1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
s344n2d4d5 [400]
3 years ago
6

Suppose the message 111010 is to be transmitted (beginning with the leftmost bit) using

Computers and Technology
1 answer:
ella [17]3 years ago
4 0

Answer:

Explanation:

Given that:

generator polynomial = x⁴ + x + 1

This form can be expressed in binary form as:

= 1 *x^4 + 0*x^3 +0*x^2 + 1*x^1 +  1*x^0

= 1             0           0           1            1

=10011

The given message = 111010

Now, we can see that the length of the polynomial generator = 5

The next thing to do is to add (5-1) = 4 0's to the given message end

i.e. message = 1110100000

The next process is to divide the message with the generator to deduce the remainder which ill be added to the message for us to create a transmitted message

∴

10011║1110100000║111

        <u>   10011               </u>

           1 1 100

      <u>     1 0011              </u>

              1 1 1 1 0

      <u>        1 001 1              </u>    

                1 1 0 1 0

       <u>         1 0 01 1              </u>

                  1 0 010

        <u>          1 0 01 1              </u>

                     0 010     → Remainder

∴ Transmitted message = 1 1 1 0 1 0 0 0 0 0

                                           <u>                0 0 1 0</u>

                                           1  \ 1  \  1   \ 0  \ 1 \ 0 \ 0 \  0 \  1 \  0

To check and confirm that the message transmitted is correct at the receiver's end, we have to divide the transmitted message with the generator.

So, if the end result of the remainder is 0, then the message is correct, otherwise incorrect.

10011║1110100000║1111

        <u>   10011               </u>

           1 1 100

      <u>     1 0011              </u>

              1 1 1 1 0

      <u>        1 001 1              </u>    

                1 1 0 1 0

       <u>         1 0 01 1              </u>

                  1 0 010

        <u>          1 0 01 1              </u>

                     00000     → Remainder

Hence, the received message is correct.

You might be interested in
Suppose users share a 1-Gbps link. Also, suppose each user requires 200 Mbps when transmitting, but each user only transmits 30
V125BC [204]

Answer:

The answer is "5 users and 1 block".

Explanation:

In Option a:

Bandwidth total = 1-Gbps \times 1000

                          = 1,000 \ Mbps      

Any User Requirement = 200 \ Mbps

The method for calculating the number of approved users also is:  

Now, calculate the price of each person for overall bandwidth and demands,  

\text{Sponsored user amount} = \frac{\text{Bandwidth total}}{\text{Each user's requirement}}

                                     =\frac{1000}{200}\\\\=\frac{10}{2}\\\\= 5 \ users

In Option b:

\text{blocking probability} = \frac{link}{\text{1-Gbps} = 10^9 \frac{bits}{sec}}

\ let = 0.05 = \frac{100}{20} \\\\\text{blocking probability} = \frac{ 200 \times 10^6}{\frac{100}{20}}

                                = \frac{ 200 \times 10^6 \times 20 }{100}\\\\= \frac{ 2 \times 10^6 \times 20 }{1}\\\\= 40 \times 10^6 \\\\

mean user = 25 \times \frac{1}{20} \\\\

                  = 1.25

max user = \frac{10^9}{40 \times 10^6} \\\\

                = \frac{10^9}{4 \times 10^7} \\\\ = \frac{10^2}{4} \\\\ = \frac{100}{4} \\\\= 25 \\\\ =\ \ 1 \ \ block \\\\

3 0
3 years ago
A home user reports to a network technician that the Internet is slow. The network administrator discovers that multiple unknown
BabaBlast [244]

Answer:

Option (A) A successful WPS attack has occurred

Explanation:

  • WPS stands for Wi-Fi Protected Setup.
  • Its a network security protocol in the Wi-Fi which has a vulnerability.
  • The connection to the Wi-Fi can be established through the router in four ways. They are
  • (a) PIN method
  • (b) Push button method
  • (c) Near field communication method
  • (d) USB Method.
  • Out of all the modes to be connected to the network, the PIN method has a flaw in it.
  • In this PIN method, an attacker can brute force the PIN (guessing the PIN by some techniques) and gain unauthorized access to the network.
  • In the given case in the question, the network administrator finds that multiple unauthorized devices has gained access to the network.
  • Option (A) is correct.
  • Option (B) ARP Poisoning, (C) botnet and (D) Evil Twin attack are different and so are the wrong options.  
3 0
3 years ago
Read 2 more answers
Windows Rights Management Services is used in conjunction with which Microsoft applications?
Mariana [72]
“Word” is your answer
6 0
3 years ago
The "fathers of the internet" are vinton cerf and ________.
Harrizon [31]
Robert E Kahn I hope this helps
8 0
3 years ago
Arman, a friend of your dad, has a computer running Windows 7 and wants to perform an upgrade. He has only 3GB of RAM in his com
torisob [31]

Answer:

Low memory?

So to fix the problem you could add more memory to the machine.

Explanation:

8 0
3 years ago
Other questions:
  • When cleaning a firearm, what end of the firearm should you generally clean from?
    11·2 answers
  • Arrays are described as immutable because they are two dimensional. are arranged sequentially. can be reordered. cannot be chang
    11·1 answer
  • A(n) _____ measures the ability to juggle a variety of demands, as in a manager's job where the candidate is presented with simu
    8·1 answer
  • You can count on everything online to be 100% accurate. <br> A. FALSE <br> B. TRUE
    11·2 answers
  • 120
    14·1 answer
  • Lets say if my computer shut down every 10 minutes. What can you do to solve the problem. Hint: Use these word in you answer: ha
    10·2 answers
  • Write the two features of a mouse.​
    9·1 answer
  • Output each floating-point value with two digits after the decimal point, which can be achieved by executing cout &lt;&lt; fixed
    7·1 answer
  • Cloud architects have been largely replaced by ScrumMasters.<br><br> True<br><br> False
    15·2 answers
  • What's the best item in the binding of isaac?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!