Design a half adder, Computer Engineering

Assignment Help:

Q. Design a half adder?

In half adder inputs are:

The augend let's say 'x' and addend 'y' bits.

The outputs are sum 'S' and carry 'C' bits.

Logical relationship between these are given by truth table as displayed in figure (a). Carry 'C' can be attained on implementing AND gate on 'x' & 'y' inputs so C = x.y whereas S can be found from Karnaugh Map as displayed in figure (b).  Corresponding logic diagram is displayed in figure (c).

So sum and carry equations of half- adder are:

S  =  x.y¯ + x¯.y

C =  x.y

322_Design a half adder.png

Figure: Half - Adder implementation


Related Discussions:- Design a half adder

One of the fault base testing techniques, One of the fault base testing tec...

One of the fault base testing techniques is:- Mutation testing is the fault base testing.

Explain about fat - inode, Q. Explain about FAT - Inode? Today modern P...

Q. Explain about FAT - Inode? Today modern PC comprises total capacity of nearly 40GB for storage of program and data Due to this huge capacity in place of having just one oper

Security, We now consider the relation between passwords and key size. For ...

We now consider the relation between passwords and key size. For this purpose consider a cryptosystem where the user enters a key in the form of a password. Assume a password consi

What is internet address, Addresses are basically for virtually everything ...

Addresses are basically for virtually everything we do on Internet. The IP in TCP/IP is a mechanism for providing addresses for computers on Internet. Internet addresses have two f

Balanced trees and their operations, what is ment by avl tree n insertion n...

what is ment by avl tree n insertion n deletion ,2-3 tress insertion n deletion

Write short note on code optimization, Write short note on code optimizatio...

Write short note on code optimization. Code optimization: It is the optional phase designed to enhance the intermediate code therefore the Ultimate object program runs quicke

EDC, Conparision of masfet and jfet

Conparision of masfet and jfet

What are two verification points for use with web sites, 1. Use the Web Sit...

1. Use the Web Site Scan verification point to check the content of your Web site with each revision and make sure that changes have not resulted in defects. 2. Use the Web Sit

Difference between reply-to and return-path , What is the difference betwee...

What is the difference between Reply-to and Return-path in the headers of a mail function? Ans) Reply-to: Reply-to is where to deliver the respond of the mail. Return-pat

Explain the term- variables, Explain the term- Variables - Variables ar...

Explain the term- Variables - Variables are used for local storage of data -  Variables are usually not available to multiple processes and components. -  Variables would

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd