Suppose you and four of your friends are wirelessly connected with the home wireless router. [03] At this moment router is not transmitting data to the outgoing link and all of you want to browse internet and send packets of same size to the router. Consider the bandwidth of the outgoing link is20Mbps , packet size is 2500 bytes and the processing delay of each packet is
2μs . If your packet is queued at position eleven, calculate the delay after which your packet will be transmitted

Answers

Answer 1

format please? i cant understand


Related Questions

Marco travels often and does not have consistent wireless Internet service. He frequently uses his mobile phone service to provide Internet access to his tablet.

Which network type is Marco using?


LAN


PAN


WAN


MAN

Answers

Answer:

PAN

Explanation:

For wireless devices like laptops, tablets, wireless desktops, and cellphones to communicate, a wireless LAN normally has a Wi-Fi router or wireless access point. A wireless LAN is essentially a LAN that doesn't use cables. Thus, option B is correct.

What are the PAN  network type is Marco using?

The computer network that links computers and other devices within a specific person's range is known as a personal area network (PAN). PAN stands for personal area network and gives a network range within a person's range, often within a range of 10 meters (33 feet).

A PAN is a network that primarily serves a tiny space, usually a single small room. It allows computer devices to share data and information with other nearby computers.

Therefore, Whereas in LAN, computers are connected via a network over a short distance, such as within a building, or in a single computer network made up of several computers.

Learn more about network type here:

https://brainly.com/question/29515062

#SPJ2

how do you get The special and extended ending in final fight 2 snes

Answers

Yes what that person above said!

what is computer? write about computer.​

Answers

Answer:

Is an electronic device used for storing and processing data.

Carlos manages a Linux system that users are able to SSH into in order to perform certain tasks. However, he has just installed a critical patch and wants to reboot the server to ensure that it has fully taken effect. Which of the following commands should he use to ensure that a reboot will not interrupt any logged in users?

a. w
b. id
c. whoami
d. uname -a

Answers

The answer is "Option b" which is "id", and its further calculation can be defined as follows:

In the Linux system, the id command is being used to find out the account and main indicators and numeric IDs of a current user and any other user on the system. In this, command the User name and genuine user ID.It is used to list all the groups of which a user is a member, and also display the security context of the current user.

The wrong choice can be defined as follows:

In choice a, "w" is the use full command, which displays all users who are currently active.In choice c, "whoami" is used as our user name.In choice d, "uname-a" is used to shows information about the network.

Therefore "Choice b" is the correct answer.

Learn more:

Linux system: brainly.com/question/3133247

why am i doing the investigation​

Answers

Because it’s your interest

Describe how tuples can be useful with loops over lists and dictionaries,
and give Python code examples.
Create your own code examples. Do not copy them from the textbook or any other source.
Your descriptions and examples should include the following: the zip function, the enumerate function, and the items method.

Answers

Answer:

what is computer

what is simple machine

what is output device

The slope and intercept pair you found in Question 1.15 should be very similar to the values that you found in Question 1.7. Why were we able to minimize RMSE to find the same slope and intercept from the previous formulas? Write your answer here, replacing this text.

Answers

I don’t get the question

Which statement is accurate to describe a spreadsheet versus an Excel workbook?
a) worksheets have one or more workbooks.
b) workbooks have one or more worksheets.
c) workbooks are the same as word documents.
d) worksheets always refer to real paper.

Answers

C is the correct answer

Scenarios are quite common where an IT professional is tasked with modify a file on many computer systems or many files on a single computer or a combination of the two. For example, a large software may need the copyright notice comment to be changed on every source file in the project. Or, a configuration file may need to be modified on every server in a multi-server deployment. Doing this task manually is not a viable way to approach the problem. Instead, a better solution is to use a scriptable environment to perform search and replace functionality on the files in question. Python is an excellent tool for this kind of task.
Description
Samba is a unix/linux file sharing suite of programs designed to provide Windows interoperable file and print sharing services. Much of the configuration for the Samba daemon is provided by the text file smb.conf (renamed to smb.txt for this assignment). After an update was deployed to three dozen linux servers it was discovered that a couple of configured parameters were incorrect. Unfortunately, since there are unique aspects to each server, copying the contents of a single file to each server is not a viable solution. To fix the problem, the IT department must connect to each server, edit the smb.conf file, and restart the smbd daemon. To automate this task, each server will have a Python script copied to it. Then an SSH session will be initiated to each server from which the script will be executed. Your task is to write the Python script.
The invocation of the script must be as follows:
python modify.py fileSpec "from" "to"
where,
modify.py is the name of your script
fileSpec is the name of the file to be modified (smb.txt)
"from" is the text to be searched for (be sure to enclose any white space in quotes.
"to" is the text the searched text is to be replaced with.
Testing the script is your responsibility. However a good test case is:
python modify.py smb.txt "password sync = yes" "password sync = no"

Answers

Answer:

Explanation:/

The example Python script that can be used to automate the modification of the smb.conf file on multiple Linux servers is shown below

What is the code?

python

import subprocess

import sys

def modify_smb_conf(file_spec, search_text, replace_text):

   try:

       # Open the file for reading

       with open(file_spec, 'r') as file:

           # Read the contents of the file

           file_contents = file.read()

       # Perform the search and replace operation

       modified_contents = file_contents.replace(search_text, replace_text)

       # Open the file for writing

       with open(file_spec, 'w') as file:

           # Write the modified contents back to the file

           file.write(modified_contents)

       # Print a success message

       print(f"Modification successful: Replaced '{search_text}' with '{replace_text}' in {file_spec}")

   except IOError as e:

       # Print an error message if there was an issue with file operations

       print(f"Error: {e}")

def main():

   # Check if the correct number of command line arguments are provided

   if len(sys.argv) != 4:

       print("Usage: python modify.py fileSpec \"from\" \"to\"")

       return

   # Extract the command line arguments

   file_spec = sys.argv[1]

   search_text = sys.argv[2]

   replace_text = sys.argv[3]

   # Call the function to modify the smb.conf file

   modify_smb_conf(file_spec, search_text, replace_text)

if __name__ == '__main__':

   main()

Read more about  code here:

https://brainly.com/question/29330362

#SPJ2

How is the architecture converted into software code? Elaborate the steps its passes through with help of examples / Diagram.

Answers

Answer:

software code 89089999990

How should you mark the query if it is a valid one?
A) Gibberish or Vague
B) Profane
C) Foreign Language
D) Valid
E) None

Answers

Answer:

None

HOPE IT WILL HELP YOU.

MARK THE ANSWER BRAINLIST

notes on secondary memory​

Answers

Answer:

non-volatile and persistent in nature

4. Which event is used to move from one textbox to another through enter
a) Key Click b) Key Enter c) Key Down d) Key Select

Answers

Answer:

key enter

Explanation:

May this help you l think

https://ref.surveyj.co/Oware111​

Answers

What is the link?

IS IT A HACKING LINK

Microsoft office can be classified under what heading of application

Answers

Answer:

Word processing software/application

pls mark as brainliest!

Have a grt day!!!

In order to print multiple worksheets, what needs to happen before printing?

Answers

Answer:

Explanation:

Click the File tab.

Click Print, or press the control p keyboard command.

On the Print screen, select the printer and other settings.

Click Print.

What is a disruptive technology? Give an example of an aspect of society that has been impacted by technological change.

Answers

Answer:

A disruptive technology sweeps away the systems or habits it replaces because it has attributes that are recognizably superior. Recent disruptive technology examples include e-commerce, online news sites, ride-sharing apps, and GPS systems.

A small file put in your hard disk that contains information like user id is called?​

Answers

Answer:

cookie basics

not sure...

Answer:

A small file put in your hard disk contains information like user id is called cookie. Thank you

26. The
operator will cause a record to
be selected only if two or more
conditions are satisfied
In MS access

Answers

Answer:

AND

The  AND operator will cause a record to  be selected only if two or more

conditions are satisfied.

When she downloads new software onto her smartphone, Talia must ensure the software is compatible with her smartphone's __________.


operating system


application software


utility software


productivity software

Answers

Answer:

operating system

Explanation:

Every smartphone has its own operating system (typically iOS or Andriod) and every app must be compatible with an operating system(s).

The rest of the options are just different types of software.

Lmk if this helps

2. Which property is used for hiding text of the textbox?
a) Password Char b) Text Char c) Char Password d) Pass Char

Answers

Answer:

password char

Explanation:

The password char property allows the text being written in the textbox to be hidden in the form of dots or stars. As such the user entering the password is secure, as no one nearby can know the password by watching the texts.

. In the select algorithm that finds the median we divide the input elements into groups of 5. Will the algorithm work in linear time if we divide it into groups of 7? How about 3? Explain your answer--- the asymptotic run time in either case.

Answers

Answer:

we have that it grows more quickly than linear.

Explanation:

It will still work if they are divided into groups of 77, because we will still know that the median of medians is less than at least 44 elements from half of the \lceil n / 7 \rceil⌈n/7⌉ groups, so, it is greater than roughly 4n / 144n/14 of the elements.

Similarly, it is less than roughly 4n / 144n/14 of the elements. So, we are never calling it recursively on more than 10n / 1410n/14 elements. T(n) \le T(n / 7) + T(10n / 14) + O(n)T(n)≤T(n/7)+T(10n/14)+O(n). So, we can show by substitution this is linear.

We guess T(n) < cnT(n)<cn for n < kn<k. Then, for m \ge km≥k,

\begin{aligned} T(m) & \le T(m / 7) + T(10m / 14) + O(m) \\ & \le cm(1 / 7 + 10 / 14) + O(m), \end{aligned}

T(m)

 

≤T(m/7)+T(10m/14)+O(m)

≤cm(1/7+10/14)+O(m),

therefore, as long as we have that the constant hidden in the big-Oh notation is less than c / 7c/7, we have the desired result.

Suppose now that we use groups of size 33 instead. So, For similar reasons, we have that the recurrence we are able to get is T(n) = T(\lceil n / 3 \rceil) + T(4n / 6) + O(n) \ge T(n / 3) + T(2n / 3) + O(n)T(n)=T(⌈n/3⌉)+T(4n/6)+O(n)≥T(n/3)+T(2n/3)+O(n) So, we will show it is \ge cn \lg n≥cnlgn.

\begin{aligned} T(m) & \ge c(m / 3)\lg (m / 3) + c(2m / 3) \lg (2m / 3) + O(m) \\ & \ge cm\lg m + O(m), \end{aligned}

T(m)

 

≥c(m/3)lg(m/3)+c(2m/3)lg(2m/3)+O(m)

≥cmlgm+O(m),

therefore, we have that it grows more quickly than linear.

Type the correct answer in the box. Spell all words correctly.
Which testing requires coding the test cases into a scripting language?
testing requires coding the test cases into a scripting language.

Answers

Answer:

sorry I forgot it

Explanation:

because I am now in a last position

Luckas entered the date 9-17-2013 in an Excel workbook. He wants the date to appears as “Tuesday, September 17, 2013.” Instead of retyping the data, what sequence should Lukas follow so this format is displayed?

Answers

Explanation:

highlight, correct format and click ok

what is
computer.write its example

Answers

The definition of a computer is a person or electronic device that makes and stores quick calculations or processes information. An example of a famous human computer is Ada Lovelace. An example of a computer is the MacBook.

Ellen is working on a form in Access and clicks on the Design tab in the Form Design Tools section. Ellen then clicks on the Controls button and clicks the Label icon. What is Ellen most likely doing to the form?
A.adding a title
B.adding an existing field
C.changing the anchoring setting
D.changing the font of a label

Answers

Answer:

D. changing the font of a label

When we have signals within 1-2 MHz band, using a waveguide is the most preferred choice for a transmission line. T or F?​

Answers

Answer:

T

Explanation:

subratract 11100 from 1011 by using 1's complement method step by step​

Answers

10089 is gonna be your anwser

A good machine should have the mechanical advantage of......?​

Answers

Answer:

The ideal mechanical advantage (IMA) of an inclined plane is the length of the incline divided by the vertical rise, the so-called run-to-rise ratio. The mechanical advantage increases as the slope of the incline decreases, but then the load will have to be moved a greater distance.

Explanation:

Create a Raptor program to store a list of customer names and phone numbers entered by the user to a text file. Save your text file as “Customers.txt”.

Answers

Answer:

b

Explanation:

Other Questions
Which property of multiplication is shown?g (h j) = (g h) j Which region experiences only two different climates? Midwest, Northeast, Southwest, & Pacific Select the correct answer.Which phrase best completes the second sentence? Cest ma premire visite en Afrique. ______________ faire des safaris.A. Je doisB. Il est obligatoire deC. Je voudrais bienD. Il est ncessaire de Task 1: Correct the mistakes if any1. Neither Jack is intelligent nor hardworking.2. Though he is poor, but he dreams big.3. As he is fat so he runs slowly.4. Unless you do not give the code, you will be killed.5. No sooner I had reached the office than the boss left.6. Not only she speaks English but also Chinese.7. This is my house, I live here.8. Because he was not hungry therefore we ate without him.9. He decides to stay home. Because it is raining now.10. The teacher asked that why I was late. What is the best way to ensure that results of a study are generalizable to a population?By making sure to use as many participants as possibleBy making sure the results are significantBy making sure to use an equal number of men and womenBy using random assignmentBy using a random selection of people in that population Twice a number increased by the product of the number and fourteen results in forty eight A square has the same area as a rectangle whoselonger side is 2 times the length of its shorterside. If the perimeter of the rectangle is 24, whatis the perimeter of the square?A) 8 2B)16 2C)32 2D)32 Qual o valor numrico do polinmio 3x+2y para x=3 e y=1? using chemical equations, show the different stages of fermentation please I need help urgently!!! Read the sentence.We waited for the school bus inside the museum for 30 minutes.What is the best way to correct this sentence? when was the Mona Lisa first Made helpppppFind the value of x.A. 176B. 128C. 256D. 74 16-32)What is the equation of the line that is perpendicular tothe given line and passes through the point (3, 0)?O 3x + 5y = -9O 3x + 5y = 9O 5x - 3y = -15O 5x - 3y = 15 I have 4 more quarters than dimes and 3 less pennies than dimes. What is the value of my coins, in cents Translate the phrase into an algebraic expression.The product of 9 and y describe how social activism could help fight poverty There are two types of fish in a lake. These are carp and pike.In a netted area of the lake 120 carp and 16 pike were caughtIn the whole lake it is estimated there are 34 000 fish.How many pike are there? Complete the equation describing howx and y are related.X0123565678910y = x + [?]Enter the answer that belongs in ?). A. GlobalizationB. Internet technologyC. Telecommunications technologyD. Treaties After an evening of drinking, alcohol can still be detected in the blood up to 8 weeks later.A. TrueB. False