1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andrew [12]
3 years ago
15

Discuss trends in cellular data transmission speeds

Computers and Technology
2 answers:
Nimfa-mama [501]3 years ago
5 0

Answer:

  There are various types of cellular data with the different transmission speeds that are: 1G,2G,3G and 4G.

1st generation network:

The 1st generation network is known as cellular network data transmission that contain analog system. It has 2.4kbps speed range. It is widely used in various services like public voice.

 2nd generation network:

The second generation network is basically based on the digital system. The global positioning system (GSM) is one of the important service in the 2nd generation network. It basically provide different types of services that are:

    GSM provide upto 2.5G range of speed and GSM EDGE upto 23kbps services.

 3rd generation network:

 It the wireless service that is basically based on the digital system. It provide various types of services like mobile interne, video calling and wireless type of telephones.

  4th generation network:

 It is one of the high digital data transmission rate and it is basically represented as the LTE.  The 4G provide many types of services like  multimedia services and telephone and gaming services.

Ivenika [448]3 years ago
3 0

Answer:

   Worldwide, operators and manufacturers like Samsung, Xiaomi, LG, Motorola, ZTE or Huawei are adapting equipment to offer consumers this kind of revolutionary connectivity that comes to the market.

   The expectation that we are facing a technological breakthrough is because 5G has the potential to change the way we use the internet.

   If 4G and its variations allowed us to connect people, 5G will allow us a much broader connection to the things around us. Your phone, for example, will probably be faster than your home's wifi.

   The speed of 4G, which is probably within your grasp right now, is 1 Gbps per second. The new network, at its full potential, will be able to deliver a standard speed of 20 Gbps per second, according to UK regulator Ofcom.

   What does this mean in practice? How long does it take to download a 5G video? And watch a movie in streaming?

Downloading a 1-hour playlist on Spotfy took about 7 minutes with 3G, 20 seconds with 4G, and with 5G that time would be 0.6 seconds.

   If you want to take a movie to watch while you're on the go - offline - service offered by platforms like Amazon Premium or Netflix - it will take you 3.7 seconds to download it while spending about 2 minutes on 4G .

   The popular Fortnite game takes 14 minutes to download using 4G technology and the expectation is that with 5G it will take 24 seconds.

   In terms of speed, one of the key factors is called latency, ie the network's responsiveness to a request.

   With 5G, it will be reduced to one millisecond - a significant gain compared to the 20 seconds of the 4G network.

   It's an essential factor "for activities such as broadcasting a live game in virtual reality or for a surgeon in New York to control a pair of robotic arms performing a procedure in Santiago," explains the next-generation networking optics expert, Abraham Valdebenito in an article.

   In short, we can send and receive data almost instantly.

You might be interested in
Two communicating devices are using a single-bit even parity check for error detection. The transmitter sends the byte 10101010
icang [17]

Answer:

The receiver will not detect the error.

Explanation:

The byte sent by transmitter: 10101010

The byte received by receiver due to channel noise: 10011010

If you see the bold part of the both sent and received bytes you can see that the number of bits changed is 2.

The two communicating devices are using a single-bit even parity check. Here there are two changed bits so this error will not be detected as this single bit even parity check scheme has a limit and it detects the error when the value of changed bit is odd but here it is even.

This parity scheme basically works well with the odd number of bit errors.

7 0
3 years ago
Museum web sites are generally good resources for information.<br> A.) True<br> B.) False
Hatshy [7]
True. Museums usually specialize in one area in specifics.

Ex. WWII Museums give great historical info on WWII
8 0
3 years ago
Read 2 more answers
Which symbol should you use for entering a formula in a cell?
Sonbull [250]

A symbol which should be used for entering a formula in a cell is: B. =.

<h3>What is Microsoft Excel?</h3>

Microsoft Excel can be defined as a software application that is designed and developed by Microsoft Inc., for analyzing and displaying spreadsheet documents by using rows and columns in a tabulated format.

<h3>What is a spreadsheet?</h3>

In Computer technology, a spreadsheet can be defined as a document which comprises cells that are arranged in a tabulated format with rows and columns. Also, a spreadsheet is typically used in various field to do the following on a data:

  • Sort
  • Calculate
  • Format
  • Arrange

As a general rule, "B. =" is a symbol which should be used for entering a formula in a cell on a spreadsheet application such as Microsoft Excel.

Read more on spreadsheets here: brainly.com/question/4965119

#SPJ1

3 0
2 years ago
What are the differences and similarities of computer virus and biological virus. Give 4 examples
Papessa [141]

Answer:

During recent months, we’ve witnessed an unexpected and distressing pandemic of a coronavirus disease. What I find especially distressing about it is how the worldwide adversity was caused by just a tiny thing — namely, a virus called SARS-CoV-2.

However, biological viruses have always been a potent threat to humanity, as historic pandemics have proved. No wonder viruses became an ideal weapon model in a totally different world — a world of programming. The first computer viruses were created as early as in the 1970s. Starting as pranks, they evolved to become a major threat to the stability of computer networks worldwide. And the more I think of viruses, both biological and digital, the more amazed I am by their similarities.

We don’t know what kind of challenges viruses of either type will cause in the future, but understanding how they infect, the symptoms they induce, how they spread, and the damage they can cause can help us fight both.

The Common Thread

Let’s start with the basics: What does a virus look like?

computer virus of 1999

Click image for larger version

Figure 1: Pictured on the left is an electron microscope image of SARS-CoV-2 particles - the pandemic-causing coronavirus. Source: NIAID-RML. Pictured on the right is a code snippet of a Melissa, the notorious email-spreading computer virus of 1999. Source: Gizmodo.

The images in Figure 1 might look vastly different, but, essentially, they’re the same: a string of code. In the coronavirus, it’s the RNA genome in a shell; in Melissa, it’s computer code. In both cases, the code is an “instruction” for the virus to follow.

Explanation:

here is your answer hope you will enjoy

thank you

6 0
2 years ago
A tooltip is a _____________ that allows the programmer to create a small popup message that displays when the user places the m
Shalnov [3]
I believe a message
7 0
3 years ago
Read 2 more answers
Other questions:
  • A job posting is the best way to find out what _____ are required for a position.A.aptitudes B.hard skills C.soft skills D.dress
    10·2 answers
  • What happens if you give false information on your driver license application?
    12·1 answer
  • Which are benefits of modeling a solution? Choose all that apply. allows you to be sure the problem and solution are understood
    9·2 answers
  • Select all that apply.
    10·1 answer
  • What is the color difference between the iMac and iMac Pro
    14·2 answers
  • The true or false questions.
    13·1 answer
  • Write a Java program to count the characters in each word in a given sentence?Examples:Input : geeks for geeksOutput :geeks-&gt;
    10·1 answer
  • Write a program that prompts the user to enter the area of the flat cardboard. The program then outputs the length and width of
    15·1 answer
  • What is the main component of the EV3 Lego Robot called?​
    6·1 answer
  • The purpose of a good web page design is to make it
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!