1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Scrat [10]
3 years ago
6

Scenario2: Now suppose the LAN must support both voice and data and you must choose one of these multiple access strategies in o

rder to support both applications on the same network, with the understanding that voice calls are more important than data. Which would you choose and why? How would voice and data be sent in this scenario? That is, which access protocol would you use, or adapt/modify, and why?
Computers and Technology
1 answer:
AleksandrR [38]3 years ago
4 0

Answer:

The RTP (real time protocol) which uses the UDP ( user datagram protocol) and Real-time control protocol.

Explanation:

The RTP of a voice over IP protocol (VoIP) which is used to prioritise the transfer of video and audio data over text data. It is used for video conferencing and telephony services in an enterprise.

It uses the user-datagram protocol to transfer or access videos and audio data for its real time effect and the real-time control protocol for quality of service analysis and maintenance.

You might be interested in
After a user creates a new query or edits an existing query they must ________ the query to display the corresponding results.
kow [346]

It maybe they must run the query to display the corresponding results.

5 0
3 years ago
A researcher wants to do a web-based survey of college students to collect information about their sexual behavior and drug use.
finlep [7]

The answer is already given at the end of the question; solely by the magnitude or severity of expected harm

When assessing risks of harm associated with participation in a research study, the probability of harm and the risk of the severity of harm are two distinctive elements of risk that must be considered. In probability of harm, the fact that not all possible harms are equally probable should be considered. How these two elements occur is a crucial factor in determining the level of risk of harm in a study. Given the sensitivity of the information in the case scenario above, the probability that an individual subject could be identified is low while the magnitude of the possible risk of harm is high.


5 0
4 years ago
Read 2 more answers
How much cell phone data does the average person use a month?
Zarrin [17]
It is 2.9 GB a month
3 0
4 years ago
Read 2 more answers
True or Flase<br><br> C++ programs are not case-sensitive.
Dimas [21]

Answer:

Flase

Explanation:

They are case sensitive. VBScript is an example of a case insensitive language.

6 0
3 years ago
Read 2 more answers
Expectation on Information Technology Fundamental​
gizmo_the_mogwai [7]

You can expect to develop an understanding of information systems, programming languages, information management and artificial intelligence, leaving your studies with the ability to apply your knowledge to solve problems.

7 0
3 years ago
Other questions:
  • Computers have become easier to use and more powerful over time.
    12·2 answers
  • Which of the following statements best reflects the usefulness of commercial digital editing programs?
    7·1 answer
  • How can the output of a command be redirected to a file instead of being displayed on the computer's screen?
    9·1 answer
  • Write a Java program to accept an item's name and price from the user and output them to the console
    5·1 answer
  • How do you turn on the Track Changes feature in a word-processing document?
    12·1 answer
  • "The ability to assign system policies, deploy software, and assign permissions and rights to users of network resources in a ce
    7·1 answer
  • What is 4x+2x(-3-3) thanku
    11·2 answers
  • Neview of related literature happens in two wayo (1) Traditional and
    6·1 answer
  • Given the IPv4 address in CIDR notation 215.200.110.50/25, identify the subnet IDs.
    15·1 answer
  • Match each role to the corresponding web development task.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!