A simpleparity-check code can detect__________ errors.
A)
an even-number of
B)
two
C)
no errors
D)
an odd-number of

1 Answer

Answer :

an odd-number of

Related questions

Description : A simple parity-check code can detect __________ errors A. an even-number of B. two C. no errors D. an odd-number of

Last Answer : D. an odd-number of

Description : _______ can detect burst error of length less than or equal to degree of the polynomial and detects burst errors that affect odd number of bits. a. Hamming Code b. CRC c. VRC d. None of the above

Last Answer : b. CRC

Description : Which method is used to detect double errors and pinpoint erroneous bits. a. Even parity method b. Odd parity method c. Check sum method. d. All of these

Last Answer : c. Check sum method.

Description : Error rate is A. an error-detectingcode based ona summation operation performed onthebits to be checked. B. a checkbit appended to anarrayof binary digits to make thesum of all thebinary digits. C. a ... ratioof the number ofdata units in error to the total number of dataunits E. None of the above

Last Answer : the ratioof the number ofdata units in error to the total number of dataunits

Description : While transmitting odd-parity coded symbols, the number of zeros in each symbol is a. odd b. even c. a and b both d. unknown

Last Answer : unknown

Description : To guarantee correction ofup to 5 errors in all cases, the minimum Hamming distance in a block code must be________. A) 5 B) 6 C) 11 D) none of the above

Last Answer : 11

Description : To guarantee correction of upto t errors, the minimum Hamming distance d min in a block code must be ________. a. t+1 b. t−2 c. 2t−1 d. 2t+1

Last Answer : d. 2t+1

Description : To guarantee the detection of up to 5 errors in all cases, the minimum Hamming distance in a block code must be _______ A. 5 B. 6 C. 11 D. none of the above

Last Answer : B. 6

Description : Which of the following is associated with error detector? a. Odd parity bit b. Even parity bit c. Both of the above d. None of above

Last Answer : Both of the above

Description : Write a shell script to accept a number from user check whether number is even or odd.

Last Answer : 2 8

Description : When does the station B send a positive acknowledgement (ACK) to station A in Stop and Wait protocol? a. only when no error occurs at the transmission level b. when retransmission of old packet in a novel frame is necessary c. only when station B receives frame with errors d. all of the above

Last Answer : only when no error occurs at the transmission level

Description : An error-detectingcode inserted asa field in a blockof data tobe transmitted is known as A. Frame check sequence B. Error detecting code C. Checksum D. flow control E. None of the above

Last Answer : Frame check sequence

Description : CRC stands for __________ a. cyclic redundancy check b. code repeat check c. code redundancy check d. cyclic repeat check

Last Answer : a. cyclic redundancy check

Description : CRC stands for __________ A. cyclic redundancy check B. code repeat check C. code redundancy check D. cyclic repeat check

Last Answer : A. cyclic redundancy check

Description : Which of the following refers to theterms "residual error rate"? A. the number of biterrors per twenty four hours of continuous operation onanasynchronous line B. The probability that one or moreerrors ... tonoise ratio dividedby the ratio of energy perbit to noise per hertz E. None of the above

Last Answer : The probability that one or moreerrors will be undetected whenan error detection scheme is used

Description : I am a puzzle with a wordy facade. There's always an answer, even if it seems odd. Only the clever can understand my code. If you don't answer, then you'll never know. What am I? -Riddles

Last Answer : A riddle.

Description : The objective of testing is ? Debugging To uncover errors To gain modularity To analyze system

Last Answer : To uncover errors

Description : The primary advantage of key-to-tape data entry system is a. A large percentage of editing can be performed at the time of data entry b. Key verification is easily performed c. The tape is reusable d. Keying errors can be detected as they occur

Last Answer : The tape is reusable

Description : . The _____of errors is more difficult than the ______. A) correction; detection B) detection; correction C) creation; correction D) creation;detection

Last Answer : correction; detection

Description : The Internet Control Message Protocol (ICMP) A. allows gateways to send error acontrol messages toother gateways or hosts B. provides communication between the Internet Protocol Software on one machine ... and takeaction to correct theproblem D. All of theabove E. None of the above

Last Answer : All of theabove

Description : The message 11001001 is to be transmitted using the CRC polynomial x^3 + 1 to protect it from errors. The message that should be transmitted is: a. 11001001000 b. 11001001011 c. 11001010 d. 110010010011

Last Answer : b. 11001001011

Description : Define Error Detection and Correction. Mention the types of errors.

Last Answer : Data can be corrupted during transmission. For reliable communication, errors must be detected and corrected. Single bit error: The only one bit of a given data unit (such as byte character/data unit or packet) is ... error: 2 or more bits in the data unit have changed from 1 to 0 from 0 to 1.

Description : Let G(x) be the generator polynomial used for CRC checking. What is the condition that should be satisfied by G(x) to detect odd number of bits in error? a. G(x) contains more than two terms b. G(x) does ... exceeding the frame length c. 1+x is a factor of G(x) d. G(x) has an odd number of terms

Last Answer : c. 1+x is a factor of G(x)

Description : How many bytes of data can be sent in 15 seconds over a serial link with baud rate of 9600 in asynchronous mode with odd parity and two stop bits in the frame? a. 10,000 bytes b. 12,000 bytes c. 15,000 bytes d. 27,000 bytes

Last Answer : b. 12,000 bytes

Description : A generator that contains afactor of ____ can detectall odd-numberederrors. A) x B) x + 1 C) 1 D) none of the above

Last Answer : x

Description : Which post-installations activities are recommended by SAP after the installation of an SAP ECC 6.06 system? Note: there are 2 correct answered to this question A. Restart your SAP system ... of users involved in the implementation project D. Confirm the installation in an SAP Support ticket

Last Answer : A. Restart your SAP system and check logs for errors B. Install a valid license key

Description : Write a program to create two threads one thread will print even no. between 1 to 50 and other will print odd number between 1 to 50.

Last Answer : import java.lang.*; class Even extends Thread { public void run() { try { for(int i=2;i<=50;i=i+2) { System.out.println("\t Even thread :"+i); sleep(500); } } ... public static void main(String args[]) { new Even().start(); new Odd().start(); } }

Description : Given code word 1110001010 is to be transmitted with even parity check bit. The encoded word to be transmitted for this code is (A) 11100010101 (B) 11100010100 (C) 1110001010 (D) 111000101

Last Answer : (A) 11100010101 

Description : Why is it more important to check for errors during DNA replication than during protein synthesis?

Last Answer : Because if an error is made during protein synthesis, the resultis at worst one bad protein. If an error is made during DNAreplication, that error will persist for the entire lifespan ofthat cell ... coding segment of DNA, it is possible that every proteinthat locus generates will now be defective.

Description : The reading of the script to check the errors is called: a) Composing b) Proof-reading c) Editing d) None of these

Last Answer : b) Proof-reading

Description : The reading of the script to check the errors is called: A. Composing B. Proof-reading C. Editing D. None of these

Last Answer : B. Proof-reading

Description : The reading of the script to check the errors is called: A. Composing B. Editing C. Proof-reading D. None of these

Last Answer : C. Proof-reading

Description : With respect to a loop in the transportation table, which one of the following is not correct? (1) Every loop has an odd no. of cells and at least 5. (2) Closed loops may or may not b square in ... starting cell, must be occupied cells. (4) Every loop has an even no. of cells and at least four.

Last Answer : Every loop has an odd no. of cells and at least 5.

Description : Which error detection method consists of just one redundant bit per data unit? A) Simple parity check B) Two-dimensionalparity check C) CRC D) Checksum

Last Answer : Simple parity check

Description : Which error detection method usesone's complement arithmetic? A) Simple parity check B) Two-dimensionalparity check C) CRC D) Checksum

Last Answer : Checksum

Description : Which error detection method uses one's complement arithmetic? A. Simple parity check B. Two-dimensional parity check C. CRC D. Checksum

Last Answer : D. Checksum

Description : Can you fact check this odd law?

Last Answer : Even without reading up on it, I can see immediately that it's about controlling the incarnation of the next Dalai Lama. It's been said for years that the present one, now in his 80s, may be the last, ... he won't reincarnate. Here's one story. There are lots of hits on Google for last dalai lama.

Description : The pattern of groups that have odd parity calledthe ses must match one of the of columns in the parity check matrix: a. Syndrome b. Dynodes c. Both d. None of these

Last Answer : a. Syndrome

Description : Check the odd term out 1) Internet 2) Linux 3) Unix 4) Windows

Last Answer : 1) Internet

Description : A _______ can check the MAC addresses contained inthe frame. A) passive hub B) repeater C) bridge D) route

Last Answer : bridge

Description : In which layer of OSI session is first check and then data is transmitted a. Application layer b. Presentation layer c. Session layer d. Transport layer

Last Answer : c. Session layer

Description : In OSI model, session layer is responsible for a. Recovery b. Check pointing c. Both a and b d. None of the above

Last Answer : c. Both a and b

Description : The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called ____________ a. piggybacking b. cyclic redundancy check c. fletcher’s checksum d. parity check

Last Answer : a. piggybacking

Description : The _______ is used to provide integrity check, authentication, and encryption to IP datagram’s. A. UDP B. Transport layer C. ESP D. SSL

Last Answer : C. ESP

Description : The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called ____________ A. piggybacking B. cyclic redundancy check C. fletcher’s checksum D. parity check

Last Answer : A. piggybacking

Description : Which of the following statements accurately describe the differences between a hub and a switch? Check all that apply. A. A switch remembers which devices are connected on each interface, while a hub does not. B. A hub is a ... versions of switches. a. A,B b. A,B,C c. A,B,C,D d. A,C,D

Last Answer : b. A,B,C

Description : Those who aren't grammar Nazis - what gramatical errors go too far, even for you?

Last Answer : I don’t really care about gramatical errors. This is fluther not school. The only time I mention someones gramatical errors is when they are arrogantly insulting others.