9618 Computer Science
AS Content
Chpater 1 Information representation
1.1 Data representation
1.2 Multimedia
1.3 Compression
Chapter 2 Communication
2.1 Networking
2.2 The internet
Chpater 3 Hardware
3.1 Computers and their components
3.2 Logic Gates and Logic Circuits
Chapter 4 Processor Fundamentals
4.1 Central Processing Unit (CPU) Architecture
4.2 Assembly Language
4.3 Bit manipulation
Chapter 5 System Software
5.1 Operating Systems
5.2 Language Translators
Chapter 6 Security, privacy and data integrity
6.1 Data Security
6.2 Data Integrity
Chpater 7 Ethics and Ownership
7.1 Ethics and Ownership
Chapter 8 Databases
8.1 Database Concepts
8.2 Database Management Systems (DBMS)
8.3 Data Definition Language (DDL) and Data Manipulation Language (DML)
Chapter 9 Algorithm Design and Problem-solving
9.1 Computational Thinking Skills
9.2 Algorithms
Chapter 10 Data Types and Records
10.1 Data Types and Records
10.2 Arrays
10.3 Files
10.4 Introduction to Abstract Data Types (ADT)
Chapter 11 Programming
11.1 Programming Basics
11.2 Constructs
11.3 Structured Programming
Chapter 12 Software Development
12.1 Program Development Life cycle
12.2 Program Design
12.3 Program Testing and Maintenance
A2 Content
Chapter 13 Data Representation
13.1 User-defined data types
13.2 File organisation and access
13.3 Floating-point numbers, representation and manipulation
Chpater 14 Communication and internet technologies
14.1 Protocols
14.2 Circuit switching, packet switching
Chpater 15 Hardware
15.1 Processors, Parallel Processing and Virtual Machines
15.2 Boolean Algebra and Logic Circuits
Chapter 16 Operating System
16.1 Purposes of an Operating System (OS)
16.2 Translation Software
Chpater 17 Security
17.1 Encryption, Encryption Protocols and Digital certificates
Chpater 18 Artificial intelligence (AI)
18.1 Artificial Intelligence (AI)
Chapter 19 Computational thinking and problem solving
19.1 Algorithms
19.2 Recursion
Chapter 20 Further programming
20.1 Programming Paradigms
20.2 File Processing and Exception Handling
Mr. Theo
-
+
首页
15.2 Boolean Algebra and Logic Circuits
# Boolean algebra - **Double Complement:** $$ \overline{\overline{\text{A}}}=A $$ - **Tautology/Identity Law:** $$ 1.A=A $$ $$ 0 + A = A $$ - **Tautology/Null Law:** $$ 0.A = 0 $$ $$ 1 + A = 1 $$ - **Tautology/Idempotent Law:** $$ A.A = A $$ $$ A + A = A $$ - **Tautology/Inverse Law:** $$ A.\overline{\text{A}} = 0 $$ $$ A + \overline{\text{A}} = 1 $$ - **Commutative Law:** $$ A + B = B + A $$ $$ A.B = B.A $$ - **Associative Law:** $$ A + (B + C) = (A + B) + C $$ $$ A.(B.C) = (A.B).C $$ - **Distributive Law:** $$ A.(B + C) = A.B + A.C $$ $$ A + (B.C) = (A + B).(A + C) $$ - **Adsorption Law:** $$ A.(A + B) = A $$ $$ A + A.B = A $$ $$ A + \overline{\text{A}}.B = A +B $$ - **De Morgan’s Law:** $$ \overline{\text{A.B}} = \overline{\text{A}} + \overline{\text{B}} $$ $$ \overline{\text{(A + B)}} = \overline{\text{A}}.\overline{\text{B}} $$ # Further logic circuits ## Half adder One of the basic operations in any computer is binary addition. The half adder circuit is the simplest circuit. This carries binary addition on 2 bits generating two outputs » the sum bit (S) » the carry bit (C).  ## Full adder - join two half adders together to form a full adder  # Flip-Flops ##### The purpose of a flip-flop To store a binary digit / (single) bit. ## SR flip-flops  ## JK flip-flops - JK flip flops are an improvement over SR flip flops. - Invalid input combinations are eliminated in JK flip flops. - All four combinations of input values (J and K) are valid in JK flip-flops. - JK flip flops use a clock pulse for synchronization to ensure proper functioning. - Advantages of JK flip flops include the validity of all input combinations, avoidance of unstable states, and increased stability compared to SR flip flops.  ### Use of JK flip-flops - Several JK flip-flops can be used to produce shift registers in a computer. - A simple binary counter can be made by linking up several JK flip-flop circuits (this requires the toggle function). # Karnaugh Maps - **Karnaugh maps:** a method of obtaining a Boolean algebra expression from a truth table involving the - Benefits of using Karnaugh Maps: - Minimises the number of Boolean expressions. - Minimises the number of Logic Gates used, thus providing a more efficient circuit. - Methodology - Try to look for trends in the output, thus predicting the presence of a term in the final expression - Draw out a Karnaugh Map by filling in the truth table values into the table - Column labeling follows the Gray coding sequence - Select groups of ‘1’ bits in even quantities (2, 4, 6, etc.); if not possible, then consider a single input as a group - Note: Karnaugh Maps wrap around columns - Within each group, only the values that remain constant are retained Summary of Grouping Rules - A group must only contain 1s, no 0s - A group can only be horizontal or vertical, not diagonal A group must contain 2' 1s (1, 2, 4, 8, etc.) - Each group should be as large as possible - Groups may overlap - Groups may wrap around a table - Every 1 must be in at least one group - There should be as few groups as possible **Examples**     
Theo
2025年5月30日 13:35
转发文档
收藏文档
上一篇
下一篇
手机扫码
复制链接
手机扫一扫转发分享
复制链接
Markdown文件
Word文件
PDF文档
PDF文档(打印)
分享
链接
类型
密码
更新密码
有效期