1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vekshin1
3 years ago
10

Amy just added a 462 meter run of fiber optic cable to the network what should she do next?

Computers and Technology
1 answer:
andriy [413]3 years ago
6 0

Answer:

test it.

Explanation:

Based on the information provided within the question it can be said that the next logical step after installing the 462 meter run of cable would be to test it. This is done in order to make sure that there were no malfunctions during installation and that everything is running through the cable correctly. To test the cable you must perform an end-to-end attenuation test which will verify the quality of the installation as well as ensure high quality system performance.

You might be interested in
This method of file transfer has been used for decades and is frequently used for uploading changes to a website hosted by an in
Vinil7 [7]

The correct answer is FTP or File Transfer Protocol.

<h3>What is FTP?</h3>

The File Transfer Protocol (FTP) is a standardized communication protocol used on a computer network to transfer computer files from a server to a client. FTP is designed as a client-server approach, with distinct control and data connections between both the client and the server.

The type of file transfer method that has been used for decades and is frequently used for uploading changes to a website hosted by an internet service provider is FTP or File Transfer Protocol.

Hence, the correct answer is FTP or File Transfer Protocol.

Learn more about FTP here:

brainly.com/question/25751600

#SPJ2

3 0
1 year ago
If your machine is not used as a server and is not on a local network, what packet-filtering strategy should you use?A. Block al
IceJOKER [234]

Answer:

<em>Block all ports except 80</em>

Explanation:

We can make our network more defensive by blocking all ports except 80. This strategy can reduce the risk of attackers. If all the ports that are not in used are not in used can make system or network insecure. To enhance the security and reduce the risk of attacks we block all the ports that are not in used.

Using this strategy on people visit who need the data and attacker cannot access the system, without consent of owner.

3 0
3 years ago
Stella is surfing the Internet to look for affordable apartments in New York City. Every time she clicks on a link to a webpage,
alexgriva [62]

rich media Web advertisement, These can easily be prevented by downloading https://chrome.google.com/webstore/detail/adblock-plus-free-ad-bloc/cfhdojbkjhnklbpkdaibdccddilifddb?hl=en-US   My personal favorite

7 0
3 years ago
If there is a mistake with one of your bank accounts, who should you contact to resolve the issue
Reika [66]

Answer:

I would advise calling the bank as they are the probably the most likely to be able to resolve the issue .

6 0
3 years ago
During the _____ of the systems development life cycle (SDLC), an information system is operating, enhancements and modification
Neporo4naja [7]

Answer:

Maintenance Phase

Explanation:

One of the concepts employed in project management for describing stages involved when carrying out an information system development project is the systems development life cycle (SLDC). The cycle which starts from carrying out a feasibility study and ends in maintenance is a highly used conceptual model. There are 5 major stages or phase and they are the; Requirement Phase, Design Phase; Implementation Phase, Test Phase, and the Maintenance phase. The maintenance phase comes when testing has been complete and all enhancement and modifications have already been developed, and the system is operating.

5 0
3 years ago
Other questions:
  • As you're helping a user configure her e-mail over the phone, she remarks that the IP address is different than it was when she
    6·1 answer
  • Consider a multiprocessor CPU scheduling policy. There are 2 options: 1) a singlecommon ready queue of jobs; when a CPU becomes
    8·1 answer
  • PLEASE HELP ASAP!!!
    15·2 answers
  • Why is it important to use proper line types
    13·1 answer
  • Which of the following statements is false? a. Each object of a class shares one copy of the class's instance variables. b. A cl
    11·1 answer
  • Which is an advantage that electronic scheduling tools have over paper calendars?
    13·2 answers
  • A ddr4 dimm with a pc rating of pc4-17000 is running at what speed?
    15·1 answer
  • What is it called when you remove some information from a file or remove a file from the disk ? A) save b) delete c) edit d) rem
    5·1 answer
  • How do you change your name in the profile section because i am trying to change my name.
    9·2 answers
  • Fill in the blanks <br>a) an _______________ checks the files on the computer for viruses.​
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!