Explain 16-bit ROM array, Computer Engineering

Assignment Help:

Draw the logic diagram of 16-bit ROM Array and explain its principle of operation.

Ans:

16-bit ROM Array: A ROM that is read-only memory is an array of selectively closed and open unidirectional contacts. A 16-bit ROM array is demonstrated in Fig. (b). To choose any one of the 16 bits, a 4-bit address (A3, A2, A1, A0) is needed. The lower order two bits (A1, A0) are decoded through the decoder DL that selects one of the four rows, while the higher order two bits (A3, A2) are decoded through the decoder DH that activates one of the 4 column sense amplifiers.

2163_Logic Diagram of 16-bit ROM array.png

Fig.(a) Logic Diagram of 16-bit ROM array

The diode matrix is made by connecting one diode with a switch among each row and column. For illustration the diode D21 is connected in between column 1 and row 2. The output is enabled through applying logic 1 at the CS input that is chip select. Programming a ROM implies to selectively open and close the switches in series along with the diodes. For illustration, if the switch of diode D21 is into closed position and if the address input is 0110, the row 2 is activated linking this to the column 1. As well the sense amplifier of column 1 is enabled that provides logic 1 output if the chip is selected means CS = 1. It shows as a logic1 is stored at the address 0110. Conversely, if the switch of diode D21 is open, logic 0 is stored on the address 0110.


Related Discussions:- Explain 16-bit ROM array

What is locality of reference, What is locality of reference? Analysis ...

What is locality of reference? Analysis of program represents that many instructions ion localized areas of the program are implemented repeatedly during some time period, and

What are the phases of video production, Question 1: a) What are the p...

Question 1: a) What are the phases of video production? b) What do you mean by storyboards? c) What are the differences between Point and Area (or Paragraph) Text?

Voice identifier - biometric computer security systems, Voice Identifier - ...

Voice Identifier - Biometric Computer Security Systems Besides fingerprint, another popular security technology is voice identifier. According to VSS organization (2007), voic

Explain multihomed host, Write short notes on the Multihomed host. A ho...

Write short notes on the Multihomed host. A host computer that connects to multiple networks is termed as multi-homed host. Multihoming is occasionally used to raise reliabilit

Classes of experts system, 1. The Consultant : A consultant is an experts...

1. The Consultant : A consultant is an experts person who possesses a high level of expertise in the area. He guide and educate the executives regarding establishing the e

Artificial life - artificial intelligence, Artificial Life - artificial int...

Artificial Life - artificial intelligence: Give birth to new exits forms.  A swot of Artificial Life will certainly direct on what it means for a complex system to be 'aliv

What is script-fu in gimp, Sript-Fu is the first GIMP scripting extension. ...

Sript-Fu is the first GIMP scripting extension. Extensions are split processes that communicate with the GIMP in the similar way that plug-ins do. The distinction is that extension

Transportation model, advantages and disadvantages of northwest corner meth...

advantages and disadvantages of northwest corner method and least cost method

What are the basic components of dialog program, What are the basic compone...

What are the basic components of dialog program? Screens (Dynpros) Every dialog in an SAP system is controlled by dynpros. A dynpros having of a screen And its flow log

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd