Question

For this problem you will analyze the updated design of the home security system from homework 4 The original home security system had a few problems: 2. Issue #1: Assuming the intruder stayed in the building longer than 30 seconds, the alarm would sound for 10 seconds then the amber light to red light to alarm sequence would repeat. The cause of this problem is the fact that the U2 counter will continue counting every 10 seconds. Once the counter reaches a count of (3ho, its next count would return to (0he Issue #2: There was no logic in place to disarm the system once a correct code was entered. If input B returned to a logic LOW, the system would re-arm while the home owner was still in the building. This issue would require the user to continuously enter a correct code to keep the system disarmed. Corrective components for Issue #1: To correct this issue the component US was added to the design along with additional combinational logic feeding the clk input signal of the U2 component. Corrective components for Issue #2: The system needs to disarm when a user enters the correct code, and then re-arm at the appropriate time. The U4 component was added to handle this requirement. Home Security System Green Amber Red Alarm
media%2Fe5f%2Fe5f5fead-4d54-4d3d-a580-d6
media%2Fef4%2Fef4ed8ed-1ad1-486c-ab0d-e4
0 0
Add a comment Improve this question Transcribed image text
Know the answer?
Add Answer to:
For this problem you will analyze the updated design of the home security system from homework...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Name 2. For this problem you will complete the design of the home security system shown...

    Name 2. For this problem you will complete the design of the home security system shown below. The operation of the system is as follows: INPUTS .A - The variable A will be used to indicate that a person has been detected in the home o A means a possible intruder is present o A 0means no one is present . B - The variable B will be used to indicate that a correct code has been entered o B-1...

  • Topic:JK flip flop Task Description Design a Home Security System. The device/product requires the use of...

    Topic:JK flip flop Task Description Design a Home Security System. The device/product requires the use of fixed function logic ICs, transducers, and passive electronic components. Project 2: Design and built an electronic voting system. The expectations from this project are to enable at least three people to vote Yes' or 'No'. The number of Yes' and 'No' vote should be counted individually and displayed subsequently using 7-segment displays. You need to use only one BCD to 7-segment decoder within the...

  • Option 1: Authentication System For security-minded professionals, it is important that only the appropriate people gain...

    Option 1: Authentication System For security-minded professionals, it is important that only the appropriate people gain access to data in a computer system. This is called authentication. Once users gain entry, it is also important that they only see data related to their role in a computer system. This is called authorization. For the zoo, you will develop an authentication system that manages both authentication and authorization. You have been given a credentials file that contains credential information for authorized...

  • A new version of the operating system is being planned for installation into your department’s production...

    A new version of the operating system is being planned for installation into your department’s production environment. What sort of testing would you recommend is done before your department goes live with the new version? Identify each type of testing and describe what is tested. Explain the rationale for performing each type of testing. [ your answer goes here ] Would the amount of testing and types of testing to be done be different if you were installing a security...

  • Pseudocode & Python In this portion of the project you will analyze a problem and create...

    Pseudocode & Python In this portion of the project you will analyze a problem and create a Python program to solve it. In recent years, there has been more attention to Water Quality. Specifically the amount of lead that is found in our daily water supply. Lead and copper residue start to show up in our water supply due to aging pipes. This residue can be found in older homes that have not replaced their pipes and in the municipal...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • Project 7-1: Classify Patient Incidents According to Policy This primary source of information on patient safety...

    Project 7-1: Classify Patient Incidents According to Policy This primary source of information on patient safety will be used to analyze the incidents according to level of severity. The following policies define the three categories of severity Policy on Level I Event: An incident that resulted in patient death or serious short or long-term (6 weeks or more) disability or harm Policy on Level II Event: An incident that resulted in minimal short-term patient disability or harm Policy on Level...

  • Please read the article and answer about questions. You and the Law Business and law are...

    Please read the article and answer about questions. You and the Law Business and law are inseparable. For B-Money, the two predictably merged when he was negotiat- ing a deal for his tracks. At other times, the merger is unpredictable, like when your business faces an unexpected auto accident, product recall, or government regulation change. In either type of situation, when business owners know the law, they can better protect themselves and sometimes even avoid the problems completely. This chapter...

  • I need Summary of this Paper i dont need long summary i need What methodology they used , what is the purpose of this p...

    I need Summary of this Paper i dont need long summary i need What methodology they used , what is the purpose of this paper and some conclusions and contributes of this paper. I need this for my Finishing Project so i need this ASAP please ( IN 1-2-3 HOURS PLEASE !!!) Budgetary Policy and Economic Growth Errol D'Souza The share of capital expenditures in government expenditures has been slipping and the tax reforms have not yet improved the income...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT