What is a modified hamming code

Assignment Help Computer Engineering
Reference no: EM131531405

Question: 1. What is a modified Hamming code, and what are its advantages over a standard Hamming code?

2. Hamming codes become more efficient (efficiency is the ratio of check bits to total word length) as the number of bits in the source word increases. Consequently, a 16-bit 68000 with an ECC memory should be more efficient than an 8-bit 6800 with an ECC memory. A 68020 with its 32-bit data bus should be even more efficient. Why is this efficiency so hard to realize in practice?

Reference no: EM131531405

Questions Cloud

Popular line of action figures : The Adventure Toys Company manufactures a popular line of action figures and distributes them to toy stores at the wholesale price of $10 per unit.
Design an error-logging system for an error-detecting memory : Whenever an error is detected, a low-priority interrupt is generated by the error detection circuit, and the operating system then makes a note of the location.
Define the industrial or organizational field : Define the industrial/organizational (I/O) field.Discuss three examples of how psychology can be used in the workplace.
Protecting networks and users : Protecting Networks and Users is a very important topic, especially today with all of the breaches and hacks that have been reported in the media.
What is a modified hamming code : Hamming codes become more efficient (efficiency is the ratio of check bits to total word length) as the number of bits in the source word increases.
What is the difference between fec and arq : What is the minimum number of check bits required to detect and correct a single error in a data block of 256 bits?
Journalize receipt of grant proceed in special revenues fund : In the General Fund, journalize the receipt of the $30,000 from the Special Revenues Fund. Journalize receipt of the grant proceeds in Special Revenues Fund.
Good decision for automotive companies : Do you think focusing on either purchasing or developing an effective hypervisor could be a good decision for automotive companies?
What can the designer do to overcome these difficulties : If the MTBF for a given 1-Mbit DRAM chip is 0.001 percent per thousand hours, what is the probability of failure in a 16-Mbyte memory system over a period.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Make a program which simulates a slot machine when the

create a program that simulates a slot machine. when the program runs it should do the following1. asks the user to

  Program that creates an instance of the string class

Write down a Java application that creates an instance of the String class and initializes this instance with a String literal. Use a for loop structure to print the string in reverse order. Implement the following two String member methods to com..

  What is the buffer explain briefly

Assume that ASC memory is built using eight interleaved blocks of 8 Kwords each. Include an instruction buffer eight words long into the ASC control unit.

  Create a gantt chart and pert chart in a project management

Create a Gantt chart and a PERT chart in a project management tool (e.g., Microsoft Project), or use a spreadsheet package to graphically show the high-level tasks of the project.

  Identify the convection diffusion and source terms

The construction of the boundary-layer equations for momentum and energy boundary-layer equations for momentum, their turbulent counterparts.

  Question regarding the white rabbit

A magician has a hat that holds two rabbits. One rabbit is black and the other is white. In his last 16 performances he has randomly pulled the black rabbit from the hat 16 times. The probability that he will pull the white rabbit from the hat in ..

  Why does a change of case help make a stronger password

Why does a change of case help make a stronger password? How did you choose the password you currently have? Could others follow the same logic and choose a similar password?

  Explain the key elements of recovering from lost assets

Describe and explain the key elements of recovering from lost assets. o What are Internet connected systems? Describe five examples. How does encryption work? Why is it considered a premier tool in IT Security?

  Factors affecting the group process and outcome

In class, we introduced different factors which may affect group process and outcome, like group size and the status effect.

  Some programming languages a comment can be enclosed

In some programming languages a comment can be enclosed either in braces {} or in the symbols (* *). How do you think a scanner will group the four symbols {, }, (*, *) for purposes of classification i.e. would each symbol be given its own classif..

  Create a text file called scores.txt with notepad

Create a text file called scores.txt with notepad with two lines: the first two lines are the computer scores and the second line human scores.

  How various cells can be in a computer''s main memory

Suppose a machine has 20GB of storage space available on a hard disk and receives data over a telephone connection at the rate of 14,400 bps. At this rate, how long will it take to fill the available storage space.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd