Answer:
69.08265412 milliseconds
Explanation:
Lets first convert 7 MiB to bits
bits
Now convert bits to Gbits
Gbits
Queuing Delay = Total size/transmission link rate
Queuing Delay=
seconds
Delay of packet number 3 =
seconds
or
milliseconds
Answer:
- Gather customer feedback: Email Survey
- Tell customers about the extended opening hours: Social Media Page
- Show customers Hamish’s latest hair looks: An online gallery
- Help customers find the new salon: A map
Explanation:
1. By sending a questionnaire or survey via email, Hamish can gather customer feedback. Customers can answer these questionnaires directly in attached questions. They can also give feedback over email. Email survery is an economical way to collect feedback and can be sent to a many customers at the same time.
2. Hamish can tell customers about opening hours by a Social Media Page is a mean to assist social media accounts through QR Codes. He can update with his salon information via this web page. When customers scan can see salon's logo, information etc on this page in order to follow.
3. Hamish can display his latest hair looks through an online gallery by sharing his photos to many people. These images are stored, organized displayed and shared on the website (online gallery). This is a better option than using expensive albums and hard copies.
4. Hamish can help customers to find a new salon by providing a map on his website. This makes easier for customers to locate the new salon as map provides with the navigation information. Customers can get a route from their current location to the salon.
Answer:
This address is by default a class c network
Explanation:
This IP address in this question is a class c network because it has 196 as its first octet. A class c network is one which has its first octet to be between 192 and 223. the class c network begins with a 110 binary. If ip is between 192 to 223 it belongs to this class. These first 3 octets are the representation of the network number in the address. Class c's were made to support small networks initially.
Incomplete question. Here's the full question:
Data-Time Inc. is a company that manages databases for a large city in Colorado. Included in these databases is information collected from the city’s homeless shelters and free clinics. Specifically, the databases contain personal information of the users of these services over the past 10 years; this includes people’s Social Security numbers and health records.
This data is highly secure and only accessible to the employees of Data-Time Inc. Employees are given a laptop when they are hired which allows them to access the database remotely. Unfortunately, one of these laptops is stolen and the security of the database is compromised.
A majority of the people whose information was compromised are homeless; therefore there is no easy way to contact them in order to alert them of the security breach. How should Data-Time Inc. manage this breach in security?
<u>Explanation:</u>
Since the emphasis is not on reversing the breach that has occurred, but on managing the level of security damage that could occur, it is important measures are directed towards preventing unauthorized access to sensitive information.
For example, the Media Access Control Address (MAC address) of the laptop if known could be greylisted from accessing the server that contains the sensitive information.