1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yanalaym [24]
3 years ago
5

Concerning Structured Cabling, select the statement that is true, or select, "All statements are false."

Computers and Technology
1 answer:
ikadub [295]3 years ago
7 0

Answer:

1) TRUE

2) FALSE

3) FALSE

4) TRUE

5) TRUE

Explanation:

1) vertical cross connects connect work stations to the closest data closet  TRUE

2) a patch cable is relatively short, from 20 feet to 90 feet

FALSE

3) the dmarc is located at the local telecommunications carrier's office

FALSE

4) the MDF(main distribution frame) is the centralized point of interconnection for an organization's LAN.

TRUE

5 )the IDF (intermediate distribution frame) is a junction point between the MDF and the entrance facility.

TRUE

You might be interested in
Your browser has blocked your from your crucial secure intranet sites. What could be the problem?.
Alenkinab [10]

A browser is a program that allows and provides the user access to information and web pages on the internet. It blocks someone when their SSL certificate status has been voided.

<h3>What is an SSL certificate?</h3>

An SSL (Secure Sockets Layer) certificate is a digital code and certificate present on the web that authenticates and provides security for communication. It is a security protocol that allows encrypted transmission.

The firewall supervisor sets the rule to block or allow the users to connect to Crucial Secure Intranet Sites based on their SSL certificates. SSL certificate if gets revoked then does not allow users to reach the site and declares it to be a potential risk.

Therefore, the browser is not reachable when the SSL certificate gets expired.

Learn more about SSL certificates here:

brainly.com/question/24276018

#SPJ1

3 0
2 years ago
Which are examples of hardware? Select 3 options.
umka21 [38]

Answer: OS(Operating System), CPU, And The Program That you use to view email

6 0
2 years ago
Read 2 more answers
What can be done in order to secure a WLAN/wireless access point?
polet [3.4K]

Answer:

this may help "Change default passwords. ...

Restrict access. ...

Encrypt the data on your network. ...

Protect your Service Set Identifier (SSID). ...

Install a firewall. ...

Maintain antivirus software. ...

Use file sharing with caution. ...

Keep your access point software patched and up to date."

Explanation:

4 0
3 years ago
Quickbooks online accountant firm users can use the quickbooks online advanced desktop app to access what types of client subscr
Leokris [45]

The type of the client subscription used is paid subscription.

<h3>What is Paid Subscription? </h3>

Paid Subscription refers to the payment made already on the product purchased or the services received. It is a kind of the recurring payment whose transactions repeat after a regular basis.

If the customer continue to receive  the service then he or she has to pay the subscription.

After paying the membership costs, customers of Quickbooks Online for accountancy firms can access the Quickbooks Online Advanced desktop application.

Learn more about Paid Subscription here:

brainly.com/question/13508895

#SPJ1

5 0
1 year ago
The assistant director of HIM is evaluating software that would use electronic logging of the location of incomplete and delinqu
Mazyrski [523]

Answer:

The answer is "Chart tracking".

Explanation:

It is also known as monitoring systems, which is required for the optimization of health records. In t he very first steps on both the road for electronic health records is indeed a properly designed tracking system. It often recognized as line charts outside the area of quality assurance, which represent the performance of the system across time.  

  • Patterns, cycles, and wide deviations could be noticed in the future investigated.  
  • Actions are computed against such a period on both the x-axis in a running graph, shown on the y-axis, and other choices can't be correct because it is not defined in the question.
3 0
3 years ago
Other questions:
  • Write a complete program to do the following: The main program calls a method to read in (from an input file) a set of people's
    12·1 answer
  • ___ are controls through which a user can enter input data in a gui application. answer
    10·1 answer
  • Referential integrity states that:______.
    15·1 answer
  • Your customer asks you if it would be worth the investment for him to have Ethernet cabling installed to reach each of his works
    6·1 answer
  • Ashley Baker has been the webmaster for Berryhill Finance only ten days when she received an e-mail that threatened to shut down
    13·1 answer
  • What is the result of expression 15 &gt; 10 &gt; 5 in C? What is the result of the same expression in Java?
    14·1 answer
  • A software update is also referred to as what?
    15·2 answers
  • Like when writing a paragraph, the subject becomes the __________ of the photograph.
    6·1 answer
  • When attaching a file or files in outlook 365 you select the attach command and then select the files location
    5·1 answer
  • Which bits of the address would be used in the tag, index and offset in a two-way set associative cache with 1-word blocks and a
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!