Login
Remember
Register
Questions
Hot!
Unanswered
Categories
Ask a Question
Trivia Quiz
Download Books
Donate
Ask a Question
ys are constant and which are variable? 4 Describe what is Web caching and how it can reduce the delay in receiving a requested object. Will Web caching reduce the delay for all objects requested 2 by a user or for only some of the objects? Why?
0
votes
396
views
asked
Apr 8, 2021
in
Computer Networks
by
anonymous
Your answer
Help us make this a great place for discussion by always working to provide accurate answers.
Email me at this address if my answer is selected or commented on:
Email me if my answer is selected or commented on
Privacy: Your email address will only be used for sending these notifications.
Anti-spam verification:
Write 2 in words
To avoid this verification in future, please
log in
or
register
.
0
Answers
Related questions
+2
votes
1
answer
9.1k
views
Describe how Web caching can reduce the delay in receiving a requested object. Will Web caching reduce the delay for all objects requested by a user or for only some of the objects? Why?
asked
Sep 25, 2020
in
Computer Networks
by
(user.guest)
+2
votes
1
answer
10.5k
views
Consider sending a packet from a source host to a destination host over a fixed route. List the delay components in the end-to-end delay. Which of these delays are constant and which are variable?
asked
Sep 22, 2020
in
Computer Networks
by
(user.guest)
+1
vote
0
answers
290
views
How to design a 4-input (A,B,C,D) digital circuit that will give its output a logic 1 only if the binary number formed at the input is between 2 and 9 (2&9 inclusive)?
asked
Nov 11, 2021
in
Hardware Systems & Electronics
by
anonymous
+2
votes
1
answer
510
views
Describe the sample space and all 16 events for a trial in which two coins are thrown and each shows either a head or a tail.
asked
Sep 20, 2021
in
Maths & Statistics
by
anonymous
0
votes
0
answers
1.1k
views
What are the propagation time and the transmission time for a 5-Mbyte message (an image) if the bandwidth of the network is 1 Mbps? Assume that the distance between the sender and the receiver is 12,000 km and that light travels at 2.4 x 108 m/s.
asked
May 7, 2021
in
Computer Networks
by
anonymous
+1
vote
1
answer
468
views
Some of the most important pieces of data stored in the RAM are the instructions which basically tells the CPU what to do at a particular time. Explain the concept of Instruction Set in the CPU and how it works.
asked
Oct 26, 2020
in
Computer Architecture
by
anonymous
–1
vote
1
answer
1.8k
views
Duplicate: Circle the portion of the IP address that would be invalid if it were assigned to a host, and then explain why it is invalid: 1. 131.107.256.80 2. 0.127.4.100 3. 222.222.255.222 4. 190.7.2.0 5. 127.1.1.1 6. 255.255.255.255 7. 198.121.254.255
asked
Nov 25, 2020
in
Computer Networks
by
anonymous
0
votes
0
answers
287
views
Suppose, there are N number of operations that have to be performed for a transaction. Now describe, in which state the (N-1) operations will be executed and what’s the name of N th operation for that specific transaction.
asked
Dec 23, 2020
in
Database Management Systems
by
anonymous
+1
vote
1
answer
2.7k
views
Suppose that the roundtrip delay between sender and receiver is constant and known to the sender. Would a timer still be necessary in protocol rdt 3.0, assuming that packets can be lost? Explain.
asked
Sep 30, 2020
in
Computer Networks
by
(user.guest)
+1
vote
0
answers
283
views
How can standards (the 'what') and other information be used to develop a methodology/approach/framework for managing projects (the 'how')? Describe some of this "other information" that can be used to create a methodology.
asked
Jul 7, 2021
in
Software Engineering
by
anonymous
0
votes
1
answer
1.1k
views
Argue that for the distance-vector algorithm in Figure 4.30, each value in the distance vector D(x) is non-increasing and will eventually stabilize in a finite number of steps.
asked
Oct 9, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
1.7k
views
Explain why deploying software as a service can reduce the IT support costs for a company. What additional costs might arise if this deployment model is used?
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
0
votes
0
answers
489
views
Explain why prototyping model is an adaptable model that can support both change avoidance and change tolerance activities. How does it differ from spiral model which in practice has not been widely used. Suggest why this might the case.
asked
Jun 17, 2020
in
Software Engineering
by
anonymous
+2
votes
1
answer
2.4k
views
Dial-up modems, HFC, DSL and FTTH are all used for residential access. For each of these access technologies, provide a range of transmission rates and comment on whether the transmission rate is shared or dedicated.
asked
Sep 22, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
3.2k
views
Consider the count-to-infinity problem in the distance vector routing. Will the count-to-infinity problem occur if we decrease the cost of a link? Why? How about if we connect two nodes which do not have a link?
asked
Oct 9, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
248
views
By writing the parity code (even) and threefold repetition code for all possible four-bit straight binary numbers, prove that the Hamming distance in the two cases is at least 2 in the case of the parity code and 3 in the case of the repetition code.
asked
Oct 13, 2021
in
Hardware Systems & Electronics
by
anonymous
+2
votes
1
answer
607
views
Explain what is meant by the term or phenomenon ‘Register naming’ and show by a sequence of program outline how this is achieved in a computer architecture
asked
Aug 26, 2019
in
Computer Architecture
by
anonymous
+2
votes
1
answer
2.5k
views
Describe how a botnet can be created, and how it can be used for a DDoS attack.
asked
Sep 22, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
78
views
What is an intrusion detection system (IDS) and what are some general approaches that can be used to for it?
asked
Apr 14
in
Computer Networks
by
(user.guest)
0
votes
1
answer
3.0k
views
What is meant by a control plane that is based on logically centralized control? In such cases, are the data plane and the control plane implemented within the same device or in separate devices? Explain.
asked
Oct 8, 2020
in
Computer Networks
by
(user.guest)
0
votes
0
answers
205
views
For laminar flow in a tube with a constant wall heat flux, it can be shown that the microscopic energy equation can be reduced to the following form where qy is the heat flux in the y direction
asked
Oct 8, 2020
in
Maths & Statistics
by
(user.guest)
0
votes
0
answers
664
views
Discuss the problems of using natural language for defining user and system requirements, and show, using small examples, how structuring natural language into forms can help avoid some of these difficulties
asked
Jan 19, 2021
in
Software Engineering
by
anonymous
0
votes
1
answer
3.1k
views
What is meant by the "match plus action" operation of a router or switch? In the case of destination-based forwarding packet switch, what is matched and what is the action taken?
asked
Oct 6, 2020
in
Computer Networks
by
(user.guest)
+3
votes
1
answer
2.0k
views
Reliability and safety are related but distinct dependability attributes. Describe the most important distinction between these attributes and explain why it is possible for a reliable system to be unsafe and vice versa.
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+3
votes
1
answer
441
views
A process X is a normally distributed population with mean = 14 and variance 16. Determine the probability that 14 objects selected will have mean is greater than 15.2.
asked
Aug 25, 2020
in
Maths & Statistics
by
anonymous
+1
vote
1
answer
622
views
The RAM is a temporal storage area in the computer system that usually contains the data that are being processed by the CPU. Briefly describe how the CPU and the RAM interacts to carry out their operation.
asked
Oct 26, 2020
in
Computer Architecture
by
anonymous
0
votes
0
answers
411
views
Compute the total delay involved for a packet of size 1000 bytes to propagate over a link of distance 3000 km, propagation speed 3.0 x 108 m/s and transmission rate 2 Mbps.
asked
May 7, 2021
in
Computer Networks
by
(user.guest)
0
votes
1
answer
2.2k
views
What is meant by the term "route aggregation"? Why is it useful for a router to perform route aggregation?
asked
Oct 6, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
9.0k
views
Suppose that a Web server runs in Host C on port 80. Suppose this Web server uses persistent connections, and is currently receiving requests from two different Hosts, A and B.
asked
Sep 30, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
2.1k
views
Can you configure your browser to open multiple simultaneous connections to a Web site? What are the advantages and disadvantages of having a large number of simultaneous TCP connections?
asked
Sep 26, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
22.4k
views
Consider the following network. With the indicated link costs, use Dijkstra’s shortest-path algorithm to compute the shortest path from x to all network nodes. Show how the algorithm works by computing a table similar to Table 4.3.
asked
Oct 8, 2020
in
Computer Networks
by
(user.guest)
0
votes
0
answers
908
views
Many SMP systems have different levels of caches; one level is local to each processing core, and another level is shared among all processing cores. Why are caching systems designed this way?
asked
Dec 10, 2020
in
Compilers & Operating Systems
by
anonymous
0
votes
1
answer
1.9k
views
What does it mean for a wireless network to be operating in “infrastructure mode?” If the network is not in infrastructure mode, what mode of operation is it in, and what is the difference between that mode of operation and infrastructure mode?
asked
Oct 11, 2020
in
Computer Networks
by
(user.guest)
0
votes
0
answers
687
views
Why is it that voice and video traffic is often sent over TCP rather than UDP in today’s Internet? (Hint: The answer we are looking for has nothing to do with TCP’s congestioncontrol mechanism.)
asked
Dec 11, 2020
in
Computer Networks
by
anonymous
+2
votes
1
answer
3.6k
views
“Surely animals, humans, and computers cannot be intelligent—they can do only what their constituent atoms are told to do by the laws of physics.”
asked
Oct 1, 2019
in
Artificial Intelligence
by
anonymous
–1
vote
1
answer
1.4k
views
Duplicate: How might you use a model of a system that already exists? Explain why it is not always necessary for such a system model to be complete and correct. Would the same be true if you were developing a model of a new system?
asked
Feb 9, 2021
in
Software Engineering
by
anonymous
+1
vote
1
answer
735
views
Section 15.4 includes a C program that calculates the greatest common divisor of two integers. Describe the algorithm in words and show how the program does implement the Euclid algorithm approach to calculating the greatest common divisor.
asked
May 16, 2021
in
Computer Architecture
by
anonymous
+1
vote
1
answer
625
views
State Pollack’s rule and prove that if you double the number of transistors in a processor, the chances are that you will only get a speedup of about 40 per cent.
asked
Aug 26, 2019
in
Computer Architecture
by
anonymous
+1
vote
1
answer
158
views
What is CSS and what are some of the things you can achieve with it?
asked
Nov 15, 2021
in
Software Engineering
by
(user.guest)
+1
vote
1
answer
1.9k
views
For a P2P file-sharing application, do you agree with the statement, “There is no notion of client and server sides of a communication session”? Why or why not?
asked
Sep 22, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
2.6k
views
True or false: When a BGP router receives an advertised path from its neighbor, it must add its own identity to the received path and then send that new path on to all of its neighbors. Explain.
asked
Oct 11, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
5.6k
views
Classify the following signals according to whether they are (1) one- or multi-dimen-sional; (2) single or multichannel, (3) continuous time or discrete time, and (4) analog or digital (in amplitude)
asked
Oct 1, 2019
in
Hardware Systems & Electronics
by
anonymous
+2
votes
1
answer
4.9k
views
Imagine the length of a 10Base5 cable is 2500 meters. If the speed of propagation in a thick coaxial cable is 200,000,000 meters/second, how long does it take for a bit to travel from the beginning to the end of the network?
asked
Jul 2, 2020
in
Computer Networks
by
anonymous
+1
vote
0
answers
339
views
You have been tasked to develop a program which will enable users in different branches to communicate. Describe in your own words the Inter-process mechanism you will employ in your program giving reasons for your choice.
asked
Aug 28, 2020
in
Compilers & Operating Systems
by
anonymous
0
votes
0
answers
236
views
Choose any piece of software which you use regularly. Briefly describe the requirements that the software meets (for you as the user). Suggest three ways in which the software could be improve for you.
asked
Apr 9, 2021
in
Software Engineering
by
anonymous
–1
vote
1
answer
1.4k
views
Duplicate: Determine the correct class of the following IP addresses: Address Class? 191.107.2.10 172.16.16.15 200.200.5.2 3.3.57.0 131.107.2.89 b) Which address class(es) in above table will allow you to have more than 1000 hosts per network?
asked
Nov 27, 2020
in
Computer Networks
by
anonymous
+1
vote
0
answers
854
views
A software system will be built to allow drones to autonomously herd cattle in farms. These drones can be remotely controlled by human operators. Explain how multiple architectural patterns can fit together to help build this kind of system.
asked
Jul 10, 2021
in
Software Engineering
by
anonymous
–1
vote
1
answer
1.2k
views
Duplicate: Suggest why it is important to make a distinction between developing the user requirements and developing system requirements in the requirements engineering process.
asked
Feb 9, 2021
in
Software Engineering
by
anonymous
0
votes
1
answer
1.1k
views
Duplicate: Explain why it is important to make a distinction between developing the user requirements and developing system requirements in the requirements engineering process.
asked
Jun 29, 2020
in
Software Engineering
by
anonymous
0
votes
1
answer
565
views
Duplicate: Suggest why it is essential to make a distinction between developing the user requirements and developing system requirements in the requirements engineering process.
asked
Jun 28, 2020
in
Software Engineering
by
anonymous
Welcome to
CPEN
Talk
.com
Solution-oriented students of
computer engineering
on one platform to get you that
ONE SOLUTION
...