1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BabaBlast [244]
3 years ago
9

Suppose you are given an unknown chip which could be any one of the of the following: 7400, 7402, 7404, 7408, 7410, 7420, 7427,

7432, 7486. You must prepare a detailed, logical, efficient plan to identify your chip without damaging it. Hint: "Try all the input combinations for all the chips until I find the right one" is not a detailed, logical, efficient plan. Detail which wires you will connect to where. (i.e. which pin will you give 5V? Which Pin will you give Ground? Which Pin is connected to switch 1? Which Pin is LED1? What actions will you perform to eliminate or verify a given chip type? Be detailed!). A decision tree can be a useful tool as part of your plan. You still need to list steps, but you can refer back to your decision tree as part of your plan. Prelab: Have a well thought out plan for your experiment. This should be typed with detailed instructions for how you plan to run your experiment to identify unknown chips. This plan should take up at least a page of typed out instructions. In the Lab: The TA will give you 2 chips each labeled with a letter. You

Computers and Technology
1 answer:
Olenka [21]3 years ago
3 0

The answer & explanation for this question is given in the attachment below.

You might be interested in
The set of specific, sequential steps that describe exactly what a computer program must do to complete the work is called a(n)
nataly862011 [7]

Answer:

D). Algorithm

Explanation:

The set of specific, sequential steps that describe exactly what a computer program must do to complete the work is called an algorithm.

From the question, it is clear the correct option is algorithm.

In simple terms, to solve a problem the set of rules to follow is called algorithm. Algorithm in computer programming describes the steps that explains not only the task that needs to be performed, but also how to do it.

In algorithm, the steps are needed to be in the right sequence.

6 0
3 years ago
Read 2 more answers
Digital security measures include _____. Select 2 options.
elixir [45]

Answer:

firewalls

passwords

8 0
3 years ago
Read 2 more answers
Example 4-1: The styles for the main content of an HTML document main { clear: left; } main h1 { font-size: 170%; } main h2 { fo
jek_recluse [69]

Answer:

The clear property stops floating of the main element to the right of the preceding block elements

Explanation:

The clear property specifies that which sides of the elements floating element are not allowed to be float.

It returns or sets the positions of an element in relation to the floating objects. If an element can be fitted horizontally in space next to other elements which is floated.

Syntax:

clear: none | left | right | both | initial;

6 0
3 years ago
Built-in user accounts include only the Administrator account created during Windows installation True False
Semenov [28]

Answer: True

Explanation:

When an OS is installed, the first account created is the built -in user account. It is the administrator account for the purpose of recovery and to facilitate the set up.

8 0
3 years ago
If you’re storing some personal information like Debit/Credit card numbers or Passwords etc, on different sites for running you’
nata0808 [166]

Answer:

cookies are stored on client side.

A hacker would need access to your computer, either by physically reading the cookie data or by means of cross-site scripting.

Other than that, cookies should not contain passwords or credit card numbers, just things like preferences or session identifiers.

3 0
3 years ago
Other questions:
  • How do you know what memory to purchase for your computer?
    10·1 answer
  • How can you put a video on powerpoint?
    14·2 answers
  • Why is personal responsibility important when considering technology?​
    14·2 answers
  • 11. What is the hexadecimal representation of each of the following binary numbers? a. 1100 1111 0101 0111
    6·1 answer
  • Do you see traffic flowing from the internet into your system or from your network to the internet? explain why or why not:
    6·1 answer
  • What is the decrypted binary
    9·1 answer
  • Complete the GiftCard class shown below. A GiftCard keeps track of the current balance on the card. A gift card starts with a be
    11·1 answer
  • Write a program that computes how much each person in a group needs to pay (after tax and tip) when splitting the bill equally.
    5·1 answer
  • 4. Arnold curates articles that feature trending lists for an online website. His department is responsible
    5·1 answer
  • What is an example of new technology having a positive impact on sustainability?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!