Simplify the expressions using boolean postulates, Computer Engineering

Assignment Help:

Simplify the given expressions using Boolean postulates

XY + X‾Z‾  + XY‾Z (XY + Z)

Ans. XY + X‾Z‾ + XY‾Z (XY + Z)
= XY + X‾Z‾ + XY‾Z (XY + Z)
= XY + X‾Z‾  + XXYY‾Z + XY‾ZZ
= XY + X‾Z‾  + XYZ             (As YY‾ = 0 and ZZ = Z)
= XY + X‾ + Z‾ + XY‾Z (As X‾Z‾ = X‾ + Z‾)
= X‾ + XY + Z‾ + XY‾Z
= X‾ + X (Y + Y‾Z) + Z‾
= X‾  + X (Y +Z) + Z‾  (As Y + Y‾Z = Y+Z)
= X‾ + X Y (Z+ Z‾ ) + XZ + Z‾  (As Z+ Z‾  =1)
= X‾ + X Y Z + XYZ‾ + XZ + Z‾
= X‾ + XZ (1+ Y) + Z‾ (1+XY)
= X‾ + XZ + Z‾  (As 1+ Y = 1  and 1+XY = 1)
= X‾ + XZ) + Z‾
=(X‾ + Z) + Z‾  (As X‾ + XZ = X‾  + Z‾
= X‾  +( Z + Z‾)
= X‾ +1 (As Z + Z‾  = 1)
=1 (As X‾ +1 = 1)

 


Related Discussions:- Simplify the expressions using boolean postulates

Evaluate 23 - 48 using the 2's complement method, Perform the 23 - 48 opera...

Perform the 23 - 48 operations using the 2's complement method. Ans. Given 23 - 48 firstly add them       23                         0 1 0 1 1 1 - (- 48)                     +

Explain about local area network, Q. Explain about Local Area Network? ...

Q. Explain about Local Area Network? Local Area Network (LAN):  It is privately owned communication systems that cover up a small area, say a complex of buildings or school. Le

Use of intrinsic functions in fortran, Q. Use of Intrinsic Functions in FOR...

Q. Use of Intrinsic Functions in FORTRAN? HPF initiates some new intrinsic functions also to those defined in F90. The two mainly often used in parallel programming are system

Describe about physical systems, Q. Describe about Physical Systems? Ph...

Q. Describe about Physical Systems? Physical Systems are tangible entities which may be dynamic or static.   Computer Systems, Buildings,Vehicles etc. are illustrations of p

Characteristics of extreme unencoded micro-instructions, Q. Characteristics...

Q. Characteristics of extreme unencoded micro-instructions? 1. Two sources can be attached by respective control signals to a single destination; though only one of these sourc

State the scope of security policy, State the scope of security policy ...

State the scope of security policy The scope of security policy depends on aspects such as the size of the Intranet site, type of information hosted on it, and the number of u

Create a social network application, A software development company wants t...

A software development company wants to create a social network application where users can post brief audio messages giving their thoughts. Each user of the application will ha

What are the major systems of a telecommunication network, What are the maj...

What are the major systems of a telecommunication network? The main systems of any telecommunication network may contain the following main systems: a. Subscriber end instr

Illustrate decimal fixed point representation, Q. Illustrate Decimal Fixed ...

Q. Illustrate Decimal Fixed Point Representation? The point of this representation is to keep the number in decimal equivalent form and not binary as above. A decimal digit is

Visibility, hidden edge/surface removal

hidden edge/surface removal

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd