Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1:

a) Show that the dual of the exclusive – OR is equal to its complement
 
b) Prove that if w’x+yz’= 0, then wx+y’(w’+z’) = wx + xz + x’z’ +w’y’z
 
c) Find out the Canonical SOP representation of the functions:

i) f (x,y,z) = z+(x’y) (x+y’)

ii) f (x,y,z) = x + (x’y’+x’z)’
 
problem 2:

a) Given the following Boolean function. F = xy’z + x’y’z+w’xy+wx’y+wxy

i) Obtain the truth table of the function.
ii) Draw the logic diagram using the original Boolean function.
 
b) Simplify the given Boolean expressions to a minimum number of literals:

i) x’ y’ + xy + x’y

ii) x’y+xy’+xy+x’y’

iii) (x+y) (x+y’)

iv) x’ + xy + xz’ + xy’ z’

c) Find out the complement of the given expressions:

i) xy’ + x’y

ii) ab (c’d+cd’) +a’b’(c’+d) (c+d’)

problem 3:

a) Express the following functions in sum of minterns and product of maxterms.

i) F(a,b,c,d) = b’d+a’d+bd

ii) f(x,y,z) = (xy+z) (xz+y)
 
b) Draw the logic diagram of the given Boolean expression:

F(x,y,z) = xy’z + x’yz + xyz + xyz’

c) Reduce the given Boolean expressions to the indicated number of literals:

i) a’c’ + abc + ac’ – (3)

ii) (x’y’+z)’ + z+xy+wz – (3)

problem 4:

a) Draw the logic diagram corresponding to the given Boolean expression:

bc’ + ab+acd
 
b) Draw the logic diagram corresponding to the following Boolean expression:

(a+b)(c+d)(a’b+d)
 
c) Convert the given to the other canonical form:

i) (ab+c) (b+c’d)

ii) x’+x(x+y’) (x+z’)

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M93449

Have any Question? 


Related Questions in Computer Engineering

Explain the characteristics of successful mentoring

Explain the characteristics of successful mentoring programs.

Your group is working for a global organization that

Your group is working for a global organization that handles highly classified intellectual property. In many situations and scenarios, the implementation and operations teams have been creating and setting up environmen ...

1 what do you get if you add -14 to itself 4 times what is

1. What do you get if you add -1/4 to itself 4 times? What is -1/4 × 4? Are they the same? What should they be? 2. Write down the bit pattern in the fraction of value 1/3 assuming a floating point format that uses binary ...

1 using rfc 1939 assume a pop3 client is in the

1. Using RFC 1939, assume a POP3 client is in the download-and-keep mode. Show the transaction between the client and the server if the client has only two messages of 192 and 300 bytes to download from the server. 2. Us ...

Choose a queue of initial size n then use a random number

Choose a queue of initial size n, then use a random number generator to simulate insertions and deletions (e.g. 0 ? additions, 0.5 ≤ 1.0 ? deletion) and determine what is the minimum array size that will support this que ...

Define the group of each of the following multicast

Define the group of each of the following multicast addresses (local network control block, internetwork control block, SSM block, Glop block, or administratively scoped block): a. 224.0.1.7 b. 232.7.14.8 c. 239.14.10.12

Modeling food webs we mentioned how abm can be used to

Modeling food webs We mentioned how ABM can be used to describe food webs. However, these models are often written as an aggregate description. Imagine a model where instead of individual wolf and sheep there is simply a ...

Components of a telecommunication system and basic computer

Components of a Telecommunication System and Basic Computer Network Components are major components of a business : What are the main differences of these two systems? Do you need to have both of them to support your com ...

1 using the resources available in your library find out

1. Using the resources available in your library, find out what laws your state has passed to prosecute computer crime. 2. Using a Web browser go to www.eff.org. What are the current top concerns of this organization?

1 what mac protocol is used in the baseband layer of

1. What MAC protocol is used in the baseband layer of Bluetooth? 2. What is the role of the L2CAP layer in Bluetooth? 3. In an 802.11, give the value of the address 1 field in each of the following situations (left bit d ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro