What is Symmetric and Asymmetric DSL?

Answers

Answer 1
Symmetric DSL. Symmetric Digital Subscriber Line (SDSL) is a kind of one kind of Digital Subscriber Line (DSL) used to provide high-speed Internet connectivity. Symmetric DSL is called “symmetrical” because the upstream and downstream connections have the same bandwidth.
Answer 2

Answer:

Symmetric DSL is called “symmetrical”

Explanation:


Related Questions

What are the advantages of using variables in a data type?

Answers

Answer:

A variable is a name associated with a data value; we say that the variable "stores" or "contains" the value. Variables allow us to store and manipulate data in our programs.

What are the key goal, performance, and risk indicators?

Answers

Answer:

KRIs are a way to quantify and monitor the biggest risks an organisation (or activity) is exposed to. By measuring the risks and their potential impact on business performance, organisations are able to create early warning systems that allow them to monitor, manage and mitigate key risks.

Effective KRIs help to:

Identify the biggest risks. Quantify those risks and their impact. Put risks into perspective by providing comparisons and benchmarks. Enable regular risk reporting and risk monitoring. Alert key people in advance of risks unfolding. Help people to manage and mitigate risks.

While KPIs help organisations understand how well they are doing in relation to their strategic plans, KRIs help them understand the risks involved and the likelihood of not delivering good outcomes in the future.

What is the role of the constructor for an object?

Answers

Answer:

A constructor is responsible for preparing the object for action.

A _____ is used by a host to forward IP packets that have destination addresses outside of the local subnet.

Answers

Ip packets are forwarded using the default gateway that is being used by the host.

Explanation:

Ip packets are forwarded using the default gateway that is being used by the host, where it has placed their destination addresses on the outside of the local subnet. The default router is another representation of the default gateway. It is also known as the default router. The computer sends the packets to the default router when it wishes to send to any other subnet. In-network this device is being a point of access to the other networks.

What is multiprogramming?

Answers

Answer:

Multiprogramming is a rudimentary form of parallel processing in which several programs are run at the same time on a uniprocessor. Since there is only one processor, there can be no true simultaneous execution of different programs. Instead, the operating system executes part of one program, then part of another, and so on. To the user it appears that all programs are executing at the same time.

Explanation:

Final answer:

Multiprogramming refers to a computer system running multiple programs at the same time by allocating system resources to multiple processes, maximizing CPU usage. It should not be confused with multitasking, which often relates to individuals performing several tasks simultaneously, a practice that can decrease efficiency if the tasks are complex.

Explanation:

Multiprogramming is a concept in computer science where a computer system runs multiple programs at the same time. This is achieved by having the operating system allocate resources to multiple processes in such a way that it maximizes CPU usage by switching between them. Each program is given a slice of the processor's time and then it is swapped out for another program, ensuring that the right amount of attention is given to each program without any one of them monopolizing the processor. This switching happens so quickly that it gives the illusion of programs running simultaneously.

While multiprogramming increases the efficiency of system resource utilization, it requires careful management of memory and CPU allocation to ensure that all programs get the necessary resources to operate effectively. It is different from multitasking, which generally refers to an individual performing several tasks at once, and often with variable success depending on the complexity of the tasks involved.

Moreover, in an agency or business context, multitasking can refer to an employee being given various roles or tasks and the need for incentives to guide not only the total effort of the employee but also the distribution of their time and effort across these tasks. This differentiation is important in designing incentives that are effective without negatively impacting the performance of the individual tasks.

Consider a hypothetical hard drive that has 400,000 cylinders, 8 heads, and 128 sectors per track. Demonstrate, in writing, how you would calculate the total capacity of this drive. Assume a sector size of 512 bytes and express your answer in GBytes, to the nearest whole GByte, as defined in computer Science.

Answers

Answer:

The approximately capacity of a hard disk drive is 195 GB

Explanation:

sector = 512 B

Sector per track = 128 = 64 KB

cylinder = 8 * 128 (512 KB)

cylinders = 400,000 * 512 KB = 195.3 GB

What is the current competitive position of Nintendo?

Answers

Answer:

Sony and Microsoft

Explanation:

Answer:

Sony and Microsoft.

Explanation:

Xbox is nintendo's biggest competitor in the gaming industry with PS4 hitting Nintendo hard.

Hope I helped!

Many organizations have policies that require users to: a. retain their passwords for a minimum of 30 days. b. include at least three consecutive letters of part of their name in their passwords. c. change their passwords on a regular basis. d. share their passwords with the administrator.

Answers

Answer:

Explanation:

Answer is C. Change their passwords on a regular basis.

Final answer:

Many organizations have policies that require users to retain passwords, include their name in passwords, change passwords regularly, and not share passwords with administrators.

Explanation:

Many organizations have policies that require users to:

Retain their passwords for a minimum of 30 days.Include at least three consecutive letters of part of their name in their passwords.Change their passwords on a regular basis.Do not share their passwords with the administrator.

These password policies are aimed at enhancing security and reducing the risk of unauthorized access to sensitive information. By enforcing password retention, organizations ensure that users regularly update their passwords, which makes it harder for hackers to guess or crack them. Additionally, requiring users to include part of their name in their passwords increases the complexity and uniqueness of the passwords, further strengthening security.

In the CRC checker at the receiver, the remainder that indicates error in the received data is:

a. a string of binary zeros

b. a string of binary ones

c. a string of alternating binary ones and zeros

d. not a string of binary zeros

Answers

B. A string of binary ones
A string of binary ones. Is the right answer

In cellular communication system the appropriate cell shape is circle True/False

Answers

Answer:

True

Explanation:

In cellular communication system the appropriate cell shape is circle.

In the system implementation phase of the systems development life cycle​ (SDLC), with​ ________ installation, the organization implements the entire new​ system/business processes on a limited portion of the business. A) pilot B) phased C) parallel D) plunge

Answers

Answer:

The correct answer is (A. pilot)

Higher-speed Ethernet technologies use an electronic device known as a Hub rather than a switch True/False

Answers

this should be false

In the context of intentional computer and network threats a ____ is a programming routine built into a system by its designer

Answers

Answer:

a. backdoor

backdoor (also called a trapdoor) is a programming routine built into a system by its designer or programmer. It enables the designer or programmer to bypass system security and sneak back into the system later to access programs or files.

Answer:

Backdoor

Explanation:

What is Expectation Gap?

Answers

Answer:

According to PakAccountants, "... Expectation gap is the term used to signify the difference in expectations of users of financial statements and auditor's expectation concerning audited financial statements."

“Auditing expectation gap or simply expectation gap is the term used to signify the difference in expectations of users of financial statements and auditor's expectation concerning audited financial statements.” - PakAccounts.com

A VPN: provides secure, encrypted communications using Telnet. is an Internet-based service for delivering voice communications. is an encrypted private network configured within a public network. is a proprietary networking service technology developed by individual corporations. is more expensive than a dedicated network.

Answers

Answer and Explanation:

VPN is an encrypted private network configured within a public network.

Typical applications are for employees accessing corporate network (private) through Internet (public).  Encryption and credentials contribute to security despite using a public network.

Describe the components of the Ethernet frame in detail?

Answers

Starts with an Ethernet header, which contains destination and source MAC addresses as its first two fields

Which of the following statements is false?

A Path object represents the location of a file or directory.

Path objects open files and provide file processing capabilities.

The Paths class is used to get a Path object representing a file or directory location.

The Path method isAbsolute returns false if the Path is relative.

Answers

Answer:

Path objects open files and provide file-processing capabilities. Actually, Path objects do not open files nor do they provide any file-processing capabilities. They specify only the location of a file or directory.

How do apps and devices call the OS?

Answers

OS will provide interface for an application to use, so an OS’s services as functions can be called from application programs (operating system acts as an intermediary between programs and the computer hardware)

Today, people working in cyberspace must deal with new and constantly evolving ________.

A. policy

B. risks

C. applications

D. threats

Answers

Am guess and say it’s B

How many hosts are in each subnet?

Answers

255.255.240.0 is a /20 subnet mask, therefore there are 4 borrowed bits (from the 3rd octet). Number of hosts on each subnetwork = (2 to the power 4) - 2 (i.e. 4 bits in host portion of address), which gives 14. So I got 16 subnetworks, and 14 hosts on each subnetwork.1

A file named data.txt contains an unknown number of lines, each consisting of a single integer. Write some code that creates two files, dataplus.txt and dataminus.txt, and copies all the lines of data1.txt that have positive integers to dataplus.txt, and all the lines of data1.txt that have negative integers to dataminus.txt. Zeros are not copied anywhere.

Answers

Answer:

I am doing it with python.

Explanation:

nums = '9 -8 -7 -6 -5 -4 -2 0 1 5 9 6 7 4'

myfile = open('data.txt', 'w')

myfile.write(nums)

myfile.close()

myfile = open('data.txt', 'r')

num1 = (myfile.read())

num1 = num1.split()

print(num1)

print(type(num1))

for x in num1:

   x = int(x)

   if x < 0:

       minus = open('dataminus.txt', 'a')

       minus.write(str(x) + ' ')

       minus.close()

   elif x>= 0:

       plus = open('dataplus.txt', 'a')

       plus.write(str(x)+' ')

       plus.close()

Answer:

#section 1

data = open('data.txt', 'r')

num = (data.read())

num = num.split()

data.close()

#section 2  

for x in num:

   x = int(x)

   if x < 0:

       minus = open('dataminus.txt', 'a')

       minus.write(str(x) + ' ')

       minus.close()

   elif x > 0:

       plus = open('dataplus.txt', 'a')

       plus.write(str(x)+' ')

       plus.close()

Explanation:

#section 1

A file data.txt containing an unknown number of lines each containing a single integer is opened.

The data is read from it and split to form a list from which the code will iterate over with a FOR loop and some conditional statements will be used to determine if the number is positive or negative.

#section 2

In this section two new files are created/ opened dataplus.txt and dataminus.txt and all the positive integers are stored in the dataplus.txt and the negative integers in the dataminus.txt.

The IF statement and elif statement used ensures that zero(0) is not captured ensuring that the code fulfills all the requirements in your question.

Explain what LIFO and FIFO mean, and how they are used in Abstract data types?

Answers

Answer:

LIFO stands for Last In First Out. This procedure is used in the Stacks in data structures.Stacks are the data types in which the data is stored called Stack.

Explanation:

What does technological convergence mean, with examples?

Answers

Answer:

Technological convergence is a term describes the layers of abstraction that enable different technologies t inter operate efficiently as a converged system. Convergent services such as VoIP, IPTV, Smart TV and others tend to replace the older technologies.

Explanation:

As a feature of society convergence can spur economic growth and change how people communicate on a global basis. A good way t evaluate the previous generations, items such as CD player, cassette deck, console TV or corded telephone each served only one function, whereas a single modern handheld computing device can meld several of those functions with hardly any user intervention required.

Final answer:

Technological convergence is the integration of different technologies into new products and services, such as smartphones and smart TVs, that impact various aspects of the economy and society. Countries in the converging economy invest in technology to catch up with leaders, incorporating advancements into their systems to improve productivity and quality.

Explanation:

Technological convergence refers to the trend where technologies that were initially quite distinct and unrelated combine to create new products and services that change how we live and work. Throughout the converging economy, countries invest in both physical and human capital to catch up with technology leaders, thus integrating technology into various aspects of their economies.

Examples of technological convergence include smartphones, which combine the functions of a phone, a camera, a web browser, and a music player, and smart TVs, which incorporate internet streaming, traditional broadcasting, and interactive media. Another example is modern agricultural practices that blend information technology, improved crop genetics, and advanced machinery to increase food production efficiency.

Technology, including new ways of organizing work, like the assembly line, and innovative methods for quality assurance in factories, represents a broad category of both tangible inventions and systemic innovations that drive productivity and quality improvements in numerous industries.

A(n)__________, the heart of an information system, is a collection of all relevant facts organized in a series of integrated files.processSelectobjectproceduredatabase

Answers

Answer:

database

Explanation:

An icon can be specified for a tab using the _____ method.

addTab
setIcon
setImage
tabIcon

Answers

Answer:

setIcon

Explanation:

In design support library the components like nav bar, floating action button, snackbar, tabs, labels and animation frameworks we use icons and different other designs to look theme appealing.

So the icon can be specified for a tab using the setIcon method.

tabLayout.getTabAt(0).setIcon(tabIcons[0]);

tabLayout.getTabAt(1).setIcon(tabIcons[1]);

A _____ is a modeling tool used in structured systems analysis and design (SSAD) analysis model that helps break down a complex process into simpler, more manageable, and more understandable subprocesses

Answers

A "DATA FLOW DIAGRAM" is a modeling tool used in structured systems analysis and design (SSAD) analysis model that helps break down a complex process into simpler, more manageable, and more understandable subprocesses

Jack was shocked to witness the sudden drop in performance of his laptop. He also found that the screen saver constant changed and that the taskbar had disappeared. The given problems are symptoms of _____ infections. Select one: a. rootkit b. smishing c. phishing d. bootkit

Answers

Answer: bootkit

This is the answer because the hacker was not trying to get any private information, so a bootkit would be the correct answer. A bookit uses a program to basically destroy your computer from the inside, starting from the motherboard.

Hope this helps!

1. When a program routine constantly looks a certain condition and executes a command when the condition is met, this is called:

a. Sampling

b. Polling

c.Interrupting

d. Triggering

Answers

This is Called Polling

99 POINTS HELP ASAP PLEASE!!!
Select the mathematical statement that is true.
A.22 % 2 > −3
B.22 % 2 < 5
C.22 % 2 == 4
D.22 % 2 != 1

This is for my python coding class thank you

Answers

^ because 22 is even, it has a remained of 0

D

Answer:

D. 22 % 2 != 1

Explanation:

Since 22 is even than it would have to stay 0.

Therefore, your only answer choice would be D.

Which disc store compacity for full lenght movie? dvd or cd

Answers

DVDS have a lot more available bytes for use compared to a CD. Movies are typically take up a LOT of space- so DVDS are your best option
Other Questions
Which customers help in the profitability and growth of an organization? Both external and customers help in the profitability and growth of an organization in a direct or indirect manner. Consider a solenoid of length L, N windings, and radius b (L is much longer than b). A current I is flowing through the wire. If the length of the solenoid became twice as long (2L), and all other quantities remained the same, the magnetic field inside the solenoid would: A: become twice as strong. B: remain the same. C: become one half as strong. A particle travels in a straight line with speed v.The particle slows down and changes direction. The new speed of the particle is v\2The new velocity has a component of v\4in the same direction as the initial path of the particle.Through which angle has the particle turned?A 27 B 30 C 45 D 60 Studies indicate that the methyl radical is trigonal planar. Based on this, which of the following best describes the methyl radical? The carbon is sp2 hybridized and the unpaired electron occupies an sp2 orbital. The carbon is sp2 hybridized and the unpaired electron occupies a 2p orbital. The carbon is sp3 hybridized and the unpaired electron occupies an sp3 orbital. The carbon is sp3 hybridized and the unpaired electron occupies a 2p orbital. After railroads, the next revolution of transportation came with the development of the__?(A) Automobile(B) Telegraph (C) Steam engine Write the werbs in the right thense form1 Skateboarding (1) _____ recently _____ a very popular sport (to become). All a person needs to enjoy this sport (2) _____ a skateboard, good balance, and some practice (to be). It is a good idea to use helmets and kneepads becouse even the best skateboard (3)_____ sometimes (to fall). To begin skateboarding, put one foot on the skateboard and push forward with the other foot. When you get moving fast enough put both feet on the board. You (4) _____ your balance by moving your arms and body (to keep). The more you practice the easier it (5)_____ (to become).2 Jewellery and coins (1)_____ last night from the home of Mr. and Mrs. Smiths (to be stolen). At about 1.30 a.m., a young man (2)_____ the Smiths' garden by a neighbour (to be seen).The police were informed immediately by the neighbour's wife.Ten minutes later, the man was caught as he (3) _____ the garden and was taken to the policestation forquestioning (to leave). His pockets were searched. Rings and gold coins worth over 3000 were found. When the man was questioned about the theft, he (4)______,(to say) "It was easy.A window (5) _____ and the safe wasn't locked" (To be open) What country has the highest obesity rate PLEASE HELP ME !!!!!!!!!!!! At Southside Middle School, 40% of the students play an instrument. There are 305 students. How many students play an instrument? A.40 students B.140 students C.122 students D. 256 students Enough of a monoprotic weak acid is dissolved in water to produce a 0.0172 M solution. If the pH of the resulting solution is 2.39 at 20 C, determine the pKa for the acid. What is the least densely populated country in the european union? Which statement does a nearby city incinerating its trash suggest? A. They conserve their trash. B. They burn their trash C. They release the trash into a nearby stream D. They treat their trash with chemicals before putting it in a landfill The theories on the expansion of galaxiesMaybe Re-examined To Strengthen Science Should Not Be Tested To Strengthen ScienceWill Weaken Scientific Knowledge If They ChangeWill Become Laws If They Don't Change Which of the following statement about women in the workforce is false Tere: De quin es esta bufanda de lana? Alejandro, es ? Alejandro: No, no es . Yo no llevo bufandas. Pero estos guantes s son . Los compr el ao pasado. Carlos: Oye, Alejandro, por qu tienes ese televisor en tu caja (box)? Es de Tere y mo. No es y t lo sabes. Alejandro: No es de vosotros! No es ! El televisor de vosotros est en vuestra habitacin. Tere: Esta vez Alejandro tiene razn, Carlos. Pero Alejandro, qu haces con esas gafas de sol? Son de Carlos. Alejandro: No son ! No son de Carlos! Perdi sus gafas de sol la semana pasada. Carlos: No recuerdo. Pero Alejandro, por qu tienes esos calcetines en tu maleta (suitcase)? No son de Carlos? Alejandro: Ah... ah... pues, este... pues s. Son de Carlos. Los calcetines son . Yo no s cmo se metieron (they got in) en mi maleta. Qu extrao! Tere: S, qu curioso! If there are 7 boxes of books and there are 126 books in total , how many books are there per each box? Nohbdy, Nohbdy's tricked me, Nohbdy's ruined me!' To this rough shout they made a sage reply: 'Ah well, if nobody has played you foul there in your lonely bed, we are no use in pain given by great Zeus. Let it be your father, Poseidon Lord, to whom you pray.' So saying they trailed away. And I was filled with laughter to see how like a charm the name deceived them. Which two factors contributed to the spread of Islam in Africa? (btw its TWO factors not just 1)A) Islam was already practiced by people in Africa.B) Many Africans no longer believed in their own religions.C) The Islamic empire extended into North Africa.D) The gold-salt trade brought Islamic Arabs into western and southern Africa. The question is: Shall we attempt to establish ourselves as a power in the far East and possess the Philippines for glory? . . . [I]f we take the Philippines . . . they will yield us nothing, and probably be a source of annual expense. Certainly they will be a grievous drain upon revenue if we consider the enormous army and navy which we shall be forced to maintain upon their account. . . .Whether the United States maintain its present unique position of safety, or forfeit it through acquiring foreign possessions, is to be decided by its action in regard to the Philippines.Carnegie says that what the United States decides to do with the Philippines is important becauseit will determine the nations future revenuesit will allow the nation to win power and gloryit will determine the future security of the nation How is finding the fourth vertex of a parallelogram that is not a rectangle or a square the same as it is for a rectangle or square? How is it different? The magna carta led to the creation of parliament. true or false