1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
solmaris [256]
3 years ago
10

What differences in traffic patterns account for the fact that STDM is a cost-effective form of multiplexing for a voice telepho

ne network and FDM is a cost-effective form of multiplexing for television and radio networks, yet we reject both as not being cost effective for a general-purpose computer network?
Computers and Technology
1 answer:
fgiga [73]3 years ago
7 0

Answer:

Answer explained below

Explanation:

statistical time division multiplexing (STDM) and frequency-division multiplexing (FDM)

They both STDM and FDM works well for the channels which transmit continuously like telephone, FM radio and TV which continuously transmit signal. Since inactive lines are wasted this makes these venues a good fit for STDM and FDM. which means if the signals are dropped or not received to the receiver than it won't have to send the signals again which is why STDM and FDM are useful in these cases.

In Traditional Computer Communications system, the system have tended to be a lot more 'bursty' with idle periods. Hence if we use the FDM and STDM than the usage patterns of STDM and FDM would waste this idle time. so that is why we tend not to use the FDM and STDM in the general purpose computer network.

You might be interested in
9. If you want to change the Header text of any Form then which property will you use
Lady_Fox [76]

Answer:

header

Explanation:

i would use header

8 0
2 years ago
Match each item with a statement below. - A parameter in a method header. - A set of methods that can accept a call given the pa
Bas_tet [7]

Answer:

                                 

Explanation:

6 0
3 years ago
7.4 code practice question 1 edhesive
Semmy [17]

Answer:

7.4 Code Practice: Question 1

def GPAcalc(g):

if g == "a" or g == "A":

return 4

elif g == "B" or g == "b":

return 3

elif g == "C" or g == "c":

return 2

elif g == "D" or g == "d":

return 1

elif g == "F" or g == "f":

return 0

Explanation:

4 0
3 years ago
Read 2 more answers
Will robots take people's jobs? <br> write in complete sentence.
lilavasa [31]

Answer:

yes

Explanation:

yes because they already have them for old gun ships (which they still use) and they have made cars with them and more including bombing situations IED detinators they used in Afghanistan and in Iraq in 2011.

6 0
3 years ago
What is the value of alpha[3] after the following code executes?
12345 [234]

Answer:

Option (4) i.e., 10 is the correct answer to the following question.

Explanation:

Here, in the following question that is written in the Java Programming Language in which they set an integer data type array variable "alpha" and pass index value 5 then 3. Set the for loop which is starets from 4 to 0 in reverse order then, initialize the value of the variable "j + 5" in the array variable alpha then, check condition if j is less than equal to 2 then perform calculation "alpha[j + 1] = alpha[j] + 3".

6 0
3 years ago
Other questions:
  • How to do this? ICT Excel there's a screenshot attached
    6·1 answer
  • Controlled intersections use some form of which of the following:
    7·1 answer
  • What two technologies below are hybrid processors that can handle 32 bit and 64 bit operating systems natively?
    11·1 answer
  • Your friend’s parents are worried about going over their budget for the month. Which expense would you suggest is NOT a need?
    10·2 answers
  • What are pixels? A. Objects that are part of a particle system B. Tiny colored dots that make up images and text on a computer s
    9·1 answer
  • • In your response, please include some examples of the three different types of storage.
    11·2 answers
  • The Software Engineering Code of Ethics and Professional Practice was developed by Select one: a. Computer Professionals for Soc
    7·1 answer
  • Examples of email use that could be considered unethical include _____.
    14·2 answers
  • How many fnaf games did Scott Cawthon make?
    6·1 answer
  • Electronic résumés have an attractive, highly formatted appearance. please select the best answer from the choices provided t f
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!