__________ is the carrying capacity and speed of telecommunication networks that determine how much information can be sent and how fast it can travel over the networks.

Answers

Answer 1

Answer:

bandwidth is the carrying capacity and speed of telecommunication networks that determine how much information can be sent and how fast it can travel over the networks.


Related Questions

using numerous computers to inundate and overwhelm the network from numerous launch points is called

Answers

Using numerous computers to inundate and overwhelm the network from numerous launch points is called: a DDos attack

WILL GIVE A BRAINLIEST!!! PLS HELP!!!






We're no strangers to love
You know the rules and so do I
A full commitment's what I'm thinking of
You wouldn't get this from any other guy
I just wanna tell you how I'm feeling
Gotta make you understand
Never gonna give you up
Never gonna let you down
Never gonna run around and desert you
Never gonna make you cry
Never gonna say goodbye
Never gonna tell a lie and hurt you

Answers

Answer:

Never gonna give you up

Never gonna let you down

Never gonna run around and desert you

Never gonna make you cry

Never gonna say goodbye

Never gonna tell a lie and hurt you

Never gonna give, never gonna give

(Give you up)

We've known each other for so long

Your heart's been aching but you're too shy to say it

Inside we both know what's been going on

We know the game and we're gonna play it

I just wanna tell you how I'm feeling

Gotta make you understand

Never gonna give you up

Never gonna let you down

Never gonna run around and desert you

Never gonna make you cry

Never gonna say goodbye

Never gonna tell a lie and hurt you

Never gonna give you up

Never gonna let you down

Never gonna run around and desert you

Never gonna make you cry

Never gonna say goodbye

Never gonna tell a lie and hurt you

Never gonna give you up

Never gonna let you down

Never gonna run around and desert you

Never gonna make you cry

Never gonna say goodbye

What are some ethical issues related to data mining? In other words, what are some ways that companies may gather or use data that are not appropriate?

Answers

Data mining is not an easy task, as the algorithms used can get very complex and data is not always available at one place. It needs to be integrated from various heterogeneous data sources. These factors also create some issues. Here in this tutorial, we will discuss the major issues regarding −
Mining Methodology and User Interaction
Performance Issues
Diverse Data Types Issues

how do you play pokemon go

Answers

Download the app and make an account hope this helps!

Answer:

download the app then tap your screen for the rest of your life

(And I'm being serious)

Raina remembered when she taught Amara to draw. What happened?

Answers

Sisters is an autobiographical graphic novel written by Raina Telgemeier as a follow-up to her earlier graphic memoir Smile. It details a long summer road trip taken from San Francisco to Colorado by her family and explores the relationship between Raina and her younger sister, Amara.

- BRAINLIEST answerer

Describe the type of gameplay seen during early video games (ex. Spacewar!, Pong).

Answers

Sandbox. ... Real-time strategy (RTS) ... Shooter (FPS and TPS) ... Multiplayer online battle arena (MOBA) ... Role-playing games (RPG, ARPG, and more) ... Simulation and sports.

- BRAINLIEST answerer

Lol yeah I agree w the person above, I don’t wanna copy

What contribution did ada byron make to computing?

Answers

Answer:

Around 1843, she described the first computer principles, later built by Charles Babbage in the form of a mechanical calculator.

Ada Byron was a writer and mathematician known for her work on Babbage's early mechanical general-purpose computer. She helped to write the first algorithm intended to be processed by a machine.

Anote los tipos de direcciones de IP que existen.​

Answers

Answer:

ENGLISH PLEASE.

Explanation:

In Linux, most applications and commands are in the ____ directory or its subdirectories bin and sbin.

Answers

On a Linux computer, most of the software applications are saved in the /usr directory or in its subdirectories named, bin and sbin.

A Linux can be defined as an open-source and community-developed operating system (OS) that is designed and developed for the following electronic devices:

Mainframes. Computers.Embedded systems.Mobile devices.

Generally, the Linux operating system (OS) is based on UNIX and it is typically released under the GNU general public license (GPL).

On a Linux computer, the commonly used directory for saving most software applications is the /usr directory or sometimes its subdirectories named, bin and sbin.

Read more: https://brainly.com/question/20629962

Electronic evidence on computer storage media that is not visible to the average user is called​ ________.

Answers

Answer:

Electronic evidence on computer storage media that is not visible to the average user is called​ ambient data.

Coordination in a global information system requires a _____ architecture for data, standardization within departments.

Answers

Coordination in a global information system requires a decentralized architecture for data, standardization within departments

The type value ____ for the input element may cause modern browsers to validate entries to ensure that they are valid web addresses.

Answers

Answer:

url

Explanation:

In the 1990s, DVDs replaced audiocassettes and floppy disks as the storage media of choice for music and computers. At which stage of the product life cycle is the DVD today

Answers

Answer:

Maturity

Explanation:

The USGS and National Weather Service have many sensors collecting data about natural events.

That data can be used to create a weather map.

Identify the parts of the Input-Process-Output model for each step.


(output, input, process): weather map displayed on a web page


(output, input, process): determination of color to be used on the map


(output, input, process): sensors collect temperature and precipitation data

Answers

Answer:

Explanation:

Throughout many regions on the chart, a standard plotting code demonstrates air currents speed and direction, average temperature and relative humidity, barometric pressure and its change over the previous hours, the number and variety of clouds, the weather type, including visibility restrictions, and the amount and type of precipitation.

USGS and National Weather Service

As per the question, the USGS  and National weather services are mapping out the region to collect the data for the natural events. The data is collected in the form of maps and is used for the identification of the input and the output model steps.

The answer is precipitation data, visibility data.

The NWS is a federal agency of the united stated that is tasked to prove the forecasts and for the formation of hazardous weather events and warns the public of the related events.

Learn more about the National Weather Service

brainly.com/question/17774978.

cual es la diferencia entre tala y poda

Answers

Answer:

talar es talar árboles

y podar podar sesped

PLEASE HELP! WILL MARK AS BRAINLIEST JavaScript can be implemented using the _________ HTML tags in a web page.​

Answers

Answer:

JavaScript can be implemented using JavaScript statements that are placed within the ...  HTML tag

Explanation:

Which invention provided instant communication and information to a massive audience for the first time? a. Intranet c. Video b. Television d. Internet Please select the best answer from the choices provided A B C D.

Answers

Answer:

B. television

Explanation:

Answer:bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb

Explanation:

SOMEONE WHO ACTUALLY KNOW HOW TO DO THIS PLEASE DO IT AND SEND A SCREENSHOT I REALLY NEED IT FOR MY EXAMS AND DONT TROLL ​

Answers

What computer do you own?

Give a brief explanation about the internet.plsssss

Answers

Answer:

The Internet is a vast network that connects computers all over the world. Through the Internet, people can share information and communicate from anywhere with an Internet connection.

Explanation:

INTERNET is a short form of Interconnected Network of all the Web Servers Worldwide. It is also called the World Wide Web or simply the Web.

________ is the art of manipulating people into breaking normal security procedures or divulging confidential information.

Answers

Answer:

Social engineering is a process of manipulating people into breaking normal security procedures or divulging confidential information.

Explanation:

A ______________ utility provides an overview of your files and lets you rename, delete, move, and copy files and folders.

Answers

Answer:

File Management Utility

Explanation:

File Management Utility is a computer software that help to browse, search, arrange, find information, and quickly preview the files of the system.

In one to two sentences, describe how you would create a border around a group of cells.

Answers

Answer:

Select the cells you want to format. Click the down arrow beside the Borders button in the Font group on the Home tab. A drop-down menu appears, with all the border options you can apply to the cell selection.

According to the C&M Technology Competitor View, while Accenture leads in Consulting and SI, which are our two major competitors in large deals?

Answers

Even though Accenture leads in Consulting and SI, its major competitors include McKinsey and Bain & Co. Inc.

Accenture is a multinational professional technology service company that provides digital, tactical, strategic, and consulting services for its clients.

Accenture was formerly known as Arthur Anderson LLP. It's regarded as one of the top accounting firms in the world. Some of its major competitors in large deals include McKinsey, Bain & Co. Inc., Boston Consulting Group, Inc.

Read related link on:

https://brainly.com/question/25740331

PLEASE HELP!!! DECENT AMMOUNT OF POINTS!! DRIVERS ED


An automatic transmission is a mechanism that

A. automatically turns on your car

B. automatically turns off your car

C. selects the best gear for the situation

D. Connect your radio to air signals

Answers

Answer:

c. Selects the best gear for the situation.

Explanation:

If you want to excel in the field of web design, what must you be able to make and keep?
price estimates
statement of work
final deadlines
promises

Answers

Answer:

You  need to beable to make final deadlines because maybe if your adding divs or maybe something takes a bit long for you to do you need to give the person your working for an idea of what and why you may take long to get your website polished.

Explanation:

Answer:

B. final deadlines

Explanation:

edg 2021 (got 100%)

A(n) ________ is a wonder of miniaturization combining a CPU, GPU, and sundry other support logic onto a single silicon die, saving a lot of space and power in the process.

Answers

Answer:

system on a chip (SoC)

Explanation:

Memory of your familiar old e-mail password may block the recall of your new password. This illustrates

Answers

Answer:

Retroactive Interference

Explanation:

Memory of your familiar old e-mail password may block the recall of your new password, This illustrates a phenomenon known as proactive interference.

Proactive interference occurs when previously learned information interferes with the recall or retrieval of new information.

The memory of the familiar old e-mail password is interfering with the recall of the new password.

The interference happens because the old password is already deeply ingrained in the individual's memory, and when trying to recall the new password, the old password comes to mind automatically and hinders the retrieval of the correct information.

This interference can lead to forgetting or temporarily blocking the recall of the new password.

To learn more on Proactive interference click:

https://brainly.com/question/30320488

#SPJ6

List down 5 elements of Multimedia

Answers

Answer:

text, image, audio, video, animation

Answer : The five elements of Multimedia are text, images, audio, video and animation.

Hope This Helps You.

why is it necessary to have a w-2 or 1099 form when using tax preparation software?

Answers

The reason why it is necessary to have a w-2 or 1099 form when using tax preparation software is to:

Allow the software engineer to report his income

According to the given question, we are asked to show the reason why it is necessary to have a W-2 or 1099 form when a software engineer is preparing software.

As a result of this, we can see that these two forms are both used by the Internal Revenue Service so that individuals such as the software engineer can report their income and make their tax payments.

Read more here:

https://brainly.com/question/24749083

What is the smallest unit of data in a computer? *
a) byte
b) terabyte
c) bit
d) bistable device

Answers

the smallest unit of data in a computer is bit

Other Questions
Make x the subject of the formula x + t = q Which of the following providedforeign support for the Patriotsafter the Battle of Saratoga?A. Poland, Prussia, and SpainB. Korea, Britain, and SpainC. China, Russia, and Japan While making breakfast, Marisela accidentally breaks her last bowl. To solve this problem, she goes to the store to buy a new bowl instead of realizing she could have used the paper already in her apartment to make a temporary origami bowl. In this instance, Marisela exhibited ________ because paper is not often used to make bowls. factor by grouping x^3 4x ^2 + 6x 24 how do I become good at fortine A___________ resource is one that can be easily replaced. For example, sunlight Find the 6th term of the geometric sequence whose common ratio is1/3and whose first term is 5. What angle is congruent to C? 7(x+7)56 plz help im bad at math Compare and contrast instantaneous and average speed. how many core electrons are there in a sodium atom? Ansewrs ???????????????? The nurse is educating a new parent regarding nutritional needs for the newborn. Which statement is accurate and should be taught regarding the nutritional needs of a newborn I will mark brainlist please helpStory : A Dogs Tale by Mark Twain4. Read this sentence from the selection.Whenever she heard a large word she said it over to herself many times, and so was able to keep it until there was a dogmatic gathering in the neighborhood.In this sentence the word dogmatic is used as an insightful simile a descriptive metaphor a humorous play on words an illuminating allusion5. In the last paragraph the narrator says his mother would fetch out a long word. The connotations of the word fetch remind the reader that the narrators mother is well educated is a dog knows lots of big words likes to show off8. What is ironic about the authors mother showing off with her knowledge of the word unintellectual? Her child knew she didnt understand the word correctly. The strangers all already knew the meaning of the word. As any intellectual would know, the word should be nonintellectual. She did not know any synonyms for the word.9. Which type of person is most like the authors mother? A high-performing student with an excellent memory for words A very verbal person who always has a quick answer that sounds good A dishonest person who tells lies on a regular basis A person who likes dogs a lot and works at a veterinary clinic The temperature was -16 degrees at noon. By 2:00 PM it dropped to 10 Degrees. What was the temperature at 2:00 Pm A business valued at $96 000 is purchased for a down payment of 25% and payments of $4000 at the end of every three months. If interest is 9% compounded monthly,what is the size of the final payment?Write your answer as 2,569.43. Mt. Pleasant School was on one hill, Hillside was across A long, green field of cool, fresh grass, perfect for lacrosse. When winter storms embraced the land, these rivals claimed the snow. The feud between them grew as fierce as a lion, the snow they would forgo. Tired of the quarrel, Tucker, Billy, and Joanne Met with their Hillside enemies to formulate a plan. An epic snowball battle would decide the war for land. The conquerors would claim it; the defeated would be banned. At last it was the evening of the legendary fight. Mt. Pleasant versus Hillside schoolswho would win that night? Tucker, Billy, and Joanne met in the field at six To create a strong snow fort made from icy bricks. Hillside functioned as a team to build a mighty wall. It grew so tall and powerful that it amazed them all. Mt. Pleasant students were concernedtheir fort had many cracks, So secret windows were prepared for surprise attacks. Both teams had made their forts. Small snowballs were prepared. Both teams huddled in their forts, terrified and scared. Both teams waited for their foes and peeked above snow doors. Both teams threw their snowballs. Both teams dodged the lobs of war. Suddenly, Joanne dashed out, racing through the fray Toward some snowballs piled highbut foes kept her at bay. Next, Joanne hurled snowballs through secret window gaps. Snow flew both waysJoanne had snow in her face and lap. Leaders slipped, great walls collapsed, and snowballs fell from heights, Until supplies ran out and all could see the starry sky. For minutes long, two foes had played together on the field. A truce was called, new friends shook hands, and the rift was healed. How many stanzas are in the poem? What are the Differences between Universal Citizenship and Global Citizenship Do you think family and friends are similar in the way they influence a persons opinions? Why or why not? a Which of the following is NOT a Congressional power?