1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oxana [17]
3 years ago
9

You need to put cabling for connecting two new computers in a room, which did not have any network infrastructure. Because of th

e purpose of the room, you cannot mount cables on the floor. The walls are also inappropriate. The only way is to put cables above the ceiling tile. However, the ceiling is full of fluorescent lamps which cannot be removed or deactivated. You are worrying about the disruption of network signals by these lamps. What kind of cabling will you propose to the management, and why?
Computers and Technology
2 answers:
Ronch [10]3 years ago
4 0

Answer:

Coaxial Cable.

Explanation:

Coaxial cabling has a single copper conductor at its center. A plastic layer provides insulation between the center conductor and a braided metal shield. The metal shield helps to block any outside interference from fluorescent lights, motors, and other computers.

vredina [299]3 years ago
3 0

Answer: Twisted pair cabling in the shielded form can be used for the mentioned situation in the question

Explanation: Twisted pair cables in shielded form are easy to make a connection .It does not create lot of noise and has reduced cross talk .It is a low weighted cable and so it can be easily attached with the ceiling tile.

The maintenance of the complete cabling is not a issue and interference is also low that fulfills the requirement of disruption-less network signal.The overall costing of the cable is also less .Thus shielded twisted pair cable are the most appropriate cable for the mentioned situation.

You might be interested in
While using a web-based order form, an attacker enters an unusually large value in the Quantity field. The value he or she enter
Darina [25.2K]

Answer:

Implementing client side validation

Explanation:

Given that this type of attack is known as Integer Overflow, the best means or practices to prevent this kind of attack is " implementing client-side validation."

This is because implementing client-side validation assists to prevent the validation errors that will arise from the integer overflow thereby resulting in a reduction of the network and server load.

Hence, in this case, the correct answer is "Implementing the client-side validation."

4 0
2 years ago
The Texas Department of Education has offices throughout the state covering more than 268,000 square miles. State documents are
notka56 [123]

Answer: WAN

Explanation:

3 0
2 years ago
someone please please help with this we have to make a sketch of a hydraulic spreader or cutter I chose the spreader now we have
AnnyKZ [126]

Answer:

heueururjrurh the best time to meet Vs t and get the use and may contain briy the best you had any y I have the same time ❤️ ry HR y regards Umesh he was a pleasure to have a great trip and u it

Explanation:

dgsisbsjdudb and I have a nice day best wishes for a few weeks back and I will send you an email from your NVR

8 0
3 years ago
Which component of service-oriented DSS can be defined as data that describes the meaning and structure of business data, as wel
Licemer1 [7]

Answer:

The correct answer to the following question will be Metadata Management.

Explanation:

The management of data about the other data is known as Metadata Management. When the data is generated, updated, deleted, created, metadata is generated.

Benefits of Metadata management:

  • To locate data for a person, the metadata management make it easier.
  • Project delivery become faster.
  • Maintain information of organization.

Hence, the Metadata Management will be the best suitable component which defined as the structure and meaning of business data.

4 0
3 years ago
A network administrator was told by the Chief Information Officer (CIO) to set up a new office with a network that has redundanc
balandron [24]

Answer:

"Mesh topology" is the correct answer.

Explanation:

  • A mesh topology seems to be a network configuration where there has been an interconnection between each hardware and communications system. This topology configuration allows the distribution of many of these signals, although one of the connexons starts going down.
  • This topology needs to connect each destination to any other end destination, thus creating a completely pointless channel.
3 0
3 years ago
Other questions:
  • When you park facing downhill and there is a curb, turn your wheels _____ the curb. When you park facing uphill and there is a c
    13·2 answers
  • Information permanently stored on a hard disk, diskette, cd-rom disk, or tape, is called ________ storage.
    8·1 answer
  • Which command is used to combine two or more cells together into one cell?
    14·2 answers
  • Ken is moving to a new city and considering whether he should rent or buy an apartment. what factors should he consider in his d
    5·1 answer
  • 2. Use inheritance to create a hierarchy of Exception classes -- EndOfSentenceException, PunctuationException, and CommaExceptio
    6·1 answer
  • What is WEB 1.0 to WEB3.0
    11·1 answer
  • How do optical discs store data? select one:
    15·1 answer
  • What connectionless protocols are implemented at the lower layers of the OSI model, what is usually used to acknowledge that the
    5·2 answers
  • Of the various trends affecting the advertising and promotion industry, _____________ offers an opportunity for advertisers to d
    9·1 answer
  • What is Japanese tradition?
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!