A technician is called to investigate a connectivity issue to a remote office that is connected by fiber optic cable. Using a light meter, it is determined that the Db loss is excessive. The installation has been working for several years. The switch was recently moved to the other side of the room and a new patch cord installed. Which of the following is MOST likely the cause of the issue?

A. Distance limitations
B. Wavelength mismatch
C. Bend radius limitation
D. Dirty connectors


Answer: D. Dirty connector

Computer Science & Information Technology

You might also like to view...

All calls placed inside a LATA are always carried without per minute charges, unlike long-distance calls.

a. True b. False

Computer Science & Information Technology

Briefly describe how to configure WPA2 Personal to be used on a wireless network. Implementing WPA2 Personal involves turning it on at the wireless router and then entering a key value on each authorized device that has been preapproved to join the Wi-Fi network. In the wireless router configuration settings there are two steps that must be performed. First, the WPA2 Personal security option, which may be labeled as WPA2-PSK [AES], is turned on by clicking the appropriate option button. Second, a key value, sometimes called a preshared key (PSK), WPA2 shared key, or passphrase, must be entered. This key value can be from 8 to 63 characters in length.

What will be an ideal response?

Computer Science & Information Technology

The ________ aggregate function limits the results without grouping the data by the field

A) Expression B) First C) Last D) Where

Computer Science & Information Technology

In an array-based implementation of a heap, the heapInsert operation is ______.

a) O(1) b) O(n) c) O(n2) d) O(log n)

Computer Science & Information Technology