Which of the following could Kim, a network technician, use to find the approximate location of a break in a long network cable?
A. Protocol analyzer
B. Time domain reflectometer
C. Toner probe
D. Multimeter
Answer: B. Time domain reflectometer
You might also like to view...
The open systems interconnection (OSI) model is inefficient; each layer must take the work of higher layers, add some result, and pass the work to lower layers. This process ends with the equivalent of a gift inside seven nested boxes, each one wrapped and sealed. Surely this wrapping (and unwrapping) is inefficient. From reading earlier chapters of this book, cite a security advantage of the
layered approach. What will be an ideal response?
Which of the following is NOT a reason to specify the image width and height for a web page image?
A. the image is downloaded faster B. so the browser can reserve space C. to preserve the look of the layout D. the text on the page will load faster