Design circuit to encrypt passwords

Assignment Help Basic Computer Science
Reference no: EM133300792

1. You have been hired by a company to design a circuit to encrypt passwords. Assume passwords are 3 bits in size and that the encrypted password is the original password inverted (0's become 1's and 1's become 0's) and then add 3 (modulo 8 as we only have 3 bits). For example if the password is 000, we invert it to give us 111. We then add 3 (7 + 3 = 10 mod 8 = 2) which makes the encrypted password 010. Design and build a sequential circuit (using the procedure from your notes) using 3 T flip-flops to perform the above function. You need to show the State Table, K-maps and draw the sequential circuit.

2. Using D flip-flops, implement a 3-bit register with one external input (x). When the external input x = 0, the registers should rotate to the left by 1 bit, and when the external input x = 1, the value in the register should increase by 1. When creating your State Table, please put the flip-flop values before the external input (i.e., D2 D1 D0 x). See the example on Pages 14-17 of Module 4, Topic 3 (marks will be deducted if you use a different ordering in your State Table). You need to show the State Table, K-maps and draw the sequential circuit (see Pages 14-17 of Module 4, Topic 3).

3. Redo the Vending Machine Example from Module 5, Topic 1 (pp. 20-25) assuming that the cost of gum is 20 cents. Also, use T flip-flops instead of D flip-flops as was used in the example from the lecture notes. You need to show the State Diagram, State Table, K-maps and draw the sequential circuit.

4. Consider the following combinational circuits: (i) F1 (x,y,z) =Σ(1,2,5,6) F2 (x,y,z) = Σ(1,3) F3 (x,y,z) = Σ(0,4,7) (ii) F1 (w,x,y,z) = Σ(0,4,6,10,12,14) F2 (w,x,y,z) = Σ(2,3,4,8,11,15) F3 (w,x,y,z) = Σ(0,2,9,13) F4 (w,x,y,z) = Σ(10,11,14,15) a) Implement Part (i) using a ROM chip (be sure to specify the size). b) Implement Part (ii) using a ROM chip (be sure to specify the size). c) Implement Part (i) using a 16x4 ROM.

5. Consider a RAM chip with a capacity of 32M words of 8 bits each. a) How many address and data lines are required for this chip? b) How many 32M x 8 RAM chips would be required to construct an 128M x 16 RAM chip? c) How many address and data lines are required for an 128M x 16 RAM chip? d) What size decoder is needed to construct an 128M x 16 chip from 32M x 8 chips? e) Draw a diagram of the 128M x 16 chip built from 32M x 8 chips. Include the range of addresses for each chip.

Reference no: EM133300792

Questions Cloud

Change the option under quitaccess from prompt to exit : Move the action up to before the QuitAccess action. Change the option under QuitAccess from Prompt to Exit. Save and close the macro.
What challenges in indian emerging as a global shipbuilding : What are the challenges in Indian emerging as a global shipbuilding leader like China?
Calculate the effective thickness of a pavement consisting : Calculate the effective thickness of a pavement consisting of a 3.5-in HMA, a 8-in cement-treated base, and a lime-modified subgrade.
What is the best decision in economic terms : What is the best decision in economic terms?Are the final decisions based solely on money, or is there something else that influences the decision-making?
Design circuit to encrypt passwords : You have been hired by a company to design a circuit to encrypt passwords. You need to show the State Table, K-maps and draw the sequential circuit.
Reported algorithm in either flowchart or pseudocode : Express the reported algorithm in either flowchart or pseudocode. How will the abovementioned functional goals be achieved?
Discuss the effect of wfh practice on the sustainability : Discuss the effect of WFH practice on the sustainability of an organisation's operations. The discussion should address the impact on each of the dimensions
What are pros and cons of payment based on diagnosis groups : Compared to fee-for-service payment, what are the advantages and disadvantages of payment based on diagnosis-related groups?
How notion of client should be replaced that of stakholders : How the notion of client should be replaced by that of "stakeholder". The example of a concrete situation in health and social services.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Explain what is file type-from where file types come

What is "file type?" Where do file types come from? Write down some of the information that file types give (tip: think about copying and pasting, also importing/exporting between files)?

  What benefits might a global alliance bring

What steps should the exporter take to ensure success when forming an alliance? What issues might arise when forming an alliance?

  Basic structured cabling network

Name the three essential elements of a basic structured cabling network? How are they installed and what are the components that are involved with them?

  Define a javascript function that produces a 2x3 table

1. Define a JavaScript function that produces a 2x3 table filled with numbers. Then call the function in the body to print the table.

  Credit business network

Create a membership policy that describes the benefits and requirements of membership in your Letter of Credit business network.

  Determine how long it will take this plate to cool to 540°c

A flat, stainless steel plate is 0.6 cm thick, 7.5 cm wide, and 0.3 m long is immersed horizontally at an initial temperature of 980°C in a large water bath at 100°C and at atmospheric pressure. Determine how long it will take this plate to cool t..

  Describe social bandwidth

Describe social bandwidth and share an experience you've had with this concept within your previous interactions.

  Keystroke logging

Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard,

  How can dollar figures attached to follow-on work influence

How can the dollar figures attached to follow-on work influence the cost package that you submit for the R&D phase? Would your answer change if the man-hours submitted for the R&D phase become the basis for the production phase?

  How recursion breaks up complex computational problems

Discuss how recursion breaks up complex computational problems into simpler ones. Identify three problems that would be difficult to solve without the use of recursion. Justify your response in simple C++ syntax.

  Length of the array or arraylist

Write a short Java application that stores words in an Array or ArrayList. You get to pick the number of words to store. Generate a random number between 0 (inclusive) and the length of the Array or ArrayList (exclusive).

  List five applications of personal computers

List five applications of personal computers. Is there a limit to the applications of computers? Do you envision any radically different and exciting applications in the near future? If so, what?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd