1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kipish [7]
3 years ago
14

Write extensively on logic gate. very long statement. pls oo am begging

Computers and Technology
1 answer:
astraxan [27]3 years ago
3 0

Logic NAND gate circuit symbol The AND and NAND gates are possibly the most widely used form of logic gate that are used . Of the two the NAND gate is the most widely seen . OR / NOR : OR gates and NOR gates are another form of logic gate that form one of the basic building blocks of digital technology .

Applications of Logic Gates They are basically used in circuits involving computation and processing . They are also used in push button switches . E.g. Door Bell . They are used in the functioning of street lights .

A logic gate is an idealized model of computation or physical electronic device implementing a Boolean function , a logical operation performed on one or more binary inputs that produces a single binary output .

Plss Mark as brainlest!!!

Thanks follower!!! <3

You might be interested in
??????????????????????????
suter [353]

Answer:

procedimento

Explanation:

faz se a montagem conforme mostra a figura.

6 0
3 years ago
While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The changes
rjkz [21]

While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The changes did not solve the problem and were not saved. The technician can<u> Issue the reload command without saving the running configuration.</u>

Explanation:

  • The technician does not want to make any mistakes trying to remove all the changes that were done to the running configuration file.
  • The solution is to reboot the router without saving the running configuration. The copy startup-config running-configcommand does not overwrite the running configuration file with the configuration file stored in NVRAM, but rather it just has an additive effect.
  • Configuration change control is a set of processes and approval stages required to change a configuration item's attributes and to re-baseline them.
  • Configuration status accounting is the ability to record and report on the configuration baselines associated with each configuration item at any moment of time.
  • The Manage System Configuration screen allows you to download, save, switch, revert and delete system configuration files.
  • Configuration Control is the activity of managing the product and related documents, throughout the lifecycle of the product.

6 0
3 years ago
Which option in Outlook allows a user to look at multiple calendars in a side-by-side fashion?
Thepotemich [5.8K]

Answer:

Its A

Explanation:

I just took the review

8 0
4 years ago
Read 2 more answers
(Print distinct numbers) Write a program that reads in integers separated by a space in one line and displays distinct numbers i
irina [24]

Answer:

Following are the program to the given question:

num = input("Enter numbers: ")#defining a variable num for input value  

list1 = num.split()#defining a list1 that adds value in list1  

list2 = []#defining an empty list list2

for j in range(len(list1)):#defining a for loop that checks the list value in range  

   if not list1[j] in list2:# use if block that checks multiple value

       list2.append(list1[j])#add value in list2

print("The distinct numbers are: ")#print message

for j in range(len(list2)):#defining for loop for print list value

   print(list2[j])#print list value

Output:

Enter numbers: 1 22 55 7 22 1 1 2 3

The distinct numbers are:  

1

22

55

7

2

3

Explanation:

In the above-code, a "num" variable is defined, that takes inputs from the console screen, and in the next step, "list1 and list2" is defined. In the "list1" it adds num variable value a into the list.

In the next step, a for loop is defined that checks the list value in range , and define an if block, that checks multiple value and add value into the list2, and in the next step, the for loop is defined that prints the list2 values.    

6 0
3 years ago
In ipv4, datagram fragment might be fragmented again at the next router. re-assembly of these sub-fragments is handled by?
s2008m [1.1K]

In IPv4, the following router could fragment the datagram fragment once more. This sub-fragment reassembling is done by the first router.

<h3>What is ipv4?</h3>
  • The fourth iteration of the Internet Protocol is known as IPv4.
  • The Internet and other packet-switched networks use it as one of its primary core protocols for internetworking.
  • The first production-ready release of IPv4 was made available on the SATNET in 1982 and the ARPANET in January 1983.
  • A protocol for usage on packet-switched Link Layer networks is the Internet Protocol version 4 (IPv4) (e.g. Ethernet).
  • A capacity of roughly 4.3 billion addresses is offered by IPv4.

To learn more about ipv4, refer to:

brainly.com/question/28432421

#SPJ4

5 0
2 years ago
Other questions:
  • A company has decided to re-introduce a retro-radio by reproducing a product that was manufactured in the 1940s. The company has
    5·1 answer
  • If the boolean expression a is true and b is false, the value of the logical expression a or b is ________.
    14·1 answer
  • Create a security management policy that addresses the management and the separation of duties throughout the seven domains of a
    6·1 answer
  • ______ is the software that prevents people from being able to access your personal information.
    8·2 answers
  • Big data refers to huge collections of data that are difficult to process, analyze, and manage using conventional data tools. It
    13·1 answer
  • Explain in details three security countermeasures you know.​
    10·1 answer
  • How is modern technology developed? Explain.
    14·2 answers
  • Why would we need to consider implementing our business blockchain application not on Bitcoin but Ethereum?
    5·1 answer
  • Write a statement that calls a function named IncreaseItemQty, passing the variable addStock. Assign mugInfo with the value retu
    12·1 answer
  • Here you guys go im back didnt die or any thing gg for who ever gets this
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!