MHB Creating an inverter from a 2 input NAND gate

AI Thread Summary
To create a basic inverter using a two-input NAND gate, the key approach is to tie both inputs of the NAND gate together. This configuration allows the NAND gate to function as an inverter. The truth table for this setup shows that when both inputs are connected and set to the same value, the output behaves as expected for an inverter: it outputs a low signal (0) when the input is high (1) and outputs a high signal (1) when the input is low (0). This method effectively converts the two-input NAND gate into a one-input inverter, demonstrating that the NAND gate can be utilized creatively within the constraints of using only NAND gates and managing fanin and fanout. Experimentation with different configurations and truth tables is encouraged to solidify understanding of the inverter's functionality.
ineedhelpnow
Messages
649
Reaction score
0
how would yo connect a 2 input nand gate to form a basic inverter?
i constructed a truth table. i know that the two middle ones don't count because the inputs have to be of the same value for an inverter. but what conclusion can i draw from this?
View attachment 3280
 

Attachments

  • Untitled.png
    Untitled.png
    1.1 KB · Views: 112
Technology news on Phys.org
Well, the basic inverter has only one input. So what are some ways you could convert a two-input device to a one-input device?
 
so both of the inputs have to be the same so it equals one value on the inverter?
 
You're only allowed to use NAND gates and fanin and fanout. So try things, and see what the truth tables end up being. What happens if you just tie the two inputs of a NAND gate together? What's the resulting truth table? Is it what you want?
 
Thread 'Is this public key encryption?'
I've tried to intuit public key encryption but never quite managed. But this seems to wrap it up in a bow. This seems to be a very elegant way of transmitting a message publicly that only the sender and receiver can decipher. Is this how PKE works? No, it cant be. In the above case, the requester knows the target's "secret" key - because they have his ID, and therefore knows his birthdate.
I tried a web search "the loss of programming ", and found an article saying that all aspects of writing, developing, and testing software programs will one day all be handled through artificial intelligence. One must wonder then, who is responsible. WHO is responsible for any problems, bugs, deficiencies, or whatever malfunctions which the programs make their users endure? Things may work wrong however the "wrong" happens. AI needs to fix the problems for the users. Any way to...
Back
Top