{"id":331,"date":"2012-04-24T02:15:44","date_gmt":"2012-04-23T19:15:44","guid":{"rendered":"https:\/\/dosen.unila.ac.id\/rasp\/?p=331"},"modified":"2012-04-24T02:18:49","modified_gmt":"2012-04-23T19:18:49","slug":"keamanan-komputer-5","status":"publish","type":"post","link":"https:\/\/dosen.unila.ac.id\/rasp\/2012\/04\/24\/keamanan-komputer-5\/","title":{"rendered":"Keamanan Komputer 5"},"content":{"rendered":"<p>Parity checking<\/p>\n<div>\u2022Within a computer system, data in the form of coded characters are continuously transferred at high rates of speed between the computer, the input \/output (I\/O) and storage devices, and the remote workstations.<\/div>\n<div>\u2022Each device uses a built-in checking procedure to help ensure that the transmission is complete and accurate. This procedure is called parity checking.<\/div>\n<div>Logically<\/div>\n<div>\n<div>\u2022An ASCII character may have seven bits, but physically there are actually eight bits transmitted between hardware devices.<\/div>\n<div>\u2022The extra parity bit, which is not part of the character code, is used in the parity-checking procedure to detect whether abit has been accidentally changed, or \u201cdropped\u201d, during transmission. A dropped bit result in a parity error.<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Parity checking \u2022Within a computer system, data in the form of coded characters are continuously transferred at high rates of speed between the computer, the input \/output (I\/O) and storage devices, and the remote workstations. \u2022Each device uses a built-in checking procedure to help ensure that the transmission is complete and accurate. This procedure is &hellip; <a href=\"https:\/\/dosen.unila.ac.id\/rasp\/2012\/04\/24\/keamanan-komputer-5\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Keamanan Komputer 5&#8221;<\/span><\/a><\/p>\n","protected":false},"author":14,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[],"class_list":["post-331","post","type-post","status-publish","format-standard","hentry","category-computer-security"],"_links":{"self":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts\/331"}],"collection":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/comments?post=331"}],"version-history":[{"count":0,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts\/331\/revisions"}],"wp:attachment":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/media?parent=331"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/categories?post=331"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/tags?post=331"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}