Question

Question 3
What is the entropy of your name (first name + surname)?
Question 4
Using the results of Question 3, Encode the first three characters of your full name using Arithmetic code?

 

 

My name is faisal

Expert Answer

Want to see the step-by-step answer?

Check out a sample Q&A here.

Want to see this answer and more?

Experts are waiting 24/7 to provide step-by-step solutions in as fast as 30 minutes!*

*Response times may vary by subject and question complexity. Median response time is 34 minutes for paid subscribers and may be longer for promotional offers.
Tagged in
Engineering
Computer Engineering

Other

Related Computer Engineering Q&A

Find answers to questions asked by students like you.

Q: How to see system software and hardware configuration changes ?  State and Explain the steps.

A: Solution: Configuration Management is the process to track the changes of any software and hardware...

Q: Using the descriptions of the attributes given in the figure, convert the ERD shown in Figure P6.1 i...

A: Conversion of given ER Diagram to Dependency Diagram (3NF): Normalization is the method of breaking ...

Q: Write a program that first reads in the name of an input file and then reads the input file using th...

A: PROGRAM: #Defining the readFile() function def readFile(file_Name):   dictn = {}   with open(file_Na...

Q: Write a program that displays, validates, and processes a form for entering information about a pack...

A: A program for the given criteria is as follows, <!DOCTYPE html><html><head><tit...

Q: Suppose you receive a letter, which appears to come from your company’s mail server stating that the...

A: Solution: This type of malware where the password hacking is done is called the phishing attack whe...

Q: How do I answer this, please?  Acme Parts runs a small factory and employs workers who are paid one ...

A: Since you are not mentioning the programming language, here were are using C++ to complete the progr...

Q: 5. Identity theft, where people steal personal information, continues to be a problem for consumers ...

A: Steps for preventing people from stealing personal information Database administrator plays a very ...

Q: Question 2:A system with 32768 possible colors is used to transmit M × N pixel image.1. What is the ...

A: 1) Calculating the color depth of the system with 32768 colors:   A bit is a binary representation w...

Q: What are issues found in router layer 2 protocol? Why even after changing the router serial interfac...

A: In OSI model Data LInk layer is the second layer that creates frames from data bits and provides err...

Q: 1 import java.util.Scanner;2 3 public class OrderTwoCities {4 public static void main(String[] args)...

A: Declare a string variable to hold the third city, city3. Take user input for the third city and stor...

Q: Discuss the differences between latches and flip-flops with an example.

A: Click to see the answer

Q: You have been assigned to be a computer security trainer for your firm’s 2,000 employees and contrac...

A: Awareness: First Employees and Contract Workers must know about the computer and the security softwa...

Q: Question 2:A system with 32768 possible colors is used to transmit ? × ? pixel image. M = 900 N = 0....

A: The possible colors are 32768. The size of image is represented by M × N.

Q: Explain from all aspects (i.e. to the extent of your studies) how the concept of Mutual Exclusion (M...

A: Mutual Exclusion: Mutual exclusion states that no two processes can be in Critical Section at the s...

Q: Using the STUDENT table structure shown in Table P6.4, do the following:a. Write the relational sche...

A: Construct the dependency diagram with all partial and transitive dependencies: The relational schema...

Q: ABC+ABD+ACD+BCD design the circuit using only nand gates

A: The given Expression is : ABC + ABD + ACD +BCD            This expression simply represents the sum ...

Q: 10. Build a list of contacts for New Jersey manufacturers as follows: ContactFirstName, ContactLastN...

A: Explanation: The below query selects the contact details from manufacturer table. The Substring fun...

Q: Computer Engineering Question

A: Variable holding value: Data type of a variable decides what kind of data will a variable hold. If ...

Q: Create a class date, each object is a value represented the day in the year in form year, month, day...

A: Program: //included header file #include <iostream> //include namespace using namespace std; /...

Q: Question 2:A system with 32768 possible colors is used to transmit M × N pixel image.1. What is the ...

A: Given, Possible colors = 32768 Image size = 305 * 0.75M = 305 * 228.75   1) The color of the depth o...

Q: If the company intended to develop its own plan based on an unlicensed but copyrighteddocument, and ...

A: “No”, in this case, the approach is not considered to be unethical.

Q: Assume you have a system with the following (As in the picture)  write the following in c++ (using ...

A: The given system can be implemented using inheritance as follows: Class Region will act as an abstr...

Q: What is the answer?

A: The Shannon entropy of a set of values is defined as below, where “E” is the entropy and “Pi” is th...

Q: this is python Output range with increment of 10   Write a program whose input is two integers. O...

A: PROGRAM:   #Getting the input   num1=int(input("Enter the first number:"))   num2=int(input("Enter t...

Q: Please.. help me answer this question

A: Merge sort: - It is one of the best techniques used to sort the elements of an array. This technique...

Q: Create a class called integerset. A set is representedinitially as an array of ones and zeros. a[i] ...

A: Since the Programming language is not mentioned in the question, we will answer this question in C++...

Q: 1.i).To represent one entity that is a specific type of another entity we use…..? a.Relationshipsb.C...

A: 1. i). The correct answer to this question is option a. Relationships Explanation: - Any relationshi...

Q: using python Adjust values in a list by normalizing   When analyzing data sets, such as data for ...

A: Program: n = int(input()) # variable n indicates number of integers which will followlist = [] # an ...

Q: Using the INVOICE table structure shown in Table P6.3, do the following: a. Write the relational sch...

A: Note: - As per the guidelines we can only answer the maximum of three subparts. Please resubmit the ...

Q: Create a class Rational for performing arithmetic with fractions. Write a driver program to test the...

A: Since you are not mentioning the programming language, here we are using C++ to complete the program...

Q: Create a relational diagram for the database using crow’s foot notation. The ERD should include all ...

A: A database relational diagram using crow's foot notation is as follows,

Q: please use python   The following equations estimate the calories burned when exercising (source): W...

A: Since you have not provided the sample output in the question, we have attached the output in most a...

Q: 6.Which one of the followings is a network layer device?   Switch Repeater Router Modem     7.Which ...

A: Multiple questions asked.solving first two (6,7) re-post remaining.   6.   Answer is Router.   Route...

Q: Using Java, create a personal directory that contains a data structure for first name, last name, em...

A: File name: “Contact.java” //Create a class public class Contact {    //Declaring instance variables ...

Q: Create a class time24, each object is a value represented the time of day in the form hours, minutes...

A: A C++ program that satisfies the given criteria is as follows, File name: “main.cpp” #include <io...

Q: Assume you have a system with the following (in picture)  write the following in c++ (using Inherit...

A: The given system can be implemented using inheritance as follows: Class Region will act as an abstr...

Q: Create a class time24, each object is a value represented the time of day in the form hours, minutes...

A: Since, programming language is not mentioned in the question, we will answer this question in C++ la...

Q: Which of these is used to trigger retransmissions in TCP protocol ?   POP timeout Pipelining...

A: Triggering retransmissions in TCP protocol The sender of TCP depends upon the incoming duplicate AC...

Q: 2.A)Briefly describe how, Identifying relations, non-identifying relationships and non-specific rela...

A: A) Identifying relationships: Identifying relationship refers to a relationship in which the child ...

Q: please help me as fast as possible

A: The program prompts the user to enter a number between 5 and 20. The user is prompted to do so until...

Q: In a complete k-ary tree, every internal node has exactly k children or no child. The number of leav...

A: K-ary tree: In a graph theory m-ary tree is also called as k-ary tree or k-way tree it is a rooted t...

Q: Example: Assume your Student ID is 432306128. Use the first four numbers for caculating:? = 8 + 2 + ...

A: According to the question, Let us assume the value of K = 17 In the case of composite video, only on...

Q: python

A: #initialize a list with the given elements numbers=[11,7,43,32,2,1,72,77,12] #get the input from the...

Q: Q3 Smith, Smith, Smith, and Smith   Smith, Smith, Smith, and Smith (S4) is a regional accounting fir...

A: The possible network related errors are:  Connectivity issues  IP address conflict  Viruses that af...

Q: - Create a class Rational for performing arithmetic with fractions.Write a driver program to test th...

A: Program: Filename: “main.cpp” #include <iostream> using namespace std; #include "Rat.h" int ma...