1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Basile [38]
3 years ago
6

Waygate's residential Internet modem works well but is sensitive to power-line fluctuations. On average, this product hangs up a

nd needs resetting every 200 hours. On average about 45 minutes is needed to reset this product. What is this product's availability
Computers and Technology
1 answer:
dalvyx [7]3 years ago
3 0

Answer:

The answer is "In excess of 0.95 "

Explanation:

MTBF= 200\ hours (12,000\ minutes)\\\\MTR= 45\ minutes (0.75\ hours)

Availability equation =\frac{ MTBF}{(MTBF+MTR)}  

Calculating the minutes as the common units:

= \frac{12,000}{(12,000+45)}\\\\= \frac{12,000}{(12,045)}\\\\= 0.9962\\\\= In\ excess\ of\ 0.95

Calculating the hours as the common units:

 = \frac{200}{(200+0.75)}\\\\= \frac{200}{200.75}\\\\= 0.9962\\\\= In \ excess\ of\ 0.95

You might be interested in
All slides in a presentation must use the same transition. True or False?
krek1111 [17]
False. you can make different slides have different transitions
7 0
3 years ago
Read 2 more answers
Which type of attack is one in which a rogue wireless access point poses as a legitimate wireless service provider to intercept
il63 [147K]
Answer: An evil twin attack poses as a legitimate AP.<span />
7 0
3 years ago
Graphical elements that precede each item in a list are known as​ __________.
Vanyuwa [196]

The answer in the space provided is the bullets as this is the graphic elements that are used in each items that is organized in a list in a way of making the list more clearer and more presentable with the given indications or symbols.

4 0
3 years ago
Your company leases a very fast internet connection and pays for it based on usage. You have been asked by the company president
azamat

Answer:

c. Install a proxy server

Explanation:

In computing a proxy server is implemented as a middle 'man' between the user and the internet. It will hence behave as a gateway that will seperate users from the websites that they browse. The major importance of a proxy server is enforcing security, however it can also act as a web filter allowing organizations to restrict access to certain websites. So when an organization or a school wishes to prevent access to certain sites a proxy server will be implemented, in the question scenario this web filter feature can be used to save cost associated with visiting sites not relevant to the organization's objectives

7 0
3 years ago
PLEASE HELP!
Basile [38]

Answer:

declare count as integer

7 0
3 years ago
Other questions:
  • A cpu with an external clock speed of 2 ghz and a 64-bit data bus can (theoretically) transfer how much data per second?
    8·1 answer
  • In which scenario would instant messaging be more useful than other forms of communication?
    10·1 answer
  • A computer hard disk starts from rest, then speeds up with an angular acceleration of 190 rad/s2 until it reaches its final angu
    10·2 answers
  • An organization is implementing a preselected baseline of security controls, but finds not all of the controls apply. What shoul
    15·1 answer
  • Define a romanNumberToInt function that converts a RomanNumber value, which is a list of Roman digits, into an integer. Hints: -
    7·1 answer
  • Hi guts gyt edgsahgflefljwegfwygafbhdshdnvcashD
    13·1 answer
  • Write a Java class with the following methods: getArray(int numStrings) is an instance method that takes command line input (use
    11·1 answer
  • Sally has 4 quarters, 2 dimes, 6 nickels, and 10 pennies.
    13·2 answers
  • What two windows security updates do most organizations always patch?
    7·1 answer
  • I NEED HEP QUICK
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!