Description
I have a electrical engineering assignment who can help me with this
please check this attachment i need A++ Quality work.
Complete all these question and please correct work.
Unformatted Attachment Preview
Homework 3
1. Design a four input gate: [(a+b+c)d]’.
(1) Show the transistor level schematic of your design.
(2) Order the inputs so that the gate can be implemented using a single strip pdiff and
single strip ndiff.
(3) Show the stick diagram of the gate.
(4) Size the transistors so that each PDN and PUN has the same resistance as an
inverter with 2:1 PMOS and NMOS size;
(5) Estimate the minimum height and width of the gate from the stick diagram.
(6) Which input patterns give the longest tphl and tplh?
(7) Which input patterns give the shortest tphl and tplh?
2. Consider the following circuit.
a. What is the logic function implemented by the CMOS transistor network? Size
the NMOS and PMOS so that the output resistance is the same as that of an
inverter with an NMOS W/L=1 and PMOS W/L=2.
b. What are the input patterns that give the worst case tpHL and tpLH. State clearly
what are the initial input patterns and which inputs has to make a transition in
order to achieve this maximum propagation delay. Consider the effect of the
capacitances at the internal nodes.
c. If P(A=1)=0.5, P(B)=1=0.2, P(C=1)=0.3, and P(D=1)=1, determine the power
dissipation in the logic gate. Assume VDD=2.5V, Cout = 30fF and fclk = 250MHZ.
3. Compare two different implementations of a 6 input AND circuit: O=ABCDEF. First,
implement it as a 6 input NAND gate plus an inverter. Second, implement it using 3input NAND gates and 2-input NOR gates. For both implementations, perform the
following tasks:
(1) Draw the stick diagram and estimate the size. Assume that the height of the standard
cell is 12 tracks and all cells are place in the same row. (Tips: Try to share contacts as
much as possible.)
(2) Estimate the minimum width of your design.
(2) Identify the input patterns that give the best and worst propagation delay.
4
4.
Purchase answer to see full attachment
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Review
Review
Anonymous
This is great! Exactly what I wanted.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
Colorado Northwestern Community College Engieneering Essay
One of the big challenges with cloud-based reputation checks is performance. Users do not typically want to wait a few sec ...
Colorado Northwestern Community College Engieneering Essay
One of the big challenges with cloud-based reputation checks is performance. Users do not typically want to wait a few seconds while the reputation of potential URLs is checked. Most of us have come to expect that websites are at the immediate tips of our fingers and that access and loading of the content should take place rapidly and immediately. This presents a tricky security problem. Since the reputation service exists in the cloud, the challenge can be summed up as, “How can a reputation be securely retrieved without slowing Web access down so much as to create a poor user experience?"
Colorado Northwestern Community College Financial Markets Calculations Problems
Maple Aircraft has issued a 4¾% convertible subordinated debenture due 3 years from now. The conversion price is $47.00 a ...
Colorado Northwestern Community College Financial Markets Calculations Problems
Maple Aircraft has issued a 4¾% convertible subordinated debenture due 3 years from now. The conversion price is $47.00 and the debenture is callable at 102.75% of face value. The market price of the convertible is 91% of face value, and the price of the common is $41.50. Assume that the value of the bond in the absence of a conversion feature is about 65% of face value. In the absence of the conversion feature, what is the current yield and yield to maturity? What is the conversion ratio of the debenture? If the conversion ratio were 50, what would be the conversion price? What is the conversion value? At what stock price is the conversion value equal to the bond value? Can the market price be less than the conversion value? How much is the convertible holder paying for the option to buy one share of common stock? By how much does the common have to rise after 3 years to justify conversion?Please explain your answer in detail and provide in-text citations.*Please refer to the Grading Criteria for Professional Assignments in the University Policies for specific guidelines and expectations.
ET 310 Grantham Week 5 Circuit Sinusoidal Steady State Analysis Lab Report
Circuit Analysis – Week #5 LabSinusoidal Steady State AnalysisThis week’s lab is based on the sinusoidal steady state ...
ET 310 Grantham Week 5 Circuit Sinusoidal Steady State Analysis Lab Report
Circuit Analysis – Week #5 LabSinusoidal Steady State AnalysisThis week’s lab is based on the sinusoidal steady state analysis using capacitive and inductive circuits in Multisim. You will learn to utilize Multisim to perform the mesh analysis.1. In the frequency domain circuit below, determine the currents I1, I2 and I3.2. Switch the places of capacitor and inductor and repeat step 2 to determine the currents.3. Record the values in the table below:Current I1Current I2Current I3
CYB 200 SNHU Definition of Threat Actor Project
CYB 200 Project Three Guidelines and Rubric
Overview
One of the three focus projects for this course is the creation of ...
CYB 200 SNHU Definition of Threat Actor Project
CYB 200 Project Three Guidelines and Rubric
Overview
One of the three focus projects for this course is the creation of a technical brief based on research you’ve conducted. The audience for this brief is the
security/IT director for a fictional organization at which you are employed for the purposes of this assignment. This technical brief will serve as the basis for a
proactive adversarial detection plan that your director will be creating. The final product represents an authentic demonstration of competency because, as a
security analyst, you will need to be able to develop skills that employ a variety of methods and tools necessary to detect, characterize, and counter cyber threat
actors. Your work will contribute to larger team projects across your organization. This project will also help position you to cultivate an important mind-set:
thinking responsibly, proactively, and in terms of what threat actors would do to attack organizational assets.
The project incorporates one milestone, which will be submitted in Module Five. The project will be submitted in Module Seven.
In this assignment, you will demonstrate your mastery of the following course competency:
CYB-200-02: Develop reliable, ethical methods to detect, characterize, and counter cyber threat actors
Scenario
In a course announcement, your instructor will provide you with some scenarios for you to choose from. You will situate yourself as the security analyst in one of
the provided scenarios, creating a technical brief that explains to the security/IT director how the situation informs the larger proactive adversarial detection
plan that he or she is writing for the organization. You do not require specific technical information from the system at hand, as the results or determinations are
supplied for you within the scenario. Rather, you should address each critical element in the Project Three prompt, speaking broadly to what your best-practice
tactics or methods would be, based on your research from the decision aid you completed as the milestone for this project. The Conclusion section of this
activity requires you to extrapolate on all the research you have done for the decision aid.
Prompt
In your technical brief, you must address the critical elements listed below. The codes shown in brackets indicate the course competency to which each critical
element is aligned.
I. Introduction
A. Identify your threat actors and characterize their motivations or desired outcomes. Use research from the Project Three resource guide or
decision aid to support your response. For example, is the threat actor gathering information for financial gain? [CYB-200-02]
1
II. Analysis
A. Describe best practices or methods for detecting the threat actors from the scenario. Use research from the Project Three resource guide or
decision aid to support your response. [CYB-200-02]
B. Describe ethical and legal factors that should be considered and their significance in terms of the company for which you are employed in the
scenario. Use research from the Project Three resource guide or decision aid to support your response. [CYB-200-02]
C. Describe at least one tactic or method that is important in responding to and countering this threat actor. Use research from the Project Three
resource guide or decision aid to support your response. [CYB-200-02]
D. Describe at least one tactic or method that would be employed to reduce the likelihood of the same situation happening again. Use research
from the Project Three resource guide or decision aid to support your response. [CYB-200-02]
III. Conclusion
A. Explain the potential ramifications of the tactics or methods you have suggested. Use research from the resource guide or decision aid to
support your response. [CYB-200-02]
Key Deliverables
Deliverable Module Due Grading
Project Three Milestone: Decision Aid Five Project Three Milestone Rubric
Project Three: Technical Brief Seven Project Three Rubric
Project Three Rubric
Guidelines for Submission: Your submission should be approximately 2 pages in length (plus a cover page and references) and should be written in APA format.
Use double spacing, 12-point Times New Roman font, and one-inch margins. Include at least three references, which should be cited according to APA style
14 pages
Attachment 2 Revised
Declaration: By submitting this assessment (Parts 1 – 4) for marking I declare that it is entirely my own work. I unders ...
Attachment 2 Revised
Declaration: By submitting this assessment (Parts 1 – 4) for marking I declare that it is entirely my own work. I understand that falsely claiming ...
Leadership Actions of Management Versus Actions of Warren Anderson Paper
2P1: What do you do to demonstrate your commitment?What do you do on a day-to-day basis to demonstrate your commitment to ...
Leadership Actions of Management Versus Actions of Warren Anderson Paper
2P1: What do you do to demonstrate your commitment?What do you do on a day-to-day basis to demonstrate your commitment to safety, quality, and environmentalmanagement, or to help promote the safety program culture?Post an original discussion response, . 2CT1: Where did Union Carbide's Leadership StandRead the attached article.Warren Anderson Died Unpunished Survivors of Bhopal Gas Tragedy SayConsider the module reading in comparison to the actions of Warren Anderson.Create a one-page creative graphic that summarizes what the leadership actions of management should be versus the actions of Warren Anderson.Include the following:Title / TopicA concise statement of your comparison between what the leadership actions of management should be versus the actions of Warren Anderson.Three or more quotations or paraphrase from the two text that relates to your comparison.An analytical response to each quotation or paraphrase.Two or more graphic representations or visuals that interpret the quotations or paraphrase.You may use Microsoft Word or PowerPoint, or if you are feeling adventurous you can create a free account at Pictochart.com! Remember though ... keep it to ONE PAGE!Warren Anderson died unpunished, survivors of Bhopal gas try .. Read more at: http://timesofindia.indiatimes.com/articleshow/44998406.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppstWarren Anderson died unpunished, survivors of Bhopal gas try .. Read more at: http://timesofindia.indiatimes.com/articleshow/44998406.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppstWarren Anderson died unpunished, survivors of Bhopal gas try .. Read more at: http://timesofindia.indiatimes.com/articleshow/44998406.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppstWarren Anderson died unpunished, survivors of Bhopal gas try .. Read more at: http://timesofindia.indiatimes.com/articleshow/44998406.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst
Similar Content
Logic Designs Iterative Circuits Question
1) Draw an iterative circuit that compares three 4-bit numbers and produces output 1 if they are
equal. Provide the logic ...
Engineering Question
In an activated sludge tank it is best if the microorganisms have:less food than they need so that all the food is gone.mo...
Ohio State University Operational Amplifiers Questions
Not really sure how to approach this problem, guidance appreciated...
IRSC Construction Entrepreneurs Marketing and Advertising Plans Paper
? TOPIC: entreprenuer plans for marketing and advertising in todays market with social media and other forms of digital ma...
Estimation
I want someone to help me with a simple estimates of the tasks listed in the document attached, thank you....
Why Engineering Management Is Different than MGT Why Is This Field Needed Discussion
Create your argument for why engineering management is different than management. Whyis this field needed?...
Lab Report Stop Watch Time Study
The objective of this laboratory experiment is to gain stopwatch-timing skills, understand effective time study calculatio...
Responses
I agree with you, Alan Fairfield, on your definition of a system. You state that it involves interdependence and interacti...
Components of an Engine
Spark Plug-As mentioned earlier, gasoline engines make use of a spark to ignite the fuel and cause a controlled explosion ...
Related Tags
Book Guides
Principles - Life and Work
by Ray Dalio
Too Much and Never Enough
by Mary L. Trump
The Color Purple
by Alice Walker
The Turn of the Screw
by Henry James
Steppenwolf
by Hermann Hesse
The Power of Habit - Why We Do What We Do in Life and Business
by Charles Duhigg
Enders Game
by E. M. Forster
The Second Sex
by Simone de Beauvoir
The Secret Life of Bees
by Sue Monk Kidd
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
Colorado Northwestern Community College Engieneering Essay
One of the big challenges with cloud-based reputation checks is performance. Users do not typically want to wait a few sec ...
Colorado Northwestern Community College Engieneering Essay
One of the big challenges with cloud-based reputation checks is performance. Users do not typically want to wait a few seconds while the reputation of potential URLs is checked. Most of us have come to expect that websites are at the immediate tips of our fingers and that access and loading of the content should take place rapidly and immediately. This presents a tricky security problem. Since the reputation service exists in the cloud, the challenge can be summed up as, “How can a reputation be securely retrieved without slowing Web access down so much as to create a poor user experience?"
Colorado Northwestern Community College Financial Markets Calculations Problems
Maple Aircraft has issued a 4¾% convertible subordinated debenture due 3 years from now. The conversion price is $47.00 a ...
Colorado Northwestern Community College Financial Markets Calculations Problems
Maple Aircraft has issued a 4¾% convertible subordinated debenture due 3 years from now. The conversion price is $47.00 and the debenture is callable at 102.75% of face value. The market price of the convertible is 91% of face value, and the price of the common is $41.50. Assume that the value of the bond in the absence of a conversion feature is about 65% of face value. In the absence of the conversion feature, what is the current yield and yield to maturity? What is the conversion ratio of the debenture? If the conversion ratio were 50, what would be the conversion price? What is the conversion value? At what stock price is the conversion value equal to the bond value? Can the market price be less than the conversion value? How much is the convertible holder paying for the option to buy one share of common stock? By how much does the common have to rise after 3 years to justify conversion?Please explain your answer in detail and provide in-text citations.*Please refer to the Grading Criteria for Professional Assignments in the University Policies for specific guidelines and expectations.
ET 310 Grantham Week 5 Circuit Sinusoidal Steady State Analysis Lab Report
Circuit Analysis – Week #5 LabSinusoidal Steady State AnalysisThis week’s lab is based on the sinusoidal steady state ...
ET 310 Grantham Week 5 Circuit Sinusoidal Steady State Analysis Lab Report
Circuit Analysis – Week #5 LabSinusoidal Steady State AnalysisThis week’s lab is based on the sinusoidal steady state analysis using capacitive and inductive circuits in Multisim. You will learn to utilize Multisim to perform the mesh analysis.1. In the frequency domain circuit below, determine the currents I1, I2 and I3.2. Switch the places of capacitor and inductor and repeat step 2 to determine the currents.3. Record the values in the table below:Current I1Current I2Current I3
CYB 200 SNHU Definition of Threat Actor Project
CYB 200 Project Three Guidelines and Rubric
Overview
One of the three focus projects for this course is the creation of ...
CYB 200 SNHU Definition of Threat Actor Project
CYB 200 Project Three Guidelines and Rubric
Overview
One of the three focus projects for this course is the creation of a technical brief based on research you’ve conducted. The audience for this brief is the
security/IT director for a fictional organization at which you are employed for the purposes of this assignment. This technical brief will serve as the basis for a
proactive adversarial detection plan that your director will be creating. The final product represents an authentic demonstration of competency because, as a
security analyst, you will need to be able to develop skills that employ a variety of methods and tools necessary to detect, characterize, and counter cyber threat
actors. Your work will contribute to larger team projects across your organization. This project will also help position you to cultivate an important mind-set:
thinking responsibly, proactively, and in terms of what threat actors would do to attack organizational assets.
The project incorporates one milestone, which will be submitted in Module Five. The project will be submitted in Module Seven.
In this assignment, you will demonstrate your mastery of the following course competency:
CYB-200-02: Develop reliable, ethical methods to detect, characterize, and counter cyber threat actors
Scenario
In a course announcement, your instructor will provide you with some scenarios for you to choose from. You will situate yourself as the security analyst in one of
the provided scenarios, creating a technical brief that explains to the security/IT director how the situation informs the larger proactive adversarial detection
plan that he or she is writing for the organization. You do not require specific technical information from the system at hand, as the results or determinations are
supplied for you within the scenario. Rather, you should address each critical element in the Project Three prompt, speaking broadly to what your best-practice
tactics or methods would be, based on your research from the decision aid you completed as the milestone for this project. The Conclusion section of this
activity requires you to extrapolate on all the research you have done for the decision aid.
Prompt
In your technical brief, you must address the critical elements listed below. The codes shown in brackets indicate the course competency to which each critical
element is aligned.
I. Introduction
A. Identify your threat actors and characterize their motivations or desired outcomes. Use research from the Project Three resource guide or
decision aid to support your response. For example, is the threat actor gathering information for financial gain? [CYB-200-02]
1
II. Analysis
A. Describe best practices or methods for detecting the threat actors from the scenario. Use research from the Project Three resource guide or
decision aid to support your response. [CYB-200-02]
B. Describe ethical and legal factors that should be considered and their significance in terms of the company for which you are employed in the
scenario. Use research from the Project Three resource guide or decision aid to support your response. [CYB-200-02]
C. Describe at least one tactic or method that is important in responding to and countering this threat actor. Use research from the Project Three
resource guide or decision aid to support your response. [CYB-200-02]
D. Describe at least one tactic or method that would be employed to reduce the likelihood of the same situation happening again. Use research
from the Project Three resource guide or decision aid to support your response. [CYB-200-02]
III. Conclusion
A. Explain the potential ramifications of the tactics or methods you have suggested. Use research from the resource guide or decision aid to
support your response. [CYB-200-02]
Key Deliverables
Deliverable Module Due Grading
Project Three Milestone: Decision Aid Five Project Three Milestone Rubric
Project Three: Technical Brief Seven Project Three Rubric
Project Three Rubric
Guidelines for Submission: Your submission should be approximately 2 pages in length (plus a cover page and references) and should be written in APA format.
Use double spacing, 12-point Times New Roman font, and one-inch margins. Include at least three references, which should be cited according to APA style
14 pages
Attachment 2 Revised
Declaration: By submitting this assessment (Parts 1 – 4) for marking I declare that it is entirely my own work. I unders ...
Attachment 2 Revised
Declaration: By submitting this assessment (Parts 1 – 4) for marking I declare that it is entirely my own work. I understand that falsely claiming ...
Leadership Actions of Management Versus Actions of Warren Anderson Paper
2P1: What do you do to demonstrate your commitment?What do you do on a day-to-day basis to demonstrate your commitment to ...
Leadership Actions of Management Versus Actions of Warren Anderson Paper
2P1: What do you do to demonstrate your commitment?What do you do on a day-to-day basis to demonstrate your commitment to safety, quality, and environmentalmanagement, or to help promote the safety program culture?Post an original discussion response, . 2CT1: Where did Union Carbide's Leadership StandRead the attached article.Warren Anderson Died Unpunished Survivors of Bhopal Gas Tragedy SayConsider the module reading in comparison to the actions of Warren Anderson.Create a one-page creative graphic that summarizes what the leadership actions of management should be versus the actions of Warren Anderson.Include the following:Title / TopicA concise statement of your comparison between what the leadership actions of management should be versus the actions of Warren Anderson.Three or more quotations or paraphrase from the two text that relates to your comparison.An analytical response to each quotation or paraphrase.Two or more graphic representations or visuals that interpret the quotations or paraphrase.You may use Microsoft Word or PowerPoint, or if you are feeling adventurous you can create a free account at Pictochart.com! Remember though ... keep it to ONE PAGE!Warren Anderson died unpunished, survivors of Bhopal gas try .. Read more at: http://timesofindia.indiatimes.com/articleshow/44998406.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppstWarren Anderson died unpunished, survivors of Bhopal gas try .. Read more at: http://timesofindia.indiatimes.com/articleshow/44998406.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppstWarren Anderson died unpunished, survivors of Bhopal gas try .. Read more at: http://timesofindia.indiatimes.com/articleshow/44998406.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppstWarren Anderson died unpunished, survivors of Bhopal gas try .. Read more at: http://timesofindia.indiatimes.com/articleshow/44998406.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst
Earn money selling
your Study Documents