Browse Definitions :
Definition

linear integrated circuit (linear IC)

Also see integrated circuit ( IC ).

A linear integrated circuit (linear IC) is a solid-state analog device characterized by a theoretically infinite number of possible operating states. It operates over a continuous range of input levels. In contrast, a digital IC has a finite number of discrete input and output states.

Within a certain input range, the amplification curve of a linear IC is a straight line; the input and output voltages are directly proportional. The best known, and most common, linear IC is the operational amplifier or op amp , which consists of resistors, diodes, and transistors in a conventional analog circuit. There are two inputs, called inverting and non-inverting. A signal applied to the inverting input results in a signal of opposite phase at the output. A signal applied to the non-inverting input produces a signal of identical phase at the output. A connection, through a variable resistance , between the output and the inverting input is used to control the amplification factor .

Linear ICs are employed in audio amplifiers, A/D (analog-to-digital) converters, averaging amplifiers, differentiators, DC (direct-current) amplifiers, integrators, multivibrators, oscillators, audio filters, and sweep generators. Linear ICs are available in most large electronics stores. Some devices contain several amplifiers within a single housing.

This was last updated in March 2011
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • email spam

    Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients.

  • shadow password file

    A shadow password file, also known as /etc/shadow, is a system file in Linux that stores encrypted user passwords and is ...

  • browser hijacker (browser hijacking)

    A browser hijacker is a malware program that modifies web browser settings without the user's permission and redirects the user ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close