Czarnowski and Triantafyllou learned that boat propellers are not very efficient, except penguin propulsion systems.
B) Spreading the news about the incident response plan is not a good idea. If an incident was intentionally caused by a malicious person or group, knowing your response plan gives them information about how to make things worse.
1)How many memory cards (how many can you computer hold)
2)Company (some companies run better than others)
3)Amount of memory (xGb)
Answer: Program for bit stuffing in C
#include<stdio.h>
int main()
{
int i=0,count=0;
char data[50];
printf("Enter the Bits: ");
scanf("%s",data); //entering the bits ie. 0,1
printf("Data Bits Before Bit Stuffing:%s",databits);
printf("\nData Bits After Bit stuffing :");
for(i=0; i<strlen(data); i++)
{
if(data[i]=='1')
count++;
else
count=0;
printf("%c",data[i]);
if(count==4)
{
printf("0");
count=0;
}
}
return 0;
}
Explanation:
bit stuffing is the insertion of non-information bits during transmission of frames between sender and receiver. In the above program we are stuffing 0 bit after 4 consecutive 1's. So to count the number of 1's we have used a count variable. We have used a char array to store the data bits . We use a for loop to iterate through the data bits to stuff a 0 after 4 consecutive 1's.