Distributivity of connectives, Computer Engineering

Assignment Help:

Distributivity of Connectives :

In our last analogy with arithmetic will involve a very well-technique need for playing around with algebraic properties. But assume there if we wanted to work out: 10 * (3 + 5). Than we could do it like this: 10 * (3 + 5) = 10 * 8 = 80. And may be we could do it like this: (10 * 3) + (10 * 5) = 30 + 50 = 80. In fact generally, we know that, for any numbers, a, b and c: a * (b + c) = (a * b) + (a * c). But like this type of theory, we say that multiplication is  distributive over addition. 

Now if you guessed it, that we can distribute some of more the connectives too. In generally or in particular way, ^ is distributive ? over and vice versa: ? is just distributive over ^. We can present these as equivalences as givens: 

663_Distributivity of Connectives.png

What's more, we saw earlier like → is distributive over ^  , and the same as is true for →over ?  .  So therefore:

1300_Distributivity of Connectives1.png


Related Discussions:- Distributivity of connectives

Control of program, Example:                         CMP    AX,BX    ;...

Example:                         CMP    AX,BX    ; compare instruction: sets flags JE        THERE    ; if equal then skip the ADD instruction  ADD  AX, 02    ; add 02

print the sum of the numbers in the file, Make a file which kepts on every...

Make a file which kepts on every line a letter, a space, and a real number.  For example, it may look like this: e 5.4 f 3.3 c 2.2 f 1.1 c 2.2 Write a script that uses textscan to

What is the function of a tlb, What is the function of a TLB (translation...

What is the function of a TLB (translation look-aside buffer)? A small cache called the TLB is interporated into MMU, which having of the page table entries that correspondi

Layered architecture.., advantages and disadvantages of layered architectur...

advantages and disadvantages of layered architecture in computer network.

Important part of process - canonical genetic algorithm, Important part of ...

Important part of Process - canonical genetic algorithm: In such a scenario evolution or random mutations are often highly deleterious or can say harmful to the organism it me

What are the two ways in which the system using cache, What are the two way...

What are the two ways in which the system using cache can proceed for a write operation? Write by protocol technique Write-back or Copy-back protocol method

Explain priority encoder with an example, Explain Priority encoder with an ...

Explain Priority encoder with an example. Ans. Priority encoder- Basically an encoder is a combinational circuit which performs the inverse operation of a decoder. The inp

what is code for adding two integers in java?, import java.util.Scanner;  ...

import java.util.Scanner;   class AddNumbers {    public static void main(String args[])    {       int x, y, z;       System.out.println("Enter two integers to calculate their sum

Interfacing subroutines with parameter passing, Interfacing Subroutines wit...

Interfacing Subroutines with Parameter Passing Let's now write a C program which calls the assembly program for parameter passing. Let's extend the previous two programs such t

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd