1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
creativ13 [48]
3 years ago
15

Assuming there are 100 million households in the US, and that each household has two HDTVs, and that each TV is used to watch 4

hours of video per day. We’ll assume that each (compressed) video streams at 2Mb/s. If all households are watching both TVs at the same time, and all are watching video on-demand (i.e. data is delivered unicast to every household), then which of the following is the closest approximation of the total peak aggregate data rate delivered to all homes?
100 Tb/s (100 × 10^12b/s),
400 Tb/s (400 x 10^12b/s),
1 Pb/s (1 x 10^15b/s),
100 Gb/s (100 x 10^9 b/s),
2 Tb/s (2 x 10^12b/s)
Computers and Technology
1 answer:
BartSMP [9]3 years ago
3 0

Answer:

400 Tb/s (400 ×  10¹² b/s )

Explanation:

Given that :

the number of household in US = 100 million

the number of HDTVs per house is = 2

the rate of the video streaming = 2 Mb/s

the watch hour = 4 hours of video per day

We equally know that :

I Mb = 10⁶ bits

The Total peak aggregate data rate delivered to all homes provided every household is watching both the tvs simultaneously =  Total bits streamed × number of households × number of HDTVs

= (100 ×  10⁶)×2 (2× 10⁶) b/s

= 400 ×  10¹² b/s

= 400 Tb/s (400 ×  10¹² b/s )

You might be interested in
When a security administrator wants to conduct regular test on the strength of user passwords, what may be the best setup for th
wariber [46]
I think it’s letter c
4 0
3 years ago
1
Dimas [21]

Answer:

C.  

Explanation:

Plato users

8 0
3 years ago
Q1. Information systems that monitor the elementary activities and transactions of the organizations are: I a. Management-level
VashaNatasha [74]

Answer:

B. Operational-level systems monitor the elementary activities and transactions of the organization.

6 0
2 years ago
A group known as ""Takedown"" hacked into your political action committee website and defaced it. Which type of threat actor is
natima [27]
<h2>Answer:</h2><h3>Hacktivist group is most likely to responsible for this.</h3><h3 /><h2>Explanation:</h2>

Hacktivism is defined as an action in which a computer or a network is targeted so that it could be misused in order to achieve a goal against any social or political action.

Hacktivists are the persons who perform hacktivism in order to seek attention on a specific thing or issue they want, from all the people.

In the given scenario, the hacking attack is hactivism as it is done to pull the company down.

Hacktivist can be a single person as well as a group of people working together. However they try to work anonymously so that they could not be traced.

<h3>I hope it will help you! </h3>
6 0
3 years ago
Two Technicians are discussing Tire Fitment information.
IRISSAK [1]

Only technician A is correct.

Technician A only

<u>Explanation:</u>

According to technician A, tire fitment information provides specific specs of the vehicle including the inflation pressure, OEM tire size, and lug nut tire sequences. The class of vehicles is divided into a category of vehicles and these categories are further specialized to form different models. Each model has its own specifications and their requirements differ from one another.

Hence the tire fitment of each vehicle should convey specific information about the model in concern. For instance, the optimum inflation pressure of a Royal En field will not be the same as that of Hero Splendour as both have a huge difference in their respective weight and size.

4 0
3 years ago
Other questions:
  • Which is an example of intrinsic motivation?
    13·2 answers
  • Which rock band apologized for automatically adding its new album to every iPhone 6 in 2014
    8·2 answers
  • I have a bag of trail mix.half of the bag contains peanuts.1/4of the bag is chocolates candies, and 1/4of the bag is dried fruit
    12·2 answers
  • What sends massive amounts of email to a specific person or system that can cause that user's server to stop functioning? mail b
    6·1 answer
  • List and describe the tools for all the main stages of app/application development.
    11·1 answer
  • What provides access to the internet and may also be internal?
    8·2 answers
  • Help me pls, thank you
    12·2 answers
  • Which of the displays could be represented by a single bit?
    12·2 answers
  • You can fit more RAW files on a memory card than JPEG files. true or false
    10·1 answer
  • Why is malware dangerous
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!