1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ede4ka [16]
3 years ago
12

in a stop-and-wait arq system, the bandwidth of the line is 1 mbps, and 1 bit takes 10 ms to make a round trip. if the system da

ta frames are 1000 bits in length, how long the time needs to send 10000 bits?( in ms)
Computers and Technology
1 answer:
MArishka [77]3 years ago
5 0

Answer:

٢٣٤

Explanation:

You might be interested in
What does ""fair use"" mean regarding copyrighted works?
Nady [450]

In regards copyrighted works, fair use is simply known as legal dogma that allows the right to free expression by allowing the unlicensed use of copyright-protected works by individuals as regards to some certain situations.

Fair Use of copying of copyrighted material can only be used in a short and revelatory us, example to criticize, or caricature of a copyrighted work. It is often known to be a legal defense that protects individuals of copyrighted material from copyright infringement.

  • Fair use allows a person/people to use a copyrighted work without acknowledgement or permission of copyright owner and it can be used  to criticize, comment, news reporting, teaching, research etc. It is not seen as infringement under the law.

Conclusively, we can say that In regards copyrighted works, fair use is simply known as legal dogma that allows the right to free expression by allowing the unlicensed use of copyright-protected works by individuals as regards to some certain situations.

Learn more from:

brainly.com/question/1534807

5 0
2 years ago
In cyber security, one of the best ways to protect a computer or network is with a strategy called defense in depth. This strate
emmainna [20.7K]

This idea is most closely related to the Layering in terms of how to reduce complexity.

<h3>Describe cybersecurity?</h3>

The term "cybersecurity" refers to the safeguarding of computer systems and networks against the leakage, theft, or destruction of data as well as the interruption of the services they offer.

Defense in depth is a technique used in cybersecurity that is one of the greatest ways to safeguard a computer or network. If one fails, it's likely that another will identify the issue. The approach to simplifying that is most in line with is called layering.

Thus, This idea is most closely related to the Layering in terms

For further details about cybersecurity, click here:

brainly.com/question/13016321

#SPJ1

5 0
2 years ago
Read 2 more answers
Alarm filtering is alarm clustering that may be based on combinations of frequency, similarity in attack signature, similarity i
Angelina_Jolie [31]
Wait what is the question? All you are saying is a fact. :|
4 0
3 years ago
how do you define technological world is a easier way for this low iq girl to understand its for my essay pls help me im about t
Gelneren [198K]
A world that uses technology.
5 0
3 years ago
Which social networking site became a gaming platform after 2009
PtichkaEL [24]

Answer:

Should be Hi5

have good day

3 0
3 years ago
Other questions:
  • Into which of these files would you paste copied information to create an integrated document?
    13·2 answers
  • ¿Cómo es la onda percibida por un osciloscopio cuando hablamos de sonido? ¿Qué parámetros podemos observar en ella?
    15·1 answer
  • What does PowerPoint display when you use the Notes Page view?
    14·2 answers
  • What effect on total current flow will a shorted series component have in a series-parallel circuit?
    8·1 answer
  • HELP !!! Prompt <br> What is formatting text?
    7·2 answers
  • a publication usually issued daily,weekly or other regular times that provides news,views,features and other information of publ
    8·1 answer
  • What is the viewport?
    5·1 answer
  • Which spreadsheet feature could the scholarship committee use to locate applicants who meet the criteria?
    10·1 answer
  • Anyone have any website ideas I could use for my computing website project? Thank you.
    15·2 answers
  • The startup routine runs,when machine boots up is known as​
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!