ads

22
ads JNTU ONLINE EXAMINATIONS [Mid 2 - ads] 1. Which of the following is not a correct statement [01D01] 1. internal sorting is used if the number of items to be sorted is very large 2. External sorting is used if the number of items to be sorted is very large 3. External sorting needs auxiliary storage 4. Internal sorting needs auxiliary storage 2. There are 4 different algorithms A1,A2,A3,A4 to solve a given problem with the order log (n),log(log(n)),nlog(n),n/log(n) respectively. Which is the best algorithm? [01D02] 1. A1 2. A2 3. A3 4. A4 3. For merging two sorted lists of sizes m and n into a sorted list of size m+n, requires _ _ _ _ _ _ _ _ no.of comparisons [01M01] 1. O(m) 2. O(n) 3. O(m+n) 4. O(log(m)+log(n)) 4. Given two sorted list of size 'm' and 'n' respectively. The number of comparisons needed by the merge sort algorithm will be [01M02] 1. m x n 2. maximum of m,n 3. minimum of m,n 4. m+n-1 5. Merge sort uses [01M03] 1. divide and conquer strategy 2. backtracking approach 3. heuristic approach 4. greedy approach 6. Which of the following sorting algorithm has the worst time complexity of nlog(n)? [01S01] 1. Heap sort 2. Quick sort 3. Insertion sort 4. Selection sort 7. Sorting is not useful for [01S02] 1. report generation 2. minimizing the storage needed 3. making searching easier and efficient 4. responding to queries easily 8. In a binary search tree keys are inserted in the order {1,2,3.........n} as resulr? Find file:///C|/Users/RMK-Vamsi/Desktop/UandiSTAR/Online%20Bits/2-1%202nd%20mid/CSE-it/ads.html (1 of 22) [02-10-2010 15:19:27] www.UandiStar.org

Upload: bhariprasadmsc

Post on 18-Jul-2016

1 views

Category:

Documents


0 download

DESCRIPTION

dsdsd

TRANSCRIPT

ads

JNTU ONLINE EXAMINATIONS [Mid 2 - ads]

1. Which of the following is not a correct statement [01D01]1. internal sorting is used if the number of items to be sorted is very large 2. External sorting is used if the number of items to be sorted is very large 3. External sorting needs auxiliary storage 4. Internal sorting needs auxiliary storage

2. There are 4 different algorithms A1,A2,A3,A4 to solve a given problem with the order log(n),log(log(n)),nlog(n),n/log(n) respectively. Which is the best algorithm? [01D02]

1. A1 2. A2 3. A3 4. A4

3. For merging two sorted lists of sizes m and n into a sorted list of size m+n, requires _ _ _ _ _ _ _ _ no.of comparisons [01M01]

1. O(m) 2. O(n) 3. O(m+n) 4. O(log(m)+log(n))

4. Given two sorted list of size 'm' and 'n' respectively. The number of comparisons needed by the merge sort algorithm will be [01M02]

1. m x n 2. maximum of m,n 3. minimum of m,n 4. m+n-1

5. Merge sort uses [01M03]1. divide and conquer strategy 2. backtracking approach 3. heuristic approach 4. greedy approach

6. Which of the following sorting algorithm has the worst time complexity of nlog(n)? [01S01]

1. Heap sort 2. Quick sort 3. Insertion sort 4. Selection sort

7. Sorting is not useful for [01S02]1. report generation 2. minimizing the storage needed 3. making searching easier and efficient 4. responding to queries easily

8. In a binary search tree keys are inserted in the order {1,2,3.........n} as resulr? Find

file:///C|/Users/RMK-Vamsi/Desktop/UandiSTAR/Online%20Bits/2-1%202nd%20mid/CSE-it/ads.html (1 of 22) [02-10-2010 15:19:27]

www.UandiStar.org

ads

insert, delete operations take _ _ _ _ _ _ _ _ _ _ time. [02D01]1. O (long n) 2. O (n) 3. O (n long n) 4. O (n2)

9. A binary search tree is constructed with the following keys 20,22,26,21,13,19,18,15,26,28 The above keys are inserted in that order. Then the total keys in the left sub tree and the right sub tree of the tree or respectably. [02M01]

1. 5,5 2. 6,4 3. 7,3 4. 4,6

10. In indexed binary search tree leftsite field contains [02S01]1. no of elements in left sub tree 2. no of elements in left sub tree +1 3. Value of left leaf node 4. no of left leaf node +1

11. In indexed binary search tree left size field also gives the _ _ _ _ _ _ _ _ _ of an element with respect to the elements in its sub tree [02S02]

1. Sorted order 2. Median 3. Index 4. Rank

12. The balance factor of a node x in a binary tree is 3. There are 2 nodes in the right sub tree of x. There must be _ _ _ _ _ _ _ _ nodes in the left sub tree of x [03D01]

1. 2 2. 0 3. 5 4. 3

13. The permissible balance factors of an AVL tree are [03M01]1. 1,0,-2 2. -1,0,1 3. 0,1,2 4. -1,0,2

14. The height of an AVL Tree with n elements is [03S01]1. n 2. n2 3. n logn 4. log n

15. AVL tree is a _ _ _ _ _ _ _ _ _ binary tree [03S02]1. Complete 2. Full

file:///C|/Users/RMK-Vamsi/Desktop/UandiSTAR/Online%20Bits/2-1%202nd%20mid/CSE-it/ads.html (2 of 22) [02-10-2010 15:19:27]

www.UandiStar.org

ads

3. Height balanced 4. Skewed

16. After inserting an element in AVL tree, node A become imbalanced. Then new element added is the right child of right grand child of node A. Then the imbalances is of type [04D01]

1. RL 2. RR 3. LR 4. LL

17. If we insert an element in the right side of the left sub tree of node A in an AVL tree then the imbalance is of type [04M01]

1. RL 2. RR 3. LR 4. LL

18. The transformation done to remedy _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ imbalances is causual due in insectrum in as AVL tree often called single rotation [04S01]

1. LL & RR 2. LL & LR 3. LR & RL 4. RR & RL

19. The transformation done to remedy _ _ _ _ _ _ _ _ _ _ _ imbalances casul due to insertion in a AVL tree is often called double rotation. [04S02]

1. LL & RR 2. LL & LR 3. LR & RL 4. RR & RL

20. In AVL tree the transformation for an _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ imbalance can be viewed as an RR rotation followed by an LL rotation. [04S03]

1. RL 2. LR 3. RR 4. LL

21. In R0 Rotation the node which is imbalanced will be moving towards [05D01]1. Left sub tree 2. Right Subtree 3. root 4. not moving

22. In deletion of AVL search tree which of the following is not classified imbalance [05M01]1. R0 2. R2 3. R1 4. R-1

file:///C|/Users/RMK-Vamsi/Desktop/UandiSTAR/Online%20Bits/2-1%202nd%20mid/CSE-it/ads.html (3 of 22) [02-10-2010 15:19:27]

www.UandiStar.org

ads

23. In LR Rotation the node which is imbalanced is replaced with [05S01]1. root of left sub tree 2. Root of right subtree 3. left child of right subtree 4. right child of left subtree

24. In RL Rotation the node which is imbalanced is replaced with [05S02]1. root of left sub tree 2. Root of right subtree 3. left child of right subtree 4. right child of left subtree

25. In RR rotation the node which is imbalanced is replaced with [05S03]1. root of left sub tree 2. Root of right subtree 3. left child of right subtree 4. right child of left subtree

26. If a new node is added on the left side of left sub tree and tree is imbalance then the balance factor of the node which is imbalanced is [05S04]

1. 0 2. 2 3. -2 4. either 2 or -2

27. The time complexity of indexed search method is _ _ _ _ _ _ _ _ _ _ [06D01]1. O(h) 2. O(n) 3. O(n log n) 4. O(log n)

28. _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ is derived from an ordinary binary search tree by adding the field left size to each tree node. [06D02]

1. Binary search tree with duplicates 2. indexed binary search tree 3. Lexographical binary search tree 4. binary tree

29. In a binary search tree if the key element is greater than root element then _ _ _ _ _ _ _ _ _ sub tree must be searched [06M01]

1. right 2. left 3. center 4. root

30. In a binary search tree if the key element is less than root element then _ _ _ _ _ _ _ _ _ sub tree must be searched [06M02]

1. right 2. left 3. center

file:///C|/Users/RMK-Vamsi/Desktop/UandiSTAR/Online%20Bits/2-1%202nd%20mid/CSE-it/ads.html (4 of 22) [02-10-2010 15:19:27]

www.UandiStar.org

ads

4. root 31. The time complexity of search method in binary search tree eith n-nodes of hight h is _

_ _ _ _ _ _ [06M03]1. O(h) 2. O(n) 3. O(n log n) 4. O(log h)

32. Which traversal of a binary search tree traverses visits to the nodes in ascending order of key values? [06S01]

1. In Order 2. Pre Order 3. Post Order 4. Past Order

33. In Binary search tree, if the element to be inserted is less than the root node, then the element is inserted in [06S02]

1. Left sub-tree 2. Root 3. Right sub-tree 4. Cannot be inserted

34. In binary search tree, if the element to be inserted is greater than the root node, the element is inserted in [06S03]

1. Left sub-tree 2. Root 3. Right sub-tree 4. Cannot be inserted

35. Which of the following statements is false with respect to binary search tree ? [06S04]1. Root has maximum element 2. Left child is less than parent node 3. Right child is greater than left child 4. Right child is greater than parent node

36. If root is null it means that search tree has _ _ _ _ _ _ _ _ _ _ _ _ _ [06S05]1. no element 2. unknown elements 3. uncountable elements 4. 1 element

37. To delete a node that has exactly two non empty sub trees [07D01]1. The pointer in the parent node is made null 2. Node is replaced by smallest element in right sub tree 3. Node is replaced by its child 4. Node's parent will point to node's child

38. To delete a leaf node in binary search tree [07M01]1. The pointer in the parent node is made null 2. Node is replaced by smallest element in right sub tree

file:///C|/Users/RMK-Vamsi/Desktop/UandiSTAR/Online%20Bits/2-1%202nd%20mid/CSE-it/ads.html (5 of 22) [02-10-2010 15:19:27]

www.UandiStar.org

ads

3. Node is replaced by its child 4. Node's parent will point to node's child

39. To delete a root node that has exactly one non-empty sub tree [07M02]1. The pointer in the parent node is made null 2. Node is replaced by smallest element in right sub tree 3. Node is replaced by its child 4. Node's parent will point to node's child

40. Before inserting an element in a binary search tree we must perform _ _ _ _ _ _ _ _ _ _ _ operation to check distinct property. [07S01]

1. assend 2. delete 3. search 4. create

41. In Binary search tree if the search is _ _ _ _ _ _ _ _ _ then the element is inserted at the point the search terminated [07S02]

1. Successful 2. True 3. Unsuccessful 4. Correct

42. Time complexity of insert procedure in binary search tree with hight h, and n nodes is [07S03]

1. O(h) 2. O(n) 3. O(n log n) 4. O(log)

43. An n element AVL tree with height h can be searched in [08D01]1. o(log h) 2. O(h) 3. O(h log h) 4. O(n)

44. AVL Trees are normally represented using [08D02]1. Array's 2. Adjacency list 3. Linked nodes 4. Adjacency matrix

45. An n- element AVL tree can be searched in [08M01]1. o(n) 2. o(n2) 3. o(n logn) 4. o(log n)

46. All AVL Trees are basically [08M02]1. quad trees 2. empty trees

file:///C|/Users/RMK-Vamsi/Desktop/UandiSTAR/Online%20Bits/2-1%202nd%20mid/CSE-it/ads.html (6 of 22) [02-10-2010 15:19:27]

www.UandiStar.org

ads

3. binary search trees 4. B-Trees

47. Trees with a worst case height of o(log n) are called [08S01]1. Search tree 2. Binary search tree 3. Balanced search tree 4. Threaded binary tree

48. AVL tree was not developed by _ _ _ _ _ _ _ _ _ [08S02]1. Velskii 2. Anderson 3. Landis 4. Adelson

49. Which of the following balance factors is not allowed in AVL trees [08S03]1. -1 2. 0 3. 1 4. 2

50. The difference between the heights of left subtree & right subtree is called [08S04]1. Balance factor 2. height difference 3. Load balance 4. Rank

51. After inserting an element in AVL tree node A became imbalanced. The new element added is the left child of right grand child of node A. Then the imbalance is of type [09D01]

1. RL 2. RR 3. LR 4. LL

52. After inserting an element in AVL tree node A become imbalanced. The new element added is the left child of left grand child of node A then the imbalance is of type [09D02]

1. RL 2. RR 3. LR 4. LL

53. In AVL trees the transformation for an _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ imbalance can be viewed as an LL rotation followed by an RR rotation. [09M01]

1. RL 2. LR 3. RR 4. LL

54. Let `E' be the element to be inserted in AVL tree, if already an element with the same key value `E' is found in AVL tree then [09S01]

file:///C|/Users/RMK-Vamsi/Desktop/UandiSTAR/Online%20Bits/2-1%202nd%20mid/CSE-it/ads.html (7 of 22) [02-10-2010 15:19:27]

www.UandiStar.org

ads

1. new element replaces already existing element 2. insertion fails 3. new element becomes root node 4. new element will be right child of existing element

55. An AVL Tree after insertion becomes imbalance, if balance factor of a node is [09S02]1. 0 2. 1 3. -1 4. 2

56. After deletion of a mode in an AVC tree a maximum of _ _ _ _ _ _ _ _ _ _ is sufficient to restore balance [09S03]

1. 0 rotations 2. 1 rotations 3. 2 rotations 4. 3 rotations

57. In R0 imbalance of AVL tree the significance of R is [10D01]1. Deleted element is in right subtree 2. Deleted element is in left subtree 3. Deleted element is root element 4. No element is deleted

58. In L1 imbalance of AVL tree the significance of L is [10D02]1. Deleted element is in right subtree 2. Deleted element is in left subtree 3. Deleted element is root element 4. No element is deleted

59. In deletion of AVL search tree which of the following is not classified imbalance [10M01]1. L0 2. L1 3. L-1 4. L2

60. In AVL tree LL Rotation the node which is imbalanced will move towards its _ _ _ _ _ _ _ _ _ _ _ [10S01]

1. Left sub tree 2. Right sub tree 3. Root 4. not move

61. In a AVL tree RR rotation the node which is imbalanced will move towards _ _ _ _ _ _ _ _ _ _ _ _ [10S02]

1. Left sub tree 2. Right sub tree 3. Root 4. not move

62. If a new node is added on the right side and the AVL tree is imbalance then the balance

file:///C|/Users/RMK-Vamsi/Desktop/UandiSTAR/Online%20Bits/2-1%202nd%20mid/CSE-it/ads.html (8 of 22) [02-10-2010 15:19:27]

www.UandiStar.org

ads

factor of the node which is imbalanced is [10S03]1. 0 2. 2 3. -2 4. either 2 or -2

63. In LL Rotation the node which is imbalanced is replaced with its [10S04]1. root of left sub tree 2. Root of right subtree 3. left child of right subtree 4. right child of left subtree

64. In splay trees if the amortized costs are higher then the actual costs then potential is _ _ _ _ _ _ _ _ _ _ _ _ _ _ [11D01]

1. Decreasing 2. increasing 3. same 4. constant

65. In splay trees, if the amortized costs are lower then the actual costs then potential is _ _ _ _ _ _ _ _ _ _ _ _ _ [11D02]

1. Decreasing 2. increasing 3. same 4. constant

66. The run time for a splay (x) operation is proportional to the length of the _ _ _ _ _ _ _ _ _ _ _ _ path for x. [11M01]

1. Search 2. Join 3. Insert 4. Shortest

67. In splay trees the difference between concrete and amortized cost is charged against the _ _ _ _ _ _ _ _ _ _ _ _ of the data structure [11M02]

1. analysis 2. search 3. potential 4. running time

68. Splay trees are invented by [11S01]1. Sleator & Tarjan 2. Sleater &Hoare 3. Hoare &knuth 4. knuth &Tarjan

69. The Splay operation moves element to _ _ _ _ _ _ _ _ _ _ _ _ of the tree [11S02]1. Leaf 2. Right sub tree 3. Root

file:///C|/Users/RMK-Vamsi/Desktop/UandiSTAR/Online%20Bits/2-1%202nd%20mid/CSE-it/ads.html (9 of 22) [02-10-2010 15:19:27]

www.UandiStar.org

ads

4. Left sub tree 70. The time complixity of maintaining a splay trees is analyzed using [11S03]

1. ABC analysis 2. Amortised analysis 3. cost analysis 4. search analysis

71. Which of the following is not a splay tree operation. [11S04]1. search 2. split 3. Insert 4. Delete

72. _ _ _ _ _ _ _ _ _ _ _ _ _ _is essentially a binary tree with special update and access rules. [11S05]

1. B-Trees 2. M-way search tree 3. AVL trees 4. Splay trees

73. A Sequence of m operations on splay tree with initially n nodes takes time of the order of _ _ _ _ _ _ _ _ _ _ _ _ _ [11S06]

1. O (n�∗m) 2. O (n log n +m log n) 3. (n log n2) 4. O (n log n�∗m)

74. (x) To search AVL, Red-black, binary search trees same code can be used. (y) For isertion in to binary search tree and AVL tree same code can be used [12D01]

1. both (x) & (y) are correct 2. (x) is correct (y) is false 3. (x) is false (y) is correct 4. Both (x) & (y) are false

75. In a red black-tree (x) Every external node is colored black (y) The children of red node of black [12D02]

1. Both (x) and (y) are correct 2. (x) is correct (y) is false 3. (x) is false (y) is correct 4. Both (x) and (y) is false

76. In the Red Black Trees the external nodes are represented by _ _ _ _ _ _ _ _ _ _ [12S01]

1. Solid Square 2. Squares 3. Circles 4. Solid Circles

77. In Red-Black trees pointers from internal node to an external node are _ _ _ _ _ _ _ _ _ _ _ _ [12S02]

file:///C|/Users/RMK-Vamsi/Desktop/UandiSTAR/Online%20Bits/2-1%202nd%20mid/CSE-it/ads.html (10 of 22) [02-10-2010 15:19:27]

www.UandiStar.org

ads

1. Solid 2. Red 3. Black 4. Null

78. In Red-Black tress, red pointers are represented by _ _ _ _ _ _ _ _ _ _ _ _ _ [12S03]1. solid lines 2. red lines 3. thin lines 4. circles

79. In Red-Black trees every path from the root to an external node has _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ pointers [12S04]

1. Two black 2. one black 3. two red 4. one red

80. In Red-Black trees root node is _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ [12S05]1. Black 2. red 3. Null 4. No child

81. An n node red-black tree has the property that its height is _ _ _ _ _ _ _ _ _ [12S06]1. O(n log(n)) 2. O(n) 3. O(n2) 4. O(log(n))

82. If a non-leaf node is red then it has _ _ _ _ _ _ _ _ _ _ _ _ _ _ [12S07]1. only black Childs 2. only red Childs 3. both black & red child 4. no-child

83. _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ is a binary search tree with extra attribute i..e. color [12S08]

1. Black-white tress 2. Red-black trees 3. AVL trees 4. Balanced binary trees

84. A rotation is local operation in a search tree that preserves _ _ _ _ _ _ _ _ _ _ _ _ traversal key ordering [12S09]

1. Preorder 2. Post order 3. In order 4. Past order

85. Null nodes which terminates the tree are _ _ _ _ _ _ _ _ _ [12S10]

file:///C|/Users/RMK-Vamsi/Desktop/UandiSTAR/Online%20Bits/2-1%202nd%20mid/CSE-it/ads.html (11 of 22) [02-10-2010 15:19:27]

www.UandiStar.org

ads

1. Black 2. red 3. white 4. No child

86. A red-node cannot have _ _ _ _ _ _ _ _ [13D01]1. red child 2. black child 3. child 4. white child

87. There are never two _ _ _ _ _ _ _ _ _ _ _ _ links in a row [13D02]1. Black 2. White 3. Red 4. Orange

88. In Red black tress the value of any node is _ _ _ _ _ _ _ _ _ _ _ _ than the value of its left child [13M01]

1. equal 2. less 3. greater 4. No relation

89. In Red-black trees the value of any node is _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ than the value of its right child [13M02]

1. equal 2. less 3. greater 4. No relation

90. In _ _ _ _ _ _ _ _ _ _ _ trees each node may contain more than one key [13S01]1. Binary tree 2. AVL tree 3. B-Tree 4. Splay trees

91. _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ is an example of multiway tree _ _ _ _ _ _ _ _ _ _ [13S02]

1. Binary tree 2. AVL tree 3. B-Tree 4. Splay trees

92. _ _ _ _ _ _ _ _ _ _ _ _ Tress is designed especially for use on disk [13S03]1. Binary tree 2. AVL tree 3. B-Tree 4. Splay trees

93. A multiway tree of order m is an ordered tree where each node has _ _ _ _ _ _ _ _ _ _

file:///C|/Users/RMK-Vamsi/Desktop/UandiSTAR/Online%20Bits/2-1%202nd%20mid/CSE-it/ads.html (12 of 22) [02-10-2010 15:19:27]

www.UandiStar.org

ads

_ children [13S04]1. m 2. atmost m 3. at least m 4. not m

94. A B-tree of order m is an _ _ _ _ _ _ _ _ _ _ _ _ _ _ search tree [13S05]1. m+1-way 2. 2-way 3. m-1-way 4. m-way

95. In Red Black tress every path from the root to a leaf contains the same no.of [13S06]1. nodes 2. red nodes 3. leaf nodes 4. black nodes

96. In B-tree of order m the root has _ _ _ _ _ _ _ _ _ _ child nodes [14S01]1. atleast 2 2. m 3. m/2 4. zero

97. In B-tree of order m all external nodes are _ _ _ _ _ _ _ [14S02]1. at different levels 2. have 1 child node 3. at same levels 4. have two child nodes

98. In B-tree of order all is internal nodes, other than the root have _ _ _ _ _ _ _ _ children [14S03]

1. 2 2. m 3. o 4. m/2

99. Searching in an m-way search tree, we will get unsuccessful result in the following condition, if the search path heads to _ _ _ _ _ _ _ _ _ _ _ [14S04]

1. root node 2. leaf node 3. external node 4. internal node

100. In B-tree of height h containing n nodes the time complexity for search operation is _ _ _ _ _ _ _ _ _ _ _ _ _ _ [14S05]

1. o(h) 2. o(h�∗n) 3. o(log h) 4. o (hlog n)

file:///C|/Users/RMK-Vamsi/Desktop/UandiSTAR/Online%20Bits/2-1%202nd%20mid/CSE-it/ads.html (13 of 22) [02-10-2010 15:19:27]

www.UandiStar.org

ads

101. In B-tree of height h contains n-nodes the time complexity for insert operation is _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ [14S06]

1. o(h) 2. o(h�∗n) 3. o(log h) 4. o (hlog n)

102. In a B-tree of height h containing n nodes the time complexity of delete operation is _ _ _ _ _ _ _ _ _ _ _ _ _ [14S07]

1. o(h) 2. o(h�∗n) 3. o(log h) 4. o (hlog n)

103. In Deletion from a B-tree case 2 is transformed into case 1 by replacing the deleted element with the _ _ _ _ _ _ _ _ _ _ _ _ element in its right neighboring sub tree [15D01]

1. Smallest 2. largest 3. leftmost 4. root

104. After deleting an element from a B-tree we merge two siblings into a single node under the condition. If the deleted node has _ _ _ _ _ _ _ _ _ [15D02]

1. extra element 2. leaf node 3. no extra element 4. is root

105. Deletion of element from a B-tree from a leaf that containing more than the minimum no. of elements requires _ _ _ _ _ _ _ _ _ _ [15M01]

1. modifying left sibling 2. modifying right sibling 3. modifying parent 4. Simple deletion of element

106. In Deletion from a B-tree case 2 is transformed into case 1 by replacing the deleted element with the _ _ _ _ _ _ _ _ _ _ _ element in its left neighboring sub tree [15M02]

1. Smallest 2. largest 3. leftmost 4. root

107. A B-tree of order m is also known as _ _ _ _ _ _ _ [15S01]1. Binary search tree 2. m-way search tree 3. m-ordered tree 4. ordered search tree

108. A 200-way search tree of height 8 can hold a minimum no. of _ _ _ _ _ _ _ _ _ _ nodes

file:///C|/Users/RMK-Vamsi/Desktop/UandiSTAR/Online%20Bits/2-1%202nd%20mid/CSE-it/ads.html (14 of 22) [02-10-2010 15:19:27]

www.UandiStar.org

ads

[15S02]1. 200 2. 8 3. 8�∗log 200 4. 2008-1

109. B-tree of order 3 is also known as _ _ _ _ _ _ _ _ _ _ [15S03]1. 2-3 tree 2. 3-4 tree 3. binary tree 4. Splay tree

110. B-Tree of order 2 are _ _ _ _ _ _ _ _ _ [15S04]1. Binary tree 2. Sticky binary tree 3. full binary tree 4. complete binary tree

111. Deletion of element in a B-tree is divided into _ _ _ _ _ _ _ _ _ _ _ _ _ _ cases [15S05]1. 1 2. 3 3. 2 4. 4

112. In the boyer moore algorithm if the pattern P is ``algorithm" the comparison goes to the next character if the first character is [16D01]

1. a 2. 1 3. space 4. m

113. KMP algorithm is the improved version of _ _ _ _ _ _ _ _ _ _ _ _ algorithm [16D02]1. knuth 2. morris pratt 3. knuth morris 4. knuth pratt

114. In the boyer moore algorithm if the pattern P is ``algorithm" Then the shift value of character a is [16M01]

1. 9 2. 1 3. 0 4. 8

115. In the boyer moore algorithm if the pattern P is ``algorithm" Then the shift value of character g is [16M02]

1. 9 2. 6 3. 2 4. 3

file:///C|/Users/RMK-Vamsi/Desktop/UandiSTAR/Online%20Bits/2-1%202nd%20mid/CSE-it/ads.html (15 of 22) [02-10-2010 15:19:27]

www.UandiStar.org

ads

116. given string T and pattern P the pattern matching problem consists of finding a substring of _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ equal to _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ [16S01]

1. P ; ; ; ; ; ; ; ; ; ; P 2. T ; ; ; ; ; ; ; ; ; ; P 3. P ; ; ; ; ; ; ; ; ; ; T 4. T ; ; ; ; ; ; ; ; ; ; T

117. Which of the following is not an application of pattern matching algorithm [16S02]1. text editor 2. search engines 3. insertion 4. biological research

118. The brute force pattern matching algorithm compares the pattern P with the text T for _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ values [16S03]

1. consecutive 2. random 3. sorted 4. binary

119. _ _ _ _ _ _ _ _ _ _ _ algorithm is recommended for binary strings pattern matching [16S04]

1. Boyer moore 2. brute force 3. morris 4. KMP

120. _ _ _ _ _ _ _ _ _ algorithm is preferred for pattern matching when the length is of short duration [16S05]

1. Boyer moore 2. brute force 3. morris 4. KMP

121. _ _ _ _ _ _ _ _ _ algorithm is preferred for pattern matching if the size of string is large compared to the length of the pattern [16S06]

1. Boyer moore 2. brute force 3. morris 4. KMP

122. In the boyer moore algorithm let the string T be ``this is a test of the boyer moore algorithm" and the pattern P is ``algorithm" after the first comparison _ _ _ _ _ _ _ _ _ _ _ _ shift takes place [17D01]

1. good suffix shift 2. bad character shift 3. matching shift 4. non matching shift

file:///C|/Users/RMK-Vamsi/Desktop/UandiSTAR/Online%20Bits/2-1%202nd%20mid/CSE-it/ads.html (16 of 22) [02-10-2010 15:19:27]

www.UandiStar.org

ads

123. In the boyer moore algorithm _ _ _ _ _ _ _ _ _ _ _ _ function will calculate how far the pattern must be shifted if the character is found in the pattern [17D02]

1. last 2. prefix 3. first 4. end

124. In bad character shift the length of the shift is equal to the [17M01]1. 3 positions 2. zero positions 3. half of the pattern 4. length of the pattern

125. In the boyer moore algorithm let the string T be ``this is a test of the boyer moore algorithm" and the pattern P is ``algorithm" the first comparison takes place between [17M02]

1. a t 2. h l 3. a m 4. m m

126. In boyer moore algorithm _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ number of precomputed functions are there [17S01]

1. 1 2. 0 3. 2 4. 3

127. The boyer moore algorithm scans the characters of the pattern from _ _ _ _ _ _ to _ _ _ _ _ _ _ _ _ _ _ _ [17S02]

1. right , left 2. left ,left 3. a right , right 4. left ,right

128. In the boyer moore algorithm good suffix shift is also known as [17S03]1. bad character shift 2. matching shift 3. occurrence shift 4. non matching shift

129. In the boyer moore algorithm bad character shift algorithm is also known as [17S04]1. good suffix shift 2. matching shift 3. occurrence shift 4. non matching shift

130. In the boyer moore algorithm if the character being compared is existing in the pattern then _ _ _ _ _ _ _ _ _ _ _ _ _ shift will be performed [17S05]

1. good suffix shift

file:///C|/Users/RMK-Vamsi/Desktop/UandiSTAR/Online%20Bits/2-1%202nd%20mid/CSE-it/ads.html (17 of 22) [02-10-2010 15:19:27]

www.UandiStar.org

ads

2. bad character shift 3. occurrence shift 4. non matching shift

131. In the boyer moore algorithm if the character being compared is not present in the pattern then _ _ _ _ _ _ _ _ _ _ _ _ _ shift will be performed [17S06]

1. good suffix shift 2. bad character shift 3. matching shift 4. non matching shift

132. In boyer moore algorithm , in which heuristic that pattern P is compared with a sub sequence of T moving backwards [18D01]

1. looking glass heuristic 2. character jump heuristic 3. basic heuristic 4. boyer heuristic

133. In boyer moore algorithm , in which heuristic mismatch occurs [18D02]1. looking glass heuristic 2. character jump heuristic 3. basic heuristic 4. boyer heuristic

134. In KMP pattern matching algorithm the time complexity of pre processing function is [18M01]

1. O(n) 2. O( log n) 3. O( n2) 4. O(n log n)

135. In KMP pattern matching algorithm the pre processing function computes the _ _ _ _ _ _ _ _ _ _ _ _ _ _ of pattern matches within itself [18M02]

1. comparisons 2. shifting 3. number 4. mismatches

136. Brute force algorithm is also known as _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ algorithm [18S01]1. moore 2. boyer 3. naive 4. morris

137. In which pattern matching algorithm, character by character comparisons takes place [18S02]

1. brute force 2. boyer moore 3. knuth - morris 4. pratt

file:///C|/Users/RMK-Vamsi/Desktop/UandiSTAR/Online%20Bits/2-1%202nd%20mid/CSE-it/ads.html (18 of 22) [02-10-2010 15:19:27]

www.UandiStar.org

ads

138. In brute force pattern matching algorithm in case if a character is not matched then the _ _ _ _ _ _ _ _ _ _ _ is shifted one position [18S03]

1. pointer 2. pattern 3. string 4. character

139. Time complexity of brute force string matching algorithm is [18S04]1. Θ(n) 2. Θ(logn) 3. Θ(nlogn) 4. Θ(n2)

140. which of the following pattern matching algorithm does not require s pre processing on text or pattern [18S05]

1. Brute force 2. R obin karp 3. boyer 4. knuth morris pratt

141. In KMP pattern matching algorithm pre processing is done by an auxillary function known as [18S06]

1. failure function 2. prefix function 3. postfix function 4. insert function

142. A compressed trie is obtained from _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ [19D01]1. trie 2. standard trie 3. suffix trie 4. encoding trie

143. In compressed tries the chain of _ _ _ _ _ _ _ _ _ _ _ nodes are compressed [19D02]1. leaf 2. external 3. internal 4. redundant

144. A trie is useful when the set of keys is _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ [19M01]1. dense 2. sparse 3. empty 4. independent of set of keys

145. A compressed trie has internal nodes of degree atleast equal to [19M02]1. 0 2. 1 3. 2 4. 3

file:///C|/Users/RMK-Vamsi/Desktop/UandiSTAR/Online%20Bits/2-1%202nd%20mid/CSE-it/ads.html (19 of 22) [02-10-2010 15:19:27]

www.UandiStar.org

ads

146. The structures occur frequently in the area of information organization and _ _ _ _ _ _ _ _ _ _ [19S01]

1. search 2. storing 3. retrieval 4. management

147. Trie structures name is derived from the word [19S02]1. search 2. storing 3. retrieval 4. management

148. The method of searching in tries is analogous to _ _ _ _ _ _ _ _ [19S03]1. sorting 2. digital sorting 3. hashing 4. binary search

149. A trie structure is a complete _ _ _ _ _ _ _ _ _ _ _ _ _ tree [19S04]1. binary 2. search 3. B-tree 4. m- ary

150. Each node in a trie structure will not contain [19S05]1. pointer 2. dash 3. desired word 4. node number

151. A digital search tree is implemented using [19S06]1. binary tree 2. trie 3. binary search tree 4. B-tree

152. An inverted file is a file structure in which every list contain only _ _ _ _ _ _ _ _ _ record [20D01]

1. 0 2. 1 3. 2 4. 3

153. An inverted file is also known as _ _ _ _ _ _ _ _ _ _ _ _ [20D02]1. indeed sequential file 2. sequential file 3. random file 4. binary file

154. A standard trie supports insert in _ _ _ _ _ _ _ _ _ _ time where m is size of string

file:///C|/Users/RMK-Vamsi/Desktop/UandiSTAR/Online%20Bits/2-1%202nd%20mid/CSE-it/ads.html (20 of 22) [02-10-2010 15:19:27]

www.UandiStar.org

ads

parameter and d is size of the alphabet [20M01]1. O(d)�∗ O(m) 2. O(dm) 3. O( dm) 4. O(d+m)

155. A standard trie supports delete in _ _ _ _ _ _ _ _ _ _ time where m is size of string parameter and d is size of the alphabet [20M02]

1. O(d)�∗ O(m) 2. O(dm) 3. O( dm) 4. O(d+m)

156. which of the following operation is not supported by tries [20M03]1. sorting 2. insert 3. delete 4. find

157. _ _ _ _ _ _ _ _ _ _ _ _ is a compact data structure for representing a set of strings such as all the words in a text [20S01]

1. trie 2. tree 3. search engine 4. B- tree

158. In standard trie each node except the _ _ _ _ _ _ _ _ _ _ _ _ _ _ is labeled with a character [20S02]

1. leaf 2. external 3. internal 4. root

159. The path from the _ _ _ _ _ _ _ _ nodes to the root yield the string S [20S03]1. parent 2. external 3. internal 4. root

160. A standard trie uses _ _ _ _ _ _ _ _ _ _ space [20S04]1. O(n) 2. O(n2) 3. O(n log n) 4. O(log n)

161. A standard trie supports search in _ _ _ _ _ _ _ _ _ _ time where m is size of string parameter and d is size of the alphabet [20S05]

1. O(d)�∗ O(m) 2. O(dm) 3. O( dm)

file:///C|/Users/RMK-Vamsi/Desktop/UandiSTAR/Online%20Bits/2-1%202nd%20mid/CSE-it/ads.html (21 of 22) [02-10-2010 15:19:27]

www.UandiStar.org

ads

4. O(d+m)

file:///C|/Users/RMK-Vamsi/Desktop/UandiSTAR/Online%20Bits/2-1%202nd%20mid/CSE-it/ads.html (22 of 22) [02-10-2010 15:19:27]

www.UandiStar.org