Perfect induction, Computer Engineering

Any identity or equality in Boolean algebra, suchas de Morgan's Theorem can be proved usingthe method of perfect induction.

1. All combinations of variables are written down.

2. Expressions thought to be identical arecomputed.

3. Identity is proved if the two results are thesame for every line.

E.g. X + X.Y = X + Y 

 

Perfect Induction.

Prove X + X.Y = X + Y

 

471_Perfect induction.png

Posted Date: 8/27/2012 2:12:41 AM | Location : United States







Related Discussions:- Perfect induction, Assignment Help, Ask Question on Perfect induction, Get Answer, Expert's Help, Perfect induction Discussions

Write discussion on Perfect induction
Your posts are moderated
Related Questions
Can we specify file transfer in a Web page? Explain with the help of suitable example. Yes, file transfer can be given in a web page. The first field within a URL gives a proto

What is polling? Polling is a scheme or an algorithm to recognize the devices interrupting the processor. Polling is employed when multiple devices interrupt the processor by o

Data Validation condition: The following condition stated below must be met for a data to be valid as is shown in the figure 3a below. 1. The data on the SDA line must remain stabl

Explain how presentation layer helps in establishing and processing data in End to End layers. The idea of the presentation layer is to stand for information to the communicati

assignment on transaction flow, transform flow, transform mapping: refining the architectural design

Program Level : It is the next level consisting of independent programs for parallelism. Coarse Granularity  size is used at this level containing ten thousands of instructions.

Which loader is executed when a system is first turned on or restarted? Ans. Bootstrap loader executed while a system is first turned on or restarted.

Define a register. Ans:  Register:   A register contain a group of flip-flops and gates which effect their transition. The flip flops hold the binary information and the g

Const and volatile keywords should not be used together due to both are opposite in nature. A variable is declared as "const" means its value is not able to be altered but if i

Give some examples of malicious data. In May 2002 year, the Norton Anti-Virus software for Windows operating systems detected around 61000 malicious programs. Several of them a