Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Using D-Flip flops and waveforms explain the working of a 4-bit SISO shift register.Ans. Serial In-Serail Out Shift Register: Fig.(a) demonstrates a 4 bit serial in-serial out shift register having four D flip flops FF0 , FF1 , FF2 and FF3. As demonstrated it is a positive edge triggered device. The working of such register for the data 1010 is specified in the subsequent steps.
1. Bit 0 is entered in data input line. D0 = 0, primary clock pulse is applied, FF0 is reset and stores 0. 2. Subsequently bit 1 is entered. Q0 = 0, as Q0 is linked to D1, D1 becomes 0. 3. Then second clock pulse is applied, the 1 upon the input line is moved or shifts into FF0 since FF0 sets. The 0 that was stored in FF0 is moved into FF1. 4. Subsequently bit 0 is entered and third clock pulse applied. 0 is goes into FF0, 1 stored in FF0 is shifts to FF1 and 0 stored in FF1 is shifts to FF2. 5. Final bit 1 is entered and 4th clock pulse applied. 1 is goes into FF0, 0 stored in FF0 is shifts to FF1, 1 stored in FF1 is shifts to FF2 and 0 stored in FF2 is shifts to FF3. This finishes the serial entry of 4 bit data in the register. Then the LSB0 is on the output Q3. 6. Clock pulse 5 is then applied. LSB0 is shifted out. The subsequent bit 1 shows on Q3 output. 7. Clock pulse 6 is then applied. The 1 on Q3 is shifted out and 0 appears on Q3 output. 8. Clock pulse 7 is then applied. 0 on Q3 is shifted out. Here 1 shows on Q3 output. 9. Clock pulse 8 is then applied. 1 on Q3 is shifted out. 10. While the bits are being shifted out (upon CLK pulse 5 to 8) extra data bits can be entered in.
reate a directory "Unix" under your home directory. Command(s): ………………………………………….
Question: (a) Explain the three categories of design patterns. Give two examples from each category. (b) When describing a pattern what is the purpose of "The Intent", an
definf memory operation
Explain the Compiler - Computer Programming? The Compiler is a program that translates source code into object code. The compiler derives its name from the means it works looki
Branch (control) hazards in computer architecture : Branching hazards (also called control hazards) take place when the processor is told to branch -for example, if a defin
Determine the registers are available in machines Typical registers, some of which are commonly available in machines. These registers are as follows:- Memory Addres
2. Explain any ten CASE tools
create a BCD adder combinational ckt. that adds 2 digit BCD inputs
Illustrate the application of E-Commerce in Home Banking. Home Entertainment: E-commerce has show the way to HOME ENTERTAINMENT. The video aspect generally includes a la
Give some examples of malicious data. In May 2002 year, the Norton Anti-Virus software for Windows operating systems detected around 61000 malicious programs. Several of them a
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd