1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Licemer1 [7]
3 years ago
7

16-bit messages are transmitted using a Hamming code. How many check bits are needed to ensure that the receiver can detect and

correct single-bit errors? Show the bit pattern transmitted for the message 1101001100110101. Assume that even parity is used in the Hamming code.
Computers and Technology
1 answer:
Sergio [31]3 years ago
6 0

Answer: 5 check bits are needed

Explanation:

We know that

m + r + 1 = 2r

For m = 16, r = 5.

Therefore we need 5 check bits for 16-bit messages.

For message 1101001100110101, we know the codeword should be:**1*101*0011001*10101, in which bit 1, 2, 4, 8, 16 are check bits to becomputed.

3 = 1 + 2

5 = 1 + 4

6 = 2 + 4

7 = 1 + 2 + 4

9 = 1 + 8

10 = 2 + 8

11 = 1 + 2 + 8

12 = + 4 + 8

13 = 1 + 4 + 8

14 = 2 + 4 + 8

15 = 1 + 2 + 4 + 8

16 = + 2 +2 + 4+ 8

You might be interested in
? Which of these games was the first to be released? Tron Pong Centipede Galaxian
Rzqust [24]
Pong was the first to come out since it came out in 1972. Tron came out in 1982, Centipede came out in 1980, and Galaxian came out in 1979.
4 0
3 years ago
You are a Junior IT Technician in your organisation. One of the duties is to demonstrate and explain how the computer works to n
shtirl [24]

As an Junior IT technician in your company. One of the responsibilities is to set up and Install computer structures for the new intern staff members in order to display and explain how the computer functions to them.

How will you address one or more technical areas?

Depending on the dimensions of the employer you account for, the answer varies. It's not uncommon for a technical IT support team to be split into first- and second-line support, with the second-line support team taking care of the more specialist inquiries that the first-line support team couldn't handle.

I'll explain how to set up and configure computer systems, identify hardware and software issues, and resolve technical and awareness issues, either over the phone or in person, in my capacity as an IT technician.

Learn more about organisations here:

brainly.com/question/26965722

#SPJ10

4 0
2 years ago
How do keystroke dynamics determine whether to authenticate an individual or not?
inysia [295]
<span>Keystroke dynamics determine whether to authenticate an individual or not w</span>ith dwell and flight time.  <span>Dwell time (the time a key pressed) and Flight time (the time between "key up" and the next "key down") . These keystroke dynamics prevent online fraud.</span>
5 0
3 years ago
(70 points, ip address)If anyone can solve all these questions correctly
Mrac [35]

Answer:

its c

Explanation:

4 0
3 years ago
Suppose that a computer has three types of floating point operations: add, multiply, and divide. By performing optimizations to
marishachu [46]

Answer:

1.84

Explanation:

Operation on old system

Add operation = 50% = 0.5

Multiply = 30% = 0.3

Divide = 20% = 0.2

T = total execution time

For add = 0.5T

For multiplication = 0.3T

For division = 0.2T

0.5T + 0.3T + 0.2T = T

For new computer

Add operation is unchanged = 0.5T

Multiply is 10 times faster = 0.3T/10 = 0.03T

Divide is 15 times faster = 0.2T/15= 0.0133T

Total time = 0.5T + 0.03T + 0.0133T

= 0.54333T

Speed up = Old time/ new time

= T/0.54333T

= 1/0.54333

= 1.84

6 0
3 years ago
Other questions:
  • A restaurant bill comes to $28.35. Find the total cost if the tax is 6.25% and a 20% tip is left on the amount before tax.​
    6·1 answer
  • Using underlining and italics at the same time is which of these? A. allowed but might be overkill B. always a good idea C. not
    15·2 answers
  • Explain how signal detection theory can be used to analyze web site reading and searching. Based on this analysis, provide three
    14·1 answer
  • Please help me please i really need helpp so i can pass
    13·1 answer
  • Hubs hardware advantage's and disadvantages​
    7·1 answer
  • Ian kno da answer tell me
    7·2 answers
  • Which solution eliminates the need for dedicated high-speed WAN connections between sites
    5·1 answer
  • Which of the following traversals would print all of the elements in the 2D array of integers nums
    14·1 answer
  • [ASAP!] Which of these can be a problem for people with accessibility issues? Select 4 options.
    11·1 answer
  • Q1) What would be the output of the program shown in the figure?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!