1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Karo-lina-s [1.5K]
3 years ago
8

Hands-On Project 15-4 Make Network Cables

Computers and Technology
1 answer:
Mars2501 [29]3 years ago
8 0

Answer:

1. You can use either standard (T-568A or T-568B) - but must keep the standard throughout the installation (can't mix A with B).

The B standard is preferred in the US.  A is mostly used overseas (Europe)

For A the proper wiring sequence is:

1 - Orange/White

2 - Orange

3 - Green / White

4 - Blue

5 - Blue / White

6 - Green

7 - Brown / White

8 - Brown

2. Cross over connections use a different pinout for one side of the cable.  The second side is wired normally.

Crossover connections are only used for device to device connections.  ( as in the case of connecting two NIC cards together directly).  They will not work if plugged into a switch or other network device.

Normal side - use the pinout from question #1

Crossover side:

1 Green / White

2 Green

3 Orange / White

4 Brown / White

5 Brown

6 Orange

7 Blue

8 Blue / White

Explanation:

You might be interested in
Select the correct answer from each drop-down menu
Oksanka [162]

Answer:

First one is B size because if it's too small or big it might get pixelated or fuzzy, and for the second parr it would be B printable .

Explanation:

7 0
3 years ago
Read 2 more answers
ap csp The local, remote, and upstream _______ can each have multiple ___ _____. When a participant in a collaborative group on
ratelena [41]

Answer:

The Local, Remote and Upstream repository can each have multiple push /pull requests. When  a Participant in a collaborative group on Github is ready to have their work used by the group,  the participants makes a pull request.

Explanation:

These are simple blanks which are answer here

The Local, Remote and Upstream <u>repository</u> can each have multiple <u>push /pull</u> requests. When  a Participant in a collaborative group on Github is ready to have their work used by the group,  the participants makes a <u>pull request</u>.

8 0
3 years ago
Which of the following dimensions of e-commerce technology involves the integration of video, audio, and text marketing messages
crimeas [40]

Answer:

Richness (Information Richness)

Explanation:

Information richness refers to the complexity of combining  video, audio and  make a marketing advert, the information generated is considered rich. other features or dimensions include; interactivity, information density, personalization etc

3 0
4 years ago
12.2 Sort an array in ascending order Write a program that gets a list of integers from input, and outputs the integers in ascen
notsponge [240]

Answer:

Explanation:

The following code is written in Java, it asks the user for the number of inputs that will be made and then the inputs. These inputs are placed into an array. Then the array is sorted and printed out to the terminal.

public static void sortArrayList() {

           ArrayList<Integer> sortedList = new ArrayList();

           Scanner input = new Scanner(System.in);

           System.out.println("Enter number of digits in Array");

           int numberOfInputs = input.nextInt();

           for (int i = 0; i < numberOfInputs; i++) {

                   System.out.println("Enter a number");

                   sortedList.add(input.nextInt());

           }

           int n = sortedList.size();

           for (int i = 0; i < n; i++)

               for (int j = 0; j < n-i-1; j++)

                   if (sortedList.get(j) > sortedList.get(j + 1))

                   {

                       // swap arr[j+1] and arr[j]

                       int temp = sortedList.get(j);

                       sortedList.set(j, sortedList.get(j + 1));

                       sortedList.set(j + 1, temp);

                   }

           for (int x : sortedList) {

               System.out.println(x);

           }

       }

7 0
3 years ago
Lisa managed incident response for a bank. The bank has a website that’s been attacked. The attacker utilized the login screen,
Afina-wow [57]

Answer:

The attack is known as SQI Injection attack.

Explanation:

SQI injection usually exploit some security lapse in an application software for it to be able to work. It usually attack websites and mostly known as attack vector but may equally attack any type of SQL database of a company. These attacks allow attackers to steal and use identity, tamper with existing data on a system or website of the company or allow the complete disclosure of all data on the system. SQL Injection can also destroy the data or make it otherwise unavailable. Most importantly, it can become administrators of the database server or even cause reconciliation issues for such company transactions (e.g banks) such as voiding transactions or changing balances.

7 0
4 years ago
Other questions:
  • a conpany manufacturers computer screens that utilize less electricity. which form of technology would this be classified as​
    5·1 answer
  • Which boolean operator (and, not, or or) gives you the least results? *?
    6·1 answer
  • The blank is the area on your screen where you can access the tab and menu options for word
    5·1 answer
  • Representations and Conversions
    8·1 answer
  • What does a computer do with what it receives from the interpreter?
    14·1 answer
  • Which computer network component connects two different networks together and allows them to communicate?
    8·2 answers
  • Fill in the blanks of the SQL Statements: Fund_Id VARCHAR(10) , Donor_id VARCHAR(10) , Count_Of_Receipts INTEGER, Total_Receipts
    15·1 answer
  • Determine whether the phrase below is a sentence or a fragment.
    12·1 answer
  • Rudy accidentally sent a sensitive work report to a personal friend named James instead one of his co-workers, who is also named
    6·1 answer
  • Which of the following occupations uses math concepts to determine if a particular event would occur and the related costs of th
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!