1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sattari [20]
3 years ago
15

What type of cable is used to connect a workstation serial port to a cisco router console port?

Computers and Technology
1 answer:
butalik [34]3 years ago
6 0

a <span>Ethernet-<span>Cable is a how to put it together</span></span>

<span><span /></span>

You might be interested in
Why was the movable type of the printing press such a breakthrough for publishing?
guapka [62]
Movable type is not part of a printing press. Before movable type and printing presses, things had to be manually transcribed (copied by hand), which was  extremely expensive. The press mechanized copying, lowering it's cost and driving down the cost of reproduction.

Arguably, there wasn't any publishing before movable type and printing presses.
3 0
3 years ago
Read 2 more answers
A key physical design element is the ____, which describes how users interact with a computer system
Elis [28]
A key physical design element is the UI, which describes how are users interact with a computer system.
7 0
3 years ago
Write a function in Java to implement the following logic:
galben [10]

Answer:

Explanation:

The following Java code basically divides the goal size by 5 and rounds the answer to the lowest whole number. Then multiplies that answer by 5 and goes adding 1 until the exact goal size is met. If the value is passed then that means that using the current brick sizes it is not possible to make the goal. Otherwise, it will print out that it is possible.

import java.io.*;

import java.util.Scanner;

public class Main{

       public static void main(String args[]) throws IOException {

               String answer = "No, it is not possible";

               Scanner in = new Scanner(System.in);

               System.out.println("Enter goal size: ");

               float goalSize = in.nextFloat();

               float currentSize = (float) Math.floor(goalSize / 5);

               currentSize = currentSize * 5;

               while (true) {

                       if (currentSize < goalSize) {

                               currentSize += 1;

                       } else if(currentSize == goalSize) {

                               answer = "Yes, it is possible";

                               break;

                       } else {

                               break;

                       }

               }

               System.out.println(answer);

       }

8 0
3 years ago
Can you install Ubuntu on a hard drive by porting from the folder to the HDD?
Len [333]

No you can not. It will not allow you to

8 0
3 years ago
Many who enter the field of information security are technical professionals such as __________ who find themselves working on i
Fynjy0 [20]

Answer:

networking experts or systems administrators ,database administrators,programmers.

Explanation:

The people who enter in the field of information security are professionals in technical fields bu their work is totally into the field of security like working on security applications.They don't work on the traditional IT assignments such as developing software,apps,website etc.

3 0
3 years ago
Other questions:
  • Q3** Write a query to create a new price list for books written by the same author. Allow the user to enter only the first 4 let
    15·1 answer
  • Write a program that uses for loops to perform the following steps: Prompt the user to input two integers: firstNum and secondNu
    15·1 answer
  • When you set up a worksheet, you should use cell references in formulas whenever possible, rather than ____ values.
    11·1 answer
  • Which is an aspect of structural-level design?
    6·2 answers
  • WILL MARK CORRECT ANSWER AS BRAINLIEST PLSSSS HELP!
    13·2 answers
  • What is the difference between KE an PE
    8·1 answer
  • What legal protection would cover a person invention?
    10·2 answers
  • Can you move it like this? I can shake it like that
    6·1 answer
  • 4. When working at the CLI in Linux, you specify the exact location of a file, which is the ____________________ to it, by begin
    13·1 answer
  • The data _____ component of a database management system (DBMS) is used to create and maintain the data dictionary.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!