answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
s2008m [1.1K]
2 years ago
13

7. Consider a user who needs to transmit 1.5 gigabytes of data to a server. The user lives in a small town where only dial-up ac

cess is available. A bus visits the small town once a day from the closest city, located 150 km away, and stops in front of the user’s house. The bus has a 100-Mbps WiFi connection. It can collect data from users in rural areas and transfer them to the Internet through a 1 Gbps link once it gets back to the city. Suppose the average speed of the bus is 60 km/h. What is the fastest way the user can transfer the data to the server?
Computers and Technology
1 answer:
earnstyle [38]2 years ago
6 0

Answer:

The fastest way the user can transfer the data to the server is at 2 Minute 3 seconds.

Explanation:

Solution

Given that:

The time it takes by bus from Users house to Town = 150 km/60 km/h= 2.5h = 9000 seconds

Now,

The users data to be transmitted over to the server = 1.5 GB

= 1.5*1024 MB

=1.5 *1024*8 Mb=12288 Mb

The time taken by Bus WiFi connection to transmit data = 12288 Mb /100 Mbps = 122.88 Seconds

Thus,

The user/individual can sit in bus and transmit his data to server in 2 Minute 3 Seconds

You might be interested in
Which of the following connects the processor to the chipset and memory on the motherboard? a. Thread b. FSB c. BIOS d. ALU
IRISSAK [1]

Answer:

The correct Answer is (b) FSB

Explanation:

The chipset is the "superglue" that bonds the microprocessor to the rest of the motherboard and so to the rest of the computer. On a computer, it consists of two basic parts -- the Northbridge and the southbridge. All of the numerous modules of the computer communicate with the CPU over the chipset.

The northbridge joins straight to the processor via the front side bus (FSB). A memory controller is situated on the northbridge, which gives the CPU fast access to the memory. The northbridge also attaches to the AGP or PCI Express bus and to the memory himself.

3 0
2 years ago
Kristine has been getting many unsolicited emails from a particular address. She thinks that these emails may harm her computer.
vovikov84 [41]
Kristine should mark the messages as spam.
3 0
2 years ago
Read 2 more answers
State College charges its departments for computer time usage on the campus mainframe. A student had access to the university co
AlexFokin [52]
It is ethical for her to do her schoolwork on the computer, but it was unethical to use her allotted time to play games, which led to her having to request more time on the computer. If she wants to play games, she should get her own computer or device to play games on
6 0
3 years ago
An administrator is investigating a failure on a trunk link between a Cisco switch and a switch from another vendor. After a few
vodka [1.7K]

Answer:

Option C is the correct option.

Explanation:

While the investigation about the trunk failure connection between the Cisco switch and that switch has a different vendor. The investigator noticed later some procedures that the following switch are not transacting a trunk. So, the investigator successfully finds the feasible cause of that issue which is DTP does not accept switches from different vendors.

3 0
2 years ago
Which of the following is true of how packets are sent through the internet?
horrorfan [7]

Answer:

It is A: Packet metadata is used to route and reassemble information travelling  through the internet.

Explanation:

Step 1: The Internet works by chopping data into chunks called packets. Each packet then moves through the network in a series of hops. Each packet hops to a local Internet service provider (ISP), a company that offers access to the network -- usually for a fee

Step 2: Entering the network

Each packet hops to a local Internet service provider (ISP), a company that offers access to the network -- usually for a fee.

Step 3: Taking flight

The next hop delivers the packet to a long-haul provider, one of the airlines of cyberspace that quickly carrying data across the world.

Step 4: BGP

These providers use the Border Gateway Protocol to find a route across the many individual networks that together form the Internet.

Step 5: Finding a route

This journey often takes several more hops, which are plotted out one by one as the data packet moves across the Internet.

Step 6: Bad information

For the system to work properly, the BGP information shared among routers cannot contain lies or errors that might cause a packet to go off track – or get lost altogether.

Last step: Arrival

The final hop takes a packet to the recipient, which reassembles all of the packets into a coherent message. A separate message goes back through the network confirming successful delivery.

3 0
2 years ago
Read 2 more answers
Other questions:
  • Web client software, such as Chrome, Firefox, Internet Explorer, Safari, and Opera, that are used to view Web pages are known as
    14·2 answers
  • Carrie works on a help desk and is assigned a ticket that was automatically generated by a server because of an error. The error
    14·2 answers
  • Which term describes a process by which malicious code can enter from a non-secure network, and make a hairpin, or sharp turn, a
    6·1 answer
  • Int side1;
    5·1 answer
  • Instructions:
    14·1 answer
  • // This pseudocode is intended to display // employee net pay values. All employees have a standard // $45 deduction from their
    12·1 answer
  • In this exercise we look at memory locality properties of matrix computation. Th e following code is written in C, where element
    9·1 answer
  • 2.32 LAB: Musical note frequencies On a piano, a key has a frequency, say f0. Each higher key (black or white) has a frequency o
    13·1 answer
  • Recall that a Set is an abstract data type somewhat similar to a Bag, they can store a finite collection of objects without any
    8·1 answer
  • You know that you should check the room for security against unwanted entry do you check locks on doors and windows. What else d
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!