In Prim's algorithm for the minimal spanning tree, we start at a designated vertex, which we call the ____ vertex.

A. index
B. source
C. root
D. destination

Answer: B

Computer Science & Information Technology

You might also like to view...

Which mode of DES is used in IEEE 802.11i?

A. ECB B. CBC C. CFB D. OFB E. CTR

Computer Science & Information Technology

When attempting to access a virtual machine, an administrator is unable to login using the vSphere credentials. What two options are probable causes of the authentication failure? (Choose two.)

A. The vSphere credentials have not been granted permissions. B. The vSphere credentials are granted read-only permissions. C. The vSphere credentials are granted no-access permissions. D. The vSphere credentials are not a member of the local administrator group.

Computer Science & Information Technology