1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nadya68 [22]
3 years ago
15

Host A sends a packet of length 1,100 bytes to host B over a link with transmission rate 4 Mbps over a distance 1300 km, propaga

tion speed 2.5x108 m/s. Each packet is processed before entering the link (and link buffer), and the packet processing delay is 0.2 ms.
Please calculate the delays in ms (millisecond)
Transmission delay = ... ms
Propagation delay = ... ms
The end to end delay = ... ms
Computers and Technology
1 answer:
ArbitrLikvidat [17]3 years ago
6 0

Answer:

please mark me brainlist

Explanation:

You might be interested in
Match the job roles with their appropriate qualifications
UNO [17]
Knowledge...- software QA engineer
Master’s...- business analyst
course...- network and computer admin
training...- multimedia artist
3 0
3 years ago
Where is the risk of someone intercepting another person’s online activity the greatest?
sergey [27]

social networking site

3 0
3 years ago
Find true or false. A hacker is hacking software with access in sensitive information from your computer​
Alina [70]
ITS TRUE!!I SEARCHED IT
7 0
2 years ago
Select all of the following statements regarding security policy that are true.
a_sh-v [17]

Answer:

C and D

Explanation:

Your company should have a written security policy, and all employees should have access to the policy, even if they're casual workers.

Also, Training on computer security should be provided for all staff members as a prerequisite to start work.

3 0
3 years ago
Illustrate how information technology helps organizations to cut costs by reducing switching costs and increasing competitivenes
Ulleksa [173]

Information technology is the method of choosing the best technology for working with data.

With this definition, it can be said that information technology has existed since man began to store data. Today, however, it mainly refers to electronic communication and storage of data, for which computers and other electronic equipment are used.

Information technologies are of vital importance in the functioning of business operations today, as they allow a better and more optimal organization of resources and information of companies.

Thus, companies organize their information via digital methods, make online sales, etc.

Learn more in brainly.com/question/7091883

6 0
2 years ago
Other questions:
  • . Briefly describe an SQL DML statement for changing existing data in a table.
    5·1 answer
  • In the ____________________ approach, the project is initiated by upper-level managers who issue policy, procedures and processe
    8·1 answer
  • Jim is writing a program to calculate the wages of workers in a teddy bear factory.
    7·1 answer
  • In the code segment below, assume that the int variable n has been properly declared and initialized. The code segment is intend
    5·1 answer
  • Privacy Group of answer choices must be respected if we are to function as complete, self-governing agents is an absolute value
    5·1 answer
  • You have just purchased a server with Windows Server 2016 Datacenter Edition installed. The server has 4 GB RAM, a 200 GB hard d
    6·1 answer
  • No production Web application, whether it resides inside or outside of the firewall, should be implemented without:
    6·1 answer
  • Write a C++ Programm in which inheritance is used
    7·1 answer
  • Which of the following would most likely be the target audience for a product
    7·2 answers
  • On the MarketingConsultants worksheet, in cells D10:H13, use a PMT function to calculate the end of the month payment amount. En
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!