1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aalyn [17]
3 years ago
15

Directions: Using the decoder key and the code chart on the second page, find out the name that has been coded. After coding the

name, move down two rows and code your first name; (1 blank row between coding and no nick names.) Code yourlauber. Use the fill option to color needed blocks.
 
Binary Name
Code Letter
Computers and Technology
1 answer:
Karo-lina-s [1.5K]3 years ago
7 0

What is the decodder key???

You might be interested in
Consider an error-free 64 kbps satellite channel used to send 512 byte data frames in one direction, with very short acknowledge
Vladimir [108]

Answer:

The answer is "2".

Explanation:

In the given question some information is missing, that is "The propagation time for satellite to earth" which is "270 milliseconds" so, the description to this question can be defined as follows:

Given values:

Bandwidth = 64 kbps

Data frames = 512 bytes  

Propagation Time (t​​​​​​p ) =270 ms

Change Bandwidth  kbps to bps:

1 kb= 1024 bytes

calculated bandwidth= 64 kbps = 64×1024 bps = 65536 bps

1 bytes = 8 bits

512 bytes = 512 × 8 =  4096 bits

Frame length = 4096 bits

Formula

Transmission time (T​​​​​​t) = Frame length /Bandwidth

Window size = 1+2a

where a = Propagation time/Transmission time

Calculate Transmission time:

Transmission time (T​​​​​​t) = 4096 / 65536

Transmission time (T​​​​​​t)= 625 m.sec

Calculate Window size:

Window size = 1+2(270/625)

Window size = 1+2(0.432)

Window size = 1+0.864

Window size = 1.864

Window size = 2

3 0
3 years ago
How does a sound card work?
vlabodo [156]
In order to be able to listen to your music, a sound card converts digital data to analog sound waves you can hear. The output signal is then connected to a headphone or set of speakers. You can also use a sound card to record audio with a microphone
8 0
3 years ago
Read 2 more answers
Select the correct answer. Cerise is explaining computer viruses to her students. What is the best way for her to explain a comp
Anna [14]

Answer:

B. it is a code that creates multiple copies on loading and damages the system

Explanation:

it is a app which they send to you on your computer or mobile phone

maybe click this link you will get free gift

3 0
3 years ago
What is a trojan horse in computer science?
Firdavs [7]

Answer:

type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems.

Explanation its malware

4 0
2 years ago
What are characteristics of fluent readers? Check all that apply. reading known words automatically pronouncing words correctly
IRINA_888 [86]

Answer:

D,A,B hope this is it!!!!!

7 0
2 years ago
Read 2 more answers
Other questions:
  • Your boss in the human resources department asks you to write a function that calculates the length of time that employees have
    6·1 answer
  • Which of the following factors wouldn't change an account's optimization score?
    7·1 answer
  • Mark for review (Will be highlighted on the review page) 3. Which one of the following word processing features saves you the mo
    14·1 answer
  • Tammy is preparing to give a presentation. she would like to view information that will remind her what to say to her audience b
    10·1 answer
  • Which type of interview is conducted in a format where the interviewee is questioned and presented to a panel of individuals?
    7·2 answers
  • ) Which is true about the agile method?
    7·1 answer
  • An electronic storage file where information is kept is called a cpu. true false
    11·1 answer
  • A standard for compressing music into computer files that can be easily exchanged on the Internet is called a(n) ______. A. musi
    5·1 answer
  • Is the following statement TRUE or FALSE?
    9·1 answer
  • What technique is used when setup times at a workstation are sequence dependent?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!