1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitry [639]
3 years ago
14

Consider the following network: proxy-cache On average there are 35 objects downloaded per second, and the average object size i

s 50,000 bits. What is the traffic intensity on the 2 Mbps access link?
a. 0.035
b. 0.007
c. 0.250
d. 0.875
Computers and Technology
1 answer:
Andrews [41]3 years ago
4 0

Answer:

(d) 0.875 erlangs

Explanation:

In a digital network, the traffic intensity = \dfrac {aL}{R}

where

a = average arrival rate of packets = 35 objects downloaded per second

L is the average packet length = 50,000 bits (e.g. in bits), and

R is the transmission rate = 2 Mbps = 2,000,000 bits per second

Traffic Intensity = \dfrac {aL}{R}=\dfrac {50000 X 35}{2000000}=\dfrac {1700000}{2000000}=0.875

You might be interested in
"The principle of ______________ states that programs tend to access data and instructions nearby recently used data and instruc
maria [59]

Answer:

<em>Locality of reference.</em>

Explanation:

In computing, The principle of locality of reference is the probability of a processor to repeatedly access the same set of memory locations within a small time interval. This reference of locality can be spatially based (repetitive usage of data within the same location on the computer memory), or temporally based (repetitive usage of a particular data or resources within a shot time interval). The ability of some computing system to perform this action increases their predictability, and efficiency of memory hierarchy use, among other abilities.

4 0
3 years ago
Programmers can use sql on systems ranging from pcs to mid-size servers.
zaharov [31]

It is false that Programmers can use SQL on systems ranging from PCs to mid-size servers.

Applications for structured query language can be found in a wide range of sectors, mostly in those that deal with database-related tasks. It might be used, for example, by a data analyst to query data sets and produce precise insights. On the other hand, a data scientist might use this programming language to add data to their models.

Businesses and other organizations use SQL tools to create and modify new tables as well as access and edit information and data in their databases.

A database is a tool for gathering and organizing data. Databases can store data about people, things, orders, and other things. Many databases begin in a spreadsheet or word processor. Many firms find it beneficial to move them to a database made by a database management system as they grow larger.

SQL helps manage the data kept in databases, enabling users to get the precise data they require when they need it.

To learn more about SQL click here:

brainly.com/question/13154090

#SPJ4

4 0
1 year ago
What piece of equipment is NOT a tool that would be considered appropriate equipment for on-site visits? a. multimeter b. flashl
Anton [14]

The oscilloscope is NOT a tool that would be considered appropriate equipment for on-site visits. The oscilloscope is an electronic test instrument used to observe observation constantly varying signals. This instruments is used in laboratories, and not on-site visits.

All other instruments are moveable and can be used on-site.


3 0
3 years ago
Which type of software has no restrictions from the copyright holder regarding modifications of the softwares internal instructi
gizmo_the_mogwai [7]
The software that has no restrictions from copyright holder regarding modification of the software's internal and its redistribution is called an Open source software. They are being provided for use and redistribution for free, with no cost. They can be easily downloaded on the Internet.
4 0
3 years ago
Suppose that the bag class is efficiently implemented with a fixed array with a capacity of 4000, as in Chapter 3 of the class t
Phoenix [80]

Answer:

b.used is 2, b.data[0] is 4, b.data[1] is 6

Explanation:

bag b;

b.insert(5); // b has 5

b.insert(4); // b has 5,4

b.insert(6); // b has 5,4,6

b.erase_one(5); // now 5 is removed , b has 4,6

so no:of elements b.used is 2

b[0]=4;

b[1]=6;

6 0
3 years ago
Other questions:
  • 3. You are a network administrator responsible for all network platforms and services. The Teta Company currently has only one b
    13·2 answers
  • What are smart mobile devices
    11·1 answer
  • What benefit does internet have​
    11·1 answer
  • You can change the transparency of a picture used as a slide’s background with the ____.
    10·1 answer
  • Write a program to calculate the great circle distance between two points on the surface of a sphere. If p1(x1, y1) and p2(x2,y2
    5·1 answer
  • What is one way you can learn about your digital footprint?
    13·1 answer
  • Use fuel with the _____________ rating recommended by your vehicle manufacturer. A ) Converter B) Emission C) Exhaust D) Octane
    9·2 answers
  • Hi, I just have a few questions from my digital tech assignment.
    14·2 answers
  • A source is:
    15·2 answers
  • The physical layer of the OSI model is not foundational to any of the other layers. True or False
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!