Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Simplify the given expressions using Boolean postulates
XY + X‾Z‾ + XY‾Z (XY + Z)
Ans. XY + X‾Z‾ + XY‾Z (XY + Z)= XY + X‾Z‾ + XY‾Z (XY + Z)= XY + X‾Z‾ + XXYY‾Z + XY‾ZZ= XY + X‾Z‾ + XYZ (As YY‾ = 0 and ZZ = Z)= XY + X‾ + Z‾ + XY‾Z (As X‾Z‾ = X‾ + Z‾)= X‾ + XY + Z‾ + XY‾Z= X‾ + X (Y + Y‾Z) + Z‾= X‾ + X (Y +Z) + Z‾ (As Y + Y‾Z = Y+Z)= X‾ + X Y (Z+ Z‾ ) + XZ + Z‾ (As Z+ Z‾ =1)= X‾ + X Y Z + XYZ‾ + XZ + Z‾= X‾ + XZ (1+ Y) + Z‾ (1+XY)= X‾ + XZ + Z‾ (As 1+ Y = 1 and 1+XY = 1)= X‾ + XZ) + Z‾=(X‾ + Z) + Z‾ (As X‾ + XZ = X‾ + Z‾= X‾ +( Z + Z‾)= X‾ +1 (As Z + Z‾ = 1)=1 (As X‾ +1 = 1)
Q. Standards used for development of a system? Documentation standards: It must be an ongoing activity at the time of system development life cycle. Quality Standards:
What is Hashing? Hashing: Hashing gives the direct access of record from the file no matter where the record is in the file. This is possible with the help of a hashing functio
Q. Illustrate Organisation of DRAM Chip? The given figure is a typical organisation of 16 mega bit DRAM. It displays a typical organisation of 2048 × 2048 × 4 bit DRAM chip. Me
First-Order Inference Rules: Here now we have a clear definition of a first-order model is that we can define soundness for first-order inference rules in the same way such we
Q.Joint Application Development session leader? JAD session leader: JAD leader organizes and runs the JAD. This person is trained in group management and facilitation as well
What is strong-typing versus weak-typing? Which is preferred? Why? Strong type is checking the types of variables as early as possible, usually at compile time. Whereas weak ty
Stack pointer is a particular purpose 16-bit register in the Microprocessor, which grasp the address of the top of the stack.
There should be 1 server thread and N client threads, where N is supplied by the user as a command line argument. The server opens a file called "all_requests.dat", the file has
In a two stage network there are 512 inlets and outlets, r=s=24. If the probability that a given inlet is active is 0.8, calculate: Switching capacity Given: N =M =512, α
Mobile Computing 1. What is Wireless Protocol Requirements and also explain in brief medium access control protocol. 2. Illustrate FDMA and TDMA concepts. 3. What are the
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd