1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
swat32
3 years ago
14

Two technicians are discussing shielded cable. Technician A says that shielded wires are generally twisted in pairs to cancel th

e effect of electromagnetic interference. Technician B says that shielded cable can be replaced with regular straight wire once the vehicle is out of warranty. Who is correct?
Computers and Technology
1 answer:
Black_prince [1.1K]3 years ago
3 0

Technician A is Correct. So this is actually a question I just had come up in my IT-140 Networking Fundamentals class but as a matter of fact I also know this because I've worked as a Network Technician for many years now both as a salaried employee and as an Independent Contractor. The reason Technician A is correct is because, indeed Wires in a Shielded Twisted-Pair (STP) cable or even Unshielded Twisted-Pair (UTP) cable are intentionally made this way for two reasons: the expressed purpose of actually twisting the wires in the first place is to protect them from interference called "EMI" (as stated in the question, Electromagnetic Interference!), however they are also twisted this way because of a similar interference (and in most cases, classified as the same kind of disturbance) called RFI or Radio Frequency Interference. As a technician, one of my jobs was hanging Access points in ceilings, and a requirement of that particular job was to make sure that these cables (which in this case were Cat6 which is short for Category 6, the exact cable that is referred to in the question, because Category 6 cable is shielded) were not to be left laying on the ceiling tiles in the drop ceilings! The reason being is, the light fixtures have electricity running through them, and anything with electricity running to it gives off Electromagnetic Interference. So, again Technician A is correct but... I have to say this as a side note... it would be <em>completely</em> pointless and utterly time consuming to remove these cables and replace them with a straight wire <u>just</u> because the warranty expired on a vehicle. Besides... Straight Though Wire and Twisted Pair are used for two completely different things.

Hope this helps! If you'd like to fact check me, google "emi interference"

CJ

You might be interested in
If you are uploading files you plan to edit online, you will need to convert them to Google Drive format. T or F
Amiraneli [1.4K]

Answer:

save as a word document (.docx) to keep editing offline then copy and paste into the google doc

5 0
3 years ago
Which of the following is true of how packets are sent through the Internet?
astra-53 [7]

Answer:

It is A: Packet metadata is used to route and reassemble information travelling  through the internet.

Explanation:

Step 1: The Internet works by chopping data into chunks called packets. Each packet then moves through the network in a series of hops. Each packet hops to a local Internet service provider (ISP), a company that offers access to the network -- usually for a fee

Step 2: Entering the network

Each packet hops to a local Internet service provider (ISP), a company that offers access to the network -- usually for a fee.

Step 3: Taking flight

The next hop delivers the packet to a long-haul provider, one of the airlines of cyberspace that quickly carrying data across the world.

Step 4: BGP

These providers use the Border Gateway Protocol to find a route across the many individual networks that together form the Internet.

Step 5: Finding a route

This journey often takes several more hops, which are plotted out one by one as the data packet moves across the Internet.

Step 6: Bad information

For the system to work properly, the BGP information shared among routers cannot contain lies or errors that might cause a packet to go off track – or get lost altogether.

Last step: Arrival

The final hop takes a packet to the recipient, which reassembles all of the packets into a coherent message. A separate message goes back through the network confirming successful delivery.

8 0
3 years ago
Read 2 more answers
Olivia has developed a great presentation with a distinct purpose and excellent content. She delivered it in a workshop and got
Umnica [9.8K]

less time and depth is required for panel discussions

3 0
3 years ago
HIPAA protects which of the following kinds of data?
Gelneren [198K]
The answer is a i looked up the question and it says a
5 0
3 years ago
Read 2 more answers
Thegroup of technologies concerned with the capturing, processing and transmissionof information in the digital electronic form
lorasvet [3.4K]

Answer: Telecom engineering

Explanation:

As, the telecom engineering is the process of capturing, processing and transmission of information in the digital form. Basically, it is responsible for transmission of data by converting the analog signal into the digital form by using various optical fiber tools and electronic service system. It is the type electronic data exchanger by which information is transmitted by using cables or wires.

6 0
3 years ago
Other questions:
  • Which step of creating a financial budget involves listing the payroll, rental, and utility costs?
    10·2 answers
  • Using computer software, compare the 2016 year-to-date sales through February to the 2017 year-to-date sales through February fo
    15·1 answer
  • When projecting a presentation on a large screen, what should your minimum font size be?
    6·2 answers
  • What is sun and what does it do?
    12·2 answers
  • A(n) __________ is a server with the original copy of the data that others need.
    12·1 answer
  • The type of medium used to hide data in steganography is referred to as __________. This may be a photo, video, sound file, or V
    12·2 answers
  • Which member of the Jackson family was the spokesperson for the Psychic Friends Network.​
    7·1 answer
  • Read each of the following statements about Computer Science and explain why you think that statement is true.
    9·1 answer
  • Describe the five components of a computer
    6·1 answer
  • Your server runs in quadruple-channel memory mode. How many memory controllers are being used?.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!