Working of read-only memory, Computer Engineering

Assignment Help:

Q. Working of Read-Only Memory?

A ROM is fundamentally a memory or storage device in which a fixed set of binary information is stored. A block diagram of ROM is as displayed in Figure. It comprises n input lines and m output lines. Every bit combination of input variables is known as an address. Every bit combination which comes out of output lines is known as a word. Total number of bits per word is equal to number of output lines m. Number of distinct addresses possible with n input variables is 2n.

79_Working of Read-Only Memory.png

Figure: ROM

A ROM is characterised by number of words (2n ) and number of bits (m) per word. For illustration a 32 × 8 ROM that can be written as 25 × 8 comprises 32 words of 8 bit each that means there are 8 output lines and 32 distinct words stored in unit. There are only 5 input lines since 32 = 25and with 5 binary variables we can specify 32 addresses.  

A ROM is fundamentally a combinational circuit and can be constructed as displayed in Figure below. On applying an Input I1 = 0, I2 = 0 the 00 line of decoder is selected and we will get O1 = 0 and O2 = 1 on applying I1 = 0 and I2 = 1 we will obtain O1 = 1 AND O2 = 0. This same logic can be used for creating larger ROMs.


Related Discussions:- Working of read-only memory

Pebble merchant, There is a pebble merchant.He sells the pebbles,that are u...

There is a pebble merchant.He sells the pebbles,that are used for shining the floor.His main duty is to take length of the room''s sides. program 1 : package test.padovanstring

One of the fault base testing techniques, One of the fault base testing tec...

One of the fault base testing techniques is:- Mutation testing is the fault base testing.

Nix commands, reate a directory "Unix" under your home directory. Command(...

reate a directory "Unix" under your home directory. Command(s): ………………………………………….

What are the advantages of public key cryptography, What are the advantages...

What are the advantages of Public Key Cryptography? Advantages of Public Key Cryptography are illustrated in below: a) Increased convenience and security and b) Electro

Explain the architectural framework for electronic commerce, Explain the Ar...

Explain the Architectural framework for electronic commerce. An application independent framework to categorize service interaction relies on four basic dimensions   1.  Ser

Do you provide storage and destruction services, Do you provide storage and...

Do you provide storage and destruction services? We will assess your storage and destruction needs as part of our evaluation process. Our destruction services can be performed

Interaction design, This unit introduces the most important ID terminology,...

This unit introduces the most important ID terminology, explains why ID is important, and gives a description of the main ID activities and the characteristics of the ID process. I

Role of world wide web in the field of e-commerce, Explain the role of Worl...

Explain the role of World Wide Web in the field of e-commerce.  In the 1990s, the arrival of the World Wide Web on the Internet had shown a turning point in e-commerce by givin

Bidirectional search, Bidirectional Search: We've concentrated so far ...

Bidirectional Search: We've concentrated so far on the searches where the point of view for the search is to find a solution, but not the path to the solution. Like any other

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd