How does simple parity work??
What will be an ideal response?
ANS:
If the 7-bit ASCII character set is used, a parity bit is added as the eighth bit. Suppose, for example,
that the character "k"-which is 1101011 in binary-is transmitted and even parity is being applied. In
this case, a parity bit of 1 would be added to the end of the bit stream, as follows: 11010111. There is
now an even number (six) of 1s. (If odd parity were used, a 0 would be added at the end, resulting in
11010110.)
Now, if a transmission error causes one of the bits to be flipped (the value is erroneously interpreted as
a 0 instead of a 1, or vice versa), the error can be detected if the receiver understands that it needs to
check for even parity. Returning to the example of the character "k" sent with even parity, if you send
11010111 but 01010111 is received, the receiver will count the 1s, see that there is an odd number, and
know there is an error. What happens if 11010111 with even parity is sent and two bits are corrupted?
For example, 00010111 is received. Will an error be detected? The answer is no, an error will not be
detected, because the number of 1s is still even.?
You might also like to view...
What is the primary difference between previous Microsoft operating systems and Windows 8?
A) Voice activation capabilities B) Advanced levels of Web and personal identification security C) Advanced levels of child safety and social media security D) Touch screen capabilities
Once you have created a chart, it is not possible to change the range of data that is displayed
Indicate whether the statement is true or false
Your company wants to set up a new online business. The new solution must be extendable for new products to be developed and added. Customers and business partners must be able to log in to the system. The new system must be usable and manageable. Non-core functions must integrate seamlessly with third parties. Customers' personal and financial information must be protected during transport and
while at rest. The application will consist of a three-tiered architecture for the front-end components and an ESB to provide services. It will include transformation capability, legacy system integration, and a web services gateway. You implement WS-Security for services authentication and XACML for service authorization. What else should you do? A. Use application level encryption to encrypt sensitive fields, database encryption on sensitive flows, and SSL encryption for sensitive data storage. B. Use database encryption to encrypt sensitive fields, SSL encryption on sensitive flows, and application-level encryption for sensitive data storage. C. Use application-level encryption to encrypt sensitive fields, SSL encryption on sensitive flows, and database encryption for sensitive data storage. D. Use SSL encryption to encrypt sensitive fields, application-level encryption on sensitive flows, and database encryption for sensitive data storage.
Medical facilities cannot release information regarding a patient unless the patient has signed a ____________________ form.
Fill in the blank(s) with the appropriate word(s).