1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nadya68 [22]
3 years ago
15

Host A sends a packet of length 1,100 bytes to host B over a link with transmission rate 4 Mbps over a distance 1300 km, propaga

tion speed 2.5x108 m/s. Each packet is processed before entering the link (and link buffer), and the packet processing delay is 0.2 ms.
Please calculate the delays in ms (millisecond)
Transmission delay = ... ms
Propagation delay = ... ms
The end to end delay = ... ms
Computers and Technology
1 answer:
ArbitrLikvidat [17]3 years ago
6 0

Answer:

please mark me brainlist

Explanation:

You might be interested in
Kyle is running out of disk space on his hard drive on a Windows XP Professional system. He has installed and configured a third
Varvara68 [4.7K]

Answer:

The answer is "Disk utility".

Explanation:

It'll work well go over to Disk utility before updating the drivers like diskmgmt.msc throughout the Running box, or right-click Device icon, and pick Manage. Click Rescan Disks on the key decision-makers. It's not essential to reconnect until the machine recognizes the latest disc.

  • In each disc setup as storage properties is a reactive drive. Almost every dynamic disk is separated into quantities.
  • It is the season, spanned, and strip volume forms will be included.
5 0
3 years ago
Read 2 more answers
FREE POINT IF YOU ADD ME AS A FRIEND <br> XOXOANAI04
scoray [572]

Answer:

hfufbrdubedyg gxnsbetxyfbrdybeuxuabrbxybsbcyebdydbehdhdhdhcubdenudnejwjw7xtrwhajaobcbdggevejaveyxbwbgzfybaegnesujwbghene8hav ejuzvwbfhuh bsndndbchchychdbruxnejxne7hdrhxhehnxurnxhhbehdndjndhd

8 0
3 years ago
Read 2 more answers
Which term is used to describe a software application that is secretly placed on a user system to gather information and relay i
BARSIC [14]

Answer: Spyware?

Explanation:

6 0
3 years ago
Write a program to get radius of circle and then print it's circumference​
s344n2d4d5 [400]

\tt r=(int(input("Enter \:the\: value\: for \;radius:\:")))

\tt A=3.14*r**2

\tt C=2*3.14*r

\tt print("Area\:of\:the\:circle:",A)

\tt print ("Circumference\:of\:the\:circle:",C)

Output:-

\tt Enter\: the\:value\:for\: radius: 2

\tt Area\:of\:the\:Circle:12.56

\tt Circumference\:of\:the\:Circle:12.56

8 0
3 years ago
) For a course with n students, an n X 3 array, int[][] arr, holds scores on 3 exams. Each row holds the exam scores for one stu
anzhelika [568]

Answer:

Following are the code to this question:

import java.util.*;//import package  

public class Main //defining a class

{

public static void main(String[] ax)//defining main method

{

      int student[][] = {{50,60,65},{75,85,90}}; //defining double array student  

      int Row=0,Col=0;//defining integer variable

      double x;//defining double variable

      for (int a = 0; a <student.length; a++)//use for loop to holding row value

       {  

           for (int b = 0; b<student[a].length; b++)//use for loop to holding column value  

           {  

               Row += student[a][b];//add row value

               Col += student[0][b];//add column value

           }

       }

       System.out.println(x=Row/2);//dividing value and calculating average value

}

}

Output:

212.0

Explanation:

In the above code, a 2D array student is declared, that holds some value in the next step, two integer variable "Row and Col", is declared, which it uses the for loop to add value in "Row and Col", and in the next step, a double variable x is declared, that add value and calculates its average value and store its value in x variable and print its value.

7 0
3 years ago
Other questions:
  • Numbering exception conditions, which often uses hierarchical numbering, in a fully developed use case description is helpful to
    7·1 answer
  • What information is not typically included in an e-mail header?​?
    15·1 answer
  • What statement best describes Konrad Zuse?
    6·2 answers
  • In your memo, give three new employees directions for starting the computer and opening a word-processing document.
    9·1 answer
  • You plan to use the Fill Down feature on a formula in Excel and need to keep a cell reference the same. Which format allows you
    6·1 answer
  • what is it called when someone uses software to run multiple operating systems on one computer at the same time? A.functional vi
    9·1 answer
  • Write a Python 3 script in PyCharm that will simulate the game of "Rock, Paper, Scissors": Display a header and the simple rules
    8·1 answer
  • When students have computer trouble they usually are expected to
    12·2 answers
  • ​Lara is the chief editor of "Laughter and Life," an online magazine. Lara has assigned Jenny the task of redesigning the magazi
    5·1 answer
  • How/when should you use student loans?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!