+1-415-315-9853

info@mywordsolution.com

## Engineering

 Civil Engineering Chemical Engineering Electrical & Electronics Mechanical Engineering Computer Engineering Engineering Mathematics MATLAB Other Engineering Digital Electronics Biochemical & Biotechnology

problem 1:

a) Show that the dual of the exclusive – OR is equal to its complement

b) Prove that if w’x+yz’= 0, then wx+y’(w’+z’) = wx + xz + x’z’ +w’y’z

c) Find out the Canonical SOP representation of the functions:

i) f (x,y,z) = z+(x’y) (x+y’)

ii) f (x,y,z) = x + (x’y’+x’z)’

problem 2:

a) Given the following Boolean function. F = xy’z + x’y’z+w’xy+wx’y+wxy

i) Obtain the truth table of the function.
ii) Draw the logic diagram using the original Boolean function.

b) Simplify the given Boolean expressions to a minimum number of literals:

i) x’ y’ + xy + x’y

ii) x’y+xy’+xy+x’y’

iii) (x+y) (x+y’)

iv) x’ + xy + xz’ + xy’ z’

c) Find out the complement of the given expressions:

i) xy’ + x’y

ii) ab (c’d+cd’) +a’b’(c’+d) (c+d’)

problem 3:

a) Express the following functions in sum of minterns and product of maxterms.

i) F(a,b,c,d) = b’d+a’d+bd

ii) f(x,y,z) = (xy+z) (xz+y)

b) Draw the logic diagram of the given Boolean expression:

F(x,y,z) = xy’z + x’yz + xyz + xyz’

c) Reduce the given Boolean expressions to the indicated number of literals:

i) a’c’ + abc + ac’ – (3)

ii) (x’y’+z)’ + z+xy+wz – (3)

problem 4:

a) Draw the logic diagram corresponding to the given Boolean expression:

bc’ + ab+acd

b) Draw the logic diagram corresponding to the following Boolean expression:

(a+b)(c+d)(a’b+d)

c) Convert the given to the other canonical form:

i) (ab+c) (b+c’d)

ii) x’+x(x+y’) (x+z’)

Computer Engineering, Engineering

• Category:- Computer Engineering
• Reference No.:- M93449

Have any Question?

## Related Questions in Computer Engineering

### Using english text and patterns determine the average

Using English text and patterns determine the average behavior of the pattern searching algorithm in (Implement a version of the current pattern searching algorithm that counts the number of times a given pattern occurs ...

### Suppose the fed is concerned that deflation would harm the

Suppose the Fed is concerned that deflation would harm the economy over the long run. Use the IS-MP model (including the output gap Phillips curve in all your graphs) to analyze how the Federal Reserve would fight deflat ...

### Docking percolation and fire often when looking at the fire

Docking percolation and fire Often when looking at the Fire model we ask what density of trees is necessary to reach the right side of the screen. We can ask the same question about the porosity value in the Percolation ...

### What is the time complexity as a function of the number n

What is the time complexity, as a function of the number n of vertices and m of edges, of the following network operations if the network in question is stored in adjacency list format? a) Calculating the mean degree. b) ...

### 1 evaluate the worst case time-complexity of the sparse

1. Evaluate the worst case time-complexity of the Sparse Matrix ADT implemented in Programming Project 9.7. 2. Provide the code to implement the four basic operations - traversal, search, insertion, deletion - for an uns ...

### Multimedia systems development ittopic research a current

Multimedia Systems Development IT Topic: Research a current computer game such as Manhunt, EverQuest, or World of Warcraft. If you were a key member of the development team that created that game, what specific principle ...

### 1 suppose you are doing a random walk see previous problem

1. Suppose you are doing a random walk (see previous problem) on the blocks of a city street. At each "step" you choose to walk one block (at random) either forward, backward, left or right. In n steps, how far do you ex ...

### We consider the long-term security of the advanced

We consider the long-term security of the Advanced Encryption Standard (AES) with a key length of 128-bit with respect to exhaustive key-search attacks. AES is perhaps the most widely used symmetric cipher at this time. ...

### 1 what is the difference between a compiler and an

1. What is the difference between a compiler and an interpreter? 2. What are the advantages of (a) a compiler over an interpreter (b) an interpreter over a compiler? 3. What advantages are there to a language-processing ...

### Excel assignmentthe year 1 number of tickets sales cell c12

Excel Assignment The Year 1 "Number of Tickets Sales" (cell c12) is the same as the initial "Average Number Tickets Sold Annually" (cell c6). In Years 2 and 3, the value for "Number of Tickets Sales" will increase by the ...

• 13,132 Experts

## Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

### WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

### Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

### Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

### Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

### Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro