1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vilka [71]
2 years ago
13

How many bits strings of length 12 contain (8 pts)? a. exactly three 1s? b. at most three 1s? c. at least three 1s? d. an equal

number of 0s and 1s?
Computers and Technology
1 answer:
Irina-Kira [14]2 years ago
3 0

1. Exactly three 1 s?

$$\left(\begin{array}{c}12 \\3\end{array}\right)=220$$

2. At most three$1 \mathrm{~s}$ ?

$$\left(\begin{array}{c}12 \\0\end{array}\right)+\left(\begin{array}{c}12 \\1\end{array}\right)+\left(\begin{array}{c}12 \\2\end{array}\right)+\left(\begin{array}{c}12 \\3\end{array}\right)=1+12+66+220=299 \text {. }$$

3. At least three 1 s?

Take a shortcut by using the previous answer:$2^{12}-66-12-1=4017$

4. An equal number of$0 \mathrm{~s}$ and $1 \mathrm{~s}$ ?

$$\left(\begin{array}{c}12 \\6\end{array}\right)=924$$

<h3>What is strings ?</h3>

The C programming language includes a set of functions executing operations on strings in its standard library. Different operations, such as copying, concatenation, tokenization, and searching are supported.

In C programming, a string exists as a sequence of characters terminated with a null character \0. For example char c[] = "c string"; When the compiler discovers a sequence of characters enclosed in the double quotation marks, it appends a null character \0 at the end by default. The C language does not have a distinctive "String" data type, the way some other languages such as C++ and Java do. Instead, C stores strings of characters as arrays of chars, completed by a null byte.

1. Exactly three 1 s?

$$\left(\begin{array}{c}12 \\3\end{array}\right)=220$$

2. At most three$1 \mathrm{~s}$ ?

$$\left(\begin{array}{c}12 \\0\end{array}\right)+\left(\begin{array}{c}12 \\1\end{array}\right)+\left(\begin{array}{c}12 \\2\end{array}\right)+\left(\begin{array}{c}12 \\3\end{array}\right)=1+12+66+220=299 \text {. }$$

3. At least three 1 s?

Take a shortcut by using the previous answer:$2^{12}-66-12-1=4017$

4. An equal number of$0 \mathrm{~s}$ and $1 \mathrm{~s}$ ?

$$\left(\begin{array}{c}12 \\6\end{array}\right)=924$$

To learn more about strings refer to:

brainly.com/question/27251062

#SPJ4

You might be interested in
I will mark you as brainlist
weeeeeb [17]

Answer:

download it

Explanation:

because if u upload it will not save .

7 0
3 years ago
Read 2 more answers
What are two different ways by which a laptop could utilize the cellular network connection of a mobile device
Stella [2.4K]

Answer:

Tethering and hotspot

Explanation:

Tethering and hotspot are the two different ways by which a laptop could utilize the cellular network connection of a mobile device.

Tethering usually involves connecting the computer or smartphone to the internet with the aid of a USB cable while hotspot involves connection of the device to the internet through the WIFI option.

6 0
3 years ago
How can a CRM system help communicate issues in the supply chain between customers and drones?
riadik2000 [5.3K]

Answer:

CRM system can help customers about the service supplied.  

Explanation:

CRM stands for Customer Relationship Management and CRM system is a useful tool for communicating with customers.

CRM can keep the data about the order provided by the customer and has updated info about its status.

For example, if the customer of a logistics company wants to know where his/her order is, customer represantative can give up-to-date info about the order where abouts. Or the customer directly uses web to check the status of the order.

All these service can be provided by a CRM system, since drones can send its location to CRM systems.

8 0
3 years ago
____ policy establishes criteria for classifying and securing the organization's information in a manner appropriate to its leve
pav-90 [236]

Answer:

Correct Answer is (d) Information sensitivity policy

Explanation:

Information sensitivity policy establishes the criteria for classifying and securing the organization's information in a manner that is appropriate to its level of security.

However, other options are incorrect. Server security can be established only on servers and on information/data that is in the server from unauthorized access. While VPN security is used for protecting network and encryption is used to encrypt data from illegal access.

However, only information sensitivity policy is used for classifying and securing organization information to the outside world.

The intention of information sensitivity policy:

The intention of using any information sensitivity policy is to help the employee to determine what information can be disclosed to non-employee, as well as the relative sensitivity of the information that should not be disclosed outside of the company without proper permission or authorization from supreme leadership of an organization.

7 0
3 years ago
Heather is troubleshooting a computer at her worksite. She has interviewed the computer’s user and is currently trying to reprod
Aleksandr [31]

Answer:

D. Identify the problem.

Explanation:

There are six steps or stages in computer system troubleshooting. They are,

1. Identify the problem: In the stage of troubleshooting, the user is interviewed to get a description of the problem. Reproducing the problem is essential to confirm the described problem of the system before moving to the next stage.

2. Establish a theory of probable cause: when the problem is identified, a list of the possible cause of the problem is made.

3. Test the theory to determine a cause: each items on the list of possible cause of the problem is tested to confirm its actual cause.

4. Resolve the problem.

5. Verify full system functionality

6. Document the findings, actions and outcomes.

8 0
4 years ago
Other questions:
  • To apply format to text, both the text and the text box must be selected.
    13·1 answer
  • Wireless network devices use ________ to communicate with each other.
    9·2 answers
  • Who is a software engineer
    8·2 answers
  • Microsoft's ____ is one of the major web-based development environments.
    12·1 answer
  • Identify a characteristic of electronic meeting systems.
    10·1 answer
  • In the context of computer and network security, a security system is said to possess _____ when it does not allow data to be co
    13·1 answer
  • How was kapilvastu named​
    11·1 answer
  • What will the computer do in response to a line of code reading # name = input("What is your name?")
    7·1 answer
  • What are the common camera hazards? When might you encounter these hazards in your life, and what do you plan to
    14·1 answer
  • FoRWarD MaRcH AND hERe We Go MEMbers of the agEncy BaKuGO AHHHHHHHHH-
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!