Determining line cost for three points

Assignment Help Basic Computer Science
Reference no: EM1347816

Q1) Three terminals (T1 , T2 ,T3 ) are to be connected to three computers (C1 ,C2 , C3 ) so that T1 is connected to C1,T2 to C2, and T3 to C3. All are in different cities. T1 and C1 are 1,500 miles apart, as are T2 and C2, and T3 and C3. Points T1, T2 ,and T3 are 25 miles apart, and points C1 , C2, and C3 also are 25 miles apart. If telephone lines cost $1 per mile, determine the line cost for three?

Reference no: EM1347816

Questions Cloud

Social networking website to get information about applicant : Some companies are beginning to use social networking websites like Facebook and MySpace, to get information about job applicants.
Find how much mass m of ice should be added : The electric field has been measured to be horizontal and to the right everywhere on the closed box. All over the left side of the box E1 = 120 V/m, and all over the right, slanting, side of the box E2 = 250 V/m. On the top the average field is E3..
Inefficiency in financial institutions operations : Discuss and explain how the credit crisis causes this to occur. Advise at least 2 proactive steps that financial institutions may take to provide similar influence without credit crisis.
During an investigation of possible violations of securities : Do you believe the provisions need to be strengthened to include forfeiture or reimbursement of any bonus or incentive-based compensation?
Determining line cost for three points : Points T1, T2 ,and T3 are 25 miles apart, and points C1 , C2, and C3 also are 25 miles apart. If telephone lines cost $1 per mile, determine the line cost for three?
What is the speed initially at the bottom : Sources A and B emit long-range radio waves of wavelength 530 m, with phase of the emission from A ahead of that from source B by 90°. The distance rA from A to a detector is greater than corresponding distance rB from B by 110 m. What is the magni..
Define the coefficient of friction : A 240g ball and a 130g ball are connected by a 32 cm-long massless, rigid rod. The structure rotates about its center of mass at 150rpm.
Java program for real estate agent : Write down java program for real estate agent. Program must perform the following tasks: ask users for average house price for the each of past 5 years for single family residence of 1500 square feet.
Elucidate why the general level of wages is higher : Elucidate why the general level of wages is higher in the United States and other industrially advanced countries. What is the single most important factor underlying the long-run increase in average real-wage rates in the United States.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Creating cut-over plan for alternate processing site

Create cut-over plan for alternate processing site based on given below. Consider LAN for small 100-person business, Pixel Inc. Business occupies one floor in an office building.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Explaining concept of internet-first printing presses-mass

A number of historians explain concept of the internet as parallel to concept of first printing presses - mass communication.

  Creating flowchart of data found on employee time cards

Create a flowchart depicting the following situations: The data found on employee time cards are keyed onto a hard disk before they are processed by a computer.

  Determining most effective it projects

Not sure what will suit their requirements in achieving better organization between branches by updating their information systems. What will you suggest they do to find out most effective IT projects?

  Deliverable associated required to complete process

Explain in scholarly detail department expense predicting processes and deliverable associated required to complete process.

  Explaining threat category

An individual threat can be represented in more than one threat category. If a hacker hacks into a network, copies a few files.

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  System development methodologies in information systems

There are literally thousands of system development methodologies in the Information Systems field. Suggest some reasons why there might be so many.

  How lseek call makes a seek to file

Where lseek call makes a seek to byte 3 of file. What does buffer comprise after the read has completed?

  Explaining kind of malicious software

What kind of malicious software is this? if username and password are valid return ALLOW_LOGIN else return DENY_LOGIN.

  Computing cycles to save if registers are available

Determine the number of cycles will be saved if both registers are available?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd