adplus-dvertising
frame-decoration

Question

There are two main methods of

a.

error detection

b.

error correction

c.

parity bit errors

d.

redundancy

Posted under Networking

Answer: (b).error correction

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. There are two main methods of

Similar Questions

Discover Related MCQs

Q. The cyclic redundancy check is used in

Q. In error detection and correction process, we use geometric approach to define

Q. The received code word of the cyclic code is the sum of the sent code word and the

Q. In a cyclic code, the decoder is failed to detect any error, when syndrome is

Q. What is the maximum effect of a 2-ms burst of noise on data transmitted for 12 kbps

Q. The divisor line and XOR are missing if the corresponding bit in the divisor is

Q. The unsigned representation of numbers by one's complement can represent

Q. The checksum is used in the Internet by several protocols although not at the

Q. A simple parity-check code can detect

Q. The hamming distance can easily be found if we apply the

Q. In subtraction of modulo-2 arithmetic, 0-1 =

Q. In modulo-N arithmetic, we use only the integers in the range

Q. To detect or correct errors, we send extra bits with data. It is called

Q. A good polynomial generator of the cyclic code have at least

Q. The dataword is organized in the form of

Q. A simple parity-check code is the most familiar

Q. What are the bits transmitted for the NRZ-L system?

Q. What are the bits transmitted for the return to zero system?

Q. What are the bits transmitted in the differential Manchester coding?

Q. What are the bits transmitted for the AMI and Pseudoternary System?