1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kolezko [41]
3 years ago
8

A binary message consisting of four bits was sent to you by a friend. The message was supposed to be ABAB. Unfortunately, your f

riend set the bit on the wire once every 2 seconds, but you read the wire once every second. Assuming that the first bit was sent and read at the same time, what message did you receive instead?
A. ABABB. AABBC. AAAAD. BBBBE. ABBB
Computers and Technology
1 answer:
Ostrovityanka [42]3 years ago
5 0

Answer:

ABBB

Explanation:

The first bit is sent and read at the same time, and thus, it is "A".

The second bit is sent after 2 seconds, but the reader reads after each second. So, the second, third and fourth terms are all B.

Hence, the overall message is ABBB, and the above option is the correct answer. The others are showing five bits and thus, those options are not the correct ones.

You might be interested in
What device do e-learning applications usually use to help users with visual
Tomtit [17]
The answer is Screen Readers.
6 0
2 years ago
I need help with this line of code:
Usimov [2.4K]

Answer:

remove everything after superhero

Explanation:

newhero==superhero and test it

7 0
3 years ago
Clunker Motors Inc. is recalling all vehicles in its Extravagant line from model years 1999-2002 as well all vehicles in its Guz
Soloha48 [4]

Answer:

boolean recalled;

((modelYear>=1999 && modelYear<=2002 && modelName=="Extravagant") || (modelYear>=2004 && modelYear<=2007 && modelName=="Guzzler")) ? recalled = true : recalled =false

Explanation:

Using a combination of comparison operators and logical operators, the conditions stated in the question is captured in the code snippet with the boolean variable recalled also declared. Since we are not allowed to use the if statement, we have used the conditional or ternary operator that checks if a condition is true executes the statment that follows the question mark else it executes the statement after the full colon.

3 0
3 years ago
What does the following loop do? val = 0 total = 0 while (val &lt; 10): val = val + 1 total = total + val print( total)
Westkost [7]

Answer:

print(total) => 45

Explanation:

# smells like Python...

val = 0 #initialize incrementor named 'val' at 0.

total = 0 #initilize accumulator named 'total' at 0.

while (val < 10): #look to execute while val is less than 10.

 val = val + 1 #increment val (val++) by 1

  total = total + val #increment total by val (val+=total)

# Step: val = 0

## val => 1, total => 1

# Step: val = 1

## val => 2, total => 3

# Step: val = 2

## val => 3, total => 5

# Step: val = 3

## val => 4, total => 9

# Step: val = 4

## val => 5, total => 14

# Step: val = 5

## val => 6, total => 20

# Step: val = 6

## val => 7, total => 27

# Step: val = 8

## val => 9, total => 36

# Step: val = 9

## val => 10 (END_LOOP), total =>  45

print(total) #print variable 'total'

8 0
3 years ago
Secure software development: a security programmer's guide by jason grembi isbn-10: 1-4180-6547-1, isb-13: 978-1-4180-6547
a_sh-v [17]

Secure software development is known to be a kind of methodology (often linked with DevSecOps) for making software that incorporates a lot of security into every stage of the software development life cycle (SDLC).

<h3>What is secure software development practices?</h3>

Secure software development is  seen as a method that is used form the creation of a lot of software that uses both security into all of the phase of the software development making cycle.

This book is known to be  A Programmer's Guide that can be able to  leads readers in all of the tasks and activities that one can do to be successful computer programmers and it is one that helps to navigate in the area of reading and analyzing requirements as well as choosing development tools, and others.

Hence, Secure software development is known to be a kind of methodology (often linked with DevSecOps) for making software that incorporates a lot of security into every stage of the software development life cycle (SDLC).

Learn more about  Secure software development  from

brainly.com/question/26135704

#SPJ1

7 0
2 years ago
Other questions:
  • How does sea floor spreading relate to supercontinents? A. It lowers the overall water level in the ocean so land masses can joi
    13·2 answers
  • _____ documentation is designed to help programmers and systems analysts understand the application software and maintain it aft
    12·1 answer
  • What is the primary reason that companies use third party tracking cookies?
    12·1 answer
  • Assuming x and y are variables of type float, the expression:
    6·1 answer
  • A technician receives an invalid certificate error when visiting a website with port 443 enabled. Other computers on the same LA
    8·1 answer
  • What does it mean when a computer can't break the rules
    10·2 answers
  • Catherine purchased dried herbs from the grocery store. Which structure would she use if wanted to create a mixture of powdered
    8·2 answers
  • You are critiquing a logo design that one of your coworkers proposed. Your sense is that the individual elements of the design a
    10·1 answer
  • What software can be used for remote operation of a sunsdr2 dx?.
    13·1 answer
  • write a recursive function that accepts an integer argument, n. the function should display n lines of asterisks on the screen,
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!