1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
s344n2d4d5 [400]
3 years ago
6

Suppose the message 111010 is to be transmitted (beginning with the leftmost bit) using

Computers and Technology
1 answer:
ella [17]3 years ago
4 0

Answer:

Explanation:

Given that:

generator polynomial = x⁴ + x + 1

This form can be expressed in binary form as:

= 1 *x^4 + 0*x^3 +0*x^2 + 1*x^1 +  1*x^0

= 1             0           0           1            1

=10011

The given message = 111010

Now, we can see that the length of the polynomial generator = 5

The next thing to do is to add (5-1) = 4 0's to the given message end

i.e. message = 1110100000

The next process is to divide the message with the generator to deduce the remainder which ill be added to the message for us to create a transmitted message

∴

10011║1110100000║111

        <u>   10011               </u>

           1 1 100

      <u>     1 0011              </u>

              1 1 1 1 0

      <u>        1 001 1              </u>    

                1 1 0 1 0

       <u>         1 0 01 1              </u>

                  1 0 010

        <u>          1 0 01 1              </u>

                     0 010     → Remainder

∴ Transmitted message = 1 1 1 0 1 0 0 0 0 0

                                           <u>                0 0 1 0</u>

                                           1  \ 1  \  1   \ 0  \ 1 \ 0 \ 0 \  0 \  1 \  0

To check and confirm that the message transmitted is correct at the receiver's end, we have to divide the transmitted message with the generator.

So, if the end result of the remainder is 0, then the message is correct, otherwise incorrect.

10011║1110100000║1111

        <u>   10011               </u>

           1 1 100

      <u>     1 0011              </u>

              1 1 1 1 0

      <u>        1 001 1              </u>    

                1 1 0 1 0

       <u>         1 0 01 1              </u>

                  1 0 010

        <u>          1 0 01 1              </u>

                     00000     → Remainder

Hence, the received message is correct.

You might be interested in
Type the correct answer in the box. Spell all words correctly.
8_murik_8 [283]

Answer:

I believe that this is frying. When you cook food on a flat-topped piece of equipment you are usually using a frying pan.

Explanation:

7 0
2 years ago
. Suppose: x = (1111 1111 1111 1111 1111 1111 1111 1100)2 y = (0011 1011 1001 1010 1000 1010 0000 0000)2 a. Is x bigger than y i
ahrayia [7]

Answer:

a. Using 32bit unsigned binary system, x is bigger than y

b. Using 32 bit signed system, x is not bigger than y.

Explanation:

a.

x = (1111 1111 1111 1111 1111 1111 1111 1100)2

y = (0011 1011 1001 1010 1000 1010 0000 0000)2

In an unsigned system all binary digits are used up as the magnitude bits;

First, we need to convert each number to decimal

x = 4294967292 (decimal)

y = 999983616 (decimal)

4294967292 is greater than 999983616

So, x is greater than y (in 32 bit unsigned binary system)

b.

x = (1111 1111 1111 1111 1111 1111 1111 1100)2

y = (0011 1011 1001 1010 1000 1010 0000 0000)2

In a signed system, the most significant bit is used as the signed bit, the remaining bits are used in representing the magnitude bits;

The most significant bit is always the first bit.

0 represents positive (+)

While

1 represents negative (-)

First we need to separate the most significant bit from the magnitude bits.

So x = 1 (111 1111 1111 1111 1111 1111 1111 1100)2

And y = 0 (011 1011 1001 1010 1000 1010 0000 0000)2

Then, we need to convert each number to decimal

x = -2147483644

y = +999983616

From the above, y is greater than x

4 0
3 years ago
For a list of numbers entered by the user and terminated by 0, find the sum of the positive number and the sum of the negative n
Katena32 [7]

Summarize all positive numbers as follows: + It's good. The total of all negative numbers is:, write it down. + Unfavorable.

<h3>What is C++ language?</h3>

C++ language is defined as a general-purpose programming language that supports procedural, object-oriented, and generic programming and is case-sensitive and free-form.  As well as being used for in-game programming, software engineering, data structures, and other things, C++ is also utilized to create browsers, operating systems, and applications.

An application that adds all positive integers and stores them in variables, as well as adding all negative numbers and storing them in variables. The software should print the values for both variables at the conclusion and compute their average. When the user enters a zero, the software should terminate.

Thus, summarize all positive numbers as follows: + It's good. The total of all negative numbers is:, write it down. + Unfavorable.

To learn more about C++ language, refer to the link below:

brainly.com/question/1516497

#SPJ1

8 0
2 years ago
Another html/css assignment, drop css code below, thank you
Reil [10]

This is what I come up with. I'm unclear what the 4th requirement means, so I've labeled it #unclear.


a { color : red; }

p:not(:first-child)  { text-indent: 5%; }

div { background-color: aqua; }

#unclear { width: 50%; margin-left: 25%; margin-right: 25%; }

.links:link { font-size 24px; background-color: yellow; }

#first { text-transform: uppercase; font-style: italic; }

6 0
4 years ago
In implementing Security Life Cycle:__________
Dvinal [7]

Answer:

b) one needs to follow through all phases, assessment, design, deploy and manage security

Explanation:

The security life cycle is a process in which it involves the security artifacts for developing the software through a lifecycle. It contains a detailed plan that derives how to create an application form

At the time when the requirements and activity related to design is finished the next step is the software implementation. In this, the developers begins with the coding as per the requirements and designs discussed in the last step

Therefore according to the given options, the second option is correct

7 0
3 years ago
Other questions:
  • One of the earlier applications of crypto-graphic hash functions was the storage of passwords to authenticate usersin computer s
    13·1 answer
  • Validating the users claimed identity is called which of the following?A. AuthenticationB. IdentificationC. VerificationD. Valid
    15·1 answer
  • Which of the following is the java comparison operator for "not equal to"
    10·1 answer
  • A type of specialty processor devoted exclusively to protecting your privacy.
    9·2 answers
  • What are some of the good effects of social media
    7·1 answer
  • LILLE VIC LUNCUL ANCI.
    5·1 answer
  • Which of the four digital-to-analog conversion techniques is the most susceptible to noise? EXPLAIN WHY.
    6·1 answer
  • _____ are the most fundamental components of designing a training program that determine the amount of stress placed on the body
    6·1 answer
  • What is a worm?
    11·1 answer
  • Who is considered as the father of computer science?​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!