Working of read-only memory, Computer Engineering

Assignment Help:

Q. Working of Read-Only Memory?

A ROM is fundamentally a memory or storage device in which a fixed set of binary information is stored. A block diagram of ROM is as displayed in Figure. It comprises n input lines and m output lines. Every bit combination of input variables is known as an address. Every bit combination which comes out of output lines is known as a word. Total number of bits per word is equal to number of output lines m. Number of distinct addresses possible with n input variables is 2n.

79_Working of Read-Only Memory.png

Figure: ROM

A ROM is characterised by number of words (2n ) and number of bits (m) per word. For illustration a 32 × 8 ROM that can be written as 25 × 8 comprises 32 words of 8 bit each that means there are 8 output lines and 32 distinct words stored in unit. There are only 5 input lines since 32 = 25and with 5 binary variables we can specify 32 addresses.  

A ROM is fundamentally a combinational circuit and can be constructed as displayed in Figure below. On applying an Input I1 = 0, I2 = 0 the 00 line of decoder is selected and we will get O1 = 0 and O2 = 1 on applying I1 = 0 and I2 = 1 we will obtain O1 = 1 AND O2 = 0. This same logic can be used for creating larger ROMs.


Related Discussions:- Working of read-only memory

Signalling connection control part and message transfer part, The Signallin...

The Signalling connection control part (SCCP) and message transfer part (MTP) together are referred to as (A) Signal Switching Points (SSPs) (B)  Signal Transfer Points

Explain direct memory access, Explain Direct Memory Access. A modest en...

Explain Direct Memory Access. A modest enhances in hardware enables an IO device to transfer a block of information to or from memory without CPU intervention. This task needs

Vector, Explain the characteristics of vector processing

Explain the characteristics of vector processing

Advantages offered by data mining, Advantages offered by Data Mining: 1...

Advantages offered by Data Mining: 1.  Facilitates discovery of knowledge from big, massive data sets. 2.  Can be used within dissimilar application areas by Fraud detection

Machine centred versus human centred, Machine Centred versus human Centred ...

Machine Centred versus human Centred The discussion here is based on the difference in approach to the design of the work system when we prioritise either the needs of the mac

Visual basic application, Name the platforms by which visual basic applicat...

Name the platforms by which visual basic applications are available? Ans) Most of the visual basic applications are available on 32 bit Intel platforms. These applications also

Advantage and disadvantage of threaded binary trees, Advantage  1.     ...

Advantage  1.       By doing threading we neglect the recursive method of traversing a Tree , which makes use of stack and consumes many memory and time . 2.       The node

What is imprecise and precise exception, What is imprecise and precise exce...

What is imprecise and precise exception? Situation in which one or more of the succeeding instructions have been implemented to completion is known as imprecise exception. Situ

Interaction between the dynpro and the abap/4, How does the interaction bet...

How does the interaction between the Dynpro and the ABAP/4 Modules takes place? -A transaction is a collection os screens and ABAP/4 routines , controlled and implemented by a

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd