1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
scoray [572]
3 years ago
7

Name the technique that uses a scheme to sum the individual digits in a number and stores the unit's digit of that sum with the

number.
Computers and Technology
1 answer:
Artemon [7]3 years ago
7 0

Answer:

Parity Bit

Explanation:

Given that Parity bit is a form of strategy or method that utilizes a scheme in adding a solitary bit to a binary string. This can be either 1 or 0, thereby making the total quantity of bit to become either odd parity bit or even parity bit during storage.

Hence, the technique that uses a scheme to sum the individual digits in a number and stores the unit's digit of that sum with the number is called PARITY BIT.

You might be interested in
In what country was the English royal family and nobility living before the Restoration?
krek1111 [17]

im not sure to be exact , but i think its england. i have done an assignment in the past and that was the awnser.....hope i help                      

4 0
4 years ago
Which of the following could be omitted from a company's AUP? A.Permissible lunchtime online activities B.Employees' home email
joja [24]

Answer:

i think the answer is D

Explanation:

a , b , and c are things customers need to know . but using common sense would let you know that you need to have a strong password so i think it's D! let me know if this helped!

3 0
3 years ago
Read 2 more answers
What are the applications of computer in the field of study​
Reptile [31]

Answer: it is what it is

Explanation:

5 0
3 years ago
Read 2 more answers
To deny a host from sending HTTP traffic destined to a specific server you will need to apply a __________ Access Control List.
DedPeter [7]

I would a Standard Access control List

There are two common access lists: The standard and extended access list.  With the standard access list, it creates filters only on source addresses and is commonly used for server-based filtering. They are not as powerful as extended access lists. Standard Access lists are typically used for restricting access to a router through HTTP and HTTPS.  


6 0
3 years ago
Read 2 more answers
10 POINTS! Janis is the only person who can respond to customer inquiries in her small travel company. She receives several cust
Katyanochek1 [597]

The mode of interent she would be using is A. Email. Customer inquires/ Customer Service is normally provided using the mode of Email. Hope it helps!

6 0
3 years ago
Read 2 more answers
Other questions:
  • Seasons Write a program that takes a date as input and outputs the date's season. The input is a string to represent the month a
    14·1 answer
  • Which three of the following are requirements for receiving federal financial aid for college education?
    14·2 answers
  • Given the following stream of accesses to a 4-block fully associative cache with LRU replacement, determine whether the access i
    8·1 answer
  • How to remove info from a broken laptop and transfer?
    5·1 answer
  • Input numbers and segregate them by placing their values into even or odd vectors based upon their value being even or odd. Then
    12·1 answer
  • Consider the following relational schema, where the primary keys are Bold,
    7·1 answer
  • 1.6.M - Assignment: Understanding If Else Statements in Python
    7·1 answer
  • In which of the following work situations would word processing software be most appropriate to make the task easier?
    6·1 answer
  • A common practice is to create a(n) _____ on any field that is used as a search key, in comparison operations in a conditional e
    6·1 answer
  • O
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!