Question Bank Data Structures - 24 - 25 - Odd
Question Bank Data Structures - 24 - 25 - Odd
Question Bank Data Structures - 24 - 25 - Odd
3. Express tree traversal for the following tree. CO3 BTL-2 Understand
6.
What are threaded binary trees? Give its advantage CO3 BTL-2 Understand
7.
Define a heap and show how it can be used to represent CO3 BTL 1 Remember
a priority queue.
8.
How binary search tree differ from binary tree? List out CO3 BTL-2 Understand
the applications of trees.
9.
What are the rules to be followed to construct a binary CO3 BTL-2 Understand
search tree? why binary search cannot be performed on
a linked list.
10.
Define a full binary tree and complete binary tree. Give CO3 BTL-2 Understand
an example.
PART-B
1. Examine BST for the following elements, 7,5,1,8, CO3 BTL-4 Analyze
3,6,10,9,4,2. Write an algorithm for preorder, in order
and postorder traversal of a binary tree. Compute the
tree traversal for the above tree.
2. Inspect the various methods in which a binary tree can
CO3 BTL-4 Analyze
be represented.
Draw B – Tree for order m = 5 for the keys {K, O, S,
V, M, F, B, G, T, U, W}
Delete the keys K and G in order.
3. Compare B trees with B+ trees. Construct B+ tree of
CO3 BTL-4 Analyze
order 5 for the following data: 7,10,1,23, 5,15,17, 9,11,
39,35,8,40,25
4. i. Show the result of inserting 10,14,9,16,8,4,7,3,1,2
CO3 BTL-3 Apply
one at a time into an initially empty binary min heap
and max heap.
ii. Show the result of performing three delete min
operations in the final binary min heap obtained.
6. Write the graph representation for the following graph, CO4 BTL-2 Understand
7. Define hashing? List out the properties of good hash CO4 BTL-1 Remember
function.
8. Differentiate cyclic and acyclic graph. What is meant CO4 BTL-1 Remember
by strongly connected and weakly connected in a
graph?
9. List out various types of graph. List out two CO4 BTL-1 Remember
applications of graph.
10. What is the degree of vertex 4 and 7? CO4 BTL-2 Understand
PART-B
1. Let the size of the hash table be 10.The index of the CO4 BTL – 3 Apply
hash table varies from 0 to 9.Consider the keys
43,24,57,12,10,64,19,82,36,39 in the order. Show how
the keys are occupied. Use chaining method, linear
probing and quadratic probing method to avoid
collisions.
2. Apply BFS and DFS on the below graph and explain CO4 BTL-3 Apply
its algorithm with its routines.
3. Given input {4371, 1323, 6173, 4199, 4344, 9679, CO4 BTL-3 Apply
1989} and a hash function h(x)=x(mod 10), show the
resulting
i. Open hash table
ii. Closed hash table using linear probing
iii. Closed hash table using quadratic probing
4. Explain in detail about graph traversal techniques with CO4 BTL-3 Apply
its routines. Write the BFS algorithm and traverse it
starting from the vertex 1 showing various stages. For
the same graph compute DFS.
5. Outline about the common collision resolution CO4 BTL-4 Analyze
strategies used in closed hashing system.
6. Examine a hash table with 9 slots. The hash function is CO4 BTL-4 Analyze
h(k) = k mod 9. The following keys are inserted in the
order 5, 28, 19, 15, 20, 33, 12, 7, 10. Draw the contents
of the hash table when the collisions are resolved by
i) Chaining ii) Linear Probing iii) Double Hashing.
The second hash function h2(x) = 7 – (x mod 7)
7. Compare and Contrast Breadth First and Depth First CO4 BTL-4 Analyze
traversal of a graph. List the order in which the
nodes of the undirected graph shown below are
visited by a i) Breadth first Traversal that starts from
vertex A and ii) Depth First Traversal that starts
from vertex D.