1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
balandron [24]
3 years ago
10

…………………..is made upof plastic or glass fibers that transmit data at very fastspeeds.

Computers and Technology
1 answer:
Volgvan3 years ago
4 0

Answer: Fiber optic

Explanation:

Fiber optic is made of glass fiber and they can transmit data at a relatively higher speed because they are not interfered by noise  and the property of total internal reflection enables them to transmit data without loss.

You might be interested in
Explain which implementation of the protection matrix is more suitable for the following operations___________.
Mars2501 [29]

Answer:

See explanation.

Explanation:

(a)

• To grant read access to a file for all users, access control list (ACL) is the best option.

o Create a group called 'all' with all users in it (assume the group name as 'all').

o Make a ACL for the file name with ACL as 'all:R'.

• It can also be done with capability list. With capability lists. it is sufficient to place the capability for the file in appropriate place in a capability system.

(b)

• To revoke write access for a file from all users, access control list (ACL) is the best option.

o Edit the ACL by removing the write access.

o If the group 'all: W' was the entry added to ACL, remove it from the ACL.

• It can also be done with capability list by changing the check field stored with the object.

(c)

• To grant write access to a file to John, Lisa. Christie and Jeff either the access control list method or the capability list can be used.

• It can be implemented with ACL as follows:

o Construct ACL for the file for all users,

o Then the ACL for file would be 'Christie, Jeff. John, Lisa: W'.

• It can be implemented using capability list method as follows:

o First construct the capability list for the file, 'file:W'.

o Then assign the above capability for each user named John, Lisa, Christie and Jeff.  

(d)

• To revoke execute access for a file from Jana, Mike, Molly, and Shane, access control lists are the only possibility.

o Edit the ACL by removing the execute access.

Hope this hels!

5 0
3 years ago
A computer system uses passwords that are six characters and each character is one of the 26 letters (a-z) or 10 integers (0-9).
lesantik [10]

Question continuation

Determine the following probabilities:

a. P(A)

b. P(B)

c. P(A ∩ B)

d. P(A ∪ B)

Answer:

a. P(A) = 0.1389

b. P(B) = 0.1389

c. P(AnB) = 0.0193

d. P(AuB) = 0.2585

Explanation:

Given

Password length = 6

Letters (a-z) = 26

Integers (0-9) = 10

Total usable characters = 26 + 10 = 36

a. P(A) = Probability that a password begins with vowel (a,e,i,o,u)

Probability = Number of required outcomes/ Number of possible outcomes

Number of required outcomes = Number of vowels = 5

Number of possible outcomes = Total usable characters = 36

P(A) = 5/36

P(A) = 0.13888888888

P(A) = 0.1389

b. P(B) = Probability that the password ends with an even number (0,2,4,6,8)

Probability = Number of required outcomes/ Number of possible outcomes

Number of required outcomes = Number of even numbers = 5

Number of possible outcomes = Total usable characters = 36

P(B) = 5/36

P(B) = 0.13888888888

P(B) = 0.1389

c. P(AnB)

This means that the probability that a password starts with a vowel and ends with an even number

P(AnB) = P(A) and P(B)

P(AnB) = P(A) * P(B)

P(AnB) = 5/36 * 5/36

P(AnB) = 25/1296

P(AnB) = 0.01929012345

P(AnB) = 0.0193 ----_---- Approximately

d. P(AuB)

This means that the probability that a password either starts with a vowel or ends with an even number

P(AuB) = P(A) or P(B)

P(AuB) = P(A) + P(B) - P(AnB)

P(AuB) = 5/36 + 5/36 - 25/1296

P(AuB) = 335/1296

P(AuB) = 0.25848765432

P(AuB) = 0.2585 ----_---- Approximately

4 0
3 years ago
Which from the following list are an example of productivity software?
Scorpion4ik [409]
D. All of the Above.....
3 0
3 years ago
Read 2 more answers
How long does it take to restore iphone from itunes?
raketka [301]
I think like 10-20 mins
5 0
2 years ago
An engineer learns a new security threat mitigation technique. The technique maps an IP address to a non-existent host, and is u
xenn [34]
A. In network architecture, a black hole drops traffic before it reaches its intended destination, and without alerting the source. A simple example is traffic sent to an IP address that an admin mapped to a non-existent host.
B. A sinkhole is similar to configuring a black hole, and often used interchangeably. With sinkholing however, an admin usually retains some ability to analyze and forward the captured traffic.
5 0
3 years ago
Other questions:
  • The actual database of active directory shared resources is stored on one or more computers designated as:
    10·1 answer
  • Describe the concepts of Defense in Depth and Detection in Depth. Compare and contrast. What's different? What's similar?
    9·1 answer
  • Each cout statement has a syntax error. Type the first cout statement, and press Run to observe the error message. Fix the error
    11·1 answer
  • An EAP is an:
    6·2 answers
  • Jim wants to buy a car, but he’ll probably only need it for a couple of years. He has a short commute to work, so he won’t be pu
    10·1 answer
  • Two routers connect with a serial link, each using its S0/0/0 interface. The link is currently working using PPP. The network en
    6·1 answer
  • "Na2SO3” represents sodium sulfite.
    13·2 answers
  • 20 examples of input device?
    9·2 answers
  • How is enviromental factor a disadvantage of communication​
    9·1 answer
  • PA theme is a major message that a writer convoys through a text. you have explored many themes in the hobbit one theme in the n
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!