1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Furkat [3]
3 years ago
8

Assume a 8x1 multiplexer’s data inputs have the following present values: i0=0, i1=0, i2=0, i3=0, i4=0, i5=1, i6=0, i7=0. What s

hould be value of the select inputs s2, s1 and s0 for the value on the multiplexer’s output d to be 1?
s2=

s1=

s0
Computers and Technology
1 answer:
blagie [28]3 years ago
5 0

Answer: s2=1 s1=0 s0=1

Explanation:

Generally speaking, the multiplexer is a digital circuit , build with combinational logic, that acts like a switch, sending to the output the current value present at the input which order number (in decimal) is equal to the binary combination of the select inputs, expressed in decimal form.

If the multiplexer is 8x1, in order to be able to pass to the output any of the 8 inputs, the number of select inputs (n), must satisfy the following relationship:

M(number of inputs) = 2ⁿ

In this case, as the only input which present value  is "1" ,is the input i5, the value present at the input select must be the binary combination of s₀, s₁

and s₂, that yields the decimal 5, i.e.,  s₀ = 1  s₁ = 0  s₂ = 1.

You might be interested in
what happens when you double-click on a file with an extension that represents an executable program?
Vlada [557]

Answer:

it will execute the file

Explanation:

3 0
4 years ago
Which statement describes what happens if multiple users make changes simultaneously to a presentation when coauthoring?
Marina CMI [18]

Answer:

3.

Explanation:

Co-authoring in PowerPoint is sharing a presentation and allowing your colleagues to work on it at the same time. This option of co-authoring is available when you share or save your file on OneDrive or SharePoint.

The perk of co-authoring a presentation is that PowerPoint keeps a record of all edits under the name of the author. This keeps the conflicts away.

Therefore, the correct answer is option 3.

8 0
3 years ago
4-Translate the following C program to MIPS assembly program (Please explain each instruction in your code by a comment and subm
earnstyle [38]

Answer:

.data

str1: .asciiz "Hello"

str2: .asciiz "mars"

msg: .asciiz "String after the concatenate: "

.text

main:

#load the address str1 to $a0

la $a0,str1

#initialize $t0 with 0

li $t0,0

#loop to find the length of str1

#$t0 stores the length of str1

loop1:

#load byte of $a0 to $t1

lb $t1,0($a0)

#branch for equal.If $t1 equal to 0,jump to label stop1

beq $t1,0,stop1

addi $t0,$t0,1 #increase the count

addi $a0,$a0,1 #increase the address

#jump to label loop1

j loop1

stop1:

#load the address of str2 to $a1

la $a1,str2

#loop2 concatenate the each element in str2 to str1

loop2:

lb $t2,0($a1) #load character in str2 to $t2

sb $t2,0($a0) #store value in $t2 to str1

beq $t2,0,stop2

addi $a1,$a1,1 #increase the address of str2

addi $a0,$a0,1 #increase the address of str1

j loop2

stop2:

#syscall for print string is $v0 = 4

#syscall to termiante the program is $v0 = 10

#print the message

li $v0, 4

la $a0, msg

syscall

#print the concatenated string

li $v0,4

la $a0,str1

syscall

#termiante the program

li $v0, 10

syscall

Explanation:

3 0
3 years ago
To what competitive force did the printed encyclopedia industry succumb? 1. Substitute products or services 2. Increased bargain
Nikolay [14]

Answer:

Option 1 i.e., Substitute products or services.

Explanation:

The printed encyclopedia industrial sector lost to the economic power of replacing goods or services.

In the industrial countries, the current economic situation is not feasible in terms of its consumption of products as per capita. The ' service economy ' applies not only for the tertiary sector but for an economy in which businesses generate the balance of income, and most workers are also in service operations.

7 0
4 years ago
Discuss the major procedures that investigators must use in order to collect network trace evidence of computer-related crimes.
frez [133]

Answer:

The answer is below

Explanation:

The major procedures that investigators must use to collect network trace evidence of computer-related crimes include the following:

1. Establish appropriate guidelines to follow: before starting the actual investigation, all the legal procedures and instructions to follow must be clearly stated and shown to everybody involved in the investigation process.

2. Assess the Evidence: the investigators must assess all the available evidence by checking the computer through a specific means. The assessment includes checking of hard drives, email accounts, social networking sites, or similar digital prints that can be used as proof of the criminal activities

3. Acquire the Evidence: here the investigators must find an appropriate means of gathering the evidence formally and legally. This may involve the removal of any form of hardware such as hard drives, and software-related items that can be extracted.

4. Examine the Evidence: this involved examination of the acquired evidence, to determine if it can be used as proof or not. This involved analyzing the evidence to check if they correlate with the criminal activities under investigation. Some of the things to check include, date of formation of the evidence, the names attached to it, the routes those data were sent or received from, etc.

5. Prepare a report and document them appropriately: this involved the proper detailing and recording of the information derived from the evidence. It includes the time of evidence examination and methods used in examining them. Also, the means at which they acquired the evidence among others.

8 0
3 years ago
Other questions:
  • The two types of one-time-password tokens are ______ and ______.
    10·2 answers
  • A __________ network is good for connecting computer clusters.
    13·2 answers
  • What is 1 and 3/4 in grams?
    13·2 answers
  • What is Mainframe computer​
    14·1 answer
  • Which option is used to apply formatting to multiple objects on a single slide while still maintaining the ability to manage the
    14·2 answers
  • Which statement about comments is false? Select one: a. Lengthy comments can cause poor execution-time performance. b. Comments
    7·1 answer
  • GUYS PLEASEEEE HELP !!!
    12·2 answers
  • Identify the normalized form of the mantissa in 111.01.
    14·1 answer
  • A bot can use a _______to capture keystrokes on the infected machine to retrieve sensitive information.
    10·1 answer
  • Please please help ASAP it’s timed
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!