Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Minimize the logic function F(A, B, C, D) = ∑ m(1,3,5,8,9,11,15) + d(2,13) using NAND gate with help of K-map.
Ans. Realization of given expression by using NAND gates:
In SOP form the minimized logic expression is F = A B‾ C‾ + C‾D + B‾D + AD, therefore the logic diagram for the simplified expression is shown in fig.
Fig. Logic Diagram
Q. Example of asymptotic notations? The function f (n) belongs to the set (g(n)) if there exists positive constants c such that for satisfactorily large values of n we have 0
What are the desirable features of an Electronic Market Place? Features of an Electronic Market Place: 1. Its electronic and business center is not a physical building qu
What is the transport protocol you use to call a Web service SOAP? Http is preferred for Soap whereas tcp for binary i.e. HTTP is used in web services and tcp works well in rem
Avoiding Local Minima: However the error rate of multi-layered networks over a training set could be calculated as the number of mis-classified examples. So always keep in rem
Which the digital logic family has the lowest propagation delay time ? Ans. ECL is the digital logic family that has the lowest propagation delay time. In ECL lowest propagati
Technology Enablers - Information System The progression described above has been enabled by five main factors: Increases in processing capability allowing smaller and
Three Logic Levels are used and they are High, Low, High impedance state. The high and low are normal logic levels & high impedance state is electrical open circuit conditions. Tri
what is ment by avl tree n insertion n deletion ,2-3 tress insertion n deletion
Explain any two methods of implementing interacting processes. Two methods of implementing interacting process are given below: (i) Shared memory solution: In this scheme
What is Public Key Cryptography? Public-key cryptography is a type of modern cryptography that allows users to communicate safely without any previously agreeing on a shared
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd