1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
timurjin [86]
1 year ago
10

After 4th collision in ethernet, find the maximum time that the adapter waits until sensing the channel again for a 100 mbps bro

adcast channel?
Computers and Technology
1 answer:
VARVARA [1.3K]1 year ago
3 0

Waiting time for a 100 Mbps broadcast channel is 0.512 ms

Recall that with the CSMA/CD protocol, the adapter waits K * 512 bit times after a collision,

where K is drawn randomly. For K = 100,

The one bit time for 10 Mbps is 1/10000000 s = 0.0001 ms

The one bit time for 100 Mbps is 1/100000000 s = 0.00001 ms

Waiting time for a 10 Mbps broadcast channel is K*512*0.0001= 5.12 ms

Waiting time for a 100 Mbps broadcast channel is K*512*0.00001= 0.512 ms

<h3>What is a collision in Ethernet?</h3>
  • A collision happens on a half-duplex Ethernet network when two devices on the same network attempt to communicate data at the exact same time.
  • The two transmitted packets are "collapsed" by the network, which results in the network discarding both of them.
  • On Ethernets, collisions are unavoidable.
  • A collision is a momentary interaction between two bodies or more than two bodies at once that modifies the motion of the bodies involved as a result of the internal forces at work.
  • Collisions entail the application of force (there is a change in velocity).

Learn more about collision in Ethernet: brainly.com/question/14123270

#SPJ4

You might be interested in
How does a computer work
ivann1987 [24]

Answer:

computer works on electricity

Explanation:

6 0
2 years ago
What does choosing Slide Sorter view do?
elixir [45]

Answer:

The last two line i.e "displays miniature versions of all the  presentation's slides​  " is the correct answer to the given question .

Explanation:

The main objective of the slide sorter is showing the miniature versions of all the slides though user can quickly push the slides and organize the slides in well mannered by moving the slides . The Slide Sorter display gave the viewers to thumbnail the overview of the slides.

  • The slide sorter making the presentation effective by organizing and sorting the slide .
  • All the other option are not correct for the  Slide Sorter view that's why these are incorrect option .
3 0
3 years ago
____ policy establishes criteria for classifying and securing the organization's information in a manner appropriate to its leve
pav-90 [236]

Answer:

Correct Answer is (d) Information sensitivity policy

Explanation:

Information sensitivity policy establishes the criteria for classifying and securing the organization's information in a manner that is appropriate to its level of security.

However, other options are incorrect. Server security can be established only on servers and on information/data that is in the server from unauthorized access. While VPN security is used for protecting network and encryption is used to encrypt data from illegal access.

However, only information sensitivity policy is used for classifying and securing organization information to the outside world.

The intention of information sensitivity policy:

The intention of using any information sensitivity policy is to help the employee to determine what information can be disclosed to non-employee, as well as the relative sensitivity of the information that should not be disclosed outside of the company without proper permission or authorization from supreme leadership of an organization.

7 0
3 years ago
Namespaces cannot have namespaces as members.<br><br> True<br><br> False
Anna71 [15]

Answer:

False

Explanation:

namespaces can be nested. That is we can have a hierarchy of namespaces.

For examples suppose we have a namespace top. Within this we have another namespace first. At the next level we have a namespace called second. Then we have a class MyClass as a member of this namespace second. Then the complete description of the class will be as follows:

top::first::second::MyClass

5 0
3 years ago
What will be the code in CSS, to set
LUCKY_DIMON [66]

Answer:

font-family: Tahoma;

font-size: 7px;

text-decoration: underline;

Explanation:

As for the font-family, you can also specify the general font family to which the Tahoma font belongs.

4 0
3 years ago
Other questions:
  • Digital cameras are less susceptible to UV light.Select one of the options below as your answer:A. TrueB. False
    15·2 answers
  • An analyst is reviewing the logs from the network and notices that there have been multiple attempts from the open wireless netw
    13·1 answer
  • The mathematical constant Pi is an irrational number with value approximately 3.1415928... The precise value of this constant ca
    12·1 answer
  • Which of the following defines a network
    7·1 answer
  • 3n - 12 = 5n - 2<br> how many solutions?
    15·1 answer
  • Project: big research project
    15·2 answers
  • An IT security threat is anything that might cause serious harm to a computer system, including someone stealing a laptop that c
    8·2 answers
  • How many questions have you seen so far other than this one?
    10·2 answers
  • Ssssssssssssssssssssssssssssssssssssssssssssssssss 100 points for this answer too.
    10·1 answer
  • What is the second row of letters in the keyboard called?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!