1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
4vir4ik [10]
3 years ago
15

Assuming we are using the Hamming algorithm presented in your text and even parity to design an error-correcting code, find the

code word to represent the 8-bit information word 10011011
Computers and Technology
1 answer:
Rudik [331]3 years ago
3 0

Answer:

Before redundancy :100101011100

After checking parity redundancy: 100101010011

Explanation:

First calculate redundant bits ,

We know that the number of redundant bits can be calculated using the following formula:

2^r ≥ m + r + 1

r = redundant bit, m = data bit

total data bits = 8

so ,

2^4 ≥ 8 + 4 + 1

16 ≥ 13

so, redundant bits is 4

Now let they denoted by r1, r2, r4, and r8, as the redundant bits are placed at positions corresponding to power of 2:    1, 2, 4, and 8.  

All the redundant bits are initialized by zero.

For the data word 10011011, we can let  the bits of the data word as  w8,w7, w6, w5, w4, w3, w2, w1

Now , put data bits and redundancy bits  as follows.

d12  d11  d10  d9  d8   d7  d6  d5  d4  d3  d2  d1

w8   w7  w6  w5   r8  w4  w3  w2 r4   w1   r2  r1

 1      0    0      1      0     1     0     1    0    0    0   0

r1 = d1  xor  d3  xor d5  xor d7  xor  d9  xor d11

r1 =  0  xor  0  xor 1  xor 1  xor  1  xor 0

r1 =  1

r2 = d2  xor  d3  xor d6  xor d7  xor  d10  xor d11

r2 = 0  xor  0  xor 0  xor 1  xor  0  xor 0

r2 = 1

r4 = d4  xor  d5  xor d6  xor d7  

r4 = 0  xor  1  xor 0  xor 1

r4 = 0

r8 = d8  xor  d9  xor d10  xor d11   xor d12

r8 = 0  xor  1  xor 0  xor 0 xor  1

r8 = 0

So, the data transferred is

d12  d11  d10  d9  d8   d7  d6  d5  d4  d3  d2  d1

w8   w7  w6  w5   r8  w4  w3  w2 r4   w1   r2  r1

 1      0    0      1      0     1     0     1    0    0    1   1

The bits give the binary number as 0011 whose decimal representation is 3. Thus, the bit 3 contains an error. To correct the error the 3th bit is changed from 1 to 0.

You might be interested in
You have just received a generic-looking email that is addressed as coming from the administrator of your company. The email say
natta225 [31]

Answer:

Delete and block the email. It is obviously a scam.

Add-on:

I hope this helped you at all.

6 0
3 years ago
Company-wide systems that connect one or more local area networks (LANs) or wide area networks (WANs) are called _____. a) legac
il63 [147K]

Answer:

The answer is "option c".

Explanation:

A Web-centered view ensures anything has been programmed for the Web app or program. example Webified. This is a definition, that is used for personal use only and all other duplication is strictly forbidden without the approval of the author. and other options are not correct that can be defined as:

  • In option a, the legacy system is a method that is obsoleted today.
  • In option b, The mission-critical systems are used in the navigational system.
  • In option d, A distributed system permits the sharing of information that includes software that is connected with a network.

6 0
4 years ago
Suppose Alice, Bob, and Carol want to use secret key technology to authenticate each other. If they all used the same secret key
HACTEHA [7]

Answer:

No. This is not more secure.

Explanation:

this is not more secure than having all of Carol, bob and Alice having the same key.

alice would be able to know Carol's key for her to be able to verify the answer Carol gave to a challenge by her. she would also have to know bob's key to do the same.

any of these 3 would have to know someone else's secret key to verify answers to any challenge.

the challenge is to know the secret keys if the other two and if done, decryption can easily be done and they can impersonate.

8 0
3 years ago
When you open a browser window, it open in a _____. <br> a. fieldb. folderc. menud. window?
Romashka [77]
D. A window the rest are incorrect
4 0
4 years ago
"if" statements are part of creating computer programs, what are these instructions called and how would you use them?
podryga [215]

Answer:

if means that like (if this happen it will come or not come answer)

Explanation:

sorry I don't know how to tell but plz reply if you understand or not.

7 0
3 years ago
Read 2 more answers
Other questions:
  • I. Given the following Java code fragment, what is output? int a, b; String c, d, e; String x = new String("I LOVE"); String y =
    14·1 answer
  • Need help with this file and due today!!
    6·1 answer
  • A firewall, when properly implemented, can prevent most attacks on your system.
    11·1 answer
  • What are the pros and cons of editorial anonymity in Wikipedia
    10·2 answers
  • A server that provides data transfer and storage space at remote locations is called a
    7·1 answer
  • What best describes "broadband access"? a. broadband access is a specific term used to describe the delivery of one-way televisi
    5·1 answer
  • What did I do wrong? May you please correct it for me...I was also looking on how to delay when it prints. Like when it prints a
    9·1 answer
  • Does anyone know? If you do please answer.
    9·1 answer
  • Please be my friend. my best and only friend isn't talking to me for some reason
    9·2 answers
  • What Microsoft feature enables you to represent text as colorful visuals
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!