You understand the different standards around cabling and how to terminate your own Ethernet cables. Let’s discuss the pros and cons of making your own cables versus buying premade cables.

Answers

Answer 1

Answer:

hi

Explanation:

because I am new gggg and I will be


Related Questions

True or false: Most Brainly users are saltier than the ocean. If false, explain why.

Answers

Explanation:

btw I'm not salty........

As part of the communication element, many websites use sophisticated computer programs called ______ which mimic human conversation using artificial intelligence.

Answers

Answer:

ai based learing i think

Explanation:

which shortcut keys can be used to duplicate a slide?

Answers

Answer:

Ctrl + D used to duplicate a slide

What is the difference between the ISO and the OSI?


The OSI created the ISO.

The ISO created the OSI.

The OSI exists one layer below the ISO.

The ISO exists one layer above the OSI.

Answers

The  difference between the ISO and the OSI is that ISO created the OSI. Option B is correct.

What is the difference between ISO and OSI?

ISO is an abbreviation for the International Organization for Standardization. This is known as an Open System Interconnection (OSI) model, or simply the OSI model.

The ISO-OSI model consists of seven layers. In a comprehensive communication system, it defines seven tiers or levels. ISO is an acronym for International Standards Organization, a multinational organization that works to standardize network communication protocols on a global scale. OSI (Open System Interconnection) is a networking communication paradigm developed by ISO.

The OSI Model includes a distinct layer for Data Link and Physical, but TCP/IP has a single Network Interface layer for both. Similarly, in OSI, there are Application, Presentation, and Session levels, which for TCP/IP are integrated into one layer (Application).

Therefore, option B is correct.

Learn more about ISO, refer to:

https://brainly.com/question/14957302

#SPJ2

Give at least five examples of both types of ciphers.? ​

Answers

Answer:

Examples include Porta cipher, Vigenere, Gronsfeld, Beaufort, Autokey, Running key cipher, and even ciphers such as Enigma. Polygraphic Substitution ciphers - groups of characters are replaced. Examples include Hill cipher, playfair, foursquare etc.

Explanation:

follow me please

what can present the results of large data analysis looking for patterns and relationships that monitor changes in variables over time?

Answers

Answer:

Infographics can present the results of large data analysis looking for patterns and relationships that monitor changes in variables over time.

Explanation:

A _________ attack is an attack on a computer system or network that causes a loss of service to users.

Answers

Answer: Denial of Service

Explanation:

the term is self-explanatory

A(n) _____ contains software components that are well documented and have a proven track record of working well together.

Answers

Considering the computer analysis, a Solution stack contains software components that are well documented and have a proven track record of working well together.

What is a Solution Stack?

Generally, a solution stack in computer science is a combination of different applications which function to solve the problem. The problems designed to solve may either be related or unrelated.

Different types of the solution stack

Various types of solution stacks are available in the computing world. Some of the solution stacks are:

Application stackServer stackStorage stackVirtualization stackWeb stack

Hence, in this case, it is concluded that the correct answer is "Solution stack."

Learn more about solution stack here: https://brainly.com/question/13480036

You have a Windows Vista workstation with a built-in network card. The card is intermittently malfunctioning. You install a USB network card and want to permanently disable the internal card to avoid any conflicts. Which administrative tool should you use

Answers

Answer:

Device Manager

Explanation:

try it yourself

press windows key + X

then click device manager

here you can right click anything and disable it

its easy its cake

have fun

Discovery of user requirements, existing system evaluation, and logical system design are part of the _____ phase of the Systems Development Life Cycle (SDLC).

Answers

Answer:

analysis

Explanation:

The Discovery of user requirements, existing system evaluation, and logical system design are part of the analysis phase of the Systems Development Life Cycle (SDLC).

What is the System Development Life cycle?

The systems development life cycle (SDLC) is a project management conceptual model that defines the processes involved in an information system development project, from early feasibility studies to application maintenance. SDLC is applicable to both technical and non-technical systems.

The phase of the system development life cycle whose parts involve the discovery of user requirements, existing system evaluation, and logical system design is the Analysis phase.

Hence, the phase is the Analysis Phase.

Learn more about the System Development Life cycle here:

https://brainly.com/question/28498601

#SPJ2

Which term refers to a very notable exception to the safeness of Bluetooth that was discovered by a security company called Armis and published in late 2017.

Answers

Bluetooth devices are widely used today. BlueBorne refers to a very notable exception to the safeness of Bluetooth that was discovered by a security company called Armis and published in late 2017.

BlueBorne is known to be an airborne attack vector that often makes use of Bluetooth to aid an attacker to breakthrough and take complete control over targeted devices.

The attack often do not need the targeted device to be paired to the attacker's device or even set to discoverable mode

Bluetooth devices are said to be not visible until they are manually set to discoverable mode.

Learn more from

https://brainly.com/question/13718919

You have production infrastructure sitting behind one DNS domain, and for disaster recovery purposes, you have parallel infrastructure on standby behind a second domain hosted in a second AWS region. Which routing policy will automate the switchover in the event of a failure in the production system

Answers

Answer:

Failover

Explanation:

A failover is required when one set of infrastructure fails then traffic is redirected to the second set of backup infrastructure.

File names should be limited to 144 characters.

true or false

Answers

Answer:

True.

Explanation:

For easier recalling of file names and quicker accessibility...

A cheerful teen willing to help,

who listens to "ROAR,"

stay salty...

The number represented by 20 hundreds blocks is 2,000. How many thousand
blocks represent the same number?

A 2000) b 20) c 2) d 1)

Answers

Answer:

2

Explanation:

First, divide 2000 by 20.

For your answer, you will get 100.

For the question, it asks that we replace the 100 by 1000.

So, what we will do is 2,000 divided by 1000 and we will get 2.

Therefore, 2 will be our answer.

-kiniwih426

large carriers like sprint, at&t, and xo communications exchange internet traffic freely at physical locations called ________.

Answers

The answer is Internet Exchange

__________ may be defined as the application of methods and means to ensure that test results are reliable and valid, and errors that may interfere with obtaining accurate test results are detected and eliminated.

Answers

Answer:

Quality assurance

Explanation:

Which of the following statements regarding animation in a slide use is true?

Question 3 options:

Animations occur automatically by default


An object can have up to three stacked animatios.


A slide can only have one animation


Animations occur On Click by default

Answers

Answer:

Animations occur automatically by default

What do you think is the best horror game BATIM FNAF or Baldi's Basics?

Answers

Answer:

FNAF

Explanation:

its goated

Answer:

fnaf

Explanation:

true or false computers in a LAN are most likely to be connected using infra red

Answers

Answer: false

Explanation:

What connection method eliminates the need to provide a bank user name and password after the initial setup process

Answers

Based on the internet and networking process, the connection method that eliminates the need to provide a bank user name and password after the initial setup process is known as "OAuth."

This is because OAuth is a type of connection that allows users not to provide their bank username and password after initial setup.

OAuth is a common internet protocol known as an open standard for access delegation.

OAuth is utilized on web applications to allow users to log in without passwords.

Hence, in this case, it is concluded that the correct answer is "OAuth."

Learn more here: https://brainly.com/question/17079128

Walk around your house and locate at least ten hazards. Classify them according to type. Explain why these things that you have identified or listed pose danger to the members of your family.

Answers

Answer:

1. Falls

2. Poisoning

3. Carbon Monoxide

4. Fire Hazards

5. Drowning

6. Choking

7. Sharp Objects

8. Stoves

9. Dishwashers

10. Suffocation

  Examples :

What will be the result of this line of code: print("I am amazing!")
a syntax error
a tool error
"I am amazing"
I am amazing

Answers

Answer:

I am amazing!

Explanation:

you forget this symbol ( ! )

Answer:

I´m pretty sure its I am Amazing. So D

Explanation:

¨I am amazing" is like you talking sarcastically.

I could be wrong, but this is my opinion. Do what you want with it and run I guess, haha.

2) A ________ uses electronic memory and has no motors or moving parts. A) mechanical hard drive B) solid-state drive C) Blu-ray disc D) digital video disc

Answers

Answer:

A.mechanical hard

Explanation:

brainliest me and follow ty

During an internship, a client requests that her database application be moved to a separate network drive. What kind of architecture is this an example of

Answers

Since the client requested that her database application be moved to a separate network drive, this an example of: Local network hosted.

In Computers and Technology, cloud computing refers to a type of computing that requires the use of the following shared computing resources over the internet:

Network (web) servers.Computer power.Cloud storage (data storage).  Software programs (applications).

A hosted software can be defined as a software program (application) that is installed, hosted and accessed by end users (clients) entirely from a remote  location, network drive or server.

Read more: https://brainly.com/question/18369405

Sometimes used in smaller business networks, employee ________ software is impractical for large networks because of the number of users and the potential for misuse.

Answers

Employee monitoring software is sometimes used in smaller business networks, but it is impractical for use in large business networks due to numerous users and the potential for misuse by these users.

An employee refers to an individual who is employed in a business organization by an employer of labor, so that he or she can perform specific tasks, duties or functions within the business organization while being paid an agreed amount of money as wages.

On a related note, an employee monitoring software can be defined as a software application (program) that is designed and developed for the surveillance of a workplace, in order to gather information about the locations and activities of the employees working in a particular business organization.

However, employee monitoring software are ideal or better suited for smaller business networks, but it is impractical for use in large business networks due to higher number of users and the potential for misuse by these users.

Read more: https://brainly.com/question/23986526


2. What is an operating system? Describe any three functions of
operating system.

Answers

Answer:What is an operating system?

An operating system is the most important software that runs on a computer. It manages the computer's memory and processes, as well as all of its software and hardware.

Tasks in the ________ phase of the systems development life cycle (SDLC) are to build and test system components, and to convert users to the new system. (1pts) Question 14 - Tasks in the ________ phase of the systems development life cycle (SDLC) are to build and test system components, and to convert users to the new system. system definition component design system maintenance system implementation

Answers

Answer:

system implementation

Explanation:

WORTH 15 POINTS
Yo, Quick question in the movie Into The Woods 2014 version. What character would you want to be in the movie. Give me a good reason too
DUE 11/17/2021 10:00 PM

LOOKING FOR PEOPLE WHO KNOW THE ANSWER.

Answers

Answer:

didnt watch it

Explanation:

i dont watch furry movies

A(n) __________ structure is a structure that causes a statement or a set of statements to execute repeatedly.

Answers

Answer:

you cant do anything with the start of the question unless you explained more about it

Explanation:

URGENT HTML5 can support videos and audio playback, but not 2D and 3D graphics.

A. True
B. False

Answers

Answer:

False I think.

Explanation:

Other Questions
PLEASE HELP ME!A barn silo, excluding the top, is a circular cylinder. The silo is 14 M in diameter and the height is 28 M Find the volume.Use 3.14 for Due in 30 mins!!Thank you! Simplify: 7p + 20 13q 4q 18 + 6p A. 13p + 17q 2 B. 13p 17q + 2 C. 3q + 38 D. 3q 6 please help me out ill give brainiest Need help thank you Answer the following question in 3-4 complete sentences.Name the piece of art above and its artist. What media did the artist choose for this piece and why? Which of the following is not a reason colleges ask applicants to submit a personalessay?to assess an applicant's academic qualificationsto learn something unique about an applicantto evaluate an applicant's writing skillsto determine whether an applicant would fit in Please help this is due by 1:50 20 points HELP!! PLEASE! Write a function rule for the given situation. Give both the algebraic rule and the function rule. Frank has a student loan of $55,780.This loan has a simple interest rate of9% per year. What is the amount ofinterest that Frank will be charged onthis loan at the end of one year? In the space below, explain how the Table Tools can be accessed what color is yellow someone help I appreciate it What is an interesting fact about yourself Make a rule: If you know the width, length, and mass of a boat, how can you calculate how deep it will sink in water why do humans dream? Asap help for Brainlist There are generally thought to be _____ naturally occurring emotions that are present from birth.A fourB. sevenC. threeD. tenPlease select the best answer from the choices providedBCD (Someone helps asap! Ill give brainliest) Read this excerpt from "The Lottery" by Shirley Jackson.Although the villagers had forgotten the ritual and lost the original black box, they still remembered to use stones. The pile of stones the boys had made earlier was ready; there were stones on the ground with the blowing scraps of paper that had come out of the box. Mrs. Delacroix selected a stone so large she had to pick it up with both hands and turned to Mrs. Dunbar. Come on, she said. Hurry up.Mrs. Dunbar had small stones in both hands, and she said, gasping for breath, I cant run at all. Youll have to go ahead and Ill catch up with you.The children had stones already, and someone gave little Davy Hutchinson a few pebbles.Tessie Hutchinson was in the center of a cleared space by now, and she held her hands out desperately as the villagers moved in on her. It isnt fair, she said. A stone hit her on the side of the head.Old Man Warner was saying, Come on, come on, every-one. Steve Adams was in the front of the crowd of villagers, with Mrs. Graves beside him.By the end of Shirley Jackson's "The Lottery," how does the contrast between the characters view of the lottery and that of readers' impact the story?A. Because the characters view the lottery as fun and enjoyable, while readers see it as disappointing, it adds humor to the story.B. Because the characters view the lottery as acceptable, while readers view it as horrific, it creates shock and suspense over Tessie's fate.C. Because the characters view the lottery as an important annual ritual, while readers view it as outdated and dull, it gives the story a soothing tone.D. Because the characters view the lottery as dangerous, while readers see it as exciting, it fuels confusion and outrage over Tessie's behavior. Solve this equation2x-3=7