1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
4vir4ik [10]
3 years ago
15

Assuming we are using the Hamming algorithm presented in your text and even parity to design an error-correcting code, find the

code word to represent the 8-bit information word 10011011
Computers and Technology
1 answer:
Rudik [331]3 years ago
3 0

Answer:

Before redundancy :100101011100

After checking parity redundancy: 100101010011

Explanation:

First calculate redundant bits ,

We know that the number of redundant bits can be calculated using the following formula:

2^r ≥ m + r + 1

r = redundant bit, m = data bit

total data bits = 8

so ,

2^4 ≥ 8 + 4 + 1

16 ≥ 13

so, redundant bits is 4

Now let they denoted by r1, r2, r4, and r8, as the redundant bits are placed at positions corresponding to power of 2:    1, 2, 4, and 8.  

All the redundant bits are initialized by zero.

For the data word 10011011, we can let  the bits of the data word as  w8,w7, w6, w5, w4, w3, w2, w1

Now , put data bits and redundancy bits  as follows.

d12  d11  d10  d9  d8   d7  d6  d5  d4  d3  d2  d1

w8   w7  w6  w5   r8  w4  w3  w2 r4   w1   r2  r1

 1      0    0      1      0     1     0     1    0    0    0   0

r1 = d1  xor  d3  xor d5  xor d7  xor  d9  xor d11

r1 =  0  xor  0  xor 1  xor 1  xor  1  xor 0

r1 =  1

r2 = d2  xor  d3  xor d6  xor d7  xor  d10  xor d11

r2 = 0  xor  0  xor 0  xor 1  xor  0  xor 0

r2 = 1

r4 = d4  xor  d5  xor d6  xor d7  

r4 = 0  xor  1  xor 0  xor 1

r4 = 0

r8 = d8  xor  d9  xor d10  xor d11   xor d12

r8 = 0  xor  1  xor 0  xor 0 xor  1

r8 = 0

So, the data transferred is

d12  d11  d10  d9  d8   d7  d6  d5  d4  d3  d2  d1

w8   w7  w6  w5   r8  w4  w3  w2 r4   w1   r2  r1

 1      0    0      1      0     1     0     1    0    0    1   1

The bits give the binary number as 0011 whose decimal representation is 3. Thus, the bit 3 contains an error. To correct the error the 3th bit is changed from 1 to 0.

You might be interested in
What special member function of a class is called whenever an instance of a class is created and initialized?
allochka39001 [22]
It's called a constructor function, but it's name is the same as the class' name.
6 0
3 years ago
How serious are the risks to your computer security?
ASHA 777 [7]

The seriousness of  the risks to your computer security is not to be a severe one. This is because Computer security risks  are due to the handwork of  malware such as, bad software, that can infect a  computer, and make the hacker to destroy your files, steal your data, or even  have access to your system without one's knowledge or authorization.

<h3>What are the risk results for information and computer security?</h3>

The term “information security risk” is known to be those  damage that occurs due to  an attacks against IT systems. IT risk is made up of a wide range of potential events, such as data breaches, regulatory enforcement actions, financial costs, and a lot more.

Some Examples of malware are viruses, worms, ransomware, spyware, and a lot others.

Hence, The seriousness of  the risks to your computer security is not to be a severe one. This is because Computer security risks  are due to the handwork of  malware such as, bad software, that can infect a  computer, and make the hacker to destroy your files, steal your data, or even  have access to your system without one's knowledge or authorization.

Learn more about computer security from

brainly.com/question/12010892

#SPJ1

6 0
2 years ago
Which of these devices is usually the default gateway for most home networks?
IrinaVladis [17]

What are the choices?

6 0
4 years ago
Write a function SwapArrayEnds() that swaps the first and last elements of the function's array parameter. Ex: sortArray = {10,
ludmilkaskok [199]

Answer:

Replace /* Your solution goes here*/ with the following

<em>void SwapArrayEnds(int sortArray [], int lent){ </em>

<em>    int temp = sortArray[0]; </em>

<em>    sortArray[0] = sortArray[lent-1]; </em>

<em>    sortArray[lent-1] = temp; </em>

<em>} </em>

<em />

Explanation:

This defines the function SwapArrayEnds with two parameter (the array and the array length)

<em>void SwapArrayEnds(int sortArray [], int lent){ </em>

This declares an integer variable "temp" and initializes it with the first element of the array

<em>    int temp = sortArray[0]; </em>

The next two lines swap the last element with the first

<em>    sortArray[0] = sortArray[lent-1]; </em>

<em>    sortArray[lent-1] = temp; </em>

<em>} </em>

<em />

<em>See attachment for full program</em>

Download cpp
3 0
3 years ago
The main circuit board of a computer is the _______. The ______ is located on the circuit board. The _____ is the circuitry that
Inessa05 [86]

Answer:

The main circuit board of a computer is the Motherboard. The Processor(CPU) is located on the circuit board. The Processor(CPU) is the circuitry that processes information. The CPU is also known as the brain of the computer. The speed of the processor is controlled by the clock. The system clock controls the timing of all computer operations.

Explanation:

4 0
4 years ago
Other questions:
  • _ is the use of a collection of computers, often owned by many people or different organizations, to work in a coordinated manne
    6·1 answer
  • In real-world environments, risks and their direct consequences will most likely span across several domains. However, in the la
    12·1 answer
  • 2 A_______<br> uses graphics or pictures to help the user navigate and<br> access programs
    14·1 answer
  • जिल्ला । स्तरीय = 'जिल्ला स्तरीय' भए जस्तै तलका शब्दमा स्तरीय जोडेर
    12·1 answer
  • True or False?Only flying unmanned aircraft over 20lbs requires preparation and safety calculations.
    8·1 answer
  • Consider the following high-level recursive procedure: long long int flong long int n, long long int k long long int b b k+2; if
    9·1 answer
  • A startup company is using an excel spreadsheet to keep track of the billable hours that each employee spends on a project. As y
    12·1 answer
  • I just logged onto brainly and all my questions were deleted and i lost 2 brainliest. What has brainly done to my account I also
    6·2 answers
  • Assuming a single-processor system, that load and store are atomic, that x is initialized to 0, and that x must be loaded into a
    8·1 answer
  • television broadcasts were originally delivered by using which technology? ethernet wireless coaxial cable broadband
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!