What is the hamming distance between the following bits? Sent
bits: 101100111, Received bits: 100111001
Select one: 5. Or 3 or 6 or4​

Answers

Answer 1

I think

the hamming distance between the following bits its 5


Related Questions

Economic Batch Quantity depends on
دی ماه
Material, labour
Set-up costs, carrying
Transportation, carrying
Warehousing, labour​

Answers

Answer: Set-up costs, carrying costs

Explanation:

When it comes to production, the goal is to produce with as little costs as possible so that more profit can be made when the goods are sold.

This is why the Economic Batch Quantity is important. It shows the maximum amount of goods that can be produced in a particular production run such that costs will be minimized.

As such, it is based on the set-up costs of production for that run as well as the carrying costs through the run.

How are status reports useful

Answers

Answer:

Project managers use status reports to keep stakeholders informed of progress and monitor costs, risks, time and work. Project status reports allow project managers and stakeholders to visualize project data through charts and graphs.

What symbol next to the records indicates that a table includes a subdatasheet? an asterisk a plus sign a question mark an exclamation point

Answers

Answer: a plus sign

Explanation: I just did the assignment and got it right

Answer:

B)A plus sign

Explanation:

B)A plus sign just finished assignment

Which keyboard shortcut do we use to turn on APC?​

Answers

Answer:

ctrl p I gusse hop it helps

bye know have a great day

Explanation:

True or false question :)

Handware can be tracked back to ancient times. Over six centuries ago.
°true
°false

Answers

Answer:

false and it's a recent technology

i would say the answer is false!

a) Why is eavesdropping done in a network?
b) Solve the following using checksum and check the data at the
receiver:
01001101
00101000​

Answers

Answer:

An eavesdropping attack is the theft of information from a smartphone or other device while the user is sending or receiving data over a network.

Missing: checksum ‎01001101 ‎00101000

You are an IT network administrator at XYZ Limited. Your company has critical applications running of its Ubuntu Linux server. Canonical, the company that owns and maintains Ubuntu just releases an update to patch a security vulnerability in the system.

Required:
What BEST action you should take?

Answers

Answer:

Explanation:

I believe that the best course of action would be to divide the companies computers and run the critical applications on half of the systems while the other half update to the latest Ubuntu release. Once that half is done updating, you run the applications on the updated systems and update the other half of the systems. This will allow the company to continue its operations without any downtime, while also updating to the latest Ubuntu release on all systems and making sure that all systems do not have any security vulnerabilities due to outdated software.

Why are iterators useful?

Select one:
a. Iterators prevent infinite loops
b. Iterators are easier to loop over than a while loop
c. Iterators walk down a collection faster than a for loop.
d. Iterators give you direct access to private variables.
e. Improve information hiding by not revealing how a collection class is implemented

Answers

It is d because I said it is

Create a class named TriviaGameV1 that plays a simple trivia game. The game should have five questions. Each question has a corresponding answer and point value between 1 and 3 based on the difficulty of the question. TriviaGameV1 will use three arrays. An array of type String should be used for the questions. Another array of type String should be used to store the answers. An array of type int should be used for the point values. All three arrays should be declared to be of size 5. The index into the three arrays can be used to tie the question, answer, and point value together. For example, the item at index 0 for each array would correspond to question 1, answer 1, and the point value for question 1. Manually hardcode the five questions, answers, and point values in the constructor of TriviaGameV1. The five questions and their corresponding answers are shown on page 3. The point values should be set to 1, 2, 2, 3, 1, respectively.

The class should also provide the following two public methods:

• public boolean askNextQuestion() - This method takes no argument and returns a boolean. If there are no more questions to ask, it returns false. Otherwise, it asks the next question and gets an answer from the user. If the player’s answer matches the actual answer (case insensitive comparison), the player wins the number of points for that question. If the player’s answer is incorrect, the player wins no points for the question and the method will show the correct answer. It returns true after Q & A have been processed.
• public void showScore() - This method takes no argument and returns void. It displays the current score the player receives thus far.

The test driver is provided below, which creates a TriviaGameV1 object. After the player has answered all five questions, the game is over.

public class TriviaGameV1Test {
public static void main(String[] args) { TriviaGameV1 game = new TriviaGameV1();
while (game.askNextQuestion()) game.showScore(); System.out.println("Game over! Thanks for playing!"); }
}

Answers

Answer:

Explanation:

The following code is written in Java, It creates the class for the Trivia game along with the arrays, variables, and methods as requested so that it works flawlessly with the provided main method/test driver. The attached picture shows the output of the code.

import java.util.Arrays;

import java.util.Scanner;

class TriviaGameV1 {

   String[] questions = {"The first Pokemon that Ash receives from Professor Oak is?", "Erling Kagge skiied into here alone on January 7, 1993", "1997 British band that produced 'Tub Thumper'", "Who is the tallest person on record (8 ft. 11 in) that has lived?", "PT Barnum said \"This way to the _______\" to attract people to the exit."};

   String[] answers = {"pikachu", "south pole", "chumbawumba", "robert wadlow", "egress"};

   int[] points = { 1, 2, 2, 3, 1};

   int score;

   int count = 0;

  public void TriviaGameV1() {

       this.score = 0;

  }

  public boolean askNextQuestion() {

      if (count != 5) {

          Scanner in = new Scanner(System.in);

          System.out.println(questions[count]);

          String answer = in.nextLine().toLowerCase();

          if (answer.equals(answers[count])) {

              score += points[count];

          } else {

              System.out.println("Wrong, the correct answer is : " + answers[count]);

          }

          count += 1;

          return true;

      }

      return false;

  }

  public void showScore() {

      System.out.println("Your Score is: " + this.score);

  }

   public static void main(String[] args) {

      TriviaGameV1 game = new TriviaGameV1();

      while (game.askNextQuestion()) {

          game.showScore();

      }

      System.out.println("Game over! Thanks for playing!");

  }

}

Which tab should you click if you want to access the Show All Comments option in a worksheet?

Home
Page Layout
Review
View

Answers

Answer: Review

Because you want to review the comments

Answer:

C.) Reivew

Explanation:

Doing it on EDG now!

Best luck to yall :3

Have a good day and byee

A new school is being built in the local school district.It will have three computer labs with 28 computers each. There will be 58 classrooms with 2 computers each that need to be on one sub-subnet.The office staff and administrators will need 7 computers. The guidance and attendance office will have 5 computers. The school has been given the address 223.145.75.0/24. Subnets are assigned from largest to smallest. Everything is based on the number of usable hosts.
Complete the information required below.
Subnet Subnet Mask (/X) Subnet First Usable Last Usable Broadcast
Address Host Host Address
1
2
3
4
5
6
7

Answers

Answer:

Following are the responses to the given question:

Explanation:

The subnet mask /25 could be the host 128 hosts.

The subnet mask /26 could be the host 64 hosts.

The subnet mask /27 could be the host 32hosts.

The subnet mask /28 could be the host 16 hosts.

The subnet mask /29 could be the host 8 hosts.

The subnet mask /30 could be the host 4 hosts.

It is based on the requirement in which I have been using /25,/27,/28,/29 subnet masks on the basis of the usable slots.

which shortcut can we use to make directional heading of a cuboid more obvious while in the lidar view​

Answers

Answer:

cutting across

Explanation:

SMTP (Simple Mail Transfer Protocol) is the standard protocol for transferring mail between hosts over TCP. A TCP connection is set up between a user agent and a server program. The server listens on TCP port 25 for incoming connection requests. The user end of the connection is on a TCP port number above 1023. Suppose you wish to build a packet filter rule set allowing inbound and outbound SMTP traffic. You generate the following rule set:

Rule Direction Src Addr Dest Addr Protocol Dest Port Action
A In External Internal TCP 25 Permit
B Out Internal External TCP >1023 Permit
C Out Internal External TCP 25 Permit
D In External Internal TCP >1023 Permit
E Either Any Any Any Any Deny

Required:
Describe the effect of each rule.

Answers

Answer:

The five rules are described as follows:

Rule A permits the inbound Simple Mail Transfer Protocol (SMTP) connection.

Rule B permits the inbound Simple Mail Transfer Protocol (SMTP) connection.

Rule C permits the outbound Simple Mail Transfer Protocol (SMTP) connection.

Rule D permits the outbound Simple Mail Transfer Protocol (SMTP) connection.

Rule E does not perform any action. Thus it is when the action is denied.

Explanation:

Rule A allows information transfer of the incoming email from the external server to the internal remote server, thus this allows an inbound connection.

Rule B allows information transfer of the incoming email from the remote server to the external remote server, thus this allows an inbound connection.

Rule C allows information transfer of outgoing email from the external server to the internal remote server, thus this allows an outbound connection.

Rule D allows information transfer of the outgoing email from the remote server to the external remote server, thus this allows an outbound connection.

Rule E does not allow any action in either direction thus it is when action is denied.

recent trends on operating system

Answers

Answer:

Windows 10 if this is what I think u mean

list the main industries in Sierra Leone​

Answers

Answer:

The main industries in Sierra Leone are: Diamond mining

Petroleum refining

Small - scale manufacturing (beverage, textiles,footwear)

Explanation:

They also engage in commercial ship repair

calculate the total and average number from 1 to 100

Answers

Answer:

Thus, 50.5 is an average of numbers from 1 to 100.

Explanation:

getcalc.com's average calculator to find what is the mean or average of natural numbers upto 100.

50.5 is an average of numbers from 1 to 100 mentioned in the below table, by substituting the total sum and count of numbers in the below formula. The corresponding formulas, chart, examples & workout may help students, teachers or professionals to learn, teach or practice the average of natural numbers upto 100.

Address the formula, input parameters & values.

Formula: Average = Total Sum of Numbers / Total Count of Numbers

Input parameters & values:

The numbers from 1 to 100 are

1, 2, 3, 4, . . . . , 98, 99, 100

Total Count of Numbers = 100

step 2 Find the sum of numbers from 1 to 100.

sum = 1 + 2 + 3 + . . . . + 99 + 100

= 5050

step 3 Divide the sum by 100 Average = 5050/100 = 50.5

Thus, 50.5 is an average of numbers from 1 to 100.

Given that
f(x) = 5x +3.
Find f (4)​

Answers

Answer:

Given that

f(x) = 5x +3.

f (4)=5×4+3=23

Explanation:

hope it's helps you have a good day☺

Write a program that prints the sum of the even numbers and the products of odd numbers on the screen

Answers

Answer:

The program in Python is as follows:

n = int(input("Number of inputs: "))

total = 0; product = 1

for i in range(n):

   num = int(input(": "))

   if num%2 == 0:

       total+=num

   else:

       product*=num

print("Sum of even: ",total)

print("Product of odd: ",product)

Explanation:

This prompts the user for the number of inputs, n

n = int(input("Number of inputs: "))

This initializes sum (total) to 0 and products to 1

total = 0; product = 1

This iterates through n

for i in range(n):

This gets the inputs

   num = int(input(": "))

If input is even, calculate the sum

   if num%2 == 0:

       total+=num

If otherwise, calculate the product

   else:

       product*=num

Print the required outputs

print("Sum of even: ",total)

print("Product of odd: ",product)

One way to add a table to a presentation is to click on Clip Art under the Insert tab. click on WordArt under the Insert tab. right-click on an existing page with content and choose Add Table. add a new slide and left-click on the Table symbol in an empty area.

Answers

Huh? What is this? …..

There used to be a popular type of pulp book for younger readers. They were called "Choose Your Own Adventure" novels. The idea was pretty simple. You'd start reading and then a few pages into the book, there would be a plot development that required a choice. The book might describe that you've entered a spooky house and the door has locked behind you. It would then ask you if you want to try to exit by going through the kitchen or exploring upstairs. If you chose to go into the kitchen, you'd turn to page 200, if you chose to go upstairs, you'd turn to page 43. This would repeat maybe five or six times though the book. You could re-read it a few times and try different outcomes.
In this lab you are going to create a choose your own adventure application using navigation controllers. The introduction screen to your application will contain a few lines of text to set up a story and then leave the user with a choice. Below the text, you will present two buttons that correspond to the different choices.
For example, you might see the following text on the main screen:
You are walking down the street when a tiger runs up and takes your lunch and then runs away...
Do you want to chase the tiger or run away?
Chase
Run Away
The user must then tap one of the buttons. This will move the user to a new screen with a few more lines of the story and another choice and two more buttons. You will create three (3) turning points in your story. This means that your story will have eight (8) different possible outcomes and a total of 15 screens.
Requirements
The story must ask three (3) questions, no matter how the user answers the previous question. All the questions must be different and result in a different story text.
The story must have eight (8) possible different final outcomes.
The story must include a minimum of 15 screens in total.
Create content that is appropriate and not-offensive. We will share these and play them together.
For extra credit you can add an extra screen and use inputs to capture data from the user such as a name, favorite food, or lucky number and use this data in the story.

Answers

Answer:

click on the link

Explanation:

link is somewhere hidden

What is Requirement Engineering process explain with the help of diagram? Find the functional and non-functional requirements of the given case study.

An automatic ticket issuing system sells rail ticket. User select their destination and input a credit card and a personal identification number. The rail ticket is issued and their credit account charged. When the user presses the start button, a menu display of potential destinations is activated, along with a message to the user to select a destination. Once a destination has been selected, users are requested to input their card. Its validity is checked and user is then requested to input a personal identifier. When the credit transaction has been validated, the ticket is issued

Answers

functional requirement defines a system or its component whereas a non-functional requirement defines the performance attribute of a software system. ... Types of Non-functional requirement are Scalability Capacity, Availability, Reliability, Recoverability, Data Integrity, etc

The EDI ____________layer describes the business application that i
driving EDI
a)EDI Semantic Layer c) EDI Transport Layer
b) EDI Standard Translation Layer d) Physical Layer

Answers

Answer:

a) EDI Semantic Layer

Explanation:

EDI is an acronym for electronic data interchange and it can be defined as a form of communication between interconnected computer systems and software applications with respect to business informations in standard digital formats.

This ultimately implies that, electronic data interchange (EDI) involves the transfer of business informations such as financial transactions between the computer systems of various organizations such as banks, companies, governmental agencies, etc. Thus, it avails businesses the ability to create strategic communications using computer to computer links to effectively and efficiently exchange business informations electronically or in digital formats.

Hence, the EDI Semantic layer describes the business application that is driving electronic data interchange (EDI).

How to make a project using PID and thermacouple

Answers

Explanation:

Required tools and components:

Soldering iron

Solder

Flux pen

Fine gauge solder (23 gauge or finer)

Wire cutter

MAX31855 thermocouple interface chip (available directly from Maxim Integrated)

Thermocouple with junction suitable for your application (e.g., probe, washer, etc.)

J-type (-40°C to +750°C)

K-type (-200°C to +1350°C)

T-type (-200°C to +350°C) Solid state relay (will depend on your application)

USB FTDI 5V cable (Note: A single cable can be used for many different microcontroller projects)

Computer with Arduino IDE v1.0

Wall-wart 9V/1.5A, 2.1mm center positive

The following code segment appears in a class other than Backyard. It is intended to print true if b1 and b2 have the same lengths and widths, and to print false otherwise. Assume that x, y, j, and k are properly declared and initialized variables of type int.

Backyard b1 = new Backyard(x, y);
Backyard b2 = new Backyard(j, k);
System.out.println( /* missing code */ );

Which of the following can be used as a replacement for /* missing code */ so the code segment works as intended?

a. b1 == b2
b. b1.equals(b2)
c. equals(b1, b2)
d. b1.equals(b2.getLength(), b2.getWidth())
e. b1.length == b2.length && b1.width == b2.width

Answers

Answer:

b. b1.equals(b2)

Explanation:

The question has a missing source file (which can be found online).

The function that compares b1 and b2 is:

public boolean equals(Object other) {

if (other == null) {

return false; }

Backyard b = (Backyard) object;

return (length == b.getLength() && width == b.getWidth());

}

Using the function definition, we have:

equals(Object other)

This implies that, the first object will be compared to the second, using the function name.

i,e,

b1.equals(b2)

Hence (b) is correct

In this exercise we have to use the knowledge in computational language in C++ to describe a code that best suits, so we have:

The code can be found in the attached image.

To make it simpler we can write this code as:

public boolean equals(Object other) {

if (other == null) {

return false; }

Backyard b = (Backyard) object;

return (length == b.getLength() && width == b.getWidth());

}

This program will result in the following missing variable:

b1.equals(b2)

See more about C++ at brainly.com/question/19705654

You want a cable that could be used as a bus segment for your office network. The cable should also be able to support up to 100 devices. Which cable should you use?

A.
RG-6
B.
RG-8
C.
RG-58U
D.
RG-59

Answers

Answer: C

Explanation:

A line beginning with a # will be transmitted to the programmer’s social media feed.

A.
True

B.
False

Answers

Answer:

True?

Explanation:

Answer:

The answer is false.

Explanation:

A “#” doesn’t do that in Python.

How can presentation software be used in a
business or professional setting? Choose all that
apply.
to automate the ticket-purchasing process at
movie theaters through a kiosk
to teach lessons to high school students
to deliver a sales presentation to clients
to create charts and graphs from a table of
values
to compose letters and memos
DONE

Answers

Answer:

To automate the ticket purchasing process at the movie theaters through a kiosk

To teach lessons to high school students

To deliver a sales presentation to clients

Explanation:

I just used the answers above and got 2/3 wrong and edge said so

layers allow you to work with one element of an image without disturbing the others true or false​

Answers

I think it is True not sure but try it

Your systems analysis team is close to completing a system for Azuka Theatre. Kevin is quite con- fident that the programs he has written for Azuka's inventory system used for keeping track of stage scenery and props will perform as required because they are similar to programs he has done before. Your team has been very busy and would ideally like to begin full systems testing as soon as possible. Mark and Allison, two of your junior team members have proposed the following:
a. Skip desk checking of the programs (because similar programs were checked in other installa- tions; Kevin has agreed).
b. Do link testing with large amounts of data to prove that the system will work.
c. Do full systems testing with large amounts of live data to show that the system is working. Respond to each of the three steps in their proposed test schedule. Use a paragraph to explain your response.

Answers

Answer:

a

Explanation:

im smart

Desk checking is a method to check the logic of an algorithm by manually working through it. There are many reasons for Desk Checking that may be omitted or simplified.

What are the reasons for desk checking?

If the current program’s logic is identical, then this step may be omitted; this, however, implies some effort to verify “sameness.” If truly identical, perhaps there is re-usable code, or the code to be developed should become a reusable library routine.

Link testing is the testing of the group of modules in order to ensure that the modules operate correctly in combination. It generally verifies that the function or operation is executed properly. System testing is a type of testing that is used to confirm the actual function of the system in which a work is executed or performed.

Therefore, all of the testing mechanisms are well described above.

To learn more about System and link testings, refer to the link:

https://brainly.com/question/7658665

#SPJ2

8. Many organizations build their networks around this type of computer.
A) server
B) terminal
C) supercomputer
heir netwo
of multiple
or that stores data
A)dektop

Answers

it is B) terminal bc There are several different types of computer networks. Computer networks can be characterized by their size as well as their purpose

B is the answer because I looked it up
Other Questions
The Framers viewed Congress as the most powerful branch of government. The presidency was designed as "an effectual check" upon the legislature. Yet, the 20th century saw a shift of that institutional balance with increasing executive power and prominence in American politics and governance. How has the presidency changed from the 19th Century going forward? What factors have led to the development and expansion of presidential power in the "modern presidency"? (Hint: in the PowerPoint). What would you tell former Pres. Trump, who says, he can do whatever he wants due to Article iI in the Constitution? Which word best completes the sentence?Select the word from the drop-down menu.Anna and Max shared the same taste in decor, so they were in complete (Choose...) over the style of furniture they wanted to buyaccordboredom disagreement distress What is the area=??? help me please.............. Which group of pictures best represents a population?..C.D what do you think about giving yourself permission to stay focused on what important to you and have your own agenda? Do you like math? If you do solve this simple equations [tex]2 + 2 + 4 + 4 + 8 + 8 + 16 + 16[/tex] Wildhorse Co. had the following assets on January 1, 2022. Useful Life (in years) Item Cost Purchase Date Useful Life (in years) Salvage Value Machinery $68,000 Jan. 1, 2012 10 $ 0 Forklift 27,000 Jan. 1, 2019 5 0 Truck 33,400 Jan. 1, 2017 8 3,000 During 2022, each of the assets was removed from service. The machinery was retired on January 1. The forklift was sold on June 30 for $11,700. The truck was discarded on December 31. Journalize all entries required on the above dates, including entries to update depreciation, where applicable, on disposed assets. The company uses straight-line depreciation. All depreciation was up to date as of December 31, 2021. (Credit account titles are automatically indented when the amount is entered. Do not indent manually. If no entry is required, select "No Entry" for the account titles and enter 0 for the amounts.) Information: Products and services usually follow a very predictable pattern of change over time, but every once in awhile a major shift happens. This could be because of global conflicts (like war in gas-rich areas) or false rumors (think toilet paper). Regardless of the reason, these abnormal shifts and they can really mess up traditional economic reporting. Directions: So far the idea of supply and demand shifts have been discussed in small terms, such as a grocery store having more bananas one week or a sale on a certain product. What happens, though, when a HUGE change happens to the supply or demand of a product? For example, every year there is usually an "it" toy for the holiday season, what type of dramatic (but temporary) shift in supply and demand do we see for that product? That is what you're going to research.For this project, you will need to come up with a specific example of a product or service that experienced a dramatic shift. You may need to talk to a grown-up or brainstorm with a classmate to think of something to research. I already gave the example of an "it" Holiday toy, so you could research a specific one from a specific year. Another general example would be gas prices. You'd want to find a time where there was a huge shift, not just the daily up and down of gas prices. Once you've come up with this topic, you will research it online and find out the following requirements for your project.Project Requirements:A specific supply and demand topic Explanation of what led to the shiftHow the change in price, supply, or demand affected the other two thingsHow long the abnormal shift lasted/What caused it to return to a normal?Project Types:Students can present their information in a variety of ways including an essay, PowerPoint-style presentation, poster board, video presentation, etc. Remember that this assignment is worth 100 points, so expect more than just answering the questions above on bullet points. If you were to write an essay, I would expect 5-7 full paragraphs, use that as you determining factor for whatever project type you are using. Question 3 of 10Which rays form the sides of TUV?UA. VTO B. VUC. UTD. TUE. UVOF. TV 51. Find the length of the unknown side x of this triangle, evaluate your answer to two decimal places. How did feudalism influence storytelling during the Middle Ages? Use the drop-down menu to select the qualification best demonstrated in each example. Virgil is on time every day to his job as a Packaging Machine Operator. Lily analyzes a product's supply chain to identify ways to make it more efficient. Chase manages shipping schedules so products are sent on time. Zaida helps another worker get products ready for shipping. What does it mean"You can chain my body, but not my mind?" How does the oath in paragraph 14 contribute to the author's explanation of growing up in North Korea? Which of the following are benefits of commensalism? (Choose all that apply) (Dont put links or I will report!!) A)foodB)transportationC)protectionD)reproduction U will be marked as brainlest if you solve this ex Name two producers in the food web what is the conjugation ending of er verb whould you Barrow moeny or not tell me whywill give brainliest don't put links or will be reported