Explain the working of a half subtractor, Computer Engineering

Assignment Help:

With the help of a truth table explain the working of a half subtractor. Draw the logic diagram using gates.

Ans:

Half Subtractor: For the subtraction of B (subtrahend) from A (minuend) in a logic circuit, where A and B are 1-bit numbers is termed to as a Half-Subtractor. The truth table of half subtractor is illustrated in below. Now there A and B are the two inputs and Di that is difference and Bo that is borrow are the two outputs. If B is larger than A (for example, A=0 and B=1), a borrow is essential,

66_Truth Table no.1.png

Truth Table no.1

By the Truth Table, the logical expressions for Di and Bo are acquired as

Di = A‾ B + A B‾

BO = A‾ B

1111_Logic Diagram of Half Subtractor.png

Fig.(a) Logic Diagram of Half Subtractor       Fig.(b) Block Diagram of Half Subtractor

In Table, input variable B is subtracted from A to provide output Di difference. If B is larger than A (for example, A = 0 and B = 1), borrow is essential. In the Truth Table, inputs are A  and  B,  Outputs  are  Di (difference)  and  B0 (borrow). Therefore, the Boolean expressions for the half subtractor by the Truth Table can be written as

Di = A ⊕ B ---------(1)

BO = A‾ B    --------(2)

Through combining Boolean Expressions (1) and (2), we find the logic circuit for Half Subtractor demonstrated in fig.(a) and its block diagram is demonstrated in fig.(b).


Related Discussions:- Explain the working of a half subtractor

Principles of composition, PRINCIPLES OF COMPOSITION The principles of ...

PRINCIPLES OF COMPOSITION The principles of composition are the way that the elements of composition are used to achieve a particular purpose. Some of the main principles of co

#dbms., #example of cascading rollback#

#example of cascading rollback#

Identify which stores most no. of bits in memory store, Which of the memori...

Which of the memories stores the most number of bits ? Ans. 5Mx8 = 5 x 220 x 8 = 40M (max).

Fundamental differences between risc and cisc architecture, Q. Fundamental ...

Q. Fundamental differences between RISC and CISC architecture? Fundamental differences between RISC and CISC architecture. The following table lists following differences:

In what way interrupts are classified in 8085, 8085 the interrupts are clas...

8085 the interrupts are classified as Software and Hardware interrupts.

Explain gray code, Explain Gray Code Ans. Gray Code 1.  Extreme...

Explain Gray Code Ans. Gray Code 1.  Extremely useful code. Also termed as reflected code. 2.  All gray code is different from the preceding and succeeding codes thr

Explain the page stealer and the fault handler, How the Kernel handles both...

How the Kernel handles both the page stealer and the fault handler? The page stealer and the fault handler thrash because of the shortage of the memory. If the sum of the worki

What is page stealing, What is Page stealing? Ans. Taking page frames o...

What is Page stealing? Ans. Taking page frames other working sets is called Page stealing.

How semaphores implement mutual exclusion, How semaphores implement mutual ...

How semaphores implement mutual exclusion? Mutual-exclusion implementation along with semaphores: Assume that there are n-processes and they share a semaphore, mutex (stan

Classical approach - canonical genetic algorithm, Classical approach - Cano...

Classical approach - Canonical genetic algorithm: However returning to the classical approach, as there example, whether solving a particular problem involved finding a set of

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd