Design circuit to encrypt passwords

Assignment Help Basic Computer Science
Reference no: EM133300792

1. You have been hired by a company to design a circuit to encrypt passwords. Assume passwords are 3 bits in size and that the encrypted password is the original password inverted (0's become 1's and 1's become 0's) and then add 3 (modulo 8 as we only have 3 bits). For example if the password is 000, we invert it to give us 111. We then add 3 (7 + 3 = 10 mod 8 = 2) which makes the encrypted password 010. Design and build a sequential circuit (using the procedure from your notes) using 3 T flip-flops to perform the above function. You need to show the State Table, K-maps and draw the sequential circuit.

2. Using D flip-flops, implement a 3-bit register with one external input (x). When the external input x = 0, the registers should rotate to the left by 1 bit, and when the external input x = 1, the value in the register should increase by 1. When creating your State Table, please put the flip-flop values before the external input (i.e., D2 D1 D0 x). See the example on Pages 14-17 of Module 4, Topic 3 (marks will be deducted if you use a different ordering in your State Table). You need to show the State Table, K-maps and draw the sequential circuit (see Pages 14-17 of Module 4, Topic 3).

3. Redo the Vending Machine Example from Module 5, Topic 1 (pp. 20-25) assuming that the cost of gum is 20 cents. Also, use T flip-flops instead of D flip-flops as was used in the example from the lecture notes. You need to show the State Diagram, State Table, K-maps and draw the sequential circuit.

4. Consider the following combinational circuits: (i) F1 (x,y,z) =Σ(1,2,5,6) F2 (x,y,z) = Σ(1,3) F3 (x,y,z) = Σ(0,4,7) (ii) F1 (w,x,y,z) = Σ(0,4,6,10,12,14) F2 (w,x,y,z) = Σ(2,3,4,8,11,15) F3 (w,x,y,z) = Σ(0,2,9,13) F4 (w,x,y,z) = Σ(10,11,14,15) a) Implement Part (i) using a ROM chip (be sure to specify the size). b) Implement Part (ii) using a ROM chip (be sure to specify the size). c) Implement Part (i) using a 16x4 ROM.

5. Consider a RAM chip with a capacity of 32M words of 8 bits each. a) How many address and data lines are required for this chip? b) How many 32M x 8 RAM chips would be required to construct an 128M x 16 RAM chip? c) How many address and data lines are required for an 128M x 16 RAM chip? d) What size decoder is needed to construct an 128M x 16 chip from 32M x 8 chips? e) Draw a diagram of the 128M x 16 chip built from 32M x 8 chips. Include the range of addresses for each chip.

Reference no: EM133300792

Questions Cloud

Change the option under quitaccess from prompt to exit : Move the action up to before the QuitAccess action. Change the option under QuitAccess from Prompt to Exit. Save and close the macro.
What challenges in indian emerging as a global shipbuilding : What are the challenges in Indian emerging as a global shipbuilding leader like China?
Calculate the effective thickness of a pavement consisting : Calculate the effective thickness of a pavement consisting of a 3.5-in HMA, a 8-in cement-treated base, and a lime-modified subgrade.
What is the best decision in economic terms : What is the best decision in economic terms?Are the final decisions based solely on money, or is there something else that influences the decision-making?
Design circuit to encrypt passwords : You have been hired by a company to design a circuit to encrypt passwords. You need to show the State Table, K-maps and draw the sequential circuit.
Reported algorithm in either flowchart or pseudocode : Express the reported algorithm in either flowchart or pseudocode. How will the abovementioned functional goals be achieved?
Discuss the effect of wfh practice on the sustainability : Discuss the effect of WFH practice on the sustainability of an organisation's operations. The discussion should address the impact on each of the dimensions
What are pros and cons of payment based on diagnosis groups : Compared to fee-for-service payment, what are the advantages and disadvantages of payment based on diagnosis-related groups?
How notion of client should be replaced that of stakholders : How the notion of client should be replaced by that of "stakeholder". The example of a concrete situation in health and social services.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd