0

Data Structures

Description: Information Technology
Number of Questions: 15
Created by:
Tags: Information Technology Algorithm Functions Data Structure
Attempted 0/15 Correct 0 Score 0

Find the number of degree 2 node in a binary tree which is having n leaf nodes.

  1. n - 1

  2. 2n - 1

  3. n + 1

  4. 3n -1

  5. none of these


Correct Option: A
Explanation:

Any binary tree with n leaf nodes will have 2n - 1 nodes total. Hence the number of n leaf node will be (2n - 1) - n = n -1

The type of linear data structure in which deletion can be done from one end (front) and insertion can take place only at the other end (rear) is known as a

  1. linked List

  2. stack

  3. tree

  4. queue

  5. doubly linked list


Correct Option: D
Explanation:

Insertion can be done at the rear end and the deletion can be done only at the Front.

Which of the following determine the efficiency of algorithms?

  1. Processor and memory

  2. Complexity and reliability

  3. Time and space

  4. Data and storage

  5. None of these


Correct Option: C
Explanation:

Time and Space are the two measure factors which determines the efficiency of the algorithms.

The Quick Sort algorithm is based upon the

  1. backtracking

  2. greedy

  3. dynamic programing

  4. linear programing

  5. divide and conquer


Correct Option: E
Explanation:

Divide and Conquer is an algorithm design paradigm, based on recursion and is used for the Quicksort in which the original problem is divided in to the sub problems and are solved recursively.

Name of the function which dynamically allocates the memory during the runtime.

  1. free( )

  2. malloc( )

  3. realloc( )

  4. Calloc( )

  5. Garbage


Correct Option: B
Explanation:

This function allocates the memory and returns the pointer to the allocated memory.

The type of sort in which the list of names is first sorted according to the first letter of each name is

  1. Bubble sort

  2. Quick sort

  3. Insertion sort

  4. Selection sort

  5. Radix sort


Correct Option: E
Explanation:

Radix sort is the method that many people intuitively use or begin to use when alphabetizing a large list of names. Specifically the list of names is first sorted according to the first letter of each name.

In C programing, scanf function is not used to for string datatype because

  1. it cannot take a string

  2. it cannot take a space character

  3. it is used only for numerical values

  4. it takes only float datatype

  5. it take only int datatype


Correct Option: B
Explanation:

Scanf terminates at space character so it is not used for string/Array. get(a) is the right choice for the purpose.

Which type of data structure operation is used to find out the location of the given record with the given key value?

  1. Traversing

  2. Searching

  3. Inserting

  4. Deleting

  5. Merging


Correct Option: B
Explanation:

Finding the location of the record with the given key value.

What is the complexity of the bubble sort?

  1. O(n)

  2. O(logn)

  3. O(n2)

  4. O(nlogn)

  5. O(1)


Correct Option: C
Explanation:

Bubble sort.

Which of the following is the property of B+ tree?

  1. Each node has the maximum of M children and a minimum of M/2 children or any number from 2 to the maximum.

  2. Each node has one fewer keys than children with the maximum of M -1 keys.

  3. Keys are arranged in a defined order within the node.

  4. All the leaves are on the same level, i.e. there is no empty sub tree above the level of the leaves.

  5. All the leaves have been connected to form the linked list of the keys in a sequential order.


Correct Option: E
Explanation:

This is the Property of B-Tree.

What are the three types of files created after creating and bulding a program in C?

  1. Filename.C, filename.obj, filename.exe

  2. Filename.C, filename.obj, filename.txt

  3. Filename.obj, filename.txt, filename.exe

  4. Filename.obj, filename.exe, filename.dll

  5. None of these


Correct Option: A
Explanation:

These are the three extension files created after developing a c program, compiling and building to run.

Which of the following is a TCL command?

  1. Create

  2. Drop

  3. Select

  4. Alter

  5. Rollback


Correct Option: E
Explanation:

It is to rollback the entered data stored in stack. It is a TCL command.

How many layers form internet model?

  1. 7

  2. 5

  3. 2

  4. 6

  5. None of these


Correct Option: B
Explanation:

Physical Layer,Data Link Layer, Network Layer, Transport Layer, Application Layer

Which of the following functions are used for a single character input and single character output data?

  1. getchar( ), putchar( )

  2. getch( ), printf( )

  3. getche( ), scanf( )

  4. printf( ), scanf( )

  5. None of these


Correct Option: A
Explanation:

These are two specific functions used for single character input and output of data.

The traversal in which one node is selected as the start point. It is visited and marked, then all unvisited nodes adjacent to the next nodes are visited and marked in the some sequential order. Finally , the unvisited nodes immediately adjacent to these nodes are visited and marked and so forth, until the entire edges are traversed. This type of searching occurs in which of the following algorithms?

  1. Floyd’s algorithm

  2. Dijkstra’s algorithm

  3. Prim’s algorithm

  4. Breadth First Search graph

  5. Connected graph


Correct Option: D
Explanation:

In the Depth First Search the traversal in which one node is selected as the start point. It is visited and marked, then all unvisited nodes adjacent to the next nodes are visited and marked in the some sequential order. Finally , the unvisited nodes immediately adjacent to these nodes are visited and marked and so forth, until the entire edges are traversed.

- Hide questions