1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
solmaris [256]
4 years ago
10

What differences in traffic patterns account for the fact that STDM is a cost-effective form of multiplexing for a voice telepho

ne network and FDM is a cost-effective form of multiplexing for television and radio networks, yet we reject both as not being cost effective for a general-purpose computer network?
Computers and Technology
1 answer:
fgiga [73]4 years ago
7 0

Answer:

Answer explained below

Explanation:

statistical time division multiplexing (STDM) and frequency-division multiplexing (FDM)

They both STDM and FDM works well for the channels which transmit continuously like telephone, FM radio and TV which continuously transmit signal. Since inactive lines are wasted this makes these venues a good fit for STDM and FDM. which means if the signals are dropped or not received to the receiver than it won't have to send the signals again which is why STDM and FDM are useful in these cases.

In Traditional Computer Communications system, the system have tended to be a lot more 'bursty' with idle periods. Hence if we use the FDM and STDM than the usage patterns of STDM and FDM would waste this idle time. so that is why we tend not to use the FDM and STDM in the general purpose computer network.

You might be interested in
Suppose you have an int variable called number. What Java expression produces the second-to-last digit of the number (the 10s pl
Elden [556K]

Answer:

(number%100) / 10

(number%1000) / 100

Explanation:

5 0
3 years ago
When assembling a desktop computer you should always install the drives before the motherboard?
s2008m [1.1K]
Yes you should install drives first
8 0
3 years ago
Security and protection as it relates to operating systems is grouped into four categories: Availability, Data integrity, Authen
Ivahew [28]

Answer:

The answer is "Confidentiality".

Explanation:

Data Security is also known as protection against unauthorized computer access, files, and pages through digital information protection. The protection of data also prevents data from bribery.  

  • It applies to both the security of data from unwanted entities being obtained.
  • It allows accessing sensitive data, which may be able to do so.
4 0
4 years ago
Assuming your computer only has one network card installed; explain how your virtual machine is able to share that card with you
adell [148]

Answer and Explanation:

Virtual machine have one imitated organize connector and there is one of a kind MAC address is allocated with it.  

The system driver of the Virtual machine's performs all the task:  

  • The system driver places physical connector in 'promiscuous' mode implies physical connector will acknowledge all system parcel paying little heed to MAC address,then virtual machine's driver channels its bundles and direct it to the virtual machine.
5 0
3 years ago
In database systems, the dbms enforces rules about which user can perform which action when. The rules are known as ________.
saw5 [17]

I guess the correct answer is concurrency control

Cοncurrеncy cοntrοl is a databasе managеmеnt systеms (DBMS) cοncеpt that is usеd tο addrеss cοnflicts with thе simultanеοus accеssing οr altеring οf data that can οccur with a multi-usеr systеm.

In database systems, the DBMS enforces rules about which user can perform which action when. The rules are known as concurrency control.

6 0
3 years ago
Other questions:
  • Write a program that will ask the user to input a phrase (multiple word sentence), and an integer value. A static function will
    14·1 answer
  • The domain name service (dns is a distributed database that allows users to communicate with each other computers by:
    7·1 answer
  • There is an enormous amount of information on the Internet that is automatically separated into good content and not-so-good con
    15·1 answer
  • Que es un programa de ordenador?
    10·1 answer
  • Which protocol sends a request to view or download a website or file ​
    7·1 answer
  • In our discussion of Computer Hardware, we talked about three essential hardware components that are there inside every computer
    14·1 answer
  • How network diagram help in scheduling a project? Draw activity network diagram as per given
    7·1 answer
  • AJ created a list, and he needs all of the numbers to be in order. Which Python function will allow him to organize his list num
    5·2 answers
  • You send a friend a private message about something personal that is going on with you. Without permission, she forwards your te
    10·1 answer
  • You've just received an email message that indicates a new serious malicious code threat is spreading across the internet. The m
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!