answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Katena32 [7]
2 years ago
8

Consider an application that transmits data at a steady rate (for example, the sender generates an N-bit unit of data every k ti

me units, where k is small and fixed). Also, when such an application starts, it will continue running for a relatively long period of time. Would a packet-switched network or a circuit-switched network be more appropriate for this application? Why?
Computers and Technology
1 answer:
brilliants [131]2 years ago
5 0

Answer:  For this type of application, it should be more appropriate a circuit-switched network.

Explanation: As the data are transmitted at a steady rate (x bits per second, for instance), and it's not transmitted in bursts, but during a relatively long period of time, it makes more sense to use a circuit-switched network instead of a packet-switched network, more useful when data shows in bursts (short intervals of data, followed by idle time, that can be filled with other data).

You might be interested in
given:an int variable k,an int array currentMembers that has been declared and initialized,an int variable memberID that has bee
Oksi-84 [34.3K]

Answer:

// The code segment is written in C++ programming language

// The code segment goes as follows

for (k = 0; k < nMembers; k++)

{

//check if memberID can be found in currentMembers

if (currentMembers[k] == memberID){

// If yes,

// assigns true to isAMember

isAMember = true;

k = nMembers;

}

else{

isAMember = false;

// If no

// assigns false to isAMember

}

}

// End of segment:

The following assumption were made in the code segment above.

There exists

1. An already declared and initialised int array currentMembers.

2. An already initialised int variable memberID

Line 3 initiates a loop to scan through the array

Line 6 checks for the condition below

If current element of array equals memberID then

It assigns true to isAMember and nMembers to k

Else

It assigns false to isAMember

7 0
2 years ago
You learn that in a previous security breach at GearUp, a disgruntled employee destroyed the encryption key that had been used t
lukranit [14]

Answer:

The data can be safeguarded using key escrow procedure.

Explanation:

Key escrow basically means to store the cryptographic key in an "escrow" by a reputable trusted third party. The copy of the encryption key is kept with the third party. In case the cryptographic key gets lost or destroyed, then the key escrow service helps to access the encrypted data. It also manages the access control to the key in case the key gets lost. So this way in case of security breach at GearOn the key escrow service can be used to re-implement or access the key easily.

6 0
2 years ago
Which of the following Teacher Tips would NOT be helpful when trying to select content from the Chrome Web Store? "Can be used a
gayaneshka [121]

Answer:

I'd say all of them have somewhat of a profound amount of viability and usefulness when it comes to teachers trying to find appropriate content, but "Can be used across subject areas" is not distinct enough, and is to broad/unclear, since quite obviously if teachers are looking for content for there students they will be looking for apps that are used for teaching certain subject areas. Every app used for teaching will be used for certain subject areas, so stating that statement is a mere waste of time & space. Where as "This app is not available in the Chrome Web Store" is pretty helpful to know, because knowing if an app is available or not is really important. "Helped my struggling students really understand the concept of color harmony." may be helpful if you are trying to find an app that correlates to science as the concept of color harmony is science. And  "Doesn’t have much of a learning curve" shows that the app can be used long-term and is informative.

4 0
2 years ago
Recall that with the CSMA/CD protocol, the adapter waits K. 512 bit times after a collision, where K is drawn randomly. a. For f
julia-pushkina [17]

Complete Question:

Recall that with the CSMA/CD protocol, the adapter waits K. 512 bit times after a collision, where K is drawn randomly. a. For first collision, if K=100, how long does the adapter wait until sensing the channel again for a 1 Mbps broadcast channel? For a 10 Mbps broadcast channel?

Answer:

a) 51.2 msec.  b) 5.12 msec

Explanation:

If K=100, the time that the adapter must wait until sensing a channel after detecting a first collision, is given by the following expression:

  • Tw = K*512* bit time

The bit time, is just the inverse of the channel bandwidh, expressed in bits per second, so for the two instances posed by the question, we have:

a) BW  = 1 Mbps = 10⁶ bps

⇒ Tw = 100*512*(1/10⁶) bps = 51.2*10⁻³ sec. = 51.2 msec

b) BW = 10 Mbps = 10⁷ bps

⇒ Tw = 100*512*(1/10⁷) bps = 5.12*10⁻³ sec. = 5.12 msec

5 0
2 years ago
The best defense against viruses is to install ________ software, which is specifically designed to detect viruses and protect y
saw5 [17]
The best defense against viruses is to install anti-virus software, which is specifically designed to detect viruses and protect your computer and files from harm. Anti-virus software is called also anti-malware software. It is a set of software programs installed on computers with the goal to prevent, to detect and remove viruses. Example for viruses are  worms, trojans, adware and many more.
3 0
2 years ago
Other questions:
  • How efficient would a 6-bit code be in asynchronous transmission if it had 1 parity bit, 1 start bit, and 2 stop bits?
    5·1 answer
  • What is a typical grace period for a credit card...
    15·2 answers
  • Show how to define a view tot_credits (year, num_credits), giving the total number of credits taken by students in each year
    8·1 answer
  • Strlen("seven"); what is the output?
    14·1 answer
  • Write a method called fact that recursively calculates the factorial value of its single int parameter. The value returned by fa
    10·1 answer
  • Given numRows and numColumns, print a list of all seats in a theater. Rows are numbered, columns lettered, as in 1A or 3E. Print
    14·1 answer
  • In C++ the declaration of floating point variables starts with the type name double, followed by the name of the variable, and t
    10·1 answer
  • Temperature Class Write a Temperature class that will hold a temperature in Fahrenheit and provide methods to get the temperatur
    6·1 answer
  • You would like the user of a program to enter a customer’s last name. Write a statement thaUse the variables k, d, and s so that
    5·1 answer
  • A major clothing retailer has requested help enhancing their online customer experience. How can Accenture apply Artificial Inte
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!