Data Structure KCS 301 2022
Data Structure KCS 301 2022
BTECH
(SEM III) THEORY EXAMINATION 2021-22
DATA STRUCTURE
1
(f) List the advantages of doubly linked list over single linked list. 1
13
0
29
(g) Give example of one each stable and unstable sorting techniques. 2
2.
(h) Write advantages of AVL tree over Binary Search Tree (BST) 3
2_
24
(i) What is tail recursion? Explain with a suitable example. 4
2P
5.
(j) Write different representations of graphs in the memory. 5
.5
P2
SECTION B 17
2. Attempt any three of the following: 10X3 = 30
Q
Q No Questions CO
|1
(a) Write advantages and disadvantages of linked list over arrays. Write a 'C' function 1
creating new linear linked list by selecting alternate elements of a linear linked list.
9
:4
(b) Write algorithms of insertion sort. Implement the same on the following numbers; 2
also calculate its time complexity. 13, 16, 10, 11, 4, 12, 6, 7
28
(c) Differentiate between DFS and BFS. Draw the breadth First Tree for the above 3
:
graph.
13
2
02
-2
ar
M
9-
(d) Differentiate between liner and binary search algorithm. Write a recursive function 4
|2
SECTION C
3. Attempt any one part of the following: 10X1 = 10
Q No Questions CO
(a) Suppose a three dimensional array A is declared using A[1:10, -5:5, -10:5) 1
(i) Find the length of each dimension and the number of elements in A
(ii) Explain Row major order and Column Major Order in detail with explanation
formula expression.
BTECH
(SEM III) THEORY EXAMINATION 2021-22
DATA STRUCTURE
(b) Discuss the representation of polynomial of single variable using linked list. Write 1
'C' functions to add two such polynomials represented by linked list.
4. Attempt any one part of the following: 10 X1 = 10
Q No Questions CO
(a) (i) Use the merge sort algorithm to sort the following elements in ascending order. 2
13, 16, 10, 11, 4, 12, 6, 7.
What is the time and space complexity of merge sort?
(ii) Use quick sort algorithm to sort 15,22,30,10,15,64,1,3,9,2. Is it a stable sorting
algorithm? Justify.
(b) (i) The keys 12, 17, 13, 2, 5, 43, 5 and 15 are inserted into an initially empty hash 2
table of length 15 using open addressing with hash function h(k) = k mod 10 and
linear probing. What is the resultant hash table?
(ii) Differentiae between linear and quadratic probing techniques.
5. Attempt any one part of the following: 10X1 = 10
Q No Questions CO
(a) Use Dijkstra’s algorithm to find the shortest paths from source to all other vertices in 3
the following graph.
1
13
0
29
2.
2_
24
2P
5.
(b) Apply Prim’s algorithm to find a minimum spanning tree in the following weighted 3
.5
graph as shown below.
P2
17
Q
|1
9
:4
: 28
13
Q No Questions CO
02
(a) (i) Write an iterative function to search a key in Binary Search Tree (BST). 4
-2
recursive functions.
9-
Q No Questions CO
(a) (i) Why does time complexity of search operation in B-Tree is better than Binary 5
Search Tree (BST)?
(ii) Insert the following keys into an initially empty B-tree of order 5
a, g, f, b, k, d, h, m, j, e, s, i, r, x, c, l, n, t, u, p
(iii) What will be the resultant B-Tree after deleting keys j, t and d in sequence?
(b) (i) Design a method for keeping two stacks within a single linear array so that 5
neither stack overflow until all the memory is used.
(ii) Write a C program to reverse a string using stack.