Answer:
A bandwidth is the maximum rate of transfer of data across a given path
Latency refers to the delay of data to travel or move between a source and destination
An example of a high bandwidth and high latency network is the Satellite Internet connectivity.
An example of a low bandwidth and latency network is the telephone system connection.
Explanation:
Solution
Bandwidth: Bandwidth determines how fast data can be transferred for example, how many bits/sec it can transport.
Latency: It refers to the delay or how long it takes for data to travel between it's source and destination.
An example of a high bandwidth and high latency network is the Satellite internet connection.
Satellite internet connection: This is responsible for the connectivity of several systems, it has a high bandwidth, since satellite are in space, due to distance it has a high latency.
So, satellite internet connection is compensated with high latency and high bandwidth.
An example of a low bandwidth and low latency network is the Telephony network.
Telephone/telephony internet connection: This connection does not have much data for transfer. it has low size audio files of which a low bandwidth range. also for both end or end users to understand and talk to each other, it has low latency.
An example of a network that exhibits high bandwidth but also high latency is Satellite internet connection.
An example of one that has both low bandwidth and low latency is telephony internet connection.
Based on the provided information, we can say that Satellite internet connection posses high bandwidth but also high latency because, the fastness of data transfer is based on the bandwidth and how the data to travel between it's source and destination is based on its latency.
We can conclude that telephony internet connection has low bandwidth and low latency because of low data transfer is required.
Learn more about bandwidth at;
https://brainly.com/question/11408596
All of the following are true about hacksaws except: a. A hacksaw only cuts on the forward stroke. b. A coarse hacksaw blade (one with fewer teeth) is better for cutting thick steel than a fine blade. c. A fine hacksaw blade (one with many teeth) is better for cutting sheet metal. d. A hacksaw blade is hardened in the center, so it is best to saw only with the center portion of the blade.
All of the following are true about hacksaws, except a coarse hacksaw blade (one with fewer teeth) is better for cutting thick steel than a fine blade. The correct option is b.
What is a hacksaw?A hacksaw is a saw with fine teeth that were originally and primarily used to cut metal. Typically, a bow saw is used to cut wood and is the corresponding saw.
Hacksaw is used by hand, it is a small tool for cutting pipes rods wood etc that is very common and homes and in shops. The different types of hacksaws. The main three types of hacksaws are course-grade hacksaws, medium-grade hacksaws, and fine-grade hacks. The difference is just for the quality, and the design of the blade.
Therefore, the correct option is b. Cutting thick steel is easier with a coarse hacksaw blade (one with fewer teeth) than a fine one.
To learn more about hacksaw, refer to the below link:
https://brainly.com/question/15611752
#SPJ2
Write a program that prompts the user to enter integers in the range 1 to 50 and counts the occurrences of each integer. The program should also prompt the user for the number of integers that will be entered. As an example, if the user enters 10 integers (10, 20, 10, 30, 40, 49, 20, 10, 25, 10), the program output would be:
Answer:
import java.util.Scanner; public class Main { public static void main(String[] args) { int num[] = new int[51]; Scanner input = new Scanner(System.in); System.out.print("Number of input: "); int limit = input.nextInt(); for(int i=0; i < limit; i++){ System.out.print("Input a number (1-50): "); int k = input.nextInt(); num[k]++; } for(int j=1; j < 51; j++){ if(num[j] > 0){ System.out.println("Number of occurrence of " + j + ": " + num[j]); } } } }Explanation:
The solution is written in Java.
Firstly, create an integer array with size 51. The array will have 51 items with initial value 0 each (Line 5).
Create a Scanner object and get user entry the number of input (Line 6-7).
Use the input number as the limit to control the number of the for loop iteration to repeatedly get integer input from user (Line 9-13). Whenever user input an integer, use that integer, k, as the index to address the corresponding items in the array and increment it by one (LINE 11-12).
At last, create another for loop to iterate through each item in the array and check if there is any item with value above zero (this means with occurrence at least one). If so, print the item value as number of occurrence (Line 14-17).
Describe any five GSM PLMN basic services?
Answer:
Your answer can be found in the explanation below.
Explanation:
GSM is the abbreviation for Global System for Mobile communication. Its purpose is to transmit voice and data services over a range. It is a digital cellular technology.
PLMN is the abbreviation for Public Land Mobile network. It is defined as the wireless communication service or combination of services rendered by a telecommunication operator.
The plmn consists of technologies that range from Egde to 3G to 4G/LTE.
PLMN consists of different services to its mobile subscribers or users but for the purpose of this question, i will be pointing out just 5 of them alongside its definitions.
1. Emergency calls services to fire or police: Plmn provides us with the option to make emergency calls in the event of any accident or fire incident, etc.It is available on devices either when locked or unlocked.
2. Voice calls to/from other PLMN: This entails the putting of calls across to persons we cannot reach very quickly. PLMN helps to connect persons through its network of from other networks thus making communication easier.
3. Internet connectivity: PLMN provieds us with internet services through wifi or bundles that enable us have access to the internet as well as help us communicate with people and loved ones over a distance. Internet service are possble either on GPRS or 3G or 4G networks.
4. SMS service: SMS means short messaging service. This is also know as text messages. PLMN allows us to be able to send short messages to people as oppposed to mails. It is mostly instant and can be sent or recieved from the same PLMN or others.
5. MMS service: Multimedia messaging service whose short form is MMS ccan be descibed as the exchange of heavier messages such as a picture or music or document but not from an email. It is availabel for use from one PLMN to another.
Cheers.
Complete a prewritten C++ program for a carpenter who creates personalized house signs. The program is supposed to compute the price of any sign a customer orders, based on the following facts:
The charge for all signs is a minimum of $35.00.
The first five letters or numbers are included in the minimum charge; there is a $4 charge for each additional character.
If the sign is made of oak, add $20.00. No charge is added for pine.
Black or white characters are included in the minimum charge; there is an additional $15 charge for gold-leaf lettering.
Instructions:
Ensure the file named HouseSign.cppis open in the code editor. You need to declare variables for the following, and initialize them where specified:
A variable for the cost of the sign initialized to 0.00 (charge).
A variable for the number of characters initialized to 8 (numChars).
A variable for the color of the characters initialized to "gold" (color).
A variable for the wood type initialized to "oak" (woodType).
Write the rest of the program using assignment statements and ifstatements as appropriate. The output statements are written for you.
Answer:
#include <iostream>
#include <string>
using namespace std;
int main()
{
double charge = 0.00;
int numChars = 8;
string color = "gold";
string woodType = "oak";
if(numChars > 5){
charge += (numChars - 5) * 4;
}
if(woodType == "oak"){
charge += 20;
}
if(color == "gold"){
charge += 15;
}
charge += 35;
cout << "The charge is: $" << charge << endl;
return 0;
}
Explanation:
Include the string library
Initialize the variables as specified
Check if the number of characters is greater than 5 or not. If it is, add 4 to the charge for each character that is greater than 5
Check if the sign is made of oak or not. If it is, add 20 to the charge
Check if the color is gold or not. If it is, add 35 to the charge
Add the minimum cost to the charge
Print the charge
In this exercise we have to use the knowledge of the C++ language to write the code, so we have to:
The code is in the attached photo.
So to make it easier the code can be found at:
#include <iostream>
#include <string>
using namespace std;
int main()
{
double charge = 0.00;
int numChars = 8;
string color = "gold";
string woodType = "oak";
if(numChars > 5){
charge += (numChars - 5) * 4;
}
if(woodType == "oak"){
charge += 20;
}
if(color == "gold"){
charge += 15;
}
charge += 35;
cout << "The charge is: $" << charge << endl;
return 0;
}
See more about C++ at brainly.com/question/26104476
11.19 (Constructor Failure) Write a program that shows a constructor passing information about constructor failure to an exception handler. Define class SomeClass, which throws an Exception in the constructor. Your program should try to create an object of type SomeClass and catch the exception that’s thrown from the constructor
Answer:
You absolutely should throw an exception from a constructor if you're unable to create a valid object. This allows you to provide proper invariants in your class. ... Throw an exception if you're unable to initialize the object in the constructor, one example are illegal arguments.
Explanation:
Error codes cannot be used in constructors since they lack a return type. Therefore, throwing an exception is the most effective technique to indicate constructor failure. Here is a workaround if you don't have or are unwilling to use exceptions.
What constructor passing information, constructor failure?When an exception is thrown in a constructor, memory for the actual object has already been set aside before the constructor is even invoked. Therefore, after the exception is thrown, the compiler will immediately deallocate the memory the object was using.
There are two solutions to that: Simple and conventional approach: Use arrows. To make use of a two-stage construction, use a custom “construct” function after a default constructor that cannot throw exceptions.
Therefore, The constructor has the ability to “zombie” an object if it fails.
Learn more about Constructors here:
https://brainly.com/question/18914381
#SPJ5
Give an example of a function from N to N that is: Hint: try using absolute value, floor, or ceiling for part (b). (a) one-to-one but not onto (b) onto but not one-to-one (c) neither one-to-one nor onto
Answer:
Let f be a function
a) f(n) = n²
b) f(n) = n/2
c) f(n) = 0
Explanation:
a) f(n) = n²
This function is one-to-one function because the square of two different or distinct natural numbers cannot be equal.
Let a and b are two elements both belong to N i.e. a ∈ N and b ∈ N. Then:
f(a) = f(b) ⇒ a² = b² ⇒ a = b
The function f(n)= n² is not an onto function because not every natural number is a square of a natural number. This means that there is no other natural number that can be squared to result in that natural number. For example 2 is a natural numbers but not a perfect square and also 24 is a natural number but not a perfect square.
b) f(n) = n/2
The above function example is an onto function because every natural number, let’s say n is a natural number that belongs to N, is the image of 2n. For example:
f(2n) = [2n/2] = n
The above function is not one-to-one function because there are certain different natural numbers that have the same value or image. For example:
When the value of n=1, then
n/2 = [1/2] = [0.5] = 1
When the value of n=2 then
n/2 = [2/2] = [1] = 1
c) f(n) = 0
The above function is neither one-to-one nor onto. In order to depict that a function is not one-to-one there should be two elements in N having same image and the above example is not one to one because every integer has the same image. The above function example is also not an onto function because every positive integer is not an image of any natural number.
What is
relation degree.
Answer:
Explanation:
The degree of relationship can be defined as the number of occurrences in one entity that is associated with the number of occurrences in another entity. There is the three degree of relationship: One-to-one (1:1) One-to-many (1:M)
DEF is a small consulting firm with ten on-site employees and 10 to 12 part-time (off-site) software consultants. Currently, the network consists of 2 servers for internal business processes, 1 server that handles the call-in connections; 10 on-site wireless workstations/devices, and 2 printers. Respond to the following in a minimum of 175 words: Identify one network security strategy that would help this organization. Why did you choose this strategy over others
Answer:
What i would suggest for the organization is to use the Testing Infrastructure strategy. it is good for your consulting firm because it is less costly and provide security.
Explanation:
Solution
There are different network security strategy which is listed below:
Segment the network:
Segmentation in network is very useful for providing security.If any threat is occur only one segment is effected remaining are safe and it is less cost process. very useful for small organizations.
Test your infrastructure :
Testing infrastructure also very good technique.
Always we have to test our infrastructure whether threat is occur or not.
If any threat is happen we can detect that easily by testing our infrastructure.
Regularly update anti-virus software :
This is very useful for small organizations and it is less cost.with less cost we can provide security for all devices like computer,server,modems etc.
Frequently backup your critical data :
This is very good technique for crucial data.If we backup important data any time that will be useful if any attack is happen.
This is less costs and simple.
Change router default security settings :
Changing router password and settings also helpful for providing security.If we maintain same password and same settings for a long time that may lead to data hacking.It is cost less process very useful for small organizations.
If i wanted to change my phones simcard, does anything need transferring, or is it an easy swap?
Given positive integer numInsects, write a while loop that prints that number doubled without reaching 100. Follow each number with a space. After the loop, print a newline. Ex: If numInsects = 8, print:
8 16 32 64
#include
using namespace std;
int main() {
int numInsects = 0;
numInsects = 8; // Must be >= 1
while (numInsects < 100) {
numInsects = numInsects * 2;
cout << numInsects << " ";
}
cout << endl;
return 0;
}
So my question is what am I doing wrong?
Answer:
The cout<<numInsects<<""; statement should be placed before numInsects = numInsects * 2; in the while loop.
Explanation:
Your program gives the following output:
16 32 64 128
However it should give the following output:
8 16 32 64
Lets see while loop to check what you did wrong in your program:
The while loop checks if numInsects is less than 100. It is true as numInsects =8 which is less than 100.
So the body of while loop executes. numInsects = numInsects * 2; statement in the body multiplies the value of numInsects i.e 8 with 2 and then cout << numInsects << " "; prints the value of numInsects AFTER the multiplication with 2 is performed. So 8 is not printed in output but instead 16 (the result of 8*2=16) is printed as the result of first iteration.
So lets change the while loop as follows:
while (numInsects < 100) {
cout << numInsects << " ";
numInsects = numInsects * 2;
Now lets see how it works.
The while loop checks if numInsects is less than 100. It is true as numInsects =8 which is less than 100
So the body of while loop executes. cout << numInsects << " "; first prints the value of numInsects i.e. 8. Next numInsects = numInsects * 2; multiplies the value of numInsects i.e 8 with 2. So first 8 is printed on the output screen. Then the multiplication i.e. 8*2=16 is performed as the result of first iteration. So now value of numInsects becomes 16.
Next the while loop condition numInsects < 100 is again checked. It is true again as 16<100. Now cout << numInsects << " "; is executed which prints 16. After this, the multiplication is again performed and new value of numInsects becomes 32 at second iteration. This is how while loops continues to execute.
So this while loop stops when the value of numInsects exceeds 100.
A security analyst is interested in setting up an IDS to monitor the company network. The analyst has been told there can be no network downtime to implement the solution, but the IDS must capyure all of the network traffic. Which of the following should be used for the IDS implementation?
a. Network tap
b. Honeypot
c. Aggregation
d. Port mirror
Answer:
d. Port mirror
Explanation:
Port mirroring is a method to monitor network traffic and it is used in the Intrusion Detection Systems. It is also called Switched Port Analyzer and is used to analyse the network errors. This technique basically copies the network packets and sends or transmits these copied packed from one port to another in a network device such as a switch. This means that this technique is used to copy the network packets from one switch port and send the copy of these packets to another port where these packets are monitored. This is how it analyses the network errors and incoming traffic for irregular behavior and also this can be done without affecting the normal operation of the switch and other network processes. It is simple, inexpensive and easy to establish and use. The most important advantage of using mirrored ports is that it catches the traffic on several ports at once or can capture all of the network traffic.
if you want to exclude a portion of an image which option should be chosen?? A. Arrange B. Position C. Crop D. Delete