Exam 17: Information Science
Exam 1: Urban Services107 Questions
Exam 2: Business Efficiency104 Questions
Exam 3: Planning and Scheduling108 Questions
Exam 4: Linear Programming111 Questions
Exam 5: Exploring Data: Distributions115 Questions
Exam 6: Exploring Data: Relationships104 Questions
Exam 7: Data for Decisions99 Questions
Exam 8: Probability: the Mathematics of Chance108 Questions
Exam 9: Social Choice: the Impossible Dream103 Questions
Exam 10: The Manipulability of Voting Systems106 Questions
Exam 11: Weighted Voting Systems111 Questions
Exam 12: Electing the President93 Questions
Exam 13: Fair Division121 Questions
Exam 14: Apportionment112 Questions
Exam 15: Game Theory: the Mathematics of Competition113 Questions
Exam 16: Identification Numbers110 Questions
Exam 17: Information Science94 Questions
Exam 18: Growth and Form111 Questions
Exam 19: Symmetry and Patterns115 Questions
Exam 20: Tilings112 Questions
Exam 21: Savings Models113 Questions
Exam 22: Borrowing Models113 Questions
Exam 23: The Economics of Resources119 Questions
Select questions type
For the code C = {000000,111111}, how many errors would have to occur during transmission for a received word to be encoded incorrectly?
(Multiple Choice)
4.7/5
(35)
For the code C = {00000,11111}, how many errors would have to occur during transmission for a received word to be encoded incorrectly?
(Multiple Choice)
4.8/5
(34)
Use the Venn diagram method to determine the code word of the message 1010.
(Multiple Choice)
4.9/5
(39)
Use the Venn diagram method to determine the code word of the message 0111.
(Multiple Choice)
5.0/5
(31)
Create a binary linear code with eight possible code words that can detect and correct any single-digit error.
(Essay)
4.7/5
(38)
Use the Vigenère cipher with the key word SPRING to encrypt the message APRIL SHOWERS.
(Short Answer)
4.9/5
(30)
Given that the following numbers were encoded using the delta function, which of the following is not an original number? 95 -11 8 -8 -3 9 2
(Multiple Choice)
4.9/5
(31)
You propose a code in which each three-digit binary message word a1 a2 a3 has appended two parity-check digits c1 = a1 + a2 and c2 = a2 + a3. Which of the following is a true statement?
(Multiple Choice)
4.9/5
(40)
How does the weight of a code compare with the number of errors that can be corrected?
(Essay)
5.0/5
(38)
Suppose you create a binary code by appending to each message word a1 a2 a3 a4 three parity-check digits c1 = a1 + a2 + a4, c2 = a2 + a3 + a4, and c3 = a2 + a3 + a4. Will the resulting code detect and correct all single-digit errors?
(Essay)
4.8/5
(39)
Answer the Questions using the following frequency list for a set of five different symbols. Symbol Frequency A 20 B 35 C 40 D 25 E 10
-What is the Huffman code for the symbol C?
(Multiple Choice)
4.8/5
(40)
Given that TROUT was used as the key word to encrypt ZFBY YBJVCGZ with the Vigenère cipher, decrypt the message.
(Short Answer)
4.7/5
(41)
You propose a code in which each two-digit binary message word a1 a2 has appended a parity-check digit c1 = a1 + a2. Which of the following is a true statement?
(Multiple Choice)
4.9/5
(31)
Use the encoding scheme A 0, B 10, C 11 to decode the sequence 0101101011.
(Multiple Choice)
4.8/5
(30)
Given that PLEASE was used as the key word to encrypt QCMNY JDZH with the Vigenère cipher, decrypt the message.
(Multiple Choice)
4.8/5
(29)
What is the distance between received words 0111011 and 0101001?
(Multiple Choice)
4.7/5
(24)
Showing 61 - 80 of 94
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)