1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jolli1 [7]
3 years ago
15

Assume that the message M has to be transmitted. Given the generator function G for the CRC scheme, calculate CRC. What will be

the bit sequence that actually gets transmitted?
Computers and Technology
1 answer:
ANEK [815]3 years ago
7 0

Let the message be M : 1001 0001   and the generator function is G : 1001

Solution :

CRC sender

            <u>                                     </u>

1001     | 1001  0001  000

           <u>  1001                             </u>

           <u> 0000  0001             </u>

                        1000

            <u>            1001             </u>

                        0001  000

                             <u>    1 001  </u>

                                 0001

Here the generator is 4 bit - 1, so we have to take three 0's which will be replaced by reminder before sending to received--

eg    1001  0001  001    

Now CRC receiver

                <u>                                     </u>

1001         | 1001    0001   001

                <u> 1001                           </u>

                 0000 0001

                       <u>     1001                  </u>

                            1000

                          <u>  1001              </u>

                            0001  001

                    <u>        0001  001      </u>

                                   0000

No error

You might be interested in
. How to insert Section Break in Microsoft word 2016 ?
aivan3 [116]

Answer:

C. Layout Tab – Page setup group – Breaks – Next page button.

3 0
3 years ago
To increase security on your company's internal network, the administrator has disabled as many ports as possible. Now, however,
tia_tia [17]

Answer: 443

Explanation:

Port 443 will need to be enabled for secure transactions to go through because it is the default port for HTTPS which is the transfer protocol for secure communication.

This way your credit card transactions will be encrypted to ensure protection from those who would seek to steal your data and your money.  

8 0
3 years ago
What should you do in order to have access to the header and footer tools? Open the View tab. Open the Page Setup dialog box. Op
Svetach [21]

Answer:

Step 1  - Open the View tab.

Step 2 - Open the Page Setup dialog box

Step 3 - Open the header and footer tool.

Step 4 - Click OK.

Explanation:

In order to access to the header and footer tools

Step 1  - Open the View tab.

Step 2 - Open the Page Setup dialog box

Step 3 - Open the header and footer tool.

Step 4 - Click OK.

4 0
3 years ago
Write a MATLAB script m-file to compute the ISS given an array of 6 AIS scores, which represent the most severe injuries to each
Dmitrij [34]

Answer:

The Matlab code is as given in the explanation, paste the code in the new script file, save it and run.

Explanation:

The code is as follows

Code:

<em>%% Initialization of the code</em>

<em>% The code takes an array of six AIS scores of the form [AIS1 AIS2 AIS3</em>

<em>% AIS4 AIS5 AIS6] of order 1x6.</em>

<em>AIS=input('Please enter the AIS array of the form [AIS1 AIS2 AIS3 AIS4 AIS5 AIS6]');%taking input of the array</em>

<em>AISs=sort(AIS,'descend');%sorting the array in the descending order</em>

<em>iss=(AISs(1,1)^2)+(AISs(1,2)^2)+(AISs(1,3)^2);%Calculating the ISS</em>

<em>disp(['The injury severity score (ISS) for the entered array is ', num2str(iss)])%Displaying the output</em>

Output:

<u><em>Please enter the AIS array of the form [AIS1 AIS2 AIS3 AIS4 AIS5 AIS6][3 0 4 5 3 0];</em></u>

<u><em>The injury severity score (ISS) for the entered array is 50</em></u>

<u><em /></u>

4 0
3 years ago
When a program has several modules calling other modules, programmers often use a program ____, which operates similarly to an o
maw [93]

Answer:

hierarchy chart

Explanation:

Based on the information provided within the question it can be said that in this scenario programmers usually use a hierarchy chart. This is a chart that shows the relationship that exists between various different modules that are able to call on another. Therefore showing the programmers the organization of the entire overall program.

3 0
3 years ago
Other questions:
  • What does the "configure dhcp options for proxy dhcp" option do?
    13·1 answer
  • Need answers for 11&amp;12. Due today. Thanks.
    14·1 answer
  • Give an example of an app, website, or a game that used addictive design. Describe three features of addictive design it uses.
    11·2 answers
  • Which is a copyright
    13·2 answers
  • Organizing speech ideas according to physical space, direction, or location calls for a _____ organizational pattern.
    11·1 answer
  • What is connected to the base unit in Desktop PC?
    14·1 answer
  • The Internet is based on a U.S. government project called ________. Today, the Internet is a collection of networks, tied togeth
    5·1 answer
  • Enzo is writing a paper about the similarities and differences between ancient Rome and modern America. Which text structure is
    9·2 answers
  • When trying to upload assignment on canvas wont let me click choose file.
    6·1 answer
  • What Is The First Computer Brought In Nepal ? <br>​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!