1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
s344n2d4d5 [400]
3 years ago
6

Suppose the message 111010 is to be transmitted (beginning with the leftmost bit) using

Computers and Technology
1 answer:
ella [17]3 years ago
4 0

Answer:

Explanation:

Given that:

generator polynomial = x⁴ + x + 1

This form can be expressed in binary form as:

= 1 *x^4 + 0*x^3 +0*x^2 + 1*x^1 +  1*x^0

= 1             0           0           1            1

=10011

The given message = 111010

Now, we can see that the length of the polynomial generator = 5

The next thing to do is to add (5-1) = 4 0's to the given message end

i.e. message = 1110100000

The next process is to divide the message with the generator to deduce the remainder which ill be added to the message for us to create a transmitted message

∴

10011║1110100000║111

        <u>   10011               </u>

           1 1 100

      <u>     1 0011              </u>

              1 1 1 1 0

      <u>        1 001 1              </u>    

                1 1 0 1 0

       <u>         1 0 01 1              </u>

                  1 0 010

        <u>          1 0 01 1              </u>

                     0 010     → Remainder

∴ Transmitted message = 1 1 1 0 1 0 0 0 0 0

                                           <u>                0 0 1 0</u>

                                           1  \ 1  \  1   \ 0  \ 1 \ 0 \ 0 \  0 \  1 \  0

To check and confirm that the message transmitted is correct at the receiver's end, we have to divide the transmitted message with the generator.

So, if the end result of the remainder is 0, then the message is correct, otherwise incorrect.

10011║1110100000║1111

        <u>   10011               </u>

           1 1 100

      <u>     1 0011              </u>

              1 1 1 1 0

      <u>        1 001 1              </u>    

                1 1 0 1 0

       <u>         1 0 01 1              </u>

                  1 0 010

        <u>          1 0 01 1              </u>

                     00000     → Remainder

Hence, the received message is correct.

You might be interested in
Billy used to take care of his laptop. However, one day he lost his laptop. He lost all his data, and there was no way to retrie
katrin [286]
D he didnt have backup obv

5 0
3 years ago
Read 2 more answers
The 3rd generation programming language that most students learned when most computers used MS DOS was ___ . It remains a safe p
Diano4ka-milaya [45]

Answer:

Basic

Explanation:

The 3rd generation programming language that most students learned when most computers used MS DOS was basic. It remains a safe programming language for using 3rd party code and provides a coding standard that integrates easily with other programming languages.

7 0
4 years ago
A(n) ________ file contains data that has been encoded as text, using one of the computer's encoding schemes.
tangare [24]

Hello there

the answer is text

hope this helps

Queen Z

8 0
3 years ago
Read 2 more answers
NAT ________. allows a firm to have more internal IP addresses provides some security both allows a firm to have more internal I
algol13

Answer:

NAT provides some security but allows a firm to have more internal IP addresses

Explanation:

NAT ( network address translation) this is a process where a  network system usually a firewall  assigns a public IP address to an internal computer used in a private network. it limits the number of public IP address a company operating a private network for its computer can have and this is very economical also limits the exposure of the company's private network of computers. the computers can access information within the private network using multiple IP addresses but it is safer to access external information using one public IP address

5 0
3 years ago
25 POINTS!!!!!!!!!!!!!
Paladinen [302]
A leaking data exhaust
7 0
3 years ago
Read 2 more answers
Other questions:
  • You just read an msds for acetic acid. based on what you read, what type of information is included in an msds sheet? record you
    7·1 answer
  • Think of a game you are familiar with and identify at least three team responsibilities which were required to make the game, on
    5·1 answer
  • Why should you delete files from your computer? (multiple answers can be chosen)
    5·2 answers
  • Slicing can best be described as
    9·1 answer
  • Which device can be installed on the edge of your network to allow multiple remote users to connect securely to your internal en
    9·1 answer
  • What will be the values of ans, x, and y after the following statements are executed? int ans = 35, x = 50, y =50; if ( x &gt;=
    7·2 answers
  • Write a loop to output the word EXAM 99 times
    8·1 answer
  • A method that determines if a list is empty in a consistently written linked list class that uses a reference first to point to
    13·2 answers
  • Write a program, called compute_stats.c, which opens a data file, called numbers.txt, which contains of a list of positive integ
    10·1 answer
  • Which is a monthly cost associated with renting a house?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!