1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mazyrski [523]
4 years ago
12

In CSMA/CD protocol, the adapter waits k x 512 bit times before attempting to send again after a collision where k is drawn rand

omly from a set of values determined by binary exponential backoff. If k = 100, the adapter will wait for 5.12 msec on a 10 Mbps broadcast channel.
A) True

B) False
Computers and Technology
1 answer:
adelina 88 [10]4 years ago
8 0

Answer:

a) True

Explanation:

Waiting time=512*k bits

Bandwidth=10 Mbps

k=100

waiting time=512*100

Converting bit time to seconds=512*100/10*10⁶=5.12 msec

You might be interested in
After the recursive sorting step, ____ does not need to combine the sorted sub-arrays.
loris [4]

After the recursive sorting step, merge sort does not need to combine the sorted sub-arrays.

<h3>What is merge sort?</h3>

Merge sort is an efficient, general-purpose, comparison-based sorting algorithm in computer science.

Most implementations yield a stable sort, which means that the order of equal elements in the input and output is the same.

Merge Sort can be used to sort linked lists. Merge Sort is a stable sort, which means that the same element in an array retains its original position in relation to the others.

Thus, a merge sort does not need to combine the sorted sub-arrays after the recursive sorting step.

For more details regarding a merge sort, visit:

brainly.com/question/13152286?referrer=searchResults

#SPJ4

6 0
2 years ago
Giving brainliest for correct answers!
lina2011 [118]

Answer:

true

Explanation:

5 0
3 years ago
Read 2 more answers
)What is proceduralabstraction, and why is it important inComputer Science
STatiana [176]

Answer:

Procedural abstraction is a method in which all sub tasks of a whole functionality must be created separately as method and each method/ procedure must be performing a distinct functionality. For example if we want to write a program to calculate and display result of students in class and create separate methods to get students record, to calculate grades to display results is a procedural abstraction approach. Here not only the methods created have distinctive function the administrative can vary the level of abstraction as well.

It is important in computer science for the following ways:

1) Increase the level of code readiness as all separate functionality tasks will have a separate methods.

2) Prevents unauthorized of data.

6 0
3 years ago
What does one do to compare and contrast the structure of two texts?
xxTIMURxx [149]

Answer:

Examine the ways in which their patterns of organization are similar and different.

Explanation:

7 0
2 years ago
Consider the following declaration: double[] sales = new double[50]; int j; Which of the following correctly initializes all the
vlada-n [284]

Answer:

The answer is "None of these".

Explanation:

In the given question an array "sales[]" is declared, which contains 50 double type elements, and in the next line, an integer variable j is defined, which uses a for loop. In this question two options is given, in which both are not correct, that can be described as follows:

  • In option (i), A loop is defined that, uses variable j which starts with 0 and ends with 48, So total elements are 48 that's why it is not correct.
  • In option (ii), A loop will use variable j that, starts with 1 and ends with 49, That's why it is not correct.
3 0
3 years ago
Other questions:
  • What is the on board storage C:
    15·1 answer
  • Inkjet printers and laser printers are examples of ________ printers. (1 point)
    13·1 answer
  • A person who has a been exposed to technology at a young age is?
    8·1 answer
  • You have a small company and want to keep your cost low, but it is important your employees share data. which network would prov
    13·1 answer
  • What is an unknown network called
    6·1 answer
  • Google Analytics can collect behavioral data from which systems?
    6·1 answer
  • 7. A patent is an example of a rare and valuable resource. Indicate whether the statement is true or false and also justify it.
    14·1 answer
  • What is the function below Missing?
    7·2 answers
  • The TCP/IP stack has five layers, namely application, transport, network, link, and physical.
    12·1 answer
  • Type the correct answer in the box. Spell all words correctly. Which language should you use to add functionality to web pages?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!