1.Explain what service is offered over an ISDN BRI circuit to the residential telephone subscriber.2.How many voice channels are available on one ISDN BRI circuit?3.Can an ISDN line carry data information along with voice information simultaneously? If yes at what bit per second rate is available for the data transmission?4.When commercial power is lost at the resident’s home the ISDN line continues to function.​ A. True B. False

Answers

Answer 1

Answer:

Following are the solution to the given points:

Explanation:

For point 1:

Integrated Communications Networks is a technology used to transmit digital signals using telephone lines cables over a local loop.

Due to its larger capacity, it's far faster than just a 's got. ISDN Basic Rate Service (BRI) offers a total bandwidth of 144 kpbs, which would be based on two B channels and a 16 Kbps D channel. As private and small company customers, however, it is adequate.

The BRI is split into two categories: a) in-house cable from the ISDN end to the NT (S/T reference or S-bus) and b) broadcast from the NT to a headquarter (U reference point).

It enables a full-duplex operating point.

This BRI section's maximum length is between 4 to 8 km.

You pay for the speed you utilize using an ask service. In all other words, the price cost of how long you remain connected was evaluated. One can also buy flat-rate usage plans because you can with the phone service.

Given the fact ISDN uses an existing Cat 3 cable, re-connection to a service is not necessary.

In regions in which no additional high-speed access to the internet is available, ISDN can be available.

For point 2:

In the BRI configuration, 2 Data (bearer) lines with 64 kbit/s are available. With voice and user information the B-channels have been used.

For point 3:

Yes, It offers concurrent voice & data communications with improved signaling capacity at 64 kb/s.

For point 4:

It is true.


Related Questions

Write a program to input the TotalCost and display the Assured gift as per the following criteria TotalCost(TC) Assured Gift Less than or up to 2000 Wall Clock 32001 to 5000 School Bag 5001 to 10,000 Electric Iron More than 10,000 Wrist Watch​

Answers

Answer:

The program in Python is as follows:

TotalCost = int(input("Total cost: "))

if TotalCost <= 2000:

   print("Wall Clock")

elif TotalCost >= 2001 and TotalCost <= 5000:

   print("School Bag")

elif TotalCost >= 5001 and TotalCost <= 10000:

   print("Electric Iron")

else:

   print("Wrist Watch")

Explanation:

This gets input for total cost

TotalCost = int(input("Total cost: "))

If the total cost is up to 2000, print wall clock as the assured gift

if TotalCost <= 2000:

   print("Wall Clock")

If the total cost is between 2001 and 5000 (inclusive), print school bag as the assured gift

elif TotalCost >= 2001 and TotalCost <= 5000:

   print("School Bag")

If the total cost is between 5001 and 10000 (inclusive), print electric iron as the assured gift

elif TotalCost >= 5001 and TotalCost <= 10000:

   print("Electric Iron")

If the total cost is more than 10000, print wrist watch as the assured gift

else:

   print("Wrist Watch")

Software that tries to monitor and track the way you use your computer.​

Answers

Explanation:

that's called a virus, and it can do much harm to your softwares

From a dictionary, the literal meaning of virus is "a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data." Therfore, the answer is clearly virus.

Hope this helps! Have a great day!

what is computer virus?​

Answers

Answer:

A computer virus is a program that can copy itself and infect a computer without the permission or knowledge of the user.

Answer:

A computer virus is a software program that can generate multiple copies of itself. Computer viruses are categorized by their infection targets.They are of the following types :-

boot sector virusesfile viruses

What is spam? a type of virus that spreads from computer to computer through a network connection a type of virus that targets programs and files, and duplicates itself like a biological virus the process of using email to trick a user to share personal information an unwanted e-mail sent in bulk from people or organizations

Answers

Answer:

This is a pretty obvious answer.

An unwanted e-mail sent in bulk from people or organizations.

Explanation:

Similarities between in line css and internal css

Answers

Answer:

inline css is used to style a specific html element. for this css style, you'll only need to add the style attribute to each html tag, without using selectors. this css type is not really recommended, as each html tag needs to be styled individually. managing your website may become too hard if you only use inline css.

Explanation:

queens

Don's company has contracted with a service provider to receive a computing platform for all employees, complete with an operating system, database services, and a Web server. Don develops applications using tools delivered by the service provider. What type of service has Don's company signed up for?

Answers

Answer:

Platform as a Service (PaaS).

Explanation:

Cloud computing can be defined as a form of data computing which requires the use of shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Basically, cloud computing comprises three (3) service models and these include;

1. Platform as a Service (PaaS).

2. Software as a Service (SaaS).

3. Infrastructure as a Service (IaaS).

Platform as a Service (PaaS) refers to a type of cloud computing model in which a service provider makes available a platform that allow users (software developers) to build code (develop), run, store information in a database and manage applications over the internet.

The main purpose of a Platform as a Service (PaaS) is to provide an enabling environment for software developers to code without having to build and maintain complex infrastructure needed for the development, storage and launching of their software applications.

Simply stated, PaaS makes provision for all of the software and hardware tools required for all the stages associated with application development over the internet (web browser).

Hence, the advantage of the Platform as a Service (PaaS) is that, it avails software developers with enough convenience as well as simplicity, service availability, ease of licensing and reduced costs for the development of software applications.

These are the different types of Platform as a Service;

1. Private PaaS.

2. Public PaaS.

3. Open PaaS.

4. Mobile PaaS.

5. Communications PaaS.

6. Hybrid PaaS.

In this scenario, the type of service Don's company signed up for is called Platform as a Service (PaaS).

Câu 1: Đất trồng là môi trường?

A. Cung cấp chất dinh dưỡng, ôxy

B. Giúp cây đứng vững

C. Cung cấp chất dinh dưỡng, ôxy, nước

D. Câu B và C

Answers

Answer:

D

Explanation:

array Write a recursive function stringReverse that takes a string and a starting subscript as arguments, prints the string backward and returns nothing. The function should stop processing and return when the end of the string is encountered. Note that like an array, the square brackets ( [ ] ) operator can be used to iterate through the characters in a string.

Answers

user_in = str ( input ("Please enter a phrase: " ))

def reverse_str (string):

e = 0

for e in range (len (string)):

x = -1

print string[x]

x += (len (string))

What are the 4 similarities of CUI and GUI

Answers

Answer:

letter U and I.

Three Letters

1 consonant and 2 vowel

All are capital letters

Computers work on the garbage-in, garbage-out concept. Comment

Answers

Stands for "Garbage In, Garbage Out." GIGO is a computer science acronym that implies bad input will result in bad output.

Because computers operate using strict logic, invalid input may produce unrecognizable output, or "garbage." For example, if a program asks for an integer and you enter a string, you may get an unexpected result. Similarly, if you try to open a binary file in a text editor, it may display unreadable content.

GIGO is a universal computer science concept, but it only applies to programs that process invalid data. Good programming practice dictates that functions should check for valid input before processing it. A well-written program will avoid producing garbage by not accepting it in the first place. Requiring valid input also helps programs avoid errors that can cause crashes and other erratic behavior.

NOTE: Because the related terms FIFO and LIFO are pronounced with a long "i," GIGO is typically pronounced "guy-go" (not gih-go). This also helps avoid confusion with the prefix "giga," which is pronounced with a soft "i."

Prolog uses ____. Select one: a. lowercase for variable names, and uppercase for constants and functions b. uppercase for variable names, and lowercase for constants and functions c. lowercase for variable names and constants, and uppercase for functions d. uppercase for variable names and constants, and lowercase for functions

Answers

Answer:

b) uppercase for variable names, and lowercase for constants and functions  

Explanation:

Given

Programming language: prolog

Required

The case type for variables, constants and functions

In prolog,

Variable names begin with uppercase

e.g. Name, NAME

While constants and functions begin with lowercase

e.g. name, addnumbers()

Hence, (b) is correct

Name of the best Android keyboard
Pls I need it asap!! For educational purpose
I need your Ideologies​

Answers

I think Gboard is good, you can switch between languages quickly and you can translate in real time. Translation is not perfect, but it is the best translation available. Vocabulary and autocorrect is not bad too. You can change the background. It has some themes of its own, but you can always customise it with your own photo. It has instant gif, stickers and emoji options too. It also has a good collection of symbolic emojis like: *\0/*O_o(๑♡⌓♡๑)ᕙ( • ‿ • )ᕗ(☉。☉)!I cannot include all of them, they are in 100s.

But if you are looking for a solution for grammatical mistakes, then you may want to consider Grammarly.

[tex]\boxed{\underline{\bf \: ANSWER}}[/tex]

Well, just like the person before me has answered ; I prefer Gboard, a keyboard provided by Go.ogle over all the other options ones available while using android. As you can see in the attached picture, I use Gboard & have been using it for quite a lot of years now as well. Gboard provides smooth surface for typing & there's glide technology as well. There's an option to pin your clipboard (which I find really helpful) & tons of built-in emojis, emoticons (this feature is not available in many), GIFs & so on. Also you can customize your keyboard by changing themes (you can either select one of the many backgrounds they have or choose one you like; in my case I have a blue scenery clipart as my background which matches my phone's overall theme). You can also use Gboard if you prefer to text in more than 1 language (this feature is available in many other keyboards as well though).

Now moving on, I would suggest the Samsung Keyboard too (that is, of you are using Samsung gadgets). The only reason I prefer Gboard over this keyboard is because you can't customize Samsung Keyboard (you can only choose White/Dark mode). Also, emoticons aren't available.

Then at last, there's the Grammarly Keyboard. This keyboard is really good if you are looking for writing essays, paragraphs or speeches as it catches all your grammar errors. But at times, it can be a bit too much & the keyboard is not overall smooth to use (at least for me).

So there, these 3 are the best keyboards for Android users.

_____

Hope it helps.

RainbowSalt2222

A security operations team was alerted to abnormal DNS activity coming from a user's machine. The team performed a forensic investigation and discovered a host had been compromised. Malicious code was using DNS as a tunnel to extract data from the client machine, which had been leaked and transferred to an unsecure public Internet site. Which of the following BEST describes the attack?
A. Phishing
B. Pharming
C. Cache poisoning
D. Data exfiltration

Answers

Answer:

D. Data exfiltration

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, sniffing, data exfiltration, etc.

The type of attack in this scenario is best described as data exfiltration.

Data exfiltration can be defined as a form of data security breach that typically involves an unauthorized transfer of data from a host computer by using a malware and a malicious code.

Hence, data exfiltration occurs when a malicious code uses a domain name server (DNS) as a tunnel to extract data from an end user's computer (client machine) and transferring it to an unsecure public Internet site.

list out the memory components used by different generation of computer​

Answers

Answer:

here's your answer mate!

1940 – 1956: First Generation – Vacuum Tubes. These early computers used vacuum tubes as circuitry and magnetic drums for memory. ...

1956 – 1963: Second Generation – Transistors. ...

1964 – 1971: Third Generation – Integrated Circuits. ...

1972 – 2010: Fourth Generation – Microprocessors.

Explanation:

1940 – 1956: First Generation – Vacuum Tubes. These early computers used vacuum tubes as circuitry and magnetic drums for memory. ...

1956 – 1963: Second Generation – Transistors. ...

1964 – 1971: Third Generation – Integrated Circuits. ...

1972 – 2010: Fourth Generation – Microprocessors.

What does this mean

Don't use such phrases here, not cool! It hurts our feelings :(

Answers

A person is asking you not to use those words/sentences here because it hurt their feelings

NBA bank uses centralized client server database that is accessed by all its nationwide branches. All customers' records are stored on the database. There are no copies at the branches. The building that holds this database and all the equipment went up in flames and was destroyed.

Answers

Answer:

NBA bank data is completely destroyed since it has not maintained any backup.

Explanation:

All businesses should maintain backup of important records. NBA bank has centralized client server database. This database record should be backup at different system which is only accessed when there is some problem in the original data. The backup system is initiated when the original database is destroyed.

Which option is used in Access to locate and retrieve data that may be present in multiple database tables within the database?

queries
forms
procedures
subroutines

Answers

Answer:

subroutines

Explanation:

subroutines is used in access to locate and retrieve data

An end-user license agreement protects _____.

Answers

End User License Agreements are important for protecting the rights of the business owner/licensor and critical for setting the rules of use and managing the expectations of the end-user.

Answer: both the owner and the purchaser of the software

Explanation:

List 10 different products made from timber

Answers

Answer:

Bath towels.

Toothpaste.

Nail polish.

Makeup.

Disinfecting wipes.

Medications.

Paints.

LCD screens.

Houses

Buildings

Explanation:

Data stored on physical storage devices must do what before the processor can access it? Be converted to binary Be written to the hard drive Go into short-term memory Go from volatile to nonvolatile memory

Answers

Answer:

Go into short-term memory

Explanation:

Data stored on physical storage devices must go into short-term memory before the processor can access it.

This is because, physical storage devices are secondary memory which store information for a long time. The CPU does not work directly with secondary memory but with primary or short term memory. Since the CPU works mainly with short term memory, information in physical storage or secondary memory has to go into short term memory for the CPU to be able to process it.

So, data stored on physical storage devices must go into short-term memory before the processor can access it.

How computer is important in our life​

Answers

Answer:

Computers are important in our lifes to keep us safe if theres a hurricane tornado or even a blizzard.

Another reason there important is so we can stay in contact with are family

and friends incase of an emergency.

Lastly there important because they can help us get to a place or destination

by using a gps.

Hope it helps✌✌

Answer:

computer is important because we can use it for playing games. watching videos listen music etcetera

PLEASE ANSWER ASAP

Type the correct answer in the box. Spell all words correctly.
What was the name of the database that Tim Berners-Lee built?
Tim Berners-Lee built a database called [BLANK].

Answers

Answer:

ENQUIRE database.

Explanation:

I am not sure but I guess this is the answer.

who is the father of computer



Answers

Answer:

Charles Babbage is the father of computer

Explanation:

Charles Babbage is know as father of computer.

hope this help!

PLEASE HELP DUE!!!
WILL GIVE BRAINLIEST!!

can someone help me please?

Answers

Answer:

see below picture

Explanation:

You can work your way through the formula from the inside out, mapping every operation to a gate.

can someone answer this? I'll mark u the brialintest!

Answers

pre convert single digits, or sometimes parts of a sum, then sum up. like this:

1.) 2³+2²+2^1+2^0 = 8+4+0+1 = 13

2.) 512 + 0 + 128 + 0 + 0 + 16 + 0 + 4 + 2 + 0 = 1010010110

you just need to know what the powers of two are, then you know how to convert numbers.

like 100 = 4 and 1 = 1 then 101 = 4 + 1 and in the other direction just take chunks of 5 until theres nothing left, but care not to overshoot the sum

5 = 2² + 0 + 2^1 = 101 in base2

the zeros are for the order, every time I would overshoot, it's a zero.

3.) 16 + 2 + 19 = 37

4.) 8² is 64, or (100)base8

8³ or 1000 would already overshoot, so let's see what we can do with the smaller value of a digit in base8, 8² = 64

we can 8 different digits (0 to 7) in base8

7x8^2 + 2*8^1 + 5*8^0

448 + 16 + 5

= (725)base8

very low battery right now. let me now if this already helps to grasp the concept. I'll come back later.

edit1: recharging my phone now. but I need to show quickly in order to get my own stuff done.

quick side note on topic: the number always stays the same, like if there would be a number of beans lying on the table. we justcrrorder them to write in another system. in normal base 10, 312 beans would be grouped intuitively in 3*100, 1*10 and 1*1

or: 3*10^2 + 1*10^1 + 2*10^0

note that something to the power of zero is always one (e.g.: 5^0 is like 5÷5)

Assume there are two variables, k and m, each already assigned a positive integer value and further assume that k's value is smaller than m's. Write the code necessary to compute the number of pertect squares between k and m. (A perfect square is an integer like 9, 16, 25, 36 that is equal to the square ot another integer (in this case 393, 4*4, 5*5, 6*6 respectively). Assign the number you compute to the variable q. For example, if k and m nad the values 10 and 40 respectively, you would assign 3 to q because between 10 and 40 there are these perfect squares: 16, 25, and 36.

Answers

Answer:

Lets us take k, m = 10, 40

q = 0

i = k

while i <= m:

   if int(i*0.5)*2 == i:

       q += 1

   i += 1

A team of architects is designing a new AWS environment for a company which wants to migrate to the Cloud. The architects are considering the use of EC2 instances with instance store volumes. The architects realize that the data on the instance store volumes are ephemeral. Which action will not cause the data to be deleted on an instance store volume

Answers

Answer:reboot

Explanation:

whats the recommended amount of dedodated wam
i can have in a server

Answers

Hi! The recommended amount of RAM that you should have is 6gb and above.

write technical terms for the following statements.
A) A collection of programs which make computer work.
B) A language processor that converts assembly language codes in to machine language.
C)Software that is the basic requirement of a computer.
D) The software which help to maintain the hardware and software.
E) Applications software that is designed for an organization.
F)The software which does not provide right to modify.
G) The binary code obtained after the translation of source code.
H) The application which is needs internet to access and update. ​

Answers

Answer:

A) software

B)assembler

C)operating system

D)system software

E)data base

F)software license

G)machine code

H)ONLINE shopping apps

You want to protect data on hard drives for users with laptops. You want the drive to be encrypted, and you want to prevent the laptops from booting unless a special USB drive is inserted. In addition, the system should not boot if a change is detected in any of the boot files. What should you do

Answers

Answer:

Implement BitLocker with a TPM

Explanation:

In Computer science, a memory is a term used to describe the available space or an electronic device that is typically used for the storage of data or any computer related information such as images, videos, texts, music, codes and folders. Some examples of a storage device are hard disk drive, CD-ROM, flash drive, etc.

Basically, there are two (2) main types of memory;

A. Read only memory (ROM).

B. Random access memory (RAM).

In Cyber security, encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext.

Typically, an information or data that has been encrypted can only be accessed and deciphered by an authorized user.

In this scenario, if you want to prevent the laptops from booting unless a special USB drive is inserted; you should implement BitLocker with a trusted platform module (TPM) on Microsoft Windows.

Other Questions
Can someone please help me with this math problem Which of the following statements is true?A. ASC 740 focuses on the income tax expense or benefit on the income statementB. ASC 740 focuses on the balances in the deferred tax assets and liabilities on the balance sheetC. ASC 740 focuses on the income taxes paid or refunded in the Statement of Cash FlowsD. ASC 740 focuses on the computation of a company's effective tax rate in the income tax note to the financial statements It is the last quarter of the championship game. Your best athlete is knocked down, and you think she may have hit her head. She continues playing, but you notice that she is not acting right. You call a time-out to talk to her. She says she is fine, and wants to keep playing. What should happen next? Worth 6 points please help!! simplify please to the end Mary can do a job in 80 minutes, Working with Jan, both can do the job in 30minutes. How long will it take Jane to do the job alone? 29. SCUBA DIVING The sign shows the equipment rented or sold by a scubadiving store.a. Write two expressions to represent the total sales to rent 2 wet suits,3 air tanks, 2 dive flags, and selling 5 underwater cameras.b. What are the total sales? Can someone help me here and check out the other two i have posted there both due soon and i have no clue how to do them 1.) Create a single variable linear equation that has no solution. Solve the equation algebraically to prove that it does not have a solution.2.) Create a single variable linear equation that has one solution. Solve the equation algebraically to prove that there is one distinct solution for the equation.3.) Create a single variable linear equation that has infinitely many solutions. Solve the equation algebraically to prove that there is an infinite number of solutions for the equation 3/5 of 1 hour is? pls give me the answer Evaluate the Expression z(z-7) when z=10 express 111 as a sum of two primes URGENT PLEASE HELP. In the triangles below, DF MN, DG MP, D P. Can you prove that DFG MNP? Explain your answer. (15 points) tc phm no sau y khng phi l ca H Ch Minh?Chn mt phng n:A. Tuyn ngn ca ng Cng sn.B. Th gi ng bo Nam B.C. Vn dn bn x.D. Bn n ch thc dn Php. HELP PLS Match each word with its pronunciation. am 1 1 1 . Agua m Hum LE Piata III ------------ . HE LE LI Lpiz Bailar H. AH-gwah :: pee-NYAH-tah :: LAH-pees :: bay-LAHR Tobias has a brokerage account and buys on the margin, which resulted in an interest expense of $52,000 during the year. Income generated through the brokerage account was as follows: Municipal interest $104,000 Taxable dividends and interest 520,000 If required, round any division to two decimal places and use in subsequent computations. Round your final answer to the nearest dollar. How much investment interest can Tobias deduct rewrite the following statements into algebraic expression the sum of x and y 5 is subtracted from y der owns a hamburger restaurant. Slider's minimum average variable cost is $10$ 10 at a quantity of 100 hamburgers, and his minimum average total cost is $15$ 15 at a quantity of 200 hamburgers. His total fixed cost is $300$ 300 . Use this information to answer the questions. What is Slider's AVC when he sells 200 hamburgers? A square has a perimeter of 80 m. What is the length of each side? I need to know the answer and explaining how to do it please