1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
OlgaM077 [116]
3 years ago
15

Communication among office computers is based on a protocol that uses CRC-32 for error detection. A series of 100 identical test

messages are being exchanged between office computers in an attempt to test the reliability of communication lines. The decimal value corresponding to the binary version of each one of these test messages is 22,405. According to the used protocol, what is the expected EDV (error detection values) that the testing professionals should read for these messages once they arrive at a destination computer?
Computers and Technology
1 answer:
Fiesta28 [93]3 years ago
4 0
I think it is the CRC-32 for error detection
You might be interested in
How many lines of text are in your questionnaire document
wel

Answer:

*9* lines - I think.

Explanation:

8 0
3 years ago
Explain the working principle of computer with suitable diagram​
mylen [45]

Explanation:

<em>The</em><em> </em><em>working</em><em> </em><em>principle</em><em> </em><em>of</em><em> </em><em>the</em><em> </em><em>computer</em><em> </em><em>system</em><em>. </em><em>Computer</em><em> </em><em>do</em><em> </em><em>the</em><em> </em><em>work</em><em> </em><em>primarily</em><em> </em><em>I</em><em> </em><em> </em><em>the</em><em> </em><em>machine</em><em> </em><em>and</em><em> </em><em>we</em><em> </em><em>can</em><em> </em><em> </em><em>not</em><em> </em><em>see</em><em>,</em><em> </em><em>a</em><em> </em><em>control</em><em> </em><em>center</em><em> </em><em>that</em><em> </em><em>converts</em><em> </em><em>the</em><em> </em><em>i</em><em> </em><em>formation</em><em> </em><em>data</em><em> </em><em>input</em><em> </em><em>to</em><em> </em><em>output</em><em>.</em><em> </em><em>A</em><em> </em><em>co.puter</em><em> </em><em>is</em><em> </em><em>a</em><em> </em><em>machine</em><em> </em><em>made</em><em> </em><em>up</em><em> </em><em>of</em><em> </em><em>parts</em><em> </em><em>for</em><em> </em><em>the</em><em> </em><em>hardware</em><em> </em><em>and</em><em> </em><em>software</em><em>.</em><em> </em><em> </em>

<em>I</em><em> </em><em>hope</em><em> </em><em>it</em><em> </em><em>will</em><em> </em><em>help</em><em> </em><em>you</em><em> </em><em>so</em><em>.</em><em> </em>

5 0
3 years ago
Dayla is concerned about managing her digital footprint. What does she mean by this? *
Ludmilka [50]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

First we know what is digital footprint.

A digital footprint is a trail of data you create while using the Internet. It includes the websites you visit, emails you send, and the information you submit to online services.

So, Dalya is concerend about managing her digital footprints means she has concerned to store password that used to be login and make them secure, the email she is sending to the correct address and text in the email is grammatically correct, information that she is submitting online does not violate the security concerns, etc.  

6 0
3 years ago
Bobbi owns a protein shake company, which has been trading for 3 years. Her products are stocked in a number of gyms, but the co
N76 [4]

Answer:

Actions that Bobbi should take to identify opportunities for online business growth are:

Review competitor websites

Identify a USP

Build a SWOT analysis

Explanation:

The first thing Bobbi should do is to review competitor website.

This will give her information about her competitors the products that they offer, the price of their products, the website layout and structure of the competitors, any strategy they are using to boost their online product sale  such as by offering product promotion, discounted price etc.  

After reviewing competitor websites, next thing that Bobbi should do is  identify a Unique Selling Proposition. Bobbi should identify the unique features, benefits of her products that induce her business to stand out from the competitors. Identify all those unique aspects and factors that make her product different from others.

After identifying USP, Bobbi should now build a Strengths, Weaknesses, Opportunities and Threats (SWOT) analysis. This way she will be able to  recognize and understand her website's strengths, distinctive competencies, limitations, opportunities and risks. This will help her to analyse the overall strategic position of her website as well as her business. That will help her create a strategy for the future.

8 0
4 years ago
What number is represented as a binary code of 101110
mariarad [96]

Answer:

46 i think

Explanation:

sorry if thats wrong

4 0
2 years ago
Read 2 more answers
Other questions:
  • If Peyton Manning, a professional football player, wanted to remember his 16-digit credit card number, which of the following me
    5·1 answer
  • Which of the following must be included in the disaster recovery plan? Select one: a. Business functions b. Critical support fun
    12·1 answer
  • What is Napoleon's friend's name? From the Napoleon Dynamite movie.
    14·1 answer
  • If totalMonths has a string value of "13", what does the code that follows display?var years = parseInt ( totalMonths / 12 );var
    6·1 answer
  • List the various types of social media that have been covered in the tutorial. Mention the key purposes for which each media typ
    9·1 answer
  • Which type of memory helps in reading as well as writing data? With the help of , a computer can read as well as write or modify
    11·3 answers
  • A website for a certain political party or candidate is likely to have unbiased
    6·1 answer
  • How could you represent the following binary color in hexadecimal? What is its numerical value? What color is it? How
    13·1 answer
  • What is an algorithm?
    11·1 answer
  • Your agile team only has one database developer. So the other developers finish their tasks and then wait for their work to be I
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!