Lots of data can be transferred in short time, when we have,
a.High latency
b.Higher bandwidth
c.Lagging
d. Lower bandwidth

Answers

Answer 1

Answer: B. Higher Bandwidth

Answer 2
Thank you lord lord please thank you

Related Questions

A list of steps to finish a task. A set of instructions that can be performed with or without a computer is called an

Answers

Answer:

algorithm

Explanation:

A list of steps to finish a task. A set of instructions that can be performed with or without a computer is called an algorithm.

What is algorithm?

An algorithm is a method for performing calculations or finding solutions to issues. Algorithms perform as a precise set of instructions that carry out preset activities consecutively in either hardware-based or software-based routines. Algorithms play a big role in information technology across the board.

Algorithms can be found in a variety of contexts, including the way we do laundry, how we answer long division problems, what goes into baking a cake, and how search engines work.

The merge sort algorithm is one of the most important ones now in use. It is a comparison-based sorting algorithm that uses the divide-and-conquer tactic to get over an challenge. It was made by John the mathematician.

Thus, it is an algorithm.

For more information about algorithm, click here:

https://brainly.com/question/22984934

#SPJ6

please answer this question​

Answers

Answer:

17. True

18. Backup

Explanation:

Surfing the internet refers to going through various websites to find the different things that you want. This is also the same as browsing the internet. For this reason, both words can be used interchangeably to describe going to different websites on the internet.

When we store our data on alternative storage such as pen drives, hard disks and online storage services, we are backing up our data so that in the event that we lose access to the primary storage device, we will still have the data in those alternative storage devices and services.

________ security provides perimeter security, access control, smoke and fire detection, fire suppression, some environmental protection, and usually surveillance systems, alarms, and guards.

Answers

Answer:

Premises

On-premise security refers to the hardware and software solutions that protect businesses data from outside and inside threats.

A two-dimensional array is essentially?
A primitive date type
A looped data structure

Answers

Answer:

A looped data structure

Explanation:

A two-dimensional array is an array of another array. You can traverse it using nested loops, one to traverse row and one to traverse columns.

A router periodically goes offline. Once it goes offline, you find that a simple reboot puts the router back online. After doing some research, you find that the most likely cause of the problem is a bug in the router software. A new patch is available from the manufacturer that is supposed to eliminate the problem. What should you do next

Answers

Answer:

Obviously update the router

Explanation:

Keeping your router up to date is also a really important thing to do to protect your network from vulnerabilities. Outdated systems are easy targets for new methods of hacking.

Kerry is debugging a program. She identifies a line of code to begin execution and a line of code to end execution so that she is only running part of the computer program. Which is she using

Answers

Answer:

breakpoints.

Explanation:

A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are seven (7) main stages in the creation of a software and these are;

1. Planning.

2. Analysis.

3. Design.

4. Development (coding).

5. Testing.

6. Implementation and execution.

7. Debugging and maintenance.

In this scenario, Kerry is debugging a program and identifies a line of code to begin execution and another line of code to end execution so that she is only running part of the computer program. Thus, Kerry is using breakpoints.

Basically, one of the fundamental debugging techniques used by software developers and programmers are breakpoints. They are generally set at any point where a pause debug-ger execution or an execution of a code is required based on certain conditions.

At every breakpoint address, a debug-ger temporarily stores a set of instruction and overwrites it with another special instruction.

Answer:

C for Edge

Explanation:

What would be used by a business to assess how the business is working within its organization goals? O A. Information systems B. Interactivity C. Management plan D. Business analysis​

Answers

Answer:

Management plan

Explanation:

11. Find the output of the following programs:
CLS
X= 7
FOR I = 1 to 10
PRINT X
IF X MOD 2 = 0 THEN
X= X/2
ELSE
X=X* 3+1
END IF
Next I
END​

Answers

Answer:

See picture.

Explanation:

Ran it on repl it.

The formula =average(B1:B2) displays the value____(see the picture down)

Answers

9514 1404 393

Answer:

  (a)  10

Explanation:

The formula displays the average of the values 8 and 12. That average is ...

  (8+12)/2 = 10

What type of communication takes place between two individuals or parties and involves the use of encryption so that only the desired individuals have access to what is being said or heard

Answers

Answer:

private

Explanation:

Which benefit of purchased data models provides database planning and analysis by providing a first data model, which we can use to generate specific analysis questions and concrete, not hypothetical or abstract, examples of what might be in the appropriate database

Answers

Answer:

It facilitates systems analysis.

Explanation:

Systems analysis can be described as a process of gathering and interpreting data, finding faults, and breaking down a system into its constituent parts. It is a problem-solving strategy that facilitates an improvement in the system and guarantees that all of the system's components work together in an efficient manner to achieve their goals.

Therefore, the benefit is that it facilitates systems analysis.

What is a named bit of programming instructions?

Answers

Answer:

Function: A named bit of programming instructions. Top Down Design: a problem solving approach (also known as stepwise design) in which you break down a system to gain insight into the sub-systems that make it up.

One of the key properties of the ___________ approach is that a specific concept is represented by activity that is distributed over many units in the network.

Answers

Answer:

connectionist

Explanation:

One of the key properties of a connectionist network is that a specific category is represented by activity that is distributed over many units in the network. This contrasts with semantic networks, in which specific categories are represented at individual nodes.

Select the three careers in the creative side of digital media.

broadcasting
web designer
animators
filmmaker
project management

Answers

Answer:

I would pick A B and D to be my answer

Answer:

web designer, animators, and filmmaker.

write a program to calculate the area of rectangle​

Answers

Answer:

program by LET statement

Explanation:

CLS

REM to find the area of rectangle

LET L=40

LET B=20

LET AOR=L*B

PRINT "AOR=";AOR

END

                                                                                         Press F5

output

AOR=800

how can the government protect human rights​

Answers

Answer:

governments can: Create constitutional guarantees of human rights. Provide ways for people who have suffered human rights violations by the government to seek legal remedies from domestic and international courts. Sign international human rights treaties.

The bill of rights protects freedom of speech, freedom of religion, the right to keep and bear arms, the freedom of assembly and the freedom to petition.

Fruits, stones and other organic pigments are examples of what?
O Natural materials
O Synthetic materials
O Cultural materials
O Modern art supplies

Answers

Natural materials
Hope this helps

The _______ is used to change the date Auto Fill option.
A. Fill Tag
B. Tag
C. Smart Fill
D. Smart Tag

Answers

I assume you are talking about Excel?. You first--enter your initial date on the first cell and click the cell with the first date to select it, then drag the fill handle.

What is a blank workbook?

Answers

A workbook is a file that contains one or more worksheets to help you organize data. You can create a new workbook from a blank workbook or a template

What is the output of the sum of 1001011 and 100011 displayed in hexadecimal?

Answers

Answer:

[tex]1001011_2[/tex]    [tex]+[/tex]   [tex]100011_2[/tex]   [tex]=[/tex]    [tex]6E_{hex}[/tex]

Explanation:

Required

[tex]1001011_2 + 100011_2 = []_{16}[/tex]

First, carry out the addition in binary

[tex]1001011_2[/tex]    [tex]+[/tex]   [tex]100011_2[/tex]   [tex]=[/tex]    [tex]1101110_2[/tex]

The step is as follows (start adding from right to left):

[tex]1 + 1 = 10[/tex] --- Write 0 carry 1

[tex]1 + 1 + 1(carry) = 11[/tex] ---- Write 1 carry 1

[tex]0 + 0 + 1(carry) = 1[/tex] ---- Write 1

[tex]1 + 0 = 1[/tex] --- Write 1

[tex]0 + 0 = 0[/tex] ---- Write 0

[tex]0 + 0 = 0[/tex] ---- Write 0

[tex]1 + 1 = 10[/tex] --- Write 0 carry 1

No other number to add ; So, write 1 (the last carry)

So, we have:

[tex]1001011_2[/tex]    [tex]+[/tex]   [tex]100011_2[/tex]   [tex]=[/tex]    [tex]1101110_2[/tex]

Next, convert [tex]1101110_2[/tex] to base 10 using product rule

[tex]1101110_2 = 1 * 2^6 +1 * 2^5 + 0 * 2^4 + 1 * 2^3 + 1 * 2^2 + 1 * 2^1 + 0 * 2^0[/tex]

[tex]1101110_2 = 64 +32 + 0 + 8 + 4 + 2 + 0[/tex]

[tex]1101110_2 = 110_{10}[/tex]

Lastly, convert [tex]110_{10}[/tex] to hexadecimal using division and remainder rule

[tex]110/16 \to 6\ R\ 14[/tex]

[tex]6/16 \to 0\ R\ 6[/tex]

Write the remainder from bottom to top;

[tex]110_{10} = 6(14)_{hex}[/tex]

In hexadecimal

[tex]14 \to E[/tex]

So, we have:

[tex]110_{10} = 6E_{hex}[/tex]

Hence:

[tex]1001011_2[/tex]    [tex]+[/tex]   [tex]100011_2[/tex]   [tex]=[/tex]    [tex]6E_{hex}[/tex]

who likes video games

Answers

i wish i could play but my strict mom would never let me :’(

write a program to calculate the volume of a cylinder​

Answers

bro mark me brainliest i’m struggling with algebra 2 rn

Answer:

program by READ DATA statement

Explanation:

CLS

REm to find the volume of a cylinder

READ π , [tex]r^{2}[/tex] , h

PRINT " pie =";P

PRINT "radius =";r

PRINT "height";h

PRINT "V=";π*[tex]r^{2}[/tex]*h

DATA = 22/7 , 4, 6

END

Q3.What are the hardware requirement of the multimedia system?

Answers

Answer:

• The processing unit

• The memory

• Universal Serial Bus (USB) Device

• Graphics Card and Graphical Processing Unit (GPU)

• Hard drive

• Monitor

• External storage and optical device

03.05 Editing in Word
1335 Middle School Business Keyboarding / Module 03: Write with Word
1. (03.05 LC)
This tool allows you to duplicate text from one part of a document while keeping the original text. (5 points)
O Cut
O Copy
O Drag
o paste

Answers

Answer:

Copy

Explanation:

In Microsoft Word, the copy tool is located in the Home tab, within the Clipboard group along with Cut, Paste, and Format Painter tool buttons

The Copy tool can also be brought up by right clicking a selected item

The Copy tool is activated when an item is selected. When the Copy tool command is used, the text is copied while keeping the original text.

which structure does a web page normally use to define an area of focus

Answers

Answer:

Grid structure

Explanation:

PLEASE HELP !!!! 40 POINTS BUT HELP

Write a python program to build a simple BMI calculator, where your program asks the user to input the height and the weight of the user then displays the BMI and statement stating the overall health of each user . All the data should be in variables , and no functions should be used.
The program should contain the following:
Welcome message- Display your full name, project name and give a small description on your project (definition of the BMI) [2 marks]
Variables :
height variable , input by the user [2 marks]
Weight variable , input by the user [2 marks]
Use a proper data type change function , int() or float() [2 marks]
Calculate the BMI by using the input variables of the height and the weight . [4 marks]
Display the BMI with statement based on the result of the BMI , refer to the below table [6 marks]
Critical thinking :
After running the code, don't stop the program and ask the user for a new input for a new calculation .(use loop , Break )
EXAMPLE :
Do you want to make a new calculation ? if no end the program , if yes start the code again .[2 marks]

Answers

Answer:

So in a way it is about a python calculation

dash is a collection of sequentially arranged slides put together in the from of a file​

Answers

Answer: Presentation

Explanation:

A presentation refers to the collection of sequentially arranged slides that are put together in the from of a file​.

Presentations are used by businesses and professional firms to inform, educate, and persuade the audiences. Companies use presentations to train their employees, and communicate with their clients by using words and images to engage them.

A(n) ________ CPU has two processing paths, allowing it to process more than one instruction at a time. Group of answer choices dual-core bimodal all-in-one dual-mode Flag question: Question 79 Question 791 pts ________ is concerned with the design and arrangement of machines and furniture to avoid uncomfortable or unsafe experiences. Group of answer choices Repetitive strain prevention Ergonomics Positioning Occupational safety

Answers

Answer:

A dual CPU has two processing paths, allowing it to process more than one instruction at a time.

Ergonomics is concerned with the design and arrangement of machines and furniture to avoid uncomfortable or unsafe experiences.

Select the correct answer from each drop-down menu.
Kawika is a math teacher. His students recently took a test. He has recorded their scores in a spreadsheet, using functions to analyze the scores. Which functions should he use to determine the top and mean scores?

Kawika can use the ____ function to find the top score and the ____ function to find the mean score.

First blank:
1. MIN
2. COUNT
3. MAX

Second blank:
1. AVERAGE
2. ROUND
3. SUM

Answers

Answer:

First blank:  MAX

Second blank:  AVERAGE

Explanation:

Required

Complete the blanks

The first blank is to be filled with a function that calculates the highest score from a given range of scores (cells).

To do this, we make use of the MAX function, and the syntax is:

=MAX(cell_range)

The second blank is to be filled with a function that calculates the mean score from a given range of scores (cells).

To do this, we make use of the AVERAGE function, and the syntax is:

=AVERAGE(cell_range)

Answer:

MAX

AVERAGE

Explanation:

I got it right on the Edmentum test.

A(n) ________ cloud does not free an organization from the issues associated with managing the cloud infrastructure, but it does give the organization a high degree of customizability, flexibility, and control over their data and applications. Group of answer choices

Answers

Answer:

Private.

Explanation:

The private cloud is a computing service offering a proprietary environment to a single organization. In simple terms, it is a single-tenant environment, which means that the organization (the tenant) can use it without sharing its resources with others. It is also known as internal cloud or corporate cloud.

Therefore, it is a private cloud computing system that gives the organization a great level of customizability, flexibility, and control ability over data and applications.

Thus, a private cloud is a correct answer.

Other Questions
1. Nominal executive head of the country Determine how many people will fit in a building with a width of 105 feet and a length of 250 feet, if we use a standard of 16 people per 25 square feet. the capacity of a jug is 6L. Kerry needs 5L of juice for a party. how many jugs will she have to make?from the owner's lil sis Find the volume of the cylinder in terms of pie and to the nearest tenth 4 in 1in A die is rolled 2 times. What is the probability of getting a 2 on the first roll and a 5 on the second roll? 29.) What charge would you expect from a Group 1 atom when it becomes an ion?a.) 2-b.) 2+c.) 1-d.) 1+ An unknown compound (152 mg) was dissolved in water to make 75.0 mL of solution. The solution did not conduct electricity and had an osmotic pressure of 0.328 atm at 27C. Elemental analysis revealed the substance to be 78.90% C, 10.59% H, and 10.51% O. Determine the molecular formula of this compound. PLEASE HELP7) What are examples of a polyhedron? Check ALL that apply. *cylinderstriangular prismsspheresrectangular prismssquare prismscubescones What is the scale factor?NEED HELP ASAP! What is the overall effect of the three underlined words in passage 1, location on pages 2 and 5? Passage Londons Watchtower Big Ben How do isotopes of the same atom react chemically? How do isotopes of the same atom compare in size? joe is upset because How many coins make $7.68 in cents what is the theme of athena and poseidon? Inicialmente una muestra de nen tiene un volumen de 2,50 L a 15 C. Cul es latemperatura en C, cuando el volumen de la muestra cambia a cada uno de lossiguientes volmenes, mantenindose la presin constante?a. 5,0 L b. 1250 ml c. 7,50L d. 3550 ml To what amount will $8000 growing if it is invested for 12 years at 6% compounded quarterly Which type of business grew most quickly in the United States during the late1800s?O A. Local farmsB. Family-owned storesC. Employee-owned factoriesD. Large corporations Create a polynomial function in factored form that crosses through the x-axis at -2 and touches the x-axis and turns around at 4. An item is regularly priced at $31 . It is on sale for 65% off the regular price. WORTH 20 POINTSUse the volume formula to find the volume of the prism.A. 9 cubic units O B. 18 cubic units C. 4 cubic units O D. 7 cubic units