Outputs a string of the length

Assignment Help Basic Computer Science
Reference no: EM131186928

A three coloring of a graph labels each vertex v with one of three colors, say R, B or G, so that the two end points of any edge have different colors. Consider an undirected graph which is a single path, i.e.,where the vertices are v1...vn, and there is an edge between each vi and vi+1 for i = 1..n-1. How many 3 colorings does this graph have? (2 points correct answer. 1 point short explanation). How many bits are required to describe such a 3-coloring? (2 points correct answer, 1 point short explanation) Give coding and decoding algorithms that given the 3-coloring, outputs a string of the length above that codes it, and given the code, outputs the original 3-coloring. (3 points algorithm description, 1 point short explanation).

Reference no: EM131186928

Questions Cloud

Determine the maximum stress in the two dielectrics : Determine the maximum stress in the two dielectrics.-  find positions of intersheaths, voltage on the intersheaths,  maximum and minimum stress.
Which of the strategies for gaining competitive advantage : Please respond to all of the following prompts: In your opinion, which of the strategies for gaining competitive advantage is most effective, and why? Which is least effective, and why?
Flooring cost and stores the order in the database : Here is your assignment: You work for a flooring company. They have asked you to be a part of their team because they need a computer programmer, analyst, and designer to aid them in tracking customer orders.  Your skills will be needed in creatin..
Determine the stress at corner a : A short 120 X 180-mm column supports the three axial loads shown. Knowing that section ABD is sufficiently far from the loads to remain plane
Outputs a string of the length : Give coding and decoding algorithms that given the 3-coloring, outputs a string of the length above that codes it, and given the code, outputs the original 3-coloring. (3 points algorithm description, 1 point short explanation).
Implementation of information security management policy : There are many factors that contribute to the success - or otherwise - of the implementation of an information security management policy in an organisation as big as eBay.
What is brodie law : BSBWHS401 Implement and monitor WHS policies, procedures and programs to meet legislative requirements. Answer the following questions: What is Brodie's Law? What is workplace bullying? Who has duties in relation to workplace bullying
Discuss current solutions or ways of controlling the problem : Discuss current solutions or ways of controlling the problem. Describe the steps taken within the public health and other health care system components to control or eradicate the problem.
Determine the sending end current : Determine the sending end current,  sending end voltage,  sending end power factor and transmission efficiency.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  The menu structure for holiday travel vehicle

The menu structure for Holiday Travel Vehicle

  Rare species of spiders

In South America, a rare species of spiders is discovered and is transplanted into a safe area. Once they are transported the population of the spider after t months is P(t) = 44( 1 + 0.7t ) / ( 3 + 0.03t )

  Four types of markets

The following video discusses the four types of markets: perfect competition, monopolistic competition, oligopoly, and monopoly.

  Explain the basic primary tasks

Explain the basic primary tasks, high-level investigation processes, and challenges of a computer forensics specialist.Provide an overview of how computing devices are used in crimes of today and how these crimes can affect a company's data and infor..

  Consolidation strategy that will require it to centralize

A prestigious university has recently implemented a consolidation strategy that will require it to centralize their student records. In order to move forward, the local university will need to develop a data model that will retain student records ..

  How would you select your server components

How would you design the logical structure of Active Directory for the Rough Country Miles of Alaska, and what domain naming structure would you suggest?

  Compute the value of the mini max tree

Design a general solution for representing and evaluating these trees.

  Explain implications of copyrights on usage of web site

Study and explain copyright implications associated to Web site development. Write down minimum of 350 words explaining the implications of copyrights on usage of content on Web site.

  Design an e-r diagram for keeping track of the exploits

You should store the matches played, the scores in each match, the players in each match, and individual player statistics for each match. Summary statistics should be modeled as derived attributes.

  How many bit comparisons are made

How many bit comparisons (both successful and unsuccessful) are made by the brute-force string-matching algorithm in searching for the pattern 11001 in a binary text of 500 ones?

  Identify and research three different commercial it security

Security being a top concern for any organisation, choosing the correct security solutions is of utmost importance. Consider an area of information technology (IT) security, such as, network security, e-mail security, database security and so on. Ide..

  Business continuity planning

Imagine that you are trying to receive funding for select planning projects. Compare and contrast the attributes of business continuity and disaster recovery plans, and suggest the primary ways in which you would explain these differences to your emp..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd