answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
o-na [289]
2 years ago
3

Consider sending a packet from a source host to a destination host over a fixed route. List the delay components in the end-to-e

nd delay. Which of these delays are constant and which are variable? Draw a picture to illustrate your network and where each type of delay occurs.
Computers and Technology
1 answer:
Natali [406]2 years ago
8 0
List the delay components in the end-to-end delay:
Processing delay
Transmission delay
Propagation delay
Queuing delay.
The processing delay, transmission delay, and propagation delay are constant. Reason is that, time taken to transmit data bits.
The queuing delay is variable.Reason is that, Only single packet transfer in queue process and waiting time depends on packet size.
You might be interested in
There is a function we are providing in for you in this problem called square. It takes one integer and returns the square of th
anastassius [24]

Answer:

xyz = 25  

result = square(xyz)

print(result)

The above code assigns the value 25 to variable xyz as 5*5=25. Then next statement is a function call to square() function passing xyz to this function in order to compute the square of 25. The output is:

625

Explanation:

The above code can also be written as:

xyz = 5*5

result = square(xyz)

print(result)

The difference is that xyz is assiged 5*5 which is equal to 25 so the output produced will be the same i.e.  625.

The result variable is used to store the value of square of 25 after the square() method computes and returns the square of 25. So print(result) prints the resultant value stored in the result variable i.e. 625

3 0
2 years ago
An encryption system works by shifting the binary value for a letter one place to the left. "A" then becomes: 1 1 0 0 0 0 1 0 Th
Vika [28.1K]

Answer:

The hexadecimal equivalent of the encrypted A is C2

Explanation:

Given

Encrypted binary digit of A = 11000010

Required

Hexadecimal equivalent of the encrypted binary digit.

We start by grouping 11000010 in 4 bits

This is as follows;

1100 0010

The we write down the hexadecimal equivalent of each groupings

1100 is equivalent to 12 in hexadecimal

So, 1100 = 12 = C

0010 is represented by 2 in hexadecimal

So, 0010 = 2

Writing this result together; this gives

1100 0010 = C2

Going through the conversion process;

A is first converted to binary digits by shifting a point to the left

A => 11000010

11000010 is then converted to hexadecimal

11000010 = C2

Conclusively, the hexadecimal equivalent of the encrypted A is C2

8 0
2 years ago
A workgroup database is a(n) _____ database
Step2247 [10]
It is a shared database
8 0
2 years ago
An admission charge for The Little Rep Theater varies according to the age of the person. Develop a solution to print the ticket
Lina20 [59]

Answer:

age = int(input("Enter your age: "))

charge = 0

if age > 55:

   charge = 10

if 21 <= age <= 54:

   charge = 15

if 13 <= age <= 20:

   charge = 10

if 3 <= age <= 12:

   charge = 5

if 0 <= age < 3:

   charge = 0

   

print(charge)

Explanation:

*It is in Python.

Ask the user for the age

Check the each given range and set the charge accordingly using if statements

Print the charge

6 0
2 years ago
Using range(1,101), make two list, one containing all even numbers and other containing all odd numbers. How can I do this on Py
jeka94

Answer:

even = []

odd = []

for i in range(1,101):

if i % 2 == 0:

even.append(i)

else:

odd.append(i)

4 0
1 year ago
Other questions:
  • What is the argument in this function =AVERAGE(F3:F26)
    15·1 answer
  • In the game Singularity, broken objects can be restored to their original condition by reversing time. This is an example of whi
    12·2 answers
  • Object-oriented development could potentially reduce the time and cost of writing software because: Group of answer choices a) i
    5·1 answer
  • Drag each tile to the correct box.
    8·2 answers
  • Write a program that has the following String variables: firstName, middleName, and lastName. Initialize these with your first,
    7·1 answer
  • Which of the following operation is not performed by a mouse 1) left click , middle click , right click, double click​
    15·2 answers
  • Write a function named file_stats that takes one string parameter (in_file) that is the name of an existing text file. The funct
    7·1 answer
  • Janice has a "jammed" key on her keyboard. Every time she strikes the "S" key it sticks and doesn't pop back. What should Janice
    6·2 answers
  • Consider the following method, which is intended to return an array of integers that contains the elements of the parameter arr
    8·1 answer
  • Illustrate why Sally's slide meets or does not meet professional expectations?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!