1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NARA [144]
3 years ago
11

Access time is:________.

Computers and Technology
1 answer:
worty [1.4K]3 years ago
5 0

Answer:

B) the time it takes for the required sector to position itself under the read/write head.

Explanation:

In Computer science, Access time is the time it takes for the required sector to position itself under the read/write head. It is usually measured in milliseconds.

It is the speed of the storage device.

You might be interested in
How do I make friends on here?
AleksandrR [38]
Sent messages to profiles you click on I think.

7 0
4 years ago
Read 2 more answers
Given a link with a maximum transmission rate of 28.1 Mbps. Only two computers, X and Y, wish to transmit starting at time t = 0
Sophie [7]

Answer:

0.36

Explanation:

Each Packet Size = 1024 bytes (1000 bytes + 24 bytes)

X gets the transmission first.

Number of packets X has to send = 10,000,000 / 1,000 = 10,000 packets.

Number of packets Y has to send = 14,000 / 1,000 = 14 packets.

Time for one packet to transmit:

28,100,000 bytes in 1 sec

1,024 bytes in = (1/28,100,000) * 1,024 = 0.00003644 secs.

Time taken for X to send = 10,000 * 0.00003644 = 0.3644 secs

Time taken for Y to send = 14 * 0.00003644 = 0.00051016 secs

Time at which File x would finish transmitting = 0.3644 + 0.00051016 = 0.36

Hope this helps!

4 0
3 years ago
Differences between dot_mattix printer and a line printer
vekshin1

Answer:

Difference Between Dot Matrix and Line Printer is that Dot-matrix printer produce printed images, they produce image when tine wire pins on a print head mechanism strike an inked ribbon. While Line printer is a type of impact printer which is high-speed and printer an entire line at a time.

Explanation: Hope this helps!

7 0
3 years ago
How can a company that collects and uses private customer data ensure it will move forward in a sustainable culture of privacy?
Strike441 [17]

The company that collects and uses private customer data will need to ensure that it will move forward in a sustainable culture of privacy if they act by:

  • Option 1: creating a culture of privacy in every facet of the company's operations.
  • Option 4- by making sure the privacy policies provided to customers are up-to-date.

<h3>What is Data Protection and Privacy?</h3>

The terms data protection and data privacy is known to be one that is said to be used a lot and also  interchangeably.

Note that Data privacy is one that tells about who has  the ability or permission to access to data, and data protection is one that gives tools and policies to be able to restrict access to the data.

Hence, The company that collects and uses private customer data will need to ensure that it will move forward in a sustainable culture of privacy if they act by:

  • Option 1: creating a culture of privacy in every facet of the company's operations.
  • Option 4- by making sure the privacy policies provided to customers are up-to-date.

Learn more about privacy policies from

brainly.com/question/13335106

#SPJ1

6 0
2 years ago
What is the term for a calculation (using encryption technologies) based on the contents of a disk or file that are engineered s
Helga [31]

Answer:

Cyclic Redundancy Check

Explanation:

Cyclic Redundancy check is used in networking and storage devices. This term is used for even small changes in the source data that will produce significantly different checksum results.

8 0
3 years ago
Other questions:
  • Pointers with classes a) A user-defined class named Timer has a constructor that takes two integer parameters to initialize hour
    14·1 answer
  • A document may wordwrap differently depending on the type of printer being used.
    8·1 answer
  • Explain 3 ways you can be an upstander when seeing cyberbullying.
    13·2 answers
  • Which key prevents movement between cells in a spreadsheet?
    9·1 answer
  • UDAL Pretest: Using Digital Cameras 15 Select the correct answer. Which mode of shutter speed helps to capture creative effects
    6·1 answer
  • You are in charge of five software development projects. The ‘characteristics’ of each of your projects are as follows:
    6·1 answer
  • Calculate the total and average number from 1 to 100<br>​
    12·1 answer
  • Without net neutrality, which of these situations might occur? (Select all that apply.) a cable company might charge different b
    5·1 answer
  • Directions and Analysis
    15·1 answer
  • What is the first step in finding a solution to a problem? Choose a solution. Think of options to solve the problem. Try the sol
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!