What is read-only-memory, Computer Engineering

Assignment Help:

Q. What is Read-only-Memory?

Read only memory is an illustration of a Programmable Logic Device (PLD) it implies that binary information which is stored within a PLD is specified in some fashion and embedded within hardware. So information retains even when power goes.  

1549_What is Read-only-Memory.png

Figure: ROM Design

Above figure (a) presents block diagram of ROM.  It comprises 'k' input address lines and 'n' output data lines. An m ×n ROM is an array of binary cell arranged in m (2k = m) words of 'n' bits each. ROM doesn't have any data input since write operation is not defined for ROM. ROM is categorized as a combinational circuit and constructed internally with decoder and a group of OR gates. In general a m × n ROM (where m= 2k, k = no. of address lines) will have an internal k ×2k decoder and 'n' OR gate. Every OR gates has 2k inputs that are connected to each of the outputs of decoder.


Related Discussions:- What is read-only-memory

Unix for multiprocessor system, The UNIX operating system for a multiproces...

The UNIX operating system for a multiprocessor system has a number of extra features as compared to normal UNIX operating system.  Let's first consider the design objectives of mul

How is a multidimensional array defined pointer, How is a multidimensional ...

How is a multidimensional array defined in terms of a pointer to a collection of contiguous arrays of lower dimensionality ? C does not have true multidimensional arrays. Howev

Linux, Explain about unix file system architecture

Explain about unix file system architecture

Direct mapped strategy, Determine the layout of the specified cache for a C...

Determine the layout of the specified cache for a CPU that can address 1G x 32  of memory.  show the layout of the bits per cache location and the total number of locations.  a)

What is the maximum frequency of operation, For the circuit demonstrated be...

For the circuit demonstrated below, what is the Maximum Frequency of Operation? Are there any hold time violations for FF2? When yes, how do you modify the circuit to ignore them?

Difference among interrupt service routine and subroutine, Subroutine are t...

Subroutine are the part of implementing processes (like any process can call a subroutine for achieve task), whereas the interrupt subroutine never be the part. Interrupt subroutin

Push and pop, i want flowchart for push, pop in stack element and display s...

i want flowchart for push, pop in stack element and display stack and exit

Explain a binary semaphore, Explain a binary semaphore with the help of an ...

Explain a binary semaphore with the help of an example? An abstract data type (ADT) is a semaphore which defines a nonnegative integer variable that apart from initialization i

How can we use / display table in a screen, How can we use / display table ...

How can we use / display table in a screen? ABAP/4 offers two mechanisms for showing and using table data in a screen.  These mechanisms are TABLE CONTROLS and STEP LOOPS.

How many bits require in TCP protocol header checksum, In TCP protocol head...

In TCP protocol header "checksum" is of___________? In protocol header of Transfer Control Protocol checksum is of 16 bits.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd