What is the minimum time needed to distribute this file from the central server to the 10 peers using the client-server model?

Answers

Answer 1

Answer:

The answer is "[tex]0.143 \times 10^3 \ s[/tex]"

Explanation:

Please find the complete question in the attachment.

The size of the file[tex]= F = 2 \ Gbits = 2 \times 10^9 \ bits[/tex]

8 file copies have had to be uploaded from Server. So uploading size of to all

Rate of Server upload [tex]= u = 83 Mbps = 83 \times 10^6 \ bps[/tex]

therefore, the minimum time for the server to upload the file:

[tex]= 8 \frac{F}{u} \\\\= \frac{(8 \times 2 \times 10^9)}{(83 \times 10^6)} \ s \\\\= 0.193 \times 10^3 \ s[/tex]

Receive rate of the slower server:

[tex]=dmin \\\\= min\{d_1,d_2,d_3,d_4,d_5,d_6,d_7,d_8\} \\\\= 14\ Mbps \\\\= 14\times 10^6\ bps[/tex]

The minimum time necessary to get the file:

[tex]= \frac{F}{dmin}\\\\ = \frac{(2 \times 10^9)}{(14 \times 10^6)}\ s \\\\= 0.143 \times 10^3 \ s[/tex]

What Is The Minimum Time Needed To Distribute This File From The Central Server To The 10 Peers Using

Related Questions

Match each method of communication with its intended purpose.
a late-breaking news story
a poetry reading
an advertisement
a small group assignment

Answers

Answer:

1. a late breaking news story = to inform

2. a poetry reading = to entertain

3. an advertisement = to persuade

4. a small group assignment = to collaborate

Explanation:

1. A "breaking news" tells people of what is happening in the society. It informs them of the occurrence of an important event such as the plane crash of Kobe Bryant.

2. Poetry reading is meant to touch the attention of listeners. It tries to entertain them through the poem's interesting verses.

3. An advertisement is being shown/displayed in order to convince people to buy a particular product or service.

4. A group assignment allows the members of the group to contribute their ideas together. Such situation is known as "collaboration." They try to brainstorm together towards a common goal.

Select the correct text in the passage. Idenufy the phrase that shows the use of a non-contact-type temperature sensor. Jim works in an iron and steel industry. He is allowed to enter only on successful biometric verification by sensors at the gate. Working in close proximity to molten metals is risky. To enable accurate and safe measurement, sensors determine the melting point of the metals and display them to Jim. In the evening, Jim goes to a friend's place in his new GPS-powered car. He listens to music on the radio while driving.​

Answers

Answer:

where he is allowed only to enter on successful biometric verification by sensor at the gate,,it shows to some extent there is no contact,,,the molten we are told is risky so there should be no close contact with it,,

Suppose an IP packet is fragmented into 10 fragments, each with a 1% (independent) probability of loss. To a reasonable approximation, this means there is a 10% chance of losing the whole packet due to loss of a fragment. What is the probability of net loss of the whole packet if the packet is transmitted twice?

a. assuming all fragments received must have been part of the same transmission?
b. assuming any given fragment may have been part of either transmission?
c. explain how use of the IDENT field might be applicable here.

Answers

Answer:

a. 0.01

b. 0.001

c. The identification field of the packet fragment can be used to uniquely identify and collate the fragments lost in transmission.

Explanation:

The probability of losing a packet is 10% or 0.1, so the probability of losing the packet twice during transmission;

= 0.1 x 0.1 = 0.01

When any fragments have been part of the transmission, the probability of the packet is dependent on the fragments;

= 0.01 x 0.1 = 0.001

The identification field is a unique 16-bit value assigned to an IPv4 packet, when a packet is fragmented for transmission, its field is used to collate the unique fragments in the packet.

Alexi is writing a program which prompts users to enter their race times without decimals. Which function should she use? (5 points)
float()
int()
print()
spring()
PLZZ HELP THIS IS A BIG PART OF MY GRADE!

Answers

Answer:

int()

Explanation:

bc int removes decimal

Which is an example of an input device?

a
Headset

b
Keyboard

c
Monitor

d
Printer

Answers

Answer:

b, a keyboard. Sometimes a, if it contains a microphone.

B...................keyboard

This semester we have discussed the acronym S.O.L.I.D as it applies to Object Oriented Design and Programming.
The D stands for Dependency Inversion. Briefly explain the meaning of this letter/phrase.

Answers

Answer:

The Dependency Inversion principle is a basic principle of Object Oriented Programming and Part of SOLID principles. It states that: Entities must depend on abstractions, not on concretions. It states that the high-level module must not depend on the low-level module, but they should depend on abstractions

Explanation:

High-level modules, which provide complex logic, should be easily reusable and unaffected by changes in low-level modules, which provide utility features. To achieve that, you need to introduce an abstraction that decouples the high-level and low-level modules from each other.

Basically Dependency introduced interface abstraction between high level and low level modules which terminates their dependency on each other instead now they depend both on abstraction. This principle enables you to change higher-level and lower-level components without affecting any other classes, as long as you don’t change any interface abstractions.

How has your perspective changed since the beginning of the class?

Answers

Answer:

I guess.

Explanation:

Perspective can change throughout the duration of a class as a result of various factors, such as new knowledge gained, exposure to different ideas and viewpoints, and personal growth.

Perspectives refer to the ways in which individuals perceive, interpret, and understand the world around them. They are shaped by a combination of personal experiences, beliefs, values, knowledge, cultural backgrounds, and social contexts.

Perspectives influence how people make sense of information, form opinions, and engage with others and the world. They are subjective in nature. They reflect an individual's unique point of view and can vary significantly from person to person. Different individuals may interpret the same event or situation differently based on their own perspectives.

Learn more about perspective, here:

https://brainly.com/question/11012390

#SPJ2

100+20000000 please give answer and win iPhone 11 pro​

Answers

Answer:

20000100

Explanation:

What do we call stores in a physical world?


non-virtual stores

location stores

brick-and-mortar stores

physical stores

Answers

Answer:

brick and mortar stores i believe

Data ____ refers to the accuracy of the data in a database

Answers

Accuracy or quality?

Describe how threat modeling helps development teams build best practices and how it takes preventative measures against attacks?

Answers

Answer:

Answered below

Explanation:

Threat modelling is the process of enhancing network security by seeking out possible threats, breaches and vulnerabilities of the network system. This helps the development team take proactive measures in preventing such breaches.

Threat modelling also helps the development team decide where to focus their resources the most, in making sure of a secured network system. It is a dynamic process whereby software and networks are updated, added and removed.

What is the output?
def divide(numA, numB):
return numA / numb
answer = divide(21,3)
print (answer)
There are no errors but there will be no output.
An error occurs.
7.0
21,3

Answers

The device with gives us meaning and result it’s called output

The output for the given code will be 7.0. The correct option is C.

What is coding?

Coding, also known as computer programming, is the method by which we communicate with computers. Code tells a computer what to do, and writing code is similar to writing a set of instructions.

You can tell computers what to do or how to behave much more quickly if you learn to write code.

Programming is widely regarded as one of the most difficult disciplines to master. Given how different it is from traditional forms of education, such as college degrees in computer science, it's easy to see why some people struggle to learn how to code.

Here, it is printing the answer of 21 divided by 3, which means, the answer 7 will get printed on the screen.

Thus, the correct option is C.

For more details regarding coding, visit:

https://brainly.com/question/17204194

#SPJ2

If a member function promises not to change the object to which it is applied, that function should be marked as:______
a. abstract
b. const
c. friend
d. static
e. none of the above

Answers

Answer:

The correct answer is b)const

Explanation:

a. abstract : Abstract function does not guarantees to not change the object to which it is applied

b. const : A const member function is a member function that guarantees it will not modify the object and it can not call any non-const member functions that may change the object. So no chance to change object through const functions.

c. friend :  Friend function is a function that is given the same access as methods to private and protected data and it can change the object.

d. static : Static function can be called without object reference but they can also be called called through object reference using "this" pointer keyword which may modify object data.

e. none of the above:  Const function can not change the object so none of above is incorrect option.

UML gives two ways to show nesting. The first is very ______, as it shows modeling elements physically contained in the package. An alternative nesting _____ is useful when there is a lot of nesting, or complex nesting, that might be confusing to show with embedding. a. graphic, textualb. textual, syntaxc. textual, verbaged. graphic, syntax

Answers

Answer:

d. graphic, syntax

Explanation:

UML (Unified Modeling Language) is a software design standard used to visually describe or represent an object-oriented program. UML helps to organize, plan, and visualize a program as it provides visual documentations in the form of UML diagrams.  UML diagrams divide a software system into components and subcomponents.  In addition to being a universal design standard, it is also widely used and accepted as the language for outlining programs.

Which is the correct code to declare a catch-all handler?
a. catch (AllException excpt) {…}
b. catch (Exception excpt) {…}
c. catch (Throw excpt) {…}
d. catch (Throwable excpt) {…}

Answers

Answer:

A

Explanation:

Hopefully this helps

In which document view type is it impossible to edit the document in Word 2019?
Read Mode
View Mode
Print Mode
Drift Layout

Answers

Answer:

Read Mode

Explanation:

Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users type, format and save text-based documents.

In Microsoft Word 2019, the users are availed with the ability to edit the word document in the following view type;

I. View Mode

II. Print Mode

III. Drift Layout

Hence, the document view type in which it is impossible to edit the document in Word 2019 is the Read Mode. Basically, the Read Mode is a view type that only allows the user to read the word document.

factors to consider when selecting an operating system to install in a computer ​

Answers

Answer:

what do you want your computer to do, how do you want your computer to look, how fast do you want your computer to run, etc

Consider the following skeletal and JavaScript-like program: function main() { var a, b, w, d; function sub1() { var a, c, w, v; function sub2() { var a, d; } ... } function sub3() { var x, w, v, d; .... } } 4.1. (4 points) List all the variables, along with the program units (sub1, sub2, sub3, or main) where they are declared, that are visible in the body of sub3, assuming that static scoping is used. 4.2. (4 points) List all the variables, along with the program units (sub1, sub2, sub3, or main) where they are declared, that are visible in the body of sub2, assuming that static scoping is used.

Answers

Answer:

A. Sub3 local variables are; x, w, v and d while the visible variables from the main variables; a and b.

B. Sub2 local variables are; a and d while the visible variables from the main and sub1 are; c, b, w and v

Explanation:

The variable name defined with the 'var' in the main is on a global scope to other functions defined in it. But when the same name of the variable is defined in the inner functions, its variable name is overridden with the newly defined variable.

Which are reasons that resource materials are important? Select all that apply.

O They can help you find fast, reliable answers to your questions.

O They are available to you whenever you need them.

O They can be outdated.

O They will save you time in the long run when they come from reliable sources.

Answers

Answer:

Its A B D

Explanation:

Full credit to the person above me, the answer is correct.

I need help picture above

Answers

Answer:

bank transfer or credit card

Explanation:

Bank or credit card because if your shopping online you can’t use cash

When you hear music, read a printout, or view a video, you are using a computer's

Answers

Answer:

Output device.

Explanation:

An output device can be defined as a hardware device that typically receives processed data from the central processing unit (CPU) and converts these data into information that can be used by the end user of a computer system.

All of the output device of a computer are known as peripheral devices and they provide data (informations) to the end users in various formats such as video, audio, texts, images etc.

Since output devices are peripheral devices, they can be connected to the computer system wirelessly or through a wired-connection (cable).

Some examples of output devices are monitor, speakers, printer, projector etc.

Hence, when you hear music, read a printout, or view a video, you are using a computer's output device.

What is wrong with my code? (python)


When entering a input 8 characters long without a "!", the code still accepts it

Answers

Answer:

You can fix this in multiple ways.

1) Use single quotation marks instead of double, this will do the same thing.

'Enter a password with at least 8 characters and a "!" : '

What happened was "" tells the interpreter when a string begins and ends. It looks for those connecting quotation marks.

2) You can use \" to tell the interpreter that this is not the end of a string.

"Enter a password with at least 8 characters and a \"!\" : '

3) Use multiple double quotation marks (can also be used for multi-line strings).

"""Enter a password with at least 8 characters and a "!" : """

Answer:

password = input("Enter a password with at least 8 characters and a \"!\": ")

if ("!" not in (password) or (len(password) < 8)):

   print("Your password does not meet the requirements.")

Explanation:

You might notice this is a bit different from your code. Firstly, I added escape characters around the ! and changed it from "!" to \"!\" This is because a backslash "\" is considered an escape character. I'm going to explain this as best I can but I'm not the best at explaining things so bare with me. You see how the ! is white text in your code? That's because your compiler is going to read the code like follows. The phrase "Enter a password with at least 8 characters and a " is going to be seen as a string, then, the ! is going to be read as a function call or some sort of variable, and it will probably error out because it doesn't know what the fk you want to do with it. This can be solved by using escape characters. An escape character tells the compiler, 'hey, I'm going to put a special character here to represent some data, don't stop reading this phrase as a string just yet'. That being said, if you change it to \"!\", then the ! color will turn green, because the compiler is reading it properly (as a string). Also, I change your if statement logic. What you saying to the compiler is " if there is NOT a ! in password AND the password is less than 8 chars long, then its a bad password ". This means that if the password is 9 characters long, and DOESNT have a !, it will still pass. Because you're checking to make sure it fails both before you say "hey this is a bad password". This is a simple fix, you just change it the "and" to "or". And then it will read: "Hey, if their password doesn't have a ! in it OR is less than 8 chars, it's not a good password." Sorry for the wall of text, hopefully it helped you learn something though. :)

What do you think about the difference and similarities between the process of information security system implementation verse an information system implementation?

Answers

Answer:

My take on the difference and similarities between the process of information security system implementation and an information system implementation is:

A strong information security program is a fundamental part of maintaining a business in the computerized age when the quantity of information breaks and security occurrences are expanding dramatically. Without a security program, you leave your organization, clients, and information in danger. We should investigate the segments of a data security program, and stroll through a bit by bit direct on how you can execute one at your association.

Explanation:

The fundamental objective inside an association while executing an information system is to expand productivity in association action by methods for IT.

For instance: programmed data handling, satisfactory data and report the executives

Discuss which employees and organizations have a deeper level of information assurance (IA) policy compliance.

Answers

Incomplete question. However, I inferred you want to understand what information assurance (IA) policy is.

Explanation:

Put simply, the term Information assurance refers to policies put in place to reduce any risk associated with the use and transfer of information.

In other words, the information assurance (IA) policy of an organization refers to policies drafted by the organization to protect the confidentiality or availability of the organization's internally generated information including that of their users. It is, therefore, also an information risk management policy.

Josh recorded a podcast for his Civics class project. Which file type will allow him to save his file?

a
DOC

b
GIF

c
MP3

d
ZIP

Answers

Answer:

C) MP3

Explanation:

hope it helps...

Answer:

mp3

Explanation:

i did the test

Binary numbers are based on __________.

a
letters (a and b)

b
16 digits

c
10 digits

d
two digits (1s and 0s)

Answers

D. Two digits (1s and 0s

Answer: 0 and 1s.

Explanation:

Consider the following code:
start = int(input("Enter the starting number: "))
stop = int(input("Enter the ending number: "))
x = -10
sum = 0
for i in range (start, stop, x):
sum = sum + i
print(sum)
What is output if the user enters 78 then 45?

Please help me !

Answers

Answer:

The output is 252

Explanation:

To get the output, I'll analyze the lines of code one after the other.

Here, user enters 78. So, start = 78

start = int(input("Enter the starting number: "))

Here, user enters 45. So, stop = 45

stop = int(input("Enter the ending number: "))

This initializes x to -10

x = -10

This initializes sum to 0

sum = 0

This iterates from 78 to 46 (i.e. 45 + 1) with a decrement of -10 in each successive term

for i in range (start, stop, x):

This adds the terms of the range

     sum = sum + i

This prints the calculated sum

print(sum)

The range starts from 78 and ends at 46 (i.e. 45 + 1) with a decrement of -10.

So, the terms are: 78, 68, 58 and 48

And Sum is calculated as:

[tex]Sum = 78 + 68 + 58 +48[/tex]

[tex]Sum = 252[/tex]

Hence, 252 will be printed

Is this statement true or false? To change the color of text, you must select the entire text to be changed.

Answers

Answer:

true is the correct answer to your questions

You know the office network is a

Answers

Answer:

it is a..

Explanation:

office for networks?

where they control the network maybe

When should you create an outline?
OA. While you are creating your slides
OB. Before you create your first slide
O C. After you create your last slide
O D. After you have presented your slide presentation


Help need help now please!!!!!!!!

Answers

Answer:custom slide show

Explanation:

Other Questions
Darryl mixed 4 cups of white paint with 6 cups of red paint but didn't have enough to finish painting his wall how much would he need to add to 1 cup of white paint to match the color A truck weighs 14,000 pounds. How many tons is this? Plz help me thanks so muchhhhh Ben wants to buy some albino frogs for his aquarium. He has $20 to spend and the frogs cost $2.50 each. Write, solve, and interpret an inequality to find how many frogs he can afford. Giving brainless I need the answer ASAP Which of the following is NOT a responsibility of the U.S. President? A. Electoral College C. State of the Union B. Cabinet D. Military guided reading 6-5 roman decline Car Survey in a survey of 2100 people who owned a certain type of car 1260 said they would buy that type of car again.What percent of the people surveyed were satisfied with the car. Pls help with graphingg HELP PLSWhich graph represents the compound inequality?h5 and h Question 2 (1 point) 3:5 and 12:20 are equal ratios O True False A stack of 500 pieces of paper is 1.654 inches tall. Mulan guesses that each piece of paper is 0.045 inches thick. Explain how you know that Mulan's answer is not correct. What does this tell you about the actual thickness? One way in which the Bill of Rights secures fair, legal treatment for citizens is by protecting them fromO grand juries.O speedy trials.O bail.O double jeopardy. If you get this right I'll give you 35 more points I asked my friend............I came to know about the situation.a)sob)therefore Si tenemos la permutacin 8p3 A quin es igual n?Seleccione una:a. 8b. 3C. 6d. 5 How is phineas gage different than an adolescent child If anyone has written this essay on Amplify you know what im talking about please HEEEELLLLPPPP?!?!?!50 POINTS What is an equation of a line which passes through (6, 9) and is perpendicular to the line whose equation is 4x - 6y = 15 ? If the length of the hypotenuse is 10 m and its base leg is 6 m, what is the length ofits remaining leg?1. a = 12 m2.a = 8 m3.a = 9 m 4.a = 10 m what would play-do be considered to be