1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elza [17]
3 years ago
8

Two communicating devices are using a single-bit even parity check for error detection. The transmitter sends the byte 10101010

and, because of channel noise, the receiver gets the byte 10011010. Will the receiver detect the error
Computers and Technology
1 answer:
icang [17]3 years ago
7 0

Answer:

The receiver will not detect the error.

Explanation:

The byte sent by transmitter: 10101010

The byte received by receiver due to channel noise: 10011010

If you see the bold part of the both sent and received bytes you can see that the number of bits changed is 2.

The two communicating devices are using a single-bit even parity check. Here there are two changed bits so this error will not be detected as this single bit even parity check scheme has a limit and it detects the error when the value of changed bit is odd but here it is even.

This parity scheme basically works well with the odd number of bit errors.

You might be interested in
Choose all the items that represent potential ways to find a job opening.
NeX [460]

Answer:

company website

Explanation:

4 0
3 years ago
How does Frankenstein feel about his creation?
velikii [3]

Answer:

he just regrets that he made a monster and deeply feels guilty that it is in pain of reliving

Explanation:

8 0
3 years ago
What is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or
Harman [31]

Answer:

The correct answer to the following question is Drive-by hacking .

Explanation:

Drive-by hacking is the type of hacking which comes under the cyberterrorism.

Drive-by hacking is the hacking where the hackers can access their data and steal their data, use their network services from some "safe" distance without going inside the company or an organization.

Drive-by download is the type of download of the malicious code into your mobile devices or the computers which occur by designed and it leave you to the cyberattack.

7 0
3 years ago
Riodic Table
Ksenya-84 [330]

Answer:

riodic Table

A museum wants to store their valuable documents in cases that contain a gas that will protect the documents.

She should not choose one of the other gases because they are too

The museum director should choose

Explanation:

I didn't understand

8 0
3 years ago
Viết chương trình hoàn chỉnh các yêu cầu sau:
Blababa [14]

Explanation:

the perimeter of an aluminium sheet is 120 CM if its length is reduced by 10% and its breadth is increased by 20% the perimeter does not change find the measure of the length and the breadth of the sheet

4 0
3 years ago
Other questions:
  • In the two-level directory, if a user refers to a particular file then__________________ Select one: a. only his/her own UFD (us
    7·1 answer
  • How must you rect to a flashing<br> Yellow traffic light?
    9·1 answer
  • Hello, please help write code in C++. Primary U.S. interstate highways are numbered 1-99. Odd numbers (like the 5 or 95) go nort
    12·1 answer
  • How does the binary numbering system differ from the hexadecimal numbering system?
    14·2 answers
  • Manuel has set up his network so that some employees can open and view files but are unable to edit them. Others can open, view,
    10·1 answer
  • Which PlayStation was the first to allow connection between it and computer network
    12·1 answer
  • )finding an unused location in the hash table is called
    5·1 answer
  • Benefits of computer in bank​
    5·1 answer
  • What is computer generation.<br>name that generations ​
    9·2 answers
  • Which of the following transfer rates is the FASTEST?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!