Explain a full subtractor using half subtractors, Computer Engineering

Draw the logic diagram of a full subtractor using half subtractors and explain its working with the help of a truth table

Ans:

Full Subtractor: It has to take care of repeated borrow by the next higher bit. At some stage along with the two bits (one of that is to be subtracted from another) is the other input Bin, that is, borrow bit from the Di and borrow Bo. Table illustrates the truth table.

455_Block Diagram of Full Subtractor.png

Fig.(a) Block Diagram of Full Subtractor

233_Block Diagram of Full Subtractor as Combination of two Half.png

Fig.(b) Block Diagram of Full Subtractor as Combination of two Half Subtractors and OR Gate

2099_Logic Diagram of Full Subtractor.png

Fig.(c) Logic Diagram of Full Subtractor

Fig.(a) demonstrates a block diagram for a full subtractor. This can be constructed from two Half Subtractors and an OR gate as demonstrated in Fig.(b). The logic diagram is demonstrated in Fig.(c). This logic diagram is according the truth table.

 

Inputs

 

Outputs

 

A

B

Bin

Di

BO

0

0

0

0

0

0

0

1

1

1

0

1

0

1

1

0

1

1

0

1

1

0

0

1

0

1

0

1

0

0

1

1

0

0

0

1

1

1

1

1

Truth Table for Full Subtractor

Posted Date: 5/4/2013 1:01:42 AM | Location : United States







Related Discussions:- Explain a full subtractor using half subtractors, Assignment Help, Ask Question on Explain a full subtractor using half subtractors, Get Answer, Expert's Help, Explain a full subtractor using half subtractors Discussions

Write discussion on Explain a full subtractor using half subtractors
Your posts are moderated
Related Questions
Speed in scientific computing is measured in megaflops, gigaflops, teraflops and petaflops. A megaflop is 10 6 floating point arithmetic operations (+, -, *, /) in one second What

Q. How to Information transfer from one register to another? Information transfer from one register to another is designated in symbolic notation by a replacement operator. For

What is text editor? It is used for entering and editing application programs. The user of this program interactively implements command that permit statements of a source prog

Write a program to find the area under the curve y = f(x) between x = a and x = b, integrate y = f(x) between the limits of a and b. The area under a curve between two points can b

END DIRECTIVE: ENDS directive ends a segment and ENDP directive ends a procedure and END directive ends whole program which appears as last statement. ASSUME Directive:   An .

Q. For function F(X, Y, Z) = ∑(1, 2, 3, 5, 6) using TRUTH TABLE only 1.  Find POS expression 2.  Simplify POS expression 3.  Implement this simplified expression using t

How to get an output: Please enter a number between 0 and 6 (Enter to stop): 2 The Day of Week is Tuesday Please enter a number between 0 and 6 (Enter to stop): 9 Input Invalid Ple

How many types of keys used to encrypt and decrypt data in Secure Sockets Layer? Two forms of keys are used as ciphers to decrypt and encrypt data. Private keys are referred to

Explain architecture of World Wide Web with the basic entities. The architecture of the World Wide Web, demonstrated below, is the one of clients, as like Netscape, Lynx or Int

Discuss the primary elements of Supply Chain Management models. Primary Elements of Supply Chain Management Models are discussed in below: They are fundamentally concerned a