1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ronch [10]
3 years ago
11

The _________ check is a type of hardware control that involves adding a "1" or a "0" to the end of every 8 bit byte such that t

he total number of ones in the byte is always either odd or even.
a. byte count
b. parity
c. check digit
d. echo
e. binary
Computers and Technology
1 answer:
stira [4]3 years ago
7 0

Answer:

The correct answer to the following question is an option (b) parity.

Explanation:

Because it is a bit that appends to the binary bit and it has the sets of one or either zero by which a total number of the one bits is the odd or the even parity bit.  

Parity bit is a type of bit by which we can check when the data is moved to another place than at that time the data is written over or lost and also we check data at that time when these data is transmitted from one computer to other computers.

You might be interested in
The general syntax to overload the stream extraction operator >> for a class is ____.
Aloiza [94]
Istream& operator>> (istream& input, Example& example)
{
// Extract your data from input stream here
return input;
}
5 0
3 years ago
Are Microsoft an Apple more secure from malicious action because of their closed-source approach?
omeli [17]

Yes Microsoft and Apple used the closed-source approach to better secure from malware and make to make their operating systems more user friendly.

7 0
3 years ago
Write a program that reads numbers from the user until a blank line is entered. Your
ddd [48]

Answer:

nums = []

while True:

   in = input()

   if in:

       nums.append(in)

   else:

       break

if nums:

   avg = sum(nums) / len(nums)

   for i in range(len(nums)):

       if nums[i] == avg:

           print(f"index: {i+1}")

           print(nums[i])

else:

   print(-1)  # if there aren't any values in nums

Explanation:

Assuming that you are coding in Python 3x. The last 'else' statement is an edge case that you might want to consider, I don't know what you want to put there, but I'm just going to leave it as -1.

5 0
2 years ago
At the Data Link Layer of the OSI Model, what type of address is used to identify the receiving host?
Natalka [10]

Answer:

Mac Address

Explanation:

The MAC address or Media Access Control  is a unique identifier that each manufacturer assigns to their devices that can connect to the network.  They consist of 48 bits in hexadecimal form, grouped into 12 pairs of characters and each character is formed by four binary numbers, generally separated by a colon. MAC addresses are used in the data link layer of the OSI model, specifically in the lower Medium Access Control layer. An example of a MAC address could be:

10: 68: c5: 5e: 27: 3f.

6 0
3 years ago
Moore's Law states that the processing power of the latest computer chips doubles about every eighteen months. Assuming the grap
weeeeeb [17]

Answer:

b

Explanation:

8 0
3 years ago
Other questions:
  • A(n) ____ backup only archives the files that have been modified since the last backup.
    11·1 answer
  • PLEASE HELP ASAP!!!!
    14·1 answer
  • __________ refers to excavating the sides of an excavation to form one or a series of horizontal levels or steps, usually with v
    12·2 answers
  • What is the output of the following function if the array nums contains the values 1 2 3 4 5 int backwards(int nums[]) { for (x
    15·1 answer
  • Fill up the blank:- The picture that graphically represents the items you use in Windows is called a/an .......
    5·1 answer
  • Indicate whether the statement is true or false. ____ 1. Autoglobal array elements are referred to with an index number. ____ 2.
    9·1 answer
  • What is the name for the size and style of text?
    8·2 answers
  • Choose all stages of the information processing cycle.
    12·2 answers
  • Privacy, anonymity, and freedom of expression are all interrelated.
    12·1 answer
  • Task 03
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!