Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Working of Read-Only Memory?
A ROM is fundamentally a memory or storage device in which a fixed set of binary information is stored. A block diagram of ROM is as displayed in Figure. It comprises n input lines and m output lines. Every bit combination of input variables is known as an address. Every bit combination which comes out of output lines is known as a word. Total number of bits per word is equal to number of output lines m. Number of distinct addresses possible with n input variables is 2n.
Figure: ROM
A ROM is characterised by number of words (2n ) and number of bits (m) per word. For illustration a 32 × 8 ROM that can be written as 25 × 8 comprises 32 words of 8 bit each that means there are 8 output lines and 32 distinct words stored in unit. There are only 5 input lines since 32 = 25and with 5 binary variables we can specify 32 addresses.
A ROM is fundamentally a combinational circuit and can be constructed as displayed in Figure below. On applying an Input I1 = 0, I2 = 0 the 00 line of decoder is selected and we will get O1 = 0 and O2 = 1 on applying I1 = 0 and I2 = 1 we will obtain O1 = 1 AND O2 = 0. This same logic can be used for creating larger ROMs.
(a) Explian two limitations of dead-box analysis. (b) Describe why memory analysis is difficult. (c) With reference to the "Shadow Walker" rootkit, explain what is meant by
In a frame transmission, CRC stands for? CRC stands for Cyclic Redundancy Check, in a frame transmission.
Explain SNMP (simple network management protocol). Once SNMP is used the management station sends a request to an agent asking this for commanding or information this to update
Address 192.5.48.3 belongs to? Address 192.5.48.3 belongs to class C.
explain michesons inferometer
Determine about the Web Based Tools HTML, XML, CGI and other open standards As is well known, the Web as well as Intranets speak and understand only one language i.e., th
a. Design a fast adder. What are the variations in a fast adder? b. Define how the virtual address is changed into real address in a paged virtual memory system. Give an example
Secret-key encryption is also called as Private encryption.
Use 4 D-bascules connected in serial all synchronized with the similar CLK. Then connect all 4 outputs, & 2nd output must reverse, of the D-bascule to an AND logic. The output of t
LDAP stands for LDAP- Light weight Directory Access Protocol.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd