Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1:

a) A combinational circuit produces the binary sum of two 2-bit numbers, x1 x0 & y1 y0. The outputs are C, S1 & So provide a truth table of the combinational circuit.
 
b) Design a converter with 3 inputs & 1 output. The output is equal to logic – 1 when the binary value of the input is <3. The output is logic – O otherwise.
 
c) Implement a full – adder with two 4 x 1 multiplexers
 
problem 2:

a) Construct a 16 x 1 multiplexer with two 8 x 1 & one 2 x 1 multiplexer
 
b) Implement the following Boolean function with an 8 x 1 multiplier

F (A,B,C,D) = ∑ (0,3,5,6,8,9,14,15)
 
c) A combinational circuit is defined by the following 3 Boolean functions. Design the circuit with a decoder and external gates - F1 = x’y’z’ + xz, F2 = xy’z’ + x’y, F3 = x’y’z + xy.
 
problem 3:

a) Design a 4 input priority encoder with input Do having the highest priority and input D3 the lowest priority.
 
b) Implement a 3 – bit Odd parity generator using XOR gates.
 
problem 4:

a) Realise a 1 x 4 Demux by using 1 x 2 Demux.
 
b) Differentiate multiplexer and demultiplexer with exs
 
c) Design a combinational circuit with 4 inputs & 4 outputs. The output generates the 2’s complement of the input binary number

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M93453

Have any Question? 


Related Questions in Computer Engineering

1 what is a vulnerability scanner how is it used to improve

1. What is a vulnerability scanner? How is it used to improve security? 2. What is the difference between active and passive vulnerability scanners? 3. What kind of data and information can be found using a packet sniffe ...

1 what is the difference between the serversocket class and

1. What is the difference between the ServerSocket class and the Socket class in Java? 2. We say that in network programming a socket should be at least bound to a local socket address. The first constructor of the Datag ...

1 in tcp does a fin segment close a connection in only one

1. In TCP, does a FIN segment close a connection in only one direction or in both directions? 2. In TCP, what type of flag can totally close the communication in both directions? 3. Most of the flags can be used together ...

1 what are the major differences between a boot virus and a

1. What are the major differences between a boot virus and a macro virus. Which is more dangerous to a computer system? 2. List and brie fly discuss three most common sources of virus infections. 3. In this chapter, we d ...

1 write a program to find the sum of the first n natural

1. Write a program to find the sum of the first n natural numbers, where the value of n is provided by the user. 2. Write a program to find the sum of the cubes of the first n natural numbers where the value of n is prov ...

1 describe two types of variables or methods that can be

1.) Describe two types of variables or methods that can be used to exchange data between web pages and give example code of both types. 2.) Discuss authorization and authentication and explain forms-based-authentication. ...

Wvcc has decided to purchase a standalone firewall reread

WVCC has decided to purchase a standalone firewall. Reread the "Improved Performance and Security for the Edge of the Network" section of the chapter to understand WVCC's requirements for the firewall. Do some Internet r ...

Changing mechanisms in the wolf sheep simple model the

Changing mechanisms In the Wolf Sheep Simple model, the grass grows linearly every time step an increment of grass is added to the patch. This is not realistic. Real grass will grow quicker if there is more of it around ...

A program contains a sequential part and the remaining part

A program contains a sequential part and the remaining part can be split evenly into independent tasks that can execute in parallel on the 16 available cores in the system. If a speedup of 15 is to be achieved using all ...

1 what is information extortion describe how such an attack

1. What is information extortion? Describe how such an attack can cause losses, using an example not found in the text. 2. Why do employees constitute one of the greatest threats to information security? 3. What measures ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen