1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kisachek [45]
3 years ago
10

The American Standard Code for Information Interchange (ASCII) has 128 binary-coded characters. A certain computer generates dat

a at 1,000,000 characters per second. For single error detection, an additional bit (parity bit) is added to the code of each character. What is the minimum bandwidth required to transmit this signal.
Computers and Technology
1 answer:
Kay [80]3 years ago
4 0

Answer:

350 kHz

Explanation:

as there are 100,000 character per sec.

so, total number of bits per sec = 100,000 * n

= 100,000 * 7 = 700,000 bits per sec

= 700 kbps

Bandwidth (BW) = total no. of bits / 2

BW = 700 kbps/2

= 350 kHz

You might be interested in
What does ‘‘negotiation’’ mean when discussing network protocols? give an example?
rewona [7]
Some protocols have multiple algorithms to choose from for e.g., cryptographic purposes. During connection set up, client and server negotiate which one they'll use.

One example is the set up of a TLS connection. During the handshake, the client shares a list of its supported ciphers (the 'ciphersuites'). The server responds by indicating the best one that both sides support.

4 0
2 years ago
There are numerous strict and steadfast rules when it comes to composition.
erastova [34]

Answer:

false

Explanation:

none ¯\_(ツ)_/¯

6 0
2 years ago
What is the main task of the project manager
WINSTONCH [101]

Answer:

to handle day to day operations of a project A P E X

Explanation:

hope that helped

6 0
3 years ago
Read 2 more answers
An attacker is preparing to perform what type of attack when the target vulnerabilities include headers and payloads of specific
kari74 [83]

An attacker is preparing to perform what Application attack  when the target vulnerabilities include headers and payloads of specific application protocols.

<h3>What Is an Application Attack?</h3>

An application attack is known to be a type of system attack which is made up of cyber criminals that is said to have access to any unauthorized points.

Note that this kind of Attackers are  the ones that start by  looking at the application layer, and then looking for any kind of application vulnerabilities that is found within the code.

Learn more about vulnerabilities from

brainly.com/question/25633298

3 0
2 years ago
you just bought a new hard drive for your computer you plan to use this as a secondary hard drive to store all um a files once i
mihalych1998 [28]
Well, you need to partition your hard drive. Partitioning your hard drive designates usable space on your hdd.

And you need to format your hard drive. Formatting installs a file system on to your hard drive, it allows the operating system to read, write and overall understand the data stored on the disk. Without it, an OS cannot keep track of file locations, nor can it typically identify already used sectors (space) on a hdd. 
However, neither of these two concepts are tests.  
7 0
3 years ago
Other questions:
  • Which one of these tasks best describes the process of localization?
    12·1 answer
  • Which statement prints "hi" on the screen?
    5·2 answers
  • For a color display using 8 bits for each of the primary colors (red, green, blue) per pixel, what should be the minimum size in
    6·1 answer
  • Explain the nature of documents that can be suitable for mergin
    12·1 answer
  • The _____ dialog box lets you specify which files are to be merged.
    14·1 answer
  • What is the advertising photographer’s main objective in creating an image?
    11·1 answer
  • How do I learn coding? Python
    5·2 answers
  • Practice problems on functions. Write C function(s) to carry out the specified tasks. For each problem, also write the suggested
    15·1 answer
  • To control how and when the slides should appear during the slide show, we use the__________________ feature​
    12·1 answer
  • In your own words, explain the FNAF timeline
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!