1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
trasher [3.6K]
4 years ago
9

. Generate 106 message bits (random binary values (bool/int) ). 2. Generate the corresponding code bits for r = 3, 5. This means

you will repeat the simulation once for each r value. You may, for example, do this in a loop. 3. Transmit the code bits through a BSC with transition probability p, for each p in the set {10rho , rho = −3, −2.99, −2.98, . . . , −0.3}. Similar to the point above, this means that for each r value, you will repeat the simulation for each p value. 4. Decode the received codebits form the output of the channel to extract the message bits. 5. Compare the original message bits to the extracted ones to compute the number of errors. The error rate is then equal to # of errors in message bits total # of message bits
Computers and Technology
1 answer:
N76 [4]4 years ago
7 0

Answer:

While loops are typically used when you don’t know how many times the loop needs to repeat. The body of the loop will repeat while the condition is true. The logical expression will be evaluated just before the body of the loop is repeated.

Let’s say that we want to find the square root of a number. For some square roots, you’re never going to be exact. Let’s say that we want to find a square root that, when multiplied by itself, is within 0.01 of the square we want. How do we do it? There’s a really old process that we can apply here.

Start by guessing 2.

Compute the guess squared.

Is the guess squared close to the target number? If it’s within 0.01, we’re done. We’ll take the absolute value of the difference, in case we overshoot. (In Python, abs is the absolute value function.)

If it’s not close enough, we divide the target number by our guess, then average that value with our guess.

That’s our new guess. Square it, and go back to Step #3.

Explanation:

You might be interested in
________ is a dedicated device designed to manage encrypted connections established over an untrusted network such as the Intern
pantera1 [17]

Answer:

The correct answer to the following question will be Option B (VPN concentrator).

Explanation:

  • Virtual Private Network (VPN) is a virtual, limited-use network generated using protocol encryption and tunneling over physical, public network connections.
  • A dedicated tool for managing VPN connections built over an untrusted network, such as the Internet, is called a VPN concentrator.
  • It's a type of networking system that ensures secure VPN connections are established and messages are transmitted between VPN nodes.

Therefore, Option B is the right answer.

7 0
3 years ago
Write a function called 'game_of_eights()' that accepts a list of numbers as an argument and then returns 'True' if two consecut
MrRa [10]

Answer:

In Python:

def main():

   n = int(input("List items: "))

   mylist = []

   for i in range(n):

       listitem = input(", ")

       if listitem.isdecimal() == True:

           mylist.append(int(listitem))

       else:

           mylist.append(listitem)

   print(game_of_eights(mylist))

def game_of_eights(mylist):

   retVal = "False"

   intOnly = True

   for i in range(len(mylist)):

       if isinstance(mylist[i],int) == False:

           intOnly=False

           retVal = "Please, enter only integers"

       if(intOnly == True):

           for i in range(len(mylist)-1):

               if mylist[i] == 8 and mylist[i+1]==8:

                   retVal = "True"

                   break

   return retVal

if __name__ == "__main__":

   main()

Explanation:

The main begins here

def main():

This gets the number of list items from the user

   n = int(input("List items: "))

This declares an empty list

   mylist = []

This iterates through the number of list items

   for i in range(n):

This gets input for each list item, separated by comma

       listitem = input(", ")

Checks for string and integer input before inserting item into the list

<em>        if listitem.isdecimal() == True:</em>

<em>            mylist.append(int(listitem))</em>

<em>        else:</em>

<em>            mylist.append(listitem)</em>

This calls the game_of_eights function

   print(game_of_eights(mylist))

The game_of_eights function begins here

def game_of_eights(mylist):

This initializes the return value to false

   retVal = "False"

This initializes a boolean variable to true

   intOnly = True

This following iteration checks if the list contains integers only

   for i in range(len(mylist)):

If no, the boolean variable is set to false and the return value is set to "integer only"

<em>        if isinstance(mylist[i],int) == False:</em>

<em>            intOnly=False</em>

<em>            retVal = "Please, enter only integers"</em>

This is executed if the integer contains only integers

       if(intOnly == True):

Iterate through the list

           for i in range(len(mylist)-1):

If consecutive 8's is found, update the return variable to True

<em>                if mylist[i] == 8 and mylist[i+1]==8:</em>

<em>                    retVal = "True"</em>

<em>                    break</em>

This returns either True, False or Integer only

   return retVal

This calls the main method

if __name__ == "__main__":

   main()

7 0
3 years ago
Write a program that has a while loop to print out the first five multiples of 15, 43, and 273 between the numbers of 3168 and 3
Reika [66]

Answer:

#include <iostream>

using namespace std;

void printmultiples(int n) //function to print first five multiples between 3168 and 376020

{

   int a =3168,c=1;

   cout<<"First five multiples of "<<n<<" are : ";

   while(a%n!=0 && a<=376020) //finding first mutiple of n after 3168.

   {

       a++;

   }

   while(c<6)//printing multiples.

   {

       cout<<a<<" ";

       a+=n;

       c++;

   }

   cout<<endl;

}

int main() {

   int t,n;

   cin>>t;//How many times you want to check.

   while(t--)

   {

       cin>>n;

       printmultiples(n);//function call..

   }

return 0;

}

Input:-

3

15

43

273

Output:-

First five multiples of 15 are : 3180 3195 3210 3225 3240  

First five multiples of 43 are : 3182 3225 3268 3311 3354  

First five multiples of 273 are : 3276 3549 3822 4095 4368

Explanation:

I have used a function to find the first five multiples of the of the numbers.The program can find the first five multiples of any integer between 3168 and 376020.In the function I have used while loop.First while loop is to find the first multiple of the integer n passed as an argument in the function.Then the next loop prints the first five multiples by just adding n to the first multiple.

In the main function t is for the number of times you want to print the multiples.In our case it is 3 Then input the integers whose multiples you want to find.

7 0
4 years ago
Why we can not see objects around us in the dark​
malfutka [58]

Answer:

We see an object when light falls on it and gets reflected from its surface and enters our eyes. In a dark room, there is no source of light. no light falls on the surface of objects and we do not see them. This is why we cannot see the objects in a dark room.

4 0
4 years ago
Which type of communities handle recurring tasks in organization
12345 [234]
I think it's Standing committee
3 0
3 years ago
Other questions:
  • A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT ________. Select one: A. assume your i
    6·1 answer
  • What type of values are typically stores in unweighted graphs
    5·1 answer
  • Do you think we could use mathematical operators on string values rather than integers or floats? Explain.
    12·1 answer
  • Use the table and the drop-down menus to order the
    15·2 answers
  • 2. Choose all of the correct answers for each of the following: [a] The relations of two sub-entity sets of the same super entit
    6·1 answer
  • When we add suffix L to a integer it is called as __________​
    12·1 answer
  • How to prepare and draw a corresponding flowchart to compute the sum and product of all prime numbers between 1 and 50
    7·1 answer
  • Different he launc.<br>in function are available with MS-Excel<br>Many​
    14·1 answer
  • Why are business types of profession interrelated?​
    14·1 answer
  • CISC vs RISC processors might be used, and come up with environments where one processor would outperform the other.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!