1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
I am Lyosha [343]
3 years ago
6

Discuss advantages and disadvantages of Twisted Pair?

Computers and Technology
1 answer:
Contact [7]3 years ago
4 0

Answer:

Advantages of twisted pair are:

  • Twisted pair cable are ordinary copper wire used for communication and it is used to connect one system to another system like many private and business computer system with the telephone companies.
  • Basically, it is used to reduce the cross-talk and also the provide the high protection from the electrical interference.
  • It is easy to use but expensive as, it require proper grounding from both the ends.

Disadvantages of twisted pair are:

  • In twisted pair cable, there is poor noise immunity so that is why, it offer high signal distortion.
  • It offer lower bandwidth as compared to other cables or media.
  • Presence of security issue and it is easy to break so that is why it is less efficient.

You might be interested in
What is the decimal form of the following binary ip address? 11001101.00111001.10101001.01000010
jasenka [17]

The decimal form of the 11001101.00111001.10101001.01000010 binary ip address is 205.57.169.66.

An IP address is a binary number with 32 bits. The 32 bits are divided into four octets, which are groupings of 8 bits each. An IP address, however, is shown as a dotted decimal number (for example: 205.57. 32.9).

Memory regions are given binary addresses by the computer system. But in order to access a memory location, the system utilises a certain number of bits. We can address two memory regions with 1 bit. We can address 4 memory locations with 2 bits and 8 memory locations with 3 bits.

The 4 sets of 8 bits in each of the 4 directions are simply written down to create the 32-bit binary IP address.

Learn more about binary ip address:

brainly.com/question/14541891

#SPJ4

3 0
2 years ago
Which is the least technically experienced technical support group?
Nezavi [6.7K]

Answer:

Tier 1 support

Explanation:

Of the given options, tier 1 support technical group is the least experienced group. This group of technicians is also referred to as level 1 technical group.

The tier 1 or level support are made up of junior technician, and they have few technical understandings.

Their roles include email response and basic troubleshooting, attending to phone calls, among others.

When a problem cannot be solved by tier 1 support  technicians, they pass the problem to tier 2 support technicians,  

5 0
3 years ago
What dialogue box is used for character formatting?
valentinak56 [21]

Examples of character formats that can be applied to text characters in Word include those you find in the Font dialog box (such as bold, italic, underline, font, size, color, superscript, subscript, scaling, animation effects, etc), highlight, change case, etc. To apply a character format to a character or a set of characters, you need to specifically select the desired amount of characters and then apply the formatting you want.

5 0
3 years ago
Search engines enable you to
lord [1]
Search engines enable you to locate web pages related to a specific subject.
4 0
3 years ago
Read 2 more answers
One form of e-mail attack that is also a DoS attack is called a mail spoof, in which an attacker overwhelms the receiver with ex
GaryK [48]

Answer:

Email Bomb

Explanation:

According to my research on information technology, I can say that based on the information provided within the question the statement is False. The term being defined by the statement in the question is not called a mail spoof instead it is actually called an Email Bomb.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

5 0
4 years ago
Other questions:
  • I need help please <br> just plug in the words with their definitions.......
    10·2 answers
  • An expression using the logical operator ____ will evaluate to true when either of the compound conditions is true.
    6·1 answer
  • URGENT!! You decide not to use any recipes or information from the "Don't Be an Animal Murderer" Web site. What characteristic o
    7·2 answers
  • In the lan protocol architecture the _________ layer is responsible for detecting errors and discarding any frames that are in e
    13·1 answer
  • What's a good drawing tablet?
    12·2 answers
  • Does trend in computing important for organization management?​
    8·1 answer
  • Which of the following would not be stored in a cell ?
    14·1 answer
  • ((Sorry for the self promo btw) Can you guys help me try and get affiliate on twitch? I am currently at 20 followers and it woul
    10·2 answers
  • How to change your username in brainly​
    12·2 answers
  • A pcr-based method to detect a specific pathogen in a specimen works by amplifying a ________ that is specific to the prospected
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!