Browse Definitions :
Definition

combinatorial logic

Combinatorial logic is a concept in which two or more input states define one or more output states, where the resulting state or states are related by defined rules that are independent of previous states. Each of the inputs and output(s) can attain either of two states: logic 0 (low) or logic 1 (high). A common example is a simple logic gate .

In combinatorial logic, the output is a function of the input at a specific time. An example is the AND gate. Suppose an AND gate has two inputs, X and Y, and one output, Z. The AND operation is symbolized by an asterisk (*). The operation of the two-input AND gate can be represented by the following truth table:

X Y X * Y
1
1
1 1 1

The output of this logic gate is high if and only if both inputs are high. If either or both of the inputs are low, the output is low. If the states of the inputs change periodically, the output always obeys the rules depicted in the above truth table. The current state of the device is not affected by preceding states. This contrasts combinatorial logic with sequential logic , in which the current state of the device is affected by previous states.

Logic gates are one of several types of devices that use combinatorial logic. Other forms include encoders, decoders, multiplexer s, comparators, and latches.

This was last updated in September 2005

SearchCompliance

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity

  • unified threat management (UTM)

    Unified threat management (UTM) describes an information security (infosec) system that provides a single point of protection ...

  • physical security

    Physical security is the protection of personnel, hardware, software, networks and data from physical actions and events that ...

  • attack vector

    An attack vector is a path or means by which an attacker or hacker can gain access to a computer or network server in order to ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close