Distributivity of connectives, Computer Engineering

Assignment Help:

Distributivity of Connectives :

In our last analogy with arithmetic will involve a very well-technique need for playing around with algebraic properties. But assume there if we wanted to work out: 10 * (3 + 5). Than we could do it like this: 10 * (3 + 5) = 10 * 8 = 80. And may be we could do it like this: (10 * 3) + (10 * 5) = 30 + 50 = 80. In fact generally, we know that, for any numbers, a, b and c: a * (b + c) = (a * b) + (a * c). But like this type of theory, we say that multiplication is  distributive over addition. 

Now if you guessed it, that we can distribute some of more the connectives too. In generally or in particular way, ^ is distributive ? over and vice versa: ? is just distributive over ^. We can present these as equivalences as givens: 

663_Distributivity of Connectives.png

What's more, we saw earlier like → is distributive over ^  , and the same as is true for →over ?  .  So therefore:

1300_Distributivity of Connectives1.png


Related Discussions:- Distributivity of connectives

Numbers square, Your professor wants you to fill a two-dimensional N by N m...

Your professor wants you to fill a two-dimensional N by N matrix with some numbers by following a specific pattern. According to his explanation as in the figure below, you have to

What is a call request signal, Call request signal is: (A)  Seize sig...

Call request signal is: (A)  Seize signal (B) Idle state signal (C)  Line identification signal (D) Called subscriber alert signal      Ans: Call request

Explain about end-user computing, End-user Computing: The growing base of p...

End-user Computing: The growing base of personal computers and local area networks in the end user community are supported. This offers installation services, training and helps de

What is scan, What is "Scan"? Scan Insertion and ATPG helps test ASICs ...

What is "Scan"? Scan Insertion and ATPG helps test ASICs (e.g. chips) during manufacture. If you know what JTAG boundary scan is, then Scan is the similar idea except that it i

How many flip flops are required to construct decade countr, How many flip ...

How many flip flops are required to construct a decade counter ? Ans. 4 FlipFlop's are required because decade counter counts 10 states from 0 to 9 (that is from 0000 to 1001).

What is delayed branching, What is delayed branching? A method called d...

What is delayed branching? A method called delayed branching can minimize the penalty incurred as a result of conditional branch instructions. The idea is easy. The instruction

Explain the operation of octal to binary encoder, Explain the operation of ...

Explain the operation of octal to binary encoder. Ans Octal to binary encoder consists of eight inputs, one for each of eight digits and three outputs which generate the con

What is critical section problem, What is critical section problem?  Co...

What is critical section problem?  Consider a system having of 'n' processes. Each process has segment of code known as a critical section, in which the process may be changing

Explain management information base variables, Explain MIB (Management Info...

Explain MIB (Management Information Base) variables. MIB is a set of named items which an SNMP agent knows. To control or monitor a remote computer, a manager should fetch or s

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd