1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nuetrik [128]
4 years ago
14

Given a link with a maximum transmission rate of 18 Mbps. Only two computers, X and Y, wish to transmit starting at time t = 0 s

econds. Computer X sends fileX (1 MiB) and computer Y sends fileY (340 KiB), both starting at time t = 0. Computer X gets the transmission medium first, so Computer Y must wait. For the following calculations, assume maximum transmission rate during transmission. Suppose that entire files are sent as a stream (no packets, no multiplexing). At what time (t = ?) would FileY finish transmitting? Give answer in seconds, without units, and round to two decimal places.
Computers and Technology
1 answer:
expeople1 [14]4 years ago
3 0

Answer:

<em>Total time taken = 0.62 seconds </em>

Explanation:

<em>Transmission rate =  18 Mbps</em>

The size of file X winch will go fast= 11.73 MiB (Mebibyte) = 8.38 Mb(Megabit)  

The time it will take to transfer = File size / Transmission rate

                                                = 8.38 / 18 seconds

                                                = 0.46 seconds  

Mb in 1 KiB = 116.415  

The file Y that will go next has size = 340 Kib

                                                       = 340 / 116.41 Mb

                                                       = 2.92 Mb  

The time it will take to transfer = 2.92 / 18 seconds

                                                = 0.16

<em>Total time = Time taken for file X + Time taken for file Y </em>

<em>= 0.46 + 0.16 </em>

<em>= 0.62 </em>

<em />

You might be interested in
Please help!!!! will mark brainliest!!
fgiga [73]

Answer:

1. Speaking or texting on the cell phone while driving.

= It cause an accident.

2. Using technology for bullying others.

Hope this answer will help you.

7 0
3 years ago
Read 2 more answers
"The effectiveness of memory retrieval is directly related to the similarity of cues present when the memory was encoded to the
alexdok [17]

Answer:

D

Explanation:

Cause You Have To Decode It To Get To The Memory In The First Place

3 0
3 years ago
What is an example of constructive criticism for an employee who is shy during meetings?
rewona [7]
<span>Speak up more so people don't think you're rude</span>
8 0
4 years ago
Read 2 more answers
Which column and row references are updated when you copy the formula f$3/15
Tasya [4]

Answer: Column F

Explanation: In Microsoft excel, for the sake of robustness and to aid the effectiveness of updating formulas across cells. The reference of cells are treated as relative which means that when formulas are copied across columns or within rows, they get updated automatically. However, some numbers may be treated as constants such that we do not want them to change or be updated as we move acisss cells. Thus, such numbers are treated Given absolute references, which is made possible by adding a '$' prefix before the colum alphabet or row number or both. in the scenario given above, the row has the $ prefix, hence, it is absolute and will not change but the column alphabet does not and hence, treated as relative.

3 0
3 years ago
The ____ job functions and organizational roles focus on protecting the organization's information systems and stored informatio
dalvyx [7]

Answer:

Option B i.e., Information security management and professionals is the correct option.

Explanation:

They performs the work duties and operational responsibilities focus on supporting the information systems of the corporation and information stored against threats. IMS is a set of principles and protocols for the structured handling of sensitive information within an enterprise. An ISMS helps to eliminate risks and maintain continuity of operation through pro-actively minimizing the effects of a breach of security.

5 0
4 years ago
Other questions:
  • Arpanet was developed by the united states so that there was a communication network that would survive a nuclear war. True or F
    11·1 answer
  • How do u feel about distance learning in a paragraph?
    6·2 answers
  • When you set the position property for a block element to absolute, the browser?
    8·1 answer
  • What will you personally do to make your peers aware of the seriousness Of teen crashes?
    9·1 answer
  • The scope of a variable declared inside of a function is:
    8·1 answer
  • 1. Empty tags do not have ___________.
    14·1 answer
  • Why should the Six-Step Process be considered as an iterative process?
    8·1 answer
  • Why wouldn't a game using just run-length encodings be challenging?
    9·1 answer
  • Is a list of instructions an arguments?<br> Yes or No
    6·2 answers
  • Genres are useful for many reaseons. What are some explanations you can think of for how genres can be useful to players, game d
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!