Mention the various IC logic families, Computer Engineering

Assignment Help:

Mention the various IC logic families.

Ans. Different  IC Logic Families: Digital IC's are fabricated through employing either the Unipolar or the Bipolar Technologies and are termed  to as Unipolar Logic Family or Bipolar Logic Family
I  Bipolar Logic Families:
Two kinds of operations in Bipolar Logic Families that are:
a. Saturated Logic Families
b. Non-saturated Logic Families
a. Saturated Logic Families: In this, the transistors in the IC are driven into saturation.
1. Resistor-Transistor Logic (RTL).
2. Direct-Coupled Transistor Logic (DCTL)
3. Integrated-Injection Logic (I²L)
4. Diode -Transistor Logic (DTL)
5. High-Threshold Logic (HTL)
6. Transistor-Transistor Logic (TTL)
b. Non-saturated Logic:  In this logic, the transistors are not driven to saturation.
1. Schottky TTL
2. Emitter Coupled Logic (ECL)
3. Unipolar Logic Families:
II. MOS devices are Unipolar devices

Simply MOSFETs are employed into MOS logic
circuits. The families of MOS logic are
(i) PMOS
(ii) NMOS, and
(iii) CMOS

Whereas in PMOS only p-channel MOSFETs are utilized and in NMOS only n-channel MOSFETs are utilized, in complementary MOS (CMOS), P and N both channel MOSFETs are utilized and are fabricated on similar silicon chip.


Related Discussions:- Mention the various IC logic families

Describe the booch methodology, Object Oriented Analysis and Design 1. ...

Object Oriented Analysis and Design 1. What are the advantages of object-oriented systems? 2. Describe the Booch Methodology. 3. Justify that UML is a language for modeli

What is mmu, What is MMU? MMU is the Memory Management Unit. It is a sp...

What is MMU? MMU is the Memory Management Unit. It is a special memory control circuit used for executing the mapping of the virtual address space onto the physical memory.

Determine the term- security, Determine the term- Security When using ...

Determine the term- Security When using Internet, security can be enhanced using encryption. Debit and credit card transactions can also be protected by a specific type of pas

Stack overflow causes, Stack overflow causes   (A) Hardware interrupt. ...

Stack overflow causes   (A) Hardware interrupt.  (B) External interrupt.  (C) Internal interrupt.   (D) Software interrupt. Stack overflow occurs whereas execution

What do you mean by data warehousing, What do you mean by data warehousing?...

What do you mean by data warehousing? Data warehouse implies as: a) It is subject oriented b) It is integrated and c) It is time variant d) It is non-volatile colle

Example of structural hazards - computer architecture, Example of Structura...

Example of Structural hazards - computer architecture: A machine has shared a single-memory pipeline for instructions and data. As a consequence, when an instruction which con

What are the features of abap/4 dictionary, What are the features of ABAP/4...

What are the features of ABAP/4 Dictionary? The most significant features are: Integrated to aABAP/4 Development Workbench. Active in the runtime environment.

Average data transfer rate in floppy, Q. Average data transfer rate in flop...

Q. Average data transfer rate in floppy? A floppy is about 0.64 mm thick and is available in diameters 5.25 inch and 3.5 inch. Data are arranged in form of tracks and sectors.

Explain ai applications, AI Applications Search is a important elemen...

AI Applications Search is a important element of an AI system, and search functions are executed on huge quantities of complicated structured data by means of unstructured in

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd