1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mojhsa [17]
4 years ago
9

For an machine using 2-dimensional even parity for error detection/correction, and the following received bytes, where is the er

ror? If there is no error, select "No Error" for both boxes. Byte # Bit # Byte # Code Parity 1 1000 011 1 2 1000 110 0 3 1001 101 0 4 1100 011 0 5 1101 000 1 6 1100 110 0 7 1010 100 1 Parity 1111 001 1
Computers and Technology
1 answer:
topjm [15]4 years ago
5 0
No error
Yeah...... I didn't understand what to do in it
You might be interested in
Lin is booting up his computer, and during the boot process, the computer powers down. After several unsuccessful attempts to bo
Alex787 [66]

Answer:

A. Processor.

Explanation:

When a computer system works working or does not boot, it is mostly ask a result of power supply failure.

The system does not come on, that is, the fan and screen does not come up and the caps lock indicator is not blinking. The power supply shows that the power is good.

When the processor is not sitting properly and when the motherboard has failed, the signs mentioned above are observed.

Not to escalate the problem, test for the processor status as a probable cause with another functional and compatible processor before the motherboard.

4 0
3 years ago
All conductors,buses,and connections should be considered
SashulF [63]

They should be considered as energized

6 0
4 years ago
Someone once observed that "the difference between roles and groups is that a user can shift into and out of roles, whereas that
mestny [16]

Answer:

All things considered newgrp has nothing to do with security jobs.  

newgrp sets the procedures bunch id which is in many frameworks are irrelevant. All gatherings are accessible. Gatherings are characterized as assortment of clients , bunch get to is conceded to documents dependent on the record gathering.  

Regularly (setgroups/getgroups ) all gatherings are in the process get to list.  

The authorization at a document or registry level has a 3 level arrangement of consents, for example, client proprietorship , bunch possession and others. All things considered the document authorization are a mix of read , compose and execute .we need both peruse and execute consent to run a program.  

A procedure may get to the document if a record has a place with the user(the proprietor of the document ) or if the gathering identifier coordinate on the gatherings in the clients bunches list. That entrance is constrained by the relating consents signals on the record.  

Gatherings have been over-burden with some "job" definitions. In any case, these are just over-burden and not a decent utilization of groups,the utilization of a gathering as a job was bolstered by the setgroup id banner , and by utilities like a sudo , where gathering name likewise coordinates a security control. It expect that the gathering name isn't utilized for documents yet once a client is in the gathering that client can apply the gathering to a record regardless of whether it isn't what the gathering was for.  

This over-burden use worked where frameworks didn't bolster genuine jobs. The over-burden utilize was only a work around.  

Linux has genuine job definition bolstered by SELinux models and can be applied to documents , clients , and forms.

7 0
4 years ago
You work as an IT Technician for uCertify Inc. David, a user, has recently purchased a laptop computer. He is now complaining th
olganol [36]

Answer:

Check the hardware switch on the wireless antenna card that activates the service.

Explanation:

The person works for uCertify Inc as an IT Technician. David, a regular, has just buy a laptop. He still says that he will not link to a wireless connection, although his laptop seems to have an inner wireless app. So, by checking the hardware switch on the wireless antenna card that activates the service, that person resolves the issue.

7 0
3 years ago
Algorithm to find volume of cuboid​
Dovator [93]

Answer:

Volume of a Cuboid = Length * Breadth * Height.

Volume of a Cuboid = lbh.

The Lateral Surface Area of a Cuboid = 2h (l + w)

Explanation:

6 0
3 years ago
Other questions:
  • How do i know if i got flash installed onchrome
    5·1 answer
  • Someone may choose to own a car instead of leasing because:
    14·2 answers
  • A contractor is preparing a bid to install swimming pools at a new housing addition. The estimated time to build the first pool
    12·1 answer
  • What type of tool would be used to tighten a nut or bolt with an exact amount of twisting force?
    7·1 answer
  • Write a Python program that asks the user for a positive, odd value. Once the value is validated determine if the number is Prim
    11·1 answer
  • 3. Comparing the Utopian and dystopian views of Technology according to Street (1992) which one in your view is more applicable
    9·1 answer
  • If you need any answer answered faster check out Wolframalpha.com
    14·2 answers
  • your own choice Identify an organisation of whether factual of fiction with the following Consideration:The three best os to int
    14·1 answer
  • Difference between software developer and software engineer.
    6·1 answer
  • OCR Airlines allows passengers to carry up to 25kg of luggage free of charge. Any additional luggage is charged at £10 per kg. N
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!