1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elena-s [515]
3 years ago
14

Suppose that a server sends four packets of audio data, in 15 seconds each. The first is sent by the server exactly at noon (12:

00:00), while each of the three successive packets is sent immediately after the completion of its predecessor. The client, on the other hand, receives the four packets beginning at 12:00:03, 12:00:20, 12:00:41, 12:00:59 respectively. What is the smallest delayed wait time (buffer) in seconds that would ensure the client had seamless playback (i.e. each packet plays immediately after the previous one ends)?
Computers and Technology
1 answer:
Romashka [77]3 years ago
3 0

Answer:

15

Explanation:

for seamless playback each packet should be played before their predecessor so

4th packet will start at 12:01:03

3rd packet will start at 12:00:48

2nd packet will start at 12:00:33

1st packet will start at 12:00:18

as first packet arrives at 12:00:03 so wait time is 15 seconds for seamless playback

You might be interested in
Word Bank:
NNADVOKAT [17]

Explanation:

circle with radius and colour red

3 0
2 years ago
what is one example of the decomposers taking from the ecosystem and one of them giving to the ecosystem
adelina 88 [10]
Like when a seed drops on the ground, and a bee come to take some honey. It sticks to the bee and where the bee goes, the bee will rub it off and the seed will start to grow.
8 0
3 years ago
What are the differences and similarities of computer virus and biological virus. Give 4 examples
Papessa [141]

Answer:

During recent months, we’ve witnessed an unexpected and distressing pandemic of a coronavirus disease. What I find especially distressing about it is how the worldwide adversity was caused by just a tiny thing — namely, a virus called SARS-CoV-2.

However, biological viruses have always been a potent threat to humanity, as historic pandemics have proved. No wonder viruses became an ideal weapon model in a totally different world — a world of programming. The first computer viruses were created as early as in the 1970s. Starting as pranks, they evolved to become a major threat to the stability of computer networks worldwide. And the more I think of viruses, both biological and digital, the more amazed I am by their similarities.

We don’t know what kind of challenges viruses of either type will cause in the future, but understanding how they infect, the symptoms they induce, how they spread, and the damage they can cause can help us fight both.

The Common Thread

Let’s start with the basics: What does a virus look like?

computer virus of 1999

Click image for larger version

Figure 1: Pictured on the left is an electron microscope image of SARS-CoV-2 particles - the pandemic-causing coronavirus. Source: NIAID-RML. Pictured on the right is a code snippet of a Melissa, the notorious email-spreading computer virus of 1999. Source: Gizmodo.

The images in Figure 1 might look vastly different, but, essentially, they’re the same: a string of code. In the coronavirus, it’s the RNA genome in a shell; in Melissa, it’s computer code. In both cases, the code is an “instruction” for the virus to follow.

Explanation:

here is your answer hope you will enjoy

thank you

6 0
3 years ago
Keep true , never be ashamed of doing right decide on what you think is right and stick to it.
Doss [256]
This is the quote of T.S. Eilot
5 0
3 years ago
Describe the function<br>ms word, Acess, Elexel, Power point<br>Publisher and Outlook​
marta [7]

Answer:

Write documents consisting mainly of text, Create databases, Create tables for organizing and calculating data, Create presentations to display in front of groups to display data and other info, Create advanced documents such as magazines, flyers, coupons, and other things, Organize your day and easily manage contacts and emails.

6 0
3 years ago
Other questions:
  • What type of file can most software applications read?
    5·2 answers
  • Why are high-quality transformers wound with large diameter wire?
    8·1 answer
  • Which option in presentation software can you use to apply a “fly in” effect to the objects on a slide? A)flowchart B)shapes C)
    11·2 answers
  • Which of the following is NOT a component of a DFD?
    8·1 answer
  • Which is a value of the Scrum Manifesto?
    9·1 answer
  • The region which satisfies all of the constraints in graphical linear programming is called the:
    8·1 answer
  • Write a function called printBackwards() that will work with a C string. The function will print any C string backwards. You don
    13·1 answer
  • The velocity dimension of Big Data refers to _____.
    15·1 answer
  • The Office ____ is a temporary storage area. Warehouse Clipboard Storehouse Gallery
    15·1 answer
  • Which excel feature makes it easy to copy and paste formulas in multiple cells?.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!