answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tpy6a [65]
2 years ago
6

Suppose that a 10-Mbps wireless station is transmitting 50-byte frames one immediately after the other.

Computers and Technology
2 answers:
Andre45 [30]2 years ago
7 0
8 bits = 1 byte

10 Mbps = 10/8 M bytes per second

1 frame = 50 bytes

Frame rate = 10 M / (8 x 50) =  10 M / 400 = <em>25,000 frames per second</em>

========================

If each frame has an error probability of 0.004, then (0.004 x 25,000) = 100 frames per second are damaged.

1 hour = 3,600 seconds.

100 damaged frames per second = (100 x 3,600) = <em>360,000 damaged frames per hour.</em>
LenaWriter [7]2 years ago
6 0
There are 1'000'000 Bytes in a Megabyte. In 10 Megabytes there are 10'000'000 bytes. So if it were transmitting 1-byte frames then the answer would be 10'000'000 frames. However this is not the case, because it is transmitting 50-byte frames, so we must divide 10'000'000 by 50.

Therefore, the answer to part (i) is: 200'000 Frames/second

If there are 200'000 Frames/second, then there are 12'000'000 Frames/hour (we get that by multiplying 200'000 by 60)

If the probability of a damaged frame is 0.004, then (multiplying 0.004 by 12'000'000) we get (ii) 48'000 Damaged Frames/hour
You might be interested in
Imagine that you have configured the enable secret command, followed by the enable password command, from the console. You log o
Leona [35]

Answer:

b. Enable Secret

Explanation:  Enable secret command is used to enable a secret password for a particular privilege level. It encrypts the desired password for entering the privileged executive mode of a router or switch. This encryption restrains the password from being saved in clear text format in configuration file contrary to enable password which is stored in plain text. Enable secret defines additional layer of security over the  enable password. It is based on MD5 hash algorithm. If both enable secret and enable password commands are configured, then enable secret outranks and overrides the enable password. Internetwork Operating System will only acknowledge the password as configured in the enable secret command. When you set a password using enable secret command, a password set using the enable password  command only works if enable secret is disabled or you are using older version of Cisco IOS software.

5 0
2 years ago
"Simon Says" is a memory game where "Simon" outputs a sequence of 10 characters (R, G, B, Y) and the user must repeat the sequen
m_a_m_a [10]

Answer:

#include <iostream>  // includes input output functions

#include <string> // used for string functions

using namespace std;   // identifies objects like cout , cin

int main() {  // body of the main function

int index;   // index position of the elements

simonPattern = "RRGBRYYBGY";   //stores simon pattern

userPattern = "RRGBBRYBGY";   //stores user pattern

int userScore = 0;  // used to store the user score

// loop compares characters of user and simon patterns

for ( index = 0; userPattern[index] == simonPattern[index]; ++index) {

     userScore = userScore +1; // adds to the user score

     if (userPattern[index] != simonPattern[index]){

//if user and simon pattern do not match

        break;      }   } // breaks the loop

cout << "userScore is  " << userScore; // prints the user score

Explanation:

The program compares the user pattern to simon pattern character by character and keeps adding one to the user score if the characters of both simon and user patterns match. The loop breaks if the character of user pattern does not match with that of simon matter. At the end the calculated user score is displayed in the output.

3 0
2 years ago
Terry came into work and turned on his computer. During the boot process, the computer shut down. When he tried again, the compu
kirza4 [7]

Answer: Something to do with the storage device, in this case most likely a HDD.

Explanation: Operating System files has somehow probably gotten corrupted during the boot process, or the system drive connection to the motherboard have been severed.

7 0
2 years ago
When you reboot your system, the computer follows start-up instructions stored in this type of memory. multiple choice dram sdra
MA_775_DIABLO [31]
<span>A computer’s start-up instructions are stored in a type of memory called Flash. Flash memory can be written to and read from, but its contents are not erased after the computer powers down. This Flash memory is more commonly referred to as the BIOS (Basic Input Output System).</span>
4 0
2 years ago
Read 2 more answers
Gill is a computer forensics investigator who has been called upon to examine a seized computer. This computer, according to the
Keith_Richards [23]

Answer:

the answer is d. Hybrid attack.

8 0
2 years ago
Other questions:
  • Wesley has to create a web banner to announce a “Back to School” sale by an online retailer. Which information should he determi
    15·2 answers
  • To read encrypted data, the recipient must decipher it into a readable form. what is the term for this process? re-securing decr
    5·1 answer
  • How many frequencies does a full-duplex qam-64 modem use?
    8·2 answers
  • Jesse would like to modify the table that he has inserted into a Word document by making the first row a single header cell.
    15·2 answers
  • Describe a situation involving making a copy of a computer program or an entertainment file of some sort for which you think it
    7·1 answer
  • A website updated daily could be considered _____. a. authoritative b. objective c. accurate d. timely
    8·1 answer
  • Create the strAnalysis() function that takes 1 string argument and returns a string message. The message will be an analysis of
    15·1 answer
  • _____ is a markup language designed to transport and store data on the Web. Group of answer choices Standard Generalized Markup
    13·1 answer
  • Define the instance method inc_num_kids() for PersonInfo. inc_num_kids increments the member data num_kids. Sample output for th
    10·1 answer
  • You should see an error. Let's examine why this error occured by looking at the values in the "Total Pay" column. Use the type f
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!