Dale - Computer Science Illuminated 140

Dale - Computer Science Illuminated 140 - 2. There are many...

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
35. Name six properties of Boolean algebra and explain what each means. 36. Differentiate between a half adder and a full adder. 37. What is the Boolean expression for a full adder? 38. What is a multiplexer? 39. a. Circuits used for memory are which type of circuits? b. How many digits does an S-R latch store? c. The design for an S-R latch shown in Figure 4.12 guarantees what about the outputs X and Y? 40. What is an integrated circuit or chip? 41. Define the abbreviations SSI, MSI, LSI, and VLSI. 42. In the chip shown in Figure 4.13, what are the pins used for? 43. Draw a circuit using two full adders that adds two two-bit binary values. 44. How can the XOR operation be expressed using other operators? Thought Questions 1. Throughout this chapter we have used Boolean expressions, truth tables, and logic diagrams to describe the same behavior. Is the rela- tionship among these notational methods clear to you? Which do you find is the most intuitive? Which do you find the least intuitive?
Background image of page 1
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: 2. There are many situations that can be described by the ideas in this chapter, for example, the operation of a single light switch or a light that has two switches. Can you think of other everyday occurrences that can be described by the notational methods presented in this chapter? 3. Have you ever sent e-mail to someone only to regret it immediately? Do you find that you would say something in e-mail that you would never say in person? Consider the premise E-mail has lowered the civility of personal discourse. Do you agree or disagree? 4. If a person sends e-mail from a school computer or a business computer, should that message be considered private? Does the insti-tution or person that owns the computer from which e-mail is sent have a right to inspect the message? 5. Do you consider reading someone elses e-mail as less of an invasion of privacy than reading someones ordinary mail? ? Thought Questions 113...
View Full Document

Ask a homework question - tutors are online