1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Debora [2.8K]
3 years ago
6

Develop an sec (single error correction) code for a 16-bit data word. generate the code for the data word 0101000000111001. show

that the code will correctly identify an error in data bit 4.
Computers and Technology
2 answers:
natita [175]3 years ago
7 0

Answer:

010100000001101000101

Explanation:

When an error occurs in data bits, the SEC code is used to determine where the error took place. 5 check-bits are needed to generate SEC code for 16-bits data word. The check bits are:

C16=0, C8=0, C4=0,C2=0,C1=1

Therefore the SEC code is 010100000001101000101

jarptica [38.1K]3 years ago
4 0

Answer:

<em>The code is given as = 010100000001101000101</em>

<em>Explanation:</em>

<em>The steps take is shown below, </em>

<em>The SEC code is used to ascertain where errors had occurred. Such as the occurrence of errors in data  bits. </em>

<em>The inequality given is: 2^k - 1 >= M + K </em>

<em>Where M is =16 </em>

<em>For the arrangement of the data bits and checking of the bits, the following steps is taken below </em>

<em>   Bit position              Number             Check bits             Data Bits </em>

<em> 21                                   10101 </em>

<em> 20                                  10100 </em>

<em> </em>

<em>The bits is therefore checked in a way up to the bit position 1 </em>

<em>Therefore, the code is then written as follows: 010100000001101000101 </em>

You might be interested in
3. How are you able to create photographs differently than 100 years ago?
Agata [3.3K]

Answer:

it willbe black and white

Explanation:

3 0
3 years ago
Read 2 more answers
What is the available vector for each resource and the need matrix for each thread. Note that an available vector depicts the qu
blsea [12.9K]

Answer:

If request granted then T₁ and T₂ are in deadlock.

Explanation:

See attached image

4 0
3 years ago
Discuss positive and negative impacts of computers to our economy
NeX [460]
Positive: they have enable individuals,small groups,visibility and opportunities as big businesses

Negative: poor eye sight, obesity & weight loss and premature aging
4 0
3 years ago
Nina, a programmer, wants to use the programming language Primavera. For which application area should Nina use this language?
AnnyKZ [126]

C. Drawings is the correct answer

8 0
3 years ago
Read 2 more answers
a _____ combines the characteristics of computer viruses, worms, and other malicious codes with vulnerabilities found on public
expeople1 [14]

Answer:

The answer is "Blended Threat"

Explanation:

In the given question some information is missing that is the option of the question, which can be described as follows:

a. Firewalls.

b. Mirror disc.  

c. Threat from the backdoor.

d. blended threat.  

It includes bugs malicious content like malware, grubs, and many other scripts. It helps in remembering things when you combine multiple tasks in a processor to help learn, Its combination of stuff is produced, and other choices were false that can be described as follows:

  • In option a, It provides security to malicious, that's why it is wrong.
  • In option b, It is part of storage system, that's why it is incorrect.
  • In option c, It bypasses the normal security system, that's why it is wrong
8 0
3 years ago
Other questions:
  • A ____ is harmful computer code that spreads without your interaction, slipping from one network to another and replicating itse
    15·1 answer
  • What part of the computer gives access to the internet
    10·1 answer
  • Which of the following tends to be true of silent film acting as opposed to sound film acting?
    7·1 answer
  • When studying an information system, illustrations of actual documents should be collected using a process called _____.
    12·1 answer
  • This device is used to connect sections of large networks?
    12·2 answers
  • A Unit of information containing the objects position, rotation, and scale values is called:
    13·1 answer
  • The distance that light travels in a vacuum in one year is a(n) _____. A. AU B. parsec C. light-year D. kilometer
    15·1 answer
  • Match the correct pairs of column A and B to prove your computer
    9·1 answer
  • Give an idea of a law u would like to create
    5·2 answers
  • In computer science what are the methods used to protect the information stored by a piece of software called?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!