Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
A staircase light is controlled by two switches one at the top of the stairs and another at the bottom of stairs
a. Make a truth table for this system.b. Write the logic equation is SOP form.c. Realize the circuit using AND-OR gates.
Ans.
A staircase light is controlled through two switches that are S1 and S2, one on the top of the stairs and the other at the bottom of the stairs. In fig.(a) the circuit diagram of the system is shown.
Fig.(a) Circuit diagrama. The truth table for the system is illustrated in given truth table
S1
S2
L
0
1
b. The logic equation for given system is specified by L = S1‾ S2 + S1 S 2‾ c. Realization of given case, the circuit using AND-OR gates is demonstrated in fig (b)
Fig.(b) Logic Diagram for the system
Q. Explain about Variable-Length of Instructions? With the better understanding of computer instruction sets designers developed the idea of having a range of instruction forma
What is the LINQ file extension that interacts with Code Behinds objects? Ans) The extension of the file is .dbml
Q. Explain about Quine McKluskey Method? A tabular method was proposed to deal with increasing number of variables called Quine McKluskey Method. This method is appropriate for
Define macros. A macro is a pre-processor directive which is a program that processes the source code before it passes by the compiler. These are placed in the source program
Overall, Mr. X is an intelligent and high-functioning man with good psychological, social, and occupational functioning. The test battery did not reveal any difficulties that warra
Q. Explain working of Counters? A counter is a register that goes through a predetermined sequence of states when clock pulse is applied. In principle value of counters is incr
Illustrate the Encryption and Decryption methods One of the best method of ensuring security is to change the form of communication. Let the messages be encoded in such a patte
Optimum solution based on constraint problems: Whether depending on what solver you are using so there constraints are often expressed as relationships between variables as e.
Consider a network message transfer among a source S and a destination D by 3 routers R1, R2 and R3 as given below:- S -------- R1 --------- R2 --------- R3 ---
third partial product of 13*11 in binary
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd