1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ikadub [295]
3 years ago
15

What is the data transmission time, assuming no errors or overhead, to send a 2 GByte file over a link with a 2 Gbps line rate?

Remember that the ‘G’ in GByte and Gbps have slightly different meanings. Round your answer to the nearest 0.1 second and show your work.
Computers and Technology
1 answer:
schepotkina [342]3 years ago
4 0

Answer:

The data transmission time will be 8 seconds (8.0s)

Explanation:

Using the formular:

T =A/S

T=Time = ?

Amount of Data = A = 2GByte

Speed = S = 2Gbps

The units of A and S are different

A is expressed in Bytes(B)

S is expressed in bits(b)

But :

1 Byte(B) = 8 bits(b)

T = A/S = 2GB/2Gb

since 1 Byte = 8 bits

T = 2 × G ×( B =8bits) / 2 × G × b

T = 2 × G × 8b / 2 × G × b

T = 2 × G × 8 × b / 2 × G × b

The common terms(2,G,b) cancel out

T = 8 seconds

You might be interested in
You observe scrub jays hiding food and notice that one particular individual only pretends to hide food. What kind of experiment
o-na [289]

Answer:

Theorize a group of signals that will possibly produce this type of behavior and align the signals with the behaviors.

Explanation:

6 0
3 years ago
What is a quick way to determine if a site might contain reliable information?
xz_007 [3.2K]
<span>The best and most correct answer among the choices provided by the question is the fourth choice.

A way of determining that a site is realiable is examining comments about the <span>webpage.</span></span><span>
I hope my answer has come to your help. God bless and have a nice day ahead!</span>
5 0
3 years ago
Read 2 more answers
Remote authentication has always been a concern because the person is coming from a public network, and many companies require t
g100num [7]

Answer:

Incomplete Question.

I'll answer this question based on general terms

Explanation:

Two Factor Authentication, abbreviated as 2FA.

It is a type of authentication that requires the presentation of two credentials for access to personal data and information.

The credentials needed for a 2FA are

1. Either of the following; PIN, Password or Pattern

2. Your device or gadget which could be an ATM Card, Mobile Phone

3. Biometrics such as fingerprint, voice input

Number one is often referred to as "Something you know"

Number two is referred to as "Something you have"

Number three is referred to as "Something you are"

The 2FA doesn't require the three aforementioned credentials. It only needs just two of the credentials to provide its authentication.

8 0
3 years ago
Read 2 more answers
C Programming:
natita [175]
This is how to answer this programming question:

#include <stdio.h>
#include <conio.h>

int main(void)
{
   char letterStart;
   
   <span>fflush(stdin);</span>
   printf("Input character: ");
   scanf("%c", &letterStart);
   
   print("Next Letter: %c", ++letterStart);
   
   getch();
   clrscr();
}

7 0
3 years ago
Read 2 more answers
What its the difference between Arduinos and Assembler?
Leno4ka [110]

Answer:

The Arduino boards can be programmed in assembly. All you need is an ICSP Cable (In Circuit Serial Programmer) and the AVR toolchain (free from ATMEL) to write to the board. You then get the advantage of on board debugging.

As you suggested, you can just slap an ATMEL chip on a breadboard and go to town.

Explanation: cause i said so

6 0
3 years ago
Other questions:
  • Describe two measures you can use to evaluate whether an attachment in a message is reliable to open.
    8·2 answers
  • An employee is angry with his boss and wants to sabotage the company. To accomplish this he secretly changes some of the values
    7·1 answer
  • _____ assures the interface will act as the users expect, while _____ assures it will look pleasing. Select one:
    14·1 answer
  • Which of the following statements about take home pay is TRUE?
    10·1 answer
  • The term “computer literacy” dates back to what decade? <br> 1960s<br> 1970s<br> 1980s<br> 1990s
    5·1 answer
  • Q. Which protocol would best serve to authorize users to access directory services?
    8·1 answer
  • An online retailer is looking to implement an enterprise platform. Which component of the enterprise platform will help the comp
    8·1 answer
  • What is the value of creating recurring tasks?
    7·2 answers
  • Escribe 10 ejemplos de lo que consideras un byte
    5·1 answer
  • In addition to being fun, another reason that people have been creating games ever since they settled into communities is:
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!