Question

In: Advanced Math

There are n people who can shake hands with one another (where n > 1). Use...

There are n people who can shake hands with one another (where n > 1). Use pigeonhole principle to show that there is always a pair of people who will shake hands with the same number of people.

Hint. Pigeonhole principle does not immediately apply to this problem. Solve the problem for two cases:

(1) There is no person who shakes hands with everyone else (all handshake numbers are strictly less than n − 1). Easy case.

(2) There is a person who shakes hands with everyone else (hand- shake number is n − 1). What can you say about handshake numbers for everyone else?

Solutions

Expert Solution

Pigeonhole principle: It States that if 'n' items are put into 'm' containers with n>m , then at least one container must contain more than one item.

From the above question we can consider as below.

Holes or 'm' correspondant to number of hands shaken = m

Each person can shake hand with any body from 0 to n-1 other people, so possible holes is n-1

So as per the question these are the below two cases will exist

case 1: If there is person who does not shake hand with anyone. Then any person can shake hand with atmost n-2 people. so everyone shake hand from 0 to n-2 people. So there are n-1 positions and n people and therefore there will apply pigeonhole principle and there is a pair of people whoke shake hands with same no of people.

Case 2: If every one shake hand with atleast one, then there is atleast one person who has shaked hand fom 1 to n.-1 again by pigenhole principal, there is one place less so two persons are in the same no. shake hands.


Related Solutions

7. A nutritionist wants to determine whether people who regularly drink one protein shake per day...
7. A nutritionist wants to determine whether people who regularly drink one protein shake per day have different cholesterol levels than people in general. In the general population, cholesterol is normally distributed with μ = 190 and σ = 30. A person followed the protein shake regimen for two months and his cholesterol is 155. Use the 1% significance level to test the nutritionist’s idea. Use the five steps of hypothesis testing. Explicitly label each of these five steps. Draw...
There are many social media websites where people communicate with one another for different reasons such...
There are many social media websites where people communicate with one another for different reasons such as dating, making new friends or keeping in touch with existing ones. What is self disclosure and how does it function to develop initimacy in a relationship? What level of self disclosure do you feel is appropriate when communicating with someone via the internet? Discuss this as it relates to different types of internet sites and also within the online classroom. Give your opinion.
What is a gene? Can one gene overlap another, and how does one know where a...
What is a gene? Can one gene overlap another, and how does one know where a gene begins and ends in the genome?
Q 4 One can think of a circle as an N-sided polygon where N is a...
Q 4 One can think of a circle as an N-sided polygon where N is a very very large number. This is because as the number of sides of a polygon increases the shape of the polygon starts resembling that of a circle. In the light of this fact explain why the diffraction pattern produced by the aperture DOTS is made of alternating bright and dark circular bands. Hint: First determine the diffraction pattern produced by an N-sided polygon. Then...
1. Describe a scenario where two objects are electrically attracted to one another, but one of...
1. Describe a scenario where two objects are electrically attracted to one another, but one of the objects is neutral in charge 2. What would happen if the force of gravity was stronger than the electrical force between two charges in space?
1)When one atom transfers one or more valence electrons to another atom, a(n) ___ is formed....
1)When one atom transfers one or more valence electrons to another atom, a(n) ___ is formed. A.Covalent Bond B.Ionic Bond C.Metallic Bond D.All of the above 2)Typically, when two atoms form a chemical bond, the expected result is that the electrons A.Will be in the excited state B.Will be completely removed from both atoms C.Will compete a noble gas configuration for both atoms D.None of the above 3)Which of the statements about ionic solids is FALSE? A.Ionic solids conduct electricity...
How many arrangements of length n where 1 ≤ n ≤ 8 can be formed from...
How many arrangements of length n where 1 ≤ n ≤ 8 can be formed from the letters A, A, B, C, C, C, D, E where (a) both A’s are adjacent? (b) the string starts or ends with A? (c) you use (exactly) 4 letters from the list?
Suppose n people can choose between going to one of two campgrounds for 4th of July...
Suppose n people can choose between going to one of two campgrounds for 4th of July weekend. They can go to either Campground A or Campground B. The payoff to going to Campground A is 100-a, where a is the number of people in Campground A, and the payoff to going to Campground B is 200-2b, where b is the number of people in Campground B, such that a+b=n, and a, b, and n have to be greater than or...
Suppose n people are choosing between two activities, hiking or fishing, where n is an even...
Suppose n people are choosing between two activities, hiking or fishing, where n is an even number. The payoff from going to hike is 1 if more than half of the people go hiking, and 0 otherwise. The payoff from going to fish is 1 if more than half of the people go fishing, and 0 otherwise. A.Find all the Nash Equilibria of this game, if any. B.Suppose instead that the payoffs are such that the payoff to hiking is...
1-If attackers are able to get their hands on a password file, where all the passwords...
1-If attackers are able to get their hands on a password file, where all the passwords are hashed and salted, what would be their best approach to obtain at least one of these password? Here an example of the first two lines of a generic password file: HASH (SHA-256) SALT 1138275656b8e5d8f48a98c3c92df27e6fbfe24a750e72930c220a8e2caba935 535788591 ee65ef498fb368a2dfd38b40f0ee75c05963cd9da6e5f014118c7d9747fcc97f4 778035290 2-Play-Doh™ (Links to an external site.) has been used to get access to systems that used fingerprinting as access control (yup, and it worked 90% of...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT