Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Simplify the given expressions using Boolean postulates
XY + X‾Z‾ + XY‾Z (XY + Z)
Ans. XY + X‾Z‾ + XY‾Z (XY + Z)= XY + X‾Z‾ + XY‾Z (XY + Z)= XY + X‾Z‾ + XXYY‾Z + XY‾ZZ= XY + X‾Z‾ + XYZ (As YY‾ = 0 and ZZ = Z)= XY + X‾ + Z‾ + XY‾Z (As X‾Z‾ = X‾ + Z‾)= X‾ + XY + Z‾ + XY‾Z= X‾ + X (Y + Y‾Z) + Z‾= X‾ + X (Y +Z) + Z‾ (As Y + Y‾Z = Y+Z)= X‾ + X Y (Z+ Z‾ ) + XZ + Z‾ (As Z+ Z‾ =1)= X‾ + X Y Z + XYZ‾ + XZ + Z‾= X‾ + XZ (1+ Y) + Z‾ (1+XY)= X‾ + XZ + Z‾ (As 1+ Y = 1 and 1+XY = 1)= X‾ + XZ) + Z‾=(X‾ + Z) + Z‾ (As X‾ + XZ = X‾ + Z‾= X‾ +( Z + Z‾)= X‾ +1 (As Z + Z‾ = 1)=1 (As X‾ +1 = 1)
An 8086 interrupt can take placedue to the following reasons: 1. Hardware interrupts caused by some external hardware device. 2. Software interrupts that can be invoked wit
Bitwise-AND Operator: & AND-expression : relational-expression AND-expression & equality-expression The bitwise-AND operator (&) compares each bit of its first operand t
program to find area under the curve y=f(x) between x=a and y=b , integrate y=f(x)between limits of a and b
Define rotational latency and disk bandwidth. Rotational latency is the additional time waiting for the disk to rotate the desired sector to the disk head. The disk bandwidth i
Microprocessor have ROM chip because it have instructions to implement data. It have the monitor program which not only include implementation instruction but also interfacing
What is link destruction? Link destruction is inverse of link creation. When a link is destroyed makes sure the associated objects accessible by other handles or intentionally
algorithm of travalling salesman problam
Used to interrupt CPU normal implementation routine and to get its attention .Mostly generated by an external devices, timers, counters...etc
Blocking and Non-Blocking network In non-blocking networks the route from any free input node to any free output node can always be offered. Crossbar is an best example of non-
Explain difference between Security and Protection? Protection mechanism: The subsequent mechanisms are commonly utilized for protecting files having programs and data. (a
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd