1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ololo11 [35]
3 years ago
8

If there is a circuit that is being used 36 CCS then how much of that circuit is being used in Erlang?

Computers and Technology
1 answer:
Mkey [24]3 years ago
5 0

Answer:

A.1.

Explanation:

CCS(Centum Call Seconds) is a unit to measure the network traffic in the telecommunication circuit network.        

1 Traffic unit = 1 Erlang.      

The relation between Erlang and CCS(Centum Call Seconds) is:-

36 CCS = 1 Erlang.          

Hence the answer to this question is 1 Erlang.

You might be interested in
The _________ check is a type of hardware control that involves adding a "1" or a "0" to the end of every 8 bit byte such that t
stira [4]

Answer:

The correct answer to the following question is an option (b) parity.

Explanation:

Because it is a bit that appends to the binary bit and it has the sets of one or either zero by which a total number of the one bits is the odd or the even parity bit.  

Parity bit is a type of bit by which we can check when the data is moved to another place than at that time the data is written over or lost and also we check data at that time when these data is transmitted from one computer to other computers.

7 0
3 years ago
Write the features of Mark-I.​
kotegsom [21]

Answer:

mark- I was enormous in size,measuring 8 feet high,51 feet long and 3 feet deep it weighs tons used , 530 miles of wire and 730,000 separated plant.

4 0
3 years ago
Modify the program you wrote for Chapter 6 Exercise 6 so it handles the following
Basile [38]

Answer:

#try except

try:

   #opening the file

   read_file = open('numbers.txt', 'r')

   #Store the numbers in the variable file_numbers.

   file_numbers = read_file.read()

   #close the file

   read_file.close()

   #Split the number of files in list_values.

   list_values = file_numbers.split()

   #how many numbers are there

   list_length = len(list_values)

   try:

       #loop it up

       for i in range(list_length):

           list_values[i] = float(list_values[i])

       #Add up all the numbers, put into list_sum

       List_sum = sum(list_values)

       #heres how we average it

       Average_value = (List_sum)/list_length

       #print

       print(Average_value)

   except ValueError:

       print( "File must have only numbers. Try again." )

   #handles IOError exceptions

except IOError:

   #Display statement

   print("Trouble opening file. Try again.")

Explanation:

The python program uses the try-except exception handling method to catch errors in the code. The IOError is used for catching input and output errors in the program like file handling while the ValueError keyword in the except statement is used to catch data type errors from a return statement, calculation or user input.

6 0
3 years ago
When the location of a data source is defined as a(n) _______ location, excel will access the connection to the data source with
valina [46]

trusted is your answer

5 0
4 years ago
You are a cleared employee. You discovered fraud and waste of money related to a classified program within your agency. If you r
Irina-Kira [14]

Answer:

A. True.

Explanation:

In this scenario, you are a cleared employee. You discovered fraud and waste of money related to a classified program within your agency. If you report this fraud and waste through appropriate channels, you may receive protection under the Presidential Policy Directive 19 (PPD-19): Protecting Whistleblowers with Access to Classified Information.

In USA, the Presidential Policy Directive 19 (PPD-19) which was signed by President Barack Obama in October 2012, is an executive order designed to provide significant protection for an employee who have access to classified informations such as fraud, waste of money and abuse or prohibiting any form of retaliation against this cleared employee.

3 0
3 years ago
Other questions:
  • A company decides to create static design diagrams for an upcoming project. Which statement correctly describes the attribute of
    6·1 answer
  • Olivia creates a personal budget. She enters her current savings account balance in cell D3. In cell A3, she calculates her inco
    8·1 answer
  • Self contained sequences of actions to be performed are?
    6·1 answer
  • MS Excel is a powerful spreadsheet program that helps people with complex mathematical calculations. In what ways could you use
    10·1 answer
  • Comments should be written in what type of language
    6·1 answer
  • Which of the following is true about radio waves? They have short wavelengths. They have high energies. They reveal hot gases. T
    10·2 answers
  • Complete the below method, isPalindrome(), that takes in a String and returns a boolean. The boolean should be true if the Strin
    7·1 answer
  • Array testGrades contains NUM_VALS test scores. Write a for loop that sets sumExtra to the total extra credit received. Full cre
    11·1 answer
  • There are parallels between the trust models in Kerberos and Public Key Infrastructure (PKI). When we compare them side by side,
    15·1 answer
  • What is a trusted computing base (TCB)? Hosts on your network that support secure transmissions The operating system kernel and
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!