1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitrij [34]
3 years ago
6

You are using a crimper to attach an RJ-45 connector to a Cat 6 UTP cable. You need to use the T568A standard to connect the ind

ividual wires to the connector. Which wire should be connected to pin 1?

Computers and Technology
1 answer:
tino4ka555 [31]3 years ago
3 0

Answer: The green and white wire (g) should be in pin 1 according to T568A standard.

Explanation: Please see diagram attached.

(source of image: http://www.fiber-optic-components.com/rj45-connector-used-in-ethernet-connectivity.html)

You might be interested in
To implement the various placement algorithms discussed for dynamic partitioning (see Section 7.2 ), a list of the free blocks o
STatiana [176]

Answer:

Check the explanation

Explanation:

Consider the following data

Let S represent the average number of segments

Let H represent the average number of holes

The probability that there is a hole immediately after the segment is 0,

So, when there are s segments in memory, there must be

s X 0.5 or \frac{s}{2}

Best-fit: this analyses the entire memory partitions available

a. you’ll have to selects the least one which is capable of handling the process exec.. Memo, space wastage .n be reduced In some cases, there will be no memory wastage

The average length a search is \frac{s}{2}

First-fit: This technique assigns Me the first hole that is big enough.

Searching Marts at the starting of Me set of holes.

The searching will be closed immediately a user gets a free hole that is big enough.

On an average it searches half of the set of holes.

The average length of search is Y2

\frac{s/2}{2} = \frac{s}{4}

5 0
3 years ago
An array of integers named parkingTickets has been declared and initialized to the number of parking tickets given out by the ci
WINSTONCH [101]

An array of integers named parkingTickets has been declared and initialized to the number of parking tickets given out by the city police each day since the beginning of the current year.

Explanation:

  • A variable named ndays has been declared and initialized to hold the size of the array.
  • The first element of the array contains the number of tickets given on January 1; the last element contains the number of tickets given today.
  • A variable named mostTickets has been declared, along with a variable k.
  • If today were January 18, ndays would have the value 18; if today were February 3, ndays would have the value 34

mostTickets=0;

for (k=0; k< ndays; k++)

{

if (parkingTickets[k]>mostTickets) mostTickets=parkingTickets[k];

}

3 0
3 years ago
When authenticating a user's password, the password supplied by the user is authenticated by comparing the ____ of the password
Bas_tet [7]

Answer:

Hash.

Explanation:

An authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification. Smart cards, digital certificates, picture passwords, and biometrics are generally used to perform an authentication in the field of computer.

Hence, when authenticating a user's password, the password supplied by the user is authenticated by comparing the hash of the password with the one stored on the system.

In Computer science, a hash function can be defined as any function which is used to map data by accepting a block of data with variable length size or arbitrary size as input to produce a fixed size hash values or codes.

Generally, when a block of data (input) of arbitrary size is hashed, the resulting hash values or codes is usually smaller than the input data. Thus, hash functions are considered to be a compression of data and as a result, sometimes called compression functions. Basically, the block size of a hash function typically ranges from 128 bits to 512 bits.

5 0
2 years ago
After a normal system shutdown, when the computer is turned off, contents of the memory used to store bios settings are
kiruha [24]
The settings are retained

<span>Technically, Bios software is stored in a non-volatile ROM (Read-Only Memory) chip found on the motherboard.  Usually, this kind of chip retains its contents even after a normal system shutdown. Rom chips contains programs that are collectively referred to as BIOS chip or Basic Input/Output Services</span>
8 0
3 years ago
Read 2 more answers
What is the importance of using Onedrive in Windows 10 and how knowledge of it will have an impact in today's workplace?
SashulF [63]

The importance of one drive in windows 10 is that it helps the user to synchronize files in their computer.

Onedrive is a cloud storage system that is useful for the storage of files in a secured manner. A person can easily access their files whenever they want to.

In todays workplace a knowledge of onedrive has a great impact because

  • Onedrive offers an unlimited access to files whenever they are needed
  • The files can be available and accessed from anywhere
  • It helps with the organization of files in the work place.

One drive allows for this to be done even when offline. When online, there is an automatic synchronization of the made changes.

Read more at brainly.com/question/17163678?referrer=searchResults

7 0
3 years ago
Read 2 more answers
Other questions:
  • Which command can be used to manually add a package to the driver store?
    13·1 answer
  • Meg is in the process of creating a storyboard for her personal website, but she is unable to decide which storyboarding techniq
    10·1 answer
  • the equation t= 0.25d^1/2 can be used to find the number of seconds, t, that it takes an object to fall a distance of d feet how
    8·1 answer
  • How many bit does four gigabyte has
    8·2 answers
  • If a speed mismatch was configured between two Cisco routers' Ethernet interfaces, what would the status of this interface be?
    12·1 answer
  • How does this app work?
    11·2 answers
  • When performing actions between your computer and one that is infected with a virus, which of the following offers NO risk of yo
    11·2 answers
  • A ____ can be used to enter, display, or edit data
    5·1 answer
  • Which mark is an indicator of invalid data in a cell?
    11·1 answer
  • Name any two procedure oriented programming language​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!