1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vitek1552 [10]
3 years ago
14

"You are setting up a new subnetwork on an existing network. Management has asked that you use existing cabling that the company

has already purchased. However, you need to ensure that the cabling can be used on a 10BaseT network. What is the minimum category of UTP cable you can use?"
Computers and Technology
1 answer:
NemiM [27]3 years ago
7 0

Answer:

T10BASE-T networks require a minimum of Category 3 cable and connection hardware for proper operation.

Explanation:

The characteristics of this cable:

1. Complies with EIA / TIA - 568-B ISO / IEC 11801 Class C

2. 0.51 mm (24 AWG) solid copper conductor

3. PE (Polyethylene) insulation,

4. PVC outer cover,

5. no flame propagator and

6. self-extinguishing.

7. Twisted pair

8. SUITABLE FOR VOICE AND DATA INSTALLATIONS FROM 10Mbps to 16Mbps.

<u>It is suggested to buy the complete coil to change the wiring gradually. </u>

You might be interested in
A type of malicious code that appears to be a safe program but that actually has a hidden purpose is called a _____.
masha68 [24]

This is a trojan horse type of virus.

5 0
3 years ago
Read 2 more answers
True or False <br><br> Rootkits are only made by black-hat hackers.
andreyandreev [35.5K]

Answer:

True

Explanation:

Rootkits are malicious software that allows an unauthorized user to access a computer and restricted areas of software. Rootkits are difficult to detect on your computer because it may be able to subvert there that is intended to find it. Rootkits are created by Black-hat hackers to attack your computer and steal.

Rootkit tools:

1. Keyloggers

2. antivirus disablers

3. password stealers

4. banking credential stealers

5. bots for DDoS attacks

8 0
3 years ago
Which of the following is a benefit of a digital network?
k0ka [10]

Answer:

Multiple devices can be connected

8 0
3 years ago
What is mark in in premiere pro
Studentka2010 [4]
Markers are an often underutilized tool in the Premiere Pro CC toolbox. They are little colored tabs you can apply to both your timeline and your source clips to indicate important points in time with a color or note.
5 0
3 years ago
Survey data can be collected with questionnaires. Which type of question has a limited number of preselected responses?
nadya68 [22]
The answer to your problem is B
8 0
3 years ago
Other questions:
  • which of the following is true about both the cyber community and the real community like the one you live in,i will give 10 poi
    6·1 answer
  • If you are trying move a hard drive from a non-working computer to a working computer for the purposes of accessing the data on
    5·1 answer
  • When you right-click certain areas of the Word or other Office app windows, a command menu will appear. Group of answer choices
    13·1 answer
  • ________ is the process of translating a task into a series of commands that a computer will use to perform the task.
    5·1 answer
  • 1.How does inertia affect a person who is not wearing a seatbelt during a collision?
    10·1 answer
  • Help to how to write pseudo code to insert a new node to Binary Search Tree. Using C++.
    15·1 answer
  • 7.
    15·1 answer
  • Which of the following is NOT a data type in Python?<br> integer<br> decimal<br> string<br> float
    15·1 answer
  • In which of the following phases of filmmaking would a production team be focused on the process of casting?
    11·2 answers
  • How many 2/8 pound patties can she make from 7/8 of a pound of hamburger
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!