0

Data Structure

Description: DS
Number of Questions: 15
Created by:
Tags: DS Data Structure
Attempted 0/15 Correct 0 Score 0

Which of the following conditions is checked into the stack before performing the 'insertion' operation?

  1. Underflow

  2. Overflow

  3. Top

  4. Push

  5. Pop


Correct Option: B
Explanation:

This condition is checked into the stack before performing the 'insertion' operation.

In which of the following binary trees is every level, except possibly the last, completely filled?

  1. Complete binary tree

  2. Skewed binary tree

  3. Full binary tree

  4. Forest

  5. Height


Correct Option: A
Explanation:

In this tree, every level, except possibly the last, is completely filled.

In which of the following linked lists is the null pointer in the last node replaced with the address of the first node?

  1. Doubly linked list

  2. Singly linked list

  3. Circular linked list

  4. Queues

  5. Stacks


Correct Option: C
Explanation:

The last node is replaced with the address of the first node.

Which of the following graphs has more than one edge between the same two vertices?

  1. Weighted graph

  2. Multigraph

  3. Sparse graph

  4. Acyclic graph

  5. Null graph


Correct Option: B
Explanation:

This type of graph has more than one edge between the same two vertices.

Which of the following properties is a transitive relation defined on the elements of the list and specified by the sequence in which the elements appear within the list?

  1. Depth

  2. Length

  3. Order

  4. Degree

  5. Height


Correct Option: C
Explanation:

This is a transitive relation defined on the elements of the list and specified by the sequence in which the elements appear within the list.

Which of the following operations is also called processing of each node of linked list exactly once?

  1. Sorting

  2. Searching

  3. Traversing

  4. Insertion

  5. Deletion


Correct Option: C
Explanation:

Processing of each node of linked list exactly once is also called traversing.

Which of the following techniques is used to collect all the free cells and store them in free pool?

  1. Free storage list

  2. Garbage collection

  3. Traversing

  4. Searching

  5. Sorting


Correct Option: B
Explanation:

This technique is used to collect all the free cells and store them in free pool.

Which of the following traversal techniques begins with the root, then proceeds towards the end of the left subtree and then, towards the right subtree?

  1. Inorder

  2. Postorder

  3. Preorder

  4. Push

  5. Pop


Correct Option: C
Explanation:

Traversing begins with the root, then proceeds towards the end of the left subtree and then, towards the right subtree.

Which of the following conditions must be verified before inserting a new element into the stack?

  1. Underflow

  2. Overflow

  3. Top

  4. Push

  5. Pop


Correct Option: B
Explanation:

This condition must be verified before inserting a new element into the stack.

Which of the following graphs has no path and starts and ends at the same vertex?

  1. Weighted graph

  2. Multigraph

  3. Acyclic graph

  4. Strongly connected graph

  5. Null graph


Correct Option: C
Explanation:

This type of graph can be defined as a graph with no path that starts and ends at the same vertex.

Which of the following data structures can be defined as an undirected tree of a connected graph G which is composed of all the vertices and the edges necessary to connect all the nodes of graph G?

  1. Spanning forest

  2. Stacks

  3. Queues

  4. Spanning tree

  5. Null graph


Correct Option: D
Explanation:

A spanning tree can be defined as an undirected tree of a connected graph G which is composed of all the vertices and the edges necessary to connect all the nodes of graph G.

Which of the following properties is the maximum level attributed to any element within the list or within any sublist in the list?

  1. Order

  2. Length

  3. Depth

  4. Degree

  5. Path


Correct Option: C
Explanation:

This property of list structure is the maximum level attributed to any element within the list or within any sublist in the list.

Which of the following techniques can be used for implementing indexes?

  1. Linear search

  2. Binary search

  3. Hashing

  4. Sorting

  5. Traversing


Correct Option: C
Explanation:

This technique can be used for implementing indexes.

Which of the following parts is read and written by a system?

  1. Directory

  2. Buckets

  3. Front

  4. Top

  5. Rear


Correct Option: B
Explanation:

This part is read and written by a system.

Which of the following types of external sorting techniques is the one in which the basic idea is to distribute ordered initial runs of predetermined size on the available tapes and repeatedly merge these runs in multiple phases, in which each phase has a predetermined number of merges before the target tape is selected?

  1. Tape drive merge sort

  2. Insertion sorting

  3. Polyphase sorting

  4. Bubble sorting

  5. Selection sorting


Correct Option: C
Explanation:

This type of an external sorting is the one in which the basic idea is to distribute ordered initial runs of predetermined size on the available tapes and repeatedly merge these runs in multiple phases, in which each phase has a predetermined number of merges before the target tape is selected.

- Hide questions