1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yan [13]
3 years ago
8

Assume the data link protocol used by NDAS has the following associated characteristics:

Computers and Technology
1 answer:
AleksandrR [38]3 years ago
3 0

Answer:

The transmission speed = 0.278 MB/s

Explanation:

K = 8 bits

M = 11936/8 bits = 1492 bits

transmission rate R = 1000000/ 8 = 125000 bps

overhead bytes C = 20

probability = 0.01

time T = 30 ms = 30 x10^-3 s

The data transmission speed formula = K(M-C)(1-p) / (M/R) + T

 = 8( 1492 - 20)(0.99)/ (1492/125000) + 30 x10^-3

 = 0.278 MB/s

You might be interested in
What would you use to exit from a for each activity and continue the execution of the workflow?
mr_godi [17]

Answer:

Break activity

Explanation:

The Break activity simply allows a user to stop the loop at any point chosen, and then continue with another activity or the next activity.

4 0
3 years ago
which of the following is the full path and filename of the file that contains information about which interrupt request (IRQ) c
Drupady [299]

Answer:

INCOMPLETE QUESTION.... Options not provided, However, the answer is

/proc/interrupts

Explanation:

This file records the number of interrupts per IRQ on the x86 architecture. The output of this file is tabular.. with the first column for the IRQ number, another column for each CPU in the system, a third column the reports the type of interrupt and finally the last column holds the name of the device located at that IRQ

7 0
4 years ago
PLEASSEE HELP ILL GIVE U A BRAINLIEST IF UR RIGHT!!
Nana76 [90]
It is digital signal 
5 0
3 years ago
Read 2 more answers
In the context of intentional security threats, _____ can erase data and wreak havoc on computers and networks but do not replic
mihalych1998 [28]

Answer:

The answer is "Option D".

Explanation:

Trojan program is a malicious code that is also known as a virus. It is a rootkit, that aims to infect the computer to hide or obscure an object. These programs are mainly used to download additional content, such as additional pieces of malware, to the infected computer, and other options are wrong that can be defined as follows:

  • In option A, It is not correct, this option infects the system.
  • In option B, It is used for infects another computer that's why it is incorrect.
  • In option C, It is incorrect because it is used in cybersecurity.  
5 0
3 years ago
Which of the following types of servers can be used to cache requested Internet resources so that they can be more quickly deliv
Nitella [24]

Answer:

Option d): Proxy Server  is the correct answer.

Explanation:

Proxy Server can be used to cache requested Internet resources so that they can be more quickly delivered to users requesting the same resource while at the same time reducing the burden on the external network connection to the Internet for an organization.

<u>Working of Proxy Server:</u>

These servers work by saving all the files into the servers that are uploaded by other persons once. After that whenever someone needs the same file, it is provided by the proxy server itself rather than the actual stored location of the file. Thus it somehow speeds up the delivery process.

<h2>I hope it will help you!</h2>
7 0
3 years ago
Other questions:
  • What are the differences between message confidentiality and message integrity? Can you have confidentiality without integrity?
    9·1 answer
  • Which option should u select to ignore all tracked changes in a document
    8·1 answer
  • In two to three sentences, describe how you would move a file.
    6·1 answer
  • Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer syste
    10·1 answer
  • What subsection of the Internet requires specialized browser to access and is frequently used by cyber criminals and underground
    10·1 answer
  • Which of the following statements is FALSE?
    10·2 answers
  • To edit the color of the text in Word Online, choose the Font color command under what tab?
    8·1 answer
  • How much money did Uta initially invest?$180.00$320.00$352.48$471.70
    14·1 answer
  • Which of the following does a code editor NOT provide?
    12·1 answer
  • What is not recyclable in a<br> hybrid car<br> hydrogen car<br> petrol car
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!