1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tomtit [17]
2 years ago
10

Barricades, vertical panels, drums, and cones in construction zones are known as__________ devices.

Computers and Technology
1 answer:
Whitepunk [10]2 years ago
6 0
<span>Barricades, vertical panels, drums, and cones in construction zones are known as channelizing devices. They a</span>re used in construction and maintenance work areas <span> to notify drivers or passengers of unusual or potentially dangerous conditions in or near work areas.
</span>A barricade is a portable or fixed device having from one to three rails with appropriate markings. It is used to control traffic by closing, restricting, or delineating all or a portion of the right-of-way.<span>Drums are most commonly used to channelize or delineate traffic flow but may also be used singly or in groups to mark specific locations.</span>
You might be interested in
Using language c, find the nth Fibonacci, knowing that nth Fibonacci is calculated by the following formula: - If n = 1 Or n = 2
Nina [5.8K]

Answer:

#include <stdio.h>

int fib(int n) {

 if (n <= 0) {

   return 0;

 }

 if (n <= 2) {

   return 1;

 }

 return fib(n-1) + fib(n-2);

}

int main(void) {

 for(int nr=0; nr<=20; nr++)

   printf("Fibonacci %d is %d\n", nr, fib(nr) );

 return 0;

}

Explanation:

The code is a literal translation of the definition using a recursive function.

The recursive function is not per se a very efficient one.

4 0
2 years ago
A device capable of copying a graphic, document, or other object is called a
Amiraneli [1.4K]
A printing press or printer
5 0
2 years ago
Read 2 more answers
Fuction table of JK-Flip flop?
vivado [14]

Answer:

Explanation:

The Truth Table for the JK Function. Then the JK flip-flop is basically an SR flip flop with feedback which enables only one of its two input terminals, either SET or RESET to be active at any one time thereby eliminating the invalid condition seen previously in the SR flip flop circuit.

6 0
2 years ago
In windows, a hamburger is an icon that, when clicked, displays a(n) _____________.
OleMash [197]
In windows, a hamburger is an icon that, when clicked, displays  three parallel horizontal lines. The hamburger button is a graphical shortcut placed typically in a top corner of the graphical user interface. It is used in small devices (smartphones for example) and the idea is to take less space. <span>The hamburger icon was originally designed by </span>Norm Cox<span> </span>
4 0
2 years ago
What method do phishing and spoofing scammers use
Leya [2.2K]

Answer:

please give me brainlist and follow

Explanation:

There are various phishing techniques used by attackers:

Installing a Trojan via a malicious email attachment or ad which will allow the intruder to exploit loopholes and obtain sensitive information. Spoofing the sender address in an email to appear as a reputable source and request sensitive information.

8 0
2 years ago
Other questions:
  • What tab must you click on to view any previously read messages from instructors in the message center?
    14·2 answers
  • A Python function cannot under normal circumstances reference a module variable for its value.
    12·2 answers
  • Mobile computing has two major characteristics that differentiate it from other forms of computing. What are these two character
    8·1 answer
  • How do you change the Background image or picture on Windows desktop?
    9·1 answer
  • Algorithm of how to calculate the area of a square.
    12·2 answers
  • In order to preview an attachment in an e-mail, click the attachment in the ______
    8·1 answer
  • In a black box model are the customers told that they should be expecting to be haxked?
    13·1 answer
  • Plzz help me with this question.........
    6·1 answer
  • Buying a home security system is an example of protecting your home against________.
    5·1 answer
  • Which of the following best describes the impact of Creative Commons?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!