1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
german
3 years ago
14

5g Speed vs 4g Speed. What's the Difference?

Computers and Technology
1 answer:
Zigmanuir [339]3 years ago
4 0

Answer: 5G up to 100 times faster than 4G. With 5G reaching 10 gigabits per second – up to 100 times faster than 4G – 5G networks can deliver the level of performance needed for an increasingly connected society.Aug 10, 2020

You might be interested in
computer has a 32-bit instruction word broken into fields as follows: opcode, six bits; two register file address fields, five b
lina2011 [118]

Answer:

a.  2^6, or 64 opcodes.

b.  2^5, or 32 registers.

c. 2^16, or 0 to 65536.

d.  -32768 to 32768.

Explanation:

a. Following that the opcode is 6 bits, it is generally known that the maximum number of opcodes should be 2^6, or 64 opcodes.

b. Now, since the size of the register field is 5 bits, we know that 2^5 registers can be accessed, or 32 registers.

c. Unsigned immediate operand applies to the plus/minus sign of the number. Since unsigned numbers are always positive, the range is from 0 to 2^16, or 0 to 65536.

d. Considering that the signed operands can be negative, they need a 16'th bit for the sign and 15 bits for the number. This means there are 2 * (2^15) numbers, or 2^16. However, the numbers range from -32768 to 32768.

6 0
4 years ago
Help, please!! A file named "games.txt" exists and has 80 lines of data. You open the file with the following line of code. aFil
Aliun [14]
I’m not 100% sure about this but I think it is A
8 0
4 years ago
I want an A! Write a pseudocode algorithm that asks the user for their grades in CSE 1321, along with their attendance, then cal
Vsevolod [243]

Answer:

The Java pseudocode and the Java code itself are given for better understanding

Explanation:

<u>Java pseudocode</u>

  1. preAvg(int test[], int qgrade):
  2. sum := 0
  3. for each testi in test:
  4. sum := sum + testi
  5. sum := sum + qgrade
  6. return sum / 5
  7. additional(int at):
  8. res = (at * 1.5) / 30
  9. return res
  10. total = preAvg(test, qgrade) + additional(at)

<u>Java code</u>

import java.util.Scanner;

public class CSE1322 {

  public static void main(String[] args) {

     

      Scanner scanner=new Scanner(System.in);

     

      int test[] = new int[4];

     

      for(int i=1;i<=4;i++){

          System.out.println("Enter your result for test"+i+": ");

          test[i-1] = scanner.nextInt();

      }

     

      System.out.println("Enter the average quiz grade: ");

      int qgrade = scanner.nextInt();

     

      System.out.println("Enter the classes you attended(out of 30): ");

      int at = scanner.nextInt();

     

      double avg = preAvg(test,qgrade);

      System.out.println("Your average before attendance is: "+avg);

     

      double add = additional(at);

      System.out.println("You receive an additional "+add+" points for attendance");

     

      double total = avg + add;

     

      System.out.println("Final grade is : "+total);

     

  }

  private static double additional(int at) {

      double res = ((double)at * 1.5)/30.0;

      return res;

  }

  private static double preAvg(int[] test, int qgrade) {

      double sum = 0;

     

      for(int i=0;i<4;i++) sum += test[i];

     

      sum += qgrade;

     

      return sum/5;

  }

}

4 0
4 years ago
The primary purpose of an ids is to detect intrusions, log suspicious events, and send alerts.
Kamila [148]

Hello, Mochacon, so to answer this question, we must understand what and ids is. A intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces electronic reports to a management station. IDS come in a variety of "flavors" and approach the goal of detecting suspicious traffic in different ways. So according to this definition, this statement is true since and ids does detect intrusions, detects suspicious events indeed, and sends alerts when intrusions happen.

Hope this helped!

3 0
3 years ago
Consider the code below. Note that the catch statements in the code are not implemented, but you will not need those details. As
Dmitriy789 [7]

Missing Part of Question

An exception raised by the instruction in i3 would be caught by the catch statement labeled?

Answer:

e3 and e4.

Explanation:

The instruction tag i3 points to the following code segment

a[++i] = (double) (1 / x); // i3

The code segment above performs arithmetic operation (double)(1/x)

And then assigns the value of the arithmetic operations to an array element a[++I]

It's possible to have one or both of the following two exceptions.

1. Error in Arithmetic Operation

2. Index of Array out of bound

These are both represented in exception tags e3 and e4

catch (ArithmeticException ex) {...} // e3

catch (ArrayIndexOutOfBounds ex) {...} // e4

Exception e3 can arise when the program try to carry out invalid arithmetic operation.

For instance, 1/0 or 0/0.

This will lead to ArithmeticException to be thrown

Exception e4 can arise when the program tries to assign values to an index that's not in an array.

Say, the total index in a given array a is 5.

The index of this array is 0 to 4; i.e. a[0] to a[4]

The moment the program tries to assign values to array element other than the ones I listed above (e.g a[5]) ArrayIndexOutOfBounds exception will be thrown

6 0
3 years ago
Other questions:
  • In certain programming languages, comments appear between delimiters such as /# and #/. Let C be the language of all valid delim
    15·1 answer
  • Why is Bot_Seth Trash at video games?
    13·2 answers
  • Hard drives have the largest capacity of any storage device. <br> a. True <br> b. False
    6·2 answers
  • TRUE OR FALSE!!!!!
    6·2 answers
  • What is the film format that many filmmakers feel is superior to any other format?
    13·1 answer
  • In computer Drag and Drop“ means to select the items, hold down the mouse and
    15·1 answer
  • The class dateType was designed to implement the date in a program, but the member function setDate and the constructor do not c
    6·2 answers
  • If you have an equipment failure while driving on an expressway, you should
    8·1 answer
  • The different types of variation of genes are called.
    8·1 answer
  • Which security protocol for wireless networks attempts to establish the same security for them as would be present in a wired ne
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!