1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arisa [49]
2 years ago
5

Suppose we want an error correcting code that will allow all single-bit errors to be corrected for memory words of length 15. 1.

How many check bits are necessary?2. Assuming we are using the Hamming algorithm presented to design our error-correcting code, find the code word to represent the 12-bit information word: 100100011010
Computers and Technology
1 answer:
alexira [117]2 years ago
5 0

Answer:

15

Explanation:

01234567891011121314

You might be interested in
You need to protect sensitive files from unauthorized users even if the disk is stolen. What feature should you use and on what
Lynna [10]

Answer:

EFS on NTFS

Explanation:

EFS (Encryption File System) allows users to store confidential information about a computer when people who have physical access to your computer could otherwise compromise that information, intentionally or unintentionally. EFS is especially useful for securing sensitive data on portable computers or on computers shared by several users.  An attacker can also steal a computer, remove the hard drive(s), place the drive(s) in another system, and gain access to the stored files. Files encrypted by EFS, however, appear as unintelligible characters when the attacker does not have the decryption key.

The Encrypting File System (EFS) that is included with the operating systems provides the core file encryption technology to store NTFS files encrypted on disk.

7 0
3 years ago
Difference between ram and rom​
BigorU [14]

Answer:

<h2> RAM</h2>
  • <em>It</em><em> </em><em> </em><em>stands</em><em> </em><em>for</em><em> </em><em>Random</em><em> </em><em>Access</em><em> </em><em>memory</em><em>.</em>
  • <em>It</em><em> </em><em>is</em><em> </em><em>used</em><em> </em><em>for</em><em> </em><em>both</em><em> </em><em>purpose</em><em>(</em><em> </em><em>read</em><em> </em><em>and</em><em> </em><em>write</em><em>)</em><em>.</em>
  • <em>It</em><em> </em><em>is</em><em> </em><em>volati</em><em>le</em><em> </em><em>memory</em><em>.</em>
<h2><em>R</em><em>O</em><em>M</em></h2>
  • <em>It</em><em> </em><em>stands</em><em> </em><em>for</em><em> </em><em>Read</em><em> </em><em>only</em><em> </em><em>memory</em><em>.</em>
  • <em>It</em><em> </em><em>can</em><em> </em><em>be</em><em> </em><em>used</em><em> </em><em>only</em><em> </em><em>to</em><em> </em><em>perform </em><em>the</em><em> </em><em>read</em><em> </em><em>oper</em><em>ation</em><em>.</em>
  • <em>It</em><em> </em><em>is</em><em> </em><em>non-volatile</em><em>.</em>

<em>Hope</em><em> </em><em>this</em><em> </em><em>helps</em><em>.</em><em>.</em><em>.</em>

<em>Good</em><em> </em><em>luck</em><em> on</em><em> your</em><em> assignment</em><em>.</em><em>.</em><em>.</em>

8 0
3 years ago
Read 2 more answers
Why is it preferable to code web pages in html format?
Ronch [10]
Depends on what you are working on.

If you are working on a website I recommend Adobe Dreamweaver CC.

if its small assignments that doesnt involve major work, I'd use something like notepad++
8 0
3 years ago
Read 2 more answers
Rony works on several confidential files for his company. Ignoring the privacy requirements, Rony places the files in a shared f
kumpel [21]

Answer:

D. ​He should designate all the files in the shared folder as read-only.

Explanation:

The steps Rony should take while using a peer-to-peer (P2P) network to prevent his original files from being overwritten by another P2P user is that He will make the file as read-only.

In making the file read-only, other users who have access to the shared folder can only read the file without modifying it's content.

By default, he is already the owner of the file, so option B is not the correct answer.

Also making the file executable give other users higher privilege, so option A is also not correct.

8 0
3 years ago
Habilidades de la alfabetizacion digital?
Eva8 [605]

Answer:

La American Library Association (ALA) define la alfabetización digital como "la capacidad de utilizar las tecnologías de la información y la comunicación para encontrar, evaluar, crear y comunicar información, lo que requiere habilidades cognitivas y técnicas".

6 0
3 years ago
Other questions:
  • What do students buy when they pay tuition?
    6·2 answers
  • Explain how can you protect your computer from malware
    15·2 answers
  • Many shops are simply plugging up their drains to keep from inadvertently violating the law and creating environmental contamina
    15·1 answer
  • Clicking on the Spelling &amp; Grammar button is one way to correct a spelling error in Word. Please select the best answer from
    7·2 answers
  • Which type of reading is associated with an entry-level job?
    14·1 answer
  • How can volunteering yo help plan fundraiser for your team or club be a way to develop your strengths?
    13·1 answer
  • Which model emphasizes the risk analysis phase of development
    12·1 answer
  • 1. Discuss the pros and cons of human-computer interaction technology?
    6·1 answer
  • HELP I WILL GIVVE BRAINLY AND 15 POINTS
    6·1 answer
  • What is the name of the first practical asymmetric cryptosystem that was created?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!