1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ohaa [14]
3 years ago
10

1. What cause cable problems? How can these problems be solved?

Computers and Technology
1 answer:
lukranit [14]3 years ago
4 0

Explanation:

Ageing.

Wrong selection or application.

Mechanical failures.

Corrosion of sheath.

Moisture in the insulation.

Heating of cable.

Fire and lightning surges.

Electrical puncture.

This is the only thing I know that causes cable problems, sorry if it couldn't help you!

You might be interested in
In Rizzati Corp, vice presidents in departments such as engineering, manufacturing, IT, and human resources report directly to t
Harrizon [31]

Answer: <em>Functional organizational structure.</em>

Explanation:

From the given case/scenario, we can state that Rizzati Corp has a functional organizational structure. Functional organizational structure is referred to as a structure which is used in order to organize employees. The employees are mostly grouped or organized based on their knowledge or specific skills. It tends to vertically structure each and every department or staff with specific roles from VP to sales and finance departments, to worker assigned to commodities or services.

7 0
4 years ago
Name 2 ways that body temperature can be taken.​
Zigmanuir [339]

Answer:

Under the armpit, which is called the axillary method, and also through mouth, which is called the oral method.

Explanation:

5 0
3 years ago
Write a program. in QBAsSIC
goblinko [34]

Answer:

The program is as follows:

<em>5 INPUT A,B</em>

<em>6 PROD = A * B</em>

<em>7 PRINT PROD</em>

<em>8 TOTAL = A + B</em>

<em>9 PRINT TOTAL</em>

<em>10 DIFF = A - B</em>

<em>11 PRINT DIFF</em>

<em>12 END</em>

Explanation:

This gets input for the two numbers

<em>5 INPUT A,B</em>

This calculates the product

<em>6 PROD = A * B</em>

This prints the calculated product

<em>7 PRINT PROD</em>

This calculates the sum

<em>8 TOTAL = A + B</em>

This prints the calculated sum

<em>9 PRINT TOTAL</em>

This calculates the difference

<em>10 DIFF = A - B</em>

This prints the calculated difference

<em>11 PRINT DIFF</em>

This ends the program

<em>12 END</em>

5 0
3 years ago
oe, a user, receives an email from a popular video streaming website. the email urges him to renew his membership. the message a
ale4655 [162]

Where Joe, a user, receives an email from a popular video-streaming website and the email urges him to renew his membership. If the message appears official, but Joe has never had a membership before, and if when Joe looks closer, he discovers that a hyperlink in the email points to a suspicious URL, note that the security threat that this describes is: "Phishing" (Option B)

<h3>What is Phishing?</h3>

Phishing is a sort of social engineering in which an attacker sends a fake communication in order to fool a person into disclosing sensitive data to the perpetrator or to install harmful software, such as ransomware, on the victim's infrastructure.

To avoid phishing attacks, make sure you:

  • understand what a phishing scheme looks like
  • Please do not click on that link.
  • Get anti-phishing add-ons for free.
  • Don't provide your information to an untrusted website.
  • Regularly change passwords.
  • Don't disregard those updates.
  • Set up firewalls.
  • Don't give in to those pop-ups.

Learn more about Phishing:
brainly.com/question/23021587
#SPJ1

Full Question:

Joe, a user, receives an email from a popular video streaming website. The email urges him to renew his membership. The message appears official, but Joe has never had a membership before. When Joe looks closer, he discovers that a hyperlink in the email points to a suspicious URL.

Which of the following security threats does this describe?

  • Trojan
  • Phishing
  • Man-in-the-middle
  • Zero-day attack
5 0
2 years ago
Having a legitimate reason for approaching someone to ask for sensitive information is called what?
PIT_PIT [208]
It’s called Impersonation
5 0
3 years ago
Other questions:
  • A form of speech used by a speaker who is attempting to be witty and amusing is _________.
    13·2 answers
  • A(n) ____ web site structure connects web pages in a treelike structure.
    6·1 answer
  • The piston ring isn't a completely solid ring; instead, it's usually split at one point. This split or gap in the ring is called
    7·2 answers
  • Good business ethics is a good marketing strategy. Discuss
    13·1 answer
  • Me Completan Pliiiis
    11·1 answer
  • Shelbi likes to play video games on an old Nintendo video game system. No matter how old the cartridge, when she inserts it into
    11·2 answers
  • Name 3 supercomputers along with their cost, purpose and the country it is located.​
    15·1 answer
  • Hello can you please help with this if you want to thank you!
    15·2 answers
  • HURRY- I’ll give 15 points and brainliest answer!!
    10·2 answers
  • Benchmark test compare similar systems performing in which tasks
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!