一起答
单选

在具有6个顶点的无向简单图中,当边数最少为(26)条时,才能确保该图一定是连通图,当边数最少为(27)条时,才能确保该图一定是哈密尔顿图。

给定带权的有向图,如下图所示。设该图代表一个地区的交通图,从S到T的最短路径有(28)条,路径的长度是(29),从S出发经过每点一次且只有一次到T的路径(哈密尔顿路径)有(30)条。

  • A.11
  • B.12
  • C.13
  • D.55
参考答案
查看试卷详情
相关试题
  1. (54)

    • A.plane
    • B.plant
    • C.plate
    • D.platform
  2. (53)

    • A.Web browser's
    • B.terminal's
    • C.emulator's
    • D.network's
  3. (52)

    • A.direct
    • B.navigate
    • C.indicate
    • D.go-on
  4. (49)

    • A.searched
    • B.checked
    • C.tested
    • D.detected
  5. (51)

    • A.displaying
    • B.illustrating
    • C.drawing
    • D.writing
  6. A Web browser is simply a terminal emulator, designed to display text on a screen. The two essential differences between an ordinary terminal emulator and a Web browser are that the browser knows how to deal with(71), and that it has a mechanism for(72)graphical files. Display text, display graphics, and(73)hyperlinks-there's 99 percent of the(74)value. That's not to say that the manufacturers didn't go all-out to attach a hyperactive efflorescence of useless capabilities onto their browsers. Remember when media channels in the browser were a big deal, instead of the clutter you can't wait to delete from your favorites of bookmarks menu ? Remember when client-side Java applets were supposed to become the preferred(75)for application development? Remember frames and all their nasty side effects?

    • A.superlinks
    • B.links
    • C.hyperlinks
    • D.connections
  7. (48)

    • A.power
    • B.rights
    • C.authorized
    • D.common
  8. (47)

    • A.visit
    • B.access
    • C.I/O
    • D.read/write
  9. (44)

    • A.0
    • B.2
    • C.56
    • D.59
  10. Most computer systems are(66)to two different groups of attacks: Insider attacks and outsider attacks. A system that is known to be(67)to an outsider attack by preventing(68)from outside can still be vulnerable to the insider attacks accomplished by abusive usage of(69)users. Detecting such abusive usage as well as attacks by outsides not only  provides  information on damage assessment, but also helps to prevent  future attacks. These attacks are usually(70)by tools referred to as Intrusion Detection Systems.

    • A.vulnerable
    • B.week
    • C.sensitively
    • D.helpless