answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitry [639]
2 years ago
14

Consider the following network: proxy-cache On average there are 35 objects downloaded per second, and the average object size i

s 50,000 bits. What is the traffic intensity on the 2 Mbps access link?
a. 0.035
b. 0.007
c. 0.250
d. 0.875
Computers and Technology
1 answer:
Andrews [41]2 years ago
4 0

Answer:

(d) 0.875 erlangs

Explanation:

In a digital network, the traffic intensity = \dfrac {aL}{R}

where

a = average arrival rate of packets = 35 objects downloaded per second

L is the average packet length = 50,000 bits (e.g. in bits), and

R is the transmission rate = 2 Mbps = 2,000,000 bits per second

Traffic Intensity = \dfrac {aL}{R}=\dfrac {50000 X 35}{2000000}=\dfrac {1700000}{2000000}=0.875

You might be interested in
If you were investigating login issues on a Windows computer, which portion of the Event Viewer logs would be a good place to st
USPshnik [31]

Answer:

If we are investigating login issues then we have to start with 'security logs' in 'windows logs' portion of Event viewer.

Explanation:

Much information about login issues is contained in log files which are related to security because it is mostly security issue. Some it is also better to start with 'system logs' portion of windows logs portion of Event viewer when there may be system problems instead of security issues. But in most cases there is security issues so 'security logs' is better option overall

6 0
2 years ago
Information gets from sensory memory to short-term memory through the process of _________.
Alika [10]
What is referred to the description above is the term SELECTIVE ATTENTION. When there is selective attention, there are certain memories that are only selected and these are processed to become part of the short-term memory. Not everything that is being sensed is remembered.
3 0
2 years ago
When looking at security standard and compliance, which three (3) are characteristics of best practices, baselines and framework
Brilliant_brown [7]

Answer:

In order to observe best practices, and to meet with technical and other requirements, organizations often use frameworks for cybersecurity compliance and regulatory compliance. These frameworks provide best practices and guidelines to assist in improving security, optimizing business processes, meeting regulatory requirements, and performing other tasks necessary to achieve specific business objectives such as breaking into a particular market niche or selling to government agencies.

Many such frameworks exist, and the recommendations set out in them can impose difficult and often expensive demands on enterprise resources – especially in situations where an organization is subject to a number of regulatory compliance regimes, whose requirements it has to meet while maintaining its own strong cybersecurity status.

Explanation:

4 0
2 years ago
Haley is helping to choose members for a customer satisfaction team. Which of the following employees demonstrate skill in focus
ivanzaharov [21]
Jesse constantly looks for better ways to solve problems for customers
7 0
2 years ago
In this lab, you use the pseudocode in figure below to add code to a partially created Python program. When completed, college a
Elza [17]

Answer:

Python code is given below with appropriate comments

Explanation:

#Prompt the user to enter the test score and class rank.

testScore = input()

classRank = input()

#Convert test score and class rank to the integer values.

testScore = int(testScore)

classRank = int(classRank)

#If the test score is greater than or equal to 90.

if(testScore >= 90):

   #If the class rank is greater than or equal to 25,

   #then print accept message.

   if(classRank >= 25):

       print("Accept")

   

   #Otherwise, display reject message.

   else:

       print("Reject")

#Otherwise,

else:

   #If the test score is greater than or equal to 80.

   if(testScore >= 80):

       #If class rank is greater than or equal to 50,

       #then display accept message.

       if(classRank >= 50):

           print("Accept")

       

       #Otherwise, display reject message.

       else:

           print("Reject")

   

   #Otherwise,

   else:

       #If the test score is greater than or equal to

       #70.

       if(testScore >= 70):

           #If the class rank is greater than or equal

           #to 75, then display accept message.

           if(classRank >= 75):

               print("Accept")

           

           #Otherwise, display reject message.

           else:

               print("Reject")

       

       #Otherwise, display reject message.

       else:

           print("Reject")

4 0
2 years ago
Other questions:
  • Match the following technologies with their applications.
    9·1 answer
  • Data Analysis The Iris Plants Database contains 3 classes of 50 instances each, where each class refers to a type of Iris plant.
    15·1 answer
  • You are the IT security administrator for a small corporate network. Samuel Garcia (sgarcia) has been away on vacation and has f
    9·1 answer
  • Consider the following network: proxy-cache On average there are 35 objects downloaded per second, and the average object size i
    14·1 answer
  • What types of messages flow across an SDN controller’s northbound and southbound APIs? Who is the recipient of these messages se
    15·1 answer
  • Which item follows html instructions to assemble web pages
    13·1 answer
  • The Online Shopping system facilitates the customer to view the products, inquire about the product details, and product availab
    8·1 answer
  • (a) Show how to use (the Boolean formula satisfiability program) satisfiable num (and substitute) to find a satisfying assignmen
    9·1 answer
  • In this exercise we look at memory locality properties of matrix computation. Th e following code is written in C, where element
    9·1 answer
  • Consider two vectors that are NOT sorted, each containing n comparable items. How long would it take to display all items (in an
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!