Question

Course: Computer Architecture Theme: Internal Memory What is parity bit? What is Hamming code? Give examples.

Course: Computer Architecture
Theme: Internal Memory

What is parity bit? What is Hamming code? Give examples.

Homework Answers

Answer #1

A parity bit is basically considered as an extra bit by which a number becomes either even or odd.

In hamming code there are 3 parity bits which are used to detect and correct the single bit error.

There are two types of parity bits:-

  1. Even parity:- If the total number of ones in the data including the parity bit is an even number, it is called even parity.
  2. Odd parity:- If the total number of ones in the data including the parity bit is an odd number, it is called odd parity.

​​​​​​

Hamming code is basically a technique or we can say that it is a linear code that is used for error correction and detection.

Hamming code includes 7 bits out of which 4 are data bits and 3 are parity bits.

The limitation of hamming code is that it can detect up to two bits error but can correct only a single bit error.

Example of hamming code:-

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
A 4-bit data is transmitted using a Hamming code to ensure that the receiver can detect...
A 4-bit data is transmitted using a Hamming code to ensure that the receiver can detect and correct single bit errors. Show the bit pattern transmitted for data 1010 (left to right: from the most significant bit to the least significant bit). Assume that even parity is used in the Hamming code. How many redundant bits are needed in the Hamming code? And what is the value of each Hamming code bit? In your answer, please indicate the data bit...
Computer Architecture Theme: External Memory (DISK) Define track, cylinder and sector. Draw the disk format of...
Computer Architecture Theme: External Memory (DISK) Define track, cylinder and sector. Draw the disk format of a typical Winchester disk.
A set of parity-check equations for a distance-4 Hamming code with 64 data bits and 8...
A set of parity-check equations for a distance-4 Hamming code with 64 data bits and 8 parity-check bits are specified by the eight 72-bit constants below, each representing one row the parity-check matrix: C[1] = 72'h80000000000000007f; C[2] = 72'h400000003FFFFFFF80; C[3] = 72'h20001FFFC0007FFF80; C[4] = 72'h100FE03FC07F807F80; C[5] = 72'h0871E3C3C78787878F; C[6] = 72'h04B66CCCD9999999B3; C[7] = 72'h02DAB5556AAAAAAAD5; C[8] = 72'hFFFFFFFFFFFFFFFFFF; Assuming that bits are numbered D[17:0], bits D[71:64] are the check bits, D[63:0] are the data bits. Write a Verilog model for a...
1. What is a company's internal data? Give two examples of internal data. 2. Discuss the...
1. What is a company's internal data? Give two examples of internal data. 2. Discuss the components and functions of a marketing information system (MIS). essay questions plz help
a-Are internal interrupts peripheral interrupts? Explain and give examples in regardstothe PIC16F877A microcontroller. b-If the GIE...
a-Are internal interrupts peripheral interrupts? Explain and give examples in regardstothe PIC16F877A microcontroller. b-If the GIE bit (Global Interrupt Enable) is not activated, can we still enable aninterrupt, and have it function properly? Explain. c-Is there a restriction on the initialization value of the TMR0 register? Explain.
what is meant by a flashbulb memory? Describe its characteristics. Give an example that is well-known....
what is meant by a flashbulb memory? Describe its characteristics. Give an example that is well-known. Some psychologists are not impressed by these well-known examples of this phenomenon. What are some of the criticisms of the idea of flashbulb memory?
1) what do you mean by computer crime? give some examples? 2) Differentiate between LAW and...
1) what do you mean by computer crime? give some examples? 2) Differentiate between LAW and ETHIC 3) Differentiate between copyright and patient. 4) Elaborate the concept of digital forensic and its type 5) Discuss in detail cyper law
1. Give examples of responses to the assessed risk of material misstatement. 2. What is the...
1. Give examples of responses to the assessed risk of material misstatement. 2. What is the relationship of a less than high control risk assessment to the nature, extent, and timing of substantive tests? 3. How are audit matters related to internal control communicated to management and to those charged with governance? 4. When is the control risk assessment High? Less than high?
can you give me short summary abstract and conclusion on chapters 1 and chapters 2 in...
can you give me short summary abstract and conclusion on chapters 1 and chapters 2 in Strategic Market Management, 9th Edition, by David A. Aaker As you said yu want more info, below is the info, can you please answer my question now. Management Tasks:Strategic Analysis ,Innovation,Multiple Business—Strategies and Issues,Creating SCAs,Developing Growth Platforms Business Strategy:The Product-Market Investment Strategy –    where to compet,The Customer Value Proposition,Assets and Competencies,Functional Strategies and Programs The Product-Market Investment Strategy-Invest to grow (or enter a product...
What tools could AA leaders have used to increase their awareness of internal and external issues?...
What tools could AA leaders have used to increase their awareness of internal and external issues? ???ALASKA AIRLINES: NAVIGATING CHANGE In the autumn of 2007, Alaska Airlines executives adjourned at the end of a long and stressful day in the midst of a multi-day strategic planning session. Most headed outside to relax, unwind and enjoy a bonfire on the shore of Semiahmoo Spit, outside the meeting venue in Blaine, a seaport town in northwest Washington state. Meanwhile, several members of...