1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GREYUIT [131]
2 years ago
14

Given a effective delay of 99ms when network usage is 74%, what is the effective delay when network usage = 84% ?

Computers and Technology
1 answer:
NARA [144]2 years ago
3 0

148.5 ms is the effective delay when network usage = 84% .

<h3>what is a computer network?</h3>
  • A group of computers sharing resources that are available on or offered by network nodes is known as a computer network.
  • Over digital links, the computers communicate with one another using standard communication protocols.
  • These connections are made up of telecommunication network technologies, which are based on physically wired, optical, and wireless radio-frequency means and may be set up in a number of different network topologies.
  • Personal computers, servers, networking equipment, and other specialized or general-purpose hosts can all function as nodes in a computer network.
  • They can have hostnames and are identifiable by network addresses.
  • After being assigned, hostnames act as recognizable labels for the nodes and are seldom updated.
  • Network addresses are used by communication protocols like the Internet Protocol to locate and identify the nodes.

To learn more about the topic, refer to the following link

brainly.com/question/8118353

#SPJ4

You might be interested in
What is the role of computer in modern problem solving​
REY [17]

Answer:

Una computadora es una herramienta muy básica para hacer tareas repetitivas de forma más eficiente. Una computadora no es capaz de analizar un problema y obtener una solución.

Explanation:

3 0
3 years ago
A computer program that enables users to create and work with files and folders is called what?
murzikaleks [220]

Answer:

File manager

Explanation:

From the list of options 1 to 4, only option (2) is correct

Explaining the options one after the other

  • Web browser: It lets users access the internet
  • File Manager: Used to create and manage files/folders
  • User Interface: Means which the user of a computer interacts with the computer
  • File Reader: Used to read the content of a file. e.g. Adobe reader for pdf files, Notepad for text files, etc.

Having explained the options one after the other, <em>the file manager </em>is the answer to this question.

3 0
3 years ago
Read 2 more answers
Ethics issues are significant in the area of online privacy because laws have not kept pace with the growth of the Internet and
raketka [301]

Answer:

The answer is "True"

Explanation:

In the given statement some information is missing that is "True or false"

Internet security is the scope of the privacy and security of the electronic exchange of data. It's a common term that refers to something like many factors, technologies, and technology used to protect records, contact, and interests, confidential and private.

  • The security of the Internet is recognized as the privacy of the User.
  • It is secure and unique passphrases or two-factor authentication.
7 0
3 years ago
Select the correct answer.
S_A_V [24]
I think the answer is b
5 0
3 years ago
Consider a set of mobile computing clients in a certain town who each
poizon [28]

Answer: answer given in the explanation

Explanation:

We have n clients and k-base stations, say each client has to be connected to a base station that is located at a distance say 'r'. now the base stations doesn't have allocation for more than L clients.

To begin, let us produce a network which consists of edges and vertex

Network (N) = (V,E)

where V = [S, cl-l, - - - -  cl-n, bs-l - - - - - - bs-k, t]

given that cl-l, - - - - - cl-n represents nodes for the clients

also we have that bs-l, - - - - - bs-k represents the nodes for base station

Also

E = [ (s, cl-i), (cl-i,bs-j), (bs-j,t)]

(s, cl-i) = have capacity for all cl-i (clients)

(cl-i,bs-j) = have capacity for all cl-i  clients & bs-j (stations)

⇒ using Fond Fulkorson algorithm we  find the max flow in N

⇒ connecting cl-i clients to  bs-j stations

      like (cl-i, bs-j) = 1

   if f(cl-i, bs-j)  = 0

⇒ say any connection were to produce a valid flow, then

if cl-i (clients) connected                f(s,cl-i) = 1 (o otherwise)

if cl-i (clients) connected  to bs-j(stations)   f(cl-i,bs-j) = 1 (o otherwise)

   f(bs-j,t) = no of clients  (cl-i)  connected to bs-j

⇒ on each node, the max flow value (f) is longer than the no of clients that can be connected.

⇒ create the connection between the client and base station i.e. cl-l to base bs-j iff    f(cl-i, bs-j) = 1

⇒ when considering the capacity, we see that any client cannot directly connect to the base stations, and also the base stations cannot handle more than L clients, that is because the load allocated to the base statsion is L.

from this, we say f is the max no of clients (cl-i) that can be connected if we find the max flow, we can thus connect the client to the base stations easily.

cheers i hope this helps

5 0
3 years ago
Other questions:
  • A/An is a series of instructions or commands that a computer follows; used to create software
    10·2 answers
  • Keion works as a freelancer creating websites and designing logos for clients. He recently had a hard drive failure and lost wor
    7·1 answer
  • These are questions from my Computer/Customer Support Class
    6·1 answer
  • : How does the founder of Wikipedia keep a tight reign on accuracy? HELP PLEZ AT LEAST A PARGRAPH PLES
    6·1 answer
  • Assume that the int variables i and j have been declared, and that n has been declared and initialized.
    10·1 answer
  • A function is executed when it is
    7·1 answer
  • Free points,
    15·2 answers
  • Computer science - algorithms - flowcharts
    11·1 answer
  • The action of entering data into your computer. This can be text typed in a word processing document, keywords entered in a sear
    8·1 answer
  • Molly needs to access a setting in microsoft windows group policy to change the type of a network to which a computer is attache
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!