1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetradugi [14.3K]
3 years ago
14

You’ve been hired to help with installing cable at a new office building for the local branch of the Social Security Administrat

ion. You’re wiring a connection into the first room on your list. List the colors of the wires in the order you should place them into the connector, starting with pin 1.
Computers and Technology
1 answer:
Morgarella [4.7K]3 years ago
6 0

Answer:The arrangements are as follows:

Orangewhite color

Orange color

Greenwhite color

Blue color

Bluewhite color

Green color

Brownwhite color

Brown color

Explanation:

The will be put side by side in the order above and pushed into the connector. Thank you

You might be interested in
Need this answered quickly, 40 PTS!
drek231 [11]

Hello,


Answer: In 1965, Gordon Moore noticed that the number of transistors per square inch on integrated circuits had doubled every year since their invention. Moore's law predicts that this trend will continue into the foreseeable future. ... The 18-month mark is the current definition of Moore's law.


Please read and you will have your answer!


If you did not love this answer let me know and I will try again.



7 0
3 years ago
Read 2 more answers
The __________ certification program has added a number of concentrations that can demonstrate advanced knowledge beyond the bas
Sophie [7]

Answer:

CISSP

Explanation:

The CIDDP concentrations are an extension and development on the knowledge and credentials of the standard CISS certification that improves employability and career advancement

The CISSP concentrations includes

Information System Security Architecture Professional which can be known as ISSAP

Information System Security Engineering Professional which can be known as ISSEP

Information System Security Management Professional which can be known as ISSMP.

4 0
3 years ago
Jen's house contains the following devices:
poizon [28]

Answer:

Jen's laptop and her daughter's phone, because they are both connected to the router and turned on.

Explanation:

A network comprises of two or more interconnected devices such as computers, routers, switches, smartphones, tablets, etc. These interconnected devices avail users the ability to communicate and share documents with one another over the network.

Additionally, in order for a network to exist or be established, the devices must be turned (powered) on and interconnected either wirelessly or through a cable (wired) connection.

Hence, the computers which are currently networked are Jen's laptop and her daughter's phone, because they are both connected to the router and turned on. A smartphone is considered to be a computer because it receives data as an input and processes the input data into an output (information) that is useful to the end user.

6 0
2 years ago
If a numerical operation returns a number greater than the largest possible JavaScript value, it returns
Tasya [4]

Answer:

Infinity

Explanation:

If a numerical operation returns a number greater than the largest possible javascript value, it returns Infinity (POSITIVE_INFINITY for positive values).

The largest possible value that can be handled by javascript can be determined using the following code segment:

<script>

var x = Number.MAX_VALUE;

alert(x);

</script>

This returns a value 1.7976931348623157e+308 . So if the result of a numerical operation is larger than this, Infinity is returned.

6 0
3 years ago
What does software such as Bendix ACom allow the technician to perform on an ABS circuit?
denis-greek [22]
It allows the technician to modify it
5 0
3 years ago
Other questions:
  • A user states that when they power on their computer, they receive a "Non-bootable drive" error. The user works with external st
    8·1 answer
  • While in an interactive nslookup session, you'd use the ______ keyword to change the DNS server you're using
    5·2 answers
  • What is an example of a good URL?
    7·2 answers
  • The author of ""Cyber-psychopathy: What Goes On in a Hacker’s Head"" states that a crucial component of computer hacking lies in
    6·1 answer
  • What is the purpose of the Occupational Safety and Health Act?
    7·2 answers
  • Why is data processing done in computer
    10·1 answer
  • How did punch cards improve the weaving process?
    11·1 answer
  • What is social media ​
    13·2 answers
  • Which tool ia used to create the world wide web?
    15·1 answer
  • Can you exclude header rows from sort in excel?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!