Working of read-only memory, Computer Engineering

Assignment Help:

Q. Working of Read-Only Memory?

A ROM is fundamentally a memory or storage device in which a fixed set of binary information is stored. A block diagram of ROM is as displayed in Figure. It comprises n input lines and m output lines. Every bit combination of input variables is known as an address. Every bit combination which comes out of output lines is known as a word. Total number of bits per word is equal to number of output lines m. Number of distinct addresses possible with n input variables is 2n.

79_Working of Read-Only Memory.png

Figure: ROM

A ROM is characterised by number of words (2n ) and number of bits (m) per word. For illustration a 32 × 8 ROM that can be written as 25 × 8 comprises 32 words of 8 bit each that means there are 8 output lines and 32 distinct words stored in unit. There are only 5 input lines since 32 = 25and with 5 binary variables we can specify 32 addresses.  

A ROM is fundamentally a combinational circuit and can be constructed as displayed in Figure below. On applying an Input I1 = 0, I2 = 0 the 00 line of decoder is selected and we will get O1 = 0 and O2 = 1 on applying I1 = 0 and I2 = 1 we will obtain O1 = 1 AND O2 = 0. This same logic can be used for creating larger ROMs.


Related Discussions:- Working of read-only memory

What is monkey testing, What is Monkey testing? The monkey testing is ...

What is Monkey testing? The monkey testing is the process of testing here and there for judging the application trying to observe the accessing dissimilar functionalities is i

Convention used to represent micro-operations, Q. Convention used to repres...

Q. Convention used to represent micro-operations? The convention used to represent micro-operations is: 1.  Computer register names are designated by capital letters (someti

Which technique is an encryption technique, Which technique is an encryptio...

Which technique is an encryption technique? Ans. Block cipher technique and also Steam cipher technique is an encryption technique.

Calculate switching capacity in a two stage network, In a two stage network...

In a two stage network there are 512 inlets and outlets, r=s=24. If the probability that a given inlet is active is 0.8, calculate: Switching capacity Given: N =M =512, α

Write a perl script, Write a PERL script which takes a file named input.txt...

Write a PERL script which takes a file named input.txt as an input and processes it. The input file has the following format: firstname lastname: pass/fail score%. A sample input f

Exdplain instruction buffers, Instruction buffers For taking the comple...

Instruction buffers For taking the complete advantage of pipelining pipelines must be filled continuously. So instruction fetch rate must be matched with pipeline consumption r

What is meant by hotspots, What is meant by hotspots? A Hotspot is a l...

What is meant by hotspots? A Hotspot is a list area where the mouse pointer appears as an upright hand symbol. When a user points to that area (and the hand cursor is active),

Classified the vlsi technology, The VLSI technology is still developing. Mo...

The VLSI technology is still developing. More and more powerful microprocessors and more storage space now are being put in single chip. One question that we have still not conside

What is source and listener, A source is an object that produces an event. ...

A source is an object that produces an event. This happens when the internal state of that object changes in some way. A listener is an object that is notified when an event happen

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd