1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andrew [12]
3 years ago
15

Discuss trends in cellular data transmission speeds

Computers and Technology
2 answers:
Nimfa-mama [501]3 years ago
5 0

Answer:

  There are various types of cellular data with the different transmission speeds that are: 1G,2G,3G and 4G.

1st generation network:

The 1st generation network is known as cellular network data transmission that contain analog system. It has 2.4kbps speed range. It is widely used in various services like public voice.

 2nd generation network:

The second generation network is basically based on the digital system. The global positioning system (GSM) is one of the important service in the 2nd generation network. It basically provide different types of services that are:

    GSM provide upto 2.5G range of speed and GSM EDGE upto 23kbps services.

 3rd generation network:

 It the wireless service that is basically based on the digital system. It provide various types of services like mobile interne, video calling and wireless type of telephones.

  4th generation network:

 It is one of the high digital data transmission rate and it is basically represented as the LTE.  The 4G provide many types of services like  multimedia services and telephone and gaming services.

Ivenika [448]3 years ago
3 0

Answer:

   Worldwide, operators and manufacturers like Samsung, Xiaomi, LG, Motorola, ZTE or Huawei are adapting equipment to offer consumers this kind of revolutionary connectivity that comes to the market.

   The expectation that we are facing a technological breakthrough is because 5G has the potential to change the way we use the internet.

   If 4G and its variations allowed us to connect people, 5G will allow us a much broader connection to the things around us. Your phone, for example, will probably be faster than your home's wifi.

   The speed of 4G, which is probably within your grasp right now, is 1 Gbps per second. The new network, at its full potential, will be able to deliver a standard speed of 20 Gbps per second, according to UK regulator Ofcom.

   What does this mean in practice? How long does it take to download a 5G video? And watch a movie in streaming?

Downloading a 1-hour playlist on Spotfy took about 7 minutes with 3G, 20 seconds with 4G, and with 5G that time would be 0.6 seconds.

   If you want to take a movie to watch while you're on the go - offline - service offered by platforms like Amazon Premium or Netflix - it will take you 3.7 seconds to download it while spending about 2 minutes on 4G .

   The popular Fortnite game takes 14 minutes to download using 4G technology and the expectation is that with 5G it will take 24 seconds.

   In terms of speed, one of the key factors is called latency, ie the network's responsiveness to a request.

   With 5G, it will be reduced to one millisecond - a significant gain compared to the 20 seconds of the 4G network.

   It's an essential factor "for activities such as broadcasting a live game in virtual reality or for a surgeon in New York to control a pair of robotic arms performing a procedure in Santiago," explains the next-generation networking optics expert, Abraham Valdebenito in an article.

   In short, we can send and receive data almost instantly.

You might be interested in
Write a static method, getBigWords, that gets a single String parameter and returns an array whose elements are the words in the
ZanzabumX [31]

Answer:

import java.util.*;

public class Solution {

   public static void main(String args[]) {

       Scanner scan = new Scanner(System.in);

       System.out.println("Enter the words.");

       String userInput = scan.nextLine();

       

       String[] splitedString = userInput.split(" ");

       getBigWords(splitedString);

       

   }

   

   public static void getBigWords(String[] listOfWord){

       ArrayList<String> list = new ArrayList<String>();

       

       for(int i = 0; i < listOfWord.length; i++){

           if(listOfWord[i].length() > 5){

               list.add(listOfWord[i]);

           }

       }

       

       for (String temp : list) {

  System.out.println(temp);

 }

   }

}

Explanation:

The first line is the import statement which import the classes needed for this class: Scanner and ArrayList.

The class was defined as Solution. Then, the main method is defined. Inside the main method a scanner object is created called scan to receive user input.

The user is prompted for input, which is stored as userInput. The userInput is then splitted and stored in an array called splitedString.

The method that perform the string manipulation is called getBigWords, the method take the splittedString as a parameter.

Next, the getBigWords method is defined; it takes an array as parameter. The parameter is called listOfWord. Inside the getBigWords method, an ArrayList called list is initialized. The list is to hold string whose length is more than 5.

The first for-loop loop through the listOfWord and check if any element has length greater than 5. If there is, the element is added to the list arraylist.

The second for-loop loop through the list to output the words whose length is greater than 5.

7 0
3 years ago
What is the function of a data bus
choli [55]

To gather data from its inputs

4 0
3 years ago
A.)navigate
Vaselesa [24]

Answer:

start with what you know

Explanation:

you can learn a lot from it

7 0
3 years ago
Which technology can be used to protect the privacy rights of individuals and simultaneously allow organizations to analyze data
iren [92.7K]

Answer:

De-identification or data anonymization.

Explanation:

Privacy rights are fundamental right of individuals to privatise all personal information, when creating an account.

The de-identification and data anonymization technology is provided by the organisation to user, to prevent their information to be viewed by others. It commonly used in cloud computing, communication, internet, multimedia etc. Reidentification is the reversing of the de-identification effect on personal data.

4 0
4 years ago
A.
blondinia [14]

Answer:

the electronic devices that are used for storing and processing data typically in binary from according to instructions given to it in a variable program . its major parts are 1 keyboard. mouse .monitor. cpu

Explanation:

i think this one is of a number

7 0
3 years ago
Other questions:
  • The network board in a workstation is currently configured as follows:- network speed = auto- duplexing = autoThe workstation is
    13·2 answers
  • Advantages of a personal area network
    5·1 answer
  • Which technology was used in fourth generation of computer​
    13·2 answers
  • One of the most common causes of fires in the home and workplace is: a. All of the answer choices b. Arson c. Candle d. Faulty e
    6·1 answer
  • What occurs when a website can know enough about a person's likes and dislikes that it can fashion offers that are more likely t
    9·1 answer
  • Hubs connect network hosts in which configuration?
    7·1 answer
  • Jared has trouble remembering when his assignments are due, and he wants to keep reminders on his computer. Which online note-ta
    10·2 answers
  • In the graph shown here, by what percentage are the number of people in computer occupations in general projected to increase?
    10·2 answers
  • Jobs with only 7 letters
    7·2 answers
  • William is an Architect in charge of designing a new library for a city. Which tasks will he need to perform to ensure the proje
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!