1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
s2008m [1.1K]
3 years ago
11

A spiked collar that extends horizontally for up to 3 feet from the pole is an example of what kind of technology? and that no u

nauthorized person or malicious software has altered that data.
Computers and Technology
1 answer:
slega [8]3 years ago
3 0

This technology is known as an anti-climb collar.

Spiked collars are used to protect equipment mounted on poles like CCTV or in areas where you can easily climb a pole over a security fence. This technology offers a very simple and practical solution to protecting poles against thieves and vandals.

You might be interested in
In the cases of int, byte, long, short (In Java) Can you give the heirachy in ascending order?​
nadya68 [22]

Answer:

Byte Short Int Long

Explanation:

Byte's 8 bit, short's 16, int's 32, and long's 65.

4 0
3 years ago
Which extension is appropriate for Word document templates?
Ronch [10]

Answer:

<em><u>DOCX pretty sure</u></em>

<em><u /></em>

<em><u>hope that this helps :)</u></em>

<em></em>

5 0
3 years ago
Read 2 more answers
Write a program that continually prompts the user for an integer input until input is entered that is less than 0. Each input th
professor190 [17]

Answer:

Following are the program in the C++ Programming Language:

#include <iostream>//header file

using namespace std;//namespane

//set main method

int main() {  

int a[100]; //set integer type array variable

int value, i = 0; //set integer variables

cout<<"Enter less than 0 to exit:"<<endl; //message for exit

cout<<"Enter the integer numbers:"<<endl; //message to enter numbers

do{ //set do while

cin>>value; //get input from the user

a[i++] = value; //append elements in array

}while(value>=0);

i--;  

cout<<"\nArray are:"<<endl;//message for array

for(int k = 0;k<i;k++){ //set for loop

cout<<a[k]<<" "; //print array

}

return 0;

}

<u>Output</u>:

Enter less than 0 to exit:

Enter the integer numbers:

1

2

3

4

5

-1

Array are:

1 2 3 4 5

Explanation:

Here, we set the integer data type main method "main()" and inside it:

  • we set integer type array variable with index value 100.
  • we set two integer type variable "value" and "i" initialize value 0.
  • we set the do-while loop in which we get the input from the user and and append in the array and pass condition if the value is greater then equal to 0.
  • Finally, set for loop and print the elements of an array.

 

7 0
3 years ago
Which of the following is considered both an input and output peripheral? Keyboard, Microphone, Speaker, Touchscreen monitor
Aleks04 [339]
Touchscreen monitor.
6 0
3 years ago
Read 2 more answers
A barcode is a Select one: a. coded instruction needed to control computer hardware. b. confidential computer code required by H
kolezko [41]

A bar code is a  series of bars and spaces representing numbers or letters.

<h3><u>Explanation:</u></h3>

A method that is used for the purpose of representing a data in the form of a picture or image that can be easily understood by the machine. It consists of many lines that has different widths and spaces. They either represent the letter or a number. These are mainly used for the representation of data in the machine understandable format.

For example an UPC-A bar codes has 12 numbers. The numbering system is represented by the first digit. The manufacturer will be represented by the next five digits in it. The product will be represented by the five digits following it. Check digit is represented in the last digit.

5 0
3 years ago
Other questions:
  • Antivirus software installed to scan and monitor malware activities on a server or workstation would be identified as a ________
    8·1 answer
  • Keyboard question: <br> How do I make the 'congruent to' symbol on this keyboard?
    8·1 answer
  • Which is a common problem for inserting pictures into placeholders?
    10·1 answer
  • An organization is conducting a study to see if hazardous waste sites pose health risks for cancer or other conditions, such as
    12·1 answer
  • Please respond not with answer but with comment.
    12·1 answer
  • ________ is the general name for a security flaw in a program. Group of answer choices A security fault A virus Malware A vulner
    13·1 answer
  • Hosts on the Internet have ________ addresses. Group of answer choices both A and B neither A nor B IP data link
    13·1 answer
  • Write a short note on Ms - Excel...​..
    7·1 answer
  • Binary subtraction<br> Subtract (111) from (1000)
    8·1 answer
  • 1) Coding for Table in Html<br>​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!