Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
With relevant logic diagram and truth table explain the working of a two input EX-OR gate.
Ans. 2-Input EX-OR Gate: An EX-OR or Exclusive gate recognizes words that have an odd no. of ones. Fig.(1) demonstrates the logic diagram of an EX-OR gate and Fig.(2) demonstrates the symbol of an EX-OR Gate. The upper AND gate provides an output A B and the lower AND gate provides an output A B.
Thus, the output equation be as Y = A B + A B = A EX-OR B = A ⊕ BWhether both A and B are low, the output is low. If either A or B but not both are high and theother is low therefore the output is high. If A and B both are high, output is low. Therefore the output is 1 while A and B are dissimilar. Table (A) illustrates the Truth Table for EX-OR gate.
A
B
Y ( A B + A B )
0
1
third partial product of 13*11 in binary
a. Define parsing? Give difference among top down parsing and bottom up parsing. b. Determine the self-relocating programs? Why self-relocating programs are less efficient then
Define Rules for Reducing Karnaugh Maps? The rules for reducing Karnaugh Maps (k- maps) are as follows: All of the 1's in the Karnaugh Map are called as minterms. The
What is interactive reporting? A classical non-interactive report having of one program that makes a single list. Instead of one extensive and detailed list, with interactive
What is class, class diagram? An object is an instance of a class. Class explains a group of objects with similar properties (attributes), behaviour (operations), kinds of rela
a. Sketch the excitation diagram indicating the last states and next states. b. Build the circuit using a Synchronous Counter with JK FF and NAND gates only. Replicate the circ
How many types of keys used to encrypt and decrypt data in Secure Sockets Layer? Two forms of keys are used as ciphers to decrypt and encrypt data. Private keys are referred to
This project is divided to two parts (hardware and software) each with is subtask and consideration was given in all areas in order to meet the target specification. Solutions are
Q. Explain Relative Addressing Scheme? In this addressing technique the register R is the program counter (PC) which contains the address of current instruction being executed.
The English existential construction involves so-called there-sentences such as these: (1) There is a dog in the yard (2) There were no children at the party (3) There
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd