What is read-only-memory, Computer Engineering

Assignment Help:

Q. What is Read-only-Memory?

Read only memory is an illustration of a Programmable Logic Device (PLD) it implies that binary information which is stored within a PLD is specified in some fashion and embedded within hardware. So information retains even when power goes.  

1549_What is Read-only-Memory.png

Figure: ROM Design

Above figure (a) presents block diagram of ROM.  It comprises 'k' input address lines and 'n' output data lines. An m ×n ROM is an array of binary cell arranged in m (2k = m) words of 'n' bits each. ROM doesn't have any data input since write operation is not defined for ROM. ROM is categorized as a combinational circuit and constructed internally with decoder and a group of OR gates. In general a m × n ROM (where m= 2k, k = no. of address lines) will have an internal k ×2k decoder and 'n' OR gate. Every OR gates has 2k inputs that are connected to each of the outputs of decoder.


Related Discussions:- What is read-only-memory

Explain about cseg segment, CSEG SEGMENT  ASSUME CS:CSEG, DS:CSEG, SS:CS...

CSEG SEGMENT  ASSUME CS:CSEG, DS:CSEG, SS:CSEG  ORG 100h START:MOV AX, CSEG; Initialise data segment  MOV DS, AX; register using AX  MOV AL, NUM1; Take the first num

Main benefits of cd-rom, The main benefits of CD-ROMs are: These are...

The main benefits of CD-ROMs are: These are removable disks, thus they are suitable for archival storage mass replication is cheap and fast large storage capacity

.image forgery detection, what is the code to detect image forgery using Ma...

what is the code to detect image forgery using Matlab..??

Simulated annealing - artificial intelligence, Simulated Annealing: On...

Simulated Annealing: One way to get around the problem of local maxima, and related problems like ridges and plateaux in hill climbing is to allow the agent to go downhill to

Illustration of equivalent exe program, Q. Illustration of equivalent EXE p...

Q. Illustration of equivalent EXE program? An illustration of equivalent EXE program for COM program is: ; ABSTRACT this program adds 2 8-bit numbers in the memory locations

Users to run programs at same time, A computer system that allows multiple ...

A computer system that allows multiple users to run programs at similar time   Multi tasking system

Explain the e-cheques verses credit cards in brief, Explain the E-cheques v...

Explain the E-cheques verses Credit Cards in brief. E-cheques: E-cheques are utilized for business dealing into e-commerce. Transactions of such cheques take place onto Inter

System for an online furniture shop, As an XML expert you are needed to mod...

As an XML expert you are needed to model a system for an online furniture shop. After an interview with the shop manager you have the certain information: The detail of th

Object oriented systems analysis and design, Analysis and design form the b...

Analysis and design form the basis on any significant software artifact. Analysis is critical in terms of making sure that the final artifact actually meets user requirements (ie b

Determine about the virtual private networks, Virtual Private Networks (VPN...

Virtual Private Networks (VPN) In order to encrypt/decrypt all the communication network traffic that passes through the Internet or Intranet, a VPN uses software or hardware.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd