1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zepler [3.9K]
3 years ago
12

You need to attach an rj45 connector to the end of a cat 6 utp cable. which tool should you use

Computers and Technology
1 answer:
Marat540 [252]3 years ago
7 0
Punching tools. Which cut your cable. and adjust your rj 45 connector.
You might be interested in
In dynamic programming, the technique of storing the previously calculated values is called A. Saving value property B. Storing
Pani-rosa [81]

Answer:

C. Memoization

Explanation:

Given that Memoization is a computing strategy that is applied in storing the previously calculated values such that values can easily be recalled to execute similar problems or further problems. It is also used in making recurring algorithms productive

Hence, in this case, In dynamic programming, the technique of storing the previously calculated values is referred to as MEMOIZATION

4 0
3 years ago
I live in Pennsylvania which observes eastern standard time.
goldfiish [28.3K]

Answer:

mudar o horário de acordo com a vista

Explanation:

4 0
3 years ago
An attribute whose value uniquely identifies an object is called a(n) _______.​
Juliette [100K]
This is called a key attribute!

There are different types of key attributes!

Primary key is the key that is actually chosen, for example a social security number. 

There is also a unique key, say our finger prints! they also uniquely identify humans, but usually we prefer to use social security number when we list people (a unique key could be a primary key if we chose so)

We could also identify people by their social security number and a name, but this is unnecessary, as social security number already gives a full identification. Such a reduntant key is called super key. 
6 0
3 years ago
_____ allows you to use the internet for making phone calls instead of leasing traditional telephone lines from the phone compan
TEA [102]
Using a browser would help in doing that.
3 0
3 years ago
What are advantages and disadvantages of developing a more robust Internet of Things and continuing to add more smart nodes?
lubasha [3.4K]
Your stored entertainment files are more secure when connected to a home network.
6 0
4 years ago
Other questions:
  • When you are shopping online and finalizing your order, you usually fill in forms for your name, address, email, and payment met
    6·1 answer
  • Multiple systems try to send data at the same time. The electrical impulses sent across the cable interfere with each other. Wha
    15·1 answer
  • Privacy settings allow account owners to decide who can ........
    12·2 answers
  • Varun wants to start his own business. Suggest him at least four functions of an entrepreneur.
    8·2 answers
  • There are many modes of remote visual communication. which is the most common mode
    5·1 answer
  • Public class Student {
    14·1 answer
  • 2. Discuss CORBA functions<br><br>​
    6·2 answers
  • Is an automatic computer check to ensure that the data entered is sensible and reasonable.It does not check the accuracy of data
    7·1 answer
  • Which of the following is an algorithm?
    15·2 answers
  • to allow excel to change the cell references in a formula or function from row to row or column to column as you fill with it, y
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!