Simplify the expressions using boolean postulates, Computer Engineering

Assignment Help:

Simplify the given expressions using Boolean postulates

XY + X‾Z‾  + XY‾Z (XY + Z)

Ans. XY + X‾Z‾ + XY‾Z (XY + Z)
= XY + X‾Z‾ + XY‾Z (XY + Z)
= XY + X‾Z‾  + XXYY‾Z + XY‾ZZ
= XY + X‾Z‾  + XYZ             (As YY‾ = 0 and ZZ = Z)
= XY + X‾ + Z‾ + XY‾Z (As X‾Z‾ = X‾ + Z‾)
= X‾ + XY + Z‾ + XY‾Z
= X‾ + X (Y + Y‾Z) + Z‾
= X‾  + X (Y +Z) + Z‾  (As Y + Y‾Z = Y+Z)
= X‾ + X Y (Z+ Z‾ ) + XZ + Z‾  (As Z+ Z‾  =1)
= X‾ + X Y Z + XYZ‾ + XZ + Z‾
= X‾ + XZ (1+ Y) + Z‾ (1+XY)
= X‾ + XZ + Z‾  (As 1+ Y = 1  and 1+XY = 1)
= X‾ + XZ) + Z‾
=(X‾ + Z) + Z‾  (As X‾ + XZ = X‾  + Z‾
= X‾  +( Z + Z‾)
= X‾ +1 (As Z + Z‾  = 1)
=1 (As X‾ +1 = 1)

 


Related Discussions:- Simplify the expressions using boolean postulates

What is a customer-to-business transaction, What is a customer-to-business ...

What is a customer-to-business transaction? C2B (customer-to-business): The most significant activity into e-commerce isn’t selling. That is buying. Rather often which do

Program accept decimal number and convert it into given base, Q Develop a p...

Q Develop a program that accepts decimal number and converts it into given base. Fractional numbers are allowed and negative numbers are not allowed. Also check that entered number

Towers of hanoi problem, The Towers of Hanoi Problem Towers of Hanoi pro...

The Towers of Hanoi Problem Towers of Hanoi problem is described. There are three pegs on which disks are "threaded" (there are holes in the disks to allow them to be placed on

Microprocessors Instruction sets, Write a program to mask bits D3D2D1D0 and...

Write a program to mask bits D3D2D1D0 and to set bits D5D4 and to invert bits D7D6 of the AX register.

How e-commerce website works, Procedure The only difference between e-...

Procedure The only difference between e-commerce and conventional commerce is that goods in e-commerce are purchased over the internet using a credit card. Also buying and sel

Knowledge representation in artificial intelligence , Knowledge Representat...

Knowledge Representation: To recap, now we have some characterizations of Artificial Intelligence, so  when an Artificial Intelligence problem arises, you will enable  to put i

Explain asymmetric cryptographyand its components, Explain Asymmetric crypt...

Explain Asymmetric cryptographyand its components. Asymmetric or public-key cryptography be different from conventional cryptography in which key material is bound to a single

Determine the level of state decomposition, Determine the level of state de...

Determine the level of state decomposition The level of state decomposition must be determined by judgement. A too fine grained model is unsuitable, such as, modelling all poss

Which is the best tool for monitoring weblogic server(wls8), WLS8 handles J...

WLS8 handles JMX but it uses weblogic execution of JMX server. It does not supports generalise sun javax API which can be used with any JVM. There are some patches available which

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd