Marks: 140
Part A (One mark questions)
A) Next Node
B) Previous node
C) Last node
D) None of these
3. ________is a data structure in which insertions and deletions are restricted at one end,
called the top.
A) Linked Lists
B) Trees
C) Graph
D) Stack
4. The process to find the location of the record with the given key value is called _________
A) Traversing
B) Sorting
C) Searching
D) Deletion
5. The floor and ceiling function are also called as _____or ______integer function.
A) Greater, least
B) Least, greater
C) Small, greater
D) Big, small
9. Traversing a linked list means processing each node of list exactly ______.
A) Twice
B) Thrice
C) Once
D) None of these
10. The operating system of a computer may periodically collect all the deleted space onto the
free storage list and this technique is called_________.
A) Memory management
B) Garbage Collection
C) Memory allocation
D) Memory Deallocation
11. In _________, null pointer in the last node is replaced with address of the first node so that
it forms a circle.
A) Doubly linked list
B) Linear linked list
C) Circular doubly linked list
D) Circular linked list
12. ___________is the process of removing a node from the linked list.
A) Traversal
B) Searching
C) Insertion
D) Deletion
13. The two basic operations in stack are___________.
A) Insertion and deletion
B) Searching and sorting
C) Push and pop
D) None of these
14. Before executing push operation one must check for the __________ condition.
A) Underflow
B) Overflow
C) Full
D) Empty
15. In linked list representation of stack, push operation is performed by inserting a node into the
_____ of the linked list.
A) End
B) Middle
C) Front
D) None of these
16. Before executing the pop operation we must check for the _________condition.
A) Underflow
B) Overflow
C) Full
D) Empty
17. A _________is a non-linear data structure consists of root node.
A) Stack
B) Queue
C) Tree
D) Graph
18._________ connects nodes with one another in a tree data structure.
A) Root
B) Degree
C) Siblings
D) Edge
19. A ____________is a special case of tree where no node of a tree can have a degree
more than two.
A) Forest
B) Leaves
C) Binary Tree
D) Root
26. If a balance factor of a node is _____ then the heights of its left and right subtrees are equal.
A) 1
B) -1
C) 0
D) 2
27. If the balance factor of any node in the tree is affected, then we apply the technique called
__________.
A) Addition
B) Rotation
C) Tree balance
D) Redirection
28. R0 rotation is used during deletion of node from AVL tree.
A) True
B) False
29. A graph data structure consists mainly of __________.
A) Nodes
B) Edges
C) Root
D) Both A and B
30. In graph, directed link between two nodes is known as _______.
A) Path
B) Arc
C) Edge
D) Route
31. Full form of PERT is
A) Program Evaluation and Review Technique
B) Process Evaluation and Review Technique
C) Program Effective and Review Technique
D) Process Effective and Review Technique
Insertion Sort
38. In heap sort heapify procedure picks the largest child key and compares it to the _____.
A)
Parent node
B)
Root node
C)
D)
None of these
39. In graphs the ________is used to visit all of the nodes in the graph for its examination and
not always finds the shortest path.
A)
B)
C) Linear Search
D) Binary Search
40. A ______________is a subgraph of a graph G that includes all the vertices of G and is also
a tree.
A) Binary tree
B) Binary Search Tree
C) Spanning tree
D) AVL tree
41. Binary search is one of the fastest ways to search the element in a sorted array.
A) True
B) False
42. Primary uses of external storage devices are:
A) Backup or overlay of program during execution.
B) Storage of programs, subprograms and data.
C) Storage of information in files.
D) All of above
43. The device that performs actual ________of data is a tape drive.
A) Reading
B) Writing
C) Both A and B
D) None of the above
44. A___________ is a metal cylinder coated with magnetic iron-oxide material on which data
and programs can be stored
A) Magnetic Tape
B) Magnetic Drum
C) Floppy Disk
D) Hard Disk
45. Ployphase is one of the popular sorting methods for ________ sorting.
A) Internal
B) External
C) Both A and B
D) None of the above
46. Which sorting technique is recommended for the runs holding the number of records less
than 15?
A) Heap
B) Selection
C) Merge
D) Insertion
47. The run lists are_______
A) The small batches created in external sorting
B) The large batches created in external sorting
C) The small batches created in internal sorting
D) The large batches created in internal sorting
48. Hashing is the technique that use mathematical functions to sort ______ data in a speedy
and organized fashion.
A) Incoming
B) Outgoing
C) Stored
D) Both A and B
49. The hashing function changes dynamically and at any given instant there can be at
most ______hashing functions used by the scheme.
A) One
B) Two
C) Three
D) Four
50. The open-addressing schemes are :
A) Linear Probing
B) Quadratic Probing
C) Double Hashing
D) All of above
56. In some situation it is required to traverse both forward and backward of a linked list. The linked
list with this property needs _______link field one to point the_____ node is called next link field and
another to point the _____node is called previous link field.
A) Two, previous, next
B) One, Previous, next
C) Two, next, previous
D) one , next previous
57. Implementation of stack can be done either using _______or ______. The main disadvantage of
array implementation of stack is that the _________of the array has to be fixed.
A) tree, graph, size
B) one way list, tree, size
C) two way list, graph, size
D) array, linked list, size
59. Which the following statements are true in context of Queue data structure?
1. In queue deletions take place from one end called rear
2. In queue insertions take place from one end called front
3. Queue is a FIFO data structure
4. enqueue means adding a new item at the back of the queue
A) All are true
B) Only 3 and 4 is true
C) Only 1 and 2 is true
D) Only 1,2 and 3 is true
61. Binary tree is characterized by the fact that any node can have at most_____ branches.
For binary trees we distinguish between the subtree on the ________and on the ______.
A) two, left right
B) three, left, right
C) one, left right
D) zero, right, left
A) 1-c,2-b,3-a
B) 1-a,2-c,3-b
C) 1-b,2-c,3-a
D) 1-b,2-a,3-c
63. Which of the following are the steps of converting a general tree into a binary tree?
1. The root of the general tree must be the root of the binary tree
2. Determine the first child of the root which is the leftmost node in the general tree at the
next level.
3. insert this node. The child parent relationship in general tree would be considered in
binary tree also.
A) only 1 and 2
B) only 1
C) only 1 and 3
D) All 1,2 and 3
64. A tree T is called binary search tree if each node of n of T has the following property.
The value at n is _________ than every value in the____ subtree of n and is less than
every value in the _______ subtree of n.
A) Greater, left, right
B) Greater, right, left
C) Smaller, left, right
D) Smaller, right, left
65. State true and false in context of AVL search trees
1. An AVL tree is another balanced binary search tree named after their inventors, AdelsonVelskii and Landis.
2. h(TR) h(TL) is known as the balance factor. Where TL and TR is the height of left and right
subtrees respectively.
3. The balance factor of a node in a binary tree can have value 1, -1, 2.
A) 1-T, 2-T,3-F
B) 1-F, 2-T, 3-F
C) 1-T, 2-T, 3-T
D) 1-T, 2-F, 3-F
_______
66. During insertion in AVL tree, a ______rotation is a mirror of the_____ rotation operation.
LR is a _________ rotation.
A) Left, right, triple
B) Right, left, double
C) double, single, right
D) single, double, right
A)
B)
C)
D)
69. A ______defines a linear ordering on those nodes of a_________ graph that follows
the property: if node u is ______ of node v then v cannot be the predecessor of node u.
A) Heap sort, undirected graph, successor
B) Heap sort, directed graph, predecessor
C) Topological sort, undirected graph, successor
D) Topological sort, directed graph, predecessor
70. Identify the true statements in context of Dijkstras Algorithm
1. This algorithm is used to find the shortest path between the two vertices in a weighted
directed graph.
2. It is efficient to find each and every path from starting (source) to terminal vertices.
3. The time required by Dijkstra's algorithm is O(|V|2).
4. At each step, the aim is to make the temporary labels shorter by finding paths to the
associated vertices using the shortest paths to the permanent labeled vertices.
A) All 1,2,3,4
B) Only 1 and 2
C) Only 1,2 and 3
D) Only 3 and 4
71. Read the following statements and pick the correct option:
Basic principles of garbage collection are:
1. Scan for unallocated memory space.
2. Find data objects in a program that cannot be accessed in the future.
3. Delete the allocated data.
4. Reclaim the resources used by those objects.
A) 1, 2
B) 2, 4
C) 3, 4
D) 2, 3
72. Which of the following are the soring techniques?
1. Bubble
2. Binary
3. heap
4. Selection
A) Only 1, 2, and 4
B) Only 1 and 2
C) Only 3 and 4
D) None of the above
73. Match the following
1. Magnetic Tapes
2. Magnetic Drums
3. Magnetic Disks
4. Sectors
a. Are numbered divisions of the tracks designed to make data storage more manageable.
b. Are used to temporarily hold data that is not immediately required for computer operations.
c. Is a direct-access or random-access storage device.
d. Is an information storage medium consisting of a magnetisable coating on a thin plastic strip.
[3+7]
[4+6]
[7+3]
[ 5+5]
Part A
Q. No.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
Ans. Key
B
A
D
C
A
B
D
A
C
B
D
D
C
B
C
A
C
D
C
C
A
B
A
B
A
Q. No.
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
Part B
Ans. Key
C
B
B
D
B
A
B
B
C
D
B
A
A
A
C
A
D
C
B
B
B
A
A
B
D
Q. No.
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
Ans. key
B
C
A
B
D
C
D
C
B
A
A
B
D
A
D
B
A
B
B
A
B
A
C
B
D