1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pishuonlain [190]
2 years ago
14

A) Calculate the checksum of following 2 bytes: 00110101 and 10101100, and fill in the blank:

Computers and Technology
1 answer:
ddd [48]2 years ago
5 0

The Checksum is used to examine and detect errors in transmitted data over a computer network. The Checksum values are :

  • 00101110
  • 00001111

To calculate the checksum :

  • Add the two bytes together :

0_0_1_1_0_1_0_1

1_ 0_1_0_1_1_0_0

_______________

1_ 1_0_1_0_0_0_1

  • Take the complement of the sum

Checksum = 00101110

B.)

  • Add the two bytes together

0_1_0_1_1_0_1_0

1_ 0_1_1_0_1_0_0

_______________

0_ 0_0_0_1_1_ 1_0

______________1

0_ 0_0_0_1_1_1_1

  • Take the complement of the sum

Checksum = 00001111

Therefore, the checksum values are :

  • 00101110
  • 00001111

Learn more : brainly.com/question/13968647?referrer=searchResults

You might be interested in
Which is the least technically experienced technical support group?
Nezavi [6.7K]

Answer:

Tier 1 support

Explanation:

Of the given options, tier 1 support technical group is the least experienced group. This group of technicians is also referred to as level 1 technical group.

The tier 1 or level support are made up of junior technician, and they have few technical understandings.

Their roles include email response and basic troubleshooting, attending to phone calls, among others.

When a problem cannot be solved by tier 1 support  technicians, they pass the problem to tier 2 support technicians,  

5 0
2 years ago
What does "CYBER-COCKROACH" mean??
katrin2010 [14]

Answer:

The cyber cockroach is the presented external anatomy of a cockroach, with labeled views of photographs from diverse angles in place of diagrams. The cyber cockroach can be navigated around the head, thorax and abdomen with possible close up views of the legs and the images are downloadable

Cyber cockroach is a useful tool for the study of insects of the Blattodea order

Explanation:

3 0
3 years ago
To test dns configuration by resolving a host name to ip address, which command or commands can you use
Helga [31]

ping, tracert or nslookup can all be used.

4 0
2 years ago
Secondary storage is also called?
Alekssandra [29.7K]

it is also called external storage

4 0
3 years ago
Refer to the exhibit. All workstations are configured correctly in VLAN 20. Workstations that are connected to switch SW1 are no
aleksandrvk [35]

Answer:

Allow VLAN 20 on the trunk link.

Explanation:

Enable DTP on both ends of the trunk by allowing VLAN20 on the trunk link.

From curriculum topic: 3.2.4

To Enable DTP on both switches is simply allowing the negotiation of trunking. The "Negotiation of Trunking" line in the graphic is what shows that DTP is already enabled. The graphic also shows how the native VLAN is 1, and the default VLAN for any Cisco switch is 1. The graphic shows the PCs are to be in VLAN 20.

This will remedy the problem.

8 0
2 years ago
Other questions:
  • There are many modes of remote visual communication. Which is the most common mode?
    10·2 answers
  • You support Richman Investments, a brokerage firm that employs 20 brokers. Each broker has his own client computer, and the firm
    15·1 answer
  • Someone please help fast! I’m taking the test rn and I don’t understand this!!!!!!
    15·1 answer
  • Write a function listLengthOfAllWords which takes in an array of words (strings), and returns an array of numbers representing t
    14·1 answer
  • The expression 10,785(1.0275)x represents the amount of money in an investment account with interest that compounds annually for
    14·2 answers
  • Which of the following is true regarding a class and interface types? Group of answer choices You can convert from a class type
    9·1 answer
  • You are the head of the corporate security department, and the Microsoft teamhas asked you for some assistance in setting the pa
    11·1 answer
  • Name two components required for wireless networking<br>(answer fastly)​
    12·1 answer
  • Which button in the Sort &amp; Filter gallery of the Data tab would alphabetize from A to Z quickly?
    6·2 answers
  • Help me pls...
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!