Three Cat 5e cables were run from an office area to three computers in a machine shop. Work took place on the weekend when the machine shop was closed. The network is using 1000BaseT switches and all the NICs are 1000BaseT compatible. The longest run of cable is 85 meters. All cabling was certified and network connectivity was verified. On Monday, the users of the computers report very slow network performance and the switch reports CRC errors. What is the most likely reason for the problems
Answer:
External EMI/RFI
Explanation:
The EMI stands for Electromagnetic interference. It is a radio frequency spectrum which is disturbance that is created by the external source which affects the electric circuit by an electromagnetic induction or conductance. It is also called as the RFI or the radio-frequency interference.
In the context, the three Cat 5e cable were run from the office area to the three computers in the machine shop. The users reports a problem of a very slow network performance and also the switch reports CRC errors. This is mainly caused due to the external EMI or the external RFI.
The part of an HTML document where the CSS file is linked is the..?
A) body
B) footer
C) header
D) paragraph
Answer:
C) header
Explanation:
HTML is an acronym for hypertext markup language and it is a standard programming language which is used for designing, developing and creating web pages.
Generally, all HTML documents are divided into two (2) main parts; body and head.
The head (header) contains information such as version of HTML, title of a page, metadata, link to custom favicons and cascaded style sheet (CSS) etc.
On the other hand, the body of a HTML document contains the contents or informations that a web page displays.
Hence, the part of an HTML document where the cascaded style sheet (CSS) file is linked is the header. A style sheet can be linked to an HTML document by three (3) main methods and these are;
I. External style.
II. Inline style.
III. Embedded (internal) style.
13) When developing film, how do you dispose of fixer as opposed to developer?
A) Fixer is poured down the drain while developer can be reused.
B) Developer is poured down the drain while fixer can be reused.
C) Both developer and fixer can be poured down the drain.
D) I don't know.
Answer:
B) Developer is poured down the drain while fixer can be reduced
Explanation:
The effluents produced during photographic processing includes, wash water, bleach, fixer, and developer
The developer is an alkaline solution, with a pH of approximately 10.0, while the pH of the fixer is about 4.3, it is therefore, acidic
The rate of discharge of the developer to the fixer is 2 to 1, and the exhausted developer, fixer and process effluents combined are neutral and can be handle by the the treatment works and the drain pipes
Fixer which remain clear can be reused for more than a day, while the spent basic Developer and the acidic Spent Stop Bath can be combined to form a neutral solution, having a pH of approximately 7, which make them less hazardous to be disposed off down the sink into the drain
Therefore, developer is poured down the drain while fixer can be reused
What tab appears that allows for charts to be formatted when a chart is selected?
Explain how the use of the internet has allowed people to achieve some
normalcy during the Current Pandemic
I don't know if this is going to help you or not because I'm only 13 but let me know if it helps people can now talk to one another more effectively because of things like zoom and it's become more efficient to work at home because we can have online meetings
Mary recently read about a new hacking group that is using advanced tools to break into the database servers of organizations running public websites. In risk management language, what term is used to describe a hacking group? Group of answer choices Risk Threat Actor Vulnerability Standard
Answer:
Threat
Explanation:
In risk management, the hacking group would be considered a Threat. This is because a threat is anything that is able to analyze, find, and take advantage of vulnerabilities of your system. This applies regardless of the intentions of the group. In this case, the hacking group is using various tools to exploit specific existent vulnerabilities in Mary's companies database servers and would therefore classify as a Threat. In risk management, this is serious and is usually a priority that needs to be dealt with.
Match each with the correct answer.
1. Practice 4.2
Match the CPU part to its definition.
1. ________ arithmetic logic unit. (ALU)
2. ________ bus unit.
3. ________ cache.
4. ________ control unit.
5. ________ decode unit.
6. ________ regular unit.
-options
A. Decodes instructions and data and transmits the data to other areas in an understandable format.
B. Contains many separate, smaller storage units.
C. Connects all the other major components together, accepts data, and sends data through the input and output bus sections.
D. Control of the overall operations of the CPU.
E. Performs mathematical functions on data stored in the register area.
F. Small temporary memory area that separates and stores income data and instructions.
Answer:
1. E
2. C
3. F
4. D
5. A
6. B
Explanation:
CPU: this is known as the central processing unit and it is considered to be the brain of a computer system. It is the system unit where all of the processing and logical control of a computer system takes place.
A. Decode unit: decodes instructions and data and transmits the data to other areas in an understandable format.
B. Register unit: contains many separate, smaller storage units. Modern CPUs need only a few nanoseconds to execute an instruction when all operands are in its registers.
C. Bus unit: it is used to connect all the other major components together, accepts data, and sends data through the input and output bus sections.
D. Control unit: control of the overall operations of the CPU. The component of the central processing unit (CPU) that controls the overall operation of a computer is the control unit. It comprises of circuitry that makes use of electrical signals to direct the operations of all parts of the computer system. Also, it instructs the input and output device (I/O devices) and the arithmetic logic unit how to respond to informations sent to the processor.
E. Arithmetic logic unit (ALU): performs mathematical functions on data stored in the register area.
F. Cache: small temporary memory area that separates and stores income data and instructions.
If you have an ordered list of all the states in North America, and you want to add a title "States of North America", what tag will you use?
A.
B.
C.
D.
Answer:
B
Explanation:
I think that is the answer
for my assignment 2: Room area assignment, I keep getting a negative number for room 2, and I don't know why I'm getting the wrong answer because i copied a girl that got 100.
Answer:
The program in Python is as follows:
A = int(input("Side A: "))
B = int(input("Side B: "))
C = int(input("Side C: "))
D = int(input("Side D: "))
E = int(input("Side E: "))
A1 = A * B
A2 = (D - B - E)*(A - C)
A3 = 0.5 * E * (A - C)
Area = A1 + A2 + A3
print("Area:",Area)
Explanation:
One reason, you're getting a negative answer is that you probably entered a greater value for side C than A. Side A is meant to be greater than side C. Since the program do not need to be validated, you have to be careful with your inputs.
Another reason could be that your program is incorrect.
Get input for sides A to E
A = int(input("Side A: "))
B = int(input("Side B: "))
C = int(input("Side C: "))
D = int(input("Side D: "))
E = int(input("Side E: "))
Calculate rectangle area 1 (A1)
A1 = A * B
Calculate rectangle area 2 (A2)
A2 = (D - B - E)*(A - C)
Calculate the triangle area 3 (A3)
A3 = 0.5 * E * (A - C)
Calculate the total area
Area = A1 + A2 + A3
Print the calculated area
print("Area:",Area)
Select the software which is used to convert audio data to text .
Answer:
The process of converting an audio file into a text file is audio transcription. That can include any audio recording like a conference recording, an interview, an academic study, a music video clip. A lot of scenarios exist where it is easier to have a text file than to record audio.
Explanation:
These are the three main ways to transcribe audio into text.
Transcribe our transcription editor manually to the audio (FREE).Use our software for automatic transcription.Book our Services for Human Transcript.1. If you have no trouble transcribing your files for a little more, you can use our online transcription software. You can listen to the audio file while it is being transcribed by this free interactive editor so that the audio is replayed as many times as necessary. You can use both your dashboard and directly from the editor page to our free transcription editor.
2. First, by using automatic transcription software you can convert an audio file to a readable. To convert any sound recordings into a text file, Happy Scribe uses speech-to-text algorithms.
3. Another option is to hire a freelancing transcriber or to use transcription services such as Happy Scribe when converting audio to text. In order to provide highly effective transcripts, we work with the best transcripts in the world. In English, French, Spanish, and German, our human transcription is available.
The people who perform jobs and tasks are part of which factor of production?
A.land
B.scarcity
C.capital
D.labor
The people who perform jobs and tasks are part of Labor.
What is Labor?The procedure by which the placenta and fetus depart the uterus is called labor. Vaginal delivery (via the birth canal) and cesarean delivery (surgery) are the two possible methods of delivery.
Continuous, increasing uterine contractions during labor help the cervix widen and efface (thin out). The fetus can now pass through the birth canal as a result.
Typically, two weeks before or after the anticipated birth date, labor begins. However, it is unknown what precisely starts labor.
Therefore, The people who perform jobs and tasks are part of Labor.
To learn more about Labor, refer to the link:
https://brainly.com/question/14348614
#SPJ2
Help please!!!!! Drivers ed
Answer:
Away from the curb
Explanation:
by turning your wheels away from the curb if your breaks fail your car will roll back into the curb instead of into traffic.
it is necessary to interpret manufacture's specification before using any processing equipment in order to?
Answer:
a. have an accurate and safe operation of the equipment.
Explanation:
The main reason for this is to have an accurate and safe operation of th equipment. Most devices are made differently and the manufacturers' job is to make sure that the equipment works as intended and is safe for the user. The cannot control how the user uses the equipment and therefore, create the specifications so that the user will read them and understand how to properly operate the equipment so that neither the user nor the equipment gets damaged.
how many types of window in Qbasic
Answer:
QBasic consists of two windows: Program Window: The window titled as 'Untitled' is the program window. It is the place where program/code is written. Immediate Window: The window below Program Window titled as 'Immediate' is the immediate window.
1. PIN
Create a program that asks the user to enter his or her PIN. The program displays a
message if the PIN is correct. Else, it displays another message if the PIN is incorrect.
Answer:
pin the answer you fakoma
Explanation:
Please help! Why is my windows homepage like this with no desktop pictures for apps? It has like a mail logo for everything. How do I fix it?
5.What is returned by the call go(30)?
public static String go ( int x)
{
String s = "";
for (int n = x; n > 0; n = n - 5)
S = S + x +
return s;}
Answer:
The string returned is: 303030303030
Explanation:
Given
The above method
Required
The returned string
The method returns a string that is repeated x/5 times.
Take for instance;
x = 30
The method will return a string that contains x in 30/5 (i.e. 6) times
Hence, the result of go(30) is 303030303030
Dan is a nature photographer who wants to share his pictures on his blog site. He wants to retain the high quality of the pictures, regardless of file size. Which file format is best suited for this purpose?
Answer:
JPEG or jpg
Explanation:
JPEG maintains almost 100% quality and reduces file size to up to 90 or 100% of the original
Which HTML tag would you use to create a list like the one below? red blue green ol ul unorderlist orderlist
Answer:
Unordered list
Explanation:
Given
The html tag needed to create the given list
The list is not properly presented; however, the list in a properly presented question is as follows:
redbluegreenThe code to generate the above output is:
<ul>
<li>red</li>
<li>blue</li>
<li>green</li>
</ul>
When a list is generated using the <ul> ... </ul> tag, such list is an unordered list.
Answer:
ul
Explanation:
The < ul > tag is used to create an unordered list.
6. Another focus of effective communication, according to Stephen Covey, is
ensuring that:
A. O Both parties involved in a communication should leave a conversation knowing who won
and who conceded
B.O A consensus is reached at all costs
C. O No one should leave a conversation feeling like he or she lost - all effective
communication should promote a "win-win" outcome
D. O Accountability should always be assigned to determine who is at fault for problems
Answer:
C. No one should leave a conversation feeling like he or she lost - all effective communication should promote a "win-win" outcome
Explanation:
According to Stephen Covey, effective communication has to do with being able to clearly state one's opinion in such a way that the listening party or receiver would understand and give proper feedback.
Another focus of effective communication according to him is that none of the involved party ends up feeling like they lost, but rather it should be a win-win situation.
Which of the following is not a characteristic of a large database?
a) Optstore items in a filing cabinet.
b) Stores items in a computer such as music.
c) stores large amounts of items such as an online store.
d) can be used as a small recipe book.
What are SmartArt graphics?
Graphics that were predesigned by Microsoft
Images that were hand-drawn and scanned in
Graphics that were downloaded from a camera
Images that were designed for different programs
Answer:
Option A
Explanation:
SmartArt graphic are nothing but the visual representation of ideas or information by using layouts that fits the context of the presentation. These smart art graphics include - sequence diagram, venn diagram, organizational chart etc. These smart art are part of MS office programs i.e MS Word, MS Powerpoint, MS excel etc.
Hence, option A is correct
Write a loop that displays your name 10 times. 2. Write a loop that displays all the odd numbers from 1 through 49. 3. Write a loop that displays every fifth number from 0 through 100. 4. Write a code sample that uses a loop to write the numbers from 1 through 10 to a file. 5. Assume that a file named People.txt contains a list of names. Write a code sample that uses a while loop to read the file and display its contents in a ListBox control.
Answer:
Kindly check explanation
Explanation:
(1.)
n = 0
While n < 10 :
n+=1
print('fichoh')
# initiate counter n = 0 ; set condition, while n is not equal to 10 ; it print 'fichoh' and counter is increased by 1. This terminates once it reaches 10.
(2.)
for number in range(1,50):
if number%2 != 0 :
print(number)
#An odd number won't have a remainder of 0 when Divided by 2 ; so, for numbers 1 to 49 using the range function, if the number is divided by 2 and leaves a remainder other Than 0, such number is displayed
(3.)
for number in range(0,101,5):
print(number)
# Using the range function, starting from 0 to 100; it is number in the for loop is incremented by 5 and displayed.
(4.)
outfile = open('my_file.txt', 'w')
for n in range(0,11):
outfile.write(str(n))
outfile.close()
#open, 'w' creates a text file, my_text.txt and writes into it ; using the range function, numbers 0 to 10 is written into the created file.
5.)
name_file = open('People.txt', 'r')
While name_file:
out_file = name_file.readline()
if out_file = ' ' :
break
name_file.close()
names = name
#Open, 'r' ; opens and read from the file People.txt ;
#readline reads the content of the opened text file into a list out_file ; using the if ' ', the loop terminates once an empty content is read.
Write a half page summary on how to clean a Gaming PC properly.
Answer:
As a responsible PC gaming enthusiast, you simply cannot wait for spring to do a little routine cleaning on your PC. Regardless of whether you casually play or professionally game, all gaming computers are susceptible to dirt, dust, and other contaminants that can severely impact performance. Dust buildup can cause PC components to retain heat, making it difficult for internal fans to keep the system cool. As a result, the system can become less efficient and unusually slow. However, there are steps you can take to keep your gaming computer in great condition. In this article, we explain how to clean the inside of your gaming computer, so you can keep on fighting the good fight in digital worlds.Assemble the Right ToolsGaming desktops are very complex pieces of technology. Be smart by assembling the necessary tools and supplies before you begin the deep-clean process. Most of the products you need might already be sitting around the house, including compressed air cans, rubbing alcohol, white vinegar, distilled water, microfiber cloths, ear swabs, and tape.How to Clean a Gaming PCFollow these 10 steps to get back on good terms with your gaming rig.1. Disconnect the power cable, USB peripherals, as well as any audio equipment attached to your computer and safely discharge the remaining power.2. Take the computer case outside, so the dust doesn’t settle in the same room that your gaming setup is located.3. Wipe the exterior and interior of the computer case.4. Detach the dust filters and wipe away any accumulated dust. We recommend using compressed air for full coverage. If you have foam filters, gently rinse with water and leave them to dry.5. Wipe down the inside of the case by hand after disconnecting the graphics cards and RAM modules.6. If possible, remove the heatsink entirely to scrub away any gunk or debris.7. Clean off any dust hidden between the cracks of the graphics cards, so you can easily clean the motherboard.8. Remove any big clumps of dust by using a cloth dampened with rubbing alcohol.9. Use the compressed air can to clean nooks, crannies, and the motherboard. For stubborn dust spots, just dampen an ear swab with rubbing alcohol or use a gentle toothbrush to clean.10. Once the case interior is completely clean and free of dust, you can put each component back where it belongs.Routine cleaning and maintenance are important to the health of your gaming PC. We recommend using compressed air every three to six months to prevent dust buildup from impacting your PC components. You should also make an effort to clean your mouse, headphones, keyboard, and monitor to keep your gaming setup looking like new.
Explanation:
we use _____command to get data from the user? (python)
Answer:
INPUT
Explanation:
EXAMPLE PYTHON CODE
_______________________________________________________
INPUT CODE:
_______________________________________________________
foo = input('foo: ')#Have some text printed before the input field
bar = foo
print(bar)
_______________________________________________________
OUTPUT CODE:
_______________________________________________________
foo: Hello World!
Hello World!
>>> bar
'Hello World!'
>>>foo
'Hello World!'
write a paragraph describing Hinduism religious and social customs
Answer:
Hinduism is the third most populous religion in the world, and is among the oldest religions still practiced. Hinduism is in fact a way of life rather than a religion, all in the traditional Western sense. In Hinduism there are many gods and the religion is classified as a polytheistic religion but more important than worshiping the gods is still living well, and that with reincarnation finally reaches nirvana, the final stage that marks the stage when the individual is released from life.
PLEASE HELP WHATS THE ANSWER
Answer:
C
Explanation:
A ends the whole html stuff
B starts a link
D is just the file extension for html files
Ethan wants to change the font in his document. He should _____.
delete the text, select a font, and type
select a new font and highlight the text
highlight the text and select a new font
zoom in on the text, click on style, and make a selection
Answer:
C because it will work. I tried that a lot of time with documents.
Explanation:
Answer:
Ethan wants to change the font in his document. He should _____.
A. delete the text, select a font, and type
B. select a new font and highlight the text
C. highlight the text and select a new font
D. zoom in on the text, click on style, and make a selection
It is highlight the text and select a new font
Explanation:
You are a systems administrator for WestSim Corporation. As part of a new security initiative, the IT department has developed a custom application that reports the host name of all clients that try to access three sensitive servers in the Accounting department. The application has been working fine for the last three months. The company expands and adds a new building with a LAN connection to the rest of the network. This building has its own subnet, 192.168.5.0. You create a scope on an existing DHCP server for this subnet. During a random check of the reporting software, you discover that the application reports the IP address, but not the hostname for clients on the new subnet. Everything works as designed for hosts on other subnets. You check the DNS database and find that none of the hosts on that subnet have an associated PTR record. What should you do
Answer: Create a primary reverse lookup zone for subnet 192.168.5.0
Explanation:
Based on the information given in the question, the best thing to do is to create a primary reverse lookup zone for subnet 192.168.5.0.
When this is done, the reason for the application reporting of the IP address, but not the hostname for clients on the new subnet can then be known.
Outline the dangers arising as a result of using computers
Answer:
Visual impairment
Physical Health problem
Explanation:
The benefits of computers are so numerous a d has been an essential business and educational tool every organization must possess for one purpose or the other. Such is how immense its importance is. However, the computer also comes with it's own risk, which may include :
Visual impairment is a major problem most computer users face or will likely encounter in the future due to prolonged exposure of the eyes to the light emanating from the screen. This visual challenge is populary called the. Computer Vision Syndrome.
Similarly, related health related issues affecting the physical body such as the back, hip, neck pains which result from postural position when using the computer.