1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sholpan [36]
3 years ago
10

Let's assume that the smallest possible message is 64 bytes (including the 33-byte overhead). if we use 100base-t, how long (in

meters) is a 64-byte message? while electricity in the cable travels a bit slower than the speed of light, once you include delays in the electrical equipment in transmitting and receiving the signal, the effective speed is only about 40 million meters per second. (hint: first calculate the number of seconds it would take to transmit the frame then calculate the number of meters the signal would travel in that time, and you have the total length of the frame.)
Computers and Technology
1 answer:
Ostrovityanka [42]3 years ago
3 0

As we know that 10-bAse data travels at the rate of 10 mbps, therefore at 1 sec we have 10240 bytes.

We have to calculate for 64 bytes travelling in one second. Multiply both sides by 64.

64 sec = 10240 x 64 bytes

64 bytes = 64 / 10240 sec

Now we have to calculate for light of speed

1 sec = 186000 miles

Substitute this value to the formula above

64 bytes = 64 / 10240 x 1 sec = 64 / 10240 x 186000 miles = 64 / 10240 x 186000 x 5280 feet = 6138x10^3 feet

Therefore, 64 bytes is equal to 6138 x 10^3 feet long message

You might be interested in
Write a program with a method called passwordCheck to return if the string is a valid password. The method should have the signa
Ber [7]

Answer:

import java.util.regex.*;

import java.util.Scanner;

public class Password

{

  public static void main(String[] args) {

  Scanner input = new Scanner(System.in);

  System.out.println("Please enter the Password. \n");

  String passwordString = input.next();

  System.out.println(passwordCheck(passwordString));

  }

  public static boolean passwordCheck(String password){

  if(password.length()>=8 && password.matches("[a-z0-9A-Z]+")){

  return true;

  }

  else{

  return false;

  }

  }

}

Explanation:

The Java class "Password" is used by the program to make an instance of the password object and check its validity with the passwordChecker method defined within the Password class. The passwordChecker method only matches alphanumeric passwords, that is, passwords with alphabets and numbers. If a non-alphanumeric character is encountered, the boolean value false is returned.

6 0
3 years ago
What will be returned when the following SQL statement is executed?
ycow [4]

Answer:

b) A listing of each driver as well as the number of deliveries that he or she has made

Explanation:

SQL which stands for Structured Query Language. and an SQL statements are used in performing tasks such as to update data on a database, or retrieve data from a database. Some of the popular relational database management systems that use SQL are: Sybase, Oracle, Microsoft SQL Server, Ingres, Access, etc.

3 0
3 years ago
Read 2 more answers
A(n) __________ consists of nonproprietary hardware and software based on publicly known standards that allows third parties to
Rus_ich [418]

Answer:

The answer is "Open System".

Explanation:

The term open system means a computing system, that integrated across software and hardware devices and provides complies with the same accessibility requirement.  

  • This connectivity and functionality mean, that a machine operating the Windows OS could be regarded as an open platform as can be seen by Windows being such a software OS.
  • It is composed of the non-owned development tool, which is based on publicly reported values, that enable service providers to generate attach-on to the system.
6 0
3 years ago
Write a set of directions that tells an operating system’s dispatcher what to do when a process time slice is over.
tatyana61 [14]
<span> Directions that tells an operating system's dispatcher what to do when a process's time slice is over.Wait for the interrupt handler to be execute. Allow the scheduler to update the process table. Select the process form the process table that has the highest priority, restart the time, and allow the selected process to begin its time slice. Directions that tells an operating system's dispatcher what to do when a process's time slice is over. Signal an interrupt, save the current position, execute the current position, execute the interrupt handler, and switch to the next process until the process or processes is complete. If a process executes an I/O request, the time slice of that process will be terminated because it would waste the remaining time waiting for the controller to perform the request. A situation in a time-sharing system in which a process does not consume the entire time slice allotted to it. Client/server model Defines the basic roles played by the processes as being that of either a client, which makes requests of other processes Components of the email address </span>
6 0
3 years ago
Read 2 more answers
Describe the pace of change in ICT
densk [106]

Answer:

Information and communications technology is an extensional term for information technology that stresses the role of unified communications and the integration of telecommunications and computers, as Technology Trends 2016

#1: Spreading intelligence throughout the cloud. ...

#2: Self-managing devices. ...

#3: Communication beyond sight and sound. ...

#4: Fundamental technologies reshaping what networks can do. ...

#5: Weaving security and privacy into the IoT fabric.

Explanation:

look for a question that i have answered answer it and also plz give me brainliest on this one plz

4 0
3 years ago
Other questions:
  • A financial consulting firm recently recovered from some damaging incidents that were associated with malware installed via root
    6·1 answer
  • On laptops, wireless cards tend to be attached to which panel?
    11·1 answer
  • Assume that two parallel arrays have been declared and initialized: healthOption an array of type char that contains letter code
    13·1 answer
  • The following characteristics are common to the majority of cloud environments, except: 1. on-demand usage 2. resiliency measure
    12·1 answer
  • What is true regarding the cellular phone concept? a. a single radio broadcast tower system enables greater frequency reuse comp
    15·1 answer
  • What is after gigabyte
    12·2 answers
  • What is the most common type of communication?
    10·1 answer
  • Function of pons for class 7​
    15·1 answer
  • 9.
    8·1 answer
  • Missing only a few days of school will not impact your grades.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!