What do you mean by Bandwidth? Pls give full explanation

Answers

Answer 1

Answer:

In computing, bandwidth is the maximum rate of data transfer across a given path. It can be characterized as network bandwidth, data bandwidth, or digital bandwidth.

Explanation:


Related Questions

Which list method allows elements in a sequence to be removed and added at either end of the structure?
index
queue
stack
deque

Answers

Answer:

c.) stack

Explanation:

Answer:

the answer is c stack not only dose stack make the most since but i also got it right on edge 2020

Explanation:

1) To point the lens of a camera up or down is called:
A) Arc
B)Dolly
C)Pan
D)tilt

Answers

Answer:

D)

Explanation:

Tilting is a cinematographic technique in which the camera stays in a fixed position but rotates up/down in a vertical plane.[1] Tilting the camera results in a motion similar to someone raising or lowering their head to look up or down. It is distinguished from panning in which the camera is horizontally pivoted left or right. Pan and tilt can be used simultaneously.[2] In some situations the lens itself may be tilted with respect to the fixed camera body in order to generate greater depth of focus. [3][4]

The camera's tilt will change the position of the horizon, changing the amount of sky or ground that is seen.[5] Tilt downward is usually required for a high-angle shot and bird's-eye view while a tilt upward is for a low-angle shot and worm's-eye view. The vertical offset between subjects can reflect differences in power, with superior being above.

Assume that the Measurable interface is defined with a static sum method that computes the sum of the Measurable objects passed in as an array, and that BankAccount implements the Measurableinterface. Also assume that there is a variable branchAccounts that is an object reference to a populated array of BankAccount objects for a bank branch. Which of the following represents a correct invocation of the sum method to find the total balance of all accounts at the branch?
A) Arrays.sum(branchAccounts)
B) Measurable.sum(branchAccounts)
C) BankAccount.sum(branchAccounts)
D) branchAccounts.sum()

Answers

Answer:

B) Measurable.sum (branchAccounts)

Explanation:

The user interface which can be built by adding components to a panel. The sum method that will be used to find total balance of all accounts at branch is measurable.sum, this will layout the sum of specified branch account total. The measurable interface implements public class bank account as measurable sum.

what are the uses of mobile phones?​

Answers

Answer:

We use mobile phones to:

1. communicate with our friends and family

2. looking for the information/news in the world

3. looking for the material for study

and many others

may it helps^_^

Answer:

Mobile phones are used for a variety of purposes, such as keeping in touch with family members, for conducting business, and in order to have access to a telephone in the event of an emergency. Some people carry more than one mobile phone for different purposes, such as for business and personal use.

Explanation:

Plz mark me as brainiest

All of the following statements about MapReduce are true EXCEPT: MapReduce handles the complexities of network communication. MapReduce is a general-purpose execution engine. MapReduce handles parallel programming. MapReduce runs without fault tolerance.

Answers

Answer:

The correct option is;

MapReduce runs without fault tolerance

Explanation:

Map Reduce is a technique of processing or a framework of software, that is geared towards managing, sorting and handling large data by working in the Map and Reduce phases where the map function involves the dividing, filtering and sorting of the data and mapping of the split data while the reduce method involves the rearranging, summary activities having the data reduced.

An IT firm came across a startup company that offers a new system of computer storage. It is currently in the experimental phase. Which aspect of the technology will the firm consider before adopting it?
a
internal storage
b
graphics
c
physical features
d
commercial potential

Answers

Answer:

d . commercial potential

Explanation:

The commercial potential of the technology would be a very important detail to look at before purchasing the new system of computer storage from the startup company.

This is important because the IT firm would be eager to know how the market would accept the product when it is launched. If the public does not like the product, then the firm would suffer a loss, this is why it is paramount.

What features in Excel are the same as in Word?
What features are differ?

Answers

Answer:

Following are the difference and similarity between word and Excel:

Explanation:

The similarity in word and excel:

The MS-word and MS-Excel both are the part of Microsoft, that is used for the word processing and the  Spreadsheet (tablet program).  In the word processing is used to create papers like essays while the spreadsheet is used for manipulating the mathematical formula, in another way we can say that both are used for type letters. In both spreadsheet and the word processing is used for insert images, graphs, and hyperlinks, it also uses the tools for formatting bars and the toolbars.

The difference in word and excel:

In a word, it includes an application for text processing, and excel would be used for the tablet program.  The word is used to create documents like assignments file data files,  while excel is being used for the manipulation of numbers by mathematical equations.

How are the waterfall and agile methods of software development similar?

Both methods allow project teams to complete small portions of the entire project in small sprints and work on different steps simultaneously.

Both methods focus on development rather than planning, in order for project teams to work more quickly.

Both methods have project teams work on one step at a time and move on when the previous step is completed and approved.

Both methods require documentation so project teams stay on track and keep control over what version of the project they are working on.

Answers

Answer:

In the question "first and last", that is "option 1 and 4" is correct.

Explanation:

In the given question the numbering of the choices is missing. if we numbering the choices, then the first choice is on the 1 number, the second choice is in 2 and so on, in which the correct and the wrong choice can be  defined as follows:

In point 1, Both method, it divides the project into small parts, at it the working is easy, that's why it is correct. In point 4, Both method, it requires the documentation, that's why it tracks the project. In point 2 and 3, both were wrong because it focuses on both development and planning, and in Waterfall when one part is complete then it will go on the next part, but in the Agile, it does not use this technique.

Carlos is using the software development life cycle to create a new app. He has finished coding and is ready to see the output it produces. Which stage of the software development life cycle is Carlos ready for next? Coding Design Maintenance Testing

Answers

Answer:

Testing

Explanation:

From the question, we understand that Carlos just finished the coding of the app.

In software development life cycle, the coding phase is where Carlos is expected to make use of his choice of programming language to design the app;

This stage is an integral part of the implementation process and according to the question, the coding has been completed;

The next phase or stage after the implementation phase is testing.

Hence, Carlos is getting ready to test the app.

Answer:

Testing                                   I took the test I definetly testing <3

Chris needs to create a simple web page with HTML. Which tool will he use? HyperText Web browser Text editor Operating software WILL GIVE 100 AND BRAINLIEST!!!!!!!!!!!!!!!!!!!!!!!!1

Answers

Answer:

The answer is "Text editor".

Explanation:

It is a computer program, which is used to provide editing on the plain text, and for this editing, we use a text editor. This tool differs from word processors software because it doesn't add additional text editing metals. In this tool, we also write the HTML code, and the incorrect choice can be defined as follows:

HyperText is a wrong choice because in these two or more pages are linked and it is used to move from one page to another. The Web browser is also a wrong choice because it is used to display the design of the web page. Operating software is also a wrong choice because it system software in which all things are done.  

Answer:

text editor

Explanation:

what is the location in the base interface of the link to
create a table using wizard?
pls Answer me.
I'll make as BRIANLIST. ​

Answers

Answer:

Hey mate, here is your answer. Hope it helps you.

Explanation:

Before you can create objects such as tables and forms, you must first create the database file in which they will be stored.

1. On the File tab select New.

2. Click on Blank database.

3. In the File Name box, type a name for your database.

4. Click on the browse button to the right of the File name box to browse for a location for your

database.

5. Click on Create.

A new database will be created with a new default Table.

6. Click on Design View to start working with this Table.

You can use forms to control access to data, such as which fields of data are. Then open the table or query upon which you want to base the form. 2. To create a form on which all fields from the underlying table or query are placed. Then to be more selective about which fields appear on your form, you can use the Form Wizard.

Can someone please tell me how I can hack WiFi with a raspberry pi in Kali Linux do I need a wireless adapter for raspberry pi if so please tell me and me ASAP please thanks appreciate it

Answers

lol wym hack wifi? need more info lol

Well honestly i dont know how to. i personally don't own one but there is YT videos. Go on YT and look up network chuck. hehas what your looking for.

in object oriented programming what is a constructor?

a. the attributes that allow a programmer to imagine a new object
b. the behaviors that allow a programmer to design a new object
c. the code that allows a programmer to create a new object
d. the template that allows a programmer to modify a new object

Answers

Answer:

The answer is A.

Answer:

A. the attributes that allow a programmer to imagine a new object

Explanation:

Got the answer right on the test!

Which function will add a grade to a student's list of grades in Python? add() append() print() sort()

Answers

Answer:

It will be add()

Answer:

A

Explanation:

How would you define a cloud today?
as a non-factor
networking
server
any remote virtualized computing infrastructure

Answers

Answer:

The answer is "any remote virtualized computing infrastructure".

Explanation:

The term cloud is used as the symbol of the internet because cloud computing is some kind of internet computing, that offers various services for computers and phones in organizations via the internet.  

The virtual network allows users to share numerous system resources throughout the network system.It allows you to access the optimal productivity by sharing the resources of a single physical computer on many virtual servers.

Does anyone know how I can fix this? I don’t know what is wrong. When I click retry it restarts my laptop and returns back to this. Please help!

Answers

Answer:

Software Program Reinstallation

Use the following steps to reinstall factory installed software programs:

Click Start (), All Programs, Recovery Manager, and then Recovery Manager again.

Figure : Recovery Manager

Recovery Manager main screen

Under I need help immediately, click Software Program Reinstallation.

On the Software Program Reinstallation welcome screen, click Next.

Look in the Factory installed programs list for the software program you want to reinstall.

If your software program is listed, select the title.

If the program you want to reinstall is not listed, select The program is not in the list, and then click Next. Follow the instructions to reinstall the program.

Figure : Select program to reinstall

Software Program Reinstallation window

Click Next.

If you are not prompted to uninstall the program before reinstalling it, continue to the next step.

If you are prompted to uninstall the program before reinstalling it, follow these steps.

Click Start (), and then Control Panel.

Under Programs, Uninstall a program.

The Uninstall or change a program window opens.

Figure : Uninstall or change a program

Uninstall or change a program screen

Select the program you want to remove.

Click Uninstall or Uninstall/Change at the top of the program list.

Read and respond to any messages that appear while the software is being removed from your computer.

Once the program is uninstalled, resume the reinstallation from the Recovery Manager program.

When the reinstallation is complete, select Yes, and then Finish to restart the computer.

Give two examples of a large databases that might be used to help members of the public

Answers

Answer:

Examples of large database that might be used to help members of the public are;

1) Apple Healthkit, Carekit and Researchkit

2) IBM Deep Thunder

Explanation:

1) The use of medical aid wearable devices that give instant data feed into the the a patients electronically stored health record has become possible and include the listed Apple technologies that enable the iPhone get instant access and feed back on individual health records

2) Large databases are used for weather forecasting by the processing of big data with the aid of very powerful computers by IBM Deep Thunder, which can also forecast natural disasters and the likelihood of wreckage in utility lines.

________is a nickname for social media tools which allows users to contribute content easily and to easily connect to each other. Instant Messaging Web 2.0 Cognitive surplus QR codes

Answers

Answer:

Web 2.0

Explanation:

The term that is being defined here is known as Web 2.0. As mentioned in the question this term refers to any and all social platform websites that emphasize user-generated content, ease of use, participatory culture, and interoperability for end users. Some examples of Web 2.0 features would be social media sites like FB, blogs, wikis, video sharing sites, image sharing sites, etc.

You find a list of websites that relate to your chosen topic and click on the first one. You ask yourself the three questions presented in this lesson to see if this site is reliable: 1) Who wrote it? There isn't an author listed anywhere that you can find. 2) What type of site is it? The site name ends in . 3) How current is the information? You see the site was updated yesterday. Is this website reliable and worth examining further? True or False?

Answers

Answer:

False

Explanation:

Information reliability is essential in production. sourcing information from a reliable source is base on several criteria. They are; the author of the resource file, the type of media platform holding the information, the frequent revision of the information, additional support or collaboration to publish public information, etc.

A government website ( with the site-address ending with a '.gov' ) which is concurrently revised by the institute, gives a piece genuine and reliable information, whereas a commercial website with no author and just recently revised or published, would be judged as an unreliable source of information

Assume that strike Counter has already been declared to be a "pointer to int". Assume further that strike Counter has been initialized -- its value is the address of some int variable. Write a statement that adds 22 to the value of the variable that strikeCounter is pointing to.

Answers

Answer:

The statement to this question can be defined as follows:

*strike_Counter =*strike_Counter +22;//adds  value 22 in *strike_Counter

Explanation:

In the given question, it is already defined, that "strike_Counter" is an integer pointer variable, which means, it only holds the integer value in its address memory.

In the next step, it is defined, that it adds the value "22" in its variable, and for this, we declare the statement in the answer section, which adds the value.  

for example, if in the "strike_Counter" variable holds the integer value, that is 5 and after adding the 22 it will become 27.    

What type of camera is a cell phone camera? A.) DSLR B.) manual C.) compact D.) zoom

Answers

Answer:

The correct option is;

D.) Zoom

Explanation:

The six types of camera found on smart phones includes the monochrome, macro camera, ultra-wide camera, periscope zoom camera, the main phone camera, and the depth sensor camera

The zoom cameras on smart phones can be found mainly in the top range models of smart phones due to the costs of the camera components including the sensor.

Smart phones also have digital zooming that make use of the high mega pixels that come with the phone.

write a python program to calculate the compound interest

Answers

Answer:

initialPrincipal = float(input("Please enter your initial principal:"))

interestRate = float(input("Please enter your interest rate:"))

timePeriod = float(input("Please enter your number of times interest applied per time period:"))

elapsedPeriod = float(input("Please enter your number of time period elapsed:"))

finalAmount = initialPrincipal*(1 + interestRate/timePeriod)^(timePeriod*elapsedPeriod)

print("Your final amount would be:", finalAmount)

________ means that IT capacity can be easily scaled up or down as needed,which essentially requires cloud computing. A) agility B) flexibility C) responsiveness D) IT consumerization

Answers

Answer:

The correct option is;

A) Agility

Explanation:

Business agility is a measure of the responsiveness of business to business opportunities that is the time lapse between the emergence of a business opportunity and the the business formerly responding to the opportunity.

By similar analogy, IT agility is about the responsiveness of an organizations IT infrastructure to external stimuli. As such IT agility measures the systems adaptability to change (which may involve scaling down) or how easily it is for the IT system to be able to produce new transferable opportunities which involves scaling up as needed.

Order the steps a user needs to follow to preview and then print a document

Answers

Answer:

Click file tab, click print tab, preview document, print document.

Answer:

Click file tab, click print tab, preview document, print document.

Explanation:

Click file tab, click print tab, preview document, print document.

are the network administrator for your company. You are installing a new printer in the network. When you check the print server properties, it displays the following error: Server properties cannot be viewed. The print spooler service is not running. What should you do to resolve the issue using the least administrative effort

Answers

Answer:

Will have to run the net start spooler command.

Explanation:

The printer spooler seems to be accountable for overseeing incoming faxes that have been in effect intended for handling by the printer. Whether this device stops operating, your printer won't publish documentation as well as the machine may not notice it either.To solve these problems, you'll need to run the net start spooler command using the least administrative effort.

When you register to take classes, the registrar office pulls up a file full of
information about you, including your contact information, the list of classes you are
currently taking, classes you have completed, and your grades. What type of
productivity software is best suited for creating and storing this kind of information?
Spreadsheet
Word processing
Presentation
Database

Answers

Answer:

Database

Explanation:

Database software is intended to develop databases and to maintain, alter, access, and obtain useful data stored within them. It is often used to store, manage, and organize information such as field names, documents, and file structures in a database. it helps users to create their own databases to meet their business specifications and requirements. It provides data flexibility, as the storage process and formats can be modified without changing the entire program inside the database.

Read the excerpt from The Code Book. Other attacks include the use of viruses and Trojan horses. Eve might design a virus that infects PGP software and sits quietly inside Alice's computer. When Alice uses her private key to decrypt a message, the virus would wake up and make a note of it. The next time that Alice connects to the Internet, the virus would surreptitiously send the private key to Eve, thereby allowing her to decipher all subsequent messages sent to Alice. One way to better connect with this excerpt is to

Answers

Answer:

Tell about an experience with a computer virus.

Explanation:

Simon Singh's "The Code Book," tells the history of how cryptography came into being and the secret messaging world of encryption. Through the detailed narration and diving into the history of encryption, the author traces the evolution of such a process and reveals how it has had a huge impact on the world's policies.

In the given excerpt, Singh gives an example of how viruses are planted and used to spy/ get access to other people's computers. But while it is possible to get the main point of the example, it would have been better if the writer includes experience with a computer virus so that readers will find it easier to connect with the given example. This will enable them to better understand the working of viruses and their effects.

Thus, the correct answer is the first option.

Answer:

b

Explanation:

Which decimal value (base 10) is equal to the binary number 1012?

Answers

Answer:

The decimal value of 101₂² base 2 = 25 base 10

Explanation:

The number 101₂² in decimal value is found as follows;

101₂ × 101₂ = 101₂ + 0₂ + 10100₂

We note that in 101 + 10100 the resultant 2 in the hundred position will have to be converted to a zero while carrying over 1 to the thousand position to give;

101₂ + 0₂ + 10100₂ = 11001₂

Therefore;

101₂² =  11001₂

We now convert the result of the square of the base 2 number, 101², which is 11001₂ to base 10 as follows;

Therefore converting 11001₂ to base 10 gives;

11001₂= 1 × 2⁴ + 1 × 2³ + 0 × 2² + 0 × 2 ¹ + 1 × 2⁰

Which gives;

16 + 8 + 0 + 0 + 1 = 25₁₀.

The decimal value in base 10 that is equal to the binary number 101_2 is; 5

We want to convert 101_2 from binary to decimal.

To do this we will follow the procedure as follows;

(1 × 2²) + (0 × 2¹) + (1 × 2^(0))

>> (1 × 4) + (0 × 2) + (1 × 1)

>> 4 + 0 + 1

>> 5

In conclusion, the decimal value we got for the binary number 101_2 is 5

Read more about binary to decimal conversion at; https://brainly.com/question/17546250

Which are characteristics of pseudocode? Select all that apply.
O helps in working out inputs and outputs of the solution
used in modeling the solution
presents algorithms informally, such as in English
presented in the programming language

Answers

Answer:

A,B,C

Explanation:

Display all the natural numbers from 1 to 100 that are exactly divisible by 3 and 7 using FOR … NEXT. Without using Mod

Answers

Answer:

FOR i% = 1 TO 100

 IF ((i%\3) = i%/3) AND ((i%\7) = i%/7)  THEN

   PRINT i%

 END IF

NEXT i%

Explanation:

Of course using MOD would be cleaner, but another way to check if a number is integer divisable is to compare the outcome of an integer division to the outcome of a floating-point division. If they are equal, the division is an integer division.

The program outputs:

21

42

63

84

Other Questions
Many male birds will expend A great deal of energy building nests. Females will mate with the males who build the best nest. This is best described as an example of ___.a) natural selectionb) sexual selectionc) runaway selectiond) an invasive speciese) disruptive selection Read the passage from The Beginnings of the Maasai.Our relationship with Enkai is essential to the tribe. Enkai is neither male nor female. The sky god is powerful, but can change from nurturing to vengeful depending on our behavior. Sometimes Enkai is Enkai Narok, the Black God, happy with us and blanketing the sky with dark clouds that pour out rain to nourish the plains. When angry, though, Enkai becomes Enkai Nonyokiethe Red God. In these times, the sun grows incredibly hot until the earth dries up and becomes barren. Because of this, we work to keep Enkai happy.Which information from this passage about Enkai is most important to include in a summary of the overall story? Lance contributed investment property worth $507,500, purchased Five years ago for $312,500 cash, to Cloud Peak LLC in exchange for an 70 percent profits and capital interest in the LLC. Cloud Peak owes $380,000 to its suppliers but has no other debts.Required informationA. What is Lances tax basis in his LLC interest?B. What is Lances holding period in his interest?C. What is Cloud Peaks basis in the contributed property?D. What is Cloud Peaks holding period in the contributed property? Let n be the number of five-digit positive integers which are divisible by 36 and have their tens digit and unit digit equal. Find n/100 Why didnt the teacher punish the speaker and his friend Niks? you move up 7 units and left 6 units. you end at (-1,5). where did you start? Pregunta N 1: Cuntas fracciones propias e irreductibles con denominador 24 existen? 1 punto A) 2 B) 4 C) 6 D) 8 E) 10 Pregunta N 2: Cuntas fracciones impropias e irreductibles con numerador 25 existen? 1 punto A) 19 B) 21 C) 25 D) 29 E) 33 Pregunta N 3: La edad de Miguel es 4/5 de la edad de su novia. Si las edades de los dos suman 63 aos, calcule la edad de la novia de Miguel. 1 punto A) 20 aos B) 26 aos C) 32 aos D) 35 aos E) 40 aos Pregunta N 4: Si son las 8 a. m., qu fraccin del da ha transcurrido? 1 punto A) 1 B) 2 C) 1/2 D) 1/3 E) 1/5ayuden porfavor 6.21(3.1) answer for number 6 ANSWER QUICKLY PLZZZZZZ ASAP How are enlightenment ideals evident in 21st century life and political thought? Blue Cab Company had 69,000 shares of common stock outstanding on January 1, 2021. On April 1, 2021, the company issued 39,000 shares of common stock. The company had outstanding fully vested incentive stock options for 14,500 shares exercisable at $11 that had not been exercised by its executives. The end-of-year market price of common stock was $32 while the average price for the year was $31. The company reported net income in the amount of $364,915 for 2021. What is the diluted earnings per share (rounded) Consider a $1,000-par-value 20-year zero-coupon bond issued at a yield to maturity of 10%. If you buy that bond when it is issued and continue to hold the bond as yields decline to 9%, the imputed interest income for the first year of that bond is 11. The mass (in grams) of FeSO4.7H2O required for preparation of 125 mL of 0.90 Msolution is:(a) 16 g(b) 25 g(c) 13 g(d) 31 g(e) 43 g A baker has three banana muffin recipes. Recipe AAA uses 333 bananas to make 121212 muffins. Recipe BBB uses 555 bananas to make 242424 muffins. Recipe CCC uses 111111 bananas to make 484848 muffins. Order the recipes by number of bananas per muffin from least to greatest. Q#1) What is a defining feature of limited governments? A. One political party typically rules over government systems. B. The government controls the education system of the country. C. People enjoy basic rights, such as freedom of speech and press. D. Government bodies ban people from accessing foreign media. Q#2) Read this excerpt from the Declaration of Independence. Then answer the question that follows. We hold these truths to be self-evident, that all men are created equal, that they are endowed by their Creator with certain unalienable Rights, that among these are Life, Liberty and the pursuit of Happiness.That to secure these rights, Governments are instituted among Men, deriving their just powers from the consent of the governed. Based on the excerpt, why do you think the Founding Fathers supported the idea of a limited government? A. They believed that it was the governments duty to fulfill the peoples wishes. B. They wanted people to follow government laws and policies without conflicts. C. They felt that a limited government would reduce public revolutions and uprisings. D. They hoped to win foreign approval by following the limited government model. Q#3) Match the following concepts of limited governments to their descriptions. Everyone must follow the law, regardless of a persons power or position. ~ The government must follow the will of its people. ~ Every person is entitled to a fair and public trial. due process rule of law popular sovereignty Q#4) In what type of government system are citizens often denied religious freedom? A. representative democracy B. theocracy C. republic D. constitutional monarchy Sarah has $20 saved. She gets $10 per week for her allowance, and she saves her allowance for the next 3 weeks. At the end of the week, she gets $150 in birthday money. How much money will she have after the 3 weeks? Which of the following sets of equations represents this problem? Does The TI-Nspire works just like the TI-84 ? Rahman stock just paid a dividend of $3.00 per share. Future dividends are expected to grow at a constant rate of 6% per year. What is the value of the stock if the required return is 12% A city of Punjab has a 15 percent chance of wet weather on any given day. What is the probability that it will take a week for it three wet weather on 3 separate days? The triangle shown below has an area of 4 unitsFind the missing side.