Name the 7400 series TTL chip, Computer Engineering

Assignment Help:

Name the 7400 series TTL chip which is a priority encoder. Write its truth table. 

Ans.

Available IC in 74 series is 74147 that is a priority encoder. Such IC has active low inputs and outputs. The significance of the word priority can be realized from the truth table. For example if 2 and 5 are low, the output will be consequent to 5 that has a higher priority than 2 that is the highest numbered input has priority over lower numbered inputs.

Truth table of 74147

Active low decimal input's                                                           Active low BCD

outputs

1

2

3

4

5

6

7

8

9

D

C

B

A

1

1

1

1

1

1

1

1

1

1

1

1

1

0

1

1

1

1

1

1

1

1

1

1

1

0

X

0

1

1

1

1

1

1

1

1

1

0

1

X

X

0

1

1

1

1

1

1

1

1

0

0

X

X

X

0

1

1

1

1

1

1

0

1

1

X

X

X

X

0

1

1

1

1

1

0

1

0

X

X

X

X

1

0

1

1

1

1

0

0

1

X

X

X

X

1

1

0

1

1

1

0

0

0

X

X

X

X

X

X

X

0

1

0

1

1

1

X

X

X

X

X

X

X

X

0

0

1

1

0


Related Discussions:- Name the 7400 series TTL chip

Name the widely used language processor development tool, Name the widely u...

Name the widely used Language Processor Development Tools ( LPDTs). Widely used Language processor development tools are: Lex - A Lexical Analyzer Generator Lex assi

What is a single stage network, In a single stage network: (A) ...

In a single stage network: (A)  There is no redundancy (B)  There is redundancy (C)  Alternative cross points are available (D)  Alt

Discuss the advantages of store program control, Discuss the advantages of ...

Discuss the advantages of store program control (SPC) automation in telephone switching. Advantages of SPC: (i) Simple to control (ii) Simple to maintain (iii) Fine-

What are types of applets, There are two different parts of applets. Truste...

There are two different parts of applets. Trusted Applets and Untrusted applets. Trusted Applets are applets with predefined security and Untrusted Applets are applets without any

Reprography of information distribution, Reprography In order to dissem...

Reprography In order to disseminate information widely some method of reprography is invariably used. Reprography is the science and practice of copying documents by photograph

Advantages and disadvantages of public key cryptography, What are the advan...

What are the advantages and disadvantages of public key cryptography? Advantages and Disadvantages: Improved security and convenience: private keys never require be trans

Explain documentation libraries, The documentation rules are almost exactly...

The documentation rules are almost exactly the similar as for Scripts "Documenting scripts". Although from a technical point of view it is feasible to place measures in libraries i

Explain the pdca cycle, Explain the PDCA cycle. PDCA is a four step pro...

Explain the PDCA cycle. PDCA is a four step problem solving method. The following are the description of each step: 1. P - Plan (Devise your Plan). Identify an opportunity a

Describe some of applications of buffer, Describe some of applications of b...

Describe some of applications of buffer? Applications of buffer: a. They are utilized to introduce tiny delays. b. They are utilized to eliminate cross talk caused becaus

Define process, Define Process. Process: It is a program in executi...

Define Process. Process: It is a program in execution; process execution should progress into sequential fashion. Process contains: program counter stack dat

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd