1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
crimeas [40]
3 years ago
11

Suppose you and four of your friends are wirelessly connected with the home wireless router. [03] At this moment router is not t

ransmitting data to the outgoing link and all of you want to browse internet and send packets of same size to the router. Consider the bandwidth of the outgoing link is20Mbps , packet size is 2500 bytes and the processing delay of each packet is
2μs . If your packet is queued at position eleven, calculate the delay after which your packet will be transmitted
Computers and Technology
1 answer:
fredd [130]3 years ago
8 0

format please? i cant understand

You might be interested in
Consider a relation about people in the United States, including their name, Social Security number, street address, city, state
andreyandreev [35.5K]

Answer:

For constructing relational schema, consider the relation as:

Data Attributes for USPeople: name, Social Security number (SSN), street address, city, state,

ZIP code, area code, phone number

1. Functional Dependency (FD):

A functional dependency (FD) is a relationship between the primary key and non-key attributes of  the relation. For finding FD, we need to know about the primary key (PK) which should be unique.

Social Security number (SSN) is the only attribute that holds unique value for relation. R, attribute for any relation Y is functionally dependent on attribute X (usually the PK), if for every  valid instance of X, that value of X uniquely determines the value of Y.

Social Security number (PK) ->;name, street address, city, state, ZIP code, area code, phone  number

2. keys for the relation

Primary key = Social Security Number (PK)

Foreign key = Area code

In the normalization process, we can separate address table (street address, city, state, ZIP  code, area code)

Can an area code straddle two states?

Yes, it can straddle between two states; it might be in cities/regions that “lie” across two states.  For example, Kansas City is in Missouri and Kansas. A lot of people share the same area code.

Can a ZIP code straddle two area codes?

Yes, it can straddle between two states; it might be in cities/regions that “lie” across two states.

Can same Social Security number is allotted to two people?

NO, everyone has a unique SSN number.

Can peoples living together have the same address or phone number?

Yes, people living in the same house share addresses or phone numbers.

4 0
3 years ago
Use the following to calculate the acid-test ratio. (Round your answer to two decimal places.) Cash: $100,000 Short-term investm
uysha [10]

Answer: 0.48

Explanation:

The acid test ratio will be calculated as:

Cash = $100,000

Add: Short term investments = $17,000

Add: Net Current Receivables = $250,000

Total Assets = $367,000

/ Total Current Liabilities = $760,000

Acid Test Ratio will now be:

= Total Assets / Total Liabilities

= $367000/$760000.

= 0.48

Therefore, the acid test ratio is 0.48.

5 0
3 years ago
12. What are the additional elements required of a network architecture if the enclave is to support remote access through the p
Romashka [77]

The additional elements needed of a network architecture are:

  • Policy management
  • Remote access server
  • VPN Gateway, etc.

<h3>What is network architecture example?</h3>

Network architecture is known to be the set up of a computer network. It is regarded as the backbone for the specification of the physical attributes of a network and also their functional configuration.

An examples is a printer that is linked to the network. Note that  additional elements required of a network architecture if the enclave is to support remote access through the public Internet are Policy management, etc.

Learn more about network architecture from

brainly.com/question/13986781

6 0
2 years ago
What are the pros and cons of cloud computing?
Arada [10]

Answer: Cloud computing is the technology that is based network on which the services are accessed with the help of hardware and software.Internet is platform through which the accessing of information, files and other services takes place.

The advantages of cloud computing are as follows:-

  • It acts as the flexible system
  • Cost efficient
  • Easy restoration and backing -up of data
  • Almost unlimited storage capacity

Disadvantages of cloud computing are:-

  • Technical problems can occur in network
  • It can be vulnerable to network attacks and hacking
  • Has some security issues

5 0
4 years ago
A portrait shows a person's face entirely in silhouette, shadowing the subject's features completely.
Sonja [21]

Answer:

From behind

Explanation:

This is because, a silhouette can only be formed by an object if the light is coming from behind the object. For example, if a shadow of an object is to be formed, the light shone on the object must be coming from behind the object.

Similarly, for a complete silhouette of the person's face, the light must be coming from behind the person's face for it to form a shadow and then a silhouette.

So the light must come from behind.

6 0
4 years ago
Other questions:
  • What does Tristan need to do to add a row at the
    14·1 answer
  • Suppose we are comparing implementations of insertion sort and merge sort on the same machine. for inputs of size n, insertion s
    10·1 answer
  • What is the value of the variable result after these lines of code are executed?
    5·1 answer
  • Drag the correct type of update to its definition.
    5·1 answer
  • Technician A says that oil for the rod bearings comes from splash off the crankshaft. Technician B says that lubrication to the
    14·1 answer
  • In the movie, Willy Wonka and the Chocolate Factory, Augustus Gloop leans over the chocolate river to get a drink and falls in.
    11·1 answer
  • A set of instructions to increase a programmer’s pay rate by 10 percent is hidden inside an authorized program. It changes and u
    12·1 answer
  • Which key retains its uniqueness even after you remove some of the fields?
    14·1 answer
  • Using complete sentences post a detailed response to the following.
    15·1 answer
  • 3. What report shows what mobile devices were used to view a website?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!