SlideShare a Scribd company logo
Computer Science
(A Level)
Error Checking and
Correction
Data can be corrupted at any point either in being processed
or transmission. Therefore, there are methods of detecting
errors in data.
Error Checking and Correction
There are 3 types of methods:
oParity Bit
oMajority Voting
oCheck Bits
A method of checking binary codes by
counting the numbers of 0s and 1s
A bit is added to a block of data for error
detection purposes
(Definitions)
If the data has an error and there is 7 bits (ASCII)
you can use 8th bit to detect and correct error.
Parity Bit
Rules: (even parity)
1. If there is an odd number of 1’s, then the
parity bit (8th bit) is 1 to make it even.
2. If there is an even number of 1’s, then
the parity bit (8th bit) is 0 to make/keep it
even.
(Even) Parity Bit
1.1011010 = 10110100
2.1110111 = 11101110
3.1001001 = 10010011
4.0010000 = 00100001
5.1010101 = 10101010
Examples of using Parity bit checker
Parity Bit
Disadvantages
• Cannot detect all errors
• Only detect an odd number of errors
• Parity bit might change
• Increases transmission length
• Doesn’t show where the error is, it just says
that an error has occurred
Each bit is transmitted 3 times to
make it easier to detect errors (for
computers)
(Definitions)
Unlike parity bit, majority voting is able to repair errors.
Majority Voting
Rules:
1. Each bit is transmitted 3 times
2. If a set of 3 (1 bit) doesn’t have the same
three values, majority voting will show and fix
errors.
e.g. 010 – ‘1’ is the error therefore
the transmission should be 000
according to a majority vote
Majority Voting
Original binary 8 bit code  11001010
Transmission (with errors)
101,111,001,010,110,100,011,001
Correction  111,111,000,000,111,000,111,000
Original code executed  11001010
Example of using Majority Voting
Majority Voting
Disadvantages
• If there is more than one error in one bit, it
will not be detected and the computer will
correct it incorrectly assuming that it is right.
• The transmission is 3 times longer than what
you want to send
• Increased processing time
A digit is added to the end of the
binary data to check if the data is
accurate
(Definitions)
Usually, the modulo-11 is used to find the check digit.
Check Digit
Rules (Modulo-11):
Example : 23045
Number 2 3 0 4 5
Weighting 6 5 4 3 2
1) The weighting always
starts from 2 from the right
hand side. Place the numbers
in this form/ position
2) Multiply
Number by each
weighting
number
Result 12 15 0 12 10
3) Add up results Total = 49
4) Total divided
by 11
49 / 11 = 4 rem. 5
5) Subtract
remainder
from 11
11 – 5 = 6 Check Digit
(put this digit
on the end of
the number)
1) 73409
Another Check Digit Example
Number 7 3 4 0 9
Weighting 6 5 4 3 2
Result 42 15 16 0 18
Total = 91
91 / 11 = 8 Rem. 3
11 – 3 = 8
Check
Digit

More Related Content

What's hot

Synchronous and Asynchronous Transmission
Synchronous and Asynchronous TransmissionSynchronous and Asynchronous Transmission
Synchronous and Asynchronous Transmission
Adeel Rasheed
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
bheemsain
 
Physical layer ppt
Physical layer pptPhysical layer ppt
Physical layer ppt
Najam Khattak
 
What Is Sliding Window Protocol?
What Is Sliding Window Protocol?What Is Sliding Window Protocol?
What Is Sliding Window Protocol?
Simplilearn
 
Error detection correction (CRC)
Error detection correction  (CRC)Error detection correction  (CRC)
Error detection correction (CRC)
Karam Munir Butt
 
Pipeline hazard
Pipeline hazardPipeline hazard
Pipeline hazard
AJAL A J
 
Error detection and correction unit-05
Error detection and correction unit-05Error detection and correction unit-05
Error detection and correction unit-05
shrinivasgnaik
 
Parity bits
Parity bitsParity bits
Parity bits
mrhaken
 
Computer organisation
Computer organisationComputer organisation
Computer organisation
Mohd Arif
 
Presentation on data communication
Presentation on data communicationPresentation on data communication
Presentation on data communication
Harpreet Dhaliwal
 
Lecture 22
Lecture 22Lecture 22
Lecture 22
Sehrish Rafiq
 
parallel Questions & answers
parallel Questions & answersparallel Questions & answers
parallel Questions & answers
Md. Mashiur Rahman
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
Naiyan Noor
 
Error control
Error controlError control
Error control
Bhupendra sahu
 
Transmission modes
Transmission modesTransmission modes
Transmission modes
Manaswi Sharma
 
Floating point presentation
Floating point presentationFloating point presentation
Floating point presentation
SnehalataAgasti
 
Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)
Imesha Perera
 
Lecture 5
Lecture 5Lecture 5
Digital principles basic
Digital principles basicDigital principles basic
Digital principles basic
Abinaya B
 
Computer Organization and Assembly Language
Computer Organization and Assembly LanguageComputer Organization and Assembly Language
Computer Organization and Assembly Language
fasihuddin90
 

What's hot (20)

Synchronous and Asynchronous Transmission
Synchronous and Asynchronous TransmissionSynchronous and Asynchronous Transmission
Synchronous and Asynchronous Transmission
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Physical layer ppt
Physical layer pptPhysical layer ppt
Physical layer ppt
 
What Is Sliding Window Protocol?
What Is Sliding Window Protocol?What Is Sliding Window Protocol?
What Is Sliding Window Protocol?
 
Error detection correction (CRC)
Error detection correction  (CRC)Error detection correction  (CRC)
Error detection correction (CRC)
 
Pipeline hazard
Pipeline hazardPipeline hazard
Pipeline hazard
 
Error detection and correction unit-05
Error detection and correction unit-05Error detection and correction unit-05
Error detection and correction unit-05
 
Parity bits
Parity bitsParity bits
Parity bits
 
Computer organisation
Computer organisationComputer organisation
Computer organisation
 
Presentation on data communication
Presentation on data communicationPresentation on data communication
Presentation on data communication
 
Lecture 22
Lecture 22Lecture 22
Lecture 22
 
parallel Questions & answers
parallel Questions & answersparallel Questions & answers
parallel Questions & answers
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
 
Error control
Error controlError control
Error control
 
Transmission modes
Transmission modesTransmission modes
Transmission modes
 
Floating point presentation
Floating point presentationFloating point presentation
Floating point presentation
 
Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
 
Digital principles basic
Digital principles basicDigital principles basic
Digital principles basic
 
Computer Organization and Assembly Language
Computer Organization and Assembly LanguageComputer Organization and Assembly Language
Computer Organization and Assembly Language
 

Viewers also liked

Programming Languages / Translators
Programming Languages / TranslatorsProgramming Languages / Translators
Programming Languages / Translators
Project Student
 
Parity Generator and Parity Checker
Parity Generator and Parity CheckerParity Generator and Parity Checker
Parity Generator and Parity Checker
Jignesh Navdiya
 
High Level Languages (Imperative, Object Orientated, Declarative)
High Level Languages (Imperative, Object Orientated, Declarative)High Level Languages (Imperative, Object Orientated, Declarative)
High Level Languages (Imperative, Object Orientated, Declarative)
Project Student
 
Classification of Programming Languages
Classification of Programming LanguagesClassification of Programming Languages
Classification of Programming Languages
Project Student
 
Error control, parity check, check sum, vrc
Error control, parity check, check sum, vrcError control, parity check, check sum, vrc
Error control, parity check, check sum, vrc
Huawei Technologies
 
Data Compression (Lossy and Lossless)
Data Compression (Lossy and Lossless)Data Compression (Lossy and Lossless)
Data Compression (Lossy and Lossless)
Project Student
 
Computer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error CorrectionComputer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error Correction
Saikrishna Tanguturu
 
Parity bits
Parity bitsParity bits
Parity bits
mrhaken
 
Ddr presentation
Ddr presentationDdr presentation
Ddr presentation
Denise Stunt
 
Ddr
DdrDdr
Single-Bit Parity Detection and Correction using Hamming Code 7-Bit Model
Single-Bit Parity Detection and Correction using Hamming Code 7-Bit ModelSingle-Bit Parity Detection and Correction using Hamming Code 7-Bit Model
Single-Bit Parity Detection and Correction using Hamming Code 7-Bit Model
Universitas Pembangunan Panca Budi
 
Universal Gates - Aneesa N Ali
Universal Gates - Aneesa N AliUniversal Gates - Aneesa N Ali
Universal Gates - Aneesa N Ali
Dipayan Sarkar
 
Si design guideforddr2-ddr3pcb_eng1
Si design guideforddr2-ddr3pcb_eng1Si design guideforddr2-ddr3pcb_eng1
Si design guideforddr2-ddr3pcb_eng1thiagukv
 
system on chip for telecommand system design
system on chip for telecommand system designsystem on chip for telecommand system design
system on chip for telecommand system design
Raghavendra Badager
 
On kolontai winged eros ......for class
On kolontai  winged eros ......for classOn kolontai  winged eros ......for class
On kolontai winged eros ......for class
Neelesh Negi
 
Lecture 20
Lecture 20Lecture 20
Lecture 20
Sehrish Rafiq
 
Hexadecimal (Calculations and Explanations)
Hexadecimal (Calculations and Explanations)Hexadecimal (Calculations and Explanations)
Hexadecimal (Calculations and Explanations)
Project Student
 
Ch 10
Ch 10Ch 10
Error Correction And Hamming Code Ibrar
Error Correction And Hamming Code IbrarError Correction And Hamming Code Ibrar
Error Correction And Hamming Code Ibrar
ibrar562
 
Internet principles of operation
Internet principles of operationInternet principles of operation
Internet principles of operation
Inqilab Patel
 

Viewers also liked (20)

Programming Languages / Translators
Programming Languages / TranslatorsProgramming Languages / Translators
Programming Languages / Translators
 
Parity Generator and Parity Checker
Parity Generator and Parity CheckerParity Generator and Parity Checker
Parity Generator and Parity Checker
 
High Level Languages (Imperative, Object Orientated, Declarative)
High Level Languages (Imperative, Object Orientated, Declarative)High Level Languages (Imperative, Object Orientated, Declarative)
High Level Languages (Imperative, Object Orientated, Declarative)
 
Classification of Programming Languages
Classification of Programming LanguagesClassification of Programming Languages
Classification of Programming Languages
 
Error control, parity check, check sum, vrc
Error control, parity check, check sum, vrcError control, parity check, check sum, vrc
Error control, parity check, check sum, vrc
 
Data Compression (Lossy and Lossless)
Data Compression (Lossy and Lossless)Data Compression (Lossy and Lossless)
Data Compression (Lossy and Lossless)
 
Computer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error CorrectionComputer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error Correction
 
Parity bits
Parity bitsParity bits
Parity bits
 
Ddr presentation
Ddr presentationDdr presentation
Ddr presentation
 
Ddr
DdrDdr
Ddr
 
Single-Bit Parity Detection and Correction using Hamming Code 7-Bit Model
Single-Bit Parity Detection and Correction using Hamming Code 7-Bit ModelSingle-Bit Parity Detection and Correction using Hamming Code 7-Bit Model
Single-Bit Parity Detection and Correction using Hamming Code 7-Bit Model
 
Universal Gates - Aneesa N Ali
Universal Gates - Aneesa N AliUniversal Gates - Aneesa N Ali
Universal Gates - Aneesa N Ali
 
Si design guideforddr2-ddr3pcb_eng1
Si design guideforddr2-ddr3pcb_eng1Si design guideforddr2-ddr3pcb_eng1
Si design guideforddr2-ddr3pcb_eng1
 
system on chip for telecommand system design
system on chip for telecommand system designsystem on chip for telecommand system design
system on chip for telecommand system design
 
On kolontai winged eros ......for class
On kolontai  winged eros ......for classOn kolontai  winged eros ......for class
On kolontai winged eros ......for class
 
Lecture 20
Lecture 20Lecture 20
Lecture 20
 
Hexadecimal (Calculations and Explanations)
Hexadecimal (Calculations and Explanations)Hexadecimal (Calculations and Explanations)
Hexadecimal (Calculations and Explanations)
 
Ch 10
Ch 10Ch 10
Ch 10
 
Error Correction And Hamming Code Ibrar
Error Correction And Hamming Code IbrarError Correction And Hamming Code Ibrar
Error Correction And Hamming Code Ibrar
 
Internet principles of operation
Internet principles of operationInternet principles of operation
Internet principles of operation
 

Similar to Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)

Information Processes and Technology HSC Communications Unit
Information Processes and Technology HSC Communications UnitInformation Processes and Technology HSC Communications Unit
Information Processes and Technology HSC Communications Unit
pezhappy99
 
07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf
baysahcmjames2kblax
 
Error detection and correction codes
Error detection and correction codesError detection and correction codes
Error detection and correction codes
GargiKhanna1
 
Errror Detection and Correction
Errror Detection and CorrectionErrror Detection and Correction
Errror Detection and Correction
Mahesh Kumar Attri
 
Error detection and Correction
Error detection and CorrectionError detection and Correction
Error detection and Correction
TarjMehta1
 
Computer Organisation and Architecture :Module M-1.pdf
Computer Organisation and Architecture :Module M-1.pdfComputer Organisation and Architecture :Module M-1.pdf
Computer Organisation and Architecture :Module M-1.pdf
SushantRaj25
 
Lecture set 3
Lecture set 3Lecture set 3
Lecture set 3
Gopi Saiteja
 
ERROR_DETECTION.pptx
ERROR_DETECTION.pptxERROR_DETECTION.pptx
ERROR_DETECTION.pptx
BeniamTekeste
 
crc_checksum.pdf
crc_checksum.pdfcrc_checksum.pdf
crc_checksum.pdf
ssuser8b4eb21
 
ERROR DETECTION data communication and computer network.pptx
ERROR DETECTION data communication and computer network.pptxERROR DETECTION data communication and computer network.pptx
ERROR DETECTION data communication and computer network.pptx
gadisaAdamu
 
Error dectation and correction
Error dectation and correctionError dectation and correction
Error dectation and correction
fg657
 
Calculating the hamming code (tutorial)
Calculating the hamming code (tutorial)Calculating the hamming code (tutorial)
Calculating the hamming code (tutorial)
kiriinyaKev
 
Satellite error detection and correction presentation
Satellite error detection and correction presentationSatellite error detection and correction presentation
Satellite error detection and correction presentation
AhmedMuhumed2
 
PARITY_GENERATOR_AND_CHECKER_PPT.pptx
PARITY_GENERATOR_AND_CHECKER_PPT.pptxPARITY_GENERATOR_AND_CHECKER_PPT.pptx
PARITY_GENERATOR_AND_CHECKER_PPT.pptx
RockFellerSinghRusse
 
Calculating the hamming code
Calculating the hamming codeCalculating the hamming code
Calculating the hamming code
Umesh Gupta
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
Sisir Ghosh
 
4_Datalink__Error_Detection_and Correction.pdf
4_Datalink__Error_Detection_and Correction.pdf4_Datalink__Error_Detection_and Correction.pdf
4_Datalink__Error_Detection_and Correction.pdf
kenilpatel65
 
Error detection.
Error detection.Error detection.
Error detection.
Wasim Akbar
 
Integers
IntegersIntegers
Representation of Real Numbers
Representation of Real NumbersRepresentation of Real Numbers
Representation of Real Numbers
Forrester High School
 

Similar to Error Checking and Correction (Parity Bit, Majority Voting, Check Digit) (20)

Information Processes and Technology HSC Communications Unit
Information Processes and Technology HSC Communications UnitInformation Processes and Technology HSC Communications Unit
Information Processes and Technology HSC Communications Unit
 
07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf
 
Error detection and correction codes
Error detection and correction codesError detection and correction codes
Error detection and correction codes
 
Errror Detection and Correction
Errror Detection and CorrectionErrror Detection and Correction
Errror Detection and Correction
 
Error detection and Correction
Error detection and CorrectionError detection and Correction
Error detection and Correction
 
Computer Organisation and Architecture :Module M-1.pdf
Computer Organisation and Architecture :Module M-1.pdfComputer Organisation and Architecture :Module M-1.pdf
Computer Organisation and Architecture :Module M-1.pdf
 
Lecture set 3
Lecture set 3Lecture set 3
Lecture set 3
 
ERROR_DETECTION.pptx
ERROR_DETECTION.pptxERROR_DETECTION.pptx
ERROR_DETECTION.pptx
 
crc_checksum.pdf
crc_checksum.pdfcrc_checksum.pdf
crc_checksum.pdf
 
ERROR DETECTION data communication and computer network.pptx
ERROR DETECTION data communication and computer network.pptxERROR DETECTION data communication and computer network.pptx
ERROR DETECTION data communication and computer network.pptx
 
Error dectation and correction
Error dectation and correctionError dectation and correction
Error dectation and correction
 
Calculating the hamming code (tutorial)
Calculating the hamming code (tutorial)Calculating the hamming code (tutorial)
Calculating the hamming code (tutorial)
 
Satellite error detection and correction presentation
Satellite error detection and correction presentationSatellite error detection and correction presentation
Satellite error detection and correction presentation
 
PARITY_GENERATOR_AND_CHECKER_PPT.pptx
PARITY_GENERATOR_AND_CHECKER_PPT.pptxPARITY_GENERATOR_AND_CHECKER_PPT.pptx
PARITY_GENERATOR_AND_CHECKER_PPT.pptx
 
Calculating the hamming code
Calculating the hamming codeCalculating the hamming code
Calculating the hamming code
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
4_Datalink__Error_Detection_and Correction.pdf
4_Datalink__Error_Detection_and Correction.pdf4_Datalink__Error_Detection_and Correction.pdf
4_Datalink__Error_Detection_and Correction.pdf
 
Error detection.
Error detection.Error detection.
Error detection.
 
Integers
IntegersIntegers
Integers
 
Representation of Real Numbers
Representation of Real NumbersRepresentation of Real Numbers
Representation of Real Numbers
 

More from Project Student

Appraisal (Self Assessment, Peer Assessment, 360 Degree Feedback)
Appraisal (Self Assessment, Peer Assessment, 360 Degree Feedback)Appraisal (Self Assessment, Peer Assessment, 360 Degree Feedback)
Appraisal (Self Assessment, Peer Assessment, 360 Degree Feedback)
Project Student
 
Motivation Theories (Maslow's Hierarchy of Needs, Taylor's Scientific Managem...
Motivation Theories (Maslow's Hierarchy of Needs, Taylor's Scientific Managem...Motivation Theories (Maslow's Hierarchy of Needs, Taylor's Scientific Managem...
Motivation Theories (Maslow's Hierarchy of Needs, Taylor's Scientific Managem...
Project Student
 
Operating System (Scheduling, Input and Output Management, Memory Management,...
Operating System (Scheduling, Input and Output Management, Memory Management,...Operating System (Scheduling, Input and Output Management, Memory Management,...
Operating System (Scheduling, Input and Output Management, Memory Management,...
Project Student
 
Human Resources (HRM, Soft and Hard HRM)
Human Resources (HRM, Soft and Hard HRM)Human Resources (HRM, Soft and Hard HRM)
Human Resources (HRM, Soft and Hard HRM)
Project Student
 
Product Life Cycle (Stages and Extension Strategies)
Product Life Cycle (Stages and Extension Strategies)Product Life Cycle (Stages and Extension Strategies)
Product Life Cycle (Stages and Extension Strategies)
Project Student
 
Product (Product Portfolio, Branding, USP, Product Depth and Breadth, Product...
Product (Product Portfolio, Branding, USP, Product Depth and Breadth, Product...Product (Product Portfolio, Branding, USP, Product Depth and Breadth, Product...
Product (Product Portfolio, Branding, USP, Product Depth and Breadth, Product...
Project Student
 
Training Methods (On-The-Job, Off-The-Job, Retraining and Apprenticeships)
Training Methods (On-The-Job, Off-The-Job, Retraining and Apprenticeships)Training Methods (On-The-Job, Off-The-Job, Retraining and Apprenticeships)
Training Methods (On-The-Job, Off-The-Job, Retraining and Apprenticeships)
Project Student
 
Price (Market-Orientated and Cost-Based Pricing)
Price (Market-Orientated and Cost-Based Pricing)Price (Market-Orientated and Cost-Based Pricing)
Price (Market-Orientated and Cost-Based Pricing)
Project Student
 
Changes in working practices
Changes in working practicesChanges in working practices
Changes in working practices
Project Student
 
Ascii and Unicode (Character Codes)
Ascii and Unicode (Character Codes)Ascii and Unicode (Character Codes)
Ascii and Unicode (Character Codes)
Project Student
 
Workforce Planning (Process, Labour Shortage, Excess Labour)
Workforce Planning (Process, Labour Shortage, Excess Labour)Workforce Planning (Process, Labour Shortage, Excess Labour)
Workforce Planning (Process, Labour Shortage, Excess Labour)
Project Student
 
Harvard vs Von Neumann Architecture
Harvard vs Von Neumann ArchitectureHarvard vs Von Neumann Architecture
Harvard vs Von Neumann Architecture
Project Student
 
Assembly and Machine Code
Assembly and Machine CodeAssembly and Machine Code
Assembly and Machine Code
Project Student
 
Software (Application and System Software)
Software (Application and System Software)Software (Application and System Software)
Software (Application and System Software)
Project Student
 
Hardware and Software
Hardware and SoftwareHardware and Software
Hardware and Software
Project Student
 
Enterprise (Entrepreneur, Innovation, Business Sectors, SMEs)
Enterprise (Entrepreneur, Innovation, Business Sectors, SMEs)Enterprise (Entrepreneur, Innovation, Business Sectors, SMEs)
Enterprise (Entrepreneur, Innovation, Business Sectors, SMEs)
Project Student
 

More from Project Student (16)

Appraisal (Self Assessment, Peer Assessment, 360 Degree Feedback)
Appraisal (Self Assessment, Peer Assessment, 360 Degree Feedback)Appraisal (Self Assessment, Peer Assessment, 360 Degree Feedback)
Appraisal (Self Assessment, Peer Assessment, 360 Degree Feedback)
 
Motivation Theories (Maslow's Hierarchy of Needs, Taylor's Scientific Managem...
Motivation Theories (Maslow's Hierarchy of Needs, Taylor's Scientific Managem...Motivation Theories (Maslow's Hierarchy of Needs, Taylor's Scientific Managem...
Motivation Theories (Maslow's Hierarchy of Needs, Taylor's Scientific Managem...
 
Operating System (Scheduling, Input and Output Management, Memory Management,...
Operating System (Scheduling, Input and Output Management, Memory Management,...Operating System (Scheduling, Input and Output Management, Memory Management,...
Operating System (Scheduling, Input and Output Management, Memory Management,...
 
Human Resources (HRM, Soft and Hard HRM)
Human Resources (HRM, Soft and Hard HRM)Human Resources (HRM, Soft and Hard HRM)
Human Resources (HRM, Soft and Hard HRM)
 
Product Life Cycle (Stages and Extension Strategies)
Product Life Cycle (Stages and Extension Strategies)Product Life Cycle (Stages and Extension Strategies)
Product Life Cycle (Stages and Extension Strategies)
 
Product (Product Portfolio, Branding, USP, Product Depth and Breadth, Product...
Product (Product Portfolio, Branding, USP, Product Depth and Breadth, Product...Product (Product Portfolio, Branding, USP, Product Depth and Breadth, Product...
Product (Product Portfolio, Branding, USP, Product Depth and Breadth, Product...
 
Training Methods (On-The-Job, Off-The-Job, Retraining and Apprenticeships)
Training Methods (On-The-Job, Off-The-Job, Retraining and Apprenticeships)Training Methods (On-The-Job, Off-The-Job, Retraining and Apprenticeships)
Training Methods (On-The-Job, Off-The-Job, Retraining and Apprenticeships)
 
Price (Market-Orientated and Cost-Based Pricing)
Price (Market-Orientated and Cost-Based Pricing)Price (Market-Orientated and Cost-Based Pricing)
Price (Market-Orientated and Cost-Based Pricing)
 
Changes in working practices
Changes in working practicesChanges in working practices
Changes in working practices
 
Ascii and Unicode (Character Codes)
Ascii and Unicode (Character Codes)Ascii and Unicode (Character Codes)
Ascii and Unicode (Character Codes)
 
Workforce Planning (Process, Labour Shortage, Excess Labour)
Workforce Planning (Process, Labour Shortage, Excess Labour)Workforce Planning (Process, Labour Shortage, Excess Labour)
Workforce Planning (Process, Labour Shortage, Excess Labour)
 
Harvard vs Von Neumann Architecture
Harvard vs Von Neumann ArchitectureHarvard vs Von Neumann Architecture
Harvard vs Von Neumann Architecture
 
Assembly and Machine Code
Assembly and Machine CodeAssembly and Machine Code
Assembly and Machine Code
 
Software (Application and System Software)
Software (Application and System Software)Software (Application and System Software)
Software (Application and System Software)
 
Hardware and Software
Hardware and SoftwareHardware and Software
Hardware and Software
 
Enterprise (Entrepreneur, Innovation, Business Sectors, SMEs)
Enterprise (Entrepreneur, Innovation, Business Sectors, SMEs)Enterprise (Entrepreneur, Innovation, Business Sectors, SMEs)
Enterprise (Entrepreneur, Innovation, Business Sectors, SMEs)
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 

Error Checking and Correction (Parity Bit, Majority Voting, Check Digit)

  • 1. Computer Science (A Level) Error Checking and Correction
  • 2. Data can be corrupted at any point either in being processed or transmission. Therefore, there are methods of detecting errors in data. Error Checking and Correction There are 3 types of methods: oParity Bit oMajority Voting oCheck Bits
  • 3. A method of checking binary codes by counting the numbers of 0s and 1s A bit is added to a block of data for error detection purposes (Definitions)
  • 4. If the data has an error and there is 7 bits (ASCII) you can use 8th bit to detect and correct error. Parity Bit Rules: (even parity) 1. If there is an odd number of 1’s, then the parity bit (8th bit) is 1 to make it even. 2. If there is an even number of 1’s, then the parity bit (8th bit) is 0 to make/keep it even.
  • 5. (Even) Parity Bit 1.1011010 = 10110100 2.1110111 = 11101110 3.1001001 = 10010011 4.0010000 = 00100001 5.1010101 = 10101010 Examples of using Parity bit checker
  • 6. Parity Bit Disadvantages • Cannot detect all errors • Only detect an odd number of errors • Parity bit might change • Increases transmission length • Doesn’t show where the error is, it just says that an error has occurred
  • 7. Each bit is transmitted 3 times to make it easier to detect errors (for computers) (Definitions)
  • 8. Unlike parity bit, majority voting is able to repair errors. Majority Voting Rules: 1. Each bit is transmitted 3 times 2. If a set of 3 (1 bit) doesn’t have the same three values, majority voting will show and fix errors. e.g. 010 – ‘1’ is the error therefore the transmission should be 000 according to a majority vote
  • 9. Majority Voting Original binary 8 bit code  11001010 Transmission (with errors) 101,111,001,010,110,100,011,001 Correction  111,111,000,000,111,000,111,000 Original code executed  11001010 Example of using Majority Voting
  • 10. Majority Voting Disadvantages • If there is more than one error in one bit, it will not be detected and the computer will correct it incorrectly assuming that it is right. • The transmission is 3 times longer than what you want to send • Increased processing time
  • 11. A digit is added to the end of the binary data to check if the data is accurate (Definitions)
  • 12. Usually, the modulo-11 is used to find the check digit. Check Digit Rules (Modulo-11): Example : 23045 Number 2 3 0 4 5 Weighting 6 5 4 3 2 1) The weighting always starts from 2 from the right hand side. Place the numbers in this form/ position 2) Multiply Number by each weighting number Result 12 15 0 12 10 3) Add up results Total = 49 4) Total divided by 11 49 / 11 = 4 rem. 5 5) Subtract remainder from 11 11 – 5 = 6 Check Digit (put this digit on the end of the number)
  • 13. 1) 73409 Another Check Digit Example Number 7 3 4 0 9 Weighting 6 5 4 3 2 Result 42 15 16 0 18 Total = 91 91 / 11 = 8 Rem. 3 11 – 3 = 8 Check Digit