Outputs a string of the length

Assignment Help Basic Computer Science
Reference no: EM131186928

A three coloring of a graph labels each vertex v with one of three colors, say R, B or G, so that the two end points of any edge have different colors. Consider an undirected graph which is a single path, i.e.,where the vertices are v1...vn, and there is an edge between each vi and vi+1 for i = 1..n-1. How many 3 colorings does this graph have? (2 points correct answer. 1 point short explanation). How many bits are required to describe such a 3-coloring? (2 points correct answer, 1 point short explanation) Give coding and decoding algorithms that given the 3-coloring, outputs a string of the length above that codes it, and given the code, outputs the original 3-coloring. (3 points algorithm description, 1 point short explanation).

Reference no: EM131186928

Questions Cloud

Determine the maximum stress in the two dielectrics : Determine the maximum stress in the two dielectrics.-  find positions of intersheaths, voltage on the intersheaths,  maximum and minimum stress.
Which of the strategies for gaining competitive advantage : Please respond to all of the following prompts: In your opinion, which of the strategies for gaining competitive advantage is most effective, and why? Which is least effective, and why?
Flooring cost and stores the order in the database : Here is your assignment: You work for a flooring company. They have asked you to be a part of their team because they need a computer programmer, analyst, and designer to aid them in tracking customer orders.  Your skills will be needed in creatin..
Determine the stress at corner a : A short 120 X 180-mm column supports the three axial loads shown. Knowing that section ABD is sufficiently far from the loads to remain plane
Outputs a string of the length : Give coding and decoding algorithms that given the 3-coloring, outputs a string of the length above that codes it, and given the code, outputs the original 3-coloring. (3 points algorithm description, 1 point short explanation).
Implementation of information security management policy : There are many factors that contribute to the success - or otherwise - of the implementation of an information security management policy in an organisation as big as eBay.
What is brodie law : BSBWHS401 Implement and monitor WHS policies, procedures and programs to meet legislative requirements. Answer the following questions: What is Brodie's Law? What is workplace bullying? Who has duties in relation to workplace bullying
Discuss current solutions or ways of controlling the problem : Discuss current solutions or ways of controlling the problem. Describe the steps taken within the public health and other health care system components to control or eradicate the problem.
Determine the sending end current : Determine the sending end current,  sending end voltage,  sending end power factor and transmission efficiency.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write a client function that returns the back of a queue

The return type is Item Type, and it accepts a Queue object as a parameter.

  Discuss five characteristics of direct manipulation systems

Discuss Disadvantages of GUI- Discuss five characteristics of direct manipulation systems according to Shneiderman

  Principal elements of a lan

The 3 principal elements of a LAN are the network operating system (NOS), the network interface card (NIC), and the transmission medium. Since the dawn of LANs in the early 1980's, the NOS was dominated by Novell's Netware until the late 1990's.

  Determine the least number of full turns

The coefficients of static friction between the rope and the peg and between the man's shoes and the ground are µ's = 0. 4and µs = 0.1, respectively.

  Show numbers between those two numbers in ascending order

Ask the user to type two numbers from range 20-60. Keep on asking until he types in the range of 20-60. Show the numbers between those two numbers in ascending order.

  Discuss the pros and cons of the service available

From the e-Activity, compare the best practices mentioned within the document to the way in which your own network is setup. Determine whether or not you will fix / change any aspect(s) of your current setup after reading about the specific best p..

  What would the data dictionary

what would the data dictionary look like for question 5a pg. 88

  Developers choose to write applications in java

Why would developers choose to write applications in Java? Why might they skip Java and choose another programming language?

  Provide a common and consistent office solution

A school decides it wants to provide a common and consistent "office" solution (a software package that includes word processing, spreadsheets, presentation capabilities, and drawing capabilities) to all students and teachers in the school. The schoo..

  Play the role of an employee

For this assignment, you will play the role of an employee who's been asked to present a convincing argument on why the company should move from a conventional client based productivity suite, MS Office 2010, to a cloud based productivity suite. F..

  Output or peripheral devices

To interact with a computer we use external devices called input-output or peripheral devices; this is the way a computer has to receive and give information to the user. Discuss how recent changes in technology have changed input and output.

  What is concurrency control

What is Concurrency control? Describe the type of concurrency control and its use.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd