1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mel-nik [20]
3 years ago
11

Suppose two hosts, A and B, are separated by 15,000 kilometers and are connected by a direct link of R = 5 Mbps. Suppose the pro

pagation speed over the link is 2.5 * 108 meters/sec.How long does it take to send a 1,500,000 bit file, assuming it is sent continuously?
Computers and Technology
1 answer:
beks73 [17]3 years ago
6 0

Answer:

360 msec

Explanation:

Data provided in the question:

Distance between the two hosts = 15,000 kilometer

= 1.5 × 10⁷ m    [ ∵ 1 km = 1000 m ]

Transmission rate, R = 5 Mbps = 5 × 10⁶ bits per second

Propagation speed over the link = 2.5 × 10⁸ meters/sec

Size of file to be sent = 1,500,000 bit

Now,

Propagation delay (dprop)

= Distance ÷ Speed

= ( 1.5 × 10⁷ ) ÷ (2.5 × 10⁸)

= 0.06 sec

= 60 msec           [ ∵ 1 sec = 1000 millisecond ]

Transmission delay (dtrans)

= Size of file ÷ Rate of transmission

= 1500000 ÷ ( 5 × 10⁶ )

= 0.3 sec

= 300 msec

Therefore,

Time required for transmitting the file

= Propagation delay + Transmission delay

= 60 msec + 300 msec

= 360 msec

You might be interested in
oe, a user, receives an email from a popular video streaming website. the email urges him to renew his membership. the message a
ale4655 [162]

Where Joe, a user, receives an email from a popular video-streaming website and the email urges him to renew his membership. If the message appears official, but Joe has never had a membership before, and if when Joe looks closer, he discovers that a hyperlink in the email points to a suspicious URL, note that the security threat that this describes is: "Phishing" (Option B)

<h3>What is Phishing?</h3>

Phishing is a sort of social engineering in which an attacker sends a fake communication in order to fool a person into disclosing sensitive data to the perpetrator or to install harmful software, such as ransomware, on the victim's infrastructure.

To avoid phishing attacks, make sure you:

  • understand what a phishing scheme looks like
  • Please do not click on that link.
  • Get anti-phishing add-ons for free.
  • Don't provide your information to an untrusted website.
  • Regularly change passwords.
  • Don't disregard those updates.
  • Set up firewalls.
  • Don't give in to those pop-ups.

Learn more about Phishing:
brainly.com/question/23021587
#SPJ1

Full Question:

Joe, a user, receives an email from a popular video streaming website. The email urges him to renew his membership. The message appears official, but Joe has never had a membership before. When Joe looks closer, he discovers that a hyperlink in the email points to a suspicious URL.

Which of the following security threats does this describe?

  • Trojan
  • Phishing
  • Man-in-the-middle
  • Zero-day attack
5 0
2 years ago
And then what happened,Paul Revere rhyme
Mamont248 [21]
Wat? Well, huh I don't understand the question
6 0
3 years ago
Read 2 more answers
Snippet 1: check_file_permissions.c #include
vitfil [10]

Answer:

I don't know  you should figure that out good luck

Explanation:

good luck

3 0
3 years ago
When using the red / yellow I green method to present status of a project, green can mean which of the following?
Temka [501]

Answer:

D. All of these

Explanation:

I hope this helps you! Have a great day!

bren~

3 0
2 years ago
Read 2 more answers
In Fantasy Football, participants compete against one another by choosing certain players from different NFL teams that they thi
PolarNik [594]

This process that would be considered in the above scenario is Data mining.

<h3>What is data mining?</h3>

Data mining is known to be the act or method of knowing more about data via;

  • Leaning raw data.
  • Finding patterns.
  • Forming models.
  • Testing those models.

Note that  It is a method that uses statistics, machine learning, and database systems and it will be good tool to be used in the scenario above.

Learn more about Data mining from

brainly.com/question/14776357

4 0
2 years ago
Other questions:
  • How to build an arch bridge​
    5·1 answer
  • In a Comparative Government course, the first unit focuses on the US Congress and the
    8·1 answer
  • 3. What term refers to the physical locations of elements in relation to each other?
    10·2 answers
  • Stealing passwords by using software code to run through various password schemes with numbers, symbols, capital letters, and ch
    6·1 answer
  • When you copy a formula that contains an absolute reference to a new location, the reference ____. a. has a dotted outline in it
    6·1 answer
  • Which of the following statements can be used as evidence that ancient Greek beliefs and art has been influential? Select the th
    9·2 answers
  • Select one or more of the following: Which of these events will cause signal(s) to be generated by the kernel (the operating sys
    6·1 answer
  • Explain the concept of “survival of the fittest”
    15·1 answer
  • One limitation of high-level programming languages is
    10·1 answer
  • What is the core function of an enterprise platform
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!