Distributivity of connectives, Computer Engineering

Distributivity of Connectives :

In our last analogy with arithmetic will involve a very well-technique need for playing around with algebraic properties. But assume there if we wanted to work out: 10 * (3 + 5). Than we could do it like this: 10 * (3 + 5) = 10 * 8 = 80. And may be we could do it like this: (10 * 3) + (10 * 5) = 30 + 50 = 80. In fact generally, we know that, for any numbers, a, b and c: a * (b + c) = (a * b) + (a * c). But like this type of theory, we say that multiplication is  distributive over addition. 

Now if you guessed it, that we can distribute some of more the connectives too. In generally or in particular way, ^ is distributive ? over and vice versa: ? is just distributive over ^. We can present these as equivalences as givens: 

663_Distributivity of Connectives.png

What's more, we saw earlier like → is distributive over ^  , and the same as is true for →over ?  .  So therefore:

1300_Distributivity of Connectives1.png

Posted Date: 1/11/2013 5:39:05 AM | Location : United States







Related Discussions:- Distributivity of connectives, Assignment Help, Ask Question on Distributivity of connectives, Get Answer, Expert's Help, Distributivity of connectives Discussions

Write discussion on Distributivity of connectives
Your posts are moderated
Related Questions
What is Directory?   The device directory or simply called as directory records information-such as name, location, size, and type for all files on that certain partition. The

In a word,you can't. It would certainly be helpful to be able to color-code your worksheet tabs. For some reason, Microsoft hasn't executed this feature, which has been available i

Q. Define Wait protocol? The wait protocol is used for resolving conflicts that arise due to some multiprocessors requiring same resource. There are 2 kinds of wait protocols:

Initial thought process: Design a script which was simple and user friendly.  Integrate procedures/functions to extract data under the hood.  I focused on giving the user the o

How many services are supported by internet? The firewall software assists at least Internet services: HTTP, FTP, Gopher, SMTP and Telnet. DNS name resolution, preferably th

Discuss the customer-to-customer transactions. C2C (customer-to-customer): Person-to-person transactions are the oldest type of e-business. They have been there since the

Define the various actions a process might be take upon receiving a signal? There are various actions a process might be take upon receiving a signal here are three different d

Which 802 standard provides for a collision free protocol? 802.5 standard gives for a collision free protocol.

The Credit Line The Credit Line is a set of informational facts usually found below or beside a picture of a work of art. Should the picture appear in a book, magazine, poster,

One of the fault base testing techniques is:- Mutation testing is the fault base testing.