Is the cyclic redundancy check better than hamming code?

1 Answer

Answer :

It depends on what you are doing.The cyclic redundancy check will only detect an error, while thehamming code can also correct many types of errors. However toperform this correction the extra error detection parity bitsrequired in hamming code are many more than the bits needed forcyclic redundancy check, per data byte being checked.Normally cyclic redundancy check is done on large block of datathat can be resent or retried to get the correct block of data(e.g. telecommunication channels, disk sectors).Normally hamming code is done on individual bytes or words ofcomputer memory.

Related questions

Description : Error detection ata data link level is achieved by A. bit stuffing B. cyclic redundancy codes C. Hamming codes D. equalization

Last Answer : cyclic redundancy codes

Description : CRC stands for __________ a. cyclic redundancy check b. code repeat check c. code redundancy check d. cyclic repeat check

Last Answer : a. cyclic redundancy check

Description : CRC stands for __________ A. cyclic redundancy check B. code repeat check C. code redundancy check D. cyclic repeat check

Last Answer : A. cyclic redundancy check

Description : In a frame transmission, CRC stands for (A) Code Renewable Check (B) Cyclic Redundancy Check (C) Control and Refresh Code (D) Cyclic Refreshing of CPU

Last Answer : (B) Cyclic Redundancy Check

Description : The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called ____________ a. piggybacking b. cyclic redundancy check c. fletcher’s checksum d. parity check

Last Answer : a. piggybacking

Description : The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called ____________ A. piggybacking B. cyclic redundancy check C. fletcher’s checksum D. parity check

Last Answer : A. piggybacking

Description : The divisor in a cyclic code is normally called the _________. A) degree B) generator C) redundancy D) none of the above

Last Answer : generator

Description : In a binary Hamming code the number of check digits is r then number of message digits is equal to: (A) 2r-1 (B) 2r-r-1 (C) 2r-r+1 (D) 2r+r-1

Last Answer : (B) 2r-r-1

Description : . In cyclic redundancy checking, the divisor is _______the CRC. A) The same size as B) one bit less than C) one bit more than D) none of the above

Last Answer : one bit more than

Description : Using which method in transport layer data integrity can be ensured? a. Checksum b. Repetition codes c. Cyclic redundancy checks d. Error correcting codes

Last Answer : a. Checksum

Description : Using which layer in transport layer data integrity can be assured? A. Checksum B. Repetition codes C. Cyclic redundancy checks D. Error correction codes

Last Answer : A. Checksum 

Description : _______ can detect burst error of length less than or equal to degree of the polynomial and detects burst errors that affect odd number of bits. a. Hamming Code b. CRC c. VRC d. None of the above

Last Answer : b. CRC

Description : The bit positionina can be numbered from 1 through 2h, a. Hamming code word b. Hamming distance word c. Both d. None of these

Last Answer : a. Hamming code word

Description : To guarantee correction ofup to 5 errors in all cases, the minimum Hamming distance in a block code must be________. A) 5 B) 6 C) 11 D) none of the above

Last Answer : 11

Description : To guarantee the detectionof up to 5errors in all cases, the minimum Hamming distance in a block code mustbe _______. A) 5 B) 6 C) 11 D) none of the above

Last Answer : 6

Description : The ________ between two words is the number ofdifferences between corresponding bits. A) Hamming code B) Hamming distance C) Hamming rule D) none of the above

Last Answer : Hamming distance

Description : To guarantee correction of upto t errors, the minimum Hamming distance d min in a block code must be ________. a. t+1 b. t−2 c. 2t−1 d. 2t+1

Last Answer : d. 2t+1

Description : Thus hamming code for the ASCII character “a” is given as ……………… A. 10111001111 B. 10111001000 C. 10111001001 D. 10111001

Last Answer : C. 10111001001

Description : To guarantee the detection of up to 5 errors in all cases, the minimum Hamming distance in a block code must be _______ A. 5 B. 6 C. 11 D. none of the above

Last Answer : B. 6

Description : The ________ between two words is the number of differences between corresponding bits A. Hamming code B. Hamming distance C. Hamming rule D. none of the above

Last Answer : B. Hamming distance

Description : Consider a code with five valid code words of length ten : 0000000000, 0000011111, 1111100000, 1110000011, 1111111111 Hamming distance of the code is (A) 5 (B) 10 (C) 8 (D) 9

Last Answer : Answer: Marks to all

Description : The Hamming distance between two code-words is (A) the number of places the code-words are same (B) same as the Euclidean distance between their decimal representation (C) is maximum of the either code-words (B) the number of places the code-words differ

Last Answer : The Hamming distance between two code-words is the number of places the code-words differ

Description : Hamming codes was developed in _ a 1953 b. 1950 c. 1945 d. 1956

Last Answer : b. 1950

Description : In block coding, ifn = 5, the maximum Hamming distance between two codewords is ________. A) 2 B) 3 C) 5 D) none of the above

Last Answer : 5

Description : The Hamming distance between 100 and 001 is ________. A) 2 B) 0 C) 1 D) none of the above

Last Answer : 2

Description : The Hamming distance between equal codewords is _________. A) 1 B) n C) 0 D) none of the above

Last Answer : 0

Description : Coding schemes can be divided into two broad categories…………, …… A. character coding, integer coding B. hamming coding and block coding C. Hamming coding and convolution coding D. Block Coding and Convolution Coding.

Last Answer : D. Block Coding and Convolution Coding.

Description : Water hamming effect is occurs in a) Surge tank b) Penstock c) Turbine d) Reservoir

Last Answer : Ans: Penstock

Description : Hamming distance between 100101000110 and 110111101101 is (A) 3 (B) 4 (C) 5 (D) 6

Last Answer : (D) 6

Description : In the human body, why is there redundancy with some organs, but not others?

Last Answer : Well, ignoring the complexity it would take to have two hearts working in unison and not mess up the flow of blood….. quite frankly, we don’t know why not. It’s just the way we evolved.

Description : How to maximize file server redundancy?

Last Answer : answer:Not to be a stick in the mud, but that's what IT consulting companies do... Questions to ask yourself: What level of uptime are they looking for? 99.9% is easy, 99.99% is ... g., does each employee carry two blackberries in case one breaks? Multiple internet connections for the corp. office?

Description : Name the software used to control redundancy from a collection of large amount of data. -Technology

Last Answer : A database is a collection of integrated data stored together with controlled redundancy to serve one or more applications in an optimal fashion.

Description : What is Static Routing Redundancy ?

Last Answer : Static Route : Static Route is a routing protocol where you have to manually define each routing route in the router's routing table. If there is any change in the network for any reason, then that data ... a result, the bandwidth will be less expensive and the network will be more secure

Description : What is the opposite of redundancy ?

Last Answer : The opposite of redundancy is abbreviated

Last Answer : Excess means excess.

Description : Which of the following is not a way of minimizing if not eliminating noise? A. Use redundancy B. Increase transmitted power C. Reduce signaling rate D. Increase channel bandwidth

Last Answer : D. Increase channel bandwidth

Description : _____ provides redundancy toensure synchronization and inherent errordetection. A) Block coding B) Line coding C) Scrambling D) None of the above

Last Answer : Block coding

Description : Database management systems are intended to: A. eliminatedata redundancy B. establishrelationships among records in different files C. manage file access D. maintaindata integrity E. All of theabove

Last Answer : All of theabove

Description : Point out the wrong statement. a) AWS S3 essentially lets you create your own cloud storage b) AWS created Availability Zones within regions, which are sets of systems that are isolated from ... adds redundancy to its IaaS systems by allowing EC2 virtual machine instances d) None of the mentioned

Last Answer : None of the mentioned

Description : Redundancy has to be implemented at the _________ architectural level for effective results in cloud computing. a) lower b) higher c) middle d) all of the mentioned

Last Answer : higher

Description : A Solution to overcome the challenge to support a large number of application service consumers from around the world, cloud infrastructure providers (i.e., IaaS providers) have established data ... ) Global exchange of cloud resources b) Resource provisioning c) Cloud security d) Resource sharing

Last Answer : Global exchange of cloud resources

Description : In a single stage network: (A) There is no redundancy (B) There is redundancy (C) Alternative cross points are available (D) Alternative paths are available

Last Answer : (B) There is redundancy

Description : The difference between the original and reconstructed data, which we will refer to as the ______in the reconstructed data. a. Redundancy b. Compression c. loss d. Distortion

Last Answer : d. Distortion

Description : Information ignored the human eye is the a. A. coding redundancy b. B. spatial redundancy c. C. temporal redundancy d. D. irrelevant info

Last Answer : d. D. irrelevant info

Description : Identify the criteria for designing database from the point of view of user A) No redundancy B) No inapplicable attributes C) Uniformity in naming & definitions of the data items D) All of the above

Last Answer : D) All of the above

Description : The one guideline to be followed while designing the database is A) A database design may be ambiguous. B) Unrelated data should be in the same table so that updating the data will be easy. C) It should avoid/reduce the redundancy. D) An entity should not have attributes.

Last Answer : C) It should avoid/reduce the redundancy.

Description : What is redundancy in messages? (a) Information that recipient has already receive (b) Extra information to persuade the receiver to accept and act upon the message (c) Parts of the message that have no meaning and could be eliminated (d) Message that have no purpose and need not be retained

Last Answer : (b) Extra information to persuade the receiver to accept and act upon the message 

Description : Consider the formula in image processing RD = 1 - (1/CR) Where CR = n1/n2 CR is called as compression ratio n1 and n2 denotes the number of information carrying units in two datasets that represent ... . (A) Data Compression (B) Data Redundancy (C) Data Relation (D) Data Representation

Last Answer : (B) Data Redundancy

Description : The redundancy in images stems from: (A) pixel decorrelation (B) pixel correlation (C) pixel quantization (D) image size

Last Answer : (B) pixel correlation