1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kupik [55]
3 years ago
10

If an M/M/1 queue in a server has task arrivals at a rate of 30 per second and serves at a rate of 50 per second, how many tasks

are in the system (waiting and being served) on average?

Computers and Technology
1 answer:
Scorpion4ik [409]3 years ago
6 0

The answer & explanation for this question is given in the attachment below.

You might be interested in
Create a new method in your language called Times Print. This should be a void method. It should accept exactly two numeric valu
user100 [1]

Answer:

The code commented is given below, also the lines that start with # are comments that explains the code.

# Create a function named times_print that receives 2 values x and y

def times_print(x, y):

   # Print the formatted string

   print("The value of {} times {} is {}".format(x,y,x*y))

# Create the main function

def main():

   # Call the funciton times_print 3 times with different values

   times_print(2,3)

   times_print(4,5)

   times_print(5,6)

# Execute the main function

main()

Explanation:

The code was written using Python 3.5, and here I attach the screenshots of the program running:

8 0
4 years ago
What is data and instructions entered into the memory of a device
lyudmila [28]

A POINTING DEVICE IS AN INPUT DEVICE THAT ALLOWS A USER TO CONTROL A POINTER ON THE SCREEN. ... A KEYBOARD IS AN INPUT DEVICE THAT CONTAINS KEYS USER TO ENTER DATA AND INSTRUCTIONS INTO A COMPUTER.                                                                            

SORRY FOR CAPS MY CAPS KEY GOT STUCK

3 0
4 years ago
What type of computer processing system is characterized by data that are assembled from more than one location and records that
ikadub [295]

Answer:

d) Online, real-time systems.

Explanation:

The options are:

a) Batch processing systems.

b) Personal computer systems.

c) Data compression systems.

d) Online, real-time systems.

And the correct option is D. Online, a real-time system. And this is because it is this which is characterized by the data which is assembled from more than one location as it is online, and various clients from various locations enter the data, and it's updated immediately, as it is a real-time system, which is updated in real-time. And hence D. is the correct option. The data compression system takes the data from one location at a time. The batch processing system is made up of different programs for input, output, and process. and hence is different from real-time, which requires continual all the three. And a PC is not made to a specific function, and it does different activities. Hence, its also not the right option here.

5 0
4 years ago
When an online company runs a special promotion on swimsuits during the summer, they are taking advantage of the concept of
LenaWriter [7]
<span>When an online company runs a special promotion on swimsuits during the summer, they are taking advantage of the concept of p</span>eople’s urge to go for swimming to beat the summer heat and keep themselves cool. As a result, they are very likely to buy more swimsuits to go swimming. 
With a special promotion on swimsuits, people are likely to buy the company’s merchandise. This is because they can get what they want by paying a lesser amount than usual. In turn, the company is able to benefit by making more sales than its online and retail competitors.

6 0
3 years ago
Read 2 more answers
10. When does teasing become cyberbullying?
Vlad [161]

Answer:

A) When the words, images or videos shift from humorous to hurtful.

Unlike kids who are being bullied, kids who are being teased can influence whether it continues or ends. If they get upset, the teaser usually stops.

4 0
2 years ago
Other questions:
  • Code Example 4-3 main program: import arithmetic as a def main(): num1 = 5 num2 = 6 result = a.add(num1, num2) print("The sum is
    15·1 answer
  • __________ is an attempt to gain access to a network by posing as an authorized user in order to find sensitive information, suc
    5·1 answer
  • The ________ file system supports a maximum file size of 2gb
    12·1 answer
  • Write a program that declares constants to represent the number of inches, feet, and yards in a mile. Name the constants INCHES_
    6·1 answer
  • According to Google data, among consumers who conduct a local search on their smartphone, how many then visit a store within a d
    7·1 answer
  • Generally, websites ending in .edu, .gov, and .org are less likely to be biased, or to show preference toward a certain financia
    12·1 answer
  • You need to buy a cable to connect a desktop PC to a router. Which cable should
    13·1 answer
  • Python program
    9·1 answer
  • web browsers save website information in their _________, which helps the site load faster on future visits.
    11·1 answer
  • Which ipconfig command switch would a technician use to display detailed information (such as dns servers and mac addresses)?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!