Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1:

a) A combinational circuit produces the binary sum of two 2-bit numbers, x1 x0 & y1 y0. The outputs are C, S1 & So provide a truth table of the combinational circuit.
 
b) Design a converter with 3 inputs & 1 output. The output is equal to logic – 1 when the binary value of the input is <3. The output is logic – O otherwise.
 
c) Implement a full – adder with two 4 x 1 multiplexers
 
problem 2:

a) Construct a 16 x 1 multiplexer with two 8 x 1 & one 2 x 1 multiplexer
 
b) Implement the following Boolean function with an 8 x 1 multiplier

F (A,B,C,D) = ∑ (0,3,5,6,8,9,14,15)
 
c) A combinational circuit is defined by the following 3 Boolean functions. Design the circuit with a decoder and external gates - F1 = x’y’z’ + xz, F2 = xy’z’ + x’y, F3 = x’y’z + xy.
 
problem 3:

a) Design a 4 input priority encoder with input Do having the highest priority and input D3 the lowest priority.
 
b) Implement a 3 – bit Odd parity generator using XOR gates.
 
problem 4:

a) Realise a 1 x 4 Demux by using 1 x 2 Demux.
 
b) Differentiate multiplexer and demultiplexer with exs
 
c) Design a combinational circuit with 4 inputs & 4 outputs. The output generates the 2’s complement of the input binary number

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M93453

Have any Question? 


Related Questions in Computer Engineering

1 the models in this chapter do not discuss availability

1. The models in this chapter do not discuss availability. What unstated assumptions about that service are they making? 2. A physician who is addicted to a pain-killing medicine can prescribe the medication for herself. ...

Programming assignment linker you are to implement a

Programming Assignment: Linker You are to implement a two-pass linker and submit the source code, which we will compile and run. Submit your source code together with a Makefile as a ZIP file with directory through NYU C ...

1 what is a negative feedback loop how is it used to keep a

1. What is a negative feedback loop? How is it used to keep a project in control? 2. When a task is not being completed according to the plan, what two circumstances are likely to be involved?

1 how would you fi x the false sharing issue that can

1. How would you fi x the false sharing issue that can occur? 2. Consider the following portions of two different programs running at the same time on four processors in a symmetric multicore processor (SMP). Assume that ...

The speed of sound in dry air iswhere t is the temperature

The speed of sound in dry air is Where T is the temperature in degrees Celsius. Find a linear function that approximates the speed of sound for temperatures near 0°C.

1 determine the 4-point dft matrix d4 and the corresponding

1. Determine the 4-point DFT matrix D4 and the corresponding inverse DFT matrix D -1 4. 2. This problem investigates zero padding applied in the frequency domain. Plot each N-point DFT as a function of frequency fk = k/N ...

1 intrusion detection hybrids are getting better research

1. Intrusion detection hybrids are getting better. Research the products on the market and comment on them as far as their interfaces are concerned. 2. Discuss how exploits can be used to penetrate a network. Research an ...

1 what do we mean when we say that a link-layer switch can

1. What do we mean when we say that a link-layer switch can filter traffic? Why is filtering important? 2. Which one has more overhead, a switch or a router? Explain your answer. 3. Which one has more overhead, a hub or ...

Write a program named intarraydemo that stores an array of

Write a program named IntArrayDemo that stores an array of 10 integers. Until the user enters a sentinel value, allow the user three options: (1) to view the list in order from the first to last position, (2) to view the ...

1 investigate how netscape navigator and internet explorer

1. Investigate how Netscape Navigator and Internet Explorer implemented SSL technology. 2. Study both SSL and S-HTTP. Show that these two protocols have a lot in common. However, the two protocols have some differences. ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro