Verify the following using Boolean Laws.
A’+ B’.C = A’.B’.C’+ A’.B.C’+ A’.B.C + A’.B’.C+ A.B’.C
Derive a Canonical POS expression for a Boolean function F, represented by the following truth table:
P | Q | R | F(P, Q, R) |
0 | 0 | 0 | 0 |
0 | 0 | 1 | 1 |
0 | 1 | 0 | 1 |
0 | 1 | 1 | 0 |
1 | 0 | 0 | 0 |
1 | 0 | 1 | 0 |
1 | 1 | 0 | 1 |
1 | 1 | 1 | 1 |
Reduce the following Boolean Expression to its simplest form using K-Map:
F(X,Y,Z,W)= (2,6,7,8,9,10,11,13,14,15)
Which protocol helps us to browse through web pages using internet browsers?
Name any one internet browser.
Write two advantages of 4G over 3G Mobile Telecommunication Technologies in terms of speed and services?
What is the basic difference between Trojan Horse and Computer Worm?
Trojan Horse | Computer Worm |
It is a "Malware" computer program presented as useful or harmless in order to induce the user to install and run them. |
It is a selfâreplicating computer program. It uses a network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. |
Categories the following under Client side and Server Side script category?