Determine Boolean identities using Boolean algebra, Computer Engineering

Assignment Help:

Prove the following identities
 
a. A
‾B‾C‾ + A‾BC‾ + AB‾C‾ + ABC‾ = C
b. AB + ABC + A
‾ B + AB‾C = B + AC

Ans.

a. LHS = A'B'C' + A'BC' + AB'C' + ABC'
= A'C' (B' + B) + AC' (B' + B)
= A'C' + AC'   [as B'+B = 1]
= C' (A' + A)
= C'                   [since A'+A =1]
= RHS.
Thus Proved

b. LHS = AB + ABC + A'B + AB'C

= B + AC
= B (A + A') +  AC (B + B')
= B + AC   [as B + B' = A + A' = 1]
= B + AC
= RHS.
Thus Proved


Related Discussions:- Determine Boolean identities using Boolean algebra

What is use case and use case diagram, What is use case and use case diagra...

What is use case and use case diagram? A use case is a coherent piece of functionality that a system can give by interacting with actors. Use case includes one or more actors a

What is transformation, What is transformation? A transformation is a m...

What is transformation? A transformation is a mapping from the domain of models to the range of models. When modeling, it is significant not only to focus on customer needs, bu

Depth in cutoff search, Depth in Cutoff search: The depth is chosen in...

Depth in Cutoff search: The depth is chosen in advance to certify in which the agent does not capture much more long to choose a move: however, if it has longer, well then we

Deta sturcture, algorithm of travalling salesman problam

algorithm of travalling salesman problam

Creating a function, I''m suppose to create a function called calc_rectang_...

I''m suppose to create a function called calc_rectang_area(height, width),that takes two parameters: the height and width of the rectangular and return the area of the rectangular.

What is software and hardware interrupt, What is Software and hardware inte...

What is Software and hardware interrupt The software interrupts are program instructions. These instructions are inserted at desired location in a program. A program formed int

Convert the decimal number into its equivalent binary number, Write a progr...

Write a program to convert the given Decimal number into its equivalent Binary number.

Simulate a worm propagation considering traffic delay, At time t when an in...

At time t when an infected machine scans and finds a vulnerable machine, the vulnerable one will be compromised and start to scan and infect others at time t+X, where X is a r.v. f

Minimum possibility -minimax algorithm, Minimum possibility -minimax algori...

Minimum possibility -minimax algorithm: Finally, we want to put the scores on the top edges in the tree. So there is over again a choice. Whenever, in this case, we have to r

Linux, Explain about unix file system architecture

Explain about unix file system architecture

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd