Which of the following could Kim, a network technician, use to find the approximate location of a break in a long network cable?

A. Protocol analyzer
B. Time domain reflectometer
C. Toner probe
D. Multimeter

Answer: B. Time domain reflectometer

Computer Science & Information Technology

You might also like to view...

The open systems interconnection (OSI) model is inefficient; each layer must take the work of higher layers, add some result, and pass the work to lower layers. This process ends with the equivalent of a gift inside seven nested boxes, each one wrapped and sealed. Surely this wrapping (and unwrapping) is inefficient. From reading earlier chapters of this book, cite a security advantage of the

layered approach. What will be an ideal response?

Computer Science & Information Technology

Which of the following is NOT a reason to specify the image width and height for a web page image?

A. the image is downloaded faster B. so the browser can reserve space C. to preserve the look of the layout D. the text on the page will load faster

Computer Science & Information Technology