Determine Boolean identities using Boolean algebra, Computer Engineering

Assignment Help:

Prove the following identities
 
a. A
‾B‾C‾ + A‾BC‾ + AB‾C‾ + ABC‾ = C
b. AB + ABC + A
‾ B + AB‾C = B + AC

Ans.

a. LHS = A'B'C' + A'BC' + AB'C' + ABC'
= A'C' (B' + B) + AC' (B' + B)
= A'C' + AC'   [as B'+B = 1]
= C' (A' + A)
= C'                   [since A'+A =1]
= RHS.
Thus Proved

b. LHS = AB + ABC + A'B + AB'C

= B + AC
= B (A + A') +  AC (B + B')
= B + AC   [as B + B' = A + A' = 1]
= B + AC
= RHS.
Thus Proved


Related Discussions:- Determine Boolean identities using Boolean algebra

What are different types of log records, What are different types of Log re...

What are different types of Log records? V1 and V2.  V1 must be processed before V2.  But, we can have more than single V2 logs

Illustrate domain names and address resolution, Q. Illustrate Domain Names ...

Q. Illustrate Domain Names and Address Resolution? But what if you don't know IP address of the computer you want to connect to? What happens if you need to access a web server

Unification algorithm, Unification Algorithm: Here if notice for insta...

Unification Algorithm: Here if notice for instance that to unify two sentences as we must find a substitution that makes the two sentences the same. Furthermore remember there

What is the conclude of the force of gravity on an object, Q. What is the...

Q. What is the conclude of the force of gravity on an object? Answer:- Force is the vector product of mass as well as acceleration F = ma. Weight is an unusual case of t

Give explanation about stored program control, Give explanation about Store...

Give explanation about Stored Program Control. Stored Program Control: In this centralized control, all the control equipment is replaced through a single processor that must

Address translation - computer architecture, Address translation: ...

Address translation: Compiler time : If it is known in advance that a program will reside at a particular location of primary memory, and then the compiler can be told to

Advantages and disadvantages of public-key cryptography, Advantages and Dis...

Advantages and Disadvantages of Public-key cryptography Advantages (i) Enhanced security and convenience  (ii) Electronic records may be authenticated by affixing

#title.physics, Describe the construction and working of michelson ...

Describe the construction and working of michelson iinterferometer.describe the formation of different types of fringes in Michaelson''s interferometer

Distinguish between how ntfs and fat store time, Problem (a) Distingu...

Problem (a) Distinguish between how NTFS and FAT store time. Describe your answer. (b) Unix epoch starts as from January 1, 1970, 00:00:00 GMT. Provide that Unix stores

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd