1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
emmainna [20.7K]
3 years ago
12

How many channels are in an ISDN PRI connection?

Computers and Technology
2 answers:
vlabodo [156]3 years ago
7 0

Answer:

23B +D

Explanation:

ISDN stands for Integrated Services Digital Network. It makes use of two types of channels:

  • B type : which is used for carrying data/voice
  • D type : which carries control and signalling information.

ISDN supports two different service levels:

  • Basic Rate Interface (BRI) - home and small users
  • Primary Rate Interface(PRI) - larger enterprise scenarios

Both BRI and PRI make use of set of B and D type channels for data transfer.

BRI consists of 2 B channels and 1 D channel whereas PRI consists of 23 B channels and 1 D channel.

seropon [69]3 years ago
5 0

Answer:

D) 23B+D

Explanation:

ISDN stands for Integrated Services Digital Network.

PRI stands for Primary Rate Interface.

ISDN operates on  two different service levels:

  -Basic Rate Interface (BRI) is used by individuals operating on a small scale.

  -Primary Rate Interface(PRI) is used by larger businesses and organizations.

ISDN PRI consists of 23B channels and one 64Kbps D channel represented as 23B+D.

You might be interested in
Def sum_divisors(n): sum =1 # Return the sum of all divisors of n, not including n x=int(n**0.5) for i in range(2,(x//1)+1): if
Novosadov [1.4K]

Answer:

This is a python program that counts the number of divisors of a given number and calculates the sum of the divisors.

Explanation:

The first line defines a function "sum_divisors" with an argument "n". The square root of the argument is converted to integer and assigned to the variable "x", then a for loop is used to iterate through the range 2 to the calculated nth number of divisors in the argument.The return keyword returns the sum value.

The function is called with several arguments and printed with the print function.

6 0
3 years ago
What is the purpose of the SMTP command "HELO"
sergij07 [2.7K]
If a client initiates the SMTP communication using an EHLO (Extended Hello) command instead of the HELO command some additional SMTP commands are often available. They are often referred to as Extended SMTP (ESMTP) commands or SMTP service extensions. Every server can have its own set of extended SMTP commands.
4 0
4 years ago
Assume the system with 256B memory and 64B cache and the block size of 16 bytes. I.e., there are 4 blocks in the cache. (a) For
Nataliya [291]

Answer:

Check the explanation

Explanation:

1.

System = 256Byte = 8 bit

Cache = 64B , block size = 16 byte.

A) Direct Mapped Cache:

Block offset = log (Block size) = log 16 = 4bit

Total # of block inside cache = 4.

Therefore index offset = log 4 = 2bit.

Remaining is tag bits.

Therefore tag bits = 8-(4+2) = 8-6 = 2 bits

Tag                              Index offset                                Block offset

(2 bits)                             (2 bits)                                           (4 bits)

Fully associative cache :

In fully associative cache, any of main memory block can be placed anywhere in cache. Therefore index offset =0 bits.

Therefore tag bits = 8-block offset bit= 8-4 =4bits

Tag                               Block offset

(4 bits)                                (4 bits)

4 0
3 years ago
If they spend all night writing computer programs, Laurence can write 10 programs while Carrie Anne can write 5. If they spend a
kondaur [170]

Answer:

Laurence can write 10 programs while Carrie Anne can write 5.

Laurence can make 6 sunglasses while Carrie Anne can make 4

Explanation:

3 0
3 years ago
In an attack known as ____, valid protocol packets exploit poorly configured dns servers to inject false information to corrupt
ladessa [460]

This is known as DNS poisoning, so called because it 'poisons' the entries of the DNS with false information.

8 0
3 years ago
Other questions:
  • In three or four sentences, describe how a person buys and sells stock.
    6·2 answers
  • What is called photo and video edition?
    8·1 answer
  • Under which market structure, does a firm have the most influence over product pricing? A. Oligopoly B. Perfect competition C. M
    5·1 answer
  • Which are benefits of modeling a solution? Choose all that apply. allows you to be sure the problem and solution are understood
    9·2 answers
  • What is one advantage of top-down programming design?
    13·2 answers
  • Why is it important to evaluate the website on which you plan to shop?
    7·2 answers
  • _______________ ________________ have human editors that evaluate, select, and organize websites into a hierarchy of categories.
    11·1 answer
  • Define a query that uses the Natural Join command to join three tables to produce useful information.
    14·1 answer
  • Five uses of the operating system​
    10·2 answers
  • Give the value of the zero flag, the carry flag, the signflag, and the overflow flag after each of the following instructions if
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!