Answer:
wireless LAN
Explanation:
An extranet is a network area where people or corporate partners external to the company access data. An intranet simply describes the network area that is normally accessed only by internal personnel. The wired LAN is affected by BYODs (bring your own devices) when the devices attach to the wired network. A college wireless LAN is most likely used by the tablet and smartphone. A wireless WAN would more likely be used by college students to access their cell provider network.
The two devices in a computer that should be considered "black boxes," and should never be opened due to risks involving charged capacitors are MONITOR and POWER SUPPLY.
Explanation:
- Physical contact or close proximity to the open power supply caused a discharge from the capacitor that resulted in an electric shock. Capacitors can discharge current even when not energized because they hold a charge for some time after the power is turned off.
- To do harm to your body, the voltage across the capacitor's terminals must be high enough to cause a harmful effect on you. There are no hard rules for at what voltage things become harmful, but a common 'rule of thumb' is that DC up to 48 Volt is considered low voltage. So a capacitor charged to a voltage below 48 V is fairly safe.
- A charged capacitor can be very dangerous, so it's important that you avoid coming into contact with the terminals at all times.
Answer:
Toner probe
Explanation:
A Toner probe is a useful device for the installation of electrical cabling of any type, it can be used as Probe and Tone Tool: it enables someone in finding individual leads among a large number in a cable trunk, without having to either connect or strip the remote end.
Its major use is to trace wires or cables by sending a signal from one end of a wire down its entire length. This is typically done to track the spot of a cut or missing door, window, or other alarm wire.
Answer:
The answer is "Option a"
Explanation:
Meta-character is a unique character, which is used in the system or information area, that provides information about the other characters. This type of character is used in both command-line and programming.
- It has a particular meaning and should be prevented for reasons except for its particular importance.
- It attempts in the algorithmic technique to view all character as a fundamental ASCII instead of a specific purpose.