1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Debora [2.8K]
3 years ago
6

Develop an sec (single error correction) code for a 16-bit data word. generate the code for the data word 0101000000111001. show

that the code will correctly identify an error in data bit 4.
Computers and Technology
2 answers:
natita [175]3 years ago
7 0

Answer:

010100000001101000101

Explanation:

When an error occurs in data bits, the SEC code is used to determine where the error took place. 5 check-bits are needed to generate SEC code for 16-bits data word. The check bits are:

C16=0, C8=0, C4=0,C2=0,C1=1

Therefore the SEC code is 010100000001101000101

jarptica [38.1K]3 years ago
4 0

Answer:

<em>The code is given as = 010100000001101000101</em>

<em>Explanation:</em>

<em>The steps take is shown below, </em>

<em>The SEC code is used to ascertain where errors had occurred. Such as the occurrence of errors in data  bits. </em>

<em>The inequality given is: 2^k - 1 >= M + K </em>

<em>Where M is =16 </em>

<em>For the arrangement of the data bits and checking of the bits, the following steps is taken below </em>

<em>   Bit position              Number             Check bits             Data Bits </em>

<em> 21                                   10101 </em>

<em> 20                                  10100 </em>

<em> </em>

<em>The bits is therefore checked in a way up to the bit position 1 </em>

<em>Therefore, the code is then written as follows: 010100000001101000101 </em>

You might be interested in
(Find the number of uppercase letters in a string) Write a recursive function to return the number of uppercase letters in a str
Leokris [45]
Def countUppercase(s):
count=0
for i in s:
if i.isupper():
count+=1
s=s.replace(i, "")
else:
s=s.replace(i, "")
countUppercase(s)
return count

element=input("Enter the string: ")
string=countUppercase(element)
print("\nNumber of upper letter in the string: ",string)

3 0
3 years ago
Which of the following is probably not a place where it is legal to download the music of a popular artist whose CDs are sold in
nignag [31]

Answer:

A. Personal blogs

Explanation:

I did the quick check, and there you go...it's A.

5 0
3 years ago
List the actual network numbers for each of these subnets. (If the list is longer than 16, simply list the first 3 and final 3 "
Andre45 [30]
69 is the answer because I know or it could be 430
3 0
3 years ago
A data center designer requested additional lighting for the entrance to the data center as well as the removal of a object whic
Ira Lisetskai [31]

Answer:

SURVEILLANCE-SPECIFIC DESIGN.

Explanation:

Defensible space offers a series of architectural guidelines that can be used in the design of new urban residential complexes to promote both the residential group’s territorial claim to its surroundings and its ability to conduct natural surveillance. The designs are: site interrelationship design, site design, street design and surveillance-specific design.

Surveillance-specific design can be used to increase general visibility by providing adequate lighting, by reducing or eliminating physical barriers to visibility, and by the visibility-promoting location of key areas (entrances, lobbies, elevator waiting areas, parking areas e.t.c.) so as to be directly visible from as many viewpoints as possible.

Since the data center designer requested additional lighting for the entrance to the data center as well as the removal of a object which is blocking security's view of the entrance, then it is an example of SURVEILLANCE-SPECIFIC DESIGN.

6 0
3 years ago
4. Extrusion tools in Blender® duplicate vertices while keeping the geometry connected with the original vertices. (1 point)
butalik [34]
Hey user

l think it is true
7 0
4 years ago
Other questions:
  • How do i connect wifi direct from pc to phone​
    15·1 answer
  • You can use any font when creating your website as all users can see the same fonts.
    15·1 answer
  • Suppose that for an experimental device setup we have to choose settings for three parameters. There are 4, 3 and 5 settings for
    11·1 answer
  • What is wrong with the formula below?<br><br> SUM(A1:A5)/SUM(B1:B5)
    7·1 answer
  • Write a program that calculates taxi fare at a rate of $1.50 per mile. Your pro-gram should interact with the user in this manne
    12·1 answer
  • Describe how serial data access finds data
    9·2 answers
  • How is modern technology developed? Explain.
    14·2 answers
  • What is another word for: a location in memory that contains a value?
    7·2 answers
  • What is the most likely reason a company would use enterprise software?
    14·1 answer
  • Add this in binary numbers . (1100011+11111+111) ​
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!