Found 690 Articles for Computer Science

What is T Flip Flop?

Ginni
Updated on 24-Jul-2021 08:22:25

18K+ Views

The T flip-flop is also called toggle flip-flop. It is a change of the JK flip-flop. The T flip flop is received by relating both inputs of a JK flip-flop. The T flip-flop is received by relating the inputs ‘J’ and ‘K’. When T = 0, both AND gates are disabled. Therefore, there is no change in the output. When T= 1, the output toggles.The diagram demonstrates the circuit diagram of a T flip-flop.The truth table of T flip-flop is displayed in the table.QNTQN+1000011101110The logic symbol of the T flip-flop is shown in the figure.

What is D Flip Flop?

Ginni
Updated on 13-Sep-2023 03:58:05

27K+ Views

The D flip-flop is a clocked flip-flop with a single digital input 'D'. Each time a D flip-flop is clocked, its output follows the state of 'D'. The D Flip Flop has only two inputs D and CP. The D inputs go precisely to the S input and its complement is used to the R input.Considering the pulse input is at 0, the outputs of gates 3 and 4 are at the 1 level and the circuit cannot convert state regardless of the value of D. The D input is sampled when CP = 1. If D is 1, the ... Read More

What is J-K Flip Flop?

Ginni
Updated on 24-Jul-2021 08:18:27

8K+ Views

J-K flip-flop can be treated as an alteration of the S-R flip-flop. J represents SET, and 'K' represents CLEAR. In the JK flip-flop, the ‘S’ input is known as the ‘J’ input, and the ‘R’ input is known as the ‘K’ input. The output of the JK flip-flop does not modify if both ‘J’ and ‘K’ are ‘0’. If both the inputs are ‘1’, then the output dial to its free.The figure shows the circuit diagram of a JK flip-flop.The truth table of the JK flip-flop is displayed in the table.SRQN-100QN01010111$\overline{Q_{N}}$The logic symbol for the JK flip-flop is demonstrated in ... Read More

Explain the performance of Addition and Subtraction with signed magnitude data in computer architecture?

Ginni
Updated on 24-Jul-2021 07:21:32

25K+ Views

A signed-magnitude method is used by computers to implement floating-point operations. Signed-2’s complement method is used by most computers for arithmetic operations executed on integers. In this approach, the leftmost bit in the number is used for signifying the sign; 0 indicates a positive integer, and 1 indicates a negative integer. The remaining bits in the number supported the magnitude of the number.Example: -2410 is defined as −10011000In this example, the leftmost bit 1 defines negative, and the magnitude is 24.The magnitude for both positive and negative values is the same, but they change only with their signs.The range of ... Read More

What are the functions of Scheduling Model in computer architecture?

Ginni
Updated on 24-Jul-2021 07:19:57

330 Views

A scheduling system consists of program tasks, a target machine, and a schedule in which a specific performance criterion is optimized.Program Tasks − The characteristics of a parallel program can be defined as the system (T,

What is scheduling problem in computer architecture?

Ginni
Updated on 24-Jul-2021 07:17:45

1K+ Views

The general scheduling problem has been described in different ways in different fields. The classical problem of job sequencing in production management has influenced most of the solutions to this problem, which generally assumes a set of resources that could provide service to a set of consumers. The main objective is to find an efficient policy for managing the access to the resources by the consumers to optimize some desired performance measures.In distributed systems, the scheduling problem arises because the concurrent parts of a program or set of programs must be arranged in time and space so that the overall ... Read More

What are the methods of cache-coherency in computer architecture?

Ginni
Updated on 24-Jul-2021 07:16:21

494 Views

There are two methods of cache-coherency which are as follows −Cache–Memory CoherenceIn a single cache system, coherence between memory and the cache is maintained using one of two policies − (1) write-through, and (2) write-back. When a task running on a processor P requests the data in memory location X, for example, the contents of X are copied to the cache, where it is passed on to P.When P updates the value of X in the cache, the other copy in memory also needs to be updated to maintain consistency. In write-through, the memory is updated every time the cache ... Read More

What is shared-memory model in computer architecture?

Ginni
Updated on 24-Jul-2021 07:13:43

5K+ Views

A shared memory model is one in which processors connects by reading and writing locations in a shared memory that is similarly applicable by all processors. Each processor can have registers, buffers, caches, and local memory banks as more memory resources. Some basic issues in the design of shared-memory systems have to be taken into consideration. These involves access control, synchronization, protection, and security.Access control specifies which process accesses are achievable to which resources. Access control models create the needed check for each access request issued by the processors to the shared memory, against the contents of the access control ... Read More

What is Character Oriented Protocol in computer architecture?

Ginni
Updated on 24-Jul-2021 07:12:44

2K+ Views

The character-oriented protocol is depends the binary code of a character set. The code generally used is ASCII (American Standard Code for Information Interchange). It is a 7-bit code with an eighth bit used for parity. The code has 128 characters, of which 95 are graphic characters and 33 are control characters. The graphic characters involves the upper- and lowercase letters, the ten numerals, and multiple unique symbols.The control characters are used to route information, organizing the test in the desired structure, and for the design of the printed page. The characters that control the transmission are known as communication ... Read More

What is Intel 8089 IOP?

Ginni
Updated on 24-Jul-2021 07:10:27

2K+ Views

The Intel 8089 l/0 processor is contained in a 40-pin integrated circuit package. Within the 8089 are two independent units called channels. Each channel combines the general characteristics of a processor unit with those of a direct memory access controller.The 8089 is designed to function as an IOP in a microcomputer system where the Intel 8086 microprocessor is used as the CPU. The 8086 CPU initiates an l/0 operation by building a message in memory that describes the function to be performed. The 8089 IOP reads the message from memory, carries out the operation, and notifies the CPU when it ... Read More

Advertisements