Host A sends a packet of length 1,100 bytes to host B over a link with transmission rate 4 Mbps over a distance 1300 km, propagation speed 2.5x108 m/s. Each packet is processed before entering the link (and link buffer), and the packet processing delay is 0.2 ms.

Please calculate the delays in ms (millisecond)
Transmission delay = ... ms
Propagation delay = ... ms
The end to end delay = ... ms

Answers

Answer 1

Answer:

please mark me brainlist

Explanation:

Host A Sends A Packet Of Length 1,100 Bytes To Host B Over A Link With Transmission Rate 4 Mbps Over

Related Questions

What ethical concerns might arise from applying new IT to law enforcement?

Answers

Answer:

One ethical concern that might occur is the rise of bias in the police department. It would be possible for a disgruntled or frustrated cop to lean into new IT and be able to take advantage of a past suspect or an "enemy" of theirs such as a neighbor or even a coworker.

If your computer won't connect to the internet, which of these is most likely to be the problem?

Answers

Answer:

nic is the answer.... .....

what is the full form of XML?​

Answers

Answer:

extensible markup language

XML is “extensible markup language”

Pls i need help asap

Answers

Answer:

sorry for that I don't know it's answer sorry

____ is a technology that exists inside another device

Answers

Answer:

Embedded technology is a technology that exists inside another device.

Answer:

Embedded

Explanation:

An embedded system is a combination of computer hardware and software designed for a specific function.

So my computer has be clicking random things and opening things. It’s been happening for a few days and I want to know if it’s a hacker or something wronging with the computer (I don’t have a mouse) so it’s not auto clicking

Answers

Answer:

yeah there is something wrong with the computer.. it can be virus or it can your mouse board. its not a hacker

Explanation:

Mark true or false IT questions

1:you can change the default font style in word ( )

2:A pie chart represent only one data series ( )

3:MS-DOS is a graphical user interface operating system ( )

4:a presentation software is a application software ( )

5: only addition can be done in the ALU ( )

fill in the blanks...............

1:A ................... mouse is looking like a pencil

2:A/An ......................... is an interface between the user and the computer​

underline the correct answer

1: the.......... function multiple the numbers in Excel

add

sum

products

Min

2:to enter the data in multiple lines

wrap text

merge and center

orientation

all of these

3:a list is used when the unordered of items is marked

bulleted

numbered

both a and b

non of these

4:the screen that you see after you signed in the computer

wallpaper

desktop

screen saver

non of these

5:the ............. manages the working and control of a network device

Device driver

kernel

file system

all of these

Answers

Answer:

1. true

2. true

3. false

4. false

5. false

A network engineer is troubleshooting connectivity issues among interconnected Cisco routers and switches. Which command should the engineer use to find the IP address information, host name, and IOS version of neighboring network devices

Answers

Answer:

The show cdp neighbors detail command reveals much information about neighboring Cisco devices, including the IP address, the capabilities, host name, and IOS version. The show interfaces and show version commands display information about the local device.

Show the CDP neighbor's detail command should the engineer use to find the IP address information, hostname, and IOS version of neighboring network devices. Thus option D is correct.

What is a network?

A group of computers combining resources that are available on or offered by network nodes is known as a computer network. To communicate with one another across digital connections, computers employ standard data exchange.

Numerous details about nearby Cisco devices are made available via the show CDP neighbors' detail operation, including that of the Internet address, capabilities, and network address, as well as the IOS version. Details well about the local device is shown using the command show connections and show revision. Therefore, option D is the correct option.

Learn more about network, Here:

https://brainly.com/question/15002514

#SPJ2

The question is incomplete, the complete question will be :

A network engineer is troubleshooting connectivity issues among interconnected Cisco routers and switches. Which command should the engineer use to find the IP address information, host name, and IOS version of neighboring network devicesshow version

show ip route

show interfaces

show CDP neighbor's detail

Question 3 of 10
A business letter is not written:

Answers

Answer:

yes. business letter better use statistic. or audit.

question of computer sciences​

Answers

Answer:

a ans is cyber crime

b ans is hacking

c ans is cracker

d ans is computer ethics

e ans is phishing

I NEED TO FIND OUT THE ANSWER!

Answers

Answer:

the first action that should be taken is to back up the all important document that and by finishing doing that format the entire system...and i advise you should be choosing the best antivirus to protecting your computer

What do earthquakes and tsunamis have in common?

Answers

Answer: They modify the earth's surface

Explanation:

It was the correct answer on QC. Hope this helps

Energy is released as an earthquake whenever these tectonic plates glide over, under, or past each other at the fault lines where they meet. Tsunamis are ocean waves caused by undersea earthquakes.

What are tectonic plates?

Tectonic plates are fragments of the Earth's crust as well as topmost layer mantle, collectively known as the lithosphere.

The plates are approximately 100 km thick and are made up of two types of material: oceanic crust (also known as sima from silicon and magnesium) and continental crus.

Tsunamis are ocean waves caused by: large earthquakes near or beneath the ocean Eruptions of volcanoes Landslides beneath the sea.

Large amounts of debris fall into the water during onshore landslides. Because these waves are not caused by tides, scientists avoid using the term "tidal wave."

When these tectonic plates glide over, under, or past each other at the fault lines where they meet, energy is released as an earthquake. Tsunamis are ocean waves caused by earthquakes beneath the sea.

Thus, this is the similarity between earthquake and tsunami.

For more details regarding tectonic plates, visit:

https://brainly.com/question/16944828

#SPJ2

An employee of a large corporation remotely logs into the company using the appropriate username and password. The employee is attending an important video conference with a customer concerning a large sale. It is important for the video quality to be excellent during the meeting. The employee is unaware that after a successful login, the connection to the company ISP failed. The secondary connection, however, activated within seconds. The disruption was not noticed by the employee or other employees. What three network characteristics are described in this scenario

Answers

Answer: I gave 6 you can choose from.

Integrity

Scalability

Quality of Service

Fault of Tolerance

Powerline Networking

Security

Write a QBASIC program to calculate and display the simple interest.​

Answers

Answer:

see and write

Explanation:

cls

start

enter"principle"

enter"time"

enter"rate"

p×t×r/100

display result(output)or ans

stop

State the Limitations of the first generation of computers​

Answers

Answer:

The limitations of the first generation of computer are:-

•The operating speed was very low.

•Power consumption was very high.

•They required large space for installation.

Hope it helps you.

A web ______ makes a web page available to a browser that requests the page to view.

A. specializer
B. breaker
C. candidate
D. server

Answers

Answer:

D.  server

Explanation:

How can get a cup stain off my Chromebook top? Like I tried everything. And I start school on the 1st of September. Plz help me

Answers

Answer:

Try using vinegar or baking soda and water. There's also products for your problem.

How many units are considered a full time student at a community college in California?

Answers

Answer:

12

Explanation:

According to Saddleback college located in California;

12 units are considered full-time student status.

You may take as little as 0.5 units or as many as 19.0 units during a single semester. To take more than 19 units you are required to obtain special permission from the Counseling Department.

Explain why this product was created?

Answers

Explanation:

Product was created becaus the first and most important reason for any new development is to provide new value to the customer. Without this, there is no reason for them to trade their money for the new device. However, if the product or service offers overwhelming value, then customers will flock to it.

Manufacturing, transportation, communications, advanced very quickly.
Education improved


A. middle age
B. renaissance
C. industrial revolution
D. information

Answers

Answer:

renaissance

Explanation:

which type of software is created on user dimension​

Answers

Answer:

Application and system software is created on user dimension.

what is a compter crime?​

Answers

Answer:

Cy***rcrime, also called computer cr**me, the use of a computer as an instrument to further illegal ends, such as committing fr4ud, traf**icking in child por****graphy and intellectual property, stealing id

What is a good computer i should get

Answers

I would reccomend Chromebook for school, home computers like dell and apple computer

How can the Playback feature adjust your audio recording?

Answers

Answer:

If said playback was recorder on editing software then there is a good chance that it could be changed for editing porpuses.

Explanation:

What are the function of PowerPoint?
10 points please ​

Answers

PowerPoint is a presentation program that allows you to create dynamic slide presentations. These presentations can include animation, narration, images, videos, and much more.

hope this helps <3

Answer:

Powerpoint is a software package designed to create electronic presentations consisting of a series of separate pages or slides.

It allows you to catch your audience's attention using visual effects. PowerPoint is also highly recommended for speakers that may find presentations stressful. One other way that PowerPoint can be important to the presenters is by using the slides as keynotes and control the flow of the presentation.

Explanation:

Hope this helps! Thanks.

What an RRD in computer?

Answers

Answer: RRDtool (round-robin database tool) aims to handle time series data such as network bandwidth, temperatures or CPU load. The data is stored in a circular buffer based database, thus the system storage footprint remains constant over time.

Explanation:

What do you mean by gigo?Explain in breif​

Answers

Answer:

garbage in garbage out

Explanation:

it means bad input gives you also a bad output.

could you mark me as brianlist.

pls help with this two.

Answers

Answer:

I love my *country ** so i am going visit it

Answer:

I also like my country very much

1. Separate valid and invalid variables:
1. CSL
1. Age
2. Mark-sheet
3. Tel $
4. CLS
5. Simple Interest
6. SEE
1.545Newton
2. Stop5for
1. Give
2 $shopping
3. United

Answers

Firstly we explain the variable and the declaration rule for the variable and further separating the valid and invalid variables.

Whenever a user is given a question, variables are data values that can vary. for example  age, CSL, etc.It may alter and during the execution of the program.It's a storage space for memories.It has a name that corresponds to the location.Data is stored in the memory location.

The rule for variable declaration:

The names of your variables should be based on the phrases used in the subject area, and they should reflect the variable's function.By removing spaces between the words, you can make variable names. Each word in the name should be capitalized, including prepositions and pronouns that are one letter long.An underscore should never be used to start a variable name.Single-character variable names should be avoided. For loop counters, only short variable names are permitted.After the state that equals the "true" value, name variables that describe binary states ("true" or "false").

The valid variable is:

CSL, Age,CLS,SEE,Stop5for,Give, $shopping, and United.

The invalid variable is:

Mark-sheet, Tel $, Simple Interest, and 545Newton.

Learn more:

brainly.com/question/2684763

what is memory?
How many type of memory in computer system?​

Answers

What is memory?

Memory is the process of taking in information from the world around us, processing it, storing it and later recalling that information, sometimes many years later. Human memory is often likened to that of a computer memory.

How many type of memory in computer system?

two types

Memory is also used by a computer's operating system, hardware and software. There are technically two types of computer memory: primary and secondary. The term memory is used as a synonym for primary memory or as an abbreviation for a specific type of primary memory called random access memory (RAM).

Hope it helps you my friendHave a great day aheadGood morning friend

Other Questions
Which of the following words do NOT follow the i before e except after cexcept when ei has a long a sound rule? Select all that apply.seizepiececounterfeiteightweird Do you know this it is for social studies 326009330?Please answer:( Dowry custom is a serious social problem. What would be your role to solve this problem? Write in four points Which choice best describes the following sentence?Cassidy volunteered. It is a complete and correct sentence. It is a fragment that is missing a subject. It is a fragment that is missing a predicate. It is a fragment with a subject and verb but expresses an incomplete thought from "Nashah's Rescu"dapted from "Nasbah's Rescue"Itemday so that his grandchildren of the This Nastia wasenough to be to the way she could work bude her olderItemthe preached the sheep bee tinkled sweetly, andGrandfather three sheepdogs rant beside the sheep turning backtersNashara past Grandfather and her brothers to the back of the flockSheWher mother she wanted to make sure the lambs made it downthe sleep fail to the bottom of the canyonJust make sure my lamb makes it safely, her mother had said, fountingNasbahar lovingly6 As the sheep slowly picked their way down the trail Nasbah heardGrandfather singing in Navajo She loved to hear him sing the oldsongs, especially the ones about nature Sometimes when she was atschool in Chine, she was afraid she'd forget the beauty of this canyonand the wash belowsis What was the Confucian expectation for those who were superior in society? if the 6th term of an A.p is 11and its first term is 1 find the common diferent When assessing capacity to perform activities of daily living in the older adult, which assessment finding is most important in determining nursing care for total mobility independence r-6--------- = - 3 - 3 Someone answer please and thank you! No photos please those are blocked for me! ! x Evaluate the exprssion when a= -5a2+6a-9 3/2 = 5d - 1/2solve for d what is ????????????????? 21x+28 Joanne a total score for a round of darts was -42 she had thrown 6 darts and scored the same each throw How many points did Joanne score on each throw midpoint (12, -9), endpoint (19, 0) the other endpoint is Fully factorise: 4x225NEED ANSWER ONLY DON'T SHOW STEPS. URGENT!!!a. (2x+5)(2x5)b. (2x5)(2x5)c. (4x+5)(x5)d. (3x+20)(x+5) Solve for x.(2x - 5(5x + 10)B What does the underlined word mean in the following sentence?Il a beaucoup de courage.O oneO HeOSheO They