1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
viktelen [127]
3 years ago
13

Enter just the letter of the correct answer

Computers and Technology
1 answer:
astraxan [27]3 years ago
8 0

purchase a router from the aisle

You might be interested in
Shut down and unplug the computer. Remove the CPU case lid. Locate the various fans, and then use
nlexa [21]

Answer:

Cleaning the fan

Explanation:

Just did it on Ed

Would you mind giving me brainliest?

6 0
3 years ago
Assume a TCP sender is continuously sending 1,090-byte segments. If a TCP receiver advertises a window size of 5,718 bytes, and
Arturiano [62]

Answer:

for the 5 segments, the utilization is 3.8%

Explanation:

Given the data in the question;

segment size = 1090 bytes

Receiver window size = 5,718 bytes

Link transmission rate or Bandwidth = 26 Mbps = 26 × 10⁶ bps

propagation delay = 22.1 ms

so,

Round trip time = 2 × propagation delay = 2 × 22.1 ms = 44.2 ms

we determine the total segments;

Total segments = Receiver window size / sender segment or segment size

we substitute

Total segments = 5718 bytes / 1090 bytes

Total segments = 5.24587 ≈ 5

Next is the throughput

Throughput = Segment / Round trip

Throughput = 1090 bytes / 44.2 ms

1byte = 8 bits and 1ms = 10⁻³ s

Throughput = ( 1090 × 8 )bits / ( 44.2 × 10⁻³ )s

Throughput = 8720 bits / ( 44.2 × 10⁻³ s )

Throughput = 197.285 × 10³ bps

Now Utilization will be;

Utilization = Throughput / Bandwidth

we substitute

Utilization = ( 197.285 × 10³ bps ) / ( 26 × 10⁶ bps )

Utilization = 0.0076

Utilization is percentage will be ( 0.0076 × 100)% = 0.76%

∴ Over all utilization for the 5 segments will be;

⇒ 5 × 0.76% = 3.8%

Therefore, for the 5 segments, the utilization is 3.8%

4 0
3 years ago
Suppose there are 69 packets entering a queue at the same time. Each packet is of size 7 MiB. The link transmission rate is 1.7
svp [43]

Answer:

69.08265412 milliseconds

Explanation:

Lets first convert 7 MiB to bits

7*1024*1024*8=58720256 bits

Now convert bits to Gbits

58720256/10^{9}  =0.058720256 Gbits

Queuing Delay = Total size/transmission link rate

Queuing Delay= \frac{0.058720256}{1.7} =0.03454132706 seconds

Delay of packet number 3 = 0.03454132706*2=0.06908265412 seconds

or 0.06908265412= 69.08265412 milliseconds

7 0
3 years ago
The publisher tab in the application control allows you to manage the various certificates that are used to do what to binaries?
artcher [175]

The publisher tab in the application control allows you to manage the various certificates that are used to sign to binaries. Publisher allow executables of a particular vendor, signed by a security certificate issued to the vendor by a Certificate Authority. Also, all applications and binary files either added to or modified on an endpoint that are signed by the certificate are automatically added to the whitelist.

3 0
3 years ago
Balance is the design principle that is represented when using the Crop tool?
RUDIKE [14]

Answer:

The answer is "False".

Explanation:

The rule of thirds implies to the subject, which is not centered mostly on the picture because of new photography formats their shots. Its main object is a little off with one side by using a third-party principle, which draws your attention for the audience into another design, instead of only looking at the center. In another word, we can say that this rule is used as the definition to design the Crop tool to represent as an overlay.

8 0
4 years ago
Other questions:
  • Use the image below to answer this question.
    14·1 answer
  • What is the maximum number of communication paths for a team of twenty people?
    5·1 answer
  • 2. Statement: "I don't agree with you." Nonverbal gesture: Type of gesture:
    6·1 answer
  • You want to discard your old computer and want to securely erase the data from your hard drive. What can you use to do this and
    6·1 answer
  • Design two subclasses of Employee…SalariedEmployee and HourlyEmployee. A salaried employee has an annual salary attribute. An ho
    12·1 answer
  • Some computer engineering students decided to revise the LC-3 for their senior project. In designing the LC-4, they decided to c
    13·1 answer
  • Different between desktop application and web application ?​
    9·1 answer
  • Hello people, I was wandering if I could get some people to complete this questionnaire for my business course. It would be very
    5·1 answer
  • PLZ HELP What will be the output? class num: def init (self.a): self. number = a mul* __(self. b) return self. number + b. numbe
    7·1 answer
  • Discuss five domains of Instructional technology​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!