1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pantera1 [17]
3 years ago
13

(10 points) A stopwatch has three states named Zero, Running, and Stopped. There are two buttons, named B1 and B2. For each butt

on, pressing the button produces a 1 and not pressing the button produces a 0. B1 works as follows: If the stopwatch is in the Zero state, pressing B1 causes it to advance to the Running state. If the stopwatch is in the Running state, pressing B1 causes it to advance to the Stopped state. If the stopwatch is in the Stopped state, pressing B1 causes it to return to the Running state. Pressing B2 has no effect unless the stopwatch is in the Stopped state, in which case pressing B2 (even if B1 is pressed) causes the stopwatch to go to the Zero state. Design a finite state machine controller for this stopwatch that has two inputs (B1 and B2) and three outputs, one for each of the three states. The state of the controller uses two J-K flip-flops.

Computers and Technology
1 answer:
solniwko [45]3 years ago
6 0

Answer:

see explaination

Explanation:

State Diagram based on given in the problem and state table, k-map for j and k, based j and k expressions we can draw the (FSM )controller using j and j flip flop.

see attachment for this.

You might be interested in
HELP ME PLEASE
MAXImum [283]

Explanation:

Threats

Computer Security Threats are possible dangers that can affect the smooth functioning of your PC. These may be a small piece of adware or a harmful Trojan malware. In the present age, computer security threats are constantly increasing as the world is going digital. computer security threats

Types of Computer Security Threats

There are several types of computer security threats such as Trojans, Virus, Adware, Malware, Rootkit, hackers and much more. Check some of the most harmful types of computer Security Threats.

COMPUTER VIRUS

A Computer Virus is a malicious program, which replicates itself and infects the files and programs of your PC and can make them non-functional.

COMPUTER WORMS

A self-replicating computer program that spreads malicious codes, computer worms make use of the network to send copies of the original codes to other PCS. It can also go to the extent of sending transferring documents utilizing the email of the user.

SCAREWARE

Scareware is a malware that tricks victims to buy software by displaying fake virus alerts. A scareware infected PC may get pop-ups of fake malware threats and to get rid of those, users are prompted to purchase a fake anti-malware software.

KEYLOGGER

Also known as a keystroke logger, Keyloggers can track the real-time activity of a user on his computer. Keylogger runs in the background and records all keystrokes made by a user and passes the information to the hacker with the motive to steal password and banking details.

ROOTKIT

A rootkit is considered extremely dangerous as they appear to be legitimate files and deceives the computer user. Rootkit masks viruses and worms and makes them appear as necessary files. These are very difficult to remove and only an antivirus with the anti-rootkit feature can remove a rootkit.

Tips for Best Computer Security

For best computer security, you must follow certain guidelines, which are also called computer best practices. 1. Use the best antivirus software, which not only provides protection to your PC but also internet protection and guards against cyber threats. 2. Do not download untrusted email attachments and these may carry harmful malware. 3. Never download software from unreliable sites as they may come with a virus that may infect your system as soon as you install the software.

4 0
2 years ago
9. Question
Gennadij [26K]
A server stopped provide service to 100 users
5 0
2 years ago
What are 3 ways to get friends to stop texting and driving?
Leni [432]
Not allow them to use their phone, tell them you won’t get in the car with them unless they stop texting and driving, inform their parents
3 0
3 years ago
Read 2 more answers
You are running an 802.11g wireless router in mixed mode. You have three 802.11g wireless NICs connected to the router. A new us
notka56 [123]

Complete Question:

You are running an 802.11g wireless router in mixed mode. You have three 802.11g wireless NICs using the router. A new user connects using an 802.11b wireless NIC. What will happen?

Group of answer choices.

A. The user with 802.11b will access the network at 11Mbps while the users with 802.11g will access the network at 54 Mbps.

B. The user with 802.11b will not be able to communicate on the network.

C. The user with 802.11b will access the network at 11 Mbps. The users with 802.11g will access the network at 54 Mbps unless they are communicating with the 802.11b device,which will be at 11 Mbps.

D. All users will access the network at 11 Mbps.

Answer:

D. All users will access the network at 11 Mbps.

Explanation:

A 802.11g is one of the wireless network standards developed by the Institute of Electrical and Electronics Engineers (IEEE) which operates on a 2.4 GHz microwave bandwidth and as a result can only transmit over a short distance. The 802.11g has a data transfer rate or throughput of 54 megabits per seconds (Mbps).

Basically, the 802.11b is a similar standard to the 802.11g wireless standard that typically allows the transmission (transfer) of data for up to 11 megabits per seconds (Mbps).

In this scenario, you are running an 802.11g wireless router in mixed mode. You have three 802.11g wireless NICs using the router. A new user connects using an 802.11b wireless NIC.

Hence, what will happen is that, all the users will access the network at 11 Mbps.

6 0
2 years ago
What is the best thing about Tuesday’s in general? Why?
Stolb23 [73]

Answer:

tbh I really don't know what you mean

4 0
3 years ago
Other questions:
  • In the two-level directory, if a user refers to a particular file then__________________ Select one: a. only his/her own UFD (us
    7·1 answer
  • Lonic compounds are also known as <br> a. salts <br> b. valence <br> c.organic <br> d.elements
    10·2 answers
  • Pascal's Triangle is a triangular array in which every number represents the
    15·1 answer
  • Computer is created by aliens?!
    14·1 answer
  • You are a network administrator. Your company recently approved of employees working from home one day a week and the use of emp
    7·1 answer
  • Enter key is also known as Return key. (True or false)
    13·2 answers
  • Calculate the cash available to retire debt for each of the six months. There is cash available to retire debt if there is a cas
    8·1 answer
  • Help easy 50 points!!!!<br> How do i make someone be the brianliest? No crown thing is appering!!!!
    10·2 answers
  • As a student, how can you sustain focus and attention with technology distracting you from things that matter (academic, persona
    7·1 answer
  • 6. A rental car agency classifies the vehicles it rents into four categories: compact, midsize, full-size, and sport utility. Th
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!