Explain the working of a two input EX-OR gate, Computer Engineering

Assignment Help:

With relevant logic diagram and truth table explain the working of a two input EX-OR gate.


Ans. 2-Input EX-OR Gate: An EX-OR or Exclusive gate recognizes words that have an odd no. of ones.  Fig.(1) demonstrates the logic diagram of an EX-OR gate and Fig.(2) demonstrates the symbol of an EX-OR Gate. The upper AND gate provides an output A B and the lower AND gate provides an output A B.

2355_explain the working of a two input EX-OR gate.png


Thus, the output equation be as Y = A B + A B = A EX-OR B = A ⊕ B
Whether both A and B are low, the output is low.  If either A or B but not both are high and the
other is low therefore the output is high.  If A and B both are high, output is low.  Therefore the output is 1 while A and B are dissimilar. Table (A) illustrates the Truth Table for EX-OR gate.

A

B

Y ( A B + A B )

0

0

0

0

1

1

1

0

1

1

1

0

Table (A): Truth Table of EX-OR Gate


Related Discussions:- Explain the working of a two input EX-OR gate

Computer aided manufacture, Before we take a detailed look about software l...

Before we take a detailed look about software languages, let us consider the role of computers in engineering. Computers are commonly used in the areas of 'Computer Aided Design /

#title, what are the applications of microprogramming

what are the applications of microprogramming

What is the difference between the c#.net and vb.net, What is the differenc...

What is the difference between the C#.NET and VB.NET? VB.NET - It don't have the XML Documentation. - It don't have the Operator Overloading. - It dont't have the P

Classification of pipeline processors, Classification of Pipeline Processor...

Classification of Pipeline Processors In this part, we explain various types of pipelining that can be useful in computer operations. These types depend on the following factor

Define about anchor tag, Q. Define about Anchor Tag? Anchor tag is used...

Q. Define about Anchor Tag? Anchor tag is used to create links between various objects such as HTML pages, web sites, files etc. It is introduced by characters and termi

Transaction that are programmed by the user, How the transaction that are p...

How the transaction that are programmed by the user can be protected? By executing an authority check.

Computer networks, distributed & centralized system in computer network

distributed & centralized system in computer network

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd