Explain excess-3 and gray code using four binary digitis, Computer Engineering

Assignment Help:

Give the details of excess 3 codes and gray code using four binary digits.

Ans:

Table of excess 3 codes and gray code using four binary digits

Binary no

Excess3

Gray code

0 0 0 0

0 0 1 1

0 0 0 0

0 0 0 1

0 1 0 0

0 0 0 1

0 0 1 0

0 1 0 1

0 0 1 1

0 0 1 1

0 1 1 0

0 0 1 0

0 1 0 0

0 1 1 1

0 1 1 0

0 1 0 1

1 0 0 0

0 1 1 1

0 1 1 0

1 0 0 1

0 1 0 1

0 1 1 1

1 0 1 0

0 1 0 0

1 0 0 0

1 0 1 1

1 1 0 0

1 0 0 1

1 1 0 0

1 1 0 1

1 0 1 0

 

1 1 1 1

1 0 1 1

 

1 1 1 0

1 1 0 0

 

1 0 1 0

1 1 0 1

 

1 0 1 1

1 1 1 0

 

1 0 0 1

1 1 1 1

 

1 0 0 0


Related Discussions:- Explain excess-3 and gray code using four binary digitis

What is replacement algorithm, What is replacement algorithm? When the ...

What is replacement algorithm? When the cache is full and a memory word that is not in the cache is referenced, the cache control hardware must decide which block should be del

Differentiate between public key and secret key encryption, What are the di...

What are the different between Public Key Encryption and Secret Key Encryption? Differentiate between Public Key Encryption and Secret Key Encryption: A cryptographic sys

Describe thead, Q. Describe THEAD, TBODY and TFOOT tag? THEAD, TBODY, ...

Q. Describe THEAD, TBODY and TFOOT tag? THEAD, TBODY, TFOOT , , and form groups of rows. specifies that a group of rows are heade

What is traffic engineering, What is Traffic Engineering? Traffic engi...

What is Traffic Engineering? Traffic engineering gives the basis for analysis and design of telecommunication network to carry a specified traffic at an exact loss probability

Update -task updates, Update -task updates are Asynchronous updates.

Update -task updates are Asynchronous updates.

Algorithm to have a good best case running time, How can we change almost a...

How can we change almost any algorithm to have a good best case running time? Check whether the input constitutes an input at the very starting Or else run the original algo

Determine 127.0.0.1 is which type of address, 127.0.0.1 is a? 127.0.0.1...

127.0.0.1 is a? 127.0.0.1 it is a loop-back address.

What is the role of mar and mdr, What is the role of MAR and MDR? The ...

What is the role of MAR and MDR? The MAR (memory address register) is used to hold the address of the location to or from which data are to be transferred and the MDR(memory d

Returns the information about tasks running, Returns the information about ...

Returns the information about tasks running int info = pvm_tasks( int where, int *ntask, struct pvmtaskinfo **taskp ) struct pvmtaskinfo {  int ti_tid; int ti_pt

Register transfer micro-operations, Register Transfer Micro-operations ...

Register Transfer Micro-operations These micro-operations as the name proposes transfer information from one register to another. The information doesn't change during these mi

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd