1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Cerrena [4.2K]
3 years ago
9

I want to select between 5 different 2-bit inputs and output it. How many bits do I need to specify which input?

Computers and Technology
1 answer:
miskamm [114]3 years ago
8 0

Answer:

3 select inputs are required to select a specific input between 5 inputs.

Explanation:

Multiplexer is used to select the inputs from different inputs to a single output. There are many types of multiplexers for different number of inputs selection. 1. 2x1 is the type of multiplexer where 2 inputs and 1 output. This is used to select between these inputs. There is one more pin to select the input between these two inputs that is called <em>select </em>input.

2. Another type is 4x1 multiplexer. There are 4 inputs and one output. In this type of multiplexer 2 select pins are used for selection of input bits between these 4 inputs.

For more than 4 inputs and less than 8 inputs, 8x1 multiplexer is used. this multiplexer uses three inputs for selection purpose.

You might be interested in
How do you change between worksheets inside an Excel Workbook?
ad-work [718]

Answer:      c) Click on a different sheet tab at the bottom.

Explanation:    

To change between worksheets inside an Excel Workbook : Click on a different sheet tab at the bottom

3 0
3 years ago
25 pts! If programmers cannot write an algorithm because the problem is too complex, which methodology can they use to reach an
Setler [38]

Answer:

D, most likely thats what I was taught .

3 0
3 years ago
Identify the programmer’s responsibility in maximizing the programs reliability by having awareness of the beneficial and harmfu
trapecia [35]

Programmers can maximize the reliability of their programs by means of functional analysis.

The form in which programmers can <em>maximize</em> the reliability of their programs in accordance with the awareness of the beneficial and harmful impact on society, economies and cultures is how well they did processes of functional analyses, in which they investigate on market and client needs and derive <em>functional</em> and <em>non-functional</em> parameters, which define the scope and characteristics of the program.

A good functional analysis has an influence of about 80 % on success of programs on fulfilling existing needs and solving existing problems with a <em>reasonable</em> efforts.

We kindly invite to check this question on functional analysis: brainly.com/question/23731043

8 0
3 years ago
Each time that you access files on a disk, the monitor blinks or goes blank for several seconds. What might be the source of the
gavmur [86]

Answer:

There is an IRQ conflict, and you need to use Device Manager to resolve the problem.

Explanation:

IRQ is a synonym for "interrupt request line" and are lines which devices use to send interrupt signal to the microprocessor of a device. IRQ conflicts usually occur when a new device is added to a PC, and this can be resolved by setting the IRQ number and you can go about this by going using the Device Manager to resolve this.

3 0
3 years ago
Distinguish between the desktop publishing packages and multimedia packages​
maksim [4K]

Answer:

___________________________________________________________

Word processing software is used for working with text, while desktop publishing software involves production of documents that combine text with graphics. DTP software is perfect for making flyers, brochures, booklets. This type of software is usually more advanced than word processing apps.

___________________________________________________________

4 0
3 years ago
Other questions:
  • Which of the following is an advantage of using proprietary licensed software? The software’s source code can be easily modified
    7·2 answers
  • Which port-authentication network access control standard forces devices to go through a full authentication, authorization, and
    13·1 answer
  • When discussing the data-modeling building blocks, anything (a person, a place, a thing, or an event) about which data are to be
    15·1 answer
  • FILL IN BLANK FOR THE POINTS!!!!!!
    8·1 answer
  • A(n ____ is information that a web server stores on a client computer, such as the client’s preferences when accessing a particu
    15·1 answer
  • Greg wants to check the amount of requests his website receives. What test can he use?
    6·1 answer
  • Which of the following is NOT a type of insurance fraud?
    14·2 answers
  • Can someone tell me what this means Higfaa
    6·1 answer
  • Pls awnser I will mark brainliest as soon as possible
    13·2 answers
  • I will make you brainless Just answer this question!!
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!