MHB Analyzing Circuits: Fill in F Column Values in Truth Table

  • Thread starter Thread starter shamieh
  • Start date Start date
  • Tags Tags
    Circuits
AI Thread Summary
The discussion focuses on analyzing a circuit and filling in the F column values of a truth table. The initial submission of truth values for F was incorrect, as the user mistakenly evaluated the expressions. The correct expression for F is given as F = (xy) ⊕ (x ⊕ z). After reevaluating the truth table with this expression, the user provided the corrected values, highlighting the importance of accurately following the logical operations in the circuit analysis. The user acknowledges the error in their previous calculations and expresses gratitude for the assistance received.
shamieh
Messages
538
Reaction score
0
Analyze the following circuit then fill in the F column values in the truth table for the circuit.

View attachment 1418

Just need someone to check my work.

My Answer:
  • X Y Z | F
  • 0 0 0 | 0
  • 0 0 1 | 0
  • 0 1 0 | 0
  • 0 1 1 | 0
  • 1 0 0 | 0
  • 1 0 1 | 0
  • 1 1 0 | 0
  • 1 1 1 | 1

(By the way not sure why my phone is rotating all my pictures, apologies in advance).
 

Attachments

  • photo(2).JPG
    photo(2).JPG
    27 KB · Views: 106
Technology news on Phys.org
Assuming you meant that $F=(xy) \oplus (x \oplus z),$ where the $\oplus$ symbol stands for "exclusive OR", then I get the following (building up the truth table from the beginning):
$$
\begin{array}{c|c|c|c|c|c}
x &y &z &xy &x \oplus z &(xy) \oplus(x \oplus z)\\ \hline
0 &0 &0 &0 &0 &0 \\
0 &0 &1 &0 &1 &1 \\
0 &1 &0 &0 &0 &0 \\
0 &1 &1 &0 &1 &1 \\
1 &0 &0 &0 &1 &1 \\
1 &0 &1 &0 &0 &0 \\
1 &1 &0 &1 &1 &0 \\
1 &1 &1 &1 &0 &1
\end{array}
$$
 
I'm a moron. I was evaluating xy then evaluating y ⊕ z. I see the problem now. Thanks for the help Ach!
 
Thread 'Is this public key encryption?'
I've tried to intuit public key encryption but never quite managed. But this seems to wrap it up in a bow. This seems to be a very elegant way of transmitting a message publicly that only the sender and receiver can decipher. Is this how PKE works? No, it cant be. In the above case, the requester knows the target's "secret" key - because they have his ID, and therefore knows his birthdate.
Thread 'Project Documentation'
Trying to package up a small bank account manager project that I have been tempering on for a while. One that is certainly worth something to me. Although I have created methods to whip up quick documents with all fields and properties. I would like something better to reference in order to express the mechanical functions. It is unclear to me about any standardized format for code documentation that exists. I have tried object orientated diagrams with shapes to try and express the...
Back
Top