1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
makvit [3.9K]
3 years ago
11

What is an acceptable alternative to installing an audible backup alarm?

Computers and Technology
1 answer:
san4es73 [151]3 years ago
5 0
<span>One alternative is the use of an observer/signal person. Due to the piercing noise that is usually associated with audible back-up alarms and its noise intrusiveness to nearby residents, having an observer who signals to others of oncoming construction equipment will meet the same safety requirement as having an audible backup alarm</span>
You might be interested in
Materials that allow electricity to flow are called A) Metals B) Attractors C) Conductors D) Insulators
LUCKY_DIMON [66]

The answer to the blank space in the given question is (C) conductors.

Conductors are<em> objects that can be used to make electrical current or heat flow from the source to a target object.</em> Some objects are better conductors than others due to its materials. For example, objects made from metals are always better conductors than objects made from wood or glass.

5 0
3 years ago
Read 2 more answers
Style of music that originated in New Orleans in the early 1900s
Sever21 [200]

Answer:

jazz

Explanation:

7 0
3 years ago
Read 2 more answers
For your biology class, you have taken a number of measurements for A plant growth experiment. you wish to create a chart that s
Natasha2012 [34]
The answer is B, calc or excel
4 0
3 years ago
Write a function that converts a string into an int. Assume the int is between 10 and 99. Do not use the atoi() or the stoi() fu
Liula [17]

Answer:

Written in C++

#include <iostream>

#include <sstream>

using namespace std;

int main()  {

   string num;

   cout<<"Enter a number: ";

   cin>>num;

   stringstream sstream(num);

   int convertnum = 0;

   sstream >> convertnum;

   cout << "Output: " << convertnum;

}

Explanation:

Without using atoi() or stoi(), we can make use of a string stream and this is explained as follows:

This line declares a string variable num

   string num;

This line prompts user for input

   cout<<"Enter a number: ";

This line gets user input

   cin>>num;

This line declares a string stream variable, sstream

   stringstream sstream(num);

This line declares and initializes the output variable, convertnum to 0

   int convertnum = 0;

The stream is passed into the output variable, convertnum

   sstream >> convertnum;

This line displays the output

   cout << "Output: " << convertnum;

<em>Note that: if user enters a non integer character such as (alphabet, etc), only the integer part will be convert.</em>

<em>For instance,</em>

<em>40a will be outputted as 40</em>

6 0
3 years ago
Which sentence in the passage shows an effective way to protect your document from misuse? Claire has saved her research paper o
goblinko [34]

Answer: She sets an access password while saving the file. hope this helps!!!!

Explanation:

4 0
3 years ago
Other questions:
  • When you reboot your system, the computer follows start-up instructions stored in this type of memory. multiple choice dram sdra
    15·2 answers
  • Hen pointing to a tool on the ribbon, a ______ appears, displaying information about the tool.
    7·1 answer
  • What would make this comparison statement False? Complete with the appropriate relational operator. "G" _____= "G"
    10·1 answer
  • How many results are shown by default when using a Top or Rare Command?
    13·1 answer
  • In the following piece of css code what is the property ?
    9·1 answer
  • This folder is ndownload and it isn't like download file
    14·1 answer
  • Write a Java program that will 1. Ask the user to type in a sentence, using a JOptionPane.showInputDialog(). 2. The program will
    10·1 answer
  • What is the best definition of a network?
    14·2 answers
  • Which group scope can be used to assign permissions to resources only in the domain in which the group is created
    12·1 answer
  • One vulnerability that makes computers susceptible to walmare is:
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!