1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LekaFEV [45]
4 years ago
15

Suppose the information content of a packet is the bit pattern 1110 0110 1001 1101 and an even parity scheme is being used. What

would the value of the field containing the parity bits be for the case of a two-dimensional parity scheme? Your answer should be such that a minimum- length checksum field is used.
Computers and Technology
1 answer:
marta [7]4 years ago
4 0

Answer:

\left[\begin{array}{ccccc}1&1&1&0&1\\0&1&1&0&0\\1&0&0&1&0\\1&1&0&1&1\\1&1&0&0&0\end{array}\right]

Explanation:

To keep the checksum length minimum ,checksum field should be a 4x4 matrix with two dimensional even parity bit.

For this purpose first create a matrix of RxC dimensions and add one even parity bit at the end of each row and column.

parity bit is sort of a check flag used to detect errors in binary data.Error detection is done by adding total number of  1's in the binary sequence.

There are two types of parity bits

  1. Even
  2. Odd

For even parity if total number of 1 is even parity bit for that sequence would be (0).

For even parity if total number of 1 is odd parity bit for that sequence would be (1)

For odd parity if total number of 1 is odd parity bit for that sequence would be (0)

For odd parity if total number of 1 is even parity bit for that sequence would be (1)

You might be interested in
A content-managed site can be customized _____.
natita [175]

Good question. The best answer is that it all depends on your project's specifications. Here are a few scenarios where a custom CMS would make sense:

You have security concerns or corporate security requirements that would make off-the-shelf platforms unacceptable. An example of this could be stringent security requirements that limit the amount of software licenses allowed, or that require tightening so severe that it would inhibit the ability of the platform to operate correctly. Also, remember that off-the-shelf platforms are more susceptible to random attacks by bots and other automated attackers.

You require advanced features. If you plan on having a website requiring advanced customization, evaluate if you are pushing the limits of off-the-shelf CMS platforms. An example would be software that is core to your business that must be custom built on top of the CMS platform. Future risks could be the inability to run a proper software update, or even worse, a software update breaking your custom code. It happens all the time!

3 0
3 years ago
Which of the descriptions listed below best describes the step in the reverse engineering process called functional analysis? A)
Zepler [3.9K]
If multiple choice then d and a if not then the best one would be a!


hope this helps!!
5 0
3 years ago
Each web site contains a(n) ____ page, which is the first document users see when they access the site.
katrin2010 [14]
Home is the answer. Hope this helps. :)
7 0
3 years ago
People who enjoy working with their hands might enjoy a career as an
Kaylis [27]
People that enjoy working with their hands might enjoy being a construction worker but their are a lot of other jobs that involve using their hands but being a construction worker takes a lot of effort and a lot of hard work to complete.
6 0
4 years ago
Read 2 more answers
When should the sponsor-monitor conduct the most detailed review of the study protocol with the site's study staff?
Likurg_2 [28]

Answer:

Site initiation visit is the correct answer.

Explanation:

Because the SIV is the sponsor-monitor which administers the detailed analysis of the site's study staff by the study protocol and it observes the process of the visite over a while that it take place after the visite of the site section. It also needed to set up the research site to administrates the analysis. So, that's why the following answer is true.

8 0
3 years ago
Other questions:
  • What operating system type uses icons to represent programs
    9·2 answers
  • Question 1 (1 point)
    10·2 answers
  • Write a Python program that reads the CSV file, compares the population estimates of every row for 2010 and 2017 and computes th
    10·1 answer
  • E-mail has made it very easy to send a message to more than one person at any time of day from just about anywhere. If you wante
    12·2 answers
  • Which network media uses different regions of the electromagnetic spectrum to transmit signals through air?
    13·1 answer
  • Which of the following are mass communication methods? (Select all that apply.)
    9·1 answer
  • The command-line interface tells a user that it's ready to receive commands by displaying a specific set of characters called a(
    12·1 answer
  • A student opens a recently purchased software package and begins reading the enclosed materials. What information might be inclu
    6·1 answer
  • What is a special type of variable used in subroutines that refers to a piece of data?
    15·1 answer
  • Iciples UI
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!