Toughest Data Structure Exam Quiz!

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Maheshjangid962
M
Maheshjangid962
Community Contributor
Quizzes Created: 2 | Total Attempts: 396
| Attempts: 274 | Questions: 66
Please wait...
Question 1 / 66
0 %
0/100
Score 0/100
1. Which are the Stack Methods?

Explanation

The correct answer includes the methods POP(), PUSH(X), SIZE(), isStackEmpty(), and TOP(). These methods are commonly used in stack data structures. POP() is used to remove the top element from the stack, PUSH(X) is used to add an element to the top of the stack, SIZE() is used to determine the number of elements in the stack, isStackEmpty() is used to check if the stack is empty, and TOP() is used to retrieve the top element of the stack without removing it.

Submit
Please wait...
About This Quiz
Toughest Data Structure Exam Quiz! - Quiz

Data structure is the specific way to store and organize information so that the data can be successfully accessed. For this quiz, you should understand what a valid list operation is, the name of the second child vertex on a binary tree, all trees' property, how many children each vertex... see morehas, etc. This quiz will thoroughly prepare you for the most challenging data structure exam. see less

Personalize your quiz and earn a certificate with your name on it!
2. Insert, Append, Delete, and Next are all valid list operations.

Explanation

The statement mentions four list operations: Insert, Append, Delete, and Next. These are all commonly used operations in list manipulation. Insert is used to add an element at a specific position in the list, Append is used to add an element at the end of the list, Delete is used to remove an element from the list, and Next is used to move to the next element in the list. Therefore, all four operations mentioned are valid list operations.

Submit
3. A Red-Black tree is a BST tree.

Explanation

A Red-Black tree is a type of self-balancing binary search tree (BST). It follows the properties of a BST, where each node has a key value and its left child has a smaller key, while its right child has a larger key. Additionally, a Red-Black tree also maintains the color property, where each node is either red or black, and it satisfies the following conditions: the root is black, all leaves (null nodes) are black, and no two adjacent nodes are red. Therefore, a Red-Black tree is indeed a BST.

Submit
4. A hash table tends to perform better overall (bot time and space) than an array, linked list, or balanced B.S.T.

Explanation

A hash table is a data structure that allows for efficient insertion, deletion, and retrieval of elements. It uses a hash function to map keys to indices in an array, allowing for constant time complexity for these operations on average. In contrast, arrays, linked lists, and balanced binary search trees have varying time complexities for these operations. Arrays have constant time complexity for accessing elements but require shifting elements for insertion and deletion. Linked lists have constant time complexity for insertion and deletion but require traversal for accessing elements. Balanced binary search trees have logarithmic time complexity for all operations. Therefore, a hash table generally performs better overall in terms of time and space efficiency compared to these other data structures.

Submit
5. Linear probing uses the number of times the rehash function has been applied as a value in the hash formula.

Explanation

Linear probing is a collision resolution technique used in hash tables. When a collision occurs, linear probing searches for the next available slot in the hash table by incrementing the index. The given statement is true because in linear probing, the number of times the rehash function has been applied (also known as the probing sequence) is used as a value in the hash formula. This helps to determine the next index to be checked during the probing process.

Submit
6. All AVL trees are BST.

Explanation

An AVL tree is a self-balancing binary search tree (BST) that maintains its balance factor, which is the difference between the heights of its left and right subtrees, within a certain range. Since AVL trees are a type of BST, they inherit all the properties of a BST, including the property that the value of each node's left child is less than the value of the node itself, and the value of each node's right child is greater than the value of the node itself. Therefore, all AVL trees are BSTs.

Submit
7. An ordered tree in which each vertex has either no children, one child, or two children.

Explanation

A binary tree is a type of ordered tree where each vertex can have either no children, one child, or two children. This means that every vertex in a binary tree can have either zero, one, or two child vertices. Other types of ordered trees, such as a sub tree, do not have this specific restriction on the number of child vertices. Therefore, the given correct answer is binary tree.

Submit
8. Every vertex has two children or is a leaf.

Explanation

A full binary tree is a type of binary tree where every vertex has either two children or is a leaf. This means that every node in the tree has either zero or two children, and there are no nodes with only one child. Therefore, the given statement aligns with the definition of a full binary tree.

Submit
9. For a normal (double-linked) binary tree, 8 pointers are assigned to each node.

Explanation

4

Submit
10. Inserting a node in an AVL tree will sometimes change the height of the tree.

Explanation

When a node is inserted into an AVL tree, it may cause an imbalance in the tree, which means that the heights of the left and right subtrees of some nodes may differ by more than 1. In order to maintain the balance property of the AVL tree, rotations are performed to restore the balance. These rotations can change the height of the tree because they may change the positions of nodes and the lengths of paths from the root to the leaves. Therefore, inserting a node in an AVL tree can indeed change the height of the tree.

Submit
11. In Stack Methods: ____ removes the top object of the stack and returns it.

Explanation

The POP() method in stack removes the top object of the stack and returns it. This method is used to retrieve and remove the most recently added element from the stack. It decreases the size of the stack by one and returns the element that was removed.

Submit
12. In Stack Methods: ____ Returns a boolean inidcating if the stack is empty.

Explanation

The method isStackEmpty() returns a boolean value indicating whether the stack is empty or not. This method can be used to check if there are any elements present in the stack before performing any operations. If the stack is empty, the method will return true, otherwise it will return false.

Submit
13. An Array is what kind of data structure.

Explanation

The correct answer is Linear because an array is a type of data structure that stores elements in a sequential manner, where each element can be accessed using its index. The elements in an array are stored in contiguous memory locations, making it easy to traverse the elements in a linear fashion.

Submit
14. Property of all trees.

Explanation

In a tree, the number of edges is always one less than the number of nodes. This is because a tree is a connected graph with no cycles, and every edge connects two nodes. So, if we have "n" nodes in a tree, we will have "n-1" edges.

Submit
15. The minimum height of a 14-node B.S.T. is 5

Explanation

3

Submit
16. The process of creating a B.S.T. (requires/does not require) sorting data.

Explanation

To create a Binary Search Tree (BST), sorting of data is required. A BST is a binary tree where each node has a key greater than all keys in its left subtree and smaller than all keys in its right subtree. In order to maintain this property, the data needs to be sorted while creating the BST. Without sorting, it would be impossible to ensure that the keys are placed correctly in the tree, violating the BST property. Therefore, the process of creating a BST requires sorting the data.

Submit
17. In Stack Methods: ____ Inserts object X onto the stack.

Explanation

PUSH(X) is the correct answer because it is the method used to insert an object X onto the stack. The PUSH(X) operation adds the element X to the top of the stack, increasing the size of the stack by 1. This operation is commonly used in stack data structures to add new elements and maintain the LIFO (Last-In-First-Out) property.

Submit
18. A Stack follows the principle of?

Explanation

A stack follows the principle of LIFO, which stands for "Last In, First Out". This means that the last element added to the stack is the first one to be removed. It operates like a stack of plates, where the last plate added is the first one that can be taken out. This principle is commonly used in computer science and data structures, where elements are added and removed from the top of the stack.

Submit
19. The length of the longest path from a vertex to a leaf that is a descendent of the vertex.

Explanation

The length of the longest path from a vertex to a leaf that is a descendant of the vertex is referred to as the height of the vertex. The height of a vertex measures the distance from the vertex to the farthest leaf in the tree. It is important in determining the overall structure and balance of a tree.

Submit
20. Which are the Queue Methods?

Explanation

The correct answer includes the methods Enqueue(X), Dequeue(), Size(), isQueueEmpty(), and Front(). These methods are commonly used in queue data structures. Enqueue(X) is used to add an element to the back of the queue, Dequeue() is used to remove an element from the front of the queue, Size() returns the number of elements in the queue, isQueueEmpty() checks if the queue is empty, and Front() returns the element at the front of the queue without removing it.

Submit
21. With every push in the stack the top:

Explanation

In a stack, the top represents the position of the most recently added element. When a new element is pushed into the stack, it becomes the new top, thus incrementing the position by one. Therefore, the correct answer is "increments by one."

Submit
22. A BST tree is always balanced.

Explanation

AVL

Submit
23. Linear probing is not a good solution for clustering.

Explanation

Linear probing is a technique used in hashing to resolve collisions by sequentially searching for the next available slot in the hash table. However, it is not a good solution for clustering because it can lead to clustering of elements in adjacent slots. This means that if multiple elements hash to the same slot, they will be placed next to each other in the table, causing inefficient access and potentially increasing the likelihood of further collisions. Therefore, linear probing can result in poor performance and decreased efficiency in clustered data.

Submit
24. ______ is a data structure in which elements are added to the rear and removed from the front. A First-In-First-Out (FIFO) structure.

Explanation

A queue is a data structure that follows the First-In-First-Out (FIFO) principle, meaning that the element added first will be the first one to be removed. Elements are added to the rear of the queue and removed from the front. This ensures that the order in which elements are added is preserved when removing them, making it suitable for scenarios such as managing tasks or processing requests in the order they were received.

Submit
25. Reading a book (cover to cover) is an example of Pre Order Traversal.

Explanation

Pre-order traversal is a method used in tree data structures where the root node is visited first, followed by the left subtree, and then the right subtree. Similarly, when reading a book from cover to cover, we start with the first page (root), then move on to the next pages on the left (left subtree), and finally continue with the pages on the right (right subtree). Therefore, reading a book from cover to cover can be considered an example of pre-order traversal.

Submit
26. What is the disadvantage of a binary search?

Explanation

The disadvantage of a binary search is that it requires a sorted array. This means that if the array is not already sorted, it would need to be sorted before the binary search can be performed. Sorting an array can be a time-consuming process, especially for large arrays. Therefore, the need for a sorted array is a drawback of using a binary search algorithm.

Submit
27. In Stack Methods: ____ returns the top object of the stack without removing it.

Explanation

The TOP() method returns the top object of the stack without removing it. This means that it allows us to access the element at the top of the stack without modifying the stack itself. It is useful when we want to peek at the top element without actually removing it from the stack.

Submit
28. Identify the UnderFlow condition for a Stack.

Explanation

The correct answer is "if( top

Submit
29. Identify the OverFlow condition for a Queue.

Explanation

The correct answer is "if(REAR > N)". This condition checks if the rear index of the queue is greater than the maximum size of the queue (N). If this condition is true, it indicates that the queue has reached its maximum capacity and any further insertion of elements will result in an overflow condition.

Submit
30. Which data structure is best suited to print the documents in the printer?

Explanation

Queues are the best data structure for printing documents in a printer because they follow the First-In-First-Out (FIFO) principle. When documents are sent to the printer, they are added to the end of the queue, and the printer processes them in the order they were added. This ensures that the documents are printed in the same sequence they were requested, maintaining fairness and preventing any document from being skipped or delayed. Stacks, on the other hand, follow the Last-In-First-Out (LIFO) principle, which would not be suitable for printing documents in the desired order.

Submit
31. To Delete an item from a Queue identify the correct set of statements:-

Explanation

The correct set of statements to delete an item from a Queue is "item = Q[FRONT]; FRONT++;". This is because when deleting an item from a Queue, we need to remove the item at the front of the Queue. So, we assign the value of the item at the front to the variable "item" and then increment the value of "FRONT" to point to the next item in the Queue. This effectively removes the item from the Queue.

Submit
32. Reading a book (cover to cover) is an example of Post Order Traversal

Explanation

Pre order

Submit
33. What is the advantage of a linear search?

Explanation

The advantage of a linear search is that it does not require the array to be sorted. This means that it can be used on unsorted data, making it a flexible and versatile search algorithm. Unlike other search algorithms that require a sorted array, a linear search can be performed on any type of data, regardless of its order. This makes it a useful option in situations where the data is not already sorted or where sorting the data would be time-consuming or not feasible.

Submit
34. Postfix notation may not contain negative numbers.

Explanation

Postfix notation, also known as Reverse Polish Notation (RPN), is a mathematical notation in which operators are placed after their operands. In postfix notation, negative numbers are represented by using a unary minus operator before the number. Therefore, it is not possible to directly represent negative numbers in postfix notation without using the unary minus operator. Hence, the statement that postfix notation may not contain negative numbers is true.

Submit
35. What is the In Order Traversal:give your answer like 2 3 5 6 7

Explanation

The given sequence of numbers is already in ascending order. In an in-order traversal of a binary tree, the left subtree is visited first, followed by the root, and then the right subtree. Since the given sequence is already sorted, it can be considered as an in-order traversal of a binary tree with no left or right subtrees. Therefore, the answer is the same as the given sequence: 6 13 17 27 33 42 48.

Submit
36. The maximum height of a 14-node B.S.T. is 13

Explanation

15

Submit
37. In Stack Methods: ____ rreturns the # of objects in the stack.

Explanation

The correct answer is SIZE() because the SIZE() method is used to determine the number of objects present in the stack. It returns the count of objects in the stack, allowing us to know the current size of the stack.

Submit
38. Which one is the Application of Stack?

Explanation

The application of a stack includes polished notations, storing return addresses of function calls, reversing a string, and recursion. Polished notations refer to the use of stacks in mathematical expressions to ensure the correct order of operations. Storing return addresses of function calls is a common use of stack in programming languages to keep track of the sequence of function calls. Reversing a string can also be achieved using a stack data structure. Recursion, which involves a function calling itself, can also be implemented using a stack to keep track of function calls. Therefore, all of the given options are correct applications of a stack.

Submit
39. All parents have the same depth, but not necessarily the same height.

Explanation

This statement is false because siblings are individuals who share at least one parent. While siblings may have the same depth (meaning they have a common ancestor), they do not necessarily have the same height, which refers to the generation level or distance from the root of the family tree. Siblings can have different heights depending on their birth order and age differences.

Submit
40. The "best case" search time for a B.S.T. is O(n). (where n = the number of nodes in the tree)

Explanation

^worst case

Submit
41. Resolving a hash collision by sequentially searching a hash table beginning at the location returned by the hash function.

Explanation

Linear probing is a technique used to resolve hash collisions in a hash table. When a collision occurs, instead of immediately finding an empty slot in the table, linear probing sequentially searches the table starting from the location returned by the hash function. It checks each subsequent slot until an empty slot is found, allowing the item to be inserted into the table. This process helps to minimize clustering, where consecutive collisions occur in the same location, by spreading out the items more evenly throughout the table.

Submit
42. What is the contents of the array after the execution of the following program :-
int a[] = {10,30, 20, 10, 30, 40};
for(i=1;i<=6;i++)
 {
   for(j=i+1 ; j<= 6; j++)
   {
      if(a[i] == a[j])
      {
         a[j] = 0;
      }
}

Explanation

The program is checking for duplicate elements in the array and replacing them with 0. The outer loop iterates through each element of the array, and the inner loop compares it with the subsequent elements. If a duplicate is found, the inner loop replaces the duplicate element with 0.

In the given array, the first element 10 has a duplicate at index 4, so it is replaced with 0. The second element 30 has a duplicate at index 5, so it is also replaced with 0. The resulting array after executing the program will be 10, 30, 20, 0, 0, 40.

Submit
43. Write the postfix notation of A + B * C / D

Explanation

The given expression is A + B * C / D. In postfix notation, the operators are placed after their operands. To convert the expression to postfix, we start by placing A and B as operands. Then, we encounter the multiplication operator * and place it after B. Next, we encounter the division operator / and place it after C. Finally, we encounter the addition operator + and place it after the operands A * C / D. Therefore, the postfix notation of the given expression is ABC*D/+.

Submit
44. An ordered tree in which each vertex has 0, 1, or 2 children.

Explanation

A binary tree is a type of ordered tree where each vertex can have at most two children. This means that each vertex can have either 0, 1, or 2 children. The term "binary" refers to the fact that each vertex can have a maximum of two children. In a binary tree, the left child is typically smaller than the parent, and the right child is typically larger. This type of tree is commonly used in computer science and data structures due to its efficient search and traversal properties.

Submit
45. Which Data structure is best suited for the UNDO operation in Windows?

Explanation

The UNDO operation in Windows typically requires reversing the most recent action performed. A stack data structure is best suited for this operation because it follows the Last-In-First-Out (LIFO) principle. Each action performed is added to the top of the stack, and when the UNDO operation is triggered, the most recent action is removed from the top of the stack, effectively reversing it. This makes a stack the ideal choice for implementing the UNDO functionality in Windows.

Submit
46. A In Order traversal may be used to print an arithmetic expression

Explanation

Pre order

Submit
47. Find the value of the postfix expression :- ABCD ^*-  (IF A = 150, B=10, C=2 D=3)

Explanation

The given postfix expression is ABCD ^*- . According to the postfix evaluation rule, we start by evaluating the operands A, B, C, and D. Given that A = 150, B = 10, C = 2, and D = 3, we substitute these values into the expression. The expression becomes 150 10 2 3 ^*- . Now, we evaluate the expression from left to right. First, we perform the exponentiation operation (^) on 2 and 3, which gives us 8. Then, we perform the multiplication operation (*) on 10 and 8, which gives us 80. Finally, we perform the subtraction operation (-) on 150 and 80, which gives us 70. Therefore, the correct answer is 70.

Submit
48. Write the prefix notation of A + B * C / D

Explanation

The given expression is A + B * C / D. In prefix notation, the operator is placed before the operands. The correct answer +/*BCDA follows the prefix notation as it starts with the addition operator "+", followed by the multiplication operator "*", then the division operator "/", and finally the operands B, C, D, and A in that order.

Submit
49. To delete an item from an array which loop is correct, where p is the position of deletion( assume array starts from 1 and N is the max no. of items in the array.)

Explanation

The correct loop to delete an item from an array at position p is "for(i=pos;i

Submit
50. To Insert an item from a stack identify the correct set of statements:-

Explanation

These statements correctly show the process of inserting an item into a stack. The first statement increments the top pointer, indicating that there is now one more item in the stack. The second statement assigns the item to the position in the stack indicated by the top pointer. This effectively inserts the item into the stack.

Submit
51. Which are Binary Trees?

Explanation

The answer includes all of the options A, B, C, D, and E. This suggests that all of these options are examples of binary trees.

Submit
52. ___ is the condition resulting when two or more keys produce the same hash location.

Explanation

Collision is the correct answer because it refers to the condition where two or more keys in a hash table produce the same hash location. This can occur when different keys are mapped to the same index in the hash table, causing a collision. When a collision happens, additional techniques like chaining or open addressing are used to resolve it and store multiple keys at the same index.

Submit
53. While inserting an item in an array of integers which loop is right, where pos is the pos at which insertion is to be made(assume array starts from 1 and N is the max no. of items in the array.)

Explanation

The correct loop is "for(i=N; i>=pos;i--) { A[i+1] = A[i] }". This loop starts from the last element of the array and moves backwards towards the position where the insertion is to be made. It shifts each element one position to the right, creating space for the new item to be inserted. By using "A[i+1] = A[i]", the value of the current element is assigned to the next position, effectively shifting the elements to the right. This loop ensures that all elements after the insertion position are shifted to the right, making room for the new item.

Submit
54. For a normal (double linked) binary tree, __ pointers are assigned to each node

Explanation

In a normal (double linked) binary tree, two pointers are assigned to each node. This is because in a binary tree, each node has a left child pointer and a right child pointer. These pointers are used to navigate through the tree and access the left and right child nodes of a particular node. Therefore, in order to maintain the structure and connectivity of the binary tree, two pointers are assigned to each node.

Submit
55. The name of the second child of a vertex on a binary tree.

Explanation

The second child of a vertex on a binary tree is called the right child. In a binary tree, each vertex can have at most two children - a left child and a right child. The left child is the first child and the right child is the second child. Therefore, the correct answer is "Right Child".

Submit
56. A node connected via edges to a higher node.

Explanation

The term "child" refers to a node that is connected via edges to a higher node. In a hierarchical structure, such as a tree, a child node is one level below its parent node. The relationship between a parent and child node indicates that the child is subordinate or dependent on the parent. Therefore, the correct answer is "child."

Submit
57. A linked list of elements that share the same hash location.

Explanation

In this context, a chain refers to a linked list of elements that share the same hash location. This means that when multiple elements have the same hash value, they are stored in a linked list structure, with each element pointing to the next one in the list. This allows for efficient storage and retrieval of elements with the same hash value, as they can be accessed by traversing the linked list.

Submit
58. Find the postfix expression of the following:- A OR B AND ! C

Explanation

The given expression is A OR B AND ! C. In postfix notation, operators are placed after their operands. The expression can be rewritten as A B C ! AND OR. In this notation, the AND operation is performed first, followed by the OR operation.

Submit
59. If the search item lies in the upper half in case of binary search which is the correct set of statements.

Explanation

In binary search, when the search item lies in the upper half, the correct set of statements is "bot = mid - 1;". This is because the binary search algorithm divides the search space in half at each step. By setting the bottom index (bot) to mid - 1, we narrow down the search range to the upper half of the remaining elements. This ensures that we continue searching in the correct half until we find the desired item.

Submit
60. A _____ function used to manipulate the key of an element in a list to identify its location in the list.

Explanation

The correct answer is "hash" because a hash function is commonly used to manipulate the key of an element in a list to determine its location within the list. A hash function takes an input (the key) and produces a unique output (the hash value) that is used as an index to store or retrieve the element in a data structure, such as a hash table or dictionary. This allows for efficient searching, inserting, and deleting of elements in the list based on their keys.

Submit
61. Which are Full Binary Trees?

Explanation

Full binary trees are binary trees in which every node has either 0 or 2 children. In option A, all the nodes have either 0 or 2 children, making it a full binary tree. Similarly, option B, D, and E also satisfy this condition, as all the nodes in these options have either 0 or 2 children. Therefore, options A, B, D, and E are full binary trees.

Submit
62. ____ is the technique used for inserting and accessing elements in a list in a relative constant time by manipulating the key to identify its location in the list.

Explanation

Hashing is a technique used for inserting and accessing elements in a list in a relative constant time by manipulating the key to identify its location in the list. This is achieved by applying a hash function to the key, which generates a unique index or address for each element in the list. This allows for efficient retrieval and insertion of elements, as the location of the element can be determined quickly based on its key.

Submit
63. What is the disadvantage of using buckets for collision resolution?

Explanation

The disadvantage of using buckets for collision resolution is that it takes longer to walk down the buckets, resulting in slower search times. Additionally, using buckets can lead to wasted space as some buckets may remain empty while others become overcrowded. Another drawback is not knowing how big each bucket is, which can make it difficult to estimate the number of elements in each bucket and affect the efficiency of the collision resolution strategy.

Submit
64. If "X" is a descendent of "Y", then "Y" is a __________ of "X".

Explanation

If "X" is a descendant of "Y", it means that "X" is a later generation or offspring of "Y". Therefore, "Y" must be an ancestor of "X", as an ancestor refers to an earlier generation or parent from which someone is descended.

Submit
65. Choose two ways to resolve problems following a deletion in a list using linear probing.

Explanation

To resolve problems following a deletion in a list using linear probing, one way is to shift everything. This means that after deleting an element, all the elements that come after it in the list are shifted one position to the left to fill the gap. Another way is to insert null in the deleted variable. This means that instead of physically removing the element from the list, it is marked as null or empty, indicating that it has been deleted. These two approaches help maintain the integrity and order of the list after a deletion has occurred.

Submit
66. All the descendents of a vertex.

Explanation

A subtree refers to all the descendants of a specific vertex in a tree structure. It includes the vertex itself and all its child vertices, as well as their children and so on. In other words, a subtree is a smaller tree within the larger tree, formed by selecting a particular vertex and all its descendants.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • May 02, 2015
    Quiz Created by
    Maheshjangid962
Cancel
  • All
    All (66)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which are the Stack Methods?
Insert, Append, Delete, and Next are all valid list operations.
A Red-Black tree is a BST tree.
A hash table tends to perform better overall (bot time and space) than...
Linear probing uses the number of times the rehash function has been...
All AVL trees are BST.
An ordered tree in which each vertex has either no children, one...
Every vertex has two children or is a leaf.
For a normal (double-linked) binary tree, 8 pointers are assigned to...
Inserting a node in an AVL tree will sometimes change the height of...
In Stack Methods:...
In Stack Methods:...
An Array is what kind of data structure.
Property of all trees.
The minimum height of a 14-node B.S.T. is 5
The process of creating a B.S.T. (requires/does not require) sorting...
In Stack Methods: ____ Inserts object X onto the stack.
A Stack follows the principle of?
The length of the longest path from a vertex to a leaf that is a...
Which are the Queue Methods?
With every push in the stack the top:
A BST tree is always balanced.
Linear probing is not a good solution for clustering.
______ is a data structure in which elements are added to the rear and...
Reading a book (cover to cover) is an example of Pre Order Traversal.
What is the disadvantage of a binary search?
In Stack Methods:...
Identify the UnderFlow condition for a Stack.
Identify the OverFlow condition for a Queue.
Which data structure is best suited to print the documents in the...
To Delete an item from a Queue identify the correct set of...
Reading a book (cover to cover) is an example of Post Order Traversal
What is the advantage of a linear search?
Postfix notation may not contain negative numbers.
What is the In Order Traversal:give your answer like 2 3 5 6 7
The maximum height of a 14-node B.S.T. is 13
In Stack Methods: ____ rreturns the # of objects in the stack.
Which one is the Application of Stack?
All parents have the same depth, but not necessarily the same height.
The "best case" search time for a B.S.T. is O(n). (where n =...
Resolving a hash collision by sequentially searching a hash table...
What is the contents of the array after the execution of the...
Write the postfix notation of A + B * C / D
An ordered tree in which each vertex has 0, 1, or 2 children.
Which Data structure is best suited for the UNDO operation in Windows?
A In Order traversal may be used to print an arithmetic expression
Find the value of the postfix expression :- ABCD ^*-  (IF A =...
Write the prefix notation of A + B * C / D
To delete an item from an array which loop is correct, where p is the...
To Insert an item from a stack identify the correct set of...
Which are Binary Trees?
___ is the condition resulting when two or more keys produce the same...
While inserting an item in an array of integers which loop is right,...
For a normal (double linked) binary tree, __ pointers are assigned to...
The name of the second child of a vertex on a binary tree.
A node connected via edges to a higher node.
A linked list of elements that share the same hash location.
Find the postfix expression of the following:- A OR B AND ! C
If the search item lies in the upper half in case of binary search...
A _____ function used to manipulate the key of an element in a list to...
Which are Full Binary Trees?
____ is the technique used for inserting and accessing elements in a...
What is the disadvantage of using buckets for collision resolution?
If "X" is a descendent of "Y", then "Y"...
Choose two ways to resolve problems following a deletion in a list...
All the descendents of a vertex.
Alert!

Advertisement