1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andreas93 [3]
3 years ago
10

You recently started working part-time in a retail store, and are learning about the reading devices your store uses. Your store

uses a bar code reader to process items during checkout. What type of technology does the bar code reader use
Computers and Technology
1 answer:
Pachacha [2.7K]3 years ago
5 0

Answer:

Laser beams

Explanation:

The laser beams technology is being used by bar code reader.

You might be interested in
What should you do to help prepare yourself for the delivery of your presentation? you can chose more then one
Lubov Fominskaja [6]
1 makes sense for somewhere you haven't been before. 2 could be interesting, but it's a bit superfluous if not required. 3 is the most important and essential. Some teachers don't want presenters to look at the board/read their slides word for word when they present, so it might be a good idea to have note cards instead.

Hope this helps!
4 0
3 years ago
Question # 18
borishaifa [10]

Answer:what qustoin

Explanation:sorry wala yung tanong

6 0
3 years ago
Several different tunneling protocols can be used in dial-up situations. Which of the following would best be used as a VPN tunn
melomori [17]

Answer:

The answer is the point - to -point protocol, which allows user to set a secure VPN connection for client and server connectivity.

Explanation:

A virtual private network is a private-public network because of encryption and tunneling to ensure the integrity of the data. VPN requires a tunnel to work and encryption.

In VPNs, there are different protocols can be used, such as point- to - Point Tunneling Protocol (PPTP), IPSec, and L2TP.

Point to Point Protocol is a Microsoft protocol which allows user to set a connection and secure VPN destination. Point to point protocol is designed for client and server connectivity. It developed a connection between two computers. The data link layer that transmits over IP networks is used for point to point tunneling.

Such as option A is not correct because it is distracter and IPSecis primary tunneling protocol. It supports only IP networks. L2TP is not a VPN but extend VPN over the various network.

3 0
4 years ago
Write a JAVA program to generate the list of prime numbers between 100 and 1000 ?
Svetllana [295]

First of all, we will need a function that checks if a number is prime or not:

boolean isPrime(int n){

 for(int i=2; i<=math.sqrt(n); i++){

   if(n % i == 0) return false;

 }

 return true;

}

Then, in the main program, we will call this function with all the desired inputs, and we will print the prime numbers:

for(int n=100; n<= 1000; n++){

 if(isPrime(n)) print(n);

}

6 0
3 years ago
Why is the binary number system used in digital logic?
Slav-nsk [51]
<span>Binary number system used in digital logic because of the simplest nature of its representation.</span>
8 0
3 years ago
Other questions:
  • After configuring a static IP address on a desktop computer, the technician finds that he cannot communicate with other devices
    10·1 answer
  • How could a system be designed to allow a choice of operating systems from which to boot? What would the bootstrap program need
    14·1 answer
  • A _______ is a shortcut to a web page saved in a list in the internet explorer desktop application.
    14·1 answer
  • Assembling parts and using various machines to create a final product is the process of ______.
    14·1 answer
  • Difference between primary key and foreign key
    12·1 answer
  • A quien se le conoce como el padre de la tecnologia?
    10·1 answer
  • Write any three type of looping structure with syntax​
    13·1 answer
  • What is another word for: a location in memory that contains a value?
    7·2 answers
  • Evaluate how suitable the hardware would be for:
    12·1 answer
  • The scope of a temporary table is limited to what?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!