Describe UTP cable.
What will be an ideal response?
UTP cable, used with hubs, switches, and other 10/100baseT equipment, uses twisted pairs of wires to reduce noise and crosstalk and allow higher-speed data rates (100-Mbps category 5 UTP for Fast Ethernet). The twists tend to cause the small magnetic fields generated by currents in the wires to cancel, reducing noise on the signals. UTP cable length is limited to 100 meters (328 feet) and RJ-45 connectors are used for termination. The network diameter for UTP-based 10baseT networks is 500 meters. For 100baseT the diameter drops to 200 meters.
You might also like to view...
________ displays thumbnails of all of the slides in a presentation
A) Normal view B) Reading view C) Slide Sorter view D) Notes page view
Match each item with the correct statement below.
A. The Ribbon component that contains a number of related commands. B. C. Shows where keyed text will appear. D. This command enlarges the window to its fullest size. E. Contains the commands used to create documents and format text and paragraphs. F. Used to find an appropriate word to substitute for another word. G. Provides a means of navigating through a document efficiently. H. I. Provides a preview of the document and options for printing. J. Displays nonprinting characters such as paragraph markers and spaces. K. Used to reverse the most recent action you have changed. L. M. Displays options for opening documents, creating new documents, and managing files. N. Provides a way to copy the format of one paragraph to another. O. Contains icons for frequently used commands such as Save, Undo, and Redo. P. The feature that automatically moves text to the next line when one line is full. Q. Feature on the status bar that is used to zoom in and out to view a document in a larger or smaller size. R. S. Appears when text is selected and contains frequently used formatting commands.
Given the following array declaration, what is the value stored in the scores[1][2] element? ? int scores[3][3] = { {1, 2, 3}, {4, 5, 6}, {7, 8, 9} }; ?
A. 2 B. 5 C. 6 D. 4
What security principles are violated in the Greek cell phone interception example?
What will be an ideal response?