1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anna71 [15]
3 years ago
5

Imagine you plan to send 5 petabytes data from New York to San Francisco. You have two choices: (1) transfer data using your 200

Mbps dedicated link; (2) use UPS over-night delivery. Which option will deliver the data quicker?
Computers and Technology
1 answer:
Taya2010 [7]3 years ago
8 0

Answer: UPS.

Explanation: Since there are around 1 Billion Megabytes in 1 Petabyte, 5,368,709,120 / 200 Mbps = 26,843,545 Seconds.

26,843,545 seconds = 310 Days.

UPS should be faster.

I hope I helped you out!

You might be interested in
Create a database with information about products in a catalog. As you plan, keep in mind that later you will want to sort this
nika2105 [10]

pro.no. Qty  Price  Description

1            23   1.00     Apple

2           90   1.00     Banana

3           16    1.00     Orange

4           124  1.00     Pear

5           98   1.00     Blue Berry

6           25   1.00     Raspberry

7           76   1.00     Black Berry

8           00   1.00     Pineapple

9           231  1.00     Green Grape

10          689 1.00     Red Grape

11           2      1.00     Watermellon

3 0
3 years ago
Read 2 more answers
The local library dealing with a major computer virus checked its computers and found several unauthorized programs, also known
Dvinal [7]

Answer:

malware

Explanation:

7 0
3 years ago
Read 2 more answers
We cannot imagine a life without the Internet. Imagine that you had to live without being connected to the Internet. Discuss the
sleet_krkn [62]

Answer:

1, I would not be able to contact anyone, or call for help.

2, Stores like Apple would lose their purpose.

3, Life would be boring and dull.

  • i hope that helped at all.

4 0
2 years ago
Write a statement to create a Google Guava Multimap instance which contains student ids as keys and the associated values are st
Sergeu [11.5K]

Answer: provided in the explanation section

Explanation:

Note: take note for indentation so as to prevent error.

So we import com.google.common.collect.Multimap;

import java.util.Collection;

import java.util.Map;

class Main {

   public static void main(String[] args) {

       // key as studentId and List of Profile as value.

       Multimap<String,Profile> multimap = ArrayListMultimap.create();

       multimap.put("id1", new ExamProfile("examStudentId1"));

       multimap.put("id1", new ELearningProfile("userId1"));

       multimap.put("id2", new ExamProfile("examStudentId2"));

       multimap.put("id2", new ELearningProfile("userId2"));

       // print the data now.

       for (Map.Entry<String, Collection<Profile>> entry : multimap.entrySet()) {

           String key = entry.getKey();

           Collection<String> value =  multimap.get(key);

           System.out.println(key + ":" + value);

       }

   }

}

// assuming String as the studentId.

// assuming Profile as the interface. And Profile can multiple implementations that would be

// specific to student.

interface Profile {

}

class ExamProfile implements Profile {

   private String examStudentId;

   public ExamProfile(String examStudentId) {

       this.examStudentId = examStudentId;

   }

}

class ELearningProfile implements Profile {

   private String userId;

   public ELearningProfile(String userId) {

       this.userId = userId;

   }

}

This code is able to iterate through all entries in the Google Guava multimap and display all the students name in the associated students profile.

8 0
3 years ago
Universal Containers (UC) has decided to build a new, highly sensitive application on the Force platform. The security team at U
Tresset [83]

Use an AppExchange product that does fingerprint scanning with native Salesforce Identity  Confirmation

8 0
3 years ago
Other questions:
  • Which computer port transmits audio and video without the need for compression?
    6·1 answer
  • Adam discovers a virus on his system that is using encryption to modify itself. the virus escapes detection by signature-based a
    14·1 answer
  • This needs to be written in Java.
    11·1 answer
  • E-mail has made it very easy to send a message to more than one person at any time of day from just about anywhere. If you wante
    12·2 answers
  • In 4-bit sign magnitude representation, what is the binary encoding of the number -5?
    15·1 answer
  • If a fire should break out in your building, which of the following actions is NOT recommended?
    10·2 answers
  • Which of the following is used to move to end of the row?​
    8·1 answer
  • Write a program that will generate a personalized invitation within a text file for each guest in the guest list file using the
    15·1 answer
  • What does the Finder do?
    5·1 answer
  • Which era marked a switch from agricultural practices to industrial practices?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!