Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
With relevant logic diagram and truth table explain the working of a two input EX-OR gate.
Ans. 2-Input EX-OR Gate: An EX-OR or Exclusive gate recognizes words that have an odd no. of ones. Fig.(1) demonstrates the logic diagram of an EX-OR gate and Fig.(2) demonstrates the symbol of an EX-OR Gate. The upper AND gate provides an output A B and the lower AND gate provides an output A B.
Thus, the output equation be as Y = A B + A B = A EX-OR B = A ⊕ BWhether both A and B are low, the output is low. If either A or B but not both are high and theother is low therefore the output is high. If A and B both are high, output is low. Therefore the output is 1 while A and B are dissimilar. Table (A) illustrates the Truth Table for EX-OR gate.
A
B
Y ( A B + A B )
0
1
Now let's get a grip on how to add interactivity to your web documents by way of the tag. With this tag you can add to your web pages a guestbook, surveys, order forms, ge
Circuits can be designed to implement a specifictaske.g. a simple circuit could compare two inputvoltages and give a high output if they matched anda low output if they did not mat
How does dynamic memory allocation help in managing data
Q. Illustrate Header section of a device driver? Header comprises information which allows DOS to identify the driver. It also comprises pointers which allow it to chain to ot
Avoiding Local Minima: However the error rate of multi-layered networks over a training set could be calculated as the number of mis-classified examples. So always keep in rem
What is a Spool request? Spool requests are formed during dialog or background processing and placed in the spool database with information about the printer and print format.
Arithmetic Pipelines The method of pipelining can be applied to a variety of complex and slow arithmetic operations to speed up the processing time. The pipelines used for arit
Explain the term- Hacking Use of passwords and ids to prevent illegal access to files. Also locking the computer itself or locking computer room can help here. Encryption s
What is meant by scan code? When a key is pressed on the keyboard, the keyboard controller places a code take to the key pressed into a part of the memory known as the keyboar
How are instructions sent between memory and the processor? Both the instruction pointer (IP) and program counter (PC) utilized to holds the memory address of the next inst
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd