Prove equations by using the boolean algebraic theorems, Computer Engineering

Assignment Help:

Prove the equations using the Boolean algebraic theorems that is given below
A‾BC + AB‾C + ABC‾+ ABC = AB + BC + AC


Ans. The equation given is A‾BC + AB‾C + ABC‾+ ABC = AB + BC + AC
L.H.S = A‾BC + AB‾C + ABC‾+ ABC
= A‾BC + AB‾C + AB (C +C‾)
= A‾BC + AB‾C + AB (Q C + C‾ = 1)
= A‾BC + A (B + B‾C)
= A‾BC + A (B + C) (? B + B‾C = B + C)
= A‾BC + A B + AC
= C (A + A‾B) + AB + AC
= C (A + B) + A B + AC (? A + A‾B = A + B)
= AC + BC + AB + AC
= AB + BC + AC (? AC + AC = AC)
= R.H.S Thus Proved


Related Discussions:- Prove equations by using the boolean algebraic theorems

An example of two stages network have switching elements, For two stages ne...

For two stages network the switching elements for M inlets with r blocks and N outlets with s blocks is given by (A) Ms + Nr                                (B)  Mr + Ns (

What is domain explain, Q. What is Domain explain? Domain can be an apa...

Q. What is Domain explain? Domain can be an apartment complex, a town or even a country. Sub-domains can correspond to organizations like expertsmind. United States comes under

What is processor time of a program, What is processor time of a program? ...

What is processor time of a program? The periods during which the processor is active is known as processor time of a program it depends on the hardware included in the executi

Simulate a worm propagation considering traffic delay, At time t when an in...

At time t when an infected machine scans and finds a vulnerable machine, the vulnerable one will be compromised and start to scan and infect others at time t+X, where X is a r.v. f

Number used as operand data type, Q. Number used as operand data type? ...

Q. Number used as operand data type? Numbers: All machine languages comprise numeric data types. Numeric data generally use one of the three representations: o Floating po

Explain public key encryption, Public Key Encryption A cryptographic sy...

Public Key Encryption A cryptographic system that uses two-keys-a public  key known to everyone and a private or secret key known only to the recipient of the message. An si

Define program counter, Define Program Counter(PC) The Program Counter ...

Define Program Counter(PC) The Program Counter holds the address of the next instruction to be read from memory after the current instruction is implemented.

Write a short note on structure chart, Write a short note on structure char...

Write a short note on structure chart.    Structure Chart is an significant program design method and it shows all components of code in a hierarchical format

How do we save a selected sub-image to a file in gimp, Use "Edit->Paste As-...

Use "Edit->Paste As->New Image" menu command or press Ctrl-Shift-V key combination, then save newly created image.The script-fu-selection-to image can also be used to cut a selecti

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd