1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Furkat [3]
3 years ago
8

Assume a 8x1 multiplexer’s data inputs have the following present values: i0=0, i1=0, i2=0, i3=0, i4=0, i5=1, i6=0, i7=0. What s

hould be value of the select inputs s2, s1 and s0 for the value on the multiplexer’s output d to be 1?
s2=

s1=

s0
Computers and Technology
1 answer:
blagie [28]3 years ago
5 0

Answer: s2=1 s1=0 s0=1

Explanation:

Generally speaking, the multiplexer is a digital circuit , build with combinational logic, that acts like a switch, sending to the output the current value present at the input which order number (in decimal) is equal to the binary combination of the select inputs, expressed in decimal form.

If the multiplexer is 8x1, in order to be able to pass to the output any of the 8 inputs, the number of select inputs (n), must satisfy the following relationship:

M(number of inputs) = 2ⁿ

In this case, as the only input which present value  is "1" ,is the input i5, the value present at the input select must be the binary combination of s₀, s₁

and s₂, that yields the decimal 5, i.e.,  s₀ = 1  s₁ = 0  s₂ = 1.

You might be interested in
In what order does the air flow in a canister vacuum cleaner pass through the following components?
Anika [276]
D filter motor bag and fan
4 0
3 years ago
Why is it important to install updates? Why should you use the Power button on the Start menu instead of the Power button on you
IrinaK [193]

Answer:

Software updates do a lot of things. Software updates offer plenty of benefits. ...

Updates help patch security flaws. Hackers love security flaws, also known as software vulnerabilities. ...

Software updates help protect your data. ...

It’s not all about you. ...

You deserve the latest and greatest

Explanation:

hope that worked

3 0
3 years ago
Mix ‘em Let s1 and s2 be 2 c-strings of the same length. Write a function char* mixem(char*s1, char* s2) which returns a c-strin
Shkiper50 [21]

Answer:

See Explaination

Explanation:

#include <iostream>

#include <string.h>

using namespace std;

char *mixem(char *s1, char *s2);

int main() {

cout << mixem("abc", "123") << endl;

cout << mixem("def", "456") << endl;

return 0;

}

char *mixem(char *s1, char *s2) {

char *result = new char[1 + strlen(s1) + strlen(s2)];

char *p1 = s1;

char *p2 = s2;

char *p = result;

while (*p1 || *p2) {

if (*p1) {

*p = *p1;

p1++;

p++;

}

if (*p2) {

*p = *p2;

p2++;

p++;

}

}

*p = '\0';

return result;

}

5 0
3 years ago
Helllp me you will git 16 points
siniylev [52]

Answer:

False

Hope it helps...

Have a great day :P

8 0
3 years ago
Read 2 more answers
What laws are broken when you hack someone?
postnew [5]

Answer:

it depends

Explanation:

if you are hacking for a purpose that is benefiting the person being hacked, that is ethical hacking. ethical hacking is not illegal, as long as you get permission from the person being hacked.

if you hack someone without their knowledge, that is unethical hacking, and that is in many cases, a crime, and if it has enough of a detrimental effect on a companys process, it could land you into prison and earn you a hefty fine.

ethical hacking is good for testing a networks security, and if all is well, the ethical hacker shouldnt be able to get into a network if it is secured properly.

6 0
3 years ago
Other questions:
  • A company is experiencing overwhelming visits to a main web server. The IT department is developing a plan to add a couple more
    5·2 answers
  • What connects two or more LANs together?
    10·2 answers
  • Which of the following could not be represented by columns in the SPSS data editor? a. Levels of between-group variables. b. Lev
    11·2 answers
  • When was the federal commission act put into effect?????
    13·1 answer
  • Processor is used to process the data.<br>A)true <br>B)False​
    13·1 answer
  • Which of the following is another term for a subfolder​
    14·1 answer
  • Which range of values would result in 10 elements stored in an array?
    13·1 answer
  • The visitor's age is stored in the variable age, the day of the week is stored in a variable day, and the price in dollars is st
    8·1 answer
  • From the PC or Laptop, open a web browser and navigate to cisco. Srv. Open the link titled A small page. What is the message dis
    9·1 answer
  • Question #2
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!