Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1:

a) Simplify the following Boolean function using 5 variable maps:

F = A’B’CE’+ A’B’C’D’ + B’D’E’ + B’CD’ + CDE’ + BDE’
 
b) Simplify the function F together with the don’t – care conditions in POS:

F(a,b,c,d) = ∑ (3,4,13,15)+ d (a,b,c,d) = ∑ (1,2,5,6,8,10,12,14)
 
c) Implement the following function with NAND gages f (x,y,z) = ∑ (0,6)

problem 2:

a) Implement the following function with NOR gates f (x,y,z) = ∑ (0,6)

b) Simplify the following functions in POS F (a,b,c,d) = II (1,3,5,7,13,15)
 
c) Simplify the function F together with the don’t – care conditions in SOP

F(w,x,y,z) = ∑ (0,1,2,3,7,8,10) d (w,x,y,z) = (5,6,11,15)
 
problem 3
:

a) Simplify the following Boolean functions using 4 variable map

ab’c + b’c’d + bcd + acd’ + a’b’c + a’bc’d
 
b) Simplify the following Boolean function F together with the don’t care conditions d; then express the simplified function in sum of mintems

F(w,x,yz) = ∑ (0,6,8,13,14) d (w,x,y,z) = ∑ (2,4,10)
 
c) Find the minterms of the following Bollean expression by first plotting each function in a map:

i) xy+yz+xy’z

ii) c’d+abc’+abd’+a’b’d
 
problem 4:

a) Simplify the given Boolean functions using 3 variable Kmap:

i) F (x,y,z) = ∑ (0,1,5,7)

ii) F (x,y,z) = ∑ (1,2,3,6,7)
 
b) Simplify the following Boolean functions using 3 variable map:

i) xy+x’y’z’+x’yz’

ii) x’y’+yz+x’yz’

c) Simplify the following Boolean functions using 4 variable K map:

i) w’z’ + xz + x’z + wx’z

ii) b’d + a’bc’+ab’c+abc’

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M93451

Have any Question? 


Related Questions in Computer Engineering

1 write a program that contains a text field a button add

1. Write a program that contains a text field, a button "Add Value", and a component that draws a bar chart of the numbers that a user typed into the text field. 2. Write a program that draws a clock face with a time tha ...

Assume you need to write and test a client-server

Assume you need to write and test a client-server application program on two hosts you have at home. a. What is the range of port numbers you would choose for the client program? b. What is the range of port numbers you ...

1 using the web identify some certifications with an

1. Using the Web, identify some certifications with an information security component that were not discussed in this chapter. 2. Search the Web for at least five job postings for a security administrator. What qualifica ...

Programming assignment linker you are to implement a

Programming Assignment: Linker You are to implement a two-pass linker and submit the source code, which we will compile and run. Submit your source code together with a Makefile as a ZIP file with directory through NYU C ...

1 assume there is a server with the domain name

1. Assume there is a server with the domain name www.common.com. a. Show an HTTP request that needs to retrieve the document /usr/users/doc. The client accepts MIME version 1, GIF or JPEG images, but the document should ...

1 define cir bc and be and explain how a frame relay

1. Define CIR, Bc, and Be and explain how a Frame Relay service provider uses them. 2. What are the most important criteria for selecting a WAN service provider? 3. Why are QoS features often necessary in WAN routers? 4. ...

1 in chapter 1 we mentioned that the tcpip suite unlike the

1. In Chapter 1, we mentioned that the TCP/IP suite, unlike the OSI model, has no session layer. But an application-layer protocol can include some of the features defined in this layer if needed. Does SMTP or POP3 have ...

1 what does it mean to say that a product is cc or tcsec

1. What does it mean to say that a product is CC or TCSEC compliant? 2. Research and find out if there are any widely used computer product security evaluation criteria. 3. Using the product evaluation list for computer ...

1 list and describe the four classes of fire described in

1. List and describe the four classes of fire described in the text. Does the class of a fire dictate how to control the fire? 2. What is Halon, and why is its use restricted?

In the sixth lab we analyze the behavior of the dns

In the sixth lab, we analyze the behavior of the DNS protocol. In addition to Wireshark, several network utilities are available for finding some information stored in the DNS servers. In this lab, we use the dig utiliti ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro