1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pie
3 years ago
10

A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The n

ew cabling was installed in the ceiling close to fluorescent lights and electrical equipment. Which two factors may interfere with the copper cabling and result in signal distortion and data corruption? (Choose two.)
A. EMI*
B. crosstalk
C. RFI*
D. signal attenuationextended length of cabling
Computers and Technology
1 answer:
MakcuM [25]3 years ago
3 0

A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The new cabling was installed in the ceiling close to fluorescent lights and electrical equipment

Two factors may interfere with the copper cabling and result in signal distortion and data corruption are :

EMI

RFI

Explanation:

  • EMI (electromagnetic interference) is the disruption of operation of an electronic device when it is in the vicinity of an electromagnetic field (EM field) in the radio frequency (RF) spectrum that is caused by another electronic device.
  • During EMC testing, radiated emissions measurements are made using a spectrum analyzer and or an EMI receiver and a suitable measuring antenna.
  • EMI (Electromagnetic Interference) is also called RFI (Radio Frequency Interference).
  • Conducted RFI is unwanted high frequencies that ride on the AC wave form. Radiated RFI is emitted through the air. There are many pieces of equipment that can generate RFI, variable frequency drives included.
  • The internal circuits of personal computers generate EM fields in the RF range.
You might be interested in
You are the network administrator for a company. The company's policy is that the users are allowed to set their own passwords b
insens350 [35]

After I have changed her password, all I will need to do is select the “User must change password at next logon” option. This option will prompt her to log on to her PC using the password I assigned to her.

Explanation

An active Directory on most Domain Controllers gives you access to add users, disable accounts, change password, and various other tasks. Assuming that everything is setup, I am just going to go to my Windows Server Manager dashboard of my Domain Controller. While I am at my dashboard, I will click on tools and then drop down to the Active Directory Users and Computers to locate my desired user who seems to have been locked out.

Once the user has been identified, I will simply need to right click on the account and select “reset password”. A small dialog box with a list of cool security options will pop up. I will be required to reset it to something simple and default and make sure to select the “User must change password at next logon” option.

What this means is that the user who is locked out, upon logging back in, will be prompted to enter the password I gave them first as default but then will immediately be asked to change the password to something new. We do not see options A and B a lot in the real world. It is best practice not to select these options

Learn more about Active Directory

brainly.com/question/13615178

brainly.com/question/13591643

#LearnWithBrainly

5 0
3 years ago
Why is special code needed for <?
IRINA_888 [86]
The guy above is right!!!
3 0
3 years ago
On the 80x86 CPU, the ESP register keeps track of the value on the top of the runtime stack.
Ronch [10]

Answer:

True

Explanation:

The ESP register acts as an indirect operand pointing to the top of the stack at any time.

Stack grows downwards from high memory when a program adds to the stack. However, when items are removed from the stack, it shrinks upwards from low to high memory.

The assembler reduces the stack pointer(ESP) register by 2, when a word value is pushed on to the stack. On the other hand, the assembler increases the stack pointer by 2 when a word value is popped off.

The assembler decreases or increases the ESP register by 4 when a double word value is pushed or popped off the stack respectively. Therefore the ESP register changes in multiples of 4.

8 0
3 years ago
Write an expression using membership operators that prints "Special number" if special_num is one of the special numbers stored
Mashcka [7]

Answer:

In python, the statement can be written as:

<em>if(special_num in special_list): print("Special Number") </em>

Explanation:

We need to create a list with the name 'special_list' with some values and then check whether special_num is in the list or not using the membership operator.

Membership operator in python: <em>in</em>

Let us do it step by step in python:

<em>special_list = ['1', '2', '3','4']      #</em>A list with the values 1, 2, 3 and 4

<em>special_num = input("Enter the number to be checked as special \t") </em>

<em>#</em>Taking the input from the user in the variable special_num.

<em>if(special_num </em><em>in</em><em> special_list): print("Special Number") </em>

#Using the membership operator <em>in </em>to check whether it exists in the list or not.

Please refer to the image attached for the execution of above program.

So, the answer is:

In python, the statement can be written as:

<em>if(special_num in special_list): print("Special Number") </em>

6 0
3 years ago
What are some legal issues that can arise from the use of all social media?
Salsk061 [2.6K]

Answer:

  1. Copyright
  2. Defamation
  3. Cyberbullying

Explanation:

The first issue, that I would like to explain is Copyright. If you are imposing as a company on Social Media with a real name that is Copyrighted, the company will file a DMCA takedown notice which is the Digital Millennium Copyright Act

. Which can result in your Social Media being taken down, or by getting a fine, sued or even jailtime.

The second issue is Defamation, what Defamation is basically spreading false information about a company / business in real or online that hurts a companies reputation. If you commit this crime online you can face a lawsuit or even jailtime for one year.

Thirdly, cyberbullying. This is illegal in most states in the US. Cyberbullying is a serious matter and depending on your states laws can be charged with criminal harassment.

Sources:

Quora: (Website)

Miclaw: (Website)

Statista: (Website)

7 0
3 years ago
Other questions:
  • Jose wants to be sure maintains a high credit score as he is planning yo buy a new car soon what should he do to ensure his scor
    13·2 answers
  • All queries have an explicit location. true of false
    13·2 answers
  • Lonnie has several workbooks that contain financial and sales data. He needs to ensure that if the data in a single cell in one
    5·1 answer
  • HELP FAST PLEASE!!! What is a glass tube containing electrodes used as a switch to produce on or off signals for the computer? F
    10·1 answer
  • A user wants to make sure he can quickly restore his computer after a drive failure to the state it was in when Windows and all
    9·1 answer
  • PLS HURRY!!!<br> Look at the image below!
    9·2 answers
  • Among your selection in different online interfaces, which are your top three favorites?​
    7·2 answers
  • How is binary used in pixels and in sound?
    5·2 answers
  • I hope The characters That I want in Mortal kombat 12 is Lori and peron That’s My character wishlist in The next Mortal kombat g
    12·2 answers
  • When working in outline mode, press __________ and click the eye icon to change only one layer back to preview mode.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!