This website uses cookies to ensure you have the best experience. Learn more

Unit 2 Assignment 1 Transfer Time

306 words - 2 pages

Unit 2 Assignment 1: Transfer Time

File Size | Transfer Rate | Transfer Time |
100 MB | 56 Kbps | 15 seconds |
100 MB | 4 Mbps | .2 seconds |
2 GB | 56 Kbps | 4 minutes 46 seconds |
2 GB | 4 Mbps | 4 seconds |

(100 MB x 1,000 x 8) / (56 Kbps x 1000) = 15 seconds
(100 MB x 1,000 x 8) / (4 Mbps x 1,000 x 1,000) = .2 seconds
(2 ...view middle of the document...

6 MB |
4 Mbps | 10 minutes | 300 MB |
56 Kbps | 4 hours | 100.8 MB |
4 Mbps | 2 hours | 3.6 GB |

(30 min. x 60 sec.) x (56 Kbps x 1000) = 100,800,000 b
(100,800,000 b / 8) / 1000 = 12,600 KB = 12.6 MB

(10 min. x 60 sec.) x (4 Mbps x 1000 x 1,000) = 2,400,000,000 b
(2,400,000,000 b / 8) / 1000 = 300,000 KB = 300 MB

(4 hrs. x 60 min. x 60 sec.) x (56 Kbps x 1000) = 806,400,000 b
(806,400,000 b / 8) / 1000 = 100,800 KB = 100.8 MB

(2 hrs. x 60 min. x 60 sec.) x (4 Mbps x 1000 x 1,000) = 28,800,000,000 b
(28,800,000,000 b / 8) / 1000 = 3,600,000 KB = 3,600 MB = 3.6 GB

A file can only transfer as fast as the transfer rate will allow. How long it takes to transfer a single file depends on how big the file is and how fast the transfer rate is. Everything depends on the other.

Other assignments on Unit 2 Assignment 1 Transfer Time

Unit 1 Assignment 1 Windows 2008 Network

461 words - 2 pages Unit 1. Assignment 1. Windows 2008 Network Services Course Objectives and Learning Outcomes In this assignment, you will explain the function of DHCP and DNS. Assignment Requirements Write a 1-page report summarizing IT-management overhead in reference to DHCP and DNS. In your report, address IT-management overhead in reference to DNS and DHCP, with the following question in mind: 1. How many hosts does it take to justify the

Is3230 Unit 2 Assignment 1

307 words - 2 pages Selecting Security Countermeasures IS3220 As a technology associate in the information system department at Corporation Tech I have reviewed the new network design and identified possible security threats and appropriated countermeasures. Entering the internet without proper security can be harmful in many ways. The first thing that should be added is a firewall. Firewalls can prevent unwanted traffic from infiltrating the network. This is

Week 1 Writing Assignment 2

440 words - 2 pages Week 1 Writing Assignment 2 Karl von Busse EG 542 Economics and Change December 14, 2014 Rationing Bypassing the free market becomes necessary during war simply because the free market is not perfect and may not respond adequately to wartime material demands. During WW2 immediately following Pearl Harbor the government imposed a system of rationing on needed commodities such as steel, brass, rubber and gasoline. The reason was twofold

Unit 1, Assignment 1

385 words - 2 pages Vanessa Joyal GE 257 U1, A1: Microbiology in the News ITT Tech Scientists at the University of Florida have discovered a way to use microbiology and nanotechnology to decrease the amount of pesticides necessary to kill the insect that causes citrus greening in Florida's citrus crops. The bacteria that causes citrus greening prevents the tree from getting proper nutrients and causes the fruit produced to be “unsuitable for sale as fresh fruit

Unit 1 Assignment 1

344 words - 2 pages In the past the greatest threats to the computing world were the highly skilled black hat hackers and their various coordinated groups. Not to downplay their reputation, they are still very real threats; however there has been a surge of neophyte hackers in the world. It has become profitable for the skilled and connected hackers to create tidy packages of malicious software and sell them to what are called “script kiddies,” which are essentially

Unit 1 Assignment 1

809 words - 4 pages Johnson Company provides networking components and services. Today we are using the yellow pages for advertising, which is still useful but outdated. In most businesses today use other methods such as In person by using sale representatives. Mostly all the businesses today use the internet to reach out to customers, either by having a website, social media, sending emails or even newsletters. There are some that use a totally different approach

Nt-1310 Unit 2 Activity 1 Cloud Computing

287 words - 2 pages Fidel Luna (15275168) NT-1310 Unit 2 Lab Cloud Computing Research iCloud Drive Inc. #566-533W Roulette Street, Pembina North Dakota, 58271 USA Founded in 2000, iCloud Inc. is recognized as a thought leader and innovator of Cloud services, bringing continuous innovation through high-performing cloud solutions to clients that want simple Internet Technology delivered in a less expensive way. iCloudDrive brings powerful backup

Unit 5 Assignment 2 Define An Acceptable Use Policy (Aup)

339 words - 2 pages Unit 5 Assignment 2: Define an Acceptable Use Policy (AUP) Acceptable Use Policy Richman Investments holds requirements for the usage of the company network including filtering policies for network traffic. LAN – WAN is where the IT infrastructure links to a wide area network and internet. For Security (Administrators and Managers) - Security monitoring controls for intrusion - Apply email server and attachment antivirus and email

Ethical Hacking And Network Defense Unit 2 Assignment

1705 words - 7 pages Ethical Hacking and Network Defense Unit 1 Assignment Kaplan University Table of Contents Scope Goals and Objectives Tasks Reporting Schedule Unanswered Questions Authorization Letter Scope Production e-commerce Web application server and Cisco network described in Figure 1.1. Located on ASA_Instructor, the e-commerce Web

Unit 6 Assignment 1

255 words - 2 pages I received your E-mail and in response I recommend that you do the following. There is a domain for each department, such as Marketing, accessing one printer is easy to do. To start off you will need to create a group that allows access to the one printer within each department in your company. After creating each group you must then assign it to a domain local group, global group and then to a universal group. Then you will need to add it to the

Unit 1 Assignment 1: Effects Of Routing On Current Communication Methods Used By Organizations

3601 words - 15 pages * Differentiate between the Ethernet standards, specifications, and technologies that drive current LAN connectivity. Assignment Requirements Review details of the Ethernet family of protocols in the text sheet titled “IS3120: Unit 2 Assignment 1 Evolution of Ethernet.” Analyze the changes that have occurred over time in this family of related standards. Then write a report that answers the following questions: * What impact will the

Similar Documents

Pt1420 V1 Unit 2 Assignment 1: Homework

319 words - 2 pages Unit 2 Assignment 1 Pt1420 Unit 2 Assignment 1: Homework Kenneth D. Davis Intro to Programming Short Answer 1. What does a professional programmer usually do first to gain an understanding of a problem? Interview the customer 2. What is pseudocode? Fake Code 3. Computer programs typically perform what three steps? 1. Input is received. 2. Some process is performed on the input. 3. Output is produced. 4. What does the

Unit 1 Assignment

308 words - 2 pages Unit 1 Assignment PA205-03 UNIT 1 ASSIGNMENT CASE STUDY QUESTIONS 1. The case study references one state statute. Identify it and explain what it prohibits. My understanding of the case study is that the identifiable state statute is section 42.09(a)(3) of the Texas Penal code, which prohibited the “desecration of a venerable object.” 2. Which branch of government (executive, judicial, or legislative) created the state statute? The

Nt 1210 Unit 1 Assignment

2960 words - 12 pages Unit 1 assignment 1. C 2. All of them are wrong the smallest measurement in the answers is a kilobyte and that is actually 1024 bytes not 106. 3. C 4. A,E 5. A 6. C 7. D 8. A 9. A,B,D 10. A 11. A 12. B,D 13. A,C 14. A,D 15. A 16. D 17. B 18. C 19. C,D 20. A,B Lab 1.1 Exercise 1.1.1 103 > 1000 x 2 = 2000 102 > 100 x 9 = 900 101 > 10 x 3 = 30 100 &gt

Acc555 Assignment 1 Unit 4

868 words - 4 pages Melanie Waghalter Johnson Unit 4 Assignment 1 Professor Cynthia Waddell ACC555: Fraud Examination “How to Steal a Million Dollar Without Taking the Cash” Seneca Staunton was an overwhelmed accounting clerk at Carlton Chemicals. His job was to deal with AR collection, customer service issues, process payments and keep the AR records straight. He was a quiet man who preferred to work alone than with others, and this was his down fall with