1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Crazy boy [7]
3 years ago
12

A device is sending out data at the rate of 1000 bps. How long does it take to send

Computers and Technology
1 answer:
vredina [299]3 years ago
4 0

Answer:

0.01 second ; 0.008 seconds; 800 seconds

Explanation:

Given that:

Sending rate = 1000 bps

Rate of 1000 bps means that data is sent at a rate of 1000 bits per second

Hence, to send out 10 bits

1000 bits = 1 second

10 bits = x

1000x = 10

x = 10 / 1000

x = 0.01 second

2.)

A single character 8 - bits

1000 bits = 1 second

8 bits = (8 / 1000) seconds

= 0.008 seconds

3.)

100,000 characters = (8 * 100,000) = 800,000

1000 bits = 1 second

800,000 bits = (800,000 / 1000)

= 800 seconds

You might be interested in
What is working with others to find a mutually agreeable outcome?
eduard

Negotiation is one possible answer to this question, I believe, though there are other words which mean similar things that could also suffice. For example, compromise is very similar in meaning, though this specifically means each person is conceding something to find an agreement.

5 0
3 years ago
Which of the following domains do NOT need software vulnerability assessments to mitigate risk from software vulnerabilities?A.
aliya0001 [1]

Answer:

I dont think that these four do not need because When we are discussing risk management, you can examine domains separately. Each domain represents a specific target. Some attackers have the skill they focus on the User Domain. Other attackers may be experts in particular applications, so they focus on the System/Application Domain. Similarly LAN and Workstation Domain.

Explanation:                                                        

When a threat exploits a vulnerability it is a loss. The impact determine the severity of the loss. A threat is  potential to cause a loss.  Threat as any activity  represents a possible danger. Threats  cannot be destroyed, but they  controlled. Threats have independent probabilities.For example, an attacker  attacking Web servers hosted on Apache. There is a company that can stop this attacker from trying to attack. A company can reduce or eliminate vulnerabilities . Threats are  exploit vulnerabilities that result in the loss of confidentiality, integrity, or availability of a business asset. In other words, risks to confidentiality, integrity, or availability represent potential loss to an organization. Because of this, a significant amount of risk management is focused on protecting these resources.            

           

5 0
4 years ago
What is the smallest group network
RideAnS [48]

LAN MAN WAN WLAN SAN

8 0
4 years ago
How will you install an opersting system on your computer. List the steps you will use for installing the operating system.
Naddika [18.5K]

Explanation:

step 1) first u need 2 uninstall the old os. this involves installing a program to uninstall the old os.

step 2). purchase your new os.

usually the new. os will have the uninstall program software already installed with the new..

hope this helps, sometimes u have 2 purchase separately.

6 0
3 years ago
Application servers are usually grouped into two types: page-based and _____ systems. a. group-based b. script-based c. server-b
mash [69]

Answer:

D

Explanation:

An application sever is a server that is categorically designed to run applications.

An application server can be defined as a software framework that provides both the facilities to create web applications and also a server environment to run them. Example of an application sever is the java web application.

Applications server can be grouped into two types: page based server and component based server.

7 0
3 years ago
Read 2 more answers
Other questions:
  • Define and test a function myRange. This function should behave like Python’s standard range function, with the required and opt
    11·2 answers
  • What type of power flaw involves a fluctuation in voltage levels caused by other devices on the network or by EMI?
    13·1 answer
  • In which architecture is the application logic usually on the client side?
    8·1 answer
  • Isaac was assigned to work on a computer in his company’s R&D department. While working on the system, Isaac received severa
    8·1 answer
  • Encapsulation is the process of “packaging” information prior to transmitting it from one location to another. true or false
    14·1 answer
  • 1) List at least five smaller behaviors you could break the complex behavior "brushing my teeth" into.
    14·2 answers
  • Pls help!!!!!!!!!!!!
    13·2 answers
  • What type of system is associated with weather that has lots of clouds and thunderstorms with the possibility of tornadoes?
    10·1 answer
  • Suppose that we want to enhance the processor used for Web serving. The new processor is 10 times faster on computation in the W
    6·1 answer
  • Which reports indicate how traffic arrived at a website?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!