calculate the speed when given the amount of 1TB to be transfer in 5hrs.

Answers

Answer 1

Answer:

Data transfer rate is the speed that a certain amount of data is transferred over a given period of time. You might want to know the transfer rate if you’re downloading something online or transferring data from one source to another. First, convert your units so the file size and transfer speed are in either bits or bytes with the same prefix (kilo, mega, giga, or tera). Then, plug your numbers into the equation S = A ÷ T in which A is the amount of data and T is the transfer time to solve for S, the speed, or rate, of transfer. You can also determine the amount of data or the transfer time if you know one of the variables plus the speed of transfer.

Explanation:


Related Questions

Match each word to its correct meaning.
central processing unit
file
graphical user interface
hardware
interrupts
kernel
memory

Answers

Answer:

Central Processing Unit (CPU)

=

The chip that runs the basic operations of the computer, abbreviated CPU

File

=

a collection of data, such as a program or document

Graphical User Interface (GUI)

=

images displayed on the screen that enables the user to interact with the computer

Hardware

=

Physical parts of the computer, such as the motherboard or hard disk

Interrupts

=

Breaks in the action of a program using the operating system

Kernel

=

Core program of a computer operating system

Memory

=

Format for storage of digital data

Hope this helps :)

Describe the advantages and disadvantages of password generator software. Would you recommend the use of such software for your own system

Answers

Answer:

he various advantages that can be associated with a password generator software are as follows: Any arbitrary long password can be generated using the complete set of symbols and not just a subset (usually the subset which is easier to type on a key

Explanation:

the input nums is supposed to be an array of unique integers ranging from 1 ro nums.length (inclusive). However, there is a mistake: one of the numbers in the array is replicated, which means another number is missing. find and return he sum of the duplicate number and the missing number

Answers

The program which returns the sum of the duplicate and missing number is written in python 3 thus ;

def dup(nums):

#initialize a function which takes In a list of values as argument.

nums.sort()

#sort the values in ascending order

for i in range(1, len(nums)):

#iterate through the list

if nums[i] == nums[i-1]:

#Check for repeated values

return nums[i] + nums[i]-1

#return the sum of the repeated values - 1

nums = [4,3,3,1]

print(dup(nums))

A sample run of the program is attached.

Learn more : https://brainly.com/question/25574075

A security architect at a large, multinational organization is concerned about the complexities and overhead of managing multiple encryption keys securely in a multicloud provider environment. The security architect is looking for a solution with reduced latency to allow the incorporation of the organization's existing keys and to maintain consistent, centralized control and management regardless of the data location. Which of the following would best meet the architects objectives

a. trusted platform module
b. IaaS
c. HSMaaS
d. PaaS

Answers

Answer:

a. trusted platform module

i thinks it will help you

Explanation:

1. How many colors are available in color. palette.
2. 20 colors are available in color palette. True / False​

Answers

Answer:

16 colors in the palette

false only 16 colors

the document area is where you save your file true or false

Answers

Answer:

A few popular places to save files are under “desktop” or “documents" and then in a specific folder. If you saved the file to your desktop, you do not need to go through finder to access it. You can simply minimize all your windows, and click on it there. Double click on the file and you're ready to open it.

Explanation: TRUE. A.

what is the internet revolution?

Answers

The answer is B.
Hope this helps.

Answer:B

Explanation:

1. A is printed at the bottom of each page.​

Answers

Answer:

b is also printed at both page

Explanation:

I need to do because c can also pri Ted at all side

hope its help you

please mark as brainliest

what is the full meaning of the following acronyms:ARPANET, BOOTP, GSM, GUI, EOM, EULA, CTSS. ​

Answers

Answer:

ARPANET: Advanced Research Projects Agency Network

BOOTP: Bootstrap Protocol

GSM: Global System for Mobiles

GUI: graphical user interface

EOM: Enterprise Output Management

EULA: end-user license agreement

CTSS: The Compatible Time Sharing System

Explanation:

BEFORE GOING FOWARD KNOW THAT I DO NOT OWN THESE TEXTS.

GSM= a standard developed by the European Telecommunications Standards Institute to describe the protocols for second-generation digital cellular networks used by mobile devices such as mobile phones and tablets.

ARPANET=the first public packet-switched computer network. It was first used in 1969 and finally decommissioned in 1989. ... Many of the protocols used by computer networks today were developed for ARPANET, and it is considered the forerunner of the modern internet.

BOOTP= is an internet protocol that lets a network user automatically be configured to receive an IP address and have an operating system booted without user involvement.

GUI= A graphics-based operating system interface that uses icons, menus and a mouse (to click on the icon or pull down the menus) to manage interaction with the system.

EOM= refers to the process by which enterprise organizations manage, format and distribute data created from operational applications.

EULA= An end-user license agreement (EULA) is a license that gives a user the right to use a software application in some manner. EULAs are designed to enforce specific software use limitations, such as only using the software on one computer.

CTSS=services for children who require varying therapeutic and rehabilitative levels of intervention to address conditions of mental illness or emotional disturbance that impair and interfere with development and functioning. overcome deficits or maladaptive skills acquired over the course of a psychiatric illness.

What is data?........​

Answers

Answer:

[tex]\huge\bold\green{Data\ :- }[/tex]

In computing, data is information that has been translated into a form that is efficient for movement or processing. Relative to today's computers and transmission media, data is information converted into binary digital form. ... Raw data is a term used to describe data in its most basic digital format.

Have you ever written a program, saved a version, then later saved a different version and wish you could tell what changed

Answers

Answer:YES

Explanation:

Y

No I haven’t tbhhhhh

Write two statements to assign numApples with 10 and numOranges with 3. Sample output for given program: Apples: 10 Oranges: 3

Answers

numApples = 10

numOranges = 3

print(f"Apples: {numApples}")

print(f"Oranges: {numOranges}")

The statements should assign numApples with 10 and numOranges with 3.

The code is written in python.

The variable numApples is used to assign the number of apples and numOranges is used to assign the number of oranges.

The number of apples and oranges were outputted with the print statement in python.  

I used the f strings in python to concatenate strings and integers.

The bolded values in the code are python key words.

read more: https://brainly.com/question/13785329?referrer=searchResults

4. When working at the CLI in Linux, you specify the exact location of a file, which is the ____________________ to it, by beginning with a forward slash (/) to indicate the root directory.

Answers

Command line interface is used in form of a messenger conversation with your computer. You specify the exact location of a file, which is the pwd to it.

The Command Line Interface (CLI), is said to be a non-graphical, text-based interface attached to the computer system.

It is where the user input in a command and the computer then successfully executes it.

The Terminal is known to gives the command line interface (CLI) environment to the user.

The pwd command is simply known to be used in determining an exact folder location or path in Terminal.

Learn more from

https://brainly.com/question/25435538

vA student found a book on the library bookshelf last week, and recorded the source information.

Book title: My Traitor’s Heart Author: Rian Malan

Publication date: 1990 Publisher: Bodley Head Publication city: London

Use the drop-down menus to indicate how the student should format this source on a works-cited list.


My Traitor’s Heart.
London:

Answers

Answer:

3,1,2,1

Explanation:

got it right on edge

have a nice day

:)

Answer:

1. Malan, Rian

2. London:

3. Bodley Head, 1990

4. Print

Explanation:

did it

What is software and what types of softwares?

Answers

Answer:

the programs and other operating information used by a computer

Explanation:

system software and application software

Answer:

Software is a group/collection of commands that tell a computer how to work/run. Software is the contrast for hardware which is a discussed topic in the software field.

Examples of software are, an Internet browser, Operating system, Movie player, Graphics program, etc.

What device do e-learning applications usually use to help users with visual
impairment read digital content?

Answers

The answer is Screen Readers.

. A binary search has a right subtree but no left subtree. What noes contains that least element in the tree

Answers

The root node will contain the smallest element

Create a program using python pseudo code

You are a manager of a Wally's Training Gym and you encourage your trainers to enroll new members. Input is the trainer's last name and the number of new enrollees. Output is the number of trainers who have enrolled members in each of three categories: 0-5 new members, 6-10 new members, and 11 to 15 new members. Write an application that allows the user to enter 15 names and the number of new members they have enrolled into an array. Output is to display the number of trainers who are in each category. Use good programming techniques that you have learned throughout the course. Use appropriate variable names, use an array to store the names and number of new enrollees, and use prompts for the input and labels with the display.

Answers

The program uses a loop and conditional statements.

Loops are used for iterations, while conditional statements are used to implement conditions

The program in Python, where comments are used to explain each line is as follows:

#This creates a list for the trainer's last names

lastName = []

#This creates a list for the members enrolled by each trainer

membersEnrolled = []

#The next three lines initialize counter variables to 0

count0to5 = 0

count6to10 = 0

count11to15 = 0

#The following loop is repeated 15 times

for i in range(15):

   #This prompts the user for the trainer's last name

   name = input("Trainer's last name: ")

   #This prompts the user for the members' enrolled

   member = int(input("Members Enrolled: "))

   #This appends the last name to the list

   lastName.append(name)

   #This appends the members enrolled to the list

   membersEnrolled.append(member)

   #This counts the number of members enrolled in each group

   if member >=0 and member<=5:

       count0to5+=1

   elif member >=6 and member<=10:

       count6to10+=1

   elif member >=11 and member<=15:

       count11to15+=1

#The next three lines print the counter variables

print(count0to5,"enrolled 0 to 5 members")

print(count6to10,"enrolled 6 to 10 members")

print(count11to15,"enrolled 11 to 15 members")

Read more about similar programs at:

https://brainly.com/question/13246781

1. Give one reason why data is represented in binary in a computer [1]
2. How many bits in a byte? [1]
3. How many bytes are there in a MB? Include your working.

Answers

Answer:

1) Computers use voltages and since voltages changes often, no specific voltage is set for each number in the decimal system. For this reason, binary is measured as a two-state system i.e. on or off. Also, to keep calculations simple and convert into binary online, computers use the binary number system

2) 8 bits

3) 1000000 bytes

Create an 80x86 program that define an array of doubleword numbers then read two values, first one indicates how many actual numbers will be in the array, and an integer n. The program should display all of the numbers in the array that are greater than the number n.

Answers

The program requires user to read a specified number of values beyond a set limit from a given array. The program which performs this task is written in python 3 thus :

from random import randint

#import the randomint module

import random

#import the random module

double_list = [randint(11, 99) for p in range(0, 10)]

#randomly selects a list of 10 double integer values

def rand_num(lis, n_values , n):

#initialize a function named rand_num which takes in 3 parameters

filter = [val for val in lis if val > n]

#filters the variables to contain those only greater than the specified limit

arr_ = random.sample(filter, n_values)

#using the sample function, select the stated number of values from the filtered list

return arr_

#return the selected values

n_values = int(input('Enter number of values : '))

#prompts user for the length of array

n = int(input('Enter limit : '))

#prompts user for the limit of the values to be included in the array

print(rand_num(double_list, n_values, n))

#A sample run of the program is given and output attached.

Learn more :https://brainly.com/question/25434178

What are the chances of a baby zombie to spawn in full golden armor in MC? ​

Answers

Answer:

Baby Zombies can spawn naturally in the Overworld, but they only have a 5% chance to spawn. The player can also spawn one with a Zombie Spawn Egg. Baby Zombies can also be found riding a Chicken, creating a Chicken Jockey.

Explanation:

It is very unlikely for a baby zombie to appear wearing shiny golden armor.

Why is this so?

It is not common for a zombie to appear with armor, and it is even rarer for a baby zombie to wear a full set of golden armor.

The chance of this event happening is different for each version and if any changes have been made to the game. However, in the regular MC with no changes, the chances are usually low.

Learn more about MC

https://brainly.com/question/20307830

#SPJ2

Kayla is on-location shooting a wedding while her other employees will be holding down the office and taking care of any walk-ins. Kayla left them written reminders and instructions for some things that they need to take care of in her absence. How did Kayla MOST LIKELY leave these instructions?

A.
in shot lists being created for upcoming events

B.
in purchase orders for equipment that needs to be ordered

C.
in memos she wrote prior to leaving

D.
by telling the models who would be photographed that day

Answers

Answer: A

Explanation:

In short lists being created for upcoming events did Kayla MOST LIKELY leave these instructions. Hence, option A is correct.

What is short lists?

Every camera shot that needs to be recorded in a scene for a video production is listed in detail on a shot list.

A shot list, created by the director and cinematographer during pre-production, is a thorough list of each shot that must be taken on a particular shoot day. Its main objective is to deconstruct a scene into detailed phases that can be used as a guide for your day of shooting.

A shot list is a breakdown of each shot of each scene and the order in which you plan to shoot them, whereas a storyboard shows your cinematographer and production designer your vision for each specific scene.

Thus, option A is correct.

For more information about short lists, click here:

https://brainly.com/question/13099126

#SPJ2

Performing a vulnerability assessment on PCI DSS production systems, servers, and applications requires what types of applications and tools

Answers

Answer:

Q10. Performing a vulnerability assessment on PCI DSS production systems, servers, and applications requires what applications and tools? Answer:----------- Assessment tools, firewall applications Q11. Refer to the PCI DSS Self-Assessment

Explanation:

. Circle the correct choice for each statement 1. The number of substances in a mixture (can - cannot) be varied, for a compound they (can - cannot). 2. The different substances in a mixture (can - cannot) be joined chemically; a compound (can - cannot). 3. Substances in a mixture (do - do not) keep their own properties. 4. Substances in a compound (can - cannot) be easily separated; in a mixture, they (can - cannot). 5. Examples of (mixtures - compounds) are air, sea water, and most rocks. 6. Examples of (mixtures - compounds) are water, salt, and sugar. 7. Compounds are made of elements and have a (physical – chemical) formula. 8. A (solvent - solute) is the substance that dissolves in another substance. 9. True or False: A mixture cannot have five substances. 10. True or False: In a suspension, a substance may sink to the bottom.

Answers

Answer:

1 cannot

can

2 can

cannot

3 do not

4 can

cannot

5

what does project manager do?

Answers

project managers (PMs) are responsible for planning, organizing, and directing the completion of specific projects for an organization while ensuring these projects are on time, on budget, and within scope.

Which famous British physicist wrote A Brief History of Time?​

Answers

Answer:

Stephen Hawking

Which operating system might cause the desktop background to change unexpectedly?

A.) boot failure

B.) startup loop

C.) malware

D.) incompatibility

Answers

Answer:

C.) Malware

A boot failure would not load the desktop, same with a startup loop and incompatibility.

A user tries to open a movie in Windows Media Player but no image is displayed and only audio plays Which software must be installed on the computer?​

Answers

There are software that are often installed in systems for audio player. The software must be installed on the computer is Codec.

Codec is simply refered to as a short form for the word coder-decoder. It is known as an algorithm that is often used when encoding data. Example an audio or video clip.

The encoded data is often decoded as it is played back.

It act by limiting the size of media file and it also increases the processing power that is needed to play the file back correctly.

Learn more from

https://brainly.com/question/14338673

Why is it important to know the measurement of the component of the computer?

Answers

Computer has become very important nowadays because it is very much accurate, fast and can accomplish many tasks easily. Otherwise to complete those tasks manually much more time is required. It can do very big calculations in just a fraction of a second. Moreover it can store huge amount of data in it. CPU (Central Processing Unit)

It is the most important part of the computer as it performs the main function of information processing. It makes all the required calculations and processes data.

What is a characteristic of a magnetic reed switch?
Select one:
a. Switch contacts that are not enclosed
b. Bigger size than mechanical switches
C. High sensitivity to magnetic fields
d. Very high voltage flows through contacts

Answers

Answer:

option D is correct answer

Explanation:

Very high voltage flows through contacts.

hope this helps you

The answer is D.
Explanation:N/A
Other Questions
Yoko, Austin, and Dante served a total of 105 orders Monday at the school cafeteria, Yoko served 9 fewer orders than Austin. Dante served 4 times as manyorders as Yoko. How many orders did they each serve? Can you figure out if the slopes are parallel, perpendicular or neither and type the correct code? Please remember to type in ALL CAPS with no spaces. write ten great notes of important facts, details about the Industrial revolution in america after watching Imperialism A crash course by John Green searching for identify in image culture If I were to add alcohol to the education system what problems would I CREATE? Meaning what problems would BE MADE if I taught kids about alcoholA lot of people find this question confusing seasonal changes on earth are primarily caused by the 5 4/6-4 2/3 3 2/3? Points S, Q, R, and T all lie on the same line; Given. Arrows are drawn from this statement to the following three statements. Statement 1: The measure of angle SQT equals 180 degrees; Reason 1: Definition of a Straight Angle. Statement 2: The measure of angle SQV plus the measure of angle VQT equals the measure of angle SQT; Reason 2: Angle Addition Postulate. Statement 3: The measure of angle SQV plus the measure of angle VQT equals 180 degrees; Reason 3: Substitution Property of Equality. Lines UV and WZ are parallel; Given. An arrow is drawn from this statement to the following statements. Statement 4: The measure of angle VQT plus the measure of angle ZRS equals 180 degrees; Reason A. Statement 5: The measure of angle SQV plus the measure of angle VQT equals the measure of angle VQT plus the measure of angle ZRS; Reason B. An arrow also points from Statement 3 to Statement 5. An arrow from Statement 5 points to the following statements. Statement 6: The measure of angle SQV plus the measure of angle VQT minus the measure of angle VQT equals the measure of angle VQT plus the measure of angle ZRS minus the measure of angle VQT, the measure of angle SQV equals the measure of angle ZRS; Reason C. Statement 7: The measure of angle SQV is congruent to the measure of angle ZRS; Definition of Congruency. Which theorem accurately completes Reason A? Alternate Interior Angles Theorem Corresponding Angles Theorem Alternate Exterior Angles Theorem Same-Side Interior Angles Theorem How did the women's suffrage movement impact the United States? How did the women's suffrage movement impact the United States? States ceded many of their powers to the federal government. Political power shifted from urban to rural areas of the country. Political machines began to dominate both local and state politics. Government became more representative of the nation's population. !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!4 Lyla grew 16 flowers with 2 seed packets.How many seed packets does Lyla need to havea total of 40 flowers in her garden?Assume the relationship is directly proportional.seed packetsHelp now.no spam.no links PLEASE HELP NOW. guys i NEED your help if i cant answer this im DEAD ill give you 100 pts AND brainlest PLS HELP MEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE Select the correct answer.What literary period is the Beat Generation aligned with?OA. naturalism.realismO C. postmodernismOD modernismThe correct answer is C What are the three main jobs of a forensic scientist? Decide which of the following numbers does not belong in the group.108502603360And why does it not belong? where was Rigoberta Menchu Tum from QuestionThe table below gives the value of a hypothetical $10,000 investment in a certain money market fund. Use a calculator or aspreadsheet program to find an exponential regression model of the formy - ab' for the data set, and use it to estimatethe value of the investment 12 years after purchase.Time (years) Value of Investment (USD)010,000111,000212, 100313,310414,641516,105,1617,715.61 write me a lyric poem about (the fear of heights) (at least 4 - 7 verses) (does not have to rhyme)(correct grammar and no plagiarism) Thank you! What reason would support a counterclaim Write a Claim based in this question: What happens in the atmosphere and howis it related to the water cycle.