Which will unlock the door in a full implementation

Assignment Help Basic Computer Science
Reference no: EM133930574

Assignment:

Please make a logisim circuit.

There are many security and access control devices on the market that attempt to prevent unauthorized access to secured areas. One such device is a key-pad based device. To unlock the door, you must enter a secret decimal code. For example, say a device accepts a 4-digit decimal code, 1234. The device will unlock the door when "1234" is entered, but it will not unlock if "123" or "123411" is entered.

For your final project, you are to design an access control system based on a sequence of 6 bits that accepts a 1-bit at a time, either 0 or 1. This could be implemented with a 2-button keypad (o and 1), used to enter the binary code.

A second input functions as the Enter key, which ends the key code entry. As the key is entered, the device outputs Enter = 0 until the input sequence terminates. If the input sequence matches the

Security Control Device

Access code, then output Enter =1 (for example LED lights up), which will unlock the door in a full implementation. The secret code is preset: choose your own code (see below).

After two unsuccessful attempts (i.e. the secret code was not matched), the system shuts down and won't accept any more bits, and an alarm is triggered. Thus, your circuit has a second output Alarm, which is set to 1 after two unsuccessful attempts.

Extra credit: Add a reset to the system that presumably only the owner could control: when the reset key is inserted, the system is again enabled and can accept bits again. You can code the reset as either 0 (no key) or 1 (key inserted) for this project.

Reference no: EM133930574

Questions Cloud

What coping mechanisms can individuals adopt to help : What coping mechanisms can individuals adopt to help navigate the fog of separation or divorce? Are there particular strategies that have been more effective?
Determine the percentage of tweets that begin with retweet : Determine the percentage of tweets that begin with retweet. Get the ID, name, screen name and description of a Twitter Account of interest to you.
Calculate the best dynamic threshold-strategies : Calculate the best dynamic threshold-strategies for n = 2, 3, along with their expected performances.
How will the parallelism-span-work of algorithm change : Disregarding thread management, how will the Parallelism/Span/Work of the algorithm change?
Which will unlock the door in a full implementation : Access code, then output Enter =1 (for example LED lights up), which will unlock the door in a full implementation.
Incidental or inadvertent disclosures : Classify them as either incidental or inadvertent. Explain why. If it is incidental than what steps should have been taken to limit this.
Implement a producer-consumer program : Use OpenMP to implement a producer-consumer program in which some of the threads areproducers and others are consumers.
Research plan come from existing digital analytics tools : The data sources that make up a research plan come from existing digital analytics tools or third-party data providers.
What type of professional development you had not considered : What is one type of professional development you hadn't considered and how do you see that fitting into your future plans as a behavior analyst?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd