0% found this document useful (0 votes)
95 views2 pages

Data Structure KCS 301 2022

The document appears to be an exam paper for a data structures course. It contains multiple choice and long answer questions testing knowledge of topics like data structures, algorithms, trees, graphs and their implementations.

Uploaded by

Hariom Jadon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
95 views2 pages

Data Structure KCS 301 2022

The document appears to be an exam paper for a data structures course. It contains multiple choice and long answer questions testing knowledge of topics like data structures, algorithms, trees, graphs and their implementations.

Uploaded by

Hariom Jadon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Printed Page: 1 of 2

Subject Code: KCS301


0Roll No: 0 0 0 0 0 0 0 0 0 0 0 0 0

BTECH
(SEM III) THEORY EXAMINATION 2021-22
DATA STRUCTURE

Time: 3 Hours Total Marks: 100


Note: Attempt all Sections. If you require any missing data, then choose suitably.
SECTION A
1. Attempt all questions in brief. 2X10 = 20
Q No Questions CO
(a) Convert the infix expression (A+B) *(C-D) $E*F to postfix. Give the answer 1
without any spaces.
(b) Rank the following typical bounds in increasing order of growth rate: 2
O(log n), O(n4), O(1), O(n2 log n)
(c) Draw the binary search tree that results from inserting the following numbers in 3
sequence starting with 11: 11, 47, 81, 9, 61, 10, 12,
(d) What does the following recursive function do for a given Linked List with first 4
node as head?
void fun1(struct node* head)
{
if(head == NULL)
return;
fun1(head->next);
printf("%d ", head->data);
}
(e) Define a sparse matrix. Suggest a space efficient representation for space matrices. 5

1
(f) List the advantages of doubly linked list over single linked list. 1

13
0
29

(g) Give example of one each stable and unstable sorting techniques. 2

2.
(h) Write advantages of AVL tree over Binary Search Tree (BST) 3
2_

24
(i) What is tail recursion? Explain with a suitable example. 4
2P

5.
(j) Write different representations of graphs in the memory. 5

.5
P2

SECTION B 17
2. Attempt any three of the following: 10X3 = 30
Q

Q No Questions CO
|1

(a) Write advantages and disadvantages of linked list over arrays. Write a 'C' function 1
creating new linear linked list by selecting alternate elements of a linear linked list.
9
:4

(b) Write algorithms of insertion sort. Implement the same on the following numbers; 2
also calculate its time complexity. 13, 16, 10, 11, 4, 12, 6, 7
28

(c) Differentiate between DFS and BFS. Draw the breadth First Tree for the above 3
:

graph.
13
2
02
-2
ar
M
9-

(d) Differentiate between liner and binary search algorithm. Write a recursive function 4
|2

to implement binary search.


(e) What is the significance of maintaining threads in Binary Search Tree? Write an 5
algorithm to insert a node in thread binary tree.

SECTION C
3. Attempt any one part of the following: 10X1 = 10
Q No Questions CO
(a) Suppose a three dimensional array A is declared using A[1:10, -5:5, -10:5) 1
(i) Find the length of each dimension and the number of elements in A
(ii) Explain Row major order and Column Major Order in detail with explanation
formula expression.

QP22P2_290 | 29-Mar-2022 13:28:49 | 117.55.242.131


Downloaded from : uptukhabar.net
Printed Page: 2 of 2
Subject Code: KCS301
0Roll No: 0 0 0 0 0 0 0 0 0 0 0 0 0

BTECH
(SEM III) THEORY EXAMINATION 2021-22
DATA STRUCTURE

(b) Discuss the representation of polynomial of single variable using linked list. Write 1
'C' functions to add two such polynomials represented by linked list.
4. Attempt any one part of the following: 10 X1 = 10
Q No Questions CO
(a) (i) Use the merge sort algorithm to sort the following elements in ascending order. 2
13, 16, 10, 11, 4, 12, 6, 7.
What is the time and space complexity of merge sort?
(ii) Use quick sort algorithm to sort 15,22,30,10,15,64,1,3,9,2. Is it a stable sorting
algorithm? Justify.
(b) (i) The keys 12, 17, 13, 2, 5, 43, 5 and 15 are inserted into an initially empty hash 2
table of length 15 using open addressing with hash function h(k) = k mod 10 and
linear probing. What is the resultant hash table?
(ii) Differentiae between linear and quadratic probing techniques.
5. Attempt any one part of the following: 10X1 = 10
Q No Questions CO
(a) Use Dijkstra’s algorithm to find the shortest paths from source to all other vertices in 3
the following graph.

1
13
0
29

2.
2_

24
2P

5.
(b) Apply Prim’s algorithm to find a minimum spanning tree in the following weighted 3

.5
graph as shown below.
P2

17
Q

|1
9
:4
: 28
13

6. Attempt any one part of the following: 10X1 = 10


2

Q No Questions CO
02

(a) (i) Write an iterative function to search a key in Binary Search Tree (BST). 4
-2

(ii) Discuss disadvantages of recursion with some suitable example.


(b) (i) What is Recursion? 4
ar

(ii)Write a C program to calculate factorial of number using recursive and non-


M

recursive functions.
9-

7. Attempt any one part of the following: 10X1 = 10


|2

Q No Questions CO
(a) (i) Why does time complexity of search operation in B-Tree is better than Binary 5
Search Tree (BST)?
(ii) Insert the following keys into an initially empty B-tree of order 5
a, g, f, b, k, d, h, m, j, e, s, i, r, x, c, l, n, t, u, p
(iii) What will be the resultant B-Tree after deleting keys j, t and d in sequence?
(b) (i) Design a method for keeping two stacks within a single linear array so that 5
neither stack overflow until all the memory is used.
(ii) Write a C program to reverse a string using stack.

Downloaded fromQP22P2_290 | 29-Mar-2022 13:28:49 | 117.55.242.131


: uptukhabar.net

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy