1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svetlana [45]
3 years ago
5

The 7-bit ASCII code for the character ‘&’ is: 0100110 An odd parity check bit is now added to this code so 8 bits are trans

mitted. What will be the transmitted bit sequence for the ASCII character ‘&’? If odd parity check bits are used when transmitting ASCII codes, which of the following received bit sequences are not valid? Explain briefly how you reached your answer. a.01001000 b.01011110 c.01111111 d.11100111
Computers and Technology
1 answer:
Alex787 [66]3 years ago
7 0

Answer

First part:

The transmitted 8-bit sequence for ASCII character '&' with odd parity will be 00100110. Here leftmost bit is odd parity bit.

Second part:

The invalid bit sequence are option a. 01001000 and d. 11100111

Explanation:

Explanation for first part:

In odd parity, check bit of either 0 or 1 is added to the binary number as leftmost bit for making the number of 1s in binary number odd.

If there are even number of 1s present in the original number then 1 is added as leftmost bit to make total number of 1s odd.

If there are odd number of 1s present in the original number then 0 is added as leftmost bit to keep the total number of 1s odd.  

Explanation for second part:

A valid odd parity bit sequence will always have odd number of 1s.

Since in option a and d,  total number of 1s are 2 and 6 i.e. even number. Therefore they are invalid odd parity check bit sequences.

And since in option b and c, total number of 1s are 5 and 7 i.e. odd numbers respectively. Therefore they are valid odd parity check bit sequences.

You might be interested in
A communication pattern in which the parties slowly reduce their dependence on one another, withdraw, and become less invested i
zepelin [54]

Answer:

The correct answer to the following question is option A. an avoidance spiral.

Explanation:

An avoidance spiral is a spiral in which parties avoid the conflicts at all cost in which leads to reducing the influence, dependence, etc. This spiral can also be destructive.

In other words, it is the only spiral in parties slowly reduces their dependence and the influence on the one and another.

7 0
3 years ago
The data set monarch from Computer-Active Data Analysis by Lunn andMcNeil (1991) contains the years lived after inauguration,ele
gulaghasi [49]

Answer:

0.033

Explanation:

Please kindly check attachment for the step by step solution of the given problem.

5 0
3 years ago
When considering changing the content of a cell which button should you press to leave the cell as it originally was?
densk [106]
Esc key or cancel .........
7 0
3 years ago
Read 2 more answers
Which is an example of the operation of a game?
SVEN [57.7K]

Answer:

D.  

The player uses a joystick to control the character.

Explanation:

The MEANING of operation is: "The fact or condition of functioning or being active."

This explains that the answer is D because you are using the joystick to control the character. Hope the helps.

6 0
3 years ago
Read 2 more answers
One of the ways attackers can access unencrypted data being transmitted on your network is by
nikdorinn [45]
<span>One of the ways attackers can access unencrypted data being transmitted on your network is by </span>collecting electronic emissions that come from your networking closet or Ethernet cables. 
5 0
3 years ago
Other questions:
  • This is tech question related to mobile and PC.
    6·1 answer
  • Knowledge can reside in email, voice mail, graphics, and unstructured documents as well as structured documents.
    9·2 answers
  • Create a new Die object. (Refer to Die.html for documentation.)Create a loop that will iterate at least 100 times. In the loop b
    11·1 answer
  • Susan has always wanted to be a veterinarian. When doing her research, she answers all self-assessments geared toward that caree
    13·1 answer
  • A ________ topology uses more than one type of topology when building a network. crossover multiple-use fusion hybrid
    11·1 answer
  • Explain in a few sentences the difference between analytical papers and argumentative papers.
    8·2 answers
  • Write an HTML document which contains two text fields, a button, and a div. The first text field should be labeled “Temperature”
    10·1 answer
  • Can anybody answer this
    11·1 answer
  • Complete the following sentence. <br> _______ is often used to solve riddles and puzzles.
    7·2 answers
  • State whether the given HTML coding is True or False. &lt;HR SIZE=5 COLOR=YELLOW ALIGN=RIGHT WIDTH=75%&gt;​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!