1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
I am Lyosha [343]
3 years ago
6

Discuss advantages and disadvantages of Twisted Pair?

Computers and Technology
1 answer:
Contact [7]3 years ago
4 0

Answer:

Advantages of twisted pair are:

  • Twisted pair cable are ordinary copper wire used for communication and it is used to connect one system to another system like many private and business computer system with the telephone companies.
  • Basically, it is used to reduce the cross-talk and also the provide the high protection from the electrical interference.
  • It is easy to use but expensive as, it require proper grounding from both the ends.

Disadvantages of twisted pair are:

  • In twisted pair cable, there is poor noise immunity so that is why, it offer high signal distortion.
  • It offer lower bandwidth as compared to other cables or media.
  • Presence of security issue and it is easy to break so that is why it is less efficient.

You might be interested in
What udp port is used for i k e traffic from vpn client to server?
Reil [10]
<span>Ports are used to distinguish among multiple destination processes in a single host computer.</span>
UDP (User Datagram Protocol)<span> port 500 is used for i k e traffic from VPN client to server.
</span><span>This port is used during the establishment of secure VPN tunnels.
</span>
6 0
3 years ago
What does a companys code of ehtics cover
Stolb23 [73]
A code of ethics and professional conduct outlines the ethical principles that govern decisions and behavior at a company or organization. They give general outlines of how employees should behave, as well as specific guidance for handling issues like harassment, safety, and conflicts of interest.
4 0
2 years ago
Read 2 more answers
What is the best programming language
pashok25 [27]

Answer:

Ther are 8 best programming language :

• Javascript

• Swift

• Scala

• Go

• Python

• Elm

• Ruby

• C#

4 0
3 years ago
A Uniform Resource Locator (URL) consists of three separate parts: network protocol, host, and web browser.
FrozenT [24]
That is false. are you doing it on a computer course.                                             <span />
3 0
3 years ago
Read 2 more answers
A user has a network device that streams media to the LAN. The device is visible on the network. All PCs on the LAN can ping the
trasher [3.6K]

Answer: A. Multicast

Explanation:

Here we are given a situation where it is necessary for the device to stream media to all the PCs connected across the LAN. But as the they are unable to stream the media then it is a problem in the multicast TCP/Ip technology.

Multicasting enables to transfer information or messages from one to many or many to many. Here as a single device is responsible for streaming the content to other PCs across the LAN, therefore it is necessary that multicast has been properly implemented.

Option B is incorrect as it is not a scenario of broadcast as in broadcasting all the receivers must get the streaming however here if a PC does not want to receive the media stream it cannot receive for which multicasting is required.

Option C is incorrect as here we are not talking of one to one communication.

Option D is incorrect as here we cannot have more than one route to send the media content except the LAN.

5 0
3 years ago
Other questions:
  • Write a full class definition for a class named Averager, and containing the following members:______An data member named sum of
    6·2 answers
  • All ofthe following are correct EXCEPT one option when it comes towriting disappointing news letters. Identify theexception.
    6·1 answer
  • This term describes two or more arrays that hold related data, and the related elements in each array are accessed with a common
    15·1 answer
  • Moving laterally within a network once an initial exploit is used to gain persistent access for the purpose of establishing furt
    10·1 answer
  • How many bytes does a common processor require to represent an integer?
    7·1 answer
  • What is the code i need to do
    12·1 answer
  • Many bookstores have closed since the rise of the Internet. What type of
    11·1 answer
  • What is 3x10? PLZZZZZ
    11·1 answer
  • Which term best describes these lines?
    7·1 answer
  • What are foundations of any game systems that control what the players can or cannot do in the game, as well as the penalties, r
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!