1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zepler [3.9K]
3 years ago
12

You need to attach an rj45 connector to the end of a cat 6 utp cable. which tool should you use

Computers and Technology
1 answer:
Marat540 [252]3 years ago
7 0
Punching tools. Which cut your cable. and adjust your rj 45 connector.
You might be interested in
Application area of word processor?​
kompoz [17]

Answer:

  1. Typing, editing,and printing different types of document .
  2. Formatting text, paragraph , pages for making attractive document .
  3. Checking spelling and grammar of document for making it error free.
  4. Inserting and editing pictures , objects, etc.
  5. Adding watermark , charts , quick flip, etc.
7 0
3 years ago
Read 2 more answers
If you Buy my group clothing in R.o.b.l.o.x for a donation i will make you brainliest
erastova [34]

Answer:kk ima do it

Explanation:

7 0
3 years ago
Read 2 more answers
A security system uses sensors at every door and window which will set off an alarm if any one of them is opened. There is also
AnnyKZ [126]
You have a raspberry pi connected to all the sensors and a code running to  trigger if the sensors are triggered. Each sensor and keypad would run to a different input on the pi. They should al be able to be powered with a single cell lipo. Is that what you are asking?
5 0
3 years ago
Several users on the second floor of your company's building are reporting that the network is down. you go to the second floor
Svetllana [295]

Answer:

Question users

Explanation:

Q:

Several users on the second floor of your company's building are reporting that the network …

A. Establish a plan of action

B. Question users...

A:

B. Question users

8 0
2 years ago
What port is utilized by secure imap (imaps?
DedPeter [7]
TCP port used for SSL Secured.
8 0
3 years ago
Other questions:
  • Identifying the problem is crucial when trying to solve a problem. There are several techniques that you can use to aide you in
    5·1 answer
  • In which scenario would instant messaging be more useful than other forms of communication?
    10·1 answer
  • Is the cell phone changing our views about polite and impolite behavior? For example,
    15·2 answers
  • The process of searching for a special pattern of symbols within a larger collection of information is called pattern ____.
    12·1 answer
  • Can you please answer these questions for me: Is it illegal to copyright? What does it mean to get copyrighted? What are example
    12·2 answers
  • Write a C program that includes a function of type double called divemaster accepts two double arguments (you must write the div
    15·1 answer
  • [1] Our son has started playing organized T-ball, a beginner’s version of baseball. [2] “Organized” is what parents call it, any
    9·2 answers
  • Well the last week has been kind of terrible...
    9·2 answers
  • Nathaniel wanted to buy a microphone. He went to an electronics store and was told that there are actually two types of micropho
    13·2 answers
  • Which of these is an example of input?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!