Академический Документы
Профессиональный Документы
Культура Документы
12. a linear tist in which the elements can be added or removed at either end but not in 25. List the types of queues. Write a note on circular queue.
the middle
list
(A) Linear (B) Circular queue 26. Find the preorder and postorder expression for the given infix expression
-is
(C) Enqueue (D) Dequeue la + (b - c)\*l(d - e) / (f + s - h)\
13. Degree of a leaf node is 27. Consider the below graph and find the adjacency matrix of G
(A) I (B) 2
(c) 3 (D)o
14. In a the left and right subtrees fo1 any given node, differ in height by no more than
one
(A) Balancedbinary.tree (B) Weight balanced binary tree
(C) Height balanced binary tree (D) Binary search tree
15. When preorder traversal of a tree is ABDEFCGHJLK, then the postorder traversal will be
(A) DFEBGLJKHCA (B) DBFEAGCLIHIi
(C) DFBELGJKCHA (D) DFEBLGHKCAJ
PART - C (5 x 12 :60 Marks)
Answer ALL Questions
16. is a selfbalancing binary search tree with an additional property that recently accessed
elements can be re-accessed fast
(A) AVL tree (B) Red black tree 28. a. Illustrate binary search technique with an algorithm. Mention the time complexity.
(C) Splay tree @) Binary search tree (oR)
b.i. Define ADT. List the advantages of ADT.
17. The of a node is the number of edges containing that node
(A) Path (B) Degree
(C) Vertex (D) Loop ii Explain the various mathematical notations and functions used in analysis of algorithms.
,:
29. a- Describe the following operations of singly linked list with an example.
18. The graph is said to be _ if each edges in the graph is assigned a non-negative numerical
value called the w6ight of length of the edge
(i)
Deleting a node at the beginning
(A) Complete (B) Weighted (iD
Deleting a node at the end
(C) Balanced (D) Tree (iii)
Deleting a node after a given node
(oR)
19. _ is a method used to store a graph
b. Discuss the following operations of doubly linked list with an example
(41 stactr @) Adjacency matrix
(C) Diagraph @) List
(i) lnserting a node at the beginning
(iD Deleting a node atthe end
20. The process of examining memory location in a hash table is called
(iii) Deleting a node after a given node.
(A) Hashing (B) Collision
(C) Probing (D) Addressing
of4 06rF3/415CS20lJ
Page 2 of4 0GIr3/4l5CS20tJ Page 3