Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Working of Read-Only Memory?
A ROM is fundamentally a memory or storage device in which a fixed set of binary information is stored. A block diagram of ROM is as displayed in Figure. It comprises n input lines and m output lines. Every bit combination of input variables is known as an address. Every bit combination which comes out of output lines is known as a word. Total number of bits per word is equal to number of output lines m. Number of distinct addresses possible with n input variables is 2n.
Figure: ROM
A ROM is characterised by number of words (2n ) and number of bits (m) per word. For illustration a 32 × 8 ROM that can be written as 25 × 8 comprises 32 words of 8 bit each that means there are 8 output lines and 32 distinct words stored in unit. There are only 5 input lines since 32 = 25and with 5 binary variables we can specify 32 addresses.
A ROM is fundamentally a combinational circuit and can be constructed as displayed in Figure below. On applying an Input I1 = 0, I2 = 0 the 00 line of decoder is selected and we will get O1 = 0 and O2 = 1 on applying I1 = 0 and I2 = 1 we will obtain O1 = 1 AND O2 = 0. This same logic can be used for creating larger ROMs.
Q. Define Colour Depth in graphic display system? It is clear that an image contains an array of pixels. If we tell which pixels are 'off' and which are 'on' to the monitor, i
Explain the importance of Computer architecture Computer architecture courses cover application, organization, architecture, logic and transistor layers. However, four other la
Pebble Merchant
a. Determine any three restrictions that apply to class members. b. Is it possible for single class to be a friend of another class? Illustrate this using a suitable C++ program
Name the widely used Language Processor Development Tools ( LPDTs). Widely used Language processor development tools are: Lex - A Lexical Analyzer Generator Lex assi
Disadvantages of Stateful Multi-Layer Inspection A firewall such as the SMLI remains completely transparent to both users and applications. Consequently, SMLI firewall does no
Given: • A sequence of n arrival times t0, t1, ..., tn-1, • a library of mlogically equivalent gates {(d0, c0), (d1, c1), ..., (dm-1,cm-1)} where d is delay and c is cost • a
What are the ways to truncate guard bits? 1. Chopping 2. Von Neumann rounding 3. Rounding procedure.
What are the security aspects of SIP Visualizer
Explain in brief about Compact disks (CD) These are an optical storage media that have basically taken over from floppy disk. Software is now generally supplied on a CD (in for
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd