1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
s344n2d4d5 [400]
2 years ago
6

Suppose the message 111010 is to be transmitted (beginning with the leftmost bit) using

Computers and Technology
1 answer:
ella [17]2 years ago
4 0

Answer:

Explanation:

Given that:

generator polynomial = x⁴ + x + 1

This form can be expressed in binary form as:

= 1 *x^4 + 0*x^3 +0*x^2 + 1*x^1 +  1*x^0

= 1             0           0           1            1

=10011

The given message = 111010

Now, we can see that the length of the polynomial generator = 5

The next thing to do is to add (5-1) = 4 0's to the given message end

i.e. message = 1110100000

The next process is to divide the message with the generator to deduce the remainder which ill be added to the message for us to create a transmitted message

∴

10011║1110100000║111

        <u>   10011               </u>

           1 1 100

      <u>     1 0011              </u>

              1 1 1 1 0

      <u>        1 001 1              </u>    

                1 1 0 1 0

       <u>         1 0 01 1              </u>

                  1 0 010

        <u>          1 0 01 1              </u>

                     0 010     → Remainder

∴ Transmitted message = 1 1 1 0 1 0 0 0 0 0

                                           <u>                0 0 1 0</u>

                                           1  \ 1  \  1   \ 0  \ 1 \ 0 \ 0 \  0 \  1 \  0

To check and confirm that the message transmitted is correct at the receiver's end, we have to divide the transmitted message with the generator.

So, if the end result of the remainder is 0, then the message is correct, otherwise incorrect.

10011║1110100000║1111

        <u>   10011               </u>

           1 1 100

      <u>     1 0011              </u>

              1 1 1 1 0

      <u>        1 001 1              </u>    

                1 1 0 1 0

       <u>         1 0 01 1              </u>

                  1 0 010

        <u>          1 0 01 1              </u>

                     00000     → Remainder

Hence, the received message is correct.

You might be interested in
Write a program that reads in 10 numbers from the user and stores them in a 1D array of size 10. Then, write BubbleSort to sort
Diano4ka-milaya [45]

Answer:

The solution is provided in the explanation section.

Detailed explanation is provided using comments within the code

Explanation:

import java.util.*;

public class Main {

//The Bubble sort method

public static void bb_Sort(int[] arr) {  

   int n = 10; //Length of array  

   int temp = 0; // create a temporal variable  

   for(int i=0; i < n; i++){  

         for(int j=1; j < (n-i); j++){  

           if(arr[j-1] > arr[j]){  

               // The bubble sort algorithm swaps elements  

               temp = arr[j-1];  

               arr[j-1] = arr[j];  

               arr[j] = temp;  

             }  

         }            

         }  

        }

 public static void main(String[] args) {

   //declaring the array of integers

   int [] array = new int[10];

   //Prompt user to add elements into the array

   Scanner in = new Scanner(System.in);

   //Use for loop to receive all 10 elements

   for(int i = 0; i<array.length; i++){

     System.out.println("Enter the next array Element");

     array[i] = in.nextInt();

   }

   //Print the array elements before bubble sort

   System.out.println("The Array before bubble sort");

   System.out.println(Arrays.toString(array));

   //Call bubble sort method

   bb_Sort(array);  

               

   System.out.println("Array After Bubble Sort");  

   System.out.println(Arrays.toString(array));

 }

}

8 0
2 years ago
What is the role of the W3C? Group of answer choices oversee research and set standards for many areas of the Internet supervise
Murljashka [212]

Answer:

oversee research and set standards for many areas of the Internet

Explanation:

World Wide Web Consortium was created to maintain a standard order in the cyber world. It is an international community formed by the organizations as a member. W3C sets the standards of the websites and enables them to function and appear the same in every web browser. A specific standard of guidelines, rules, and protocols are fixed so that the World Wide Web can function and grow respectively.

5 0
3 years ago
What is a tax exemption (also known as a tax allowance)?
KengaRu [80]
<span>Tax exemption refers to a monetary exemption which reduces taxable income. Tax exempt status can provide complete relief from taxes, reduced rates, or tax on only a portion of items.</span>
4 0
2 years ago
What is the effect of block size in cache design?
Sedaia [141]

Answer:

When designing a cache, you have to consider this things:

  • Delay.
  • Miss rate.
  • Area.

If the cache has a bigger block size may have a lower delay, but when miss the miss rate will be costly. If an application has high spatial locality a bigger block size will do well, but programs with poor spatial locality will not because a miss rate will be high and seek time will be expensive.

5 0
3 years ago
What is the value of the variable phones after the execution of the following code? phones = {'John': '5555555', 'Julie' : '7777
uysha [10]

Answer:

phones = {'John': '1234567', 'Julie' : '7777777'}

Explanation:

In the code given in the question phones dictionary contains contains two keys John and Julie and have the values '5555555' and '7777777' respectively. Now in the code the key John in the dictionary phones is assigned the value '1234567' .So the value corresponding to the key John becomes '1234567'.

3 0
3 years ago
Other questions:
  • Is anyone else experiencing the wording::nonifacation::glitch about the "5 hours ago" thingy to whenever you answer a question o
    7·2 answers
  • What runs a network, steering information between computers and managing security and users?
    11·1 answer
  • For homework, we have to figure out what's in the picture. It's " too close to tell " but I can't figure out what it is. Any ide
    11·1 answer
  • WHAT IS A COMPUTER ????
    14·2 answers
  • What's a sentence with the words trickle and resume in it? they can be in any tense. Thanku​
    5·1 answer
  • The operating system’s application programming interface (API) provides software developers with tools they use to build applica
    5·1 answer
  • 10.7 LAB: Fat-burning heart rate Write a program that calculates an adult's fat-burning heart rate, which is 70% of 220 minus th
    8·1 answer
  • When using the Common Internet File System (CIFS), which security model does not require a password to be set for the file share
    7·1 answer
  • Write a program that lets the user perform arithmetic operations on fractions. Fractions are of the form a/b, in which a and b a
    11·1 answer
  • What type of html list will automatically place a list marker, or bullet point, indicator in front of each item? group of answer
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!