1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ronch [10]
3 years ago
11

The _________ check is a type of hardware control that involves adding a "1" or a "0" to the end of every 8 bit byte such that t

he total number of ones in the byte is always either odd or even.
a. byte count
b. parity
c. check digit
d. echo
e. binary
Computers and Technology
1 answer:
stira [4]3 years ago
7 0

Answer:

The correct answer to the following question is an option (b) parity.

Explanation:

Because it is a bit that appends to the binary bit and it has the sets of one or either zero by which a total number of the one bits is the odd or the even parity bit.  

Parity bit is a type of bit by which we can check when the data is moved to another place than at that time the data is written over or lost and also we check data at that time when these data is transmitted from one computer to other computers.

You might be interested in
You can create a ____ partition to hold files that are created temporarily, such as files used for printing documents (spool fil
Lisa [10]
/var is the answer to then empty space
3 0
3 years ago
What is a spreadsheet​
Delicious77 [7]
A spreadsheet function that indicates the average of a group of numbers in a range.
8 0
3 years ago
Which of the following is a command shell with a built-in scripting language?1. The Server Manager’s Roles and Features wizard2.
IgorLugansk [536]
Your kinda right but wrong
4 0
3 years ago
Read 2 more answers
The term for an operator that may not evaluate one of its subexpressions is
Xelga [282]

Answer:

short-circuit

Explanation:

3 0
2 years ago
Describe at least one reason why transitioning from the Cisco implementation of STP to the Cisco implementation of RSTP is seaml
kherson [118]

Answer:

STP mainly uses 5 states in a network, in which some states are replaced in RSTP which improves the time efficiency.

Explanation:

STP mainly uses five states i.e.  Learning, Listening, Blocking, Disabling and Forwarding to overcome the problem of collision in a network.  

RSTP replaced the three states of STP i.e listening, learning, and blocking by Discarding, which results in the time efficiency as compared to STP.  

As STP takes minutes to complete the network inter connectivity, RSTP completes it in seconds.

This is one of the main reason why an administrator want to change to RSTP.

6 0
3 years ago
Other questions:
  • What kinds of messages can computers read? (CodeHS)
    7·1 answer
  • If a user receives a message whose tone and terminology seems intended to invoke a panic or sense of urgency, it may be a(n) ___
    13·1 answer
  • You would like to search for information about storms but not tornadoes. What type of search strategy may be useful?
    10·2 answers
  • A user is unable to install virtualization software on a Windows 8.1 computer. The user verified the host has sufficient RAM, pl
    6·1 answer
  • To remove text from a specific location and keep it to use again, you should select ___
    6·1 answer
  • Which of the following is a valid variable name? a. salesTax b. input-string c. 25Percent d. double
    8·1 answer
  • Can someone that been helping me answer one more question for please and thx
    13·1 answer
  • Matt is a senior developer for Cyber Protect, a company that helps secure management information systems. Matt's new task is to
    8·1 answer
  • Why might reading a product review be a good idea before purchasing a product?
    5·2 answers
  • 1. What type of malware is triggered by a specific condition, such as a specific date or a particular user account being disable
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!