1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svetlana [45]
3 years ago
5

The 7-bit ASCII code for the character ‘&’ is: 0100110 An odd parity check bit is now added to this code so 8 bits are trans

mitted. What will be the transmitted bit sequence for the ASCII character ‘&’? If odd parity check bits are used when transmitting ASCII codes, which of the following received bit sequences are not valid? Explain briefly how you reached your answer. a.01001000 b.01011110 c.01111111 d.11100111
Computers and Technology
1 answer:
Alex787 [66]3 years ago
7 0

Answer

First part:

The transmitted 8-bit sequence for ASCII character '&' with odd parity will be 00100110. Here leftmost bit is odd parity bit.

Second part:

The invalid bit sequence are option a. 01001000 and d. 11100111

Explanation:

Explanation for first part:

In odd parity, check bit of either 0 or 1 is added to the binary number as leftmost bit for making the number of 1s in binary number odd.

If there are even number of 1s present in the original number then 1 is added as leftmost bit to make total number of 1s odd.

If there are odd number of 1s present in the original number then 0 is added as leftmost bit to keep the total number of 1s odd.  

Explanation for second part:

A valid odd parity bit sequence will always have odd number of 1s.

Since in option a and d,  total number of 1s are 2 and 6 i.e. even number. Therefore they are invalid odd parity check bit sequences.

And since in option b and c, total number of 1s are 5 and 7 i.e. odd numbers respectively. Therefore they are valid odd parity check bit sequences.

You might be interested in
Consider an array of integers consisting of the numbers: 8 12 19 32 45 55 67 72 89 90 92. Suppose the binary search algorithm is
ankoles [38]

Answer:

Answered below

Explanation:

Index of the first element compared to the key is 5. The element itself is 55.

This index is evaluated by the addition of the index of the first element which is 0(zero) and the the index of the last element which is 10.

( Index of the last element is determined by subtracting the one from the total number of elements)

After the addition, the result is divided by 2 to get the first index from which the binary search begins.

firstIndex = 0

lastIndex = array.length - 1

midpoint = (firstIndex + lastIndex) / 2

6 0
3 years ago
U.S. cybersecurity experts and government officials are increasingly concerned about breaches from __________ into corporate net
Triss [41]

Answer:

Organized crime syndicates based in the United State

Explanation:

U.S. cybersecurity experts and government officials are increasingly concerned about breaches from organized crime syndicate based in the United States into corporate networks, either through mobile devices or by other means.

The crime syndicate can go to any length to access corporate network through mobile device or any other means in order to commit crimes that is why the US cyber security expert and government officials are increasingly concerned.

Cyber security specialists or expert in the US are been employed to protect information or data that the crime syndicate may want to gain access to by using different variety of techniques by critically monitoring the systems network for attempted breaches by the crime syndicates and then dealing with any of them that is found guilty.

5 0
3 years ago
What is a credit limit? athe required payment to your credit card company. bthe amount of interest you are charged each month. c
Gnom [1K]
I believe the correct answer from the choices listed above is option C. A credit limit is the maximum amount you can charge each billing cycle.  <span>The </span>credit limit<span> on your credit card is the maximum balance your credit card issuer allows. Hope this answers the question.</span>
4 0
4 years ago
Tonya is photographing an old photo with her digital camera. What can she use to avoid reflections
mixer [17]

Answer:

Indirect lighting conditions

Explanation:

By doing this, there will be no glare

6 0
4 years ago
The principle of time preference requries a larger payment in the future than the present. Which situation best illustrates this
gladu [14]
The answer is letter C.
3 0
3 years ago
Other questions:
  • Mike wants to build an amplifier. Which technology can he use?
    15·1 answer
  • Tyler trades in a car worth $5,000 (wholesale) on a new $15,000 car, but still owes $7,000 on his old car. How much will he owe
    12·1 answer
  • The different concepts in the architecture operating model are aligned with how the business chooses to integrate and standardiz
    10·2 answers
  • If an interest inventory reveals that you are highly interested in solitary, introverted work, what might be the best type of ca
    9·2 answers
  • In Microsoft word when you highlight existing text you want to replace , you're in?
    15·1 answer
  • Anyone Free to Talk??????? I'm Bored :(
    6·2 answers
  • When two conductors are accidentally connected it is<br> called a
    6·1 answer
  • Which of the following is NOT a factor to consider when examining extrinsic job satisfaction?
    7·1 answer
  • Jabari created new video game for his coding course. What is one way he should format his pseudocode?
    12·1 answer
  • Why is it better for a CPU to have more than one cache?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!