1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
scoundrel [369]
2 years ago
13

Fiber optic cables transfer data at the speed of light, so they have the __________ latency. This results in the ________ connec

tion.
A. lowest, slowest
B. lowest, fastest
C. highest, slowest
D. highest, fastest
Computers and Technology
1 answer:
Stella [2.4K]2 years ago
3 0

Answer:

B. Fiber optic cables have the lowest latency with the highest connection

Explanation:

Latency is the delay before a transfer of data begins following an instruction for its transfer. In other words, the higher the latency, the slower the connection. Fiber optic cables transfer data at the speed of light however, which is incredibly fast. Thus, fiber optic cables have the lowest latency with the highest connection.

You might be interested in
50 POINTS How do you express yourself and your creativity through computer science?
Igoryamba

Answer:

1. I express myself through the designing, development and analysis of software and hardware used to solve problems in a variety of business, scientific and social contexts.

2. support the development of general reasoning, problem-solving and communication skills.

3. Through avoiding in repetious tasks and simplifying such works.

3 0
2 years ago
List the three control problems associated with competingprocesses and briefly define each.
hjlf

Answer and explanation :

the three control problems associated with competing process are

  • MUTUAL EXCLUSION : We know that some resources are shareable and some are not shareable. which means only one process can access the resource at a time this type of resources are called critical resources this code can be access at only one process at a time. the other process if required to access should not be allowed
  • DEADLOCK: this hold the process without complete for example suppose there are two resources R1 and R2 and two process P1 and P2 and P1 use R1 and P2 use R2 but after some time when P1 needs R2 but R2 is not available as it is used by P2 so the all process will be on hold
  • STARVATION : when priorities are given to the process as high priorities and low priorities. And high priorities process always competing  then low priorities process have to wait for very long time this is called starvation
3 0
2 years ago
Yuri is a skilled computer security expert who attempts to break into the systems belonging to his clients. He has permission fr
Tatiana [17]

Answer:

b) White-hat hacker

Explanation:

This is also called an ethical hacker. Unlike the other options, a white-hat hacker is a person specialized on computational security which offers services to organizations to test how safe they are from informatic attacks (viruses, theft of information, etc). This is carried out  based on a agreement between the whihte-hat hacker and the client via a contract.  

8 0
3 years ago
Barbara has three computers connected to the same network in her home. What
Anastaziya [24]

Answer:

LAN

Explanation:

i am not sure but I think it is lan

5 0
2 years ago
The highlighted items in the webpage are called …………………………………..
seraphim [82]

Answer:

highlighted items in webpage are called links.

5 0
3 years ago
Other questions:
  • Carolyn owns a small business that designs air conditioning units for large buildings. A construction company that's building an
    13·1 answer
  • [PROGRAMMING] A ____ signal indicates that a specific amount of time should pass before an action starts.
    13·1 answer
  • What is the last step in conducting url search
    11·1 answer
  • What is Least effective at preventing a computer virus
    10·1 answer
  • What are the different components of the cloud architecture?
    5·2 answers
  • What is the protocol in the web search at the bottom?
    13·1 answer
  • Which form of investigation aims at checking whether or not a target system is subject to attack based on a database of tests, s
    15·1 answer
  • Which does plug-and-play refer to?
    14·1 answer
  • bryce's computer is acting unusually sluggish today he calls you an it techniician to see if you can find out what is going on a
    14·1 answer
  • Name TanushSAVAGE. As given in the picture, Subscribe!
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!