Note: The matrix referred to in the question is: ![M = \left[\begin{array}{ccc}1/2&1/3&0\\1/2&1/3&0\\0&1/3&1\end{array}\right]](https://tex.z-dn.net/?f=M%20%3D%20%5Cleft%5B%5Cbegin%7Barray%7D%7Bccc%7D1%2F2%261%2F3%260%5C%5C1%2F2%261%2F3%260%5C%5C0%261%2F3%261%5Cend%7Barray%7D%5Cright%5D)
Answer:
a) [5/18, 5/18, 4/9]'
Explanation:
The adjacency matrix is ![M = \left[\begin{array}{ccc}1/2&1/3&0\\1/2&1/3&0\\0&1/3&1\end{array}\right]](https://tex.z-dn.net/?f=M%20%3D%20%5Cleft%5B%5Cbegin%7Barray%7D%7Bccc%7D1%2F2%261%2F3%260%5C%5C1%2F2%261%2F3%260%5C%5C0%261%2F3%261%5Cend%7Barray%7D%5Cright%5D)
To start the power iteration, let us start with an initial non zero approximation,
![X_o = \left[\begin{array}{ccc}1\\1\\1\end{array}\right]](https://tex.z-dn.net/?f=X_o%20%3D%20%5Cleft%5B%5Cbegin%7Barray%7D%7Bccc%7D1%5C%5C1%5C%5C1%5Cend%7Barray%7D%5Cright%5D)
To get the rank vector for the first Iteration:

![X_1 = \left[\begin{array}{ccc}1/2&1/3&0\\1/2&1/3&0\\0&1/3&1\end{array}\right]\left[\begin{array}{ccc}1\\1\\1\end{array}\right] \\\\X_1 = \left[\begin{array}{ccc}5/6\\5/6\\4/3\end{array}\right]\\](https://tex.z-dn.net/?f=X_1%20%3D%20%20%5Cleft%5B%5Cbegin%7Barray%7D%7Bccc%7D1%2F2%261%2F3%260%5C%5C1%2F2%261%2F3%260%5C%5C0%261%2F3%261%5Cend%7Barray%7D%5Cright%5D%5Cleft%5B%5Cbegin%7Barray%7D%7Bccc%7D1%5C%5C1%5C%5C1%5Cend%7Barray%7D%5Cright%5D%20%5C%5C%5C%5CX_1%20%3D%20%5Cleft%5B%5Cbegin%7Barray%7D%7Bccc%7D5%2F6%5C%5C5%2F6%5C%5C4%2F3%5Cend%7Barray%7D%5Cright%5D%5C%5C)
Multiplying the above matrix by 1/3
![X_1 = \left[\begin{array}{ccc}5/18\\5/18\\4/9\end{array}\right]](https://tex.z-dn.net/?f=X_1%20%3D%20%5Cleft%5B%5Cbegin%7Barray%7D%7Bccc%7D5%2F18%5C%5C5%2F18%5C%5C4%2F9%5Cend%7Barray%7D%5Cright%5D)
Answer:
In HTML file
<body style="background-color:orange;">
Or
In CSS file
body {
background-color: orange;
}
Answer:
B
Explanation:
This question demonstrates the concept of method overloading
Method overloading means having different versions of the same method. In this case the method mystery() has three versions. The compiler is able to determine which method to call by their different parameters
The first implementation of mystery requires an array of integers as parameter
The second implementation requires an int variable
The third implementation requires a String
The Method call mystery(6 * 8) will output B because 6*8 evaluates to an integer which is the expected argument.
Answer: Option (A) & (D) are correct.
Layer 2 switch is commonly referred to as a type of network or device switch that tends to work on data link layer and use MAC addresses in order to determine the route through which the frames are forwarded.
An IDS known as intrusion detection system is commonly referred to as a device or application that controls a network for malevolent activity and its policy violations.
Answer:
Intel is more for work and such, while AMD is foucsed on gamers. I use AMD because I play many games, but it really depends on what you use your computer for.
Explanation: