Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. What do you mean by Decoders?
Decoder transforms one kind of coded information to other form. A decoder has n inputs and one enable line (sort of selection line) and 2n output lines. Let's see an example of 3:8 decoder that decodes a 3 bit information and there is just one output line that gets value 1 or in other words out of 23 = 8 lines just 1 output line is selected. So depending on selected output line information of 3 bits can be identified or decoded.
Figure: 3×8 decoder
Please be certain while constructing logic figure wherever values in the truth table are appearing as zero in input and one in output the input must be fed in complemented form for example first 4 entries of truth table comprises 0 in I0 position and therefore I0 value 0 is passed by a NOT gate and fed to AND gates 'a', 'b', 'c' and'd' that implies that these gates shall be triggered/selected only if I0 is 0. If I0 value is 1 then not any of the top 4 AND gates can be selected. Similar kind of logic is valid for I1. Please note output line selected is named 000 or 010 or 111 etc. Output value of only one of lines would be 1. These 000, 010 denotes the label and imply that if you have these I0 I1 I2 input values labelled line would be activated for the output. Enable line is a good resource for joining two 3×8 decoders to make one 4×16 decoder.
Explain the term Confidentiality - Firewall Design Policy Whilst some corporate data is for public consumption, the vast majority of it should remain private.
in building a suspension bridge a cable is to be stretched from the top of a pier to a point 852.6 ft. from it''s foot. if from this point the angle of elevation of the top of the
In computing, virtual memory is a memory management method developed for multitasking kernels. This technique virtualizes computer architecture's various forms of computer data sto
Q. Components of magnetic disk? Disk itself is mounted in a disk drive that comprises arm which is a shaft that rotates disk and the electronics required for input and output b
Businesses are interested in AI because of the characteristics it offers that no other systems type offers. That is AI ability to: a. Preserve Intelligence and Knowledge: C
How will you allocate sub system? Allocate every concurrent subsystem to hardware unit. General purpose processor or specialized functional unit as follows: Estimate per
What are the primary models of Supply Chain Management? Two Primary models of Supply Chain Management are illustrated below: a. Porter’s Value Chain Model and b. Supply
What is the means of communications between R/3 and external applications? The means of communication among R/2,R/3 and external applications is by the CPI-C handler or SAP Gat
What are two methods of modifying SAP standard tables? Append Structures and Customizing Includes.
Explain the principle of duality with examples.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd