Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Prove the following identities a. A‾B‾C‾ + A‾BC‾ + AB‾C‾ + ABC‾ = C‾ b. AB + ABC + A‾ B + AB‾C = B + AC
Ans.
a. LHS = A'B'C' + A'BC' + AB'C' + ABC'= A'C' (B' + B) + AC' (B' + B)= A'C' + AC' [as B'+B = 1]= C' (A' + A)= C' [since A'+A =1]= RHS.Thus Provedb. LHS = AB + ABC + A'B + AB'C
= B + AC= B (A + A') + AC (B + B')= B + AC [as B + B' = A + A' = 1]= B + AC= RHS.Thus Proved
Difference between Panel and Group Box classes? Panel & Group box both can used as container for other controls like radio buttons & check box. The dissimilarity in panel & gro
Dynamic screen sequence for a screen can be set using which commands? It uses two commands:- A) Set Screen B) Call screen.
Q. What is Pure semiconductors? Pure semiconductors, known as intrinsic semiconductors, have very few charge carriers and may hence be classified as almost insulators or very p
Define Overflow. An overflow is a problem in digital computer due to the width of registers is finite. A result that contains n+ 1 bit cannot be accommodated in a register wit
How do you turn off cookies for one page in your site? Use the Cookie. Discard Property which Gets or sets the discard flag set by the server. When true, this property initiat
Vector Processing A vector is an ordered set of similar type of scalar data items. The scalar tem may be a logical value, an integer or a floating point number. Vector proce
Q. Convert the following from octal to binary, decimal, hexadecimal and BCD. a) 7.7 b) 4037 c) 23.34
Discuss the different techniques with which a file can be shared among different users. Several popular techniques with that a file can be shared among various users are: 1
Explain the working of Interpreter? The Interpreter is a program that executes instructions written in a high-level language. There are two manners to run programs written in a
At time t when an infected machine scans and finds a vulnerable machine, the vulnerable one will be compromised and start to scan and infect others at time t+X, where X is a r.v. f
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd