1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
solmaris [256]
3 years ago
12

Assume that you want to click on a link to obtain a Web page. The IP address for this link is not cached in your local host, so

a DNS lookup is necessary to obtain the IP address corresponding to that link. Suppose that n DNS servers are visited before your host receives the IP address from DNS. The successive visits incur an RTT of RTT1 ,..., RTTn. Further suppose that the Web page contains one object(e.g. base file) but referencing 10 other objects on the same server, like images, audio, etc. Let RTT0 denote the RTT between the local host and the server containing objects above. Assuming zero transmission time of the objects, how much time elapses when the client clicks on the link until the client receives all the objects with:
(1) Non-persistent connection without parallel TCP connection

(2) Non-persistent connection with 4 parallel TCP connections

(3) Persistent connection without pipelining

(4) Persistent connection with pipelining
Computers and Technology
1 answer:
marin [14]3 years ago
7 0

Answer:

3

Explanation:

because I just got a new phone I looked up the awaner it is 3

You might be interested in
A _________ is a task at the lowest level of the WBS that represents the level of work that the project manager uses to monitor
Gre4nikov [31]

<u>Full question:</u>

A _____ is a deliverable at the lowest level of the WBS that represents the level of work that the project manager uses to monitor and control the project.

a) WBS dictionary

b) Budget item

c) Line item

d) Work package

Option D

A Work package is a deliverable at the lowest level of the WBS that represents the level of work that the project manager uses to monitor and control the project.

<u>Explanation:</u>

Work packages are the tiniest unit of activity that a project can be split down into when designing your Work Breakdown Structure (WBS). It can aid you to recognize the aspects you needed to prepare costs and work hours and then observe and maintain the application to completion.

 Work packages can be recorded, cost evaluated, observed, and measured. Work packages provide for contemporary work to be performed on different components of a project in resemblance by multiple teams. Each team understands the tasks specified for the work package and finishes them by the specified deadline.

6 0
3 years ago
Suppose that the domestic production of computer games creates enjoyment for those who play the games. Domestic production of co
kirill [66]

Answer:

a

Explanation:

Based on the information provided within the question it can be said that the best possible policy to encourage this would be to impose tariffs on computer game imports. This would force company's to begin domestic production of computer games in order to continue making the profits from the domestic market as opposed to losing out on all of the opportunities that the domestic market offers them.

6 0
3 years ago
______ is/are the replacement of human operation and control of machinery with some form of programmed control.
Thepotemich [5.8K]
Automation is/are the replacement of human operation and control of machinery with some form of programmed control. Thank you for posting your question here at brainly. I hope the answer will help you. Feel free to ask more questions here.
7 0
3 years ago
In cyber security, one of the best ways to protect a computer or network is with a strategy called defense in depth. This strate
emmainna [20.7K]

This idea is most closely related to the Layering in terms of how to reduce complexity.

<h3>Describe cybersecurity?</h3>

The term "cybersecurity" refers to the safeguarding of computer systems and networks against the leakage, theft, or destruction of data as well as the interruption of the services they offer.

Defense in depth is a technique used in cybersecurity that is one of the greatest ways to safeguard a computer or network. If one fails, it's likely that another will identify the issue. The approach to simplifying that is most in line with is called layering.

Thus, This idea is most closely related to the Layering in terms

For further details about cybersecurity, click here:

brainly.com/question/13016321

#SPJ1

5 0
2 years ago
Read 2 more answers
Use the arr field and mystery () method below.
kolezko [41]

Answer:

The sum of all positive even values in arr

Explanation:

We have an array named arr holding int values

Inside the method mystery:

Two variables s1 and s2 are initialized as 0

A for loop is created iterating through the arr array. Inside the loop:

num is set to the ith position of the arr (num will hold the each value in arr)

Then, we have an if statement that checks if num is greater than 0 (if it is positive number) and if num mod 2 is equal to 0 (if it is an even number). If these conditions are satisfied, num will be added to the s1 (cumulative sum). If num is less than 0 (if it is a negative number), num will be added to the s2 (cumulative sum).

When the loop is done, the value of s1 and s2 is printed.

As you can see, s1 holds the sum of positive even values in the arr

7 0
3 years ago
Other questions:
  • You use different office apps to accomplish specific tasks, such a creating a newsletter or producing a sales presentation, yet
    8·1 answer
  • SQL a. has become the de facto standard database language b. can be used to define database systems c. both a. and b. d. none of
    10·1 answer
  • Find the word-length 2's complement representation of each of the following decimal numbers:a. 845b. 15000c. 100d. -923
    8·2 answers
  • Which statement best describes a transition in PowerPoint?
    12·1 answer
  • Retraining is required at intervals of ___ or less.
    10·1 answer
  • A 1000 elements array is used to store integers ascending order . The array is used to search binary search algorithm for the in
    14·1 answer
  • __________ intelligence is an approach to boundary spanning which results from using sophisticated software to search through in
    15·1 answer
  • Write a program that ask the user to enter air water or Steele and the distance that a sound wave will travel in the medium the
    9·1 answer
  • Help Me<br><br> What are the four types of graphic models?
    10·1 answer
  • Who plays Pokemon Go if you do put your code in your answer so I can friend you.<br><br><br> o_o
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!