Simplify the expressions by using boolean postulates, Computer Engineering

Assignment Help:

Simplify the given expressions using Boolean postulates
Y = (A + B)(A‾ + C)(B + C)

Ans. Y = (A + B)(A‾ + C)(B + C)
= (A A‾ + AC + B A‾ + BC) (B + C)
= (AC + B A‾ + BC) (B + C)                               (As A A‾ = 0)
= ABC + BB A‾ + BBC + ACC + BA‾C + BCC
= ABC + B A + BC + AC + BA‾C + BC            (As BB = B)
= ABC + AC + BA‾ + BA‾C+ BC                     (As BC + BC = BC)
=AC (B+1) + B A‾ + BC (A‾ +1)
= AC + B A‾ + BC                                                (As B + 1 = 1 and A‾ + 1 = 1)
= AC + B A‾ + BC (A + A‾)                                  (As A + A‾ = 1)
= AC + BA‾ + BCA + BCA‾
= AC(1 + B) + BA‾ (1 + C)

= AC + BA‾                     {As (1 + B) = 1 and (1 +C) = 1}.


Related Discussions:- Simplify the expressions by using boolean postulates

Illustrate the advantages of register transfer, Register Transfer We as...

Register Transfer We assign computer registers by capital letters to denote function of the register. Such as, the register which holds an address for memory unit is usually

Determine the octal equivalent of decimal number, The octal equivalent of (...

The octal equivalent of (247) 10 is ? Ans. (247) 10 = (367) 8

Solve out linear equations, Assume that you have been asked to solve proble...

Assume that you have been asked to solve problem with exact area constraints, the area error being no more than 1% for each department. What are the linear equations you would nee

Cryptography, 1. Consider the one-time pad encryption scheme to encrypt a 1...

1. Consider the one-time pad encryption scheme to encrypt a 1-bit message m, and assume m is chosen with uniform distribution from message space M={0,1}. Let E1 be the event "messa

Security analysis, Security Analysis: Suppose you are a young securiti...

Security Analysis: Suppose you are a young securities analyst, working in a small brokerage firm. You have access to publicly available information relevant to valuation of th

What is secondary list, What is secondary list? It permits you to enha...

What is secondary list? It permits you to enhance the information presented in the basic list.  The user can, for example, select a line of the basic list for which he require

Minterms, A minterm is an AND expression involving all input variables in e...

A minterm is an AND expression involving all input variables in either inverted or non-inverted form.For one particular row the associated mintermis the only minterm which equals l

What is bus arbitration, Q. What is Bus arbitration? In this technique,...

Q. What is Bus arbitration? In this technique, I/O interface first needs to control bus and only after that it can request for an interrupt. In this technique because only one

By which the excess-3 code of decimal 7 is represented , The excess-3 code ...

The excess-3 code of decimal 7 is represented by ? Ans. An excess 3 code of decimal 7 is equal to the binary code +3.

Programming, DADA Electronics makes CD players in 3 processes: programming,...

DADA Electronics makes CD players in 3 processes: programming, and packaging. Direct materials are added at the starting of the assembly process. Conversion costs are incurred even

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd