1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mestny [16]
3 years ago
9

Define a graph. Draw a directed and undirected graph with 8 vertices and explain all the terminologies associated with that grap

h Note: Terminologies are cycles, path, directed and undirected graph, circuit, loop, adjacency, degrees, Euler circuit, Hamiltonian circuit

Computers and Technology
1 answer:
Nitella [24]3 years ago
6 0

Answer:

A graph is a collection of set of edges E and vertices V, where each edge joins pair of vertices.

A graph is undirected when the edges has no direction.

A graph is directed when the edges has confined direction.

An edge is directed if it is defined to come out from one vertex and goes to another fixed vertex.

A loop is an edge from a vertex to itself.

A path from a vertex x to another vertex y is a sequence of distinct edges that joins sequence of distinct vertices:

                   (x,x_{1})→(x_{1}, x_{2})→(x_{2}, x_{i})→ .... → (x_{j},y)

A cycle is path that starts and ends at same vertex.

A circuit is a path that starts and ends at same vertex, but not necessarily contain distinct vertices.

An Euler circuit is circuit that traverse each edge of the graph exactly once and covers all vertices.

An Hamiltonian circuit is a simple circuit that traverse each vertex of the graph exactly once and covers all edges.

Degree of a vertex is the number of edges incident on it.

  • In case of undirected graph the number of edges incident on the vertex is it's degree.
  • but in case of directed graph the number of edges coming out of the vertex is it's out-degree and the number of edges going to the vertex is it's in-degree.

Explanation:

You might be interested in
In computer science what are the methods used to protect the information stored by a piece of software called?
Nezavi [6.7K]

Answer:

cryptography

Explanation:

cryptography

In computer science, cryptography refers to secure information and communication techniques derived from mathematical concepts and a set of rule-based calculations called algorithms, to transform messages in ways that are hard to decipher

3 0
3 years ago
write pseudocode to represent the logic of a program that allows the user to enter a value for one edge of a cube. The program c
PilotLPTM [1.2K]

Answer:

prompt("Enter a value for one edge of a cube")

Store user's value into edgeCube

area = 6 * (edgeCube * edgeCube)

volume = edgeCube * edgeCube * edgeCube

print("One side of the cube is: " + edgecube);

print("The area is: " + area)

print("The volume is: " + volume)

8 0
3 years ago
To display the size of your backup file, you can use the Windows program called: Windows Explorer Scan disk Defrag Windows Acces
Nitella [24]
Windows Explorer scan disk
7 0
3 years ago
Your license can be canceled if you __________
Elena L [17]
Its B i think hope this helps ! 
8 0
4 years ago
Read 2 more answers
You have heard that the Linux distribution your are going to install to run a new application runs best on a RISC architecture.
Artyom0805 [142]

Answer:

SPARC .

Explanation:

When the user has understood they're required to install the linux distribution to set up a specific program works better on such a RISC architecture. SPARC must therefore find the device from which it would work that following distribution for the Linux. It is a RISC and ISA that was previously designed through both Fujitsu and Sun.

6 0
3 years ago
Other questions:
  • Suppose a retailer who has no technology expertise wishes to set up an online presence for his business. He ________. a. ​can us
    6·1 answer
  • write an application to presell a limited number of cinema tickets. each buyer can buy as many as 4 tickets. No more than 100 ti
    8·1 answer
  • Outline the steps necessary to prepare a storage device for storing files. Identify and briefly describe the tools used to prepa
    7·1 answer
  • Random access memory is the portion of a computer's primary storage that does not lose its contents when one switches off the po
    6·2 answers
  • True or false that computers that are joined together are able to share hardware and software, but not data
    11·1 answer
  • 1.) Florida has ____________ roads that are designated as part of the National Highway System.
    12·1 answer
  • The signature area in a cover letter includes the sender's first and last name, followed by his/her job title (if applicable). *
    13·1 answer
  • Categorize each of the following situations as a compile-time error, run-time error, or logical error. Group of answer choices m
    5·1 answer
  • Management of software development consist of?
    15·1 answer
  • Christina has been asked by the firewall administration group to identify secure network protocols that can be used to prevent n
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!