Quiz 1 M.Tech

40 Questions | Attempts: 107
Share
Please wait...
Question 1 / 40
0 %
0/100
Score 0/100
1. Which of the following has a desired key is searched, starting itself from hash address, sequentially in a table?
Submit
Please wait...
About This Quiz
Quiz 1 M.Tech - Quiz

The quiz contains 40 questions and time limit is 30 minutes. Each question carry 1 marks. No negative marking for wrong answer.

Personalize your quiz and earn a certificate with your name on it!
2. To Delete an item from a Queue identify the correct set of statements
Submit
3. An algorithm is made up of two independent time complexities f(n) and g(n). Then the complexities of the algorithm is in the order of
Submit
4. A queue has configuration a,b,c,d. To get configuration d,c,b,a. One needs a minimum of
Submit
5. Suppose you are given an array s[1...n] and a procedure reverse (s,i,j) which reverses the order of elements in a between positions i and j (both inclusive). What does the following sequence do, where 1 < k <= n: reverse (s, 1, k); reverse (s, k + 1, n); reverse (s, 1, n);  
Submit
6. Given a binary search tree, which traversal type would print the values in the nodes in sorted order?
Submit
7. The time factor when determining the efficiency of algorithm is measured by
Submit
8. Which of the following is a collection of items into which items can be inserted arbitrarity and from which only the smallest item can be removed?
Submit
9. Which of the following pairs of traversals is not sufficient to build a binary tree from the given traversals?
Submit
10. Given a sorted array of integers, what can be the minimum worst case time complexity to find ceiling of a number x in given array? Ceiling of an element x is the smallest element present in array which is greater than or equal to x. Ceiling is not present if x is greater than the maximum element present in array. For example, if the given array is {12, 67, 90, 100, 300, 399} and x = 95, then output should be 100.
Submit
11. Pick the correct statement(s) from the following set of statements.
  1. In the Kruskal's algorithm, for the construction of minimal spanning tree for a graph, the selected edges always form a forest.
  2. In Prim's algorithm, for the construction of minimal spanning tree for a graph, the selected edges always form an orchard.
  3. DFS, BFS algorithms always make use of a queue, and stack respectively.
Submit
12. To delete an item from an array which loop is correct, where p is the position of deletion( assume array starts from 1 and N is the max no. of items in the array).  
Submit
13. A________search begins the search with the element that is located in the middle of the array.
Submit
14. Which of the following is true about linked list implementation of stack?
Submit
15. Which of the following data structure may give overflow error,even though the current number of element in it is less than its size?
Submit
16. When inorder traversing a tree resulted E A C K F H D B G; the preorder traversal would return
Submit
17. Queues serve major role in
Submit
18. Backtracking algorithms determine problem's solutions by …........ searching the solution space for the given problem instance
Submit
19. Let W(n) and A(n) denote respectively,  worst and average case running time of an algorithm executed on an input of size n. Which of the following is always true?  
Submit
20. The average search time of hashing with linear probing will be less if the load factor?
Submit
21. Which of the following algorithms can be used to most efficiently determine the presence of a cycle in a given graph ?
Submit
22. Consider the function f defined below. struct item {    int data;    struct item * next; };   int f(struct item *p) {             return (                                       (p == NULL) ||                                        (p->next == NULL) ||                                        (( P->data <= p->next->data) && f(p->next))                                ); } For a given linked list p, the function f returns 1 if and only if  
Submit
23. The minimum number of comparisons required to determine if an integer appears more than n/2 times in a sorted array of n integers is
Submit
24. What is collision resolution with open addressing?
Submit
25. Consider a situation where swap operation is very costly. Which of the following sorting algorithms should be preferred so that the number of swap operations are minimized in general?
Submit
26. A priority queue is used to implement a stack S that stores characters PUSH(C)is implemented as INSERT(Q,C,K)where K is an appropriate integer key chosen by the implementation.POP is implemented as DELETEMIN(Q).For a sequence of operations,the key chosen are in  
Submit
27. In which of the following sorting algorithm, number of comparison needed is the minimum if items are initially in reverse order and is maximum if items are in order?  
Submit
28. What is the worst case time complexity for search, insert and delete operations in a general Binary Search Tree?
Submit
29. A machine took 200 sec to sort 200 names, using bubble sort. In 800 sec, it can approximately sort?
Submit
30. With the "wrap around" implementation of a queue, which of the following code should be used to work out the next location of deletion?
Submit
31. A circularly linked list is used to represent a Queue. A single variable p is used to access the Queue. To which node should p point such that both the operations enQueue and deQueue can be performed in constant time?
Submit
32. If the out degree of every node is exactly equal to M or 0 and the num ber of nodes at level K is Mk-1 [consider root at level 1], then tree is called as
  1. Full m-ary tree
  2. Complete m-ary tree
  3. Positional m-ary tree
   
Submit
33. A data structure is required for storing a set of integers such that each of the following operations can be done in (log n) time, where n is the number of elements in the set.
  • Delection of the smallest element
  • Insertion of an element if it is not already present in the set
Which of the following data structures can be used for this purpose?  
Submit
34. For snake game, we can use the following algorithms
Submit
35. The concept of order Big O is important because
Submit
36. Suppose that we have a data file containing records of famous people, and we need to build a hash table to find a record from the person's birthday. The size of the hash table is 4096. The following are hash functions which convert a birthday to an integer. Which of the following function is the best?
Submit
37. If h is any hashing function and is used to hash n keys into a table of size m, where n<=m, the expected number of collisions involving a particular key x is  
Submit
38. Let LASTPOST, LASTIN and LASTPRE denote the last vertex visited in a postorder, inorder and preorder traversal. Respectively, of a complete binary tree. Which of the following is always true?
Submit
39. In delete operation of BST, we need inorder successor (or predecessor) of a node when the node to be deleted has both left and right child as non-empty. Which of the following is true about inorder successor needed in delete operation?
Submit
40. 6 files X1, X2, X3, X4, X5, X6 have 150, 250, 55, 85, 125, 175 number of records respectively. The order of storage ot optimize access time is
Submit
View My Results

Quiz Review Timeline (Updated): Jul 28, 2013 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jul 28, 2013
    Quiz Edited by
    ProProfs Editorial Team
  • Jul 28, 2013
    Quiz Created by
    Refresher_Module
Cancel
  • All
    All (40)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which of the following has a desired key is searched, starting itself...
To Delete an item from a Queue identify the correct set of statements
An algorithm is made up of two independent time complexities f(n) and...
A queue has configuration a,b,c,d. To get configuration d,c,b,a. One...
Suppose you are given an array s[1...n] and a procedure reverse...
Given a binary search tree, which traversal type would print the...
The time factor when determining the efficiency of algorithm is...
Which of the following is a collection of items into which items can...
Which of the following pairs of traversals is not sufficient to build...
Given a sorted array of integers, what can be the minimum worst case...
Pick the correct statement(s) from the following set of statements. ...
To delete an item from an array which loop is correct, where p is the...
A________search begins the search with the element that is located in...
Which of the following is true about linked list implementation of...
Which of the following data structure may give overflow error,even...
When inorder traversing a tree resulted E A C K F H D B G; the...
Queues serve major role in
Backtracking algorithms determine problem's solutions by...
Let W(n) and A(n) denote respectively,  worst and average case...
The average search time of hashing with linear probing will be less if...
Which of the following algorithms can be used to most efficiently...
Consider the function f defined below. ...
The minimum number of comparisons required to determine if an integer...
What is collision resolution with open addressing?
Consider a situation where swap operation is very costly. Which of the...
A priority queue is used to implement a stack S that stores characters...
In which of the following sorting algorithm, number of comparison...
What is the worst case time complexity for search, insert and delete...
A machine took 200 sec to sort 200 names, using bubble sort. In 800...
With the "wrap around" implementation of a queue, which of the...
A circularly linked list is used to represent a Queue. A single...
If the out degree of every node is exactly equal to M or 0 and the num...
A data structure is required for storing a set of integers such that...
For snake game, we can use the following algorithms
The concept of order Big O is important because
Suppose that we have a data file containing records of famous people,...
If h is any hashing function and is used to hash n keys into a table...
Let LASTPOST, LASTIN and LASTPRE denote the last vertex visited in a...
In delete operation of BST, we need inorder successor (or predecessor)...
6 files X1, X2, X3, X4, X5, X6 have 150, 250, 55, 85, 125, 175 number...
Alert!

Advertisement