1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tomtit [17]
3 years ago
10

Barricades, vertical panels, drums, and cones in construction zones are known as__________ devices.

Computers and Technology
1 answer:
Whitepunk [10]3 years ago
6 0
<span>Barricades, vertical panels, drums, and cones in construction zones are known as channelizing devices. They a</span>re used in construction and maintenance work areas <span> to notify drivers or passengers of unusual or potentially dangerous conditions in or near work areas.
</span>A barricade is a portable or fixed device having from one to three rails with appropriate markings. It is used to control traffic by closing, restricting, or delineating all or a portion of the right-of-way.<span>Drums are most commonly used to channelize or delineate traffic flow but may also be used singly or in groups to mark specific locations.</span>
You might be interested in
What is the purpose of a cover letter? Accompany a résumé to describe who you are and what you can do for the company Describe y
Vaselesa [24]

The answer is "Accompany a résumé to describe who you are and what you can do for the company". A cover letter should help sell you to the company, its information should tell them additional relivent information about you that may not be included on your resume.

8 0
3 years ago
____ is a technology used in WLAN in which sending and receiving devices have multiple antennas and transmit data over multiple
matrenka [14]

Answer:

multiple input multiple output (MIMO).

Explanation:

Electromagnetic waves is a propagating medium used in all communications device to transmit data (messages) from the device of the sender to the device of the receiver.

Generally, the most commonly used electromagnetic wave technology in telecommunications is radio waves.

Radio waves can be defined as an electromagnetic wave that has its frequency ranging from 30 GHz to 300 GHz and its wavelength between 1mm and 3000m. Therefore, radio waves are a series of repetitive valleys and peaks that are typically characterized of having the longest wavelength in the electromagnetic spectrum.

Basically, as a result of radio waves having long wavelengths, they are mainly used in long-distance communications such as the carriage and transmission of data.

In Radio transmission and Networking, multiple input multiple output (MIMO) is a type of technology used in a wireless local area network (WLAN), in which both the sending (transmitter) and receiving (receiver) network devices have multiple antennas and are able to transmit data over multiple streams in a bid (effort) to send data faster with little or fewer errors and gain knowledge of the communications channel.

7 0
3 years ago
What is a nonprofit organization that has assumed the responsibility for Internet Protocol (IP) address space allocation, protoc
Sloan [31]

Answer:

ICANN

Explanation:

The Internet Corporation for Assigned Names and Numbers (ICANN) is saddled with the responsibility of allocating IP addresses among other duties.

Cheers

6 0
4 years ago
Help me pleaseeee!
kenny6666 [7]

Answer:

Try checking around on the router!

Explanation:

Assuming they haven't changed it, most routers have their default password displayed somewhere on it. I hope this helps!! ^^

5 0
2 years ago
Read 2 more answers
Public static double secret(int first, double second)
gizmo_the_mogwai [7]

Answer:

d. double temp;

Explanation:

Given

The above code segment

Required

Which is not part of the method definition

The method in the above program is:

public static double secret(int first, double second)

Looking through the options, we can conclude that:

d. double temp;

..... is not a part of the method

6 0
3 years ago
Other questions:
  • Clicking the _____ opens the insert function dialog box shown in the accompanying figure.
    14·1 answer
  • In server-side discovery pattern, load balancing and routing of the request to the service instances are taken care of by the se
    9·1 answer
  • What is a fragmented disk?
    14·1 answer
  • What are the components inside the case typically draw power from a cable connected to the motherboard instead of being connecte
    6·2 answers
  • Public-key encryption schemes are secure only if the authenticity of the ___________ is assured.
    12·1 answer
  • What is the name of the process that weighs the alternatives, gathers all necessary information, and can ultimately lead you to
    9·2 answers
  • In what kind of attack can attackers make use of hundreds of thousands of computers under their control in an attack against a s
    7·2 answers
  • .
    5·1 answer
  • Why does your e-learning course need a title slide?
    10·2 answers
  • 7. Type the correct answer in the box. Spell all words correctly.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!