1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Advocard [28]
2 years ago
6

You are a running cable in a new network. You are running a series of cables from the wiring closet to the RJ-45 ports for the c

lient systems. What type of cable are you running? (Please select from one of the following four options)1. Horizontal cable2. Vertical cable3. MDF cable4. IDF cable
Computers and Technology
1 answer:
siniylev [52]2 years ago
4 0

Answer:

IDF cable

Explanation:

An IDF cable or intermediate distribution frame is a cable rack that interconnects and manages a MDF or main distribution frame and a collection of workstations or computer systems. The MDF is a cable rack that interconnects several IDFs to itself.

You might be interested in
The programs that provide the infrastructure and hardware control necessary for the computer and its peripheral devices are call
Vinil7 [7]

Answer:

System Software

Explanation:

Anything on your computer that includes system services, configuration files, and many other computer preferences is called system software. System software like the operating systems themselves, browsing software, and many other software programs offers platform to other software. It falls in between the user and the hardware. Once your Operating System is installed, the system software comes preinstalled. System software constitutes every program file on your computer that interacts in a very basic level with the hardware.

8 0
3 years ago
"what is the problem with using challenge handshake authentication protocol (chap) as an authentication protocol?"
Alexxandr [17]

Its use of the message digest 5 (MD5) hash algorithm for security.

CHAP uses a combination of MD5 hashing and a challenge-response mechanism, and authenticates without sending passwords as plaintext over the network. The security of the MD5 hash function is severely compromised.

5 0
3 years ago
One subtask in the game is to roll the dice. explain why is roll the dice an abstraction.
LUCKY_DIMON [66]

Answer:

A game is built from a combination of sub-tasks in order to provide the best experience to the user and make sure that the interface is comprises of only the results of the ongoing sub-tasks to provide a higher degree of data abstraction.

Data abstraction refers to the process of representing the essential information without including the background details. Rolling a dice is preferred to be a sub-task so that the user only gets to know about the result of the roll and does not have to wait for or anticipate the result. Moreover, a game may consist of n number of sub-tasks so it is not a good idea to include them in the main framework and are preferred to be abstracted.

4 0
3 years ago
A rootkit is software and file folders that are hidden from view and permit viruses, spyware, and malware to be installed on a P
Zanzabum

Answer:

TRUE

Explanation:

A rootkit is a collection of computer software, typically malicious, that is designed to grant an unauthorized user access to a computer or certain programs. Once a rootkit is installed, it is easy to mask its presence, so an attacker can maintain privileged access while remaining undetected.

Rootkit detection is difficult because a rootkit maybe able to subvert the software that is intended to find it.

Rootkits work by using a process called modification (the changing of user account permissions and security).

Rootkits are not malware themselves, but rather a process used to deploy malware on a target.

Therefore, it is TRUE that a rootkit is software and file folders that are hidden from view and permit viruses, spyware, and malware to be installed on a PC without the knowledge or consent of a user.

3 0
3 years ago
Interpret the Department of Homeland Security’s mission, operations and responsibilities.
Shalnov [3]

Answer:

 The department of homeland security mission is to provide the efficient and good security system to the nation in all the aspects against the terrorism.

The main aim of the department of homeland security mission is to anticipate fear based oppressor assaults inside the United States, decrease the weakness of the United States to psychological oppression, and limit the harm, and aid the recuperation from psychological oppressor assaults that do happen in the United States.

The main responsibility of this department is that:

  • Providing the security against the threats of terrorism attacks
  • Providing the effective and quick recovery from the disaster
  • Also, give the secured cyber space to the homeland.
7 0
3 years ago
Other questions:
  • How do you know if you get a phone call that is a scam
    8·2 answers
  • As the network engineer, you are asked to design an IP subnet plan that calls for three subnets. The largest subnet needs a mini
    14·1 answer
  • The right to make others do things is referred to as _________.
    14·2 answers
  • Explain the main components of a computer system​
    12·1 answer
  • Which format of image files can be inserted in html?​
    8·2 answers
  • Which of the following examples can be solved with unsupervised learning?
    8·1 answer
  • Defination of formula work sheet​
    15·1 answer
  • Hello everyone! can anybody help me? i need help with computing.
    10·1 answer
  • What are some innovations that television has undergone since its original invention ?
    11·1 answer
  • DRAW A FLOWCHART THAT WILL ASK THE USER TO ENTER AND DISPLAY THEIR PERSONAL DETAILS SUCH AS NAME AND AGE.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!