1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lera25 [3.4K]
3 years ago
5

What is the output?

Computers and Technology
1 answer:
Vinvika [58]3 years ago
4 0

Answer:

20

Explanation:

You might be interested in
Which two tools used for incident detection can be used to detect anomalous behavior, to detect command and control traffic, and
allsm [11]

Netflow and IDS (intrusion detection system) are the two tools used for incident detection can be used to detect anomalous behavior, to detect command and control traffic, and to detect infected hosts.

The Netflow is CISCO feature used for collecting IP traffic information and monitoring network traffic on a specific interface. Similar to this, IDS is an a<span>pplication that monitors a network or systems for malicious activity or policy violations.</span>

8 0
4 years ago
token is 64 bytes long (the 10-Mbps Ethernet minimum packet size), what is the average wait to receive the token on an idle netw
ikadub [295]

Given that,

Token is 64 bytes long

The average number of stations that the token must pass = 20

We need to calculate the transmission delay for token

Using formula of transmission delay

Transmission\ delay=\dfrac{token\ size}{minimum\ size}

Put the value into the formula

Transmission\ delay=\dfrac{64\ bytes}{10\ Mbps}

Transmission\ delay=\dfrac{64\times8}{10\times10^6}

Transmission\ delay=0.0000512\ sec

Transmission\ delay=5.12\times10^{-5}\ sec

We need to calculate the average wait to receive token on an idle network with 40 stations

Using formula of average wait

\text{average wait to receive token}=\text{average number of stations that the token must pass}\times transmission\ delay

Put the value into the formula

\text{average wait to receive token}=20\times5.12\times10^{-5}

\text{average wait to receive token}= 0.001024\ sec

\text{average wait to receive token}= 1.024\ ms

Hence, The average wait to receive token on an idle network with 40 stations is 1.024 ms.

8 0
4 years ago
Which of the following gestures would you use if you want to activate a link on your new tablet?
Gre4nikov [31]

Answer:

press and hold

Explanation:

When you press and hold, some open a menu where you can add a link

8 0
3 years ago
Which of the following statements is true according to the code?
mihalych1998 [28]

Answer:

The #intro style applies to all paragraphs.

Explanation:

It is a class

A class applyies to all with that name

5 0
4 years ago
A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed
Thepotemich [5.8K]

Answer:

Option (A) is the right answer.

Explanation:

The following terms can be described as :

Phishing: Phishing can be described as the concept of stealing personal data i.e. credit card, bank account information, etc. of customers by sending fraud emails or by making fraud webpages on the name of a reputed company.

Tailgating: tailgating can be defined as the concept of getting entry with the authorized person in a restricted zone.

Baiting: baiting can be described as the term of stealing personal data by giving greed to customers by telling them fraud offers.

Quid pro quo: quid pro quo can be defined as the concept where the attacker takes the access of the system.  

According to the scenario, the most appropriate answer is option (A) because the company sends a wrong web address which is used by hackers to collect user's personal data which comes under phishing.

3 0
3 years ago
Other questions:
  • Given three dictionaries, associated with the variables, canadian_capitals, mexican_capitals, and us_capitals, that map province
    11·1 answer
  • What type of software translates a programmer’s statements to binary form?
    10·1 answer
  • Which of the following is not a feature of Hootsuite?
    14·1 answer
  • The ____ layer protocols are the rules for implementing end-user services provided by a network. Transport Application Physical
    11·1 answer
  • Organizational Units are typically configured to: prevent companies from sharing resources. ensure that the system password is t
    13·1 answer
  • have you ever had to adjust your communicatio style to egage a customer or roommate? what was the situation and outcome?
    5·1 answer
  • You want to read input from the user to know how many apples they would like
    10·1 answer
  • Identify and state the value of hardware components​
    12·1 answer
  • ____________ is a process of reverse calculation to achieved a desired result. a. Data Consolidation
    6·1 answer
  • A/an _____________ is a stored program that executes at a specified time. Group of answer choices stored procedure view trigger
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!