You are a running cable in a new network. You are running a series of cables from the wiring closet to the RJ-45 ports for the client systems. What type of cable are you running? (Please select from one of the following four options)1. Horizontal cable2. Vertical cable3. MDF cable4. IDF cable

Answers

Answer 1

Answer:

IDF cable

Explanation:

An IDF cable or intermediate distribution frame is a cable rack that interconnects and manages a MDF or main distribution frame and a collection of workstations or computer systems. The MDF is a cable rack that interconnects several IDFs to itself.


Related Questions

If you are having trouble playing back a presentation smoothly, what should you try?

Answers

Click the File tab. Click Options, click Advanced in the left pane of the PowerPoint Options dialog box, and then under Display, ensure the Disable hardware graphics acceleration check box is not selected.

If a user has trouble playing back a presentation smoothly, the options are;

1. Copy the presentation to your internal hard drive.

2. Clear the Disable hardware graphics acceleration option.

3. Lastly, select the Show without animation option.

Microsoft PowerPoint is an application that can be used for presentations in offices, schools and other meetings. The issue of playback could occur when we want to replay a presentation but encounter difficulties along the way. To resolve the problem, each of the three steps above can be followed.

The particular presentation with the issue should be copied to the internal hard drive. Remove the option: Disable hardware graphics acceleration. Finally, select the option to play the presentation without animation.

Conclusively, the three listed options above, should be followed to resolve the problem of playing back a presentation smoothly.

Learn more about Microsoft PowerPoint presentations here:

https://brainly.com/question/24079115

Most presentation programs allow you to save presentations so they can be viewed online by saving them as ____
files.

Answers

Explanation:

Most presentation programs allow you to save presentations so they can be viewed online by saving them as html

files.

Most presentation programs allow you to save presentations so they can be viewed online by saving them as html files.

A photojournalist is more employable than a reporter or a photographer because they can perform more than one job

Answers

Answer:

so yes

Explanation:

According to the Miriam Webster Online Dictionary, photography is defined as the art or process of taking a picture with a camera. On the other hand, photojournalism is defined as using photographs to report news ,stories,ect

g A CPU is equipped with a cache; Accessing a word takes 20 clock cycles if the data is not in the cache and 5 clock cycles if the data is in the cache. What is the effective memory access time in clock cycles if the hit ratio is 90%

Answers

Answer:

6.5

Explanation:

The formula to calculate the efficiency is;

= (cache-click-cycle x hit ratio) + ( memory-clock-cycle x 1 - hit ratio)

= (5 x 0.9) + ( 20 x 0.1)

= 4.5 + 2

= 6.5

In this exercise we have to use the knowledge of efficiency, in this way, using the data already informed, we can say that the result of this is:

6.5 effective memory

In this exercise, it was informed that some conditions must be established, that is:

Hit radio: 90%Memory: 20Cache: 5

The formula to calculate the efficiency is;

[tex]efficiency= ((cache-click-cycle)(hit \ ratio)) + ( (memory-clock-cycle)(1 - hit \ ratio))[/tex]

Substituting the known values ​​in the formula above, we find that:

[tex]= (5)(0.9) + ( 20)(0.1)\\= 4.5 + 2\\= 6.5[/tex]

See more about efficiency at brainly.com/question/6672666

does anyone know how to code

Answers

Answer:

no

Explanation:

i do not know how to code

You decide to test an audio clip that you have inserted into your presentation, but before you do that you make sure that the computer has_____.
A. a Media Controls bar
B. a headset
C. a speaker
D. a USB port

Answers

Answer:

C. a speaker

Explanation:

A speaker can be defined as an electronic output device that is typically used for the conversion of an electromagnetic wave to sound wave.

Basically, this conversion is done through the help of a hardware electronic component known as transducers.

The main purpose of a speaker is to produce an audio output and as such avail the computer users an ability to hear or listen to sounds.

In this scenario, you decide to test an audio clip that you have inserted into your presentation, but before you do that you make sure that the computer has a speaker because speakers are typically used for the production of audio output (sounds).

Write a method that draws a circle and a square that is centered in a DrawingPanel. The method will take in the width and height (they are the same for both the circle and square) and a Graphics object as parameters
IN java
current code: turn it into a method along with the main method
import java.awt.*;
public class Graphics {
static final int WIDTH = 300;
static final int HEIGHT = 200;
public static void drawGraphics () {
}
public static void main(String []args) {
DrawingPanel2 draw = new DrawingPanel2(WIDTH,HEIGHT); // Make a DrawginPanel2 of size 300 by 200.
Graphics2D g = draw.getGraphics(); // gets graphics from DrawingPanel so you can draw
g.setColor(Color.RED);
g.fillRect(45, 30, 200, 150);
g.setColor(Color.BLUE);
g.fillOval(70, 30, 150, 150);
}
}

Answers

Answer:

public static void drawGraphics (Graphics g, int width, int height) {

   int r = Math.round(width/2);

   int x = 45;

   int y = 30;

     g.setColor(Color.RED);

   g.fillRect(x, y, width, height);

   g.setColor(Color.BLUE);

   g.fillOval(Math.round(x/2), Math.round(y/2), r, r);

}

Explanation:

The Java method "drawGraphics" of the Graphics class accepts draws a square with the "fillRect()" method of the Graphics class object and at its center, a circular path is drawn as well.

Generally speaking, digital marketing targets any digital device and uses it to advertise and sell a(n) _____.


religion

product or service

governmental policy

idea

Answers

Answer:

product or service

Explanation:

Digital marketing is a type of marketing that uses the internet and digital media for the promotional purposes. It is a new form of marketing where the products are not physically present. The products and services are digitally advertised and are used for the popularity and promotion. Internet and digital space are involved in the promotion. Social media, mobile applications and websites are used for the purpose.

Answer:

A.) Product or service

Explanation:

Digital marketing is the practice of promoting products or services through digital channels, such as websites, search engines, social media, email, and mobile apps. The goal of digital marketing is to reach and engage with potential customers and ultimately to drive sales of a product or service. It can target any digital device that can access the internet, and it can use a variety of techniques such as search engine optimization, pay-per-click advertising, social media marketing, content marketing, and email marketing to achieve its objectives.

The function's only behavior should be to return the sum of array userVals' elements. What common error does the function make?
Assume userVals always has exactly 10 elements.
int SumArray Elements(int uservals[]) {
for (i = 1; i <10; ++i) {
userVals[i] = userVals[i] + userVals[i - 1]; } return userVals[i]; }
A. Attempts to access an invalid element.
B. Omits the first element from the sum.
C. Modifies userVals' elements.
D. Omits the last element from the sum.

Answers

Answer:

A. Attempts to access an invalid element.

Explanation:

The C program above is supposed to loops 10 times to get the total of the userVal's element, but the loop is assigning the cumulative sum of the to each nth index of the userVal array. Although the cumulative total of the array is assigned to the last index, the return statement is attempting to return an invalid element (since i is local only to the for loop statement). The program should return the userVal[9] instead.

Identify security gaps or opportunities in training related to human factors. Describe the impact associated with not addressing each gap or opportunity to individuals and the organization.

Answers

Answer:

The description and as per the circumstance has been described in the following portion.

Explanation:

Security gaps including human factor-related opportunities are security-related education that should have been given to all workers as new employees were most vulnerable to potential hazards and may also unintentionally clicking on any of the suspicious URLs. Whether this distance isn't crossed, it could contribute to trouble like crying out and therefore vulnerability management attacks, leading to privacy concerns and a lack of brand performance.

Any one know??please let me know

Answers

Answer:

B

Explanation:

Answer:

The answer is B.

Explanation:

Also I see your using schoology, I use it too.

what is spread sheet software?​

Answers

Answer:

The answer to this question is given in the explanation section.

Explanation:

This is a type of software which show us data in tabular form. These software can easily store, analyze and organize data.

They are divided in rows and columns. They are mainly used for accounting and book keeping.

The commonly used spread sheet software in the market are MS Excel by Microsoft, Calc by libre office.

The Bellman-Ford algorithm for the shortest path problem with negative edge weights will report that there exists a negative cycle if at least one edge can still be relaxed after performing nm times of relaxations. The algorithm, however, does not specify which cycle is a negative cycle. Design an algorithm to report one such cycle if it exists. You should make your algorithm runs as fast as possible.

Answers

Answer:

- Iterate over the Bellman-Ford algorithm n-1 time while tracking the parent vertex and store in an array.

- Do another iteration and if no relaxation of the edges occurs in the nth iteration then print of return "There are no negative cycle".

- Else, store the vertex of the relaxed edge at the nth iteration with a variable name.

- Then iterate over the vertexes starting from the store vertex until a cycle is found then print it out as the cycle of negative weight.

Explanation:

The Bellman-Ford algorithm can be used to detect a negative cycle in a graph. The program should iterate over the algorithm, in search of a relaxed edge. If any, the vertex of the specified edge is used as a starting point to get the target negative cycle.

On BranchVPN2, create a network access policy named Sales as follows: Type of network access server: Remote Access Server. Conditions: Membership in the Sales user group. Result: Grant access if the condition is met, regardless of the setting in the Active Directory user account. Authentication: Smart card or other certificate. Disallow all other authentication methods.

Answers

Answer:

- On the server manager, click on the select tool and select the network policy server and the policy node.

- Create a new policy by right-clicking on the Network policies tab, give it a name and define the network access server, then click on next.

- Add group membership as a condition by clicking the add tab, select the group type and click add, then click on add group, give it a name and click on ok and next.

- select the access permission settings and click next

- configure the authentication settings to EAP and deselect other authentication modes and click next.

- select additional constraints, click next then click on finish

Explanation:

A VPN or virtual private network is a secure offline network used by large enterprises to communicate confidentially, information within the company. It is more appropriate to implement VPN between different branches. Members of the enterprise can safely log in and out of the network, and access company data and resources they need and have permission to access.

Please help i will give brainiest. Plus 30 points



Games that do not have a clearly-defined end and often use exploration or simulation to allow freedom of character development, like Minecraft, Grand Theft Auto, and World of Warcraft, feature what kind of gameplay style?
adaptive
cyclical
linear
open-ended

Answers

Answer:

open ended

Explanation:

Adaptive: composition is a high-level game design framework for heightening physical empathy and the sensory experience of players with a focus on art and narrative-driven games and transmedia. so it is clearly not adaptive

Cyclical: is used to describe things that are regularly patterned or that occur in regular intervals. The root of cyclical is “cycle” which means movement in a circular fashion, or the circular fashion itself. Planets orbit the sun in cyclical patterns, the moon's phases are cyclical as well. we can keep cyclical in our option list but we still need to narrow it down more.

linear: A linear game follows a strict path for the player with little, if any, deviation. Basically, you traverse from stage 1 to stage 2 all the way to the final stage. Take, for example, Ghosts and Goblins or Magical Pop'n. A non-linear game deviates in some fashion, either throughout the whole game or just for a portion. obviously it is not linear because it is stage to stage which means that it has a end.

open ended: A game that is significantly nonlinear is sometimes described as being open-ended or a sandbox, though that term is used incorrectly in those cases, and is characterized by there being no "right way" of playing the game. Whether intentional or not, a common consequence of open-ended gameplay is emergent gameplay. this is very hard to understand if you do not have common sense or try to think things through too fast. we know that it is not linear and adaptive so we can clear those out of our choices. because cyclical uses a pattern and we are looking for something that gives us freedom it isnt that. so the answer has to be open ended

Answer: give him brainly

Explanation:

HELPPP
44 What text will be output by the program?
A- less than 10
B- less than 20
C- less than 30
D- 30 or more

Answers

Answer:

D. 30 or more

Explanation:

All other ones are canceled out ad the score adds 10.

The correct text for the output of the program is, ''30 or more''. So, option (D) is true.

A program is a set of instructions that a computer can run.

Programs are clear, ordered, and in a language that computers can follow.

Given that,

A program for the score is shown in the image.

Now, From the given program;

The last line will appear with the,

 console,log (''30 or more'')

Hence, The correct text for the output of the program is, ''30 or more''.

Therefore, the correct option is,

D) 30 or more

Read more about Python programs at:

brainly.com/question/26497128

#SPJ6

what types of problems if no antivirus is not installed

Answers

If you meant what would happen if you don't install an antivirus software, trust me, you don't want to know. I'd definitely recommend either Webroot (I believe that's how it's spelled) or Mcafee.

An array, numbers, of integers is filled with 100 random numbers whose values are greater than 10 and less than 255. You DO NOT have to write code to generate the random numbers. Write the code to count how many of the even numbers in the array are greater than 10 and less than 157 (inclusive).

Answers

Answer:

int counter = 0;

for(int i =0;i<100;i++){

if(myarr[i]%2==0){

if(myarr[i] > 10 && myarr[i]<157){

counter++;

}

}

}

cout<<counter;

Explanation:

The question is answered using c++ and it assumes that the array name is myarr

This line initializes counter to 0

int counter = 0;

This iterates through the array

for(int i =0;i<100;i++){

This checks if current array element is even number

if(myarr[i]%2==0){

If the above condition is true; This checks if the array element is within the range of 10 and 157 (inclusive)

if(myarr[i] >= 10 && myarr[i]=<157){

If yes, the counter is increased by 1

counter++;

}

}

}

This prints the total counter number

cout<<counter;

Sets of directions for problem solving refer to
A. algorithms
B. variables
C. functions
D. iteration

Answers

Answer:

B. Variables

Explanation:

I majored in

which computer is slightly bigger than a calculator? ​

Answers

Answer:

A computer pocket?

Explanation:

A computer pocket is the computer which is slightly bigger than a calculator.

What is computer?

Computer is defined as an electronic equipment or device that meant for storing data and just in a typical binary form, which has been just according to the instructions that is provided to it in the form of variable program.

Computer also helps to operating the arithmetic as well as logical operations by its own. The set of modern computers also perform generic sets that has operated which has been know as program.

The main advantage of computer is that it helps to increases the productivity of the work, it plays a vital role to connect with the secure internet, it helps to sort or organize as well as search the information. It also helps to keep connected to the world.

Therefore, A computer pocket is the computer which is slightly bigger than a calculator.

Learn more about computer here:

https://brainly.com/question/21080395

#SPJ2

Which phrase is the best definition of sparklines in Excel 2016?

a type of graphic that users can insert into a worksheet
a type of mini chart that users can insert into a worksheet
a simple image that is displayed in Excel
a link to an outside source that is referenced in a worksheet

Answers

Answer:

Option 2: a type of mini chart that users can insert into a worksheet

Explanation:

A graph or chart is used to show trends and changes in a dataset.

When we have to show trends or changes in MS Excel, there are a lot of options available. One of them is Sparklines. Sparklines are like mini charts that can be used to show data graphically.

Hence,

The correct answer is:

Option 2: a type of mini chart that users can insert into a worksheet

Answer:

answer c

Explanation:

Which of the following is NOT true?

a. The process provides the macro steps
b. Methodologies provide micro steps that never transcends the macro steps.
c. Methodologies provide micro steps that sometimes may transcend the macro steps.
d. A methodology is a prescribed set of steps to accomplish a task.

Answers

Answer:

b. Methodologies provide micro-steps that never transcends the macro steps.

Explanation:

Methodologies are a series of methods, processes, or steps in completing or executing a project. Projects can be divided into macro steps or processes and these macro steps can be divided into several micro-steps. This means that, in methodology, micro-steps always transcends to a macro-step.

The purpose of __________________ is to isolate the behavior of a given component of software. It is an excellent tool for software validation testing.a. white box testingb. special box testingc. class box testingd. black-box testing

Answers

Answer:

d.) black-box testing

Explanation:

Software testing can be regarded as procedures/process engage in the verification of a system, it helps in detection of failure in the software, then after knowing the defect , then it can be corrected. Black Box Testing can be regarded as a type of software testing method whereby internal structure as well as design of the item under test is not known by one testing it. In this testing internal structure of code/ program is unknown when testing the software, it is very useful in checking functionality of a particular application. Some of the black box testing techniques commonly used are; Equivalence Partitioning, Cause effect graphing as well as Boundary value analysis. It should be noted that the purpose of black-box testing is to isolate the behavior of a given component of software.

having a bad day? enjoy this front view of phinias (can't spell his name)​

Answers

Answer:

ouch what happened to him

congrats you ruined my childhood

(thanks for the free points!!)

Is it important to use varied methods when creating digital media presentations? Why or why not?


Yes, because no one method is capable of adequately delivering the information.

No, because using more than one method is confusing to the audience.

No, because the different methods are incompatible with each other.

Yes, because it makes the presentation more interesting for the audience.

Answers

The answer is yes becuase no one method is capable one becuase I took the test on edge

In Python, which of the following would correctly display the output PROGRAMMING ROCKS?


Print: "PROGRAMMING ROCKS"

print(PROGRAMMING ROCKS)

print = ("PROGRAMMING ROCKS")

print("PROGRAMMING ROCKS")

Answers

Answer:

print("PROGRAMMING ROCKS")

Explanation:

See attached image for runtime proof :)

Answer:

print("PROGRAMMING ROCKS")

Explanation:

I took the test and got it right!

Oozie is still using a parameter called _______ to identify the YARN arguments as they are yet to create a new parameter for YARN itself.

Answers

Answer:

Job Tracker

Explanation:

Given that JobTracker is a term in computer engineering that describe the main or primary point whereby users can maintain and start submitting and tracking MR jobs in a network environment.

Hence, it can be concluded that Oozie is still using a parameter called JOB TRACKER to identify the YARN arguments as they are yet to create a new parameter for YARN itself.

Oozie is still using a parameter called Job Tracker

The following information should be considered:

JobTracker is a term in computer engineering that reoresent the main or primary point in which users can maintain,  start submitting, and tracking MR jobs in a network environment.It identified the YARN arguments for developing the new parameter.

Learn more: brainly.com/question/17429689

why does this site suck so much?
Like why do I have to pay MONEY to get answers?

Answers

Answer:

you can answer ppl question to get points to ask questions

Explanation:

thats what i do and its free

Answer:

Money :))

They get revenue off of ads and that cash from your purchases to keep the site and themselves running.

AND REMEMBER: NOTHING IS FREEEEEEE

Explain the essence of referential integrity that is implemented through the use of referential actions in a database.

Answers

Answer:

Explained below

Explanation:

Referential integrity is a database feature that's part of systems known as relational database management.

It is important because it ensures that the relationship which exist between the tables in a database will remain accurate by applying constraints in order to prevent users or even applications from entering data that's inaccurate or pointing to a data that does not exist.

g Assume that this program is run on a processor with data cache of size big enough that the entire array arr can fit in the cache. (a) How many paths does the function foo of this program have

Answers

Answer:

A. 2

Explanation:

The food function in the C source code uses two for loop statements to fill and array of size 100 with 100 values ranging from 1 to 100 and the second to get the total sum to the values in the array. With this, two program paths are created.

Other Questions
PLEASE HELP!! Which inequality represents the phrase "the sum of a number and 3 is at least 15"?A. x + 3 >15B. x + 3 What is it that lives if it is fed, and dies if you give it a drink? Please please please please help me please how can you best classify this molecule. A) carboxylic acid. B) Alcohol C) Ester D) Amine Qu deportes puedes practicar en el Club Verano?A. Natacin y bisbolB. Tenis y bisbol.C. Ftbol, tenis, y natacin. D. Natacin y tenis. Should you be worried about the direction that a plants stem will grow if you plant the seeds on their sides? Why or why not? Garden A has area 25 square meters. Garden B has area 58.7 square meters. The area of garden B is what percent of the area of garden A? First round the area of garden B to the nearest 10 square meters estamate the answer A transformation that does not change the size or shape of a geometric object is known as which of the following?A an identity transformB a complete mappingC a congruent movementD a rigid motion Please help me...Which statement is true for digital portfolios?A It occupies large space. B. It is difficult to store. C. It is difficult to update digital portfolios.D. It is portable. Which human activity contributes the MOST Carbon dioxide to the atmosphere?A. FishingB. BreathingC. Burning Fossil FuelsD. i Farming What type of force is magnetic force? *Strong Nuclear forceNon-contact forceContact force. Weak Nuclear force Find the area of the semicircle. Round your answer to the nearest hundredth. Compare this map to the maps in the Background Essay and Document A. Why do you think the government decided to move people out of the northern province of Tigray? The set of ordered pairs below represents a function.{(9, 1), (5, 2), (0, 7), (1, 3), (6, 10)}Josiah claims that the ordered pair (6, 10) can be replaced with any ordered pair and the set will still represent a function.Select all ordered pairs that could be used to show that this claim is incorrect. (9, 6) (1, 12) (10, 10) (4, 7) (5, 1) need help with this question What was the major appeal of Andrew Jackson during the election of 1828? Which point shows the prevailing westerlies?O1O 2O3O4 Would you use tu or usted to address these people? Plz i NEED HELP ABOUT TO FINISH THIS CLASS! PLZ17. Does the following system have a unique solution? Why? What are the similarities and differences between Patriots and Loyalists?