1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vanyuwa [196]
4 years ago
7

Sarah needs to connect to an interface port on an enterprise switch. Her laptop does not have the correct port. When she mention

s this to her boss, he tells her that they have several older laptops in a closet and one of them should have a RS-232 connector for the enterprise switch. What does the connector that Sarah needs look like?
a. A 15 pin three row D-shaped connector
b. A 9 pin two row D-shaped male connector
c. A rectangle with a blue connection in the middle
d. A 6 pin round connector that is purple
Computers and Technology
2 answers:
Mashcka [7]4 years ago
4 0

Answer: the right option is b

Explanation:

RS232 was originally introduced in 1960 and it was used to transmit signals using a positive voltage for binary 0 and negative voltage for binary 1.

bogdanovich [222]4 years ago
4 0

Answer:

A 9 pin two row D-shaped male connector ( B )

Explanation:

A RS-232 connector is used for exchange of data between a personal/desktop computer and Modem as seen in the question an Enterprise switch which is a data communication equipment as well. the RS-232 uses a form of connection known as a serial connection to transfer/exchange data between connected equipment in bits.

The connection between the equipment is done using an RS-232 connecting cable were the port at the end of the connector is A 9 pin two row D-shaped female connector which is then connected to A 9 pin two row D-shaped male connector port found on both the personal computer and the data communication equipment

You might be interested in
Alison is having a hard time at work because her Inbox is flooded with emails every day. Some of these emails are unsolicited. S
miskamm [114]

Personally I just leave them in my inbox because who cares, Alison should; however, move them to the trash I guess

7 0
3 years ago
2. What is the MOST common experience LGBTQ+ individuals share when accessing medical trea
denis23 [38]

Answer:

true on the last one

Explanation:

4 0
3 years ago
Suppose that a main method encounters the statement t3.join(); Suppose that thread t3's run() method has completed running. What
Slav-nsk [51]

Answer:

C. The main method proceeds to the next statement following the t3.join(); statement

Explanation:

join() method allows the thread to wait for another thread and completes its execution. If the thread object is executing, then t3.join() will make that t is terminated before the program executes the instruction. Thread provides the method which allows one thread to another complete its execution. If t is a thread object then t.join() will make that t is terminated before the next instruction. There are three overloaded functions.

join()

join(long mills)

join(long millis, int Nanos)

If multiple threads call the join() methods, then overloading allows the programmer to specify the period. Join is dependent on the OS and will wait .

8 0
3 years ago
A typeface in which each character has the same width and is often used to display programming code is _
True [87]
The answer is monospace
6 0
4 years ago
How are a members details be checked and verified when they return to log back in to the website ?
aksik [14]

Answer:

When you sign into a website, you have to enter a password and username most of the time, which will allow the website to know that you have checked in and it is you, who is using your account.

6 0
3 years ago
Other questions:
  • Which piece of information is most useful to an identity thief? *
    6·1 answer
  • Which answer best describes an unsubsidized federal loan
    13·1 answer
  • Contextual targeting method mean
    11·1 answer
  • ???????????????????????​
    10·1 answer
  • Assume that the following variables have been defined in a program: int x = 10; int y = 20; int z = 30; Write a cout statement t
    11·1 answer
  • Describe the conventional method of data processing​
    12·2 answers
  • Given N lines of input, print the 3rd character from each line as a new line of output. It is guaranteed that each of the n line
    8·1 answer
  • Which is the fastest memory in computer​
    9·2 answers
  • 9.2.8 last names codehs
    10·1 answer
  • An embedded system describes computing technology that has been enclosed in protective shielding for security reasons. True or f
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!