Explain the working of a two input EX-OR gate, Computer Engineering

Assignment Help:

With relevant logic diagram and truth table explain the working of a two input EX-OR gate.


Ans. 2-Input EX-OR Gate: An EX-OR or Exclusive gate recognizes words that have an odd no. of ones.  Fig.(1) demonstrates the logic diagram of an EX-OR gate and Fig.(2) demonstrates the symbol of an EX-OR Gate. The upper AND gate provides an output A B and the lower AND gate provides an output A B.

2355_explain the working of a two input EX-OR gate.png


Thus, the output equation be as Y = A B + A B = A EX-OR B = A ⊕ B
Whether both A and B are low, the output is low.  If either A or B but not both are high and the
other is low therefore the output is high.  If A and B both are high, output is low.  Therefore the output is 1 while A and B are dissimilar. Table (A) illustrates the Truth Table for EX-OR gate.

A

B

Y ( A B + A B )

0

0

0

0

1

1

1

0

1

1

1

0

Table (A): Truth Table of EX-OR Gate


Related Discussions:- Explain the working of a two input EX-OR gate

Define various classes of interrupts, Q. Define Various classes of Interrup...

Q. Define Various classes of Interrupts? Figure below gives list of some common interrupts and events which causes occurrence of those interrupts. Figure: Various clas

What are the advantages of public key cryptography, What are the advantages...

What are the advantages of Public Key Cryptography? Advantages of Public Key Cryptography are illustrated in below: a) Increased convenience and security and b) Electro

Conversioin of the decimal number 82.67 into octal number , Conversioin of ...

Conversioin of the decimal number 82.67 into Octal number ? Ans. The binary equivalent is (1010010.10101011) 2 of decimal number 82.67. After that convert each 3-bit binary in

Error handling in hard disk, Error handling in Hard disk in computer archit...

Error handling in Hard disk in computer architecture : Modern drives also make widespread use of Error Correcting Codes (ECCs), specifically Reed-Solomon error correction.

Intentional hacking helps in maintaining better security, Intentional hacki...

Intentional hacking helps in maintaining better security Several companies employ professionals as security specialists whose basic job is to detect and cover loopholes in t

Data parallel model - parallel programming model, In the data parallel mode...

In the data parallel model, many of the parallel work focus on performing operations on a data set. The data set is usually organized into a common structure, such as an array or a

Show the shared programming using library routines, Q. Show the Shared Prog...

Q. Show the Shared Programming Using Library Routines? The mainly well-liked of them is use of combo function known as fork() and join(). Fork() function is used to initialize

Hiring problem algorithm, Consider the Hire Assistant problem. We interview...

Consider the Hire Assistant problem. We interview n candidates and always hire the best qualified so far. Let n = 5 for our example. Find the probabilities that we hire exactly 1 t

Minimize the logic function using NAND gate, Minimize the logic function F(...

Minimize the logic function F(A, B, C, D) = ∑ m(1,3,5,8,9,11,15) + d(2,13) using NAND gate with help of K-map. Ans. Realization of given expression by using NAND gates:  In

What are called stalls, What are called stalls? An alternative represen...

What are called stalls? An alternative representation of the operation of a pipeline in the case of a cache miss gives the function performed by every pipeline stage in each cl

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd