How many additional state bits are needed

Assignment Help Basic Computer Science
Reference no: EM131277792

Write an ABEL, VHDL, or Verilog program for a state machine that is similar to the one specified in Drill 7 .32 except that when enabled, it counts "two steps forward, one step back." The machine should have one additional output, BACK, that is asserted if ENABLE is asserted and the machine is going to count back on the next clock edge. Once the machine gets to state S7, it never counts back. Comment your program to describe your strategy for creating thi behavior and how many additional state bits are needed.

Drill 7 .32

Write an ABEL, VHDL, or Verilog program for a "sticky-counter" state machine with eight states, SO-S7, that are coded into three bits in binary counting order. Besides CLOCK, your machine should have two inputs, RESET and ENABLE, and one output, DONE. The machne should go to state SD whenever RESET is asserted. When RESET is negated, it should move to next-numbered state only if ENABLE is asserted. However, once it reaches state S7, it should stay there unless RESET is again asserted. The DONE output should be l if and only if the machine is in state S7 and ENABLE is asserted.

Reference no: EM131277792

Questions Cloud

Who needs to become committed to the project : Who needs to become committed to the project? Are they even aware of the change? If aware, are they interested or have they moved beyond that stage to either desiring action or having already adopted?
Ceo of a medium-sized auto parts company : Imagine yourself in the role of the CEO of a medium-sized auto parts company. Briefly describe how you would set up a benchmarking program. Include in your description an analysis of how you would determine
Discuss about the protective order : is the person identified in the order is under correctional supervision? Would that change your recommendations for improving the law?
What is the size of the labor force : What is the size of the labor force? What is the unemployment rate? What is the natural rate of unemployment for this country? Is this economy in recession or expansion? Explain.
How many additional state bits are needed : However, once it reaches state S7, it should stay there unless RESET is again asserted. The DONE output should be l if and only if the machine is in state S7 and ENABLE is asserted.
Evaluate this tree to determine the optimal policy : This problem is based on an example described by Hartman (2007). Renesas Electronics is planning to expand a factory in which it makes ?ash memory. The factory can currently make 9,000 wafers per month. The expansion will increase capacity to 12,000 ..
Are you ready or prepared for the next stage in your life : Discuss your future career plans or life goals in relationship to completing graduate schools and entering or reentering the work force. What have you learned or what has changed in your life? Are you ready or prepared for the next stage in your l..
Excellence in business communication : Sarah Calhoun has been an inspiration to many entrepreneurs and has delivered speeches to a wide variety of audiences. For a reasonable fee, she is available to speak to conferences, civic groups, and other gatherings. Which of these is an effective ..
What could be the risk of opening a business again in area : What could be the risk of opening a business again in an area that was once failed ? what are the risks of opening a business again in a city that was once already failed? Explain the business process reengineering (BPR) as it relates to a COTS proje..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Important components of capitalism

What are the most important components of Capitalism?

  Application-jurisdictional aspects of cybercrime

You are using your wireless device to locate a restaurant. Suddenly, a large flashing skull-and-crossbones appears on your screen and a menacing laugh plays. Seconds later your device has been wiped clean. You are the victim of a cybercrime. If ca..

  Develop and implement operational plans

Explain what operations planning is, and detail the processes that should be followed to develop and implement operational plans. Outline the risk analysis procedures that might be followed and the procedures that would be followed to develop cont..

  What would you recommend as a backup solution

You need to make sure that you back up the databases each night in case you have a disaster and must recover them from backup. Because each database takes two hours to back up and you only have a six-hour window in which to do backups each day, wh..

  Define and describe the four basic functions of a computer

Word processing tools have many techniques and tools. Define and describe how and what does justification, headers and footers work. Why might you need these features!

  Components of the mac

MAC Address: 1. Identify and explain each components of the MAC, physical, or Ethernet address?

  Define two primary approaches in developing signatures

Identify and briefly describe the two primary approaches to developing signatures for network-based IDS tools. Is one technique preferred over the other? Explain why.

  Revisiting the deployment diagram

The only thing constant in the information technology landscape is that things always change. Such is the case for the textbook ordering system you examined in the previous unit.

  From the e-activity, predict the effects

From the e-Activity, predict the effects that changes in one industry could have on modifying and updating a system of the business. Include any trickle-down effects that the changes would have on the business as well. Provide specific examples to su..

  What is the number of nontrivial multiplications

What is the number of nontrivial multiplications?

  Managing network security through policies

Analyze the importance of having acceptable use policies, remote access policies, and network security control policies. Choose one acceptable use policy, remote access policy, or network security control policy and give three reasons why you beli..

  What benefits do you see in separating data and processes

Compare and contrast the design class diagram approach with structured charts of the structured methodologies. What is the benefit of each tool? When would you use each of these tools? What benefits do you see in separating data and processes? Wha..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd