CS301 Midterm File
CS301 Midterm File
a. 789/+
b. 78/+9
c. /78+9
d. 78/9+
2. Suppose there are 100 elements in an equivalence classes so initially there will be 100
tree.The collection of tree is called_
a. Cluster
b. Class
c. Forest
d. Bunch
3. For a perfect binary tree of height h, having N nodes the sum of height of nodes is
a. N-h-1
b. N-1
c. N-1+h
d. -(h-1)
4. Sorting procedure normally takes ______time
a. N log N
b. 2N
c. N*N*N
d. N
5. there are 100 elements in an equivalence classes then will have
______state initially
a. 50
b. 100
c. 1000
d. 80
6. ________ objects (objects accessed by pointers) are called anonymous objects.
CS301 Midterm Preparation BY PIN2 And MUHAMMAD
(MAS All Rounder)
a. Private
b. Nameless
c. Friend
d. Public
7. ___________ is a self-balancing tree.
a. AVL
b. Binary Tree
d. ALV
8. Which of the following operation returns but do not removes top value of the stack?
a. Push
b. Pop
c. Top
d. First
9. Int htdiff = height(root->getLeft()) __________ height(root->getRight()); The above line
of code is
taken from AVL insert method.
Complete it by selecting an appropriate symbol.
a. -
b. +
c. /
d. *
10. Which operation of the queue data structure is used to insert an element into the
Queue? a. Enqueue()
b. Dequeue()
c. Fornt()
d. Remove()
11. For making binary search tree for strings we need, ________ data type.
a. Char
b. Int
c. Float
d. Double
CS301 Midterm Preparation BY PIN2 And MUHAMMAD
(MAS All Rounder)
12. Local variables defined inside function body are ________ automatically at the end of
function execution.
a. Created
b. Destroyed
c. Incremented
d. Decremented
9. If a node has three fields, then this node will be related to
a. Linked list
a. Heap
b. Stack
c. Queue
d. Linked list
11. Linked list use _______ to store data.
a. Array
b. 2-D Array
c. Variables
d. Linked Memory
12. The lifetime of a transient object cannot exceed that of the application.
a. True
b. False
c. In some cases
a. Dequeue
b. Priority
c. Stack
d. Tree
b. Stack
c. Queue
d. AVL tree
b. Random order
c. Sorted order
b. Forms
CS301 Midterm Preparation BY PIN2 And MUHAMMAD
(MAS All Rounder)
c. Reverses
d. Remains
a. Recursive
b. Non-recursive
c. Cube
d. Log
19. All the objects created using _________ operator have to be explicitly destroyed using
delete operator.
a. New
b. Delete
c. Del
d. Create
20. In the calling function, after the execution of the function called, the program continues
its execution from the _______ after
the function call.
a. Previous line
b. Next line
c. Beginning
b. No null pointer
a. Objects
b. Stack
c. Function
d. Tree
23. Binary search tree violates the condition of AVL tree when any node has balance equal
to a. 2 or -2
b. 1 or -1
c. 0
a. True
b. False
c. In some cases
25. A binary tree whose every node has either zero or two children is called
_________.
d. None of above
26. In internal memory organization of a process, there is some area of memory for
static data that holds _________ variables.
a. Static
b. Global
a. Next pointer of first node and pre pointer of last node are NULL
b. Next pointer of first node and next pointer of last node are NULL
c. Pre pointer of first node and next pointer of last node are NULL
d. Pre pointer of first node and pre pointer of last node are NULL
c. We first apply right rotation and then left rotation to make it AVL tree.
d. We first apply left rotation and then right rotation to make it AVL tree.
31. Whenever we call a function, the complier makes a stack, the top element of the
stack is _____ of the function.
a. First argument
b. Return address
CS301 Midterm Preparation BY PIN2 And MUHAMMAD
(MAS All Rounder)
c. Last argument
32. Suppose a stack class has been defined using template. Now, we want to declare a Stack
object of an int type. What will be the correct syntax?
a. <int>Stack stack;
b. Stack<int> stack;
33. In node class one field is an integer data and other field will be
_______
a. Pointer to class
b. Pointer to node
c. Pointer to integer
a. 10
b. 20
c. 30
d. 40
a. Constructor
b. Destructor
c. Switch case
a. Stack
b. Queue
c. Heap
a. 2
b. 4
c. 6
d. 8
b. Different type
c. Same type
a. Physical
b. Logical
c. Simulation
d. Conceptual
42. In level-order traversal for binary search tree, we visit the nodes at each level before
proceeding to the next level, in a __________ order.
a. Right-to-left
b. Left-to-right
c. Top-to-bottom
d. Bottom-to-top
43. The balance of a node in a binary tree is defined as the height of its ________ sub
tree minus height of its right sub tree.
a. Right
b. Left
c. Upper
d. Lower
44. Allocating and de-allocating memory for linked list nodes does take _______ time
than pre-allocated array.
a. Less
b. More
c. Equal
CS301 Midterm Preparation BY PIN2 And MUHAMMAD
(MAS All Rounder)
d. No
45. Consider we have performed the following operations on a stack of size 5. Push(10);
Push(20);
Push(30);
Pop();
Pop();
Pop();
Push(40);
Push(50);
Pop();
After the completion of all operation, the top element in stack is _______.
a. 10
b. 20
c. 40
d. 50
46. Each operator in a postfix expression refers to the previous _______ operand(s).
a. One
b. Two
c. Three
d. Four
47. In doubly linked list a node consists of three parts:
c. 3 objects
d. 3 pointers
CS301 Midterm Preparation BY PIN2 And MUHAMMAD
(MAS All Rounder)
48. For reference variables, ________ sign is used.
a. Ampersand
b. Asterisk
c. Sigma
d. Dollar
a. Stack
b. List
c. Queue
a. One
b. Two
c. Three
d. Four
51. Which of the following statement is correct for the variable “current- -“?
a. Current = current + 1
b. Current = current - 1
c. Current = current - 2
d. Current – 1 = current
52. When an executable program runs, it is loaded in the computer memory and
becomes a _______.
a. Thread
b. .h file
CS301 Midterm Preparation BY PIN2 And MUHAMMAD
(MAS All Rounder)
c. Process
c. Moves the “current” pointer to one step after the first element of
the array
d. Moves the “current” pointer to one step before the first element
of the array
54. a * (b + c) – d is an example of _______ expression.
a. Infix
b. Prefix
c. Postfix
d. Alfix
a. int &x;
b. int *x;
c. int x;
a. This
b. New
c. Increment
d. Decrement
CS301 Midterm Preparation BY PIN2 And MUHAMMAD
(MAS All Rounder)
57. Get(?) method of list class is used to:
a. C program file
b. .h file
c. .cpp file
d. Library
59. There are ____ cases for deleting a node from binary search tree.
a. 1
b. 2
c. 3
d. 4
61. Suppose we have been given the following data set for a queue:
37524
What will be the resultant queue if we call a front() method?
a. 7524
b. 37524
CS301 Midterm Preparation BY PIN2 And MUHAMMAD
(MAS All Rounder)
c. 75243
d. 524
62. Suppose we have been given the following data set for a queue:
7524
a. 7524
b. 37524
c. 75243
d. 5243
63. Maximum time that an insertion operation can take in AVL tree is _______. Here log
stands for log to the base of 2.
a. Log (n)
d. Log (n+1)
64. _______ is when function is calling to itself.
a. Loop
b. Recursion
c. Iteration
d. Nested loop
65. Left, right, info, and parent are the operations of ________ data structure.
a. Stack
b. Tree
c. Queue
d. Linked list
CS301 Midterm Preparation BY PIN2 And MUHAMMAD
(MAS All Rounder)
66. Following is a keyword of C++
a. Del
b. Delete
c. Remove
d. Eliminate
a. Prefix expression
b. Infix expression
c. Postfix expression
d. Hybrid expression
b. Within no time
69. Each node in a singly linked list contains two fields, one field called data field while
other field contains:
a. Pointer to an integer
b. Pointer to character
d. Pointer to class
70. Each node in singly linked list contains _______
CS301 Midterm Preparation BY PIN2 And MUHAMMAD
(MAS All Rounder)
a. One pointer
b. Two pointers
c. No pointer
d. NULL pointer
a. True
b. False
b. Binary Tree
d. AVL Tree
75. What are the basic things associated with data structures?
c. Programming effort
76. In AVL tree insertion occurs on the inside in case ____ and 3 which a single rotation
cannot fix.
a. 1
b. 2
c. 4
d. 5
77. add(12) method of linked list class will
a. Stack
b. Queue
c. Tree
d. Linked list
79. Which data structure allows deleting data elements from front anf inserting at
rear?
a. Stacks
CS301 Midterm Preparation BY PIN2 And MUHAMMAD
(MAS All Rounder)
b. Queues
c. Deques
a. Contiguous
b. Random
b. Postfix
c. Prefix
b. Moves the "Current" pointer to two steps after the last element of the array
d. Moves the "Current" pointer to two steps before the last element
of the array
84. _________tree has been named after two persons Adelson Velskii and Landis.
CS301 Midterm Preparation BY PIN2 And MUHAMMAD
(MAS All Rounder)
a. Binary
b. Black
c. AVL
d. VLA
a. ELV
b. EVL
c. AVL
d. ALV
a. !
b. @
c. #
d. &
87. A _______ is a tree in which every level, except possibly the last, is completely
filled, and all nodes are as far left as possible. a. Strict binary tree
b. Full binary tree
a. Level
b. Length
c. Depth
d. Node level
a. Bottom
b. Middle
c. Center
d. Top
91. Length() method of list class is used to:
92. The function calls are made with the help of ________.
a. Stack
b. Heap
c. Dynamic memory
d. External memory
93. An efficient program execute faster and helps in _____ the usage of resources like
memory and disk
a. Maximizing
b. Minimizing
CS301 Midterm Preparation BY PIN2 And MUHAMMAD
(MAS All Rounder)
c. Equalizing
a. Function
b. Template
c. Structure
d. Stack
95. "set()" method of list class is used to:
a. .cpp
b. .cppp
c. .h
d. .hh
97. Every _____ tree is a binary search tree.
a. AVL
b. binary
c. big
d. small
98. If both left and right nodes of a node are NULL then this type of node is called
____ node.
a. Non leaf
CS301 Midterm Preparation BY PIN2 And MUHAMMAD
(MAS All Rounder)
b. internal
c. inner
d. leaf
99. Which of the following function don’t belongs to the stack class?
a. push()
b. pop()
c. crash()
d. top()
100. For a complete binary tree, the depth is calculated as____ a. log2(number of
nodes+1)-1
b. log2(number of nodes*1)+1
c. log2(number of nodes-1)-1
d. log2(number of nodes-1)+1
101. ___ only removes items in reverse order as they were entered
a. Queue
b. Stack
c. Both of these
d. None of these
102. What will be the postfix expression of following infix
expression? D+E*F/G a. DE*F/G
b. DE+F*G/
c. DEF*/+
d. DE+FG*/
103. The ______ of a node in a binary tree is defined as the height of its ________ sub
tree minus height of its right sub tree.
a. Height
CS301 Midterm Preparation BY PIN2 And MUHAMMAD
(MAS All Rounder)
b. Balance
c. Width
d. None
104. The back() method decreases the value of Variable current
by____
a. Four
b. Three
c. Two
d. One
a. One
b. Two
c. Three
d. Four
b. Stack
c. Heap
d. Linked list
109. Which one of the following method does not change the original value of the
argument in the calling function?
a. Quality
b. Time
c. Correctness
111. While implementing stack with an array and to achieve LIFO behavior, we used push
and pop elements at ______. a. The start of the array
a. Specific
b. Definite
CS301 Midterm Preparation BY PIN2 And MUHAMMAD
(MAS All Rounder)
c. Generic
113. In the linked list implementation of the stack class, where does the push member
function places the new entry on the linked list?
a. After all other entries that are greater than the new entry
b. At the head
c. After all other entries that are smaller than the new entry
d. At the tail
114. The next field in the last node in a singly-linked list is set to
________. a. 0
b. 1
c. NULL
d. False
115. Consider the linked list having data [6, 72, 35, 65,25] stored in it. While current pointer
is pointing memory location having 72 stored in it. After calling remove() function on the following
linked list current point will point to memory location having value?
a. 6
b. 35
c. 65
d. 25
116. If we write functions for recursive and non recursive inorder traversal method of BST,
what will be the difference between its
functions prototypes?
a. One
b. Two
c. Three
d. Four
118. Doubly linked list always has ______ NULL pointers in a node.
a. One
b. Two
c. Three
d. Four
a. Linear
b. Nonlinear
c. Balanced
d. Un sorted
120. Linked list is generally considered an example of _______ type of memory location. a.
Static
b. Compile time
c. Dynamic
a. Linked list
b. Stack
c. AVL
d. Queue
123. copy() method of list data structure _________ a. copy first item of list
d. Leaf, simplest
a. Stack
b. Queue
c. Both of these
d. None of these
126. NULL is an invalid address and ________. a. Accessible
b. Inaccessible
d. Points to the last point of the list 127. A stack carries _______ behavior.
a. FIFO
b. LIFO
CS301 Midterm Preparation BY PIN2 And MUHAMMAD
(MAS All Rounder)
c. AVCO
d. FEFO
d. None of given
130. The lifetime of a transient object can exceed that of application which is accessing it.
a. True
b. False
c. In some cases
b. 14
c. 15
d. 16
132. The smallest value element in a binary search tree(Each node with left and right
pointer) lies at
a. Root Node
b. 10 million
c. 5 million
d. 2 million
135. Which one is the correct function call for the following function of calculatincube?
int cube(int&num)
{
.
.
.
a. Cube(&num)
b. Cube(&&num)
c. Cube(*num)
d. Cube(num)
136. Which of the following is the correct option for priority Queue?
a. The type of Queue that is not FIFO i.e the person who comes first
may not leave first
b. The type of Queue that is not FIFO i.e the person who comes first
should leave first
c. The type of Queue that is not FIFO i.e the person who comes first
should leave first
d. The type of Queue that is not FIFO i.e the person who comes first
may not leave first
137. For String-based Binary Search Tree, We use ASCII values of characters for comparing
among letters. This method is known as
___
a. Lexicographic order
c. Asymmetric technique
CS301 Midterm Preparation BY PIN2 And MUHAMMAD
(MAS All Rounder)
d. heap-based approach
138. Elements in a queue data structure are added from___ and remove from___ .
a. Rear end. front end
c. Front end
d. rear end
139. If numbers 5,222,4,48 are inserted in a queue. Which one will be remove first? a. 48
b. 4
c. 222
d. 5
140. A zigzag rotation is performed. In Left-Left case of rotation in
AVL tree. a. True
b. False
c. In some cases
141. During deletion of node from BST. if we found this node don't have in- order successor and
predecessor. it means this node is____
a. Left Most node in the binary search tree
c. Root node
a. right to left
b. Cascading
c. Associative
a. 3
b. 4
CS301 Midterm Preparation BY PIN2 And MUHAMMAD
(MAS All Rounder)
c. 5
d. 10
c. Insertion of data
d. Security of data
145. y = &x[0];
In the above statement, we get the address of the fist location of the array x and store
it in y. Here “y” is:
a. rvalue
b. xvalue
c. lvalue
d. zvalue
146. what will be postfix expression of the following infix expression? Infix expression
a+b*c-d
a. ab+c*d-
b. abc*+d-
c. abcd+*-
d. abc+*d-
147. Which of the following is the correct conversion of infix to postfix expression? Z+B-(D-H)/K
a. ZB+D-H-K/
b. ZB+DH-K-/
c. ZB+DH-K/-
d. ZB+DHK--/
148. Leaf node of binary search tree contains _________. a. One null pointer
c. Height
b. Reference
c. Pointer
c. AVL
d. Perfect
155. For every Process execute the last part of the Memory is for__________of the Program
a. Data
CS301 Midterm Preparation BY PIN2 And MUHAMMAD
(MAS All Rounder)
b. Code
c. Stack
d. Heap
156. While implement non recursive traversal for binary search tree we need to
implement________
a. Que
b. Stack
c. Min heap
d. Max Heap
157. Suppose we have the following values to be inserted in
constructing AVL tree,
20,23,25,10, 12,13
Tell when first rotation will take place.
a. Left, right
b. Right, left
c. Down, up
d. Up, down
160. Circular Linked List Solve the problem of___pointer/method of the doubly link list.
a. Remove
b. Null
c. Add
d. Find
161. isEmpty() method of stack class will return true when.
a. Stack is full
CS301 Midterm Preparation BY PIN2 And MUHAMMAD
(MAS All Rounder)
b. Stack is Partially
c. Stack is not empty or Null
d. Stack is empty
162. “New int[11]” will allocate memory for___integers.
a. 13
b. 12
c. 11
d. 10
163. For searching a particular number in Binary Search Tree (if it is not present), the
maximum number of comparisons will be ________ comparison at each level.
a) 1
b) 2
c) 3
d) 4
164. In singly linked list which node will keep track of starting position of the list.
a) Next Node
b) Previous Node
c) Head Node
d) Last Node
165. If we singly linked list to implement list, then there is an issue that it gives difficulty when
we:
a) A BST has two children per node whereas a BT can have none, one or two children per
node
b) In BST nodes are inserted based on the values they contain
c) In BT nodes are inserted based on the values they contain
d) There is no difference
169. The main use of AVL tree is:
a) Searching of data
b) Storing of data
c) Insertion of data
d) Security of data
e) The expression
170. if (! heap ->isEmpty() ) checks
a) Heap is empty
b) Heap is full
c) Heap is not empty
d) Not a valid expression
171. A solution is said to be efficient if it solves the problem
within its resource constraints i.e. hardware and time.
a) True
b) False
172. A queue where the dequeue operation does not depend upon FIFO, is called:
a) enqueue
b) simple queue
c) stack
d) priority queue
173. In simple or singly linked list there is/are ________ pointer/s in each node.
a) One
b) Two
c) Three
d) Four
174. Which one of the following statement is correct?
a) Array size is fixed once it is created
b) Link List size is fixed once it is created
c) Binary Search Tree size is fixed once it is created
d) AVL Tree size is fixed once it is created
175. Which of the is NOT true regarding the maze generation?
a) Randomly remove walls until the entrance and exit cells are in same set.
b) Removing a wall is the same as doing a union operation
c) Remove a randomly chosen wall if the cells it separates are alreadly in same set
d) Do not remove a randomly chosen wall if the cells it separates are alreadly in same set.
176. If Ahmad is cousin of Ali and Ali is cousin of Asad then Ahmad is also cousin of Asad. This
statement has the following property
a) Reflexivity
b) Symmetry
c) Transitivity
All of the given
a) Arrays
b) Linked Lists
c) Binary Search Trees
d) Stack
179. Recursive call of a function use ________ data structure.
a) Linked List
b) Queue
c) Stack
d) Table
180. The ________ of a node in a binary tree is defined as the height of its left subtree minus
height of its right subtree.
a) Height
b) Balance
c) Width
d) None of the above
181. Which operation of queue data structure is used to get front element from the queue and
then remove it from the queue?
a) enqueue()
b) dequeue()
c) front()
d) remove()
182. Suppose we have been given the following data set for a Queue.
7524
b) 7524
c) 75243
d) 5243
183. In C++, we place the class interface in ________ file. a) .cpp
b) .cppp
c) .h
d) .hh
184. The array in binary search is sub divided ________.
a) Once
b) Twice
c) N time
d) Untill a sublist is no more divisible
185. If unions are done by weight (size), the depth of any element is never greater than
a) log 3n
b) log2 n
c) n log2 n
d) log n*n
186. ________ in AVL is logarithmic.
a) Updating
b) Searching
c) Deletion
d) Insertion
187. What is the depth of any tree if the union operation is performed by height?
a) O(N)
b) O(N log N)
c) O(log N)
d) O(M log N)
188. Avl tree takes maximum ________ time to search an element.
a) 1.44 Log2n
b) Log2(n+n)
c) Log2(n+1)+1
d) 1.88 Log2n
189. Which of the following is correct about AVL Tree?
a) It is identical to BST except height of the left and right subtrees can differ by at least 1.
b) It is identical to BST except height of the left and right subtrees must differ by at least 1.
c) It is not identical to BST, it is totally different kind of tree. It is identical to BST except height of
the left and right subtrees can differ by at most 1.
190. "new int[11]" will allocate memory for ________ integers.
a) 10
b) 11
c) 12
d) 13
191. The ________ method of list data structure removes the element residing at the
current position
a) Add
b) Next
c) Remove
d) Find
192. While implementing non-recusive traversal for Binary SearchTree, we need to
implement ________ .
a) Queue
b) Stack
c) Min heap
d) Max heap
193. Doubly Linked List always has ________ NULL pointer/s in a node.
a) One
b) Two
c) Three
d) Four
194. For a perfect binary tree of height h, having N nodes, the sum of hights of nodes ia
________.
a) N-h-1
b) N-1
c) N-1+h
d) N - (h - 1)
195. If there are N elements in an array then the number of maximum steps needed to find
an element using Binary Search is ___________.
a) N
b) N2
c) Nlog2N
d) log2N
196. Here is a small function definition:
void f(int i, int &k)
{ i = 1;
k = 2; }
Suppose that a main program has two integer variables x and y, which are given the value 0. Then the
main program calls f(x,y); What are the values of x and y after the function f finishes?
a) ab+c*d-
b) abc*+d-
c) abcd+*-
d) abc+*d-
199. What is the hash function used in linear probing?
a) hi(x)=hash(x) mod table size
b) hi(x)=(hash(x) + f(i^2)) mod table size
c) hi(x)= (hash(x)+ f(i)) mod table size
d) hi(x)= X mod 17
200. Each operator in a postfix expression refers to the previous
________ operand(s)
a) One
b) Two
c) Three
d) Four
201. In the statement int& a=b;
a) a and b pointing to two different memory location
b) a and b are two different names of the same memory location
c) a and b are two different variable names b hold the address of variable a
202. In 1990, Bill pugh proposed an enhancement on linked lists and the new data structure
was termed as
a) Linked list
b) B-Tree
c) Skip list
d) Spelling checker
203. Which of the following statement is NOT correct regarding Table ADT?
a) In a table, the type of information in columns may be different.
b) A table consists of deveral columns known as entities
c) The row of a table is called a record
d) A major use of table is in databases where we build and use tables for keeping information
204. A binary tree of N nodes has _____________ .
a) Log10 N levels
b) Log2 N levels
c) N / 2 levels
d) N x 2 levels
205. If the height of a perfect binary tree is 4. What will be the total number of nodes in it?
a) 15
b) 16
c) 31
d) 32
206. Which property of equivalence relation is satisfied if we say:
Ahmad R(is related to) Ahmad
a) Reflexivity
b) Symmetry
c) Transitivity
d) All of the given
207. If ahmad is boss of ehsan and ehsan is boss of umer then ahmad is also boss of umer.
The above mentioned relation is ________.
a) Reflexive
b) Symmetry
c) Transitive
d) None of the given
208. Which of the following statement is false?
a) Arrays are dense lists and static data structure
b) data elements in linked list need not be stored in adjecent space in memory
c) pointers store the next data element of a list
d) linked lists are collection of the nodes that contain information part and next pointer
209. Binary search algorithm cannot be applied to ________ .
a) 0
b) 4
c) 8
d) 16
211. In singly linked list a node consists of two parts:
a) Integer
b) Double
c) Float
d) Char
213. In a tree, we link the nodes in such a way that it ________ a linear structure.
a) Count++
b) Count—
c) ++count
d) –count
224. A template is a Function or Class that is Written a___data type.
a) Generic
b) None of These
c) Define
d) Specific
225. Trying to remove an element from an empty Stack is called____
a) Garbage Collection
b) Overflow stack
c) Empty collection
d) Underflow of Stack
226. Stack and Queue can be implemented using___
a) Binary Tree
b) Singly Linked List
c) AVL Tree
d) Binary Search Tree
227. A software solution is said to be efficient if it solves the problem.
a) With its resource constraints
b) With No Time
c) By Consuming more hardware resources.
d) By Using some extra resources.
228. we cannot remove items randomly from___
a) Stack
b) Queue
c) Stack and Queue
d) List
229. Stack push(15) will push 15 on___
a) Top of the Stack
b) Anywhere of the Stack
c) Middle of the Stack
d) Bottom of the Stack
230. Which of the following is the correct conservation from infix to postfix expression
A*B+C/(E-F).
a) ABC*+EF-/
b) AB*CFE-/*
c) AB*C+EF/*
d) AB+C*E-F/
231. Convert the Given infix from 12+60-23 of expression in postfix form.
a) 12+60 23-
b) 12 60+ -23
c) -12 60 -23
d) None
232. Y=&x[0];
In the above statement, we get the address of the Locatio of the array x and store it in y. Here
“Y” is;
a) Xvalue
b) Zvalue
c) Ivalue
d) Nvalue
233. Last Node in Circular Linked list Contains.
a) Maximum Two points
b) No Null Pointer
c) Atleast one Null pointer
d) None
234. Consider the linked list having data [6, 72, 35, 65,25] stored in it. While current pointer
is pointing memory location having 72 stored in it. After calling add(4) function on the
following linked list current point will point to memory location having value?
a) 36
b) 4
c) 72
d) 25
235. there is no such Node whose next filed is NULL which one of the given option support
the statement
a) Linked List
b) Circular Link list
c) Array
d) Queue
236. Generally there is/are _________ case(s) to delete a node from BST.
a) 1
b) 2
c) 3
d) 4
237. . Which of the following is TRUE about recursive calls
a) There is no terminating condition in recursive calls
b) 16
c) 14
d) 17
e) 15
239. From Operating System point of view, the recursive function calls are made with the
help of __________.
a) Binary Search Tree
b) Stack
c) Query
d) Linked List
240. Analyze the given code carefully and identify which type of binary tree traversal this is;
Void traversal ( treeNode*treeNode)
{ if(treeNode !=Null)
a) Inorder
b) Preorder
c) Postorder
d) Sorted Order
241. Which of the following is correct syntax to declare a const function?
• Const int& findMin();
• Int& FindMinconst();
• Int& findMin() const;
a) ROOT
b) LEFT
c) RIGT
d) LEAF
243. If we delete node 2 from the given BST then which node will replace it?
• 1
• 2
• 3
• 4
244. The structure of tree with _________ data is like a linked list.
• Sorted
• Small Large
• Unsorted
245. We can make a lexicographic order of characters based on their _____________.
RANDOM choice
• ASCII values
• Binary DIGITS
• Memory Address
246. The _______of every node should be 1, 0 or -1 otherwise, it will not be an AVL tree.
• Length
• Balance
• Width
• Size
• 15 25 35 45 75
• 25 15 35 45 75
• 75 35 25 15 45
248. The __________ sign before the name of the variable means that the address of the
variable is beingpassed :
• ||
• ::
• &
• #
249. What will be the return type of the findMin method in the statement given
below?int& findMin( ) const;
• Integers Variable
• Integer Refrence
• Constant Integer
• Integer Pointer
250. Which of the following data structure is/are linear type?
• AVL Tree
• Graphs
• Binary Search Tree
• Heap and Stack
251. Whenever a node is deleted from a binary search tree, _____________ has to be
maintained.
• In Order Traversal
• Any Traversal can be maintained
• Post order Traversal
• Pre order Traversal
252. In the perspective of memory organization each process is divided into _______
sections.
• 2
• 5
• 4
• 3
256. At a particular node, the difference in heights of its left and right subtree gives the
_________ of thenode
• Right Subtree
• Balance
• Left Subtree
• Height
257. If we return the reference of a local variable from a function it will cause :
• Refrence Overloading
• Duplication of local variables
• Deletion of local variables from memory
• Dangling refrence
258. We can calculate the ___________ of a subtree by counting its levels from the
bottom.
• Height
• Data Items
• Nodes
• Balance
259. In a strictly complete binary tree the number of _ at any level k will be 2k .
• Link
• Nodes
• Children
• Sets
260. In Preorder traversal of a binary tree the second step is
____________
• Traverse the right subtree
• Traverse the root
• Traverse the leaf nodes
• Traverse the left subtree
261. Level-order traversal for Binary Search Tree can be implemented, ___
262. The _____ symbol is used when we want to get the value of a variable using pointer.
• *
• ||
• #
• ::
263. After deletion of a node from a binary search tree _______ traversal method should
be maintained.
• Inorder
• Post order
• Level Order
• Preorder
264. We can use Binary Search Tree with _________________
• Integer Data only
• String Data Only
• Both
• Non-Integer Data Inly
265. In which traversal method root node is visited at last step
• Postorder
• Level order
• Inorder
• Preorder
266. If a function has recursive call as the last statement, it is known as __________.
• Function recursion
• Tail recursion
• Last recursion
• Local Recursion
267. The process of getting the value of a variable using pointers is called:
• Dereferencing
• Refrencing Memory Deallocation
• Memory allocation
268. parameter passing (by value or by reference) is similar to PASCAL.
• C++
• COBOL
• JAVA
• FORTRAN
269. Which one of the following case is the most complicated case to delete a node from
BST?
• Node to be deleted has both the left and right children
• Node to be deleted has both the left children
• NONE
c. call stack
d. Linked List
27. All the variables or objects created in a function that we want to access later are created on
memory heap, sometimes called?
a. Memory bank
b. Heap store
c. Stack
d. free store
28. Heap is an area in computer memory that is allocated ____________________. a. Statically
b. Manually
c. Dynamically
d. Randomly
29. All the objects created using new operator have to be explicitly destroyed using the _________.
a. delete operator
b. kill operator
c. remove operator
d. clear operator
30. Nameless objects (objects accessed by pointers) are called _______________.
a. Free object
b. Pointer object
c. anonymous objects
d. none of given
31. A linear list of elements in which deletion can be done from one end (front) and insertion can
take place only at the other end (rear) is known as a ? a) Queue
b) Stack
c) Tree
d) Linked list
32. Which one of the following is an application of Queue Data Structure?
(A) When a resource is shared among multiple consumers.
(B) When data is transferred asynchronously (data not necessarily received at same rate as sent)
between two processes (C) Load Balancing
CS301 Midterm Preparation BY PIN2 And MUHAMMAD
(MAS All Rounder)
CS301 Midterm Preparation BY PIN2 And MUHAMMAD
(MAS All Rounder)
(D) All of the above
33. The data structure required for Breadth First Traversal on a graph is? a) Stack
b) Array
c) Queue
d) Tree
34. A queue follows __________
a) FIFO (First In First Out) principle
b) LIFO (Last In First Out) principle
c) Ordered array
d) Linear tree
35. Circular Queue is also known as ________
a) Ring Buffer
b) Square Buffer
c) Rectangle Buffer
d) Curve Buffer
36. If the elements “A”, “B”, “C” and “D” are placed in a queue and are deleted one at a time, in
what order will they be removed? a) ABCD
b) DCBA
c) DCAB
d) ABDC
37. A data structure in which elements can be inserted or deleted at/from both the ends but not in
the middle is? a) Queue
b) Circular queue
c) Dequeue
d) Priority queue
38. A normal queue, if implemented using an array of size MAX_SIZE, gets full when
a) Rear = MAX_SIZE – 1
b) Front = (rear + 1)mod MAX_SIZE
c) Front = rear + 1
d) Rear = front
39. Queues serve major role in ______________
a) Simulation of recursion
b) Simulation of arbitrary linked list
c) Simulation of limited resource allocation
d) Simulation of heap sort
40. Which of the following is not the type of queue?
a) Ordinary queue
b) Single ended queue
c) Circular queue
d) Priority queue
41. How many stacks are needed to implement a queue? Consider the situation where no other
data structure like arrays, linked list is available to you.
(A) 1
(B) 2
CS301 Midterm Preparation BY PIN2 And MUHAMMAD
(MAS All Rounder)
CS301 Midterm Preparation BY PIN2 And MUHAMMAD
(MAS All Rounder)
(C) 3
(D) 4
42. Choose correct output for the following sequence of operations.
push(5) push(8)
pop push(2)
push(5) pop pop
pop push(1) pop
a) 85251
b) 85521
c) 82551
d) 81255
43. Stack can be implemented using ___________ and ______________?
a. Array & Binary Tree
b. Linked List & Graph
c. Array & Linked list
d. Queue & linked list
44. Postfix form of following expression.
a. EF*D+
b. DEF*+
c. DEF+*
d. EFD*+
45. When function calls another function then the details of previous function are stored in Stack?
a. True
b. False
63. We can say that in a complete binary tree at a particular level k, the number of nodes is equal to
_________?
a. 2K
b. 2*2k
c. 2logk
d. 2k
64. Which of the following is not an operation on binary tree?
a. right(p) returns pointer to right sub tree
b. parent(p) returns the father of p
c. brother(p) returns brother of p.
d. all of the given
65. A complete binary tree is necessarily a strictly binary tree but not vice versa. a. True
b. False
66. Binary tree is useful structure when two-way decisions are made at each point. a. True
b. False
70. What is the possible number of binary trees that can be created with 3 nodes, giving the
sequence N, M, L when traversed in post-order. a) 15
b) 3
c) 5
d) 8
71. Which of the following pair’s traversals on a binary tree can build the tree uniquely?
a) post-order and pre-order
b) post-order and in-order
c) post-order and level order
d) level order and preorder
72. To obtain a prefix expression, which of the tree traversals is used?
a) Level-order traversal
b) Pre-order traversal
c) Post-order traversal
d) In-order traversal
73. Which one is a self- referential data type?
a. Stack
b. Queue
c. Link list
d. All of these
74. Each node in doubly link list has,
a. 1 pointer
b. 2 pointers (Page 39)
c. 3 pointers
d. 4 pointers
75. I have implemented the queue with a linked list, keeping track of a front pointer and a rear
pointer. Which of these pointers will change during an insertion into an EMPTY queue?
a. Neither changes
b. Only front pointer changes.
c. Only rear pointer changes.
d. Both change.
76. The nodes with no successor are called _________
a. Root Nodes
b. Leaf Nodes
c. Both of these
d. None of these
CS301 Midterm Preparation BY PIN2 And MUHAMMAD
(MAS All Rounder)
CS301 Midterm Preparation BY PIN2 And MUHAMMAD
(MAS All Rounder)
77. Doubly Linked List always has one NULL pointer.
a. True
b. False (Page 43)
78. In which of the traversal method, the recursive calls can be used to traverse a binary tree ?
a) p
b) log(p)
c) log(p)/2
d) p⁄2
80. A tree is an AVL tree if
a. 7 8 9 10 11 12
b. 9 8 11 10 7 12
c. 9 10 8 11 12 7
d. 9 10 8 12 7 11
82. Which one of the following operators has higher priority than all of others?
a. Multiplication operator
b. Minus operator
c. Plus operator
d. Exponentiation operator
83. Which of the following is "TRUE" about arrays,
a. We can increase the size of arrays after their creation.
b. We can decrease the size of arrays after their creation.
c. We can increase but can't decrease the size of arrays after their creation.
d. We can neither increase nor decrease the array size after their creation.
84. Next item in a linked list is known as
CS301 Midterm Preparation BY PIN2 And MUHAMMAD
(MAS All Rounder)
CS301 Midterm Preparation BY PIN2 And MUHAMMAD
(MAS All Rounder)
a. Index
b. Item
c. Node
d. Child
85. Each operator in a postfix expression refers to the previous ________ operand(s). a.
One
b. Two
c. Three
d. Four
86. We access elements in AVL Tree in,
a. Linear way only
d. computer networks
89. Huffman code is method for the compression of standard text documents. a. True
b. False
90. _________ is a data structure that can grow easily dynamically at run time without
having to copy existing elements.
a. Array
b. List
c. Both of these
d. None of these
91. “+” is a _________operator.
a. Unary
b. Binary
c. Ternary
c. Queue
d. Linked List
93. We can make a lexicographic order of characters based on their ASCII values.
a. True
b. False
94. A queue is a ________data structure, whereas a stack is a ________data structure. a.
FIFO, LIFO
b. LIFO,FIFO
c. none of these
d. both of these
95. Searching an element in an AVL tree take maximum _______ time (where n is no. of
nodes in
AVL tree),
a. Log2(n+1)
b. Log2(n+1) -1
c. 1.44 Log2n
d. 1.66 Log2n
96. Consider the following infix expression.
5 + 6/2
If one converts the above expression into postfix, what would be the resultant expression? a)
56/ + 2
b) 5 6 2 / + not confirmed
c) 5 6 / 2 +
d) /62 + 5
97. Which of the following is a nonlinear data structure?
a. Linked List
b. Stack
c. Queue
d. Tree
98. In an AVL tree to delete a parent with two childs in a straight line following rotations will be
required:-
a. Single
b. 2
c. 3
d. 4
100. When an operator is used in between two operands this is which type of notation a.
Prefix
b. Postfix
c. Infix
d. None of the Above