g 1-1 Which network model layer provides information about the physical dimensions of a network connector like an RJ45

Answers

Answer 1

Answer:

Physical layer

Explanation:

OSI model stands for Open Systems Interconnection. The seven layers of OSI model architecture starts from the Hardware Layers (Layers in Hardware Systems) to Software Layers (Layers in Software Systems) and includes the following;

1. Physical Layer

2. Data link Layer

3. Network Layer

4. Transport Layer

5. Session Layer

6. Presentation Layer

7. Application Layer

Each layer has its unique functionality which is responsible for the proper functioning of the communication services.

In the OSI model, the physical layer is the first and lowest layer. Just like its name physical, it addresses and provides information about the physical characteristics such as type of connector, cable type, length of cable, etc., of a network.

This ultimately implies that, the physical layer of the network (OSI) model layer provides information about the physical dimensions of a network connector such as a RJ45. A RJ45 is used for connecting a CAT-5 or CAT-6 cable to a networking device.


Related Questions

Over-activity on LinkedIn?

Answers

Answer:

Being over-enthusiastic and crossing the line always get you in trouble even if you’re using the best LinkedIn automation tool in the world.  

When you try to hit the jackpot over the night and send thousands of connection requests in 24 hours, LinkedIn will know you’re using bots or tools and they will block you, temporarily or permanently.    

This is clearly against the rules of LinkedIn. It cracks down against all spammers because spamming is a big ‘NO’ on LinkedIn.    

What people do is that they send thousands of connection requests and that too with the same old spammy templates, “I see we have many common connections, I’d like to add you to my network.”    

It will only create spam.    

The LinkedIn algorithm is very advanced and it can easily detect that you’re using a bot or LinkedIn automation tool and you’ll be called out on it.

Write an algorithm to solve general formula? ​

Answers

Answer:

2+2=4

Explanation:

simple math cause of that bubye

You are consulting with another medium sized business regarding a new database they want to create. They currently have multiple normalized source databases that need consolidation for reporting and analytics. What type of database would you recommend and why

Answers

Answer:

The enormous amount of data and information that a company generates and consumes today can become an organizational and logistical nightmare. Storing data, integrating it and protecting it, so that it can be accessed in a fluid, fast and remote way, is one of the fundamental pillars for the successful management of any company, both for productive reasons and for being able to manage and give an effective response to the customers.

Good big data management is key to compete in a globalized market. With employees, suppliers and customers physically spread across different cities and countries, the better the data is handled in an organization, the greater its ability to react to market demand and its competitors.

Databases are nowadays an indispensable pillar to manage all the information handled by an organization that wants to be competitive. However, at a certain point of development in a company, when growth is sustained and the objective is expansion, the doubt faced by many managers and system administrators is whether they should continue to use a database system, or if they should consider the leap to a data warehouse. When is the right time to move from one data storage system to another?

please give me correct answer

please give me very short answer​

Answers

Answer:

1.A table is a range of data that is defined and named in a particular way.

2.Table tools and layout

3.In insert tab Select the table and select the number of rows and colums

4.Split cell is use to split the data of a cell.Merge cell is used to combine a row or column of cells.

5.Select the cell and click down arrow next to the border button.

Write a program that uses linear recursion to generate a copy of an original collection in which the copy contains duplicates of every item in the original collection. Using linear recursion, implement a function that takes a list as user-supplied runtime input and returns a copy of it in which every list item has been duplicated. Given an empty list the function returns the base case of an empty list.

Answers

Answer: b

Explanation:

Program using linear recursion to duplicate items in a list:

def duplicate_list(lst):

   if not lst:

       return []

   else:

       return [lst[0], lst[0]] + duplicate_list(lst[1:])

# Example usage

user_input = input("Enter a list of items: ").split()

original_list = [item for item in user_input]

duplicated_list = duplicate_list(original_list)

print("Duplicated list:", duplicated_list)

How can a program use linear recursion to duplicate items in a list?

By implementing a function that utilizes linear recursion, we can create a copy of an original list with duplicated items. The function duplicate_list takes a list lst as input and checks if it is empty. If the list is empty, it returns an empty list as the base case.

Otherwise, it combines the first item of the list with itself and recursively calls the function with the remaining items (lst[1:]). The duplicated items are added to the resulting list. This process continues until all items in the original list have been duplicated and the duplicated list is returned.

Read more about linear recursion

brainly.com/question/31313045

#SPJ2

cloud offers better protection compare to on premise?​

Answers

Why is cloud better than on-premise? Dubbed better than on-premise due to its flexibility, reliability and security, cloud removes the hassle of maintaining and updating systems, allowing you to invest your time, money and resources into fulfilling your core business strategies.

The security of the cloud vs. on-premises is a key consideration in this debate. Cloud security controls have historically been considered less robust than onprem ones, but cloud computing is no longer a new technology. . A company running its own on-premises servers retains more complete control over security.

Believe it!!

Pls follow me.

python is an example of a low level programming language true or false?​

Answers

False- python is an example of a high level language. Other high levels are c++, PHP, and Java

You want to remind users of the acceptable usage policy that applies to all computer systems in your organization, so you decide to display a message after the user logs in. The full path and filename to the file you would edit is

Answers

It should always be changed to show one message informing customers of the approved user policy which applies to every one computer network within our organization.The "motd" was its filename of a modified version of such a file that displays any messages after logging in.The document should be modified when the message is to be displayed before a user logs in.Please find the attached file for the complete solution.

Learn more:

user logs: brainly.com/question/7580165

Java there are n coins each showing either heads or tails we would like all the coins to form a sequence of alternating heads and tails what is the minimum number of coins that must be reversed to achieve this

Answers

El número mínimo de monedas que se deben invertir para lograr esto:

45 moas

write a programmimg code in c++ for school based grading system, the program should accept the subject in the number of students from a user and store their details in the array of type student(class) the student class you have:
1. number student name, index number remarks as variables of type string, marks as integer and grade as char.
2. avoid function called getData which is used to get student details
3. avoid function called calculate which will work on the marks and give the corresponding great and remarks as given below on
Marks 70-100 grade A remarks excellent Mark 60-69 Grade B remarks very good marks 50-59 grade C remarks pass maths 0-49 grade F remarks fail​

Answers

Answer:

The program is as follows:

#include <iostream>

#include <string>

using namespace std;

class Student{

string studName, indexNo, remarks; int marks;  char grade;

public:

 void getData(){

     cin.ignore();

     cout<<"ID: "; getline(cin,indexNo);

  cout<<"Name:"; getline(cin,studName);

  cout<<"Marks: ";cin>>marks;  }

 void calculate(){

  if(marks>=70 && marks<=100){

      remarks ="Excellent";       grade = 'A';   }

  else if(marks>=60 && marks<=69){

      remarks ="Very Good";       grade = 'B';   }

  else if(marks>=50 && marks<=59){

      remarks ="Pass";       grade = 'D';   }

  else{

      remarks ="Fail";       grade = 'F';   }

  cout << "Grade : " << grade << endl;

  cout << "Remark : " << remarks << endl;  }

};

int main(){

int numStudents;

cout<<"Number of students: "; cin>>numStudents;

Student students[numStudents];

for( int i=0; i<numStudents; i++ ) {

 cout << "Student " << i + 1 << endl;

 students[i].getData();

 students[i].calculate(); }

return 0;}

Explanation:

This defines the student class

class Student{

This declares all variables

string studName, indexNo, remarks; int marks;  char grade;

This declares function getData()

public:

 void getData(){

     cin.ignore();

Prompt and get input for indexNo

     cout<<"ID: "; getline(cin,indexNo);

Prompt and get input for studName

  cout<<"Name:"; getline(cin,studName);

Prompt and get input for marks

  cout<<"Marks: ";cin>>marks;  }

This declares funcion calculate()

 void calculate(){

The following if conditions determine the remark and grade, respectively

  if(marks>=70 && marks<=100){

      remarks ="Excellent";       grade = 'A';   }

  else if(marks>=60 && marks<=69){

      remarks ="Very Good";       grade = 'B';   }

  else if(marks>=50 && marks<=59){

      remarks ="Pass";       grade = 'D';   }

  else{

      remarks ="Fail";       grade = 'F';   }

This prints the grade

  cout << "Grade : " << grade << endl;

This prints the remark

  cout << "Remark : " << remarks << endl;  }

};

The main begins here

int main(){

This declares number of students as integer

int numStudents;

Prompt and get input for number of students

cout<<"Number of students: "; cin>>numStudents;

This calls the student object to declare array students

Student students[numStudents];

This is repeated for all students

for( int i=0; i<numStudents; i++ ) {

Print number

 cout << "Student " << i + 1 << endl;

Call function to get data

 students[i].getData();

Call function to calculate

 students[i].calculate(); }

return 0;}

Calculate the total time required to transfer a 500KB file in the following cases. Assume an RTT of 50ms, a packet size of 2KB, and an initial 2xRTT of handshaking before data is sent. A. If the bandwidth is 2Mbps, what is the Bandwidth-Delay Product (BDP)

Answers

Answer:

i) Total time = 2457.73 secs

ii) BDP = 0.01 Mbyte

Explanation:

Packet size : 2 Kb = ( 2 * 8192 ) bits = 16384 bits

Bandwidth : 2Mbps = 2,000,000 bits/sec

RTT = 50 ms = 0.050 secs

i) Determine total time required to transfer 500 kB

= Initial handshake + Time for transmission of all files + propagation delay

= 2 x RTT +  Time for transmission + RTT /2

Total time = ( 2 * 0.05 ) +  (1500 * 1.6384 )+ ( 0.050 / 2 ) = 2457.73 secs

ii) Determine the Bandwidth-delay product

= data link capacity * RTT

= 2 Mbps  * 50 ms =  100,000 =  0.01 MByte

Write a program that uses input to prompt a user for their name and then welcomes them. Note that input will pop up a dialog box. Enter Sarah in the pop-up box when you are prompted so your output will match the desired output.

Answers

user_name = str (input = ("Please enter your name: "))

def greet (user_name):

print ("Welcome to your ghetto, {0}!".format(user_name) )

3. Using Assume the following list of keys: 36, 55, 89, 95, 65, 75, 13, 62, 86, 9, 23, 74, 2, 100, 98 This list is to be sorted using the quick sort algorithm as discussed in this chapter. Use pivot as the middle element of the list. a. Give the resulting list after one call to the function partition. b. What is the size of the list that the function partition partitioned

Answers

Answer:

a. 36, 55, 13, 9, 23, 2, 62, 86, 95, 65,74, 75, 100, 98, 89

b. 15

Explanation:

Write a program that reads a list of 10 integers, and outputs those integers in reverse. For coding simplicity, follow each output integer by a space, including the last one. Then, output a newline. coral

Answers

def reverse_list (num_list):

try:

if num_list.isdigit() == True:

return num_list[::-1]

elif num_list < 0:

return "Negative numbers aren't allowed!"

except ValueError:

return "Invalid input!"

user_list = list (int (input ("Please enter ten random positive numbers: " )))

print (reverse_list (user_list))

An administrator needs to protect rive websites with SSL certificates Three of the websites have different domain names, and two of the websites share the domain name but have different subdomain prefixes.
Which of the following SSL certificates should the administrator purchase to protect all the websites and be able to administer them easily at a later time?
A . One SAN certificate
B . One Unified Communications Certificate and one wildcard certificate
C . One wildcard certificate and two standard certificates
D . Five standard certificates

Answers

Answer:

Option A (One SAN certificate) is the right answer.

Explanation:

A vulnerability management certificate that permits many domain identities to be safeguarded by such a singular or unique certification, is considered a SAN certificate.Though on the verge of replacing common as well as accepted security credentials with either of these de-facto certifications.

Other alternatives are not connected to the given scenario. Thus the above option is correct.

hi, solution, help me please.​

Answers

Answer:

5hujjibjjjjjnNkzkskskwjejekekdkdkeeioee9

Answer:

is it infinity ? let me know

with the aid of examples explain the differences between open source software and licensed software​

Answers

Answer:

Explanation:

Source is when a company go no limits to run the software but can easily be taken done by a complaint or two or a bug while a licensed it a protected version of the software.

If your organization hires a new employee, what would you do to create a user account in the Linux system and add the account to a group? What commands would you use? What configuration files would you check and modify?

Answers

Following are the responses to this question:

The user account is "olivia".In the Linux system to see the account go to the "/home directory".For the configuration file we use ".bash_logout , .bash_profile, and .bashrc" files.

Creating users:

We will use the useradd command to achieve this. Using that same command, you can create users who would log in or customers who would log in (in the case of creating a user for a software installation).

In its basic form, the command is as follows:

[Options] useradd username

Take this user olivia, for instance. Assuming that you had been to issue the command prompt:

olivia has become a user.

Users are added to the system without the need for a home directory and are unable to log on. It if we were using this rather than running the command without arguments?

sudo using useradd -m olivia

Using the command above, a new user would be created, including a home directory that corresponded to the username. That means that you might now see the name "olivia" in the directory "/home".

But what about the lockout concern that was raised earlier? Both these methods are possible. After creating the user, you can enter the following command:

Password for olivia is: sudo passwd olivia

You'll be requested to enter & verify your new password once you've completed the process. This unlocks the user profile, allowing them to log in.

This command might look like if you wanted to accomplish it in one go:

sudo useradd -m olivia -p PASSWORD

You should be using Passcodes as the login for the user olivia.

As soon as the user logs in, he or she can update their account password by using the password command to input their current password, and afterward entering/verifying their new one.

To create a user that has no personal account and cannot log in, execute the following instructions:

sudo use useradd as  the-M USERNAME ​sudo use usermod as the -L USERNAME

The user to be added is identified by USERNAME.

It establishes a user with really no root folder and prevents them from signing in with a second operation.

To add an existing user to a group on Linux, follow the instructions:

As root, log in to your accountUse the useradd instruction to add a new user (for example, useradd roman)If you'd like to log on as a new customer, type su plus that user's name.Entering the word "exit" will logout you from your account.

Another way to add a user to a group under Linux would be to use the following syntax:

Alternatively, you can use the usermod command.The name of the club should be substituted for example group in this sentence.Example username should be replaced with the name of the user you'd like added.

The following operations are performed when a new login is added to the system.

The user's home directory (/home/username by default) is now created.To set configuration files for the user's session, the following secret files are copied into another user's home directory.

.bash_logout

.bash_profile

.bashrc

/var/spool/mail/username includes the user's mail spool.The new user account is arranged in groups with the same name.

Learn more:

Linux system: brainly.com/question/13843535

Give minimum computers configuration that can be used by a law firm.​

Answers

Answer:

Processor: Intel i3, i5, or i7 processor or equivalent. Memory: 8 GB or more. Hard Disk Storage: 500 GB or more. Display: 13-inch or larger.

Explanation:

The lowest computers configuration that can be used are:

Operating System: such as MacOS 10.14. Windows 10 or higher version.Processor: such as Intel i3, i5, or i7 processor or others.Memory: 8 GB and more.Hard Disk Storage: 500 GB and more.Display: such as 13-inch or more.

What is  Configuration of a system?

This is known to be the ways that the parts are said to be arranged to compose of the computer system.

Note that in the above case, The lowest computers configuration that can be used are:

Operating System: such as MacOS 10.14. Windows 10 or higher version.Processor: such as Intel i3, i5, or i7 processor or others.Memory: 8 GB and more.Hard Disk Storage: 500 GB and more.Display: such as 13-inch or more.

Learn more about computers from

https://brainly.com/question/26021194

#SPJ9

different types of computer and state the major difference between them​

Answers

Answer:

computers system may be classified according to their size.

four types of computers are;

microcomputers / personal computers- micro computers are also called personal computers which is PC this computer came in different shapes size and colors. a personal computers are designed to be used by one person at a time.

some examples of the computer are;

laptopdesktopa palmtopa work station

2. mini computers- mini computers are sometimes called mid-range computers which are more powerful than microcomputers and can support a number of users performing different tasks, they were originally developed to perform specific tasks such as engineering calculations.

3. Mainframe computers- Mainframe computers are larger systems that can handle numberous users, store large amounts of data and process transaction at a high rate. these computers are expensive and powerful.

4. super computers- super computers are the most largest, fastest and most powerful computer. this systems are able to process hundreds of million of instructions per second they are used for job requiring and long complex calculation.

outline three difference each of a raster filled and vector file​

Answers

Answer:

Unlike raster graphics, which are comprised of colored pixels arranged to display an image, vector graphics are made up of paths, each with a mathematical formula (vector) that tells the path how it is shaped and what color it is bordered with or filled by.

Explanation:

Write a program that prompts the user to input an integer that represents cents. The program will then calculate the smallest combination of coins that the user has. For example, 27 cents is 1 quarter, 0 nickel, and 2 pennies. That is 27=1*25+0*5+2*1.
Example program run 1:
Enter number of cents: 185
Pennies: 0
Nickels: 0
Dimes: 1
Quarters: 7
Example program run 2:
Enter number of cents: 67
Pennies: 2
Nickels: 1
Dimes: 1

Answers

Answer:

The program in Python is as follows:

cents = int(input("Cents: "))

qtr = int(cents/25)

cents = cents - qtr * 25

dms = int(cents/10)

cents = cents - dms * 10

nkl = int(cents/5)

pny = cents - nkl * 5

print("Pennies: ",pny)

print("Nickels: ",nkl)

print("Dimes: ",dms)

print("Quarters: ",qtr)

Explanation:

The program in Python is as follows:

cents = int(input("Cents: "))

This calculate the number of quarters

qtr = int(cents/25)

This gets the remaining cents

cents = cents - qtr * 25

This calculates the number of dimes

dms = int(cents/10)

This gets the remaining cents

cents = cents - dms * 10

This calculates the number of nickels

nkl = int(cents/5)

This calculates the number of pennies

pny = cents - nkl * 5

The next 4 lines print the required output

print("Pennies: ",pny)

print("Nickels: ",nkl)

print("Dimes: ",dms)

print("Quarters: ",qtr)

Tuesday
write the
correct
answer
Text can be celected using
2 A mouse
device of
is
ch
3 Scrolls bars are
buttons which assist
upwards downwards
sideways to
skole

Answers

Answer:

?

Explanation:

these are instructions to a question?

The basic idea behind DNSSEC is a. providing name resolution from a hostname to an IP address b. ensuring that only local authoritative nameservers have the authorization to contact nameservers higher in the hierarchy (i.e., TLD nameservers, root nameservers) c. encrypting each DNS response so that it cannot be read by a third-party d. authenticating that the data received in a DNS response is the same as what was entered by the zone administrator (i.e., the response has not been tampered with)

Answers

Answer:

authenticating that the data received in a DNS response is the same as what was entered by the zone administrator

You are the network administrator for the ABC Company. Your network consists of two DNS servers named DNS1 and DNS2. The users who are configured to use DNS2 complain because they are unable to connect to internet websites. The following shows the configuration of both servers:

Server Configurations:

DNS1: _msdcs.abc.comabc.com
DNS2: .(root)_msdcs.abc.comabc.com

The users connected to DNS2 need to be able to access the internet. What should be done?

Answers

Answer:

ABC Company

The action to take is to:

Delete the .(root) zone from the DNS2.  Then configure conditional forwarding on the DNS2 server.  If this is not done, the users will be unable to access the internet.

Explanation:

DNS forwarding enables DNS queries to be forwarded to a designated server, say DNS2, for resolution according to the DNS domain name.  This stops the initial server, DNS1, that was contacted by the client from handling the query, thereby improving the network's performance and resilience and enabling the users to be connected to the DNS2 in order to access the internet.

Suppose a Huffman tree is to be built for 5 characters. Give a set of 5 characters, and their distinct probabilities (no duplicates), that would result in the tallest possible tree. Show the tree. Derive the average code length: write the expression, you don't have to simplify it down to a single value.

Answers

I love chipotle do you live chipotle

] Write a Java program to build an integer HashSet from scratch without using any built-in hash libraries. Your program should include these functions: a. insert (value): Insert any integer of your choice into the HashSet. b. contains(value) : Check the HashSet for the "value". Return "True" if the particular integer exists in the HashSet else return "Hey Nothing there".

Answers

Answer:

Explanation:

The program was written in Java, it created the HashSet and the two seperate functions. Each of the functions uses the created HashSet and input values from the user to perform the appropriate actions on the HashSet. While also returning or printing the values if needed. The program has been tested and can be seen in the attached image below. Due to technical difficulties I have added the code as a txt file below as well.

tinh S(n) = 1+2+3+.....+n

Answers

Answer:

-1/12

Explanation:

[tex]\sum_{k=0}^{k=n} k = \frac{n(n+1)}{2}\\[/tex]

look up the derivation by Srinivasa Ramanujan for a formal proof.

Illustrate why sally's slide meets or does not not meet professional expectations?

Answers

Your missing info to solve this

Write a recursive function stringReverse that takes a string and a starting subscript as arguments, prints the string backward and returns nothing. The function should stop processing and return when the end of the string is encountered. Note that like an array, the square brackets ( [ ] ) operator can be used to iterate through the characters in a string.

Answers

Answer:

void stringReverse(string s, int start){

   if(s[start]=='\0'){

       return;

   }

   else{

       stringReverse(s.substr(1,s.length()-1),start+1);

       cout<<s[start];

   }

}

Explanation:

Other Questions
Jack and Diane are jogging back and forth along a one-mile path. They started out at 9:00 A.M. from opposite ends of the path. They passed each other in 10 minutes when Diane has gone 1/3 mile. What time will they first meet at one end of the path? You have to assume they keep jogging at the same speeds.Explain : Read the passage below from Marigolds and answer question.Miss Lotties house was the most ramshackle of all our ramshackle homes. The sun and rain had long since faded its rickety frame siding from white to a sullen gray. The boards themselves seemed to remain upright not from being nailed together but rather from leaning together, like a house that a child might have constructed from cards. A brisk wind might have blown it down, and the fact that it was still standing implied a kind of enchantment that was stronger than the elements. There it stood and as far as I know is standing yeta gray, rotting thing with no porch, no shutters, no steps, set on a cramped lot with no grass, not even any weedsa monument to decay.The passage above is an example of which point of view?First personThird-person limitedThird-person omniscientSwitches between first-person and third-person limited There are 2 types of endoplasmic reticulums.Plz explain, i will give brainliestWhat are the 2 types?How are they different from one another?Explain how their structures are different.Explain how their functions (jobs) or what they make are different. A theory is an explanation while a model is a representation identify and describe the meeting point of the two concepts Solve for x. Round to the nearest tenth, if necessary. g In the year 2005, the age-adjusted death rate per 100,000 Americans for heart disease was 222.3. In the year 2009, the age-adjusted death rate per 100,000 Americans for heart disease had changed to 213.4. a) Find an exponential model for this data, where t How would the domain and range of the function y = one-fourth x minus 6 be determined? Explain. The federal government played an important role in assisting the development of industry. True False I am so lost Helppp! step by step would be great and any links would help! they help me ? is the last someone please find the value of x to the nearest tenth Find the next year's net income for XYZ Inc. Next year, the sales grow by 25%. The current sales $300 million, and the current profit margin is 10% and you expect it to remain constant. Find the length of side AB.Give your answer to 1 decimal place.12 cm62AB Solve the following linear quadratic system of equations algebraically.y=^2+3x-2y+3=5x pada hari kantin sebanyak 800 naskah kupon telah dijual,harga senaskah kupon masing masing rm 30 dan rm 50 .jumlah wang diperoleh hasil daripada jualan kupon ialah rm30000.berapa naskah kupon rm30 dan rm50 yang telah dijual? Costs associated with two alternatives, code-named Q and R, being considered by Albiston Corporation are listed below: Alternative Q Alternative R Supplies costs$79,000 $79,000 Power costs$36,600 $35,600 Inspection costs$32,000 $35,600 Assembly costs$48,000 $48,000 Required: a. Which costs are relevant and which are not relevant in the choice between these two alternatives 2. Resolve into factors.a) 8x3 + y3 A box contains 5 orange pencils, 8 yellow pencils, and 4 green pencils.Two pencils are selected, one at a time, with replacement.Find the probability that the first pencil is green and the second pencil is yellow.Express your answer as a decimal, rounded to the nearest hundredth. express 3 as a percent of 5 What is the difference between noun clause/ adverb clause/ adjective clause.It is very confusing can anyone to me.....I am not getting it...please:)