1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Artist 52 [7]
3 years ago
5

A typist is entering text on keyboard at the rate of 30 words per minute. if each word is 6 characters long on average, what ban

dwidth in bits per second between the keyboard and main memory is required to transmit the information? a space is also a character. assume that each word is followed by a space?
Computers and Technology
2 answers:
IrinaVladis [17]3 years ago
6 0

In 1 minute --------30 words

means  (30 x 6) + 29 characters   [29 for spaces]

means  { (30 x 6) +29 } x 8 bits = 1672 bits

in 1 minute or 60 second it is 1672 bits

in 1 sec it is 27.867 bits

number of bits being sent per second is 27.867 bits

Makovka662 [10]3 years ago
3 0

Answer:

27.827 bits per second

Explanation:

In the field of computers, bandwidth refers to the maximum rate of data transfer; in this particular case, we are talking about data bandwidth in bits/seg, to calculate it we follow these steps:

  1. Find the number of letters per minute: We have 30 words per minute and each word is made of 6 letters, therefore, the amount of letters without spaces is -> 30 * 6 = 180 letters/min
  2. Find the number of characters per minute: If each word is separated by space we will have 29 spaces because the last word doesn't need space. To find the total amount of characters we add letters and spaces -> 180 + 29 = 209 characters per minute
  3. Find the number of bits: In a standard computer each character in the ASCII format is made out of 8 bits, therefore, the total number of bits is equal to the total number of characters multiply by the bits per character -> 209 * 8 = 1672 bits/min
  4. Find the bandwidth in bits/seg: To complete the process we convert our previous result of bits/min to bits/seg -> 1672/60 = 27.867 bits/seg

You might be interested in
Suppose an IP packet is fragmented into 10 fragments, each with a 1% (independent) probability of loss. To a reasonable approxim
Marysya12 [62]

Answer:

a. 0.01

b. 0.001

c. The identification field of the packet fragment can be used to uniquely identify and collate the fragments lost in transmission.

Explanation:

The probability of losing a packet is 10% or 0.1, so the probability of losing the packet twice during transmission;

= 0.1 x 0.1 = 0.01

When any fragments have been part of the transmission, the probability of the packet is dependent on the fragments;

= 0.01 x 0.1 = 0.001

The identification field is a unique 16-bit value assigned to an IPv4 packet, when a packet is fragmented for transmission, its field is used to collate the unique fragments in the packet.

6 0
3 years ago
How do you think advances in processors affect corporations that discover the computers they purchased just a couple of years ag
lozanna [386]

Answer:

Increased processor speed and multi core technologies.

Explanation:

The development of processors over the years is overwhelmingly fast. The CPU use to be cumbersome, expensive and computational speed was moderate.

As it evolves, the CPU was minimized to give rise to microprocessors.

Microprocessors are very fast, running millions of processes on its core. The multiple core processors helped to increase the speed of these processors.

When there are more than one core in a processor (dual, quad or octal core), it processes data in parallel reducing the time of execution compared to a one core processor.

A company having computers with single core would need to upgrade to a new computer with multi core processor to promote speed in data processing.

3 0
3 years ago
Choose the word that best completes this sentence. You should post safe load _________ for each floor and keep aisles and passag
erica [24]
You should post safe load limits for
3 0
3 years ago
Read 2 more answers
Allison is preparing to modify a network access control list and add three firewall rules to her private cloud HR systems. She i
Yakvenalex [24]

C. Change management

Allison is preparing to modify a network access control list and add three firewall rules to her private cloud HR systems by following the Change management process.

What exactly is change management?

Change management is the process of developing and implementing effective change strategies in businesses and organizations.

Examining the reasons for change, implementing changes, and assisting people in adapting to these changes are all part of it. This could include reorganizing the workforce, implementing new technology, lowering costs, increasing profits, or a combination of these to achieve a specific goal.

To know more about Change management, visit: brainly.com/question/28096717

#SPJ4

4 0
1 year ago
Hat is the simplest way to permanently get rid of an unwanted file
Sholpan [36]
If you have answer choices it’s B.
or
Move said file into the recycle bin and then procced by emoting the recycle bin
8 0
3 years ago
Other questions:
  • On Gmail, can I have an email get sent to someone at a certain time?
    7·1 answer
  • ________ is the abbreviation for the place in the computer where the programs and data the computer is currently using are store
    8·1 answer
  • Most large organizations store data through a strategy called a(n) ________ to promote efficient and safe use of data across the
    11·1 answer
  • Which one of the following parts of a universal motor does not move? A. The armature B. The field coil C. The shaft D. The commu
    5·1 answer
  • I need urgent help...my laptop has been like this... can anyone help me plzzz​
    6·1 answer
  • Write a program that asks the user for a CSV of the NYC Open Data Film Permits: There is a sample file for June 2019 film permit
    9·2 answers
  • The Internet Engineering Task Force (IETF) defines the protocols and standards for how the Internet works. The members of the IE
    12·1 answer
  • What is the command to list the contents of directors in Unix- like operating system
    10·1 answer
  • With a heat exchanger, the temperature of the process fluid can be measured with a temperature-
    14·1 answer
  • ________ take advantage of vulnerabilities in software. Group of answer choices Blended threats Bots Trojan horses Direct-propag
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!