answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hammer [34]
2 years ago
13

Construct the Hamming code for the bit sequence10011101

Computers and Technology
1 answer:
dusya [7]2 years ago
3 0

Answer:

<u>Bit sequence 10011101</u>

For finding Redundant bits ,we check-

        2^r >= r+m+1

      m is no of bits.

We check from 1,m=8

2>10 which is wrong.

We check from 2,m=8

4>11 which is wrong.

We check from 3,m=8

8>12 which is wrong.

We check from 4,m=8

16>13 which is right

So r=4, there are 4 redundant bits;

r1,r2,r4,r8        

Inserting redundant bits in bit sequence-

1  0  0  1  r8  1  1  0 r4  1 r2  r1

r1 is the first parity bit

r2 is the second parity bit

r4 is the third parity bit

r8 is the forth parity pit

We will use even parity bit-we have to make no of 1's = even , if already no of ones is even, then simply r = 0 else r=1.

for r1, we will check at the positions which consist one's at the first position(1,3,5,7,9,11) .

for r2, we will check at the positions which consist one's at the second position (2,3,6,7,10,11) .

for r4, we will check at the positions which consist one's at the forth position(4,5,6,7,12) .

for r8, we will check at the positions which consist one's at the eighth  position(8,9,10,11,12) .

Calculating r1

as bit no. 3 = 1

     bit no. 5 = 0

     bit no. 7 = 1

     bit no. 9 = 1

     bit no. 11 = 0

to make no. of 1's even we have r1 = 1

For r2

count no of 1's at bit (2,3,6,7,10,11)

No. of 1's are  = 3 (on bit 3,6,7)  

As 3 is odd

for even parity,we have to make it 1

Similarly ,

r4 =1

r8 =0

Hence Following are the redundancy bits.

r1 = 1  

r2 = 1  

r4 = 1  

r8 = 0

So the Hamming code is 100101101111

You might be interested in
Consider a disk that rotates at 3600 rpm. The seek time to move the head between adjacent tracks is 2 ms. There are 32 sectors p
jasenka [17]

Answer:

19.71 ms

Explanation:

The disk rotates at 3600 rpm, hence the time for one revolution = 60 / 3600 rpm = 16.67 ms.

Hence time to read or write on a sector = time for one revolution / number of sectors per track = 16.67 ms / 32 sectors = 0.52 ms

Head movement time from track 8 to track  9 = seek time = 2 ms

rotation time to head up sector 1 on track 8 to sector 1 on track 9 = 16.67 * 31/32 = 16.15 ms

The total time = sector read time +head movement time + rotational delay + sector write time = 0.52 ms + 2 ms + 16.15 ms + 0.52 ms = 19.19 ms

3 0
2 years ago
Allows you to manually add an entry to the arp cache that resolves the ip address inetaddr to the physical address etheraddr. wh
Norma-Jean [14]
The answer in this question is that once the Adaptor or router received the destination IP address (even if we entered in the incorrect MAC address) the router or adapter would remove the IP address from the Ethernet frame and using ARP, would get the correct MAC address of the destination.
6 0
2 years ago
What are the arguments for writing efficient programs even though hardware is relatively inexpensive?
Ainat [17]

Answer: Even though the hardware is inexpensive the writing of program is not efficient through this method as proper development of program is necessary for the clear execution due to factors like:-

  • The facility of writing program even the cost of hardware is less but it is not a free facility.
  • It also has a slower processing for the execution of the program
  • The construction of the efficient program is necessary for the compilation and execution of it rather than poorly constructed program is worthless and inefficient in working.

7 0
2 years ago
___________ is an approach to boundary spanning that results from using sophisticated software to search through large amounts o
snow_tiger [21]

Answer: Business intelligence

Explanation:

Most of the enterprises and organizations collects huge amount of data through the use of MIS. These data can be based on any aspect of the business. But the collection of such large sets of data is useless until and unless there is a business intelligence associated with it. the work of business intelligence is to use software tools for analysis of the collected data so that it could be useful for enterprise or company to look for patterns and trends in the market.

The outcome of such business intelligence is very helpful particularly to managers, executives for taking particular decisions in the greater interest of the company.

So we can say, business intelligence is an approach to boundary spanning that results from using sophisticated software to search through large amounts of internal and external data to spot patterns, trends, and relationships that might be significant.

4 0
2 years ago
Write a boolean method that checks whether a given positive integer n is a perfect square. Use Math’s sqrt and round methods to
svetoff [14.1K]
In java...

public boolean checkSquare(int n){

int actualNumber = n;
int squareRoot = (int)Math.sqrt(n);
int squaredNumber = Math.pow(squareRoot,2);

if(squaredNumber==actualNumber){
return true;
} else {
return false;
}

}
5 0
2 years ago
Other questions:
  • What helps companies and organizations to target masses of people, provide 24/7 services, and deliver better marketing in a chea
    13·2 answers
  • Suppose you develop an app and want to generate revenue but do not want to maintain the app. What would be your best choice?
    9·1 answer
  • You have been tracking your exercise routine, which involves running, lifting weights, yoga, and stretching. You want to see wha
    15·2 answers
  • Write a program that prompts the user to enter the month and year and displays the number of days in the month. For example, if
    13·1 answer
  • Sensors and devices connected to a model are examples of which of the following?
    6·2 answers
  • While Angela is making modifications to Katie’s Word document, she would like to inform Katie of the reasoning for the change. W
    10·1 answer
  • Two devices are connected to the Internet and communicating with one another. A squirrel chews through one of the wires in the n
    6·1 answer
  • A large number of genetic codes are stored as binary values in a list. Which one of the following conditions must be true in ord
    5·2 answers
  • Identify the tips to create a well-designed digital portfolio.
    10·1 answer
  • Evie clicks through her presentation slides and realizes they all have transition effects coming from the same location, from th
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!