
    7·2 answers
  • You need to design a data storage scheme for Hayseed Heaven library data system. There are several hundred thousand large data r
    8·1 answer
  • The user interface contains two types of user input controls: TextInput, which accepts all characters and Numeric Input, which a
    11·1 answer
  • The maximum number of times the decrease key operation performed in Dijkstra's algorithm will be equal to ___________
    14·1 answer
  • Match the following technologies with their applications.
    9·1 answer
  • A chain of dry-cleaning outlets wants to improve its operations by using data from
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!