1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zavuch27 [327]
3 years ago
11

Please Answer these following Question very urgent "file attch"

Computers and Technology
1 answer:
Tanya [424]3 years ago
3 0

Answer:

1. ∑ numbers=57

Overall ∑ is 57 hence.

And each number is less than 15, and hence they can be represented in 4 bits

However, we cannot write 57 in 4 bits.

However, 111001 is 57 in binary, and it is as well greater than 4 bits.

Hence, we are adding the two extreme left bits to right 4 bits as mentioned below.

Left are 11, right bits are 1001

1001

   11

1110 is the checksum

=14 and this is 14 bits.

2. The degree of given polynomial is 3, and hence,

The divisor is X3+1 =1001

Original data word=10110

Since the size of CRC is 3 bits, we should place 3 zeros to the right of the original data

And thus we get,  

10110000

         10100

1001√10110000

         1001

         00100000

         1001

         --------------

         0100   CRC

We send our data 10110 its reminder (CRC) will be added with it like 10110100

Receiver will receive 10110100 with same divisor 1001

         10100

1001√10110100

         1001

---------------------------

         01001

           1001

--------------------------------

           000

And since the last 3 bits are zero, and hence its error free.

3.

At 7 and 5 we have 1 and similarly in 2nd at 8, 4 and 0

  Bits    Polynomial

1010000        X7+X5+0

10001001 X8+X4+1

Explanation:

Please check answer.

You might be interested in
Why would you use a billeted list in a slide presentation?
Damm [24]

Answer:

You would use a Bullet Point on a slide presentation because its concise and to the point.

Explanation:

The correct way to use a Bullet point is to keep it simple. Its not made to be a full sentence. You need to create a bullet point you can expand upon. when you keep it plain and simple you can get more info on your points.

7 0
3 years ago
Anyone know what this is pls help
andreyandreev [35.5K]

Answer:

Grass

Explanation:

When the wind blows grass or small plants start dancing (?)

<em>#</em><em>S</em><em>p</em><em>r</em><em>e</em><em>a</em><em>d</em><em>T</em><em>h</em><em>e</em><em>K</em><em>n</em><em>o</em><em>w</em><em>l</em><em>e</em><em>d</em><em>g</em><em>e</em>

4 0
3 years ago
John is analyzing strange behavior on computers in his network. He believes there is malware on the machines. The symptoms inclu
enot [183]

Answer:

Boot Sector Virus

Explanation:

A malicious software or malware is an executable line of code, programmed by a cybercriminal for ill intentions. There are many types of malware namely; viruses, rootkit, keylogger, trojan horse etc.

A boot sector virus is a kind of malware that runs before the operating system, affecting the boot sector of the hard disk, so even when a linux live cd is running as the operating system, the virus is still active.

5 0
3 years ago
In a blockchain, each block has a unique hash value which is dependent on the hash value of the previous block in the chain. Wha
pantera1 [17]

Answer: hello your question lacks the required option, below are the missing options

A. The transaction data in the tampered block is deleted, and a copy is created with the same hash value.

B. The hash values of transaction data of subsequent blocks are validated, and the chain is broken.

C. The hash value for the entire block is nullified, creating a domino effect on all subsequent blocks.

D. The hash values of subsequent blocks are updated as soon as they are tampered with, and the chain continues.

answer : The hash values of subsequent blocks are updated as soon as they are tampered with, and the chain continues ( D )

Explanation:

What happens if a transaction data is changed in an earlier existing block in a Blockchain is that the Hash values of subsequent blocks will be updated as soon as they are tampered with and the chain will continue.

Blockchain is a specially design system for recording information, hence any change in data inputted in an earlier existing blocks that changes will automatically be updated as well in all preceding blocks.

4 0
3 years ago
Which shape denotes a process to be carried out in a flowchart?
luda_lava [24]

The answer is a rectangle.

6 0
3 years ago
Read 2 more answers
Other questions:
  • Which code returns the date in the format friday, april 20th, 2015?
    13·1 answer
  • What OS has a large market share but is limited because it can be installed only on one particular brand?
    8·2 answers
  • People in STEM careers are considered thinkers who reach conclusions through sound judgment and reasoning.
    11·1 answer
  • When information about a person remains on the internet indefinitely it is known as?
    6·1 answer
  • What is an example of how pseudo - randomness is used to creative variation​
    5·1 answer
  • According to the municipal solid waste report what are the benefits of recycling
    6·1 answer
  • What is the output of the following program?
    5·1 answer
  • You entered the following line of code in IDLE.
    15·2 answers
  • Ashley has many interests. She likes to read, listen to music, and play soccer with her friends. But her favorite thing to do is
    9·1 answer
  • A drive is small enough to be carried in one's pocket.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!