1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ehidna [41]
3 years ago
9

How are 8-position, 8-contact (8P8C) modular connectors pinned to unshielded twisted-pair (UTP) cable, which is used for connect

ing computers and broadband modems to a local area network (LAN)?
Computers and Technology
1 answer:
AleksandrR [38]3 years ago
8 0

An unshielded cable are twisted pair is used to connect modem in telecommunication industry to connect computer through telephone cable, Ethernet cables it is called as UTP cables.

<u>Explanation:</u>

These UTP cables are twisted cables where conducted are used in form of single circuit.

These types of UTP cables used to connect modem to establish connection to other networks for internet or connecting to other side computer or desktop or laptops.

UTP cables uses  rj-45 or rj-11  or rs232 or rs 499. Normally rs-45 with cat 5e cable is used to connect LAN. Rj-11 is used to connect to modem for dial purpose.

If we use ip networks RJ-45 will do both.

You might be interested in
Write a program in pascal to solve a quadratic equation
GalinKa [24]
Program p1;
var a,b,c,d : integer; {i presume you give integer numbers for the values of a, b, c }
     x1, x2 : real;
begin 
write('a='); readln(a);
write('b='); readln(b);
write('c=');readln(c);
d:=b*b - 4*a*c
if a=0 then x1=x2= - c/b
          else
if d>0 then begin 
                 x1:=(-b+sqrt(d)) / (2*a);
                 x2:=(-b - sqrt(d))/(2*a);
                end;
          else if d=0 then x1=x2= - b /(2*a)
                           else write ("no specific solution because d<0");
writeln('x1=', x1);
writeln('x2=',x2);
readln;
end.
5 0
3 years ago
WILL MARK BRAIN LIST!
Maslowich
I think it’s a

if it isn’t a then it’s d
6 0
3 years ago
Read 2 more answers
I don't know what to do, anyone there?​
s2008m [1.1K]
I’m here, hello. . . . . . .
3 0
3 years ago
What is the portrait mode ?
Effectus [21]
On a camera portrait mode is when the camera is vertical.
7 0
3 years ago
What is the most secure method for controlling privileged access to a system available for use in a public area?a. Database view
Lorico [155]

Answer:

Constrained user interfaces is the correct answer to the following question.

Explanation:

Because Constrained user interfaces are the secured function that is used for controlling the access of the user to the computer system and also confines the user to access the data but they can access only that data for which they are not restricted. In other words, Constrained user interfaces is that type of restriction for those users who access your data or resources and they can access only that part of data for which they are allowed.

4 0
4 years ago
Other questions:
  • Using the scenario below, answer the following questions:
    11·1 answer
  • When building systems, the only two entities that constitute software engineering are people and process.
    9·1 answer
  • Consider the clipping of a line segment in two dimensions against a rectangular clipping window. Show that you require only the
    10·1 answer
  • How do you add a PDF assignment to google docs and be able to edit it?
    13·1 answer
  • What is the name of the virus that appears to be a legitimate program?
    5·1 answer
  • A professor is working with five teams in his marketing research class. He decides to experiment with path-goal theory in helpin
    11·1 answer
  • Refer to the following code segment. You may assume that array arr1 contains elements arr1[0],arr[1],...,arr[N-1], where N = arr
    8·1 answer
  • Why do businesses often provide a logo on their web pages?
    13·1 answer
  • 8.10 Code Practice Question 3
    6·1 answer
  • By definition, what is the process of reducing security exposure and tightening security controls?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!