1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elenna [48]
3 years ago
14

The RESET circuit used on the four 3-Bit Counters analyzed in this activity reset the counts to zero (000). It makes sense for t

he up-counters to start at zero (000), but the down-counters should start at seven (111). What would you need to change so that the 3-Bit Binary Down Counter with J/K Flip-Flops you just created would reset to seven (111)?
Computers and Technology
1 answer:
lianna [129]3 years ago
3 0

Answer:

  • "set" each flop, instead of resetting it
  • invert each flop's output
  • take the output from Q* instead of Q

Explanation:

The question asks how to establish an initial condition of 111 at the output of a 3-bit counter. (It does not ask how to make the counter count down, instead of up.)

The outputs can be made to be 1 by any of several means:

  1. use the "set" input to establish the initial condition, instead of the "reset" input
  2. invert the output of the flip-flop
  3. take the output from Q* (the inverted output) instead of the Q output

__

<em>Additional comments</em>

Note that either of the last two strategies automatically make it a down-counter instead of an up-counter. That is, the next state after 111 will be 110.

Using the first strategy alone does not alter the fact that the counter will count up. That is, the next state of the up-counter after 111 would be 000.

You might be interested in
In ________- key encryption, two keys, known as a key pair, are created, where one key is used for coding and the other key for
Pavel [41]
In Encryption - ........
7 0
3 years ago
A stealth network attack in which an unauthorized person gains access to a network and remains undetected for a long time is ref
polet [3.4K]

Answer:

"Advanced persistent threat " is the right one.

Explanation:

  • APT seems to be a clandestine cyber assault on something like a network connection where another assailant achieves and retains unauthorized knowledge to the communication network, however impossible to conceive for a considerable period.
  • They represent compound channel assaults that use different components including various approaches of attack.
6 0
3 years ago
Write a program consisting of: a. A function named right Triangle() that accepts the lengths of two sides of a right triangle as
Lunna [17]

Answer:

The java program is as follows.

import java.lang.*;

public class Triangle

{

   //variables to hold sides of a triangle

   static double height;

   static double base;

   static double hypo;

   //method to compute hypotenuse

   static double rightTriangle(double h, double b)

   {

       return Math.sqrt(h*h + b*b);

   }

public static void main(String[] args) {

    height = 4;

    base = 3;

    hypo = rightTriangle(height, base);

 System.out.printf("The hypotenuse of the right-angled triangle is %.4f", hypo);

}

}

OUTPUT

The hypotenuse of the right-angled triangle is 5.0000

Explanation:

1. The variables to hold all the three sides of a triangle are declared as double. The variables are declared at class level and hence, declared with keyword static.

2. The method, rightTriangle() takes the height and base of a triangle and computes and returns the value of the hypotenuse. The square root of the sum of both the sides is obtained using Math.sqrt() method.

3. The method, rightTriangle(), is also declared static since it is called inside the main() method which is a static method.

4. Inside main(), the method, rightTriangle() is called and takes the height and base variables are parameters. These variables are initialized inside main().

5. The value returned by the method, rightTriangle(), is assigned to the variable, hypo.

6. The value of the hypotenuse of the triangle which is stored in the variable, hypo, is displayed to the user.

7. The value of the hypotenuse is displayed with 4 decimal places which is done using printf() method and %.4f format specifier. The number 4 can be changed to any number, depending upon the decimal places required.

8. In java, all the code is written inside a class.

9. The name of the program is same as the name of the class having the main() method.

10. The class having the main() method is declared public.

11. All the variables declared outside main() and inside another method, are local to that particular method. While the variables declared outside main() and inside class are always declared static in java.

4 0
3 years ago
Someone plz Help I am desperate.
sasho [114]

It would help if there is a programming language in the context of which you need this answered. For instance in Python you can create a program like this:

print(type("Hello"))

print(type(1337))

print(type(True))

print(type("3.14"))

It will return:

<class 'str'>

<class 'int'>

<class 'bool'>

<class 'str'>

8 0
3 years ago
Anyone know why my pc won’t start up I upgraded my ram and everything seems fine
ser-zykov [4K]

Answer:

RAM Slots

Explanation:

If you upgraded RAM then check if RAM is in correct slots according to the Motherboard Manual, i had the same issue when i replaced my RAM.

4 0
2 years ago
Other questions:
  • What might a programming prefer the top-down approach to programming design?
    10·1 answer
  • If your address is 10 B Street, what are the first three bytes in ASCII
    12·1 answer
  • A bitmap picture can be represented by hexadecimal numbers. Each two-digit hexadecimal number represents a row. To convert a num
    14·1 answer
  • The negotiation by the transport layer at the sender with the transport layer at the receiver to determine what size packets sho
    14·1 answer
  • Mr. Yang is a doctor who regards video games as an effective means of staying fit. What type of game would he recommend to his p
    13·1 answer
  • Which principle of animation deals with imparting a unique identity to the animated character?
    5·1 answer
  • In the formula "=A3/B3", what part of the formula is the "/"?<br><br> A)An operator<br> B)An operand
    5·2 answers
  • A support technician uses the ping utility on a system that is online, yet no response is received. What should be allowed throu
    5·1 answer
  • Create a program which reads in CSV data of Creatures and loads them into aHash Map. The key of this hash map will be the name o
    10·1 answer
  • ravi met few peoples in a party and was mixing up well those wearing expensives clothing and fair complexion . which factors are
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!