In the following statements about graph operations,which one is NOT correct?A.Finding critical path is an operation on directed graphB.Finding critical path is an operation on undirected graphC.Spanning tree of a graph may not be uniqueD.Minimum spanning tree of a graph may not be unique

In the following statements about graph operations,which one is NOT correct?

A.Finding critical path is an operation on directed graph

B.Finding critical path is an operation on undirected graph

C.Spanning tree of a graph may not be unique

D.Minimum spanning tree of a graph may not be unique


相关考题:

The critical path is calculated byA.subtracting the end date of task one from the start date of task two.B.determining which tasks have the least amount of total slack.C.totaling the time for all activities.D.determining the shortest path through the network.E.Determining which tasks have the most slack

Which of the following impacts the critical path?A.Changing the task duration.B.Reduce the free float of an activity.C.Executing a backward passD.A or BE.None of the above.

Assume that you have a network where an activity on the critical path can be crashed by two weeks. If the activity is actually crashed by two weeks, then:A.The project's schedule will be reduced by weeks.B.The available slack on the noncritical paths will increase.C.A new critical path may appear after the crash.D.All of the above.E.A and B only.

The schedule risk is the _____ .A the accumulated "expected' durations which maintain project completion.B Critical Path adjusted by "high-risk" activity float.C highest risk path that maintains quality.D Critical Path when calculated with "most likely" duration.E highest risk path that contributes the most risk toward the project completion.

112 The schedule risk is the _____ .A. the accumulated "expected' durations which maintain project completion.B. Critical Path adjusted by "high-risk" activity float.C. highest risk path that maintains quality.D. Critical Path when calculated with "most likely" duration.E. highest risk path that contributes the most risk toward the project completion

● The critical path is calculated byA subtracting the end date of task one from the start date of task two.B determining which tasks have the least amount of total slack.C totaling the time for all activities.D determining the shortest path through the network.E Determining which tasks have the most slack

● Which of the following impacts the critical path?A Changing the task duration.B Reduce the free float of an activity.C Executing a backward passD A or BE None of the above.

● Your team has prepared a CPM schedule for your review. You notice that one node has six inputs (including two dummy activities) and four outputs (which include one dummy activity). Select the correct statement from the following:A This is a valid representation if the logic is correct.B This is invalid because a node can have a maximum of one dummy input representation if the logic is correct.C This is invalid because nodes cannot have both dummy inputs and dummy outputs.D This is a invalid because the number of outputs must equal the number of inputs.E This is invalid because a maximum of two inputs and two outputs are allowed using the critical path method.

In the following kinds of graphs, which one's adjacency matrix is symmetric?A.Directed graphB.Undirected graphC.AOV networkD.AOE network

Which of the following statements is mot correct about mirroring?() A.Mirroring, with the write-verify option turned on, can be used to increase performance.B.Mirroring is a better choice that disk-striping, for large sequential-access file system when one is looking for performance.C.Mirroring, with a parallel-scheduling policy, may improve I/O read-operation performance.D.Mirroring, with maximum inter-disk allocation policy, is used to enhance availability.

In project network diagram ,the number of critical path is ( ).A.noneB.only oneC.only twoD.one or more

In?project?net work?diagram,the?number?of?critical?path?is()。A.noneB.only?oneC.only?twoD.one?or?more

Which of the following technologies can be used in distance vector routing protocols to prevent routing loops?()A、Spanning Tree ProtocolB、Shortest path first treeC、Link-state advertisements (LSA)D、Hold-down timersE、Split horizonF、VRP

Which two statements about spanning tree path cost are true?()A、The path cost can be changed for an interface using the spanning-tree cost commandB、The path cost can be changed for an interface using the stp path-cost commandC、The SPT default path cost depends on the interface speedD、The STP default path cost is similar for all interface

Which two statements about an IDS are true?()A、The IDS is in the traffic path.B、The IDS can send TCP resets to the source device.C、The IDS can send TCP resets to the destination device.D、The IDS listens promiscuously to all traffic on the network.E、Default operation is for the IDS to discard malicious traffic.

Several @functions can execute multiple statements. Which one of the following initializes a variable and can increment in during the operation?()A、 @do B、 @for C、 @while D、 @dowhile

Spanning Tree Protocol calculates path cost based on which of these? ()A、 interface bandwidthB、 interface delayC、 interface bandwidth and delayD、 hop countE、 bridge priority

By default, which of the following factors determines the spanning-tree path cost?()A、It is the individual link cost based on latencyB、It is the sum of the costs based on bandwidthC、It is the total hop countD、It is dynamically determined based on load

Network A has a spanning-tree problem in which the traffic is selecting a longer path. How is the path cost calculated?()A、number of hopsB、priority of the bridgeC、interface bandwidthD、interface delayE、None of the above

Which of the following statements is mot correct about mirroring?()A、Mirroring, with the write-verify option turned on, can be used to increase performance.B、Mirroring is a better choice that disk-striping, for large sequential-access file system when one is looking for performance.C、Mirroring, with a parallel-scheduling policy, may improve I/O read-operation performance.D、Mirroring, with maximum inter-disk allocation policy, is used to enhance availability.

多选题Which two statements about spanning tree path cost are true?()AThe path cost can be changed for an interface using the spanning-tree cost commandBThe path cost can be changed for an interface using the stp path-cost commandCThe SPT default path cost depends on the interface speedDThe STP default path cost is similar for all interface

单选题The most critical part of the bunkering operations, which can result in an oil spill, is when the ()Ahose joints are made upBtanks are being topped offCsystem is being lined upDpumping operation is first started

单选题Network A has a spanning-tree problem in which the traffic is selecting a longer path. How is the path cost calculated?()Anumber of hopsBpriority of the bridgeCinterface bandwidthDinterface delayENone of the above

单选题Which of the following commands can be issued without interfering with the operation of loop guard?()ASwitch(config-if)#spanning-tree guard rootBSwitch(config-if)#spanning-tree portfastCSwitch(config-if)#switchport mode trunkDSwitch(config-if)#switchport mode access

单选题Spanning Tree Protocol calculates path cost based on which of these?()Ainterface bandwidthBinterface delayCinterface bandwidth and delayDhop countEbridge priority

单选题By default, which of the following factors determines the spanning-tree path cost?()AIt is the individual link cost based on latencyBIt is the sum of the costs based on bandwidthCIt is the total hop countDIt is dynamically determined based on load

单选题The temperature of the fuel oil received during bunkering operation is critical in determining the ()Aexpansion space to leave in a tankBflash point at which the fuel will burnCtemperature to which the fuel must be heatedDrate at which the fuel can be pumped during transfer operations