2.4.3
Truth Tables
Test your knowledge with free interactive questions on Seneca — used by over 10 million students.
Truth Tables
A truth table shows all possible input combinations and their corresponding outputs, helping to test and complete logic expressions or circuits systematically.

What is a truth table?
- A truth table is used to demonstrate the logic of a logic circuit or a Boolean expression.
- It shows the outcome (the 'output') for every possible combination of inputs.
- Inputs can only be 0 (false) or 1 (true).
- Truth tables are a systematic way to test how logic gates behave and if a logic circuit works as expected.

Building a simple truth table
- A truth table has columns for each input and a column for the final output.
- It is common to give the input and output a label (e.g. Input = A, Output = X)
- The number of possible input combinations is calculated as 2n, where n is the number of inputs.
- For one input, there are 21 = 2 combinations (0 and 1).
- For two inputs, there are 22 = 4 combinations (00, 01, 10, 11).
- For three inputs, there are 23 = 8 combinations.

Completing a truth table
- You may be asked to complete a truth table from:
- A problem statement (e.g. “The alarm sounds if both sensors detect movement”)
- A logic expression (e.g. 𝐴⋅𝐵+𝐶)
- A logic circuit (given as a diagram with NOT, OR, NAND or other gates)
- For each row, calculate the output by applying the logic operators or gates to the input values.

Three-input truth table example
- To complete a truth table, you need to know the specific logic circuit or expression.
- With 3 inputs, there are 8 possible combinations of 0s and 1s.
- Each row shows one possible input combination and the corresponding output.
1Computer Systems
1.1Data Representation
1.1.1Binary Numbers1.1.2Negative Binary Numbers1.1.3Hexadecimal1.1.4Using Hexadecimal1.1.5Converting Binary & Hexadecimal1.1.6Converting Denary & Hexadecimal1.1.7Capacity1.1.8Calculating Capacity Requirements1.1.9Binary in Computer Systems1.1.10Data Compression1.1.11Run Length Encoding1.1.12File Formats
1.2Data Transmission
1.3Hardware
1.3.1Elements of Computer Systems1.3.2Types of Computer System1.3.3Von Neumann Architecture1.3.4The Fetch, Decode, Execute Cycle1.3.5Factors Affecting CPU Performance1.3.6Computational Logic1.3.7Input Devices1.3.82D & 3D Scanners1.3.9Code Readers1.3.10Solid State Storage1.3.11Magnetic Storage1.3.12Examples of Magnetic Storage1.3.13Optical Storage1.3.14Examples of Optical Storage1.3.15Types of Optical disk1.3.16Storage Requirements1.3.17Translation - Compilers1.3.18Translation - Interpreters1.3.19Translation - Assemblers1.3.20Acoustic Sensors1.3.21Flow Sensors1.3.22Gas Sensors1.3.23Humidity Sensors1.3.24Infrared Sensors1.3.25Level Sensors1.3.26Light Sensors1.3.27Magnetic Field Sensors1.3.28Moisture Sensors1.3.29pH Sensors1.3.30Pressure Sensors1.3.31Proximity Sensors1.3.32Temperature Sensors1.3.33Network Hardware
1.5The Internet & its Uses
1.6Cyber Security
1.6.1Forms of Attack1.6.2Penetration Testing1.6.3Types of Malware1.6.4How Malware Spreads1.6.5Protecting Against Malware1.6.6Information Security1.6.7Structured Query Language (SQL) Injection1.6.8Firewalls1.6.9Authentication: User Access Levels1.6.10Authentication: Passwords1.6.11Social Engineering1.6.12Phishing1.6.13Denial of Service Attacks
1.7Automated & Emerging Technologies
2Algorithms, Programming & Logic
2.1Algorithm Design & Problem Solving
2.1.1Computational Thinking - Abstraction2.1.2Computational Thinking - Decomposition2.1.3Computational Thinking - Algorithmic Thinking2.1.4Pseudocode2.1.5Flow Diagrams2.1.6Interpreting, Correcting & Completing Algorithm2.1.7Correcting Algorithms2.1.8Completing Algorithms2.1.9Testing2.1.10Types of Testing2.1.11Test Plans2.1.12Validation & Sanitation2.1.13Authentication & Contingencies
2.2Programming
2.2.1Programming Fundamentals - Variables & Constants2.2.2Programming Fundamentals - Comments2.2.3Programming Fundamentals - Input & Output2.2.4Data Types2.2.5Casting2.2.6Controlling Program Flow - Sequence2.2.7Controlling Program Flow - Selection2.2.8Controlling Program Flow - Iteration2.2.9Modularity - Subroutines2.2.10Modularity - Scope2.2.11Arrays
Jump to other topics
1Computer Systems
1.1Data Representation
1.1.1Binary Numbers1.1.2Negative Binary Numbers1.1.3Hexadecimal1.1.4Using Hexadecimal1.1.5Converting Binary & Hexadecimal1.1.6Converting Denary & Hexadecimal1.1.7Capacity1.1.8Calculating Capacity Requirements1.1.9Binary in Computer Systems1.1.10Data Compression1.1.11Run Length Encoding1.1.12File Formats
1.2Data Transmission
1.3Hardware
1.3.1Elements of Computer Systems1.3.2Types of Computer System1.3.3Von Neumann Architecture1.3.4The Fetch, Decode, Execute Cycle1.3.5Factors Affecting CPU Performance1.3.6Computational Logic1.3.7Input Devices1.3.82D & 3D Scanners1.3.9Code Readers1.3.10Solid State Storage1.3.11Magnetic Storage1.3.12Examples of Magnetic Storage1.3.13Optical Storage1.3.14Examples of Optical Storage1.3.15Types of Optical disk1.3.16Storage Requirements1.3.17Translation - Compilers1.3.18Translation - Interpreters1.3.19Translation - Assemblers1.3.20Acoustic Sensors1.3.21Flow Sensors1.3.22Gas Sensors1.3.23Humidity Sensors1.3.24Infrared Sensors1.3.25Level Sensors1.3.26Light Sensors1.3.27Magnetic Field Sensors1.3.28Moisture Sensors1.3.29pH Sensors1.3.30Pressure Sensors1.3.31Proximity Sensors1.3.32Temperature Sensors1.3.33Network Hardware
1.5The Internet & its Uses
1.6Cyber Security
1.6.1Forms of Attack1.6.2Penetration Testing1.6.3Types of Malware1.6.4How Malware Spreads1.6.5Protecting Against Malware1.6.6Information Security1.6.7Structured Query Language (SQL) Injection1.6.8Firewalls1.6.9Authentication: User Access Levels1.6.10Authentication: Passwords1.6.11Social Engineering1.6.12Phishing1.6.13Denial of Service Attacks
1.7Automated & Emerging Technologies
2Algorithms, Programming & Logic
2.1Algorithm Design & Problem Solving
2.1.1Computational Thinking - Abstraction2.1.2Computational Thinking - Decomposition2.1.3Computational Thinking - Algorithmic Thinking2.1.4Pseudocode2.1.5Flow Diagrams2.1.6Interpreting, Correcting & Completing Algorithm2.1.7Correcting Algorithms2.1.8Completing Algorithms2.1.9Testing2.1.10Types of Testing2.1.11Test Plans2.1.12Validation & Sanitation2.1.13Authentication & Contingencies
2.2Programming
2.2.1Programming Fundamentals - Variables & Constants2.2.2Programming Fundamentals - Comments2.2.3Programming Fundamentals - Input & Output2.2.4Data Types2.2.5Casting2.2.6Controlling Program Flow - Sequence2.2.7Controlling Program Flow - Selection2.2.8Controlling Program Flow - Iteration2.2.9Modularity - Subroutines2.2.10Modularity - Scope2.2.11Arrays
Practice questions on Truth Tables
Can you answer these? Test yourself with free interactive practice on Seneca — used by over 10 million students.
- 1What is the purpose of a truth table?Multiple choice
Unlock your full potential with Seneca Premium
Unlimited access to 10,000+ open-ended exam questions
Mini-mock exams based on your study history
Unlock 800+ premium courses & e-books