Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Find the boolean expression for the logic circuit shown below.
Ans. Output of Gate-1 (NAND) = (AB)'
Output of Gate-2 (NOR) = (A'+B)'Output of Gate-3 (NOR) = [(AB)' + (A'+B)']'
Here applying the De-Morgans law, (X+Y)' = X'Y'and (XY)' = (X'+Y') [(AB)' + (A'+B)']' = [(AB)']' [(A'+B)']'= (AB) (A'+B)= AA'B + ABB= ABB= AB.
Give the format of Ethernet frame and explain the semantics of each field. An Ethernet frame starts with headers which have three fields. The 64-bit preamble, which precedes th
Comparison between Motorola processors and INTEL processors: Intel/AMD processors are really about the same thing. They run the same software and operate in a very similar ma
Q. Explain about Semiconductor Memories? Originally IC technology was used for constructing processor however soon it was realized that same technology can be used for construc
A certain memory has a capacity of 4K × 8 (i) How many data input and data output lines does it have? (ii) How many address lines does it have? (iii) What is its capacity in bytes
Sun and Ni's Law The Sun and Ni's Law is a generalization of Amdahl's Law as well as Gustafson's Law. The fundamental idea underlying the Sun and Ni's Law is to find the soluti
Explain the term- Hacking Use of passwords and ids to prevent illegal access to files. Also locking the computer itself or locking computer room can help here. Encryption s
Write a Verilog code for synchronous and asynchronous reset? Synchronous reset, synchronous means clock dependent so reset must not be present in sensitivity disk eg: alway
How Web-Based Word Processing Works? Web-based word processors are hosted in the cloud, not on the hard drive-as are the documents formed with these applications. And these web
Described auto increment mode of addressing? Ans: Effective address of the operand is the contents of a register mention in the instruction. After finishing the accessing t
Structural hazards - computer architecture: A structural hazard takes place when a part of the processor's hardware is required by 2 or more than two instructions at the same
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd