Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
What is the necessity of Interfacing in digital ICs and what are the points to be kept in view, while interfacing between TTL gate and CMOS gate?
Ans:
To realize the optimum performance in digital system, the device from more than one logic families can be utilized, that takes advantages of the better characteristics of each logic families. For illustration, CMOS logic ICs can be utilized in those parts of the system where low power dissipation is essential, and TTL can be utilized where high speed of operation is needed. While CMOS derives TTL, the subsequent conditions are essential to be satisfied.
VOH(CMOS) ≥ VIH(TTL)
VOL(CMOS) ≤ VIL(TTL)
-IOH(CMOS) ≥ NIIH(TTL)
-IOH(CMOS) ≥ -NIIL(TTL)
Figure 1: TTL-to-CMOS interfacing using pull-up register.
Figure 2: CMOS-to-TTL interfacing using a CMOS buffer IC
Q. Define syntax of MPI_Bcast function? MPI_Bcast(msgaddr, count, datatype, rank, comm): This function is used by a process ranked rank in group comm to transmit messag
Explain the term - ancestors The ancestors of modern age computer were mechanical and electro-mechanical instruments. This ancestry can be traced as back and seventeenth centur
Write down different system calls for performing different kinds of tasks. The major types of system calls are given as: Process Control: These kinds of system calls are
Define the Unified Modelling Language (UML) is used to express construct and relationships of complex systems. This was created in response to a request for proposal (RFP) fro
Ask question #Minimum 100 If today is a weekday and it’s not a holiday, then you go to work. However, if it’s a weekday and a holiday, then what you do depends on the weather: If i
We now consider the relation between passwords and key size. For this purpose consider a cryptosystem where the user enters a key in the form of a password. Assume a password consi
Explain briefly any three of the commonly used code optimization techniques. 1. Common sub expression elimination: In given expression as "(a+b)-(a+b)/4", in such "common
A combinational circuit has 3 inputs A, B, C and output F. F is true for following input combinations A is False, B is True A is False, C is True A, B, C are
A group of 20 servers carry traffic of 10 erlangs. If the average duration of a call is three minutes, calculate the number of calls put through by a single server and the group as
What are the primary models of Supply Chain Management? Two Primary models of Supply Chain Management are illustrated below: a. Porter’s Value Chain Model and b. Supply
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd