What bandwidth is used in special leased lines to connect midrange computers and mainframes as well as to transmit data over long distances?.

Answers

Answer 1

The bandwidth that is used in special leased lines to connect midrange computers and mainframes as well as to transmit data over long distances is Medium band.

What is Medium band?

This is known to be a bandwidth that is often used in some particular leased lines to link up midrange computers and mainframes.

Conclusively, It is also used in  moving data over any long distances. This bandwidth is is known to be very capable of doing any high-speed data transfer.

Learn more about bandwidth from

https://brainly.com/question/4294318


Related Questions

list the three words using in programming logic statements​

Answers

Answer:

if your doing a psuedocode assignment the answers are ( IF, THEN, ELSE)
I hope this helps :)

Explanation:
I just finished my psuedocode course in school
And got everything right

Actives? Need help with my homework

Answers

Answer:

yea just find it

Explanation:

Who knows about creating "A Discord Bot With Python"
Only answer if you have experience

Answers

Answer:

I have!

A discord bot helps you automate tasks on the server. It's easier to manage and welcome new users, moderate, and more.

im a dev on discord

 

1 Go to the Discord Developer Portal (https://discord.com/developers/applications)

2 Click on the "New Application" button and give your application a name

3 Go to the "Bot" tab and click "Add Bot" to create a bot account for your application

4 Make sure to copy your bot's token as you will need it later

5 Open your terminal or command prompt and run pip install discord.py

6 Create a new Python file in your project folder and name it something like bot.py

7 Import the Discord.py library and create a new client object

8 Add an event listener for the 'message' event to listen for messages in the server and respond to them

9 Add the bot token to the client object:

client.run('your-bot-token-here')

10 Run the bot

   In your terminal, run python bot.py to start the bot

   

11 If everything is working, you should see a message in the console that says "Logged in as [your bot's name]!"

What is the difference between a binary operator and a unary operator?.

Answers

Answer:

differences between binary operatar and a unary operator

Explanation:

the operators which act upon a single operand are called binary operatar and the operators which required two operands for their action are called unary operator.

Write a line of code in python that prints the integer portion of the number 21.45.

Answers

Answer:

print("21")

Explanation:

the integer is a whole number not a float, the part of the decimal which is a whole number is 21

thank me later

Deployment was canceled bymicrosoft. Visualstudio. Services. Releasemanagement.

Answers

Deployment was canceled bymicrosoft. Visualstudio. Services. Releasemanagement is known to be an error message.

Why the message above?

This situation often occur when the win2016 is said to be deprecated and as such, when you use vs2017-win2016 runs, it tends to fail in course of the brownout timeframe.

Note that Deployment was canceled bymicrosoft. Visualstudio. Services. Releasemanagement is known to be an error message that shows that release deploy failed.

Learn more about  error message. from

https://brainly.com/question/11472659

When backing up your original content and data and saving it in two places, why is it important that these two places aren't on the same device

Answers

Answer:
because a crash could cause you to lose both

Explanation:
In the debate over cloud vs. local backup, there are some types of backup that are better in certain locations. If you're performing cloud backup, incremental backups are generally a better fit because they consume fewer resources. You might start out with a full backup in the cloud and then shift to incremental backups. Mirror backup, though, is typically more of an on-premises approach and often involves disks.

This article is part of

Protecting data against loss, corruption, disasters (human-caused or natural) and other problems is one of the top priorities for IT organizations. In concept, the ideas are simple, although implementing an efficient and effective set of backup operations can be difficult.

The term backup has become synonymous with data protection over the past several decades and may be accomplished via several methods. Backup software applications reduce the complexity of performing backup and recovery operations. Backing up data is only one part of a disaster protection plan, and may not provide the level of data and disaster recovery capabilities desired without careful design and testing.

Backup applications have long offered several types of backup operations. The most common backup types are a full backup, incremental backup and differential backup. Other backup types include synthetic full backups

Get the binary value of your first name initial. Show your solutions and checking.


First name: _____
First name initial: V
Convert: ______​

Answers

Answer:

01010110

Explanation:

The binary value of V is 01010110

you have a variable n with a non-negative value and need to write a loop that will keep print n blank lines what loop construct should you use

Answers

Answer:

write down same applications of AI in agriculture,health,education, and business

Drag each tile to the correct box.
Arrange the steps in a sequence that you would follow while filtering data in a spreadsheet.
Click the Filter.. option in the submenu of Data.
Click the Data option in the menu of the spreadsheet.
Select the header row of the data to sort.
In the Filter dialog box, enter the filter criteria.
Click OK.







Answers

select the column to sort
2:in the spreadhseet menu, click the Data option
3:in the submenu of Data click the Sort..option
4:In the Sort dialog box, click the "ascending option for the first sort criteria
5:click OK

Select L for the items that refer to General Lee, H for General Halleck, and M for General McClellan.


removed from command twice for being overly cautious

Choose.

felt a victory in the North would turn public opinion against the war

Choose.

retreated to Washington, leaving the Confederates free to attack the North

Choose.

stopped the Confederate Army at Antietam

Choose.

was offered command of Union Army after Fort Sumter

Choose

Answers

The letters that represent the names of the individuals associated with the various actions are; M, L, H, M, L

What were the Activities of Railroad Presidents?

1) The person that removed from command twice for being overly cautious was General McClellan.

2) The person that felt a victory in the North would turn public opinion against the war was General Lee.

3) The person that retreated to Washington, leaving the Confederates free to attack the North was General Halleck

4) The person that stopped the Confederate Army at Antietam was General McClellan.

5) The person that was offered command of Union Army after Fort Sumter was General Lee.

Read more about history of railroad Presidents at; https://brainly.com/question/25997960

What is a PowerPoint slide?


Answers

Answer:

A PowerPoint is a presentation program to show a specific topic per slide

a PowerPoint SLIDE is just one part of for example 1 out of 10 slides

for example, if you were asked to do a PowerPoint for a project you'll probably do 20 slides and put a lot of work and detail into making this PowerPoint for a good grade so you don't fail a school year

Discuss whether or not something has to be "fun" to be considered a game. Defend one position but include at least one argument for each side; you may include "one scholar argued that XYZ" as an argument for/against your position.​

Answers

Answer:

Games do not have to be fun to be games. But most are fun. Games can just be a more interesting form of a simulation, a platformer, or a digital universe you may be interested in. For that very case, one scholar argued that, "Games are games, and fun is games, too." And then, another scholar argued, "Games should be fun." Lastly, a 3rd argues that games do not have to be fun, supporting our opinion. With this knowledge, no further, we come to a conclusion.

In conclusion, games are just an interesting escape from our everyday lives. They do not have to be fun. They just need to be good.

Answer:

well, if its not fun, then its not really played, and then it becomes forgotten like the game almost doesn't exist making it not a game?

Explanation:

da answer above is better ._.

A student enters the names of months in cells A2 to A5 with the heading "Month" in cell A1. Then he enters the number of days in each moth in cells B2 to B5 with the heading "Days" in cell B2. In order to arrange the names of the months in cells A6 to E6 with heading "Month" in cell A6 and the number of days each month in cells A7 to E7 with heading "Days" in cell A7, he can use the formula =TRANSPOSE(A1:B5).
A. True
B. False

Answers

The answer is true because it solvers by Parameters

The term 'aspect ratio' is a specification of ...
A. software.
B.
paper size.
C. printers.
D. monitors.
(1)

Answers

Answer:

I believe the correct aswer is D. Monitors

Explanation:

The aspect ratio of a display device is the proportional relationship between the width and the height of the display. It is expressed as two numbers separated by a colon (x:y), where x corresponds to the width and y to the height. Common aspect ratios for displays, past and present, include 5:4, 4:3, 16:10 and 16:9.

I hope that help!

When the operand on the left side of the * symbol is a string and the operand on the right side is an integer, the * becomes the ________ operator.

Answers

If the operand on the left side of the * symbol is a string and the operand on the right side is an integer, the * becomes the repetition operator.

What is an operand?

In computer programming, the term operand is known to be a term that connote any object that is said to be capable of being altered.

An example, in "1 + 2" the "1" and "2" are said to be the operands and the plus symbol is known to be an operator. Note that If the operand on the left side of the * symbol is a string and the operand on the right side is an integer, the * becomes the repetition operator.

Learn more about operand from

https://brainly.com/question/6381857

Because you have eaten at Red Lobster restaurants in the past and provided them with your email address, you now get notifications from them of upcoming specials and coupons for discounted menu items. This is an example of ________.

Answers

Answer:

Joining a membership.

Explanation:

Because you provided them with that email, they are now sending you updates, just like you have a membership.

School systems must constantly educate teachers and students on ways to prevent these kinds of attacks, in which people use emails to make it appear they are from a legitimate organization and to request private information, such as passwords or other information, which they use for malicious purposes.
A) firewalls.
B) hacking.
C) viruses.
D) spyware.

Answers

The answer is b). Hacking

Should spreadsheets be used to keep an address list for holiday cards?
YES
ONO
Hurry pls

Answers

Answer:

No

because spreadsheet is used for calculation not for writing address

The set of coordinating colors applied to backgrounds, objects, and text in a presentation is called:

Answers

Answer:

theme colors

Explanation:

As said, a group of colors that are used to format text and objects in a document. When you open the Color menu, these colors determine what you see.

Which type of cable can transfer data up to 480 megabits per second?
ana

Answers

Answer:

Most suppliers offer three types of cables. USB 1.1 cables support data transfer rates up to 12 megabits per second (Mbps). USB 2.0 cables support data transfer rates up to 480 Mbps. USB 3.0 cables support data transfer rates of up to 5.0 Gbit/s.

Explanation:

Answer:

USB 2.0 cables

Explanation:

This could have been searched by you  

A ________________ is an electrical channel that transfers bits internally within the circuitry of a computer, allowing the devices to communicate with each other.

Answers

Answer:

RAM

Explanation:

Random Access Memory (RAM) is a type of memory that is used to store data. RAM data can be accessed almost instantaneously regardless of where it is stored in memory, making it extremely fast. RAM communicates with the computer's CPU at a breakneck speed. I hope this helps! ^-^

Why do most data scientists and companies collect enormous amounts of
data?
A. To reduce the huge amount of data found on the internet
B. To store the data and save it for future generations to examine
C. To compete with other data scientists and companies
O D. To make more accurate predictions about their users and their
behaviors

Answers

I believe it’s B because Scientist collect data for further examination more like theories and unknown things.

Answer: D.

Explanation: got it right

What is the term used to describe spam email scams where the senders attempt to manipulate individuals into the purchase of penny stocks

Answers

phishing scams

hope this helps

Online interaction with social media platforms:__________.
i. Social Engine Optimization
ii. Testimonials
iii. Social Media Presence

Answers

Answer:

social media precense is your answer

uring the boot process, the essential portion, or core, of the operating system called the ____________________ is loaded into memory.

Answers

Answer:

kernel or boot sector

Explanation:

match the technology term with its definition

Answers

Answer:

there is no picture

Explanation:

Procedural languages were in the
generation, and non-procedural languages were in the
generation in the evolution of programming languages.

Answers

Answer: B

Explanation:

Answer:

Procedural languages were in the third generation, and non-procedural languages were in the fourth generation in the evolution of programming languages.

Explanation:

got 5/5 on the test

. A _____ is a listing of goods and services. an it stores the information about items in a database, usually on a separate computer that is accessible to the server that is running the Web site itself.

Answers

Answer:

A  stores the information about items in a database, usually on a separate computer that is accessible to the server that is running the web site

Explanation:

While working in a group of two the members are not getting along. You bring the two members together so they can discuss this issue. The issue is that neither member wants to work on the actual research they both just want to create the presentation. They work together through the steps of conflict resolution and agree to share the research and work together on creating the presentation

What step of the conflict resolution process is this?

A) agree upon the problem
B) brainstorm possible solutions
C) identify the issue
D) negotiate a solution

Answers

Answer:

D)

Explanation:

At first the two members just want to create the presentation but work together and agree to share the research and work together on creating the presentation.

The conflict resolution is more than agree upon problem, identify issue or brainstorm solutions. The answer is D) negotiate a solution.

Answer:

D) negotiate a solution

Other Questions
what is chemical change? what are some ways to tell chemical change happened? How to engage a reader with farm life in the 1930s Jackson buys a new shirt that is originally listed as $14.00. The shirt is 25% off the original price. One angle in a right triangle measures 57. What is the measure of the other acute angle?431239033 The scale on a map shows that 200 miles is represented by 5 inches on a map. Which proportion can be used to findthe distance on the map. x, that represents 50 miles?5 200=50200550505 200 x50 - 200=Math 1 pointA grid shows the positions of a subway stop and your house. The subwaystop is located at (0.-1), and your house is located at (-7.-4). What is thedistance, to the nearest unit, between your house and the subway stop? In your own opinion, what do you think the nervous system controls? PLEASE can someone do A, B, D, And The Graph How many multiples of 5 are there between 176 and 389 In paragraph 16, malala yousafzai creates an analogy. Explain the analogy and what it reveals about her experience as a young woman in pakistan. PLEASE HURRY !!!A student examines a picture of an important biological molecule in a textbook and writes four statements about the molecule in a chart.Which statement needs to be revised to make it true? 3 times the difference between 5 and y What did Thisbe wear and why Whats the correct answer _____the form of energy which enables us to see any object is. what was the cause of political paralysis in the gilded age? how do we refute that paralysis existed? Both Freud and Erikson believed that each stage represented a conflict, a ___ that needed to be resolved. the scale on a map is 1 in to 40 mi find the distance for 5 1/2 in Due to the antiparallel nature of the dna double helix, _________. ______ activities add value directly by transforming inputs into outputs as the firm moves a product or service horizontally along the internal value chain. A. Complementary B. Resource C. Value D. Primary