1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alenkinab [10]
3 years ago
9

Hosts A and B are 20 000 km away from each other. The propagation speed of the link between them is 25000 mps. The data is place

d onto the link at a rate of 8 kbps. The size of the packet of data that needs to be transmitted is 200 bytes. What is the propagation delay in seconds?
Computers and Technology
1 answer:
nexus9112 [7]3 years ago
7 0

Answer:

Given data:

size of a packet is =200 bytes

transmission rate =8 kbps

In a network, transmission delay doesn't depends on the distance between to nodes It depends on the size of packet and transmission rate of the link. transmission delay is calculated by dividing the size of packet by transmission rate of the link. Size of the packet should be in "bits" and transmission rate should be in "bits/sec".

transmission delay (Dt) = The size of the packet(in bits) / transmission rate(bits/sec)

The size of the packet = 200 bytes = 200*8 bits

bandwidth = 8 kbps = 1000*8 bps

transmission delay (Dt) = 200*8/1000*8

= 1/5 = 0.2 seconds

So the Answer is 0.2 second

You might be interested in
Explain how AI smartphone software in the rental car can be a threat to privacy.
Elan Coil [88]

Answer:

The real reason why AI smartphone software in the rental car is threat to privacy is that the data transmitted can actually be exposed to security breaches in the software and so if that happens, the car is no longer under the control of the user.

Hope this helps!

4 0
3 years ago
The purchase and subsequent sale of a securities position in a customer account solely to generate commissions is____________.
Citrus2011 [14]

Answer:

Churning

Explanation:

Churning is termed as an act of a broker conducting immoderate trading in the account of client solely to generate commissions. It is an illegal and deceptive practice. It violates security laws. The purchase and subsequent sale of a securities that are little or insignificant to meet the investment goals of client can be the evidence of churning. Consequently it causes considerable losses in client's account or can produce a tax liability.

Churning occurs due to over trading by a broker to generate commissions by buying and selling stocks excessively on the behalf of investor. This often happens when broker has permissive authority over client's account.

5 0
3 years ago
How does naming affect a variable’s creation and use?
Evgen [1.6K]

Answer:

Each variable is named so it is clear which variable is being used at any time. It is important to use meaningful names for variables: ... The name given to each variable is up to the programmer, but ideally a variable name should have meaning, ie it should reflect the value that it is holding.

Variables make code more than a static set of instructions. They allow logic to occur, enabling developers to measure time, analyze data, and customize the program to the user. Variables are so important to the code that they deserve a good name that accurately describes their purpose

Explanation:

4 0
3 years ago
Each piece of evidence that is collected should be placed in a separate container true or false
alexandr402 [8]
Yes this is true . But evidence is better when it’s true
4 0
3 years ago
____________________ material is information, graphics, images, or any other physical or electronic item that could have value a
djverab [1.8K]

Answer:

Explanation:

Evidentiary material is information, graphics, images, or any other physical or electronic item that could have value as evidence in a legal proceeding, whether criminal or civil. Information of evidentiary value may be found on digital  media such as CDs,  (DVDs), floppy disks, thumb  drives, hard drives, and memory expansion cards found in digital cameras and mobile  phones.

7 0
3 years ago
Other questions:
  • What is the name of a robot astronaut created by NASA
    14·2 answers
  • Write an original idiom that uses the word dog or dogs im in 4th
    5·2 answers
  • Prewritten, commercially available sets of software programs that eliminate the need for a firm to write its own software progra
    5·1 answer
  • What is the purpose of the overload keyword in the ip nat inside source list 1 pool nat_pool overload command?
    8·1 answer
  • 1. Define a C++ function with the name evaluateBook. The function receives as one argument the name of the file to be processed
    13·1 answer
  • I'm looking for a new laptop for school. Which laptop would be the best. Right now I have a chromebook and it is broken. 
    12·2 answers
  • What is one of the most helpful things about having a role model?
    10·2 answers
  • If the predetermined overhead allocation rate is 245% of direct labor cost, and the Baking Department's direct labor cost for th
    13·1 answer
  • Maria is creating a program where the user will enter their name to begin. What kind of variable should be used for the user’s n
    15·2 answers
  • The disk you inserted was not readable by this computer
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!