1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Over [174]
3 years ago
12

Four-pair UTP uses ________ connectors a)snap b)ST or SC c)None of these

Computers and Technology
1 answer:
Oliga [24]3 years ago
4 0

Explanation & answer:

Four pair UTP (unshielded twisted pair) cables are common cables with RJ45 connectors.  Most RJ45 connectors have a snap to lock the male connector in place.

ST and SC connectors are for fibre-optics.

You might be interested in
Early word processors ran on devices that look like digital
S_A_V [24]

Answer:

True

Explanation:

The word processor used to be the only office machine in the year 1960s, that combined the keyboard text-entry and various printing functions of an electric typewriter with the recording memory. And this recording unit was a tape or a floppy disk, with the simplest of processor applied for text editing. Hence, the above statement that the early word processors ran on the devices that look like digital is true.

6 0
2 years ago
Read 2 more answers
PowerPoint is a visual aid for many speakers. Discuss some points to remember when adding text to a PowerPoint presentation. How
Murljashka [212]
1. Less picture less distraction, but where to put pictures ? At the start of your presentation just to initially get the attention of the audience.
2. Use bullets for texts, never use paragraphs. Use short text or even words only which captures the subject of the presentation.
3. In conjunction with point 1. Use less animations as well. Especially for formal presentations

Additionally : Make sure to know your audience, for professionals, make the presentations short and precise. For much informal audiences you can be playful but always keep in mind not to overshadow the attention from the speaker.
7 0
2 years ago
In DNS cache poisoning, valid packets exploit poorly configured DNS servers to inject false information to corrupt the servers'
myrzilka [38]

Answer: True

Explanation: Domain name system(DNS) is the kind of attack that exploits the functioning of the DNS .This process is also known as the DNS spoofing .The corrupted data is invoked in the cache database and thus creates spoof.

It creates diversion of the traffic from the actual servers to the fake servers and entering the exploited data in the cache database.Thus, the given statement is true.

4 0
2 years ago
The calcCircleCircumf() method invoked within in the CircleStatsTester class is overloaded. Write the overloaded methods in the
solong [7]

Answer:

The program to this question as follows:

Program:

class CircleStats //defining class  

{

CircleStats() //creating default constructor

{

}

float calcCircleCircumf(float radius) //defining method  

{

   return (float)(2 * Math.PI * radius); //return value

}

double calcCircleCircumf(double diameter) //overload the method

{

   return (2 * Math.PI * (diameter/2)); //return value

}

}

public class CircleStatsTester //defining class  

{

public static void main(String ar[]) //defining main method  

{

int diameter = 5; //defining integer variable

double radius = 2.5;//defining float variable

CircleStats cStats = new CircleStats(); //creating CircleStats class object

System.out.println("The circumference = " + cStats.calcCircleCircumf(diameter)); //print value

System.out.println("The circumference = " + cStats.calcCircleCircumf(radius));  //print value

}

}

Output:

The circumference = 31.4

The circumference = 7.853981633974483

Explanation:

In the above java program code, two-class is declared that are "CircleStats and CircleStatsTester". In the class "CircleStats" a default constructor is created then method overloading is performed in which two method is defined that have the same name but different parameters.

  • In the first-time method declaration, it contains a float variable "radius" in its parameter to calculate and return its value.
  • In the second time method declaration, it contains a double variable "diameter" in its parameter, calculates and returns its value.

Then another class CircleStatsTester is defined inside this class the main method is defined. In the main method, an integer and double type variable is defined that contains a value that is "diameter = 5 and radius = 2.5". In this method, an above class CircleStats object is created and call this class functions.

7 0
3 years ago
Please answer this please solve it
natulia [17]

Answer:

If you still can't figure it out look this up

nvcc cafe problem

Explanation:

4 0
2 years ago
Other questions:
  • Jack needs to improve sales on a local service for the elderly. What would be the best place for him to place an ad?
    10·2 answers
  • How to write a self-analysis essay
    5·1 answer
  • In DTP, a good rule of thumb is to use as many special effects as you need to make your documents look interesting.
    5·1 answer
  • Methods that require you to use an object to call them are called ____ methods.1. accessor
    7·1 answer
  • How to control what is on the x and y axis in excel?
    13·1 answer
  • A store sells rope only in whole-foot increments. Given three lengths of rope, in feet, the following code segment is intended t
    6·1 answer
  • In this project you will write a set of instructions (algorithm). The two grids below have colored boxes in different
    9·2 answers
  • PLS ANSWER ASAP!!!! <br><br> In three to five sentences, explain the function of utilities.
    13·1 answer
  • Once you select a theme, you__________ change the theme’s individual elements independently of each other.
    12·1 answer
  • Which managed service should you use if you want to do a lift and shift of an existing Hadoop cluster without having to rewrite
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!