There is an important measurement of network capacity called the
Bandwidth Delay Product (BDP). This product is a measurement of how
many bits can fill up a network link. This product is a measurement

Answers

Answer 1

The Bandwidth Delay Product (BDP) for the given scenario, where two hosts A and B are connected by a direct link of 2 Mbps and separated by 20,000 km, is 1,600,000 bits. The BDP is calculated by multiplying the bandwidth (2 Mbps) by the round trip time (RTT).

To calculate the RTT, we need to consider the distance between the two hosts and the propagation speed of the link. The distance between the hosts is 20,000 km, and the propagation speed is given as 2.5 x 10⁸ m/sec. To convert the distance to meters, we multiply 20,000 km by 1000, resulting in 20,000,000 meters.

Using the formula RTT = distance / propagation speed, we can calculate the RTT. Plugging in the values, we get RTT = 20,000,000 m / (2.5 x 10⁸ m/sec) = 0.08 seconds.

Finally, we calculate the BDP by multiplying the bandwidth (2 Mbps) by the RTT (0.08 seconds), resulting in 2,000,000 bits/sec × 0.08 sec = 1,600,000 bits. Therefore, the BDP for this scenario is 1,600,000 bits.

In summary, the Bandwidth Delay Product (BDP) for the given scenario of two hosts connected by a 2 Mbps link separated by 20,000 km is 1,600,000 bits. This value is calculated by multiplying the bandwidth by the round trip time, where the round trip time is determined by dividing the distance by the propagation speed.

Learn more about Bandwidth Delay Product here:

https://brainly.com/question/17102527

#SPJ11

The complete question is:

(This problem is based on P25 in Chapter 1 of the Kurose and Ross textbook.) There is an important measurement of network capacity called the Bandwidth Delay Product (BDP). This product is a measurement of how many bits can fill up a network link. It gives the maximum amount of data that can be transmitted by the sender at a given time before waiting for acknowledgment. BDP = bandwidth (bits per sec) * round trip time (in seconds) Calculate the BDP for the scenario where two hosts, A and B, are separated by 20,000 km and are connected by a direct link of R = 2 Mbps. Assume the propagation speed over the link is 2.5 x 108 m/sec. (Remember to use the round trip time (RTT) in your calculation.) 320,000 bits O 120,000 bits O 1,600,000 bits O 80,000 bits


Related Questions

State The function
of floppy disk​

Answers

Answer:

A floppy disk drive (FDD) is a small disk drive used in computers for data transfer, storage and backup of small amounts of data, as well as installation of programs and driver updates. A floppy disk drive accesses data recorded on small, removable diskettes known as floppy disks.

Dsl is an example of what type of internet access?.

Answers

Answer: Digital Subscriber Line (broadband connection)

A USB flash drive uses solid
technology to store data and programs.

Answers

Answer:

This is true.

What is the answer to 4.9 Code Practice: Question 2

Answers

Answer:

sum = 0

for i in range(20, 100, 10):

sum = sum + i

Print(sum)

Explanation:

The answer to 4.9 Code Practice: Question 2 is 200  of the total output.

What is the output?

An output record that a laptop sends. Computers best paintings with virtual information. Any entry that a laptop gets have to be digitised. Often records must be transformed and returned to an analogue layout whilst it is output, as an instance the sound from a laptop's speakers.

The answer to 4.9 Code Practice: Question 2 is 200 output of all the total outputs this is the answer.

Read more about the Code :

https://brainly.com/question/3653791

#SPJ2

What prevents someone who randomly picks up your phone from sending money to themselves using a messenger-based payment?

Answers

Answer:

Explanation:

There are various safety features in place to prevent such scenarios from happening. For starters phones usually have a pin code, pattern code, or fingerprint scanner which prevents unauthorized individuals from entering into the phone's services. Assuming that these features have been disabled by the phone's owner, payment applications usually require 2FA verification which requires two forms of approval such as email approval and fingerprint scanner in order for any transactions to go through. Therefore, an unauthorized individual would not have access to such features and would not be able to complete any transactions.

The feature which prevents someone who randomly picks up your phone from sending money to themselves using a messenger-based payment is:

Security features like passwords or authentication codes

In a messenger-based payment system, there exists various safety features which prevents unauthorised use of the system to send money fraudulently. Some of these features include:

PasswordsPersonal Identification Number (PIN)Two factor authentication (2FA)

As a result of this, we can see that these features prevent someone from making unauthorised money transfers.

Read more here:

https://brainly.com/question/19469131

Which type of information includes personal payroll medical and operational information.

Answers

Personal payroll, medical, and operational information are examples of "sensitive" information.

What is meant by sensitive information?

Sensitive data as information that must be protected from unauthorized access as well as unwarranted disclosing in order to maintain an individual's or organization's information security.

Sensitive information, unlike public information, is not gathered from unrestricted directories and excludes any changes are passed lawfully accessible to the general population from government records. This means that exposing sensitive data may result in financial as well as personal harm. Personal information, also known as PII (personally identifiable), is any data that may be linked to a particular individual and is used to enable identity theft. Knowing a person's Social Security number and mother's maiden name, for example, makes it easier to obtain a credit card in their name.

Thus, personal payroll, medical, and operational information are examples of "sensitive" information.

To know more about the sensitive information, here

https://brainly.com/question/26959476

#SPJ4

What are some useful applications of video games?

Answers

Answer:

Steam, Origin, Uplay and epic games

Explanation:

The following state table represents a sequential circuit with two T flip-flops A and B and one input x and one output y. |- Insert the values of; TA, TB and the current state output y(t), if y(t)=[A"(t).B (t)] Excitation table for T-flip flop Q(t) Q(t+1) T 0 0 0 0 1 1 0 1 1 0 1 1 DECI х B(t+1) TA TB y(t) A(t) 0 B(t) 0 0 A(t+1) 1 0 1 0 0 1 0 0 1 2 0 1 0 1 3 0 1 1 0 0 4 1 0 0 0 0 5 1 1 1 1 1 1 0 1 1 0 1 1 1 0 L23 ii- Express TA in decimal(DEC) sum of minterms; TA = Em ili-Express TB in decimal(DEC) sum of minterms; TB = Em

Answers

TA is expressed in decimal (DEC) sum of minterms as 24 because it is equal to the sum of the 8th and 16th minterm (1 0 0 1 and 1 0 1 0).

What is decimal?

Decimal is a number system where each digit in a number holds a power of 10. It is based on the Hindu-Arabic numeral system, which is composed of 10 numerals (0, 1, 2, 3, 4, 5, 6, 7, 8, and 9). The decimal system is used to represent fractions, as it allows a fractional part of a number to be expressed in a simple and convenient form. Decimals are often used to represent numbers that cannot be represented exactly as fractions, such as 1/3 or 0.333.

TB is expressed in decimal (DEC) sum of minterms as 48 because it is equal to the sum of the 16th and 32nd minterm (1 0 1 0 and 1 1 0 0).

To learn more about decimal
https://brainly.com/question/9480337
#SPJ4

1. It is another multimedia type you can work with in PowerPoint. If you have this on
your computer like an MP3 or WAV file, you can easily add them to your presentatie
A. Audio
C. Effects
B. Computer
D. Video
2. The simplest way to add an image to PowerPoint
A. Copy and Paste
C. Insert Image
B. Edit Presentation
D. Resize and Click
3. It is a stand-alone presentation that includes information presented with slides,
video, or digital representations and includes sound which might be a narrative,
music or sound effects.
A. Automated Presentation
C. Multimedia Presentation
B. Information Communication
D. Technology Presentation
1c​

Answers

Answer:

1. Audio.

2. Copy and paste.

3. Multimedia presentation.

Explanation:

PowerPoint application can be defined as a software application or program designed and developed by Microsoft, to avail users the ability to create various slides containing textual and multimedia informations that can be used during a presentation.

Some of the features available on Microsoft PowerPoint are narrations, transition effects, custom slideshows, animation effects, formatting options etc.

1. Audio is another multimedia type or format that an end user can work with in PowerPoint. If end users have an audio file such as MP3 or WAV file on their computers, they can easily add them to their presentation using Microsoft PowerPoint.

2. In Microsoft PowerPoint, one of the simplest way to add an image to a presentation is to copy the image from a directory and paste it on the work area.

3. Multimedia presentation is a stand-alone presentation which typically involves presenting informations with graphics, slides, texts, video, or digital representations and sound which might be a narrative, music or sound effects.

Which local folder temporarily stores all sent mails until they are successfully sent to a recipient

Answers

Answer:

The outbox stores all outgoing emails until the Email programs sends them to a recipient.A computer or phone's outbox is a folder where emails that are awaiting sending are kept

Explanation:

a cache may be organized such that: in one case, there are more data elements per block and fewer blocks in another case, there are fewer elements per block but more blocks however, in both cases - 1.0., larger blocks but fewer of them or shorter blocks, but more of them - the cache's total capacity (amount of data storage) remains the same what are the pros and cons of each organization? support your answer with a short example assuming that the cache is direct mapped (ii) assume: a processor has a direct mapped cache data words are 8 bits long (i.e., 1 byte) data addresses are to the word a physical address is 20 bits long the tag is 11 bits each block holds 16 bytes of data how many blocks are in this cache? (in) consider a 16-way set-associative cache: - data words are 64 bits long - words are addressed to the half-word - the cache holds 2 mbytes of data - each block holds 16 data words - physical addresses are 64 bits long how many bits of tag, index, and offset are needed to support references to this cache?

Answers

One configuration of a cache may have more collected data per block and lesser blocks, whereas another configuration may have lower pieces per block but far more blocks.

What is the purpose of cache?

The temporary memory referred to as "CPU cache memory" is called cache. Your computer's chip-based function enables you to access some data faster than you could if you were accessing it from the primary hard drive.

Briefing:

1) Employees are desirable individuals in desirable locations, unparallel growth is expanded in rapidly, workers can shift their tasks, working environments are friendly and stress-free, organizations need concrete results, the stakes are large in valuation, there is more latitude in decision-making, more power and responsibility for business operations, advancement in the developing stage, etc.

2) When an organization's structure is functioning correctly and effectively, it can raise its profit margin, uphold high standards of management, and engage its workforce in its expansion.

To know more about cache visit:

https://brainly.com/question/28232012

#SPJ4

Which of the following displays shadow to the right and the bottom sides of the h1 block-level element?
- h1 {box-shadow: 25px 25px 50px dimgrey;}

- h1 {box-shadow: -25px -25px 50px dimgrey;}

- h1 {box-shadow: 25px -25px 50px dimgrey;}

- h1 {box-shadow: -25px 25px 50px dimgrey;}

Answers

The CSS rule "h1 {box-shadow: 25px 25px 50px dimgrey;}" displays a shadow to the right and bottom sides of the h1 block-level element.

The box-shadow property in CSS allows us to add shadows to elements. The values specified for box-shadow determine the position and appearance of the shadow. The syntax for the box-shadow property is "h-shadow v-shadow blur spread color".

In the given options, the correct answer is "h1 {box-shadow: 25px 25px 50px dimgrey;}". This rule specifies a horizontal shadow offset of 25 pixels (to the right), a vertical shadow offset of 25 pixels (to the bottom), a blur radius of 50 pixels, and a shadow color of "dimgrey". This configuration creates a shadow that is positioned to the right and bottom sides of the h1 block-level element.

The other options, such as "h1 {box-shadow: -25px -25px 50px dimgrey;}" (top-left shadow), "h1 {box-shadow: 25px -25px 50px dimgrey;}" (top-right shadow), and "h1 {box-shadow: -25px 25px 50px dimgrey;}" (bottom-left shadow) would display shadows in different directions.

Learn more about CSS here:

https://brainly.com/question/32535384

#SPJ11

Write a program that will add up the series of numbers: 99,98, 97...3.2.1. The program should print the running total as well as the total at the end.
The program should use one for loop, the range() function and one print() command.
Sample Run
99
197
294
390
-
4940
4944
4947
4949
4950

Answers

Answer:

result = 0

for i in range(99, 0, -1):

   result += i

   print(result)

Explanation:

It gives back a series of numbers that begin at zero, increase by one by default, and end just before the specified number. There are three criteria total, and two of them are optional.

What range() function and one print() command?

For the range() method to produce the integers in reverse order, use a negative step value. For instance, the expression range(5, -,1, -1) will result in the integers 5, 4, 3, 2, and 1.

By setting the step argument of a range() function to -1, you may effectively reverse a loop. Reverse iteration of the for loop's iterations will result.

The range() function returns a series of numbers that, by default, starts at 0 and increments by 1 before stopping in a given number.

Therefore, Instead of being a physical hardware device, a software calculator is one that has been implemented as a computer program.

Learn more about function here:

https://brainly.com/question/18065955

#SPJ5

which of the following statements is true regarding the hierarchy of terms that a court uses in order to determine which contradictory terms control the contract? question 12 options: there is no hierarchy of terms in a contract. typed terms control handwritten terms, which control printed terms. handwritten terms control typed terms, which control printed terms. printed terms control typed terms, which control handwritten terms. printed terms control handwritten terms, which control typed terms.

Answers

Typed terms are controlled by handwritten terms, which are controlled by printed terms, etc.

Which of the following phrases describes a circumstance where a third party enters into a contract in place of one of the original parties?

Novation, which requires the approval of all three parties, is the replacement of one of the parties in a two-party agreement. An old obligation gets novated when a new one is taken over.

The parol evidence rule should be defined as which of the following?

That is the intent of the "parol evidence" rule. If a contract is in writing, any oral or written evidence that conflicts with or supplements the written agreement will be rejected.

To know more about handwritten terms visit :-

https://brainly.com/question/13651174

#SPJ4

given a string matrix we in that need to find the
number which is occured two times or more than two times and and
give the sum of those numbers
Sample input::
[1 3 4
3 6 8
8 6 8]
Output:
3+8=11"
Plea

Answers

Given a string matrix, we need to find the number that occurred two times or more than two times and give the sum of those numbers. In order to do this, we can take the following approach:We can convert the string matrix into an integer matrix. We can create an empty dictionary. We will iterate through each element in the matrix.

If the element is not present in the dictionary, we will add it with the value 1. If the element is already present in the dictionary, we will increment its value by 1. After iterating through the matrix, we will iterate through the keys of the dictionary and add the sum of the keys whose values are greater than or equal to 2. The sum of these keys will be the desired output.

Here is the implementation of the above approach in Python: matrix = [[1, 3, 4], [3, 6, 8], [8, 6, 8]]d = {}# Convert string matrix to integer matrix for i in range(len(matrix)):    for j in range(len(matrix[i])):        matrix[i][j] = int(matrix[i][j])# Populate dictionary with occurrences of each number for i in range(len(matrix)):    for j in range(len(matrix[i])):        if matrix[i][j] not in d:            d[matrix[i][j]] = 1        else:            d[matrix[i][j]] += 1# Calculate sum of numbers that occurred 2 or more times sum = 0for key in d:    if d[key] >= 2:        sum += key print(sum) In the given problem, we have a matrix of strings and we need to find the numbers that occurred two or more times and sum them up. To solve this problem, we first need to convert the string matrix into an integer matrix. We then need to iterate through each element in the matrix and populate a dictionary with occurrences of each number in the matrix.

To know more about matrix visit:

https://brainly.com/question/29132693

#SPJ11

Character string is not in a standard unambiguous format
a. True
b. False

Answers

This statement is ambiguous and it depends on the context.

If we are talking about a specific character string, then the statement could be true or false depending on whether the string is in a standard unambiguous format or not.

If we are talking in general terms about character strings, then the statement is false because character strings can be in a standard unambiguous format. For example, strings that represent valid dates or times can be formatted in a standard and unambiguous way such as ISO 8601 format.

Therefore, without additional context, it is not possible to determine whether the statement is true or false.

To get a similar answer on database:

https://brainly.com/question/30627764

#SPJ11

What parts of the computer does it not need to function?​

Answers

Fancy lights, mouse, keyboard, you can do fan but the computer will eventually overheat, it need coolant for it to run for a long while

3 things in terms of photography to learn about.

Answers

The three important principle in photography are;

Light Subject and Composition.

What is the explanation for these terms?

Photography is about light. Without it, you couldn't even take images, let alone excellent ones.

The quality of light varies from one to photograph, yet it is always what gives your photographs their underlying structure. It doesn't get any more basic than that.

Most of us snap photos because something catches our attention.

Unsurprisingly, that "something" is your subject.

If you're explaining a photograph to someone else, the topic is most likely the first thing you'll mention.

Finally, the composition is the third and most important aspect of every shot.

Simply said, composition is the arrangement of the things in your shot. It includes your camera position, the connections between photo elements, and the things you accentuate, deemphasize, or altogether eliminate. Composition is the method through which you communicate your tale.

Learn more about photography:
https://brainly.com/question/30685203
#SPJ1

A credit card company receives numerous phone calls throughout the day from customers reporting fraud and billing disputes. Most of these callers are put "on hold" until a company operator is free to help them. The company has determined that the length of time a caller is on hold is normally distributed with a mean of 2.5 minutes and a standard deviation 0.5 minutes. If 1.5% of the callers are put on hold for longer than x minutes, what is the value of x? Use Excel, and round your answer to two decimal places.

Answers

Answer:

3.59 minutes

Explanation:

We solve this question using z score formula

Using Excel

Z-SCORE= (DataPoint-AVERAGE(DataSet))/STDEV(DataSet)

IN EXCEL,

AVERAGE, an excel function that calculates the Average of data set

STDEV.S: calculates the standard deviation while treating the data as a ‘sample’ of a population.

STDEV.P: This function calculates the standard deviation while treating the data as the entire population.

Z score formula = x - μ/σ

x = ?? μ = 2.5 minutes σ = 0.5 minutes

We are asked : If 1.5% of the callers are put on hold for longer than x minutes, what is the value of x?

Hence, Longer than = Greater than =

100 - 1.5%

= 100 - 0.015

= 0.985 ( 98.5%)

Using Excel we calculate = z score for 98.5 percentile

= 2.1701

Z score = x - μ/σ

2.1701 = x - 2.5/0.5

2.1701 × 0.5 = x - 2.5

1.08505 = x - 2.5

x = 1.08505 + 2.5

x = 3.58505

Approximately to 2 decimal places = 3.59 minutes

Therefore, 1.5% of the callers are put on hold for longer than 3.59 minutes.

4. (10 marks) The Model View Controller (MVC) pattern is used in web development to structure an application. (a) (4 marks) Describe the job of the Controller in this pattern and how it interacts with

Answers

The Model View Controller (MVC) pattern is used in web development to structure an application. The main idea behind MVC is to create three interconnected components namely Model, View and Controller that differentiate application logic and user interface.

The job of the controller in the MVC pattern is to accept input from the user and after that perform appropriate validation. Once the data has been confirmed by the controller, it is sent to the model where it can be processed. After the processing is done, the model returns data back to the controller. The controller will then send the data to the view for display to the user.

The controller is responsible for managing the flow of the application. When the user sends a request to the application, the request is managed by the controller. The controller communicates with the model to obtain data to return to the user. The controller is responsible for choosing the appropriate view for displaying the data to the user.The controller also manages the user input, which is obtained through the view.

When a user sends a request to the application, the request is handled by the controller, which determines which action to take and what response to provide.The controller is responsible for the business logic of the application. It manages the flow of the application by interacting with both the model and view. The controller is the core of the application, and it determines the behavior of the application.

To learn more about MVC :

https://brainly.com/question/30755991

#SPJ11

you are given a dataframe consisting of three columns and four rows. a ufunc is then applied to that dataframe and another dataframe is outputted. how many columns are present in that final dataframe

Answers

If a person is given a dataframe consisting of three columns and four rows. the columns that are present in that final dataframe is 7.

What is a DataFrame?

A DataFrame is known to be a term that connote a kind of a data structure that put together data into a kind of a 2-dimensional table that is said to be made up of rows and columns, such like a spreadsheet.

Note that DataFrames are said to be one of the most popular data structures that is said to be used in modern data analytics due to the fact that they are a flexible and good way of saving and working with data.

Hence, If a person is given a dataframe consisting of three columns and four rows. the columns that are present in that final dataframe is 7.

Learn more about  data frame from

https://brainly.com/question/24024733

#SPJ1

how many times is the statement possibleindex--; in line 10 of the method executed as a result of the call to insertionsort ?

Answers

There are 5 times the statement possibleIndex--; in line 10 of the method executed as a result of the call to insertionSort.

What is an insertion sort algorithm?

The straightforward selection sort known as insertion sort produces the final binary sequence each individual item at a time through comparisons. In comparison to more sophisticated algorithms like sequential, merge sort or bubble sort, it performs significantly worse on huge lists.

Similar to how we sort chips in our deck in a game called, insertion sort works in the same way. Since we already know that the first card is sorted, we choose an unsorted card. There are to be interpreted in the line of 5. This will create an the possibleIndex.

Learn more about insertion sort algorithm, Here:

https://brainly.com/question/13326461

#SPJ1

The question is incomplete, the complete question will be :

Consider the following correct implementation of the insertion sort algorithm.

public static void insertionSort(int[] elements)

{

for (int j = 1; j < elements.length; j++)

{

int temp = elements[j];

int possibleIndex = j;

while (possibleIndex > 0 && temp < elements[possibleIndex - 1])

{

elements[possibleIndex] = elements[possibleIndex - 1];

possibleIndex--; // line 10

}

elements[possibleIndex] = temp;

}

}

The following declaration and method call appears in a method in the same class as insertionSort.

int[] arr = {10, 8, 3, 4};

insertionSort(arr);

How many times is the statement possibleIndex--; in line 10 of the method executed as a result of the call to insertionSort ?

Define a class Sphere to input radius of a sphere and compute the volume of it. Volume = πr3 (where π=3.14)​

Answers

Lets use Python

Program:-

\(\tt r=(float(input("Enter\:the\:radius\:of\:Sphere=")))\)

\(\tt V=4/3*3.14*r**3\)

\(\tt print("Volume\:of\:the\:sphere=",V)\)

Output:-

\(\tt Enter\:the\:radius\:of\:the\:sphere=3\)

\(\t Volume\:of\:the\:Sphere=103.4\)

Binary is represented by two digits, write out each and describe what each means:

Answers

Answer:

binary is represented by 1 and 0

Explanation:

the binary of 1 means it has value, and the binary of 0 means it has no value. with a combination of 1s and 0s, you can get a complex program to run, like this platform :) what it basicly does is a true or false kinda think. just think of it that way: true or false, value or no value, and yes or no. the 1 is a positive value and the 0 is a negative value that has no value.

I hope this helps you :D

In binary, the 0s and 1s signify OFF and ON, respectively.

What do the binary numbers 1 and 0 represent?

In binary, the 0s and 1s signify OFF and ON, respectively. A "0" in a transistor indicates that no electricity is flowing, while a "1" indicates that electricity is flowing.

Numbers are physically represented inside the computing equipment in this fashion, allowing calculations.

Learn more about binary numbers here:

https://brainly.com/question/13371877

#SPJ4

write a function that accepts an array of numbers as an argument and returns their average. 2. write a function that accepts an array of numbers as an argument and returns the largest number in the array

Answers

The above program defines two functions, one to find the average of an array of numbers and the other to find the largest number in an array of numbers.

Write a function that accepts an array of numbers, arguments and, returns their average and largest number?

1. Function to find the average of an array of numbers function findAverage(arr) {let sum = 0;for(let i = 0; i < arr.length; i++) {sum += arr[i];}let avg = sum/arr.length;return avg;}// calling the function with an array of numbersconsole.log(findAverage([1, 2, 3, 4, 5])); // output: 3 // 2. Function to find the largest number in an arrayfunction findLargestNumber(arr) {let largest = arr[0];for(let i = 1; i < arr.length; i++) {if(arr[i] > largest) {largest = arr[i];}}return largest;}// calling the function with an array of numbersconsole.log(findLargestNumber([1, 2, 3, 4, 5])); // output: 5

Learn more about the Function of an array

brainly.com/question/13543316

#SPJ11

Who do you like more?

Lolbit

-or-

Mangle

Who do you like more?Lolbit-or-Mangle

Answers

Answer: lolbit

Explanation: she is my glitchy idol along with the shadows and Mr. Afton's cult.

Who do you like more?Lolbit-or-Mangle

Answer:

Mangle

Explanation: just because.

a(n) ____ in a sql command instructs oracle 12c to use a substituted value in place of the variable at the time the command is actually executed.

Answers

A bind variable in a SQL command instructs Oracle 12c to use a substituted value in place of the variable when the command is executed.

It is a placeholder in a SQL statement where a data value is expected to be substituted. Bind variables are used to pass data into a SQL statement in a secure and efficient manner.

A bind variable is a parameterized SQL statement element. Bind variables are utilized in SQL commands to replace data with literal values. They assist to keep your query safe, as data injection attacks can't occur, and they assist to improve query performance.

Learn more about SQL commands at

https://brainly.com/question/32924871

#SPJ11

you've finished programming the app! Now your company has to decide whether to use an open source
license or proprietary license. explain which one you would choose and why.​

Answers

Answer:

Proprietary License gives you full ownership and trademark/patent opportunites. Open source allows for code donation and a community based development for your app. Generally speaking, if your a private entity creating an app for a client, you'll need the Proprietary Licence, which will allow you to sell the codebase to your client.

If your creating an app for your company as itself, you go either way, sell the license in licensing agreements, or have your companies community contribute and better your app from the inside.

Its entirely based on the agreements you set for the app.

Which of the following is a benefit of display advertising over search advertising?

A
Display advertising is cheaper than search advertising

B
Appearing on relevant websites offering advertising space

C
Ads can appear at the top of search engine results pages

D
Display ads are more likely to be clicked on​

Answers

Answer:

D.

Explanation:

Which field in the contacts form is used to control the order in which contacts are displayed in the current view.

Answers

Answer: File as

Explanation:

A contact form is simply refered to as a web based form which is usually short and then published on the website which can be filled out by people in order to pass a message across to the person who owns the site.

The field in the contacts form that is used to control the order in which the contacts are displayed in the current view is "File As".

Other Questions
Which is FALSE?A) In eukaryotes, DNA polymerase I activity removes the flap(=primer-overhang) created by synthesis of the next Okazaki fragment.B)In eukaryotes there is no DNA polymerase that has 5 to 3 nick translation activityC)The FEN1 exo/endonuclease (MF1) cuts the flap=primer-overhang created by synthesis of the next Okazaki fragmentD)Prokaryotic ligase and eukaryotic ligase 1 seal gaps between Okazaki fragments in DNA replication 1 and 2 answer choice help please? Which of the following correctly describes the effect of sympathetic division of ans on the cardiac activity. How many solutions, in positive integers less than 10, does the equation x + y + z = 20have? participative leadership is not regarded as effective in high power distance cultures. T/F Is Jim free at the end of Huck Finn?. If a family does not financially qualify to buy a home in a specific neighborhood, must the real estate agent still show them that home? An economic and political system in which the government owns and controls all goods and means of production, and private property is eliminated.a. Trueb. False A woman who is a carrier for a sex-linked recessive trait has children with a man who does not have that trait. What is true about their offspring? Choose 1 answer: Which of the following would be correct as to when atomic bombs were used in real life in Japan?A. during WWIB. at the end of the Cold WarC. At the end of WWIID. In the Butter Battle Which properties does uranium-238 have? what is the main food in Mountain region Which is an example of mechanical weathering?a. carbonic acid in water dissolving limestoneb. water combining with rock crystals to form hydratesc. colonies of bacteria releasing chemical enzymes and acids that break down mineralsd. salt crystallization weathering project management appears to be ideally suited for a business environment requiring accountability, flexibility, innovation and repeatability. A replacement water filter A will provide a user with x gallons of filtered water for a cost of y dollars. This relationship is shown in the table. The cost for filtered water with a replacement filter B is $0. 12 per gallon. Assume that the cost is proportional to the number of gallons. Which replacement filter is less expensive? The distance over which light maintains its phase and frequency. What is it? Constructive interference Destructive interference Coherence length Resolving power ASAP PLZ IM TIMED I WILL GIVE BRAINLIEST In 2018, internal auditors discovered that PKE Displays, Inc. had debited an expense account for the $350,000cost of equipment purchased on January 1, 2015. The equipments life was expected to be five years with no residual value. Straight-line depreciation is used by PKE.Required:1. Prepare the correcting entry assuming the error was discovered in 2018 before the adjusting and closingentries. (Ignore income taxes.)2. Assume the error was discovered in 2020 after the 2019 financial statements are issued. Prepare the correcting entr The two sets of lines are parallel. If the measure of angle A is 110, what is the measure of angle B? What is 12.56 divided by 22