Explain the working of a half subtractor, Computer Engineering

Assignment Help:

With the help of a truth table explain the working of a half subtractor. Draw the logic diagram using gates.

Ans:

Half Subtractor: For the subtraction of B (subtrahend) from A (minuend) in a logic circuit, where A and B are 1-bit numbers is termed to as a Half-Subtractor. The truth table of half subtractor is illustrated in below. Now there A and B are the two inputs and Di that is difference and Bo that is borrow are the two outputs. If B is larger than A (for example, A=0 and B=1), a borrow is essential,

66_Truth Table no.1.png

Truth Table no.1

By the Truth Table, the logical expressions for Di and Bo are acquired as

Di = A‾ B + A B‾

BO = A‾ B

1111_Logic Diagram of Half Subtractor.png

Fig.(a) Logic Diagram of Half Subtractor       Fig.(b) Block Diagram of Half Subtractor

In Table, input variable B is subtracted from A to provide output Di difference. If B is larger than A (for example, A = 0 and B = 1), borrow is essential. In the Truth Table, inputs are A  and  B,  Outputs  are  Di (difference)  and  B0 (borrow). Therefore, the Boolean expressions for the half subtractor by the Truth Table can be written as

Di = A ⊕ B ---------(1)

BO = A‾ B    --------(2)

Through combining Boolean Expressions (1) and (2), we find the logic circuit for Half Subtractor demonstrated in fig.(a) and its block diagram is demonstrated in fig.(b).


Related Discussions:- Explain the working of a half subtractor

What is the difference between = = = and = =, What is the difference betwee...

What is the difference between = = = and = = ? output of "==" can be 1, 0 or X. output of "===" can only be 0 or 1. When you are comparing 2 nos using "==" and if one/bo

What are the features of ado.net, What are the features of ADO.Net ?  A...

What are the features of ADO.Net ?  ADO.NET features: 1. Disconnected Data Architecture 2. Data cached in Datasets 3. Data transfer in XML format 4. Interaction wit

Authorization bypass, Authorization Bypass is a frighteningly easy process ...

Authorization Bypass is a frighteningly easy process which can be employed with poorly designed applications or content management frameworks. You know how it is... you run a small

Give the decription of user case, Give the decription of user case A us...

Give the decription of user case A use case is a description of the set of the sequence of actions which a system performs to produce an observable result which is of a value t

What are the steps to design algorithm, What are the steps to design algori...

What are the steps to design algorithm? Formulate algorithm for each operation. Analysis specification tells what the operation does. The algorithm shows how it is done. The st

Types of security features employed in client server network, What are the ...

What are the types of security features employed in client server kinds of network? Security features employed in Client-Server types of network are as illustrated below: a)

How can we send data to external programs, How can we send data to external...

How can we send data to external programs? Using SPA/GPA parameters(SAP memory). Using EXPORT/IMPORT data (ABAP/4 memory)

What is the main use of structures, What is The main use of structures ...

What is The main use of structures The main use of structures is to lump together collections of disparate variable types, so they can conveniently be treated as a unit. For ex

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd