1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erik [133]
3 years ago
10

Suppose users share a 1 Mbps link. Also suppose each user

Computers and Technology
1 answer:
torisob [31]3 years ago
4 0

Answer:

The answer is below

Explanation:

A) The total bandwidth = 1 Mbps = 1000 Kbps

The requirement for each user = 100 Kbps

Total number of users = Total bandwidth /  requirement for each user

Total number of users = 1000 Kbps / 100 Kbps = 10 users

B) Since each user transmits only 10 percent  of the time, probability that a given user is transmitting is:

Probability = 0.1

C) Binomial distribution formula is given by:

P(x)= C(n,x)p^x(1-p)^{n-x}\\\\n = number\ of \ trials,x=number\ of\ success, p=probability\ of\ success \ for\ one\ trialHence:

Probability=(50\ choose\ n)p^n(1-p)^{50-n}

P=C(50,n)p^n(1-p)^{50-n}

D) The probability that there are 11 or more is:

Probability=1-\Sigma\limits^{20}_0 {(50\ choose\ n)p^n(1-p)^{50-n}}

You might be interested in
What are at least three tips to taking photographs of insects? Why would following the tips help create better photographs?
Ber [7]

1) Use a good cam 2) Make sure you focus on it 3) Make sure you snap it at the right time....    I hope this helps!!!!!

7 0
3 years ago
Suppose you are asked to design a rotating disk where the number of bits per track is constant. You know that the number of bits
Olenka [21]

Answer:

suppose i was i would tell them i dont know and walk away

Explanation:

in thoery this is correct

you said suppose so i answerd

there is no use in reporting or getting this taken down

nether is it right

im not stealing points

Because in thoery its an answer

<em><u>THIS IS MY PROTEST</u></em>

6 0
3 years ago
Which two approaches optimize test maintenance and support future declarative configuration changes? Choose 2 answers Create a m
patriot [66]

Answer:

B and C

Explanation:

B. Create a method that load valid account records from a static resource, then call this method within test method

C. Create a method that creates valid records, then call this method within test methods

3 0
3 years ago
How can ascii be used to represent characters in computer system
Furkat [3]

It is a code for representing 128 English characters as numbers, with each letter assigned a number from 0 to 127. For example, the ASCII code for uppercase M is 77. Most computers use ASCII codes to represent text, which makes it possible to transfer data from one computer to another.

7 0
3 years ago
Technician A says that Teflon sealing rings require special tools for proper installation. Technician B says that warming a Tefl
bezimeni [28]

Answer:Both Technicians A and B are correct.

Explanation:Teflon is a florinated polymer it is polytetrafluroethylene (PTFE). It is widely used in different fields and the making of materials for both home and industrial use. Teflon rings does requires special tools for proper installation which is called TEFLON RING INSTALLER.

Warming the a Teflon ring in water or oil at 130-140°F for about 5 minutes will help to soften the material for easier installation. cover wear ring grooves with plastic tape.

8 0
3 years ago
Other questions:
  • What is microsoft excel
    12·1 answer
  • In the INSERT statement that follows, assume that all of the table and column names are spelled correctly, that none of the colu
    9·1 answer
  • The most common type of local correction system is
    11·1 answer
  • In which career field would the computing technology industry associations compTIA A+ certification be useful
    6·1 answer
  • How is a cell named in microsoft excel 2016
    10·1 answer
  • Carol typed a memo to send to everyone in her department. To create this memo, she used a _____.
    8·2 answers
  • Which are examples of non-linear presentations? Choose all that apply.
    11·1 answer
  • The technique helps you explore possible risks by providing access to risk areas identified in the past. It also provides the so
    10·1 answer
  • What is a characteristic of high-level languages?
    15·1 answer
  • Identify and state the value of hardware components​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!