Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1:

a) A combinational circuit produces the binary sum of two 2-bit numbers, x1 x0 & y1 y0. The outputs are C, S1 & So provide a truth table of the combinational circuit.
 
b) Design a converter with 3 inputs & 1 output. The output is equal to logic – 1 when the binary value of the input is <3. The output is logic – O otherwise.
 
c) Implement a full – adder with two 4 x 1 multiplexers
 
problem 2:

a) Construct a 16 x 1 multiplexer with two 8 x 1 & one 2 x 1 multiplexer
 
b) Implement the following Boolean function with an 8 x 1 multiplier

F (A,B,C,D) = ∑ (0,3,5,6,8,9,14,15)
 
c) A combinational circuit is defined by the following 3 Boolean functions. Design the circuit with a decoder and external gates - F1 = x’y’z’ + xz, F2 = xy’z’ + x’y, F3 = x’y’z + xy.
 
problem 3:

a) Design a 4 input priority encoder with input Do having the highest priority and input D3 the lowest priority.
 
b) Implement a 3 – bit Odd parity generator using XOR gates.
 
problem 4:

a) Realise a 1 x 4 Demux by using 1 x 2 Demux.
 
b) Differentiate multiplexer and demultiplexer with exs
 
c) Design a combinational circuit with 4 inputs & 4 outputs. The output generates the 2’s complement of the input binary number

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M93453

Have any Question? 


Related Questions in Computer Engineering

Suppose you have a hdd that with an average seek time of 12

Suppose you have a HDD that with an average seek time of 12 msec and a rotational speed of 3000 RPM. How long would it take to transfer 102400 bytes. Assume 500 sectors on a track, and each sector contains 512 bytes.

1 how can the practice of information security be described

1. How can the practice of information security be described as both an art and a science? How does security as a social science influence its practice? 2. Who is ultimately responsible for the security of information in ...

Suppose one wishes to confirm that none of the files in the

Suppose one wishes to confirm that none of the files in the directory /usr/spool/lpd are worldreadable. a. What would the fourth field of the tripwire database contain? b. What would the second field of the RIACS databas ...

What are some of the best practices that are used to

What are some of the best practices that are used to optimize networks and what might be some of the pitfalls that can arise from poor network documentation?

1 a bss id bssid is a 48-bit address assigned to a bss in

1. A BSS ID (BSSID) is a 48-bit address assigned to a BSS in an 802.11 network. Do some research and find what the use of the BSSID is and how BSSIDs are assigned in ad hoc and infrastructure networks. 2. Do some researc ...

Discussion questionpersonal factors such as anger revenge

Discussion Question Personal factors, such as anger, revenge, and lack of rewards and recognition, may increase the risk of someone stealing from or spying against employees. Organizations should apply adequate security ...

1 ftp uses the services of tcp for exchanging control

1. FTP uses the services of TCP for exchanging control information and data transfer. Could FTP have used the services of UDP for either of these two connections? Explain. 2. In FTP, which entity (client or server) start ...

The server is starting to run slower and slower how do you

The server is starting to run slower and slower. How do you determine whether you need more RAM, a faster disk subsystem, or something else?

As we have seen in this chapter public-key cryptography can

As we have seen in this chapter, public-key cryptography can be used for encryption and key exchange. Furthermore, it has some properties (such as nonrepudiation) which are not offered by secret key cryptography. So why ...

As indicated in the chapter when a list is created using

As indicated in the chapter, when a list is created using the replication operator values = [ None ] * 10000 the size of the underlying array used to implement the list can be up to twice the size actually needed. This e ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro