Simplify the expressions using boolean postulates, Computer Engineering

Assignment Help:

Simplify the given expressions using Boolean postulates

XY + X‾Z‾  + XY‾Z (XY + Z)

Ans. XY + X‾Z‾ + XY‾Z (XY + Z)
= XY + X‾Z‾ + XY‾Z (XY + Z)
= XY + X‾Z‾  + XXYY‾Z + XY‾ZZ
= XY + X‾Z‾  + XYZ             (As YY‾ = 0 and ZZ = Z)
= XY + X‾ + Z‾ + XY‾Z (As X‾Z‾ = X‾ + Z‾)
= X‾ + XY + Z‾ + XY‾Z
= X‾ + X (Y + Y‾Z) + Z‾
= X‾  + X (Y +Z) + Z‾  (As Y + Y‾Z = Y+Z)
= X‾ + X Y (Z+ Z‾ ) + XZ + Z‾  (As Z+ Z‾  =1)
= X‾ + X Y Z + XYZ‾ + XZ + Z‾
= X‾ + XZ (1+ Y) + Z‾ (1+XY)
= X‾ + XZ + Z‾  (As 1+ Y = 1  and 1+XY = 1)
= X‾ + XZ) + Z‾
=(X‾ + Z) + Z‾  (As X‾ + XZ = X‾  + Z‾
= X‾  +( Z + Z‾)
= X‾ +1 (As Z + Z‾  = 1)
=1 (As X‾ +1 = 1)

 


Related Discussions:- Simplify the expressions using boolean postulates

difference among primary and secondary storage device, In primary storage ...

In primary storage device the storage capacity is fixed. It has a volatile memory. In secondary storage device the storage capacity is not limited. It is a nonvolatile memory. Prim

Why eprom chips are mounted in packages, Why EPROM chips are mounted in pac...

Why EPROM chips are mounted in packages that have transparent window? Since the erasure needs dissipating the charges trapped in the transistors of memory cells. This can be co

Determine the octal equivalent of decimal number, The octal equivalent of (...

The octal equivalent of (247) 10 is ? Ans. (247) 10 = (367) 8

What happens if acknowledge() is called within a transaction, As per the JM...

As per the JMS specification, when you are in a transaction, the acknowledge Mode is ignored. If acknowledge() is known as within a transaction, it is ignored.

Translate sentence into predicate logic - ai, Translate the following sente...

Translate the following sentences into predicate logic, using identity (=). a. Everyone was drunk except John. b. Christine rides a bike, but everyone else drives a car. c

Explain the commonly used code optimization techniques, Explain briefly any...

Explain briefly any three of the commonly used code optimization techniques. 1. Common sub expression elimination: In given expression as "(a+b)-(a+b)/4", in such "common

What is the file-system security, What is the File-system security Most...

What is the File-system security Most commercial servers use a powerful operating system as base that provides good methods of file-system security. Some servers require additi

Define the terms- action semantics and argouml, Define the terms- Action Se...

Define the terms- Action Semantics and  ArgoUML Action Semantics : Action semantics is a group of firms that have responded to the OMG's RFP to define the action semantics fo

Logical user-centered interactive design methodology, Question: Logical...

Question: Logical User-Centered Interactive Design Methodology is a methodology that identifies six clear stages to help in software development while keeping the user in mind.

Ldb need not be defined in the abap/4 dictionary, All nodes in the structur...

All nodes in the structure of LDB need not be defined in the ABAP/4 Dictionary False. One has to describe all nodes in the Dictionary or single has to select all nodes that a

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd