1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ehidna [41]
2 years ago
9

How are 8-position, 8-contact (8P8C) modular connectors pinned to unshielded twisted-pair (UTP) cable, which is used for connect

ing computers and broadband modems to a local area network (LAN)?
Computers and Technology
1 answer:
AleksandrR [38]2 years ago
8 0

An unshielded cable are twisted pair is used to connect modem in telecommunication industry to connect computer through telephone cable, Ethernet cables it is called as UTP cables.

<u>Explanation:</u>

These UTP cables are twisted cables where conducted are used in form of single circuit.

These types of UTP cables used to connect modem to establish connection to other networks for internet or connecting to other side computer or desktop or laptops.

UTP cables uses  rj-45 or rj-11  or rs232 or rs 499. Normally rs-45 with cat 5e cable is used to connect LAN. Rj-11 is used to connect to modem for dial purpose.

If we use ip networks RJ-45 will do both.

You might be interested in
Designations at the end of file names such as .docx and .html are called
Amanda [17]

Answer:

Designations at the end of file names such as .docx and .html are called. File extensions.

Explanation:

7 0
3 years ago
Focusing on the general characteristics of a problem or object, while ignoring the details, is a technique called
Taya2010 [7]

Answer:

Abstraction

Explanation:

In computer science, abstraction has a similar definition. It is a simplified version of something technical, such as a function or an object in a program. The goal of "abstracting" data is to reduce complexity by removing unnecessary information. At some level, we all think of computers in abstract terms.

5 0
2 years ago
Jason wants to set up his Wi-Fi’s security. He cannot install a central server for authentication. However, he wants to use a pr
jolli1 [7]

Answer:

Answer = a ig

wpa. ig ig ig ig

4 0
3 years ago
Read the description of Mike’s work, and identify his profession. Mike’s job is to record sounds in a studio. He studies a video
kipiarov [429]
Mike is a Sound Engineer
7 0
2 years ago
Read 2 more answers
Essay regarding a magic cell phone that turns into robot
igor_vitrenko [27]
Hey off the juice codine got me trippin
8 0
3 years ago
Other questions:
  • What are the advantages and disadvantages of the simulated link strategy?
    11·1 answer
  • // PrintStrings // Traverse the 2D character array "strings" and print each of the contained strings.// See the example outputs
    10·1 answer
  • Illustrate the process of using an operating system to manipulate a computer’s desktop, files and disks.
    12·1 answer
  • Write a Python program to do the following: (a)Use a for loop and a random integer generator to generate 5 random integers in 1
    10·1 answer
  • Create the following matrix M: 1 7 13 19 25 ?-3 9 15 21 27 5 11 17 2329By writing one command and using the colon to address ran
    8·1 answer
  • How should font appear in a slide presentation compared to the font in a document
    7·1 answer
  • 4.11 lesson practice edhesive
    8·2 answers
  • Complete the statement below using the correct term.<br>Website managers use<br>every day​
    11·2 answers
  • ) Perform error checking for the data point entries. If any of the following errors occurs, output the appropriate error message
    11·1 answer
  • Which emerging technologies will have more injury on our day to day country &amp; How?​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!