Answer:
The answer is "5 users and 1 block".
Explanation:
In Option a:
Bandwidth total 
Any User Requirement 
The method for calculating the number of approved users also is:
Now, calculate the price of each person for overall bandwidth and demands,


In Option b:



mean user 

max user 

Answer:
where are the options for the question
Answer: Source
Explanation: The malware is the software persisting malicious approach to cause the damage/loss.The primary trait of the malware are infection,concealment,etc.
The concealment refer to the malware such as the Trojan horse, and other viruses that has only purpose to cause the malfunctioning in the system.The virus that get into the other software and then damage the system in known as the infectious malware .
The circulation is the transferring of the virus in the circular manner between the system for the damaging.Thus,the only trait that is not the part of the malware is source.
Answer:
Yes
Explanation:
Depending on the ethernet standard used, the IEEE 802.3 is faster than the WIFI (IEEE 802.11ac).
The ethernet protocol on cabled networks are of different speed based on ethernet standard which ranges from 10 Mega-bits to 100 Giga-bits per second. This protocol is found in the physical layer of the OSI model.
The wifi 802.11ac also known as wifi 5 is a wireless connection medium in the physical layer of the OSI model. It has a range of aggregate speed capacity of 433 mega-bits per second to 6.77 giga-bits per second.