Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1:

a) A combinational circuit produces the binary sum of two 2-bit numbers, x1 x0 & y1 y0. The outputs are C, S1 & So provide a truth table of the combinational circuit.
 
b) Design a converter with 3 inputs & 1 output. The output is equal to logic – 1 when the binary value of the input is <3. The output is logic – O otherwise.
 
c) Implement a full – adder with two 4 x 1 multiplexers
 
problem 2:

a) Construct a 16 x 1 multiplexer with two 8 x 1 & one 2 x 1 multiplexer
 
b) Implement the following Boolean function with an 8 x 1 multiplier

F (A,B,C,D) = ∑ (0,3,5,6,8,9,14,15)
 
c) A combinational circuit is defined by the following 3 Boolean functions. Design the circuit with a decoder and external gates - F1 = x’y’z’ + xz, F2 = xy’z’ + x’y, F3 = x’y’z + xy.
 
problem 3:

a) Design a 4 input priority encoder with input Do having the highest priority and input D3 the lowest priority.
 
b) Implement a 3 – bit Odd parity generator using XOR gates.
 
problem 4:

a) Realise a 1 x 4 Demux by using 1 x 2 Demux.
 
b) Differentiate multiplexer and demultiplexer with exs
 
c) Design a combinational circuit with 4 inputs & 4 outputs. The output generates the 2’s complement of the input binary number

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M93453

Have any Question? 


Related Questions in Computer Engineering

Use the probability density function of problem 414aa

Use the probability density function of Problem 4.14a. a. Design the four-level optimum-uniform quantizer. Calculate the mean square error and the entropy of the output. b. Design the four-level Lloyd-Max quantizer (or t ...

In an 80211 network assume station a has four fragments to

In an 802.11 network, assume station A has four fragments to send to station B. If the sequence number of the first fragment is selected as 3273, what are the values of the more fragment flag, fragment number, and sequen ...

Search the web for security education and training programs

Search the Web for security education and training programs in your area. Keep a list and see which category has the most examples. See if you can determine the costs associated with each example. Which do you think woul ...

The truck-assembly division of a large company produces two

The truck-assembly division of a large company produces two different models: the Aztec and the Bronco. Their basic operation consists of separate assembly departments: drive-train, coachwork, Aztec final, and Bronco fin ...

1 assume we have created a packet-switched internet using

1. Assume we have created a packet-switched internet. Using the TCP/IP protocol suite, we need to transfer a huge file. What are the advantage and disadvantage of sending large packets? 2. Match the following to one or m ...

With the number of people now capable of accessing the

With the number of people now capable of accessing the Internet from mobile devices, it is crucial that organisations develop mobile versions of their Web sites. Whether you have experience developing mobile Web sites or ...

Read the raygen company slumcase study and write an essay

Read the " Raygen Company Slum "case study and write an essay that describes how you would handle the situation. You essay should incorporate the leadership skills learned this week as well as challenges that many leader ...

Select a new shape for the turtles from the shapes editor

Select a new shape for the turtles from the shapes editor, and then create a " cloud " of turtles (a bunch of turtles in the same local area) using your new shape. Create some green patches. Make the turtles follow the m ...

In the wolf sheep simple model the wolves and sheep move

In the Wolf Sheep Simple model, the wolves and sheep move randomly. In the real world, predators chase prey and prey try to escape. Can you modify the movement mechanism so the wolves chase the sheep? Again, how does the ...

In the fifth lab we investigate the state and behavior of

In the fifth lab, we investigate the state and behavior of the POP3 protocol. We retrieve the mails stored in our mailbox at the POP3 server and observe and analyze the states of the POP3 and the type and the contents of ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro