2005 Academic Challenge
|
|
- Franklin Bond
- 6 years ago
- Views:
Transcription
1 2005 Academic Challenge COMPUTER SCIENCE TEST - SECTIONAL Computer Science Test Production Team Sanjay Madria, University of Missouri at Rolla Author/Team Coordinator S. R. Subramanya, University of Missouri at Rolla Author Scott Elliott, John A. Logan College Reviewer Don Wayman, WYSE Coordinator of Test Production GENERAL DIRECTIONS Please read the following instructions carefully. This is a timed test; any instructions from the test supervisor should be followed promptly. The test supervisor will give instructions for filling in any necessary information on the answer sheet. Some Academic Challenge test sites may use answer sheets that require you to fill in the letter of the answer you choose on the blank line after each question number. Others will ask you to indicate your answer to each question by marking an oval that corresponds to the correct answer for that question. Only one oval should be marked to answer each question. Multiple ovals will automatically be graded as an incorrect answer. Be sure ovals are marked as. Not as,,, etc. Test Question - 1. Which of the following was formed by the New Madrid Earthquakes of ? Answer Sheet - 1. a. Lake of the Ozarks (MO) b. Little Grassy Lake (IL) c. Kentucky Lake (KY) d. Reelfoot Lake (TN) e. Crater Lake (OR) A B C E If you wish to change an answer, erase your first mark completely before marking your new choice. You are advised to use your time effectively and to work as rapidly as you can without losing accuracy. Do not waste your time on questions that are too difficult for you. Go on to the other questions and come back to the difficult ones later if you can. *** TIME: 40 MINUTES *** DO NOT OPEN TEST BOOKLET UNTIL YOU ARE TOLD TO DO SO! 2005 Worldwide Youth in Science and Engineering WYSE, Worldwide Youth in Science and Engineering and the WYSE Design are service marks of and this work is Copyright 2005 Board of Trustees of the University of Illinois at Urbana - Champaign. All rights reserved.
2 WYSE Academic Challenge Computer Science Test (Sectional) The following measurements have been made after the execution of a program P on the machine: CPU Execution time is 7 sec, Instructions executed are 28 x 10 8, and CPI (Cycle Per Instruction) is 2. What is the clock rate? a. 800 MHz b. 60 MHz c. 1.8 MHz d. 100 MHz 2. Which of the following statements about Cyclic Redundancy Check (CRC) is TRUE? a. It is a common error-checking protocol used in modems. b. It is a form of a hash function. c. It is based on the algebra of polynomials over the integers (mod 2). d. It is a reliable method for detecting data transmission errors. e. All of the above. 3. Which of the following expressions is equivalent to NOT(NOT(X OR Y) OR NOT(X OR NOT Y)), regardless of the actual Boolean values of X and Y? a. X b. (X OR Y) c. (X AND Y) d. (X AND (NOT Y)) 4. In object-oriented programming concept, inheritance is a. permitting objects to be defined and created that are specialized types of already existing objects. b. to ensure that objects cannot change the internal state of other objects in unexpected ways. c. the property that a message can mean different things depending on the object receiving it. d. the process of extracting the relevant properties of an object while ignoring nonessential details. e. All of the above.
3 Computer Science 2 5. Which of the following is true about XML (Extensible Markup Language)? a. XML can have user define markups. b. It is a subset of SGML (Standard Generalized Markup Language). c. XML can store data as well as documents. d. XML can model semi-structured data. e. All of the above. 6. Let k be an integer greater than 1. Which of the following represents the order of growth n i of the expression ( k + 1) as a function of n? i= 1 n a. Θ (( k + 1) ) nlogn b. Θ (( k + 1) ) n c. Θ (( k + 1) log n) 2kn d. Θ ( k ) e. Θ( n k+1 ) 7. Consider the following programming segment in pseudocode: X := 1; Y := 1; WHILE (X <= 1000) BEGIN X := 2 X + 2 Y ; Y := Y + 1; END; What will be the value of Y at the end of the pseudocode? a. 3 b. 4 c. 5 d. 6 e. 7
4 Computer Science 3 8. Which of the following represents a postorder traversal of T? T P Q V W Z Y U a. U X W Q Z Y V P b. X U W Q P V Z Y c. X U W Q Z Y V P d. P Q V W Z Y U X e. Q U X W P Z V Y X 9. Of the following five conditions, which are necessary for a deadlock to exist in an operating system? I. Hold and wait II. Circular wait III. No paging IV. No preemption V. Mutual exclusion a. I and II b. II, III and IV c. I, II, III and IV d. I, II, IV and V e. All of the above 10. In a relational data model, a loss-less join operation is always performed on: a. a primary key and a foreign key attribute. b. any two given attributes. c. any attribute which is common in two relations to be joined. d. any attributes provided they draw the values from different domains. e. All of the above
5 Computer Science Given the Boolean variable assignments X = TRUE, Y = FALSE, and Z = FALSE, what can you say about the value of the expression (NOT ((X OR Y) AND ((NOT (Y AND Z)) AND X)))? a. It is TRUE. b. It is FALSE. c. The expression is syntactically incorrect and cannot be evaluated. d. Not enough information is given to evaluate the expression. 12. Parallel Processing refers to the concept of speeding-up the execution of a program by dividing the program into multiple fragments that can execute simultaneously, each on its own processor. A program being executed across n processors might execute n times faster than it would use a single processor. Below are five precedence graphs for a set of tasks to be executed on a parallel processing system S as shown below: Start T1 T2 T3 T4 T5 T6 T7 T8 End Graph 1 Start T1 T2 T3 T4 T5 T6 T7 T8 End Graph 2 Start T1 T2 T3 T4 End T5 T6 T7 T8 Graph 3 T1 T2 Start T3 T5 T4 T6 End Start T1 T3 T2 T4 T7 T8 End T7 T8 T5 T6 Graph 4 Graph 5 System S has four processors (CPU s). If each of the tasks T1,,T8 takes the same unit time, which precedence graph could be executed with fastest speed on S? a. Graph 1 b. Graph 2 c. Graph 3 d. Graph 4 e. Graph 5
6 Computer Science Which of the following type of memory is fastest in a computer? a. RAM b. Cache c. CPU register d. Magnetic disk e. Magnetic tape 14. The binary representation of hexadecimal number 14F is: a b c d The parameter seek time in reference to accessing data on disk is the: a. time taken by disk to send the required data to the CPU. b. time taken by the computer to send the request to the CPU. c. time the user must wait for the beginning of the required block to rotate into the position under the read/write head. d. time needed to mechanically position the read/write head on the correct track. 16. Which of the following data structures is most appropriate when an electrician wants to put electric cable in your house? a. Heap b. Binary Tree c. Graph d. Linked list
7 Computer Science Assume that S and T are instances of a class Queue, and are both initially empty. What does Queue T look like (from Front to Rear) after the following sequence of operations? S.ENQUEUE (6); S.DEQUEUE ( ); T.ENQUEUE (2); T.ENQUEUE (9); T.ENQUEUE (5); T.DEQUEUE ( ); S.ENQUEUE (3); S.ENQUEUE (1); T.ENQUEUE (4); a b c d File Allocation Table (FAT) is: a. a table that indicates the virtual location on secondary storage of the space allocated to a file. b. a table that indicates the physical location on main memory of the space allocated to a file. c. a table that indicates the physical location on cache memory of the space allocated to a file. d. a table that indicates the physical location on secondary storage of the space allocated to a file. 19. Job control language (JCL) is: a. a language that is designed to express statements in a job that are used to identify the job to an operating system. b. nothing but JAVA programming language. c. a C programming language. d. a Fortran programming language.
8 Computer Science A "strictly" binary tree is a binary tree in which every node has either 0 or 2 children (i.e. no node has exactly 1 child). How many nodes are in a strictly binary tree that has 8 leaves? a. 7 b. 8 c. 15 d Consider the following function: Function Add(Int N) BEGIN End; IF (N <= 1) BEGIN END; ELSE BEGIN End; RETURN 0; RETURN (N + Add(N - 1) + Add(N - 2)); What value is returned by the call Add(4)? a. 0 b. 4 c. 6 d. 9 e. 11
9 Computer Science Consider the binary search tree shown below. This tree could be the result of inserting letters into an empty binary search tree in any of the following orders EXCEPT: H C W E P K Q a. H W P C E Q K b. H C E W P K Q c. H W P K C E Q d. H W P Q C K E e. H C E W K P Q 23. The following integers are read in the order indicated and inserted into a binary search tree with smaller elements inserted in the left subtree and larger elements inserted in the right subtree: What would be output if this tree was printed using a postorder traversal? a b c d e
10 24. Consider the following expression: (A > B) && (C <= B) Computer Science 9 Assume that A, B, and C are integer variables. Which of the expressions given below is (are) equivalent to the one given above? I.!(A < B) &&!(C >= B) II. (A > B) && (B > C) III.!((A <= B) (B < C)) a. I only b. II only c. III only d. I and III e. II and III 25. Consider the following function: Int Strange(Int N) BEGIN END. IF (N <= 1) ELSE RETURN 1; BEGIN RETURN (Strange(N - 2) + 1); END; Which of the following replacements for the line containing the recursive call returns the same value as the original version of function Strange? (Assume N is even). a. RETURN 1; b. RETURN (n / 2-1); c. RETURN (n / 2 + 1); d. RETURN (n + 1); e. RETURN (n / 2);
11 26. In Europe and Asia, the most common used technology for cellular communication is currently: a. TDMA b. FDMA c. GSM d. CDMA e. None of the above 27. In cryptography, digital signature is a concept where a sender uses a: a. private key of receiver to create the signature. b. public key of receiver to create the signature. c. public key of itself to create the signature. d. private key of itself to create the signature. Computer Science The adjacency-list representation of a graph G = (V, E) consists of an array Adj of V lists, one for each vertex in V. For each u V, the adjacency list Adj[u] contains all the vertices v such that there is an edge (u, v) E. Let G = (V, E) be a finite directed acyclic graph with E > 0. Which of the following must be true? I. The sum of the lengths of all the adjacency lists is E. II. The sum of the lengths of all the adjacency lists is 2 E. III. G has a vertex with no incoming edge. a. I only b. II only c. III only d. I and III only e. II and III only
12 Computer Science The circuit below represents which of the following equations? A B C D a. ((NOT A) AND (NOT B)) OR (NOT A AND C AND (NOT D)) b. (A AND B) OR (A AND C AND D) c. ((NOT A) AND (NOT B)) OR (NOT (A AND C AND (NOT D))) d. ((NOT A) AND (NOT B)) OR (A AND C AND (NOT D)) e. None of the above 30. Which number represents the largest decimal value? a. A3 16 b c d. AF 16 e
2008 Academic Challenge
2008 Academic Challenge COMPUTER SCIENCE TEST - REGIONAL - - This Test Consists of 30 Questions - - Computer Science Test Production Team Jim Feher, McKendree College Author/Team Leader Kian Pokorny, McKendree
More information2003 Academic Challenge
Worldwide Youth in Science and Engineering 2003 Academic Challenge COMPUTER SCIENCE TEST - STATE FINALS Computer Science Test Production Team S. R. Subramanya, University of Missouri - Rolla Author/Team
More information2015 Academic Challenge
2015 Academic Challenge COMPUTER SCIENCE TEST - REGIONAL This Test Consists of 30 Questions Computer Science Test Production Team James D. Feher, McKendree University Author/Team Leader Nathan White, Central
More information2015 Academic Challenge
2015 Academic Challenge COMPUTER SCIENCE TEST - SECTIONAL This Test Consists of 30 Questions Computer Science Test Production Team James D. Feher, McKendree University Author/Team Leader Nathan White,
More information2001 Academic Challenge
Worldwide Youth in Science and Engineering 2001 Academic Challenge COMPUTER SCIENCE TEST - STATE FINALS Computer Science Test Production Team Fred Hanzelin (retired), South Suburban College Coordinator/Co-author
More information2009 Academic Challenge
2009 Academic Challenge COMPUTER SCIENCE TEST - REGIONAL This Test Consists of 30 Questions Computer Science Test Production Team Jim Feher, McKendree University Author/Team Leader Barry Bookout, East
More information2001 Academic Challenge
Worldwide Youth in Science and Engineering 2001 cademic Challenge COMPUTER SCIENCE TEST - SECTIONL GENERL DIRECTIONS Computer Science Test Production Team Fred Hanzelin (retired), South Suburban College
More information2012 Academic Challenge
2012 Academic Challenge COMPUTER SCIENCE TEST - REGIONAL This Test Consists of 30 Questions Computer Science Test Production Team Jim Feher, McKendree University Author/Team Leader Nathan White, McKendree
More information2009 Academic Challenge
2009 Academic Challenge COMPUTER SCIENCE TEST - STATE FINALS This Test Consists of 30 Questions Computer Science Test Production Team Jim Feher, McKendree College Author/Team Leader Barry Bookout, East
More information2013 Academic Challenge
Academic Challenge COMPUTER SCIENCE TEST - SECTIONAL This Test Consists of Questions Computer Science Test Production Team Jim Feher, McKendree University Author/Team Leader Nathan White, McKendree University
More information2015 Academic Challenge
2015 Academic Challenge COMPUTER SCIENCE TEST - STATE This Test Consists of 30 Questions Computer Science Test Production Team James D. Feher, McKendree University Author/Team Leader Nathan White, McKendree
More information2012 Academic Challenge
2012 Academic Challenge COMPUTER SCIENCE TEST - SECTIONAL This Test Consists of 30 Questions Computer Science Test Production Team Jim Feher, McKendree University Author/Team Leader Nathan White, McKendree
More informationBRONX COMMUNITY COLLEGE of the City University of New York DEPARTMENT OF MATHEMATICS AND COMPUTER SCIENCE. Sample Final Exam
BRONX COMMUNITY COLLEGE of the City University of New York DEPARTMENT OF MATHEMATICS AND COMPUTER SCIENCE CSI33 Sample Final Exam NAME Directions: Solve problems 1 through 5 of Part I and choose 5 of the
More informationWYSE Academic Challenge 2002 Computer Science Test (Sectional) SOLUTION
Computer Science - 1 WYSE Academic Challenge 2002 Computer Science Test (Sectional) SOLUTION 1. Access to moving head disks requires three periods of delay before information is brought into memory. The
More informationWYSE Academic Challenge Regional Computer Science 2008 Solution Set
1. Correct answer: C. WYSE Academic Challenge Regional 2008 Solution Set 8 bits are sent at each clock cycle and there are 1,000,000 cycles per second, so 8,000,000 bits per second or 1,000,000 bytes per
More informationData Structures Question Bank Multiple Choice
Section 1. Fundamentals: Complexity, Algorthm Analysis 1. An algorithm solves A single problem or function Multiple problems or functions Has a single programming language implementation 2. A solution
More informationCS171 Final Practice Exam
CS171 Final Practice Exam Name: You are to honor the Emory Honor Code. This is a closed-book and closed-notes exam. You have 150 minutes to complete this exam. Read each problem carefully, and review your
More informationCS171 Final Practice Exam
CS171 Final Practice Exam Name: You are to honor the Emory Honor Code. This is a closed-book and closed-notes exam. You have 150 minutes to complete this exam. Read each problem carefully, and review your
More informationFINALTERM EXAMINATION Fall 2009 CS301- Data Structures Question No: 1 ( Marks: 1 ) - Please choose one The data of the problem is of 2GB and the hard
FINALTERM EXAMINATION Fall 2009 CS301- Data Structures Question No: 1 The data of the problem is of 2GB and the hard disk is of 1GB capacity, to solve this problem we should Use better data structures
More informationCOSC 2007 Data Structures II Final Exam. Part 1: multiple choice (1 mark each, total 30 marks, circle the correct answer)
COSC 2007 Data Structures II Final Exam Thursday, April 13 th, 2006 This is a closed book and closed notes exam. There are total 3 parts. Please answer the questions in the provided space and use back
More informationCSE 332 Autumn 2013: Midterm Exam (closed book, closed notes, no calculators)
Name: Email address: Quiz Section: CSE 332 Autumn 2013: Midterm Exam (closed book, closed notes, no calculators) Instructions: Read the directions for each question carefully before answering. We will
More informationWYSE Academic Challenge Computer Science Test (State) 2013 Solution Set
WYSE Academic Challenge Computer Science Test (State) 2013 Solution Set 1. Correct Answer: E 2's complement systems are often used in computing because negating a number involves simple operations in the
More informationUnit In a time - sharing operating system, when the time slot given to a process is completed, the process goes from the RUNNING state to the
Unit - 5 1. In a time - sharing operating system, when the time slot given to a process is completed, the process goes from the RUNNING state to the (A) BLOCKED state (B) READY state (C) SUSPENDED state
More informationFaculty of Science FINAL EXAMINATION COMP-250 A Introduction to Computer Science School of Computer Science, McGill University
NAME: STUDENT NUMBER:. Faculty of Science FINAL EXAMINATION COMP-250 A Introduction to Computer Science School of Computer Science, McGill University Examimer: Prof. Mathieu Blanchette December 8 th 2005,
More informationMID TERM MEGA FILE SOLVED BY VU HELPER Which one of the following statement is NOT correct.
MID TERM MEGA FILE SOLVED BY VU HELPER Which one of the following statement is NOT correct. In linked list the elements are necessarily to be contiguous In linked list the elements may locate at far positions
More informationA6-R3: DATA STRUCTURE THROUGH C LANGUAGE
A6-R3: DATA STRUCTURE THROUGH C LANGUAGE NOTE: 1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO contains FIVE questions. 2. PART ONE is to be answered in the TEAR-OFF
More informationGraphs & Digraphs Tuesday, November 06, 2007
Graphs & Digraphs Tuesday, November 06, 2007 10:34 PM 16.1 Directed Graphs (digraphs) like a tree but w/ no root node & no guarantee of paths between nodes consists of: nodes/vertices - a set of elements
More informationUniversity of Illinois at Urbana-Champaign Department of Computer Science. Second Examination
University of Illinois at Urbana-Champaign Department of Computer Science Second Examination CS 225 Data Structures and Software Principles Spring 2014 7-10p, Tuesday, April 8 Name: NetID: Lab Section
More informationCSL 201 Data Structures Mid-Semester Exam minutes
CL 201 Data tructures Mid-emester Exam - 120 minutes Name: Roll Number: Please read the following instructions carefully This is a closed book, closed notes exam. Calculators are allowed. However laptops
More informationCSE 332 Spring 2013: Midterm Exam (closed book, closed notes, no calculators)
Name: Email address: Quiz Section: CSE 332 Spring 2013: Midterm Exam (closed book, closed notes, no calculators) Instructions: Read the directions for each question carefully before answering. We will
More information12 Abstract Data Types
12 Abstract Data Types 12.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: Define the concept of an abstract data type (ADT). Define
More informationPrevious Year Questions
Previous Year Questions KVS PGT Computer Science 2017 1. Which of the following most accurately describes "multiple inheritances? A. When two classes inherit from each other. B. When a child class has
More informationSPECIAL MOCK GCE EXAMINATIONS
PROGRESSIVE COMPREHENSIVE HIGH SCHOOL (PCHS) MANKON, BAMENDA SPECIAL MOCK GCE EXAMINATIONS 14 FEBRUARY 2014 ADVANCED LEVEL Subject/Code: Computer Science 795 Paper N 1 Examiner DZEUGANG Placide 795 COMPUTER
More informationFinal Examination CSE 100 UCSD (Practice)
Final Examination UCSD (Practice) RULES: 1. Don t start the exam until the instructor says to. 2. This is a closed-book, closed-notes, no-calculator exam. Don t refer to any materials other than the exam
More informationComputer Science E-22 Practice Final Exam
name Computer Science E-22 This exam consists of three parts. Part I has 10 multiple-choice questions that you must complete. Part II consists of 4 multi-part problems, of which you must complete 3, and
More informationCPSC 121 Some Sample Questions for the Final Exam Tuesday, April 15, 2014, 8:30AM
CPSC 121 Some Sample Questions for the Final Exam Tuesday, April 15, 2014, 8:30AM Name: Student ID: Signature: Section (circle one): George Steve Your signature acknowledges your understanding of and agreement
More informationMarch 20/2003 Jayakanth Srinivasan,
Definition : A simple graph G = (V, E) consists of V, a nonempty set of vertices, and E, a set of unordered pairs of distinct elements of V called edges. Definition : In a multigraph G = (V, E) two or
More informationINFO1x05 Tutorial 09
INFO1x05 Tutorial 09 (2,3) Trees, (2,4) Trees and Hash Tables Exercise 1: (INFO1105 and INFO1905) Is the search tree shown below a (2,4) tree? Why or why not? 22 5 10 25 3 4 6 8 14 23 24 27 11 13 17 Figure
More information( ) n 3. n 2 ( ) D. Ο
CSE 0 Name Test Summer 0 Last Digits of Mav ID # Multiple Choice. Write your answer to the LEFT of each problem. points each. The time to multiply two n n matrices is: A. Θ( n) B. Θ( max( m,n, p) ) C.
More informationOutline. policies. with some potential answers... MCS 260 Lecture 19 Introduction to Computer Science Jan Verschelde, 24 February 2016
Outline 1 midterm exam on Friday 26 February 2016 policies 2 questions with some potential answers... MCS 260 Lecture 19 Introduction to Computer Science Jan Verschelde, 24 February 2016 Intro to Computer
More information1993 Illinois JETS TEAMS District Computer Fundamentals Test. 1. What is the decimal value of the sum of the two unsigned binary values: ?
1. What is the decimal value of the sum of the two unsigned binary values: 1101 + 1001? a. 6 b. 12 c. 22 d. 1024 e. 10,110 2. What is the decimal value of the binary number 1101.101b? a. 13.202 b. 13.250
More information! Tree: set of nodes and directed edges. ! Parent: source node of directed edge. ! Child: terminal node of directed edge
Trees (& Heaps) Week 12 Gaddis: 20 Weiss: 21.1-3 CS 5301 Spring 2015 Jill Seaman 1 Tree: non-recursive definition! Tree: set of nodes and directed edges - root: one node is distinguished as the root -
More informationChapter 20: Binary Trees
Chapter 20: Binary Trees 20.1 Definition and Application of Binary Trees Definition and Application of Binary Trees Binary tree: a nonlinear linked list in which each node may point to 0, 1, or two other
More informationCS301 - Data Structures Glossary By
CS301 - Data Structures Glossary By Abstract Data Type : A set of data values and associated operations that are precisely specified independent of any particular implementation. Also known as ADT Algorithm
More informationMULTIMEDIA COLLEGE JALAN GURNEY KIRI KUALA LUMPUR
STUDENT IDENTIFICATION NO MULTIMEDIA COLLEGE JALAN GURNEY KIRI 54100 KUALA LUMPUR FIFTH SEMESTER FINAL EXAMINATION, 2014/2015 SESSION PSD2023 ALGORITHM & DATA STRUCTURE DSEW-E-F-2/13 25 MAY 2015 9.00 AM
More informationMIDTERM EXAM (HONORS SECTION)
Data Structures Course (V22.0102.00X) Professor Yap Fall 2010 MIDTERM EXAM (HONORS SECTION) October 19, 2010 SOLUTIONS Problem 1 TRUE OR FALSE QUESTIONS (4 Points each) Brief justification is required
More informationCSE 373 Autumn 2010: Midterm #1 (closed book, closed notes, NO calculators allowed)
Name: Email address: CSE 373 Autumn 2010: Midterm #1 (closed book, closed notes, NO calculators allowed) Instructions: Read the directions for each question carefully before answering. We may give partial
More informationWYSE Academic Challenge Computer Fundamentals Test (State Finals)
WYSE Academic Challenge Computer Fundamentals Test (State Finals) - 1998 1. What is the decimal value for the result of the addition of the binary values: 1111 + 0101? (Assume a 4 bit, 2's complement representation.)
More informationlogn D. Θ C. Θ n 2 ( ) ( ) f n B. nlogn Ο n2 n 2 D. Ο & % ( C. Θ # ( D. Θ n ( ) Ω f ( n)
CSE 0 Test Your name as it appears on your UTA ID Card Fall 0 Multiple Choice:. Write the letter of your answer on the line ) to the LEFT of each problem.. CIRCLED ANSWERS DO NOT COUNT.. points each. The
More informationCSCE 2014 Final Exam Spring Version A
CSCE 2014 Final Exam Spring 2017 Version A Student Name: Student UAID: Instructions: This is a two-hour exam. Students are allowed one 8.5 by 11 page of study notes. Calculators, cell phones and computers
More informationUser. Application program. Interfaces. Operating system. Hardware
Operating Systems Introduction to Operating Systems and Computer Hardware Introduction and Overview The operating system is a set of system software routines that interface between an application program
More information& ( D. " mnp ' ( ) n 3. n 2. ( ) C. " n
CSE Name Test Summer Last Digits of Mav ID # Multiple Choice. Write your answer to the LEFT of each problem. points each. The time to multiply two n " n matrices is: A. " n C. "% n B. " max( m,n, p). The
More informationCHENNAI MATHEMATICAL INSTITUTE M.Sc. / Ph.D. Programme in Computer Science
CHENNAI MATHEMATICAL INSTITUTE M.Sc. / Ph.D. Programme in Computer Science Entrance Examination, 5 May 23 This question paper has 4 printed sides. Part A has questions of 3 marks each. Part B has 7 questions
More informationTrees. Eric McCreath
Trees Eric McCreath 2 Overview In this lecture we will explore: general trees, binary trees, binary search trees, and AVL and B-Trees. 3 Trees Trees are recursive data structures. They are useful for:
More informationWYSE Academic Challenge Computer Science Test (State) 2015 Solution Set
WYSE Academic Challenge Computer Science Test (State) 2015 Solution Set 1. Correct Answer: E The following shows the contents of the stack (a lifo last in first out structure) after each operation. Instruction
More informationCS302 Data Structures using C++
CS302 Data Structures using C++ Study Guide for the Final Exam Fall 2018 Revision 1.1 This document serves to help you prepare towards the final exam for the Fall 2018 semester. 1. What topics are to be
More informationComputer Science Engineering Sample Papers
See fro more Material www.computetech-dovari.blogspot.com Computer Science Engineering Sample Papers 1 The order of an internal node in a B+ tree index is the maximum number of children it can have. Suppose
More informationCMPUT 101 with Solutions Quiz 2 (50 minutes) November 16, 2000
CMPUT 101 with Solutions Quiz 2 (50 minutes) November 16, 2000 Last Name: First Name: Section: Instructor: A6 Yngvi Bjornsson Instructions: Read carefully before proceeding. No calculators, books or other
More informationTotal No. of Questions : 18] [Total No. of Pages : 02. M.Sc. DEGREE EXAMINATION, DEC First Year COMPUTER SCIENCE.
(DMCS01) Total No. of Questions : 18] [Total No. of Pages : 02 M.Sc. DEGREE EXAMINATION, DEC. 2016 First Year COMPUTER SCIENCE Data Structures Time : 3 Hours Maximum Marks : 70 Section - A (3 x 15 = 45)
More information( ) D. Θ ( ) ( ) Ο f ( n) ( ) Ω. C. T n C. Θ. B. n logn Ο
CSE 0 Name Test Fall 0 Multiple Choice. Write your answer to the LEFT of each problem. points each. The expected time for insertion sort for n keys is in which set? (All n! input permutations are equally
More informationFirst Semester - Question Bank Department of Computer Science Advanced Data Structures and Algorithms...
First Semester - Question Bank Department of Computer Science Advanced Data Structures and Algorithms.... Q1) What are some of the applications for the tree data structure? Q2) There are 8, 15, 13, and
More informationEntrance exam - Informatics
Entrance exam - Informatics Name and Surname fill in the field Application No. Test Sheet No. 15 Algorithms and data structures 1 Which of the listed data structures is most suitable (w.r.t. time and memory
More informationAdvanced Java Concepts Unit 5: Trees. Notes and Exercises
Advanced Java Concepts Unit 5: Trees. Notes and Exercises A Tree is a data structure like the figure shown below. We don t usually care about unordered trees but that s where we ll start. Later we will
More informationQuestion Bank Subject: Advanced Data Structures Class: SE Computer
Question Bank Subject: Advanced Data Structures Class: SE Computer Question1: Write a non recursive pseudo code for post order traversal of binary tree Answer: Pseudo Code: 1. Push root into Stack_One.
More informationn 2 ( ) ( ) + n is in Θ n logn
CSE Test Spring Name Last Digits of Mav ID # Multiple Choice. Write your answer to the LEFT of each problem. points each. The time to multiply an m n matrix and a n p matrix is in: A. Θ( n) B. Θ( max(
More informationBinary Trees. Height 1
Binary Trees Definitions A tree is a finite set of one or more nodes that shows parent-child relationship such that There is a special node called root Remaining nodes are portioned into subsets T1,T2,T3.
More informationIntroduction to Algorithms May 14, 2003 Massachusetts Institute of Technology Professors Erik Demaine and Shafi Goldwasser.
Introduction to Algorithms May 14, 2003 Massachusetts Institute of Technology 6.046J/18.410J Professors Erik Demaine and Shafi Goldwasser Practice Final Practice Final Do not open this exam booklet until
More informationUniversity of Waterloo Department of Electrical and Computer Engineering ECE 250 Data Structures and Algorithms. Final Examination
University of Waterloo Department of Electrical and Computer Engineering ECE 250 Data Structures and Algorithms Instructor: Douglas Wilhelm Harder Time: 2.5 hours Aides: none 14 pages Final Examination
More informationRevision Statement while return growth rate asymptotic notation complexity Compare algorithms Linear search Binary search Preconditions: sorted,
[1] Big-O Analysis AVERAGE(n) 1. sum 0 2. i 0. while i < n 4. number input_number(). sum sum + number 6. i i + 1 7. mean sum / n 8. return mean Revision Statement no. of times executed 1 1 2 1 n+1 4 n
More informationDatabase Technology. Topic 7: Data Structures for Databases. Olaf Hartig.
Topic 7: Data Structures for Databases Olaf Hartig olaf.hartig@liu.se Database System 2 Storage Hierarchy Traditional Storage Hierarchy CPU Cache memory Main memory Primary storage Disk Tape Secondary
More informationCS4411 Intro. to Operating Systems Final Fall points 10 pages
CS44 Intro. to Operating Systems Final Exam Fall 9 CS44 Intro. to Operating Systems Final Fall 9 points pages Name: Most of the following questions only require very short answers. Usually a few sentences
More informationIn addition to the correct answer, you MUST show all your work in order to receive full credit.
In addition to the correct answer, you MUST show all your work in order to receive full credit. Questions Mark: Question1) Multiple Choice Questions /10 Question 2) Binary Trees /15 Question 3) Linked
More informationTotal Score /15 /20 /30 /10 /5 /20 Grader
NAME: NETID: CS2110 Fall 2009 Prelim 2 November 17, 2009 Write your name and Cornell netid. There are 6 questions on 8 numbered pages. Check now that you have all the pages. Write your answers in the boxes
More informationCS161 - Final Exam Computer Science Department, Stanford University August 16, 2008
CS161 - Final Exam Computer Science Department, Stanford University August 16, 2008 Name: Honor Code 1. The Honor Code is an undertaking of the students, individually and collectively: a) that they will
More informationYour data structure should implement all operations in logarithmic time (or better) as a function of the size of the queue.
1. Write a method isbst(node t) that checks that the binary subtree at t is a binary search tree. The method should return true if t is the root of a binary search tree and false otherwise. Assume Node
More informationFinal Exam Data Structure course. No. of Branches (5)
Page ١of 5 College Of Science and Technology Khan younis - Palestine Computer Science & Inf. Tech. Information Technology Data Structure (Theoretical Part) Time: 2 Hours Name: ID: Mark: Teacher 50 Mahmoud
More informationCS134 Spring 2005 Final Exam Mon. June. 20, 2005 Signature: Question # Out Of Marks Marker Total
CS134 Spring 2005 Final Exam Mon. June. 20, 2005 Please check your tutorial (TUT) section from the list below: TUT 101: F 11:30, MC 4042 TUT 102: M 10:30, MC 4042 TUT 103: M 11:30, MC 4058 TUT 104: F 10:30,
More informationCSE 373 Final Exam 3/14/06 Sample Solution
Question 1. (6 points) A priority queue is a data structure that supports storing a set of values, each of which has an associated key. Each key-value pair is an entry in the priority queue. The basic
More information1. AVL Trees (10 Points)
CSE 373 Spring 2012 Final Exam Solution 1. AVL Trees (10 Points) Given the following AVL Tree: (a) Draw the resulting BST after 5 is removed, but before any rebalancing takes place. Label each node in
More informationExam Datastrukturer. DIT960 / DIT961, VT-18 Göteborgs Universitet, CSE
Exam Datastrukturer DIT960 / DIT961, VT-18 Göteborgs Universitet, CSE Day: 2018-10-12, Time: 8:30-12.30, Place: SB Course responsible Alex Gerdes, tel. 031-772 6154. Will visit at around 9:30 and 11:00.
More informationData Structure. IBPS SO (IT- Officer) Exam 2017
Data Structure IBPS SO (IT- Officer) Exam 2017 Data Structure: In computer science, a data structure is a way of storing and organizing data in a computer s memory so that it can be used efficiently. Data
More informationTrees. Reading: Weiss, Chapter 4. Cpt S 223, Fall 2007 Copyright: Washington State University
Trees Reading: Weiss, Chapter 4 1 Generic Rooted Trees 2 Terms Node, Edge Internal node Root Leaf Child Sibling Descendant Ancestor 3 Tree Representations n-ary trees Each internal node can have at most
More information1. Which of the following circuits can be used to store one bit of data? A) Encoder B) OR gate C) Flip Flop D) Decoder
MCA Lateral 1. Which of the following circuits can be used to store one bit of data? A) Encoder B) OR gate C) Flip Flop D) Decoder 2. What would be the output of the following C program? main ( ){ int
More informationCSE 143 Sp04 Final Exam Sample Solution Page 1 of 12
CSE 143 Sp04 Final Exam Sample Solution Page 1 of 12 Reference information about many standard Java classes appears at the end of the test. You might want to tear off those pages to make them easier to
More informationName CPTR246 Spring '17 (100 total points) Exam 3
Name CPTR246 Spring '17 (100 total points) Exam 3 1. Linked Lists Consider the following linked list of integers (sorted from lowest to highest) and the changes described. Make the necessary changes in
More informationSET 2013 PAPER II COMPUTER SCIENCE AND APPLICATIONS
SET 2013 PAPER II COMPUTER SCIENCE AND APPLICATIONS Signature of the Invigilator Question Booklet No.... 1. OMR Sheet No..... Subject Code 10 ROLL No. Time Allowed : 75 Minutes Max. Marks : 100 No. of
More information! Tree: set of nodes and directed edges. ! Parent: source node of directed edge. ! Child: terminal node of directed edge
Trees & Heaps Week 12 Gaddis: 20 Weiss: 21.1-3 CS 5301 Fall 2018 Jill Seaman!1 Tree: non-recursive definition! Tree: set of nodes and directed edges - root: one node is distinguished as the root - Every
More informationPrelim 2. CS 2110, November 20, 2014, 7:30 PM Extra Total Question True/False Short Answer
Prelim 2 CS 2110, November 20, 2014, 7:30 PM 1 2 3 4 5 Extra Total Question True/False Short Answer Complexity Induction Trees Graphs Extra Credit Max 20 10 15 25 30 5 100 Score Grader The exam is closed
More informationUniversity of Illinois at Urbana-Champaign Department of Computer Science. Final Examination
University of Illinois at Urbana-Champaign Department of Computer Science Final Examination CS 225 Data Structures and Software Principles Spring 2010 7-10p, Wednesday, May 12 Name: NetID: Lab Section
More informationData Structures and Algorithms Winter term 2016
Page 0 German University in Cairo December 26, 2016 Media Engineering and Technology Prof. Dr. Slim Abdennadher Dr. Wael Abouelsaadat Data Structures and Algorithms Winter term 2016 Final Exam Bar Code
More informationDATA STRUCTURE : A MCQ QUESTION SET Code : RBMCQ0305
Q.1 If h is any hashing function and is used to hash n keys in to a table of size m, where n
More informationCSE 332 Winter 2015: Midterm Exam (closed book, closed notes, no calculators)
_ UWNetID: Lecture Section: A CSE 332 Winter 2015: Midterm Exam (closed book, closed notes, no calculators) Instructions: Read the directions for each question carefully before answering. We will give
More information(a) What is the denary equivalent of the hexadecimal number A7?
1 What is the denary equivalent of the hexadecimal number A7? You may use the space below for rough working. You may get some marks for your working, even if your answer is incorrect. Represent the denary
More information21# 33# 90# 91# 34# # 39# # # 31# 98# 0# 1# 2# 3# 4# 5# 6# 7# 8# 9# 10# #
1. Prove that n log n n is Ω(n). York University EECS 11Z Winter 1 Problem Set 3 Instructor: James Elder Solutions log n n. Thus n log n n n n n log n n Ω(n).. Show that n is Ω (n log n). We seek a c >,
More informationTest #2. Login: 2 PROBLEM 1 : (Balance (6points)) Insert the following elements into an AVL tree. Make sure you show the tree before and after each ro
DUKE UNIVERSITY Department of Computer Science CPS 100 Fall 2003 J. Forbes Test #2 Name: Login: Honor code acknowledgment (signature) Name Problem 1 Problem 2 Problem 3 Problem 4 Problem 5 Problem 6 Problem
More informationCSE 12 Abstract Syntax Trees
CSE 12 Abstract Syntax Trees Compilers and Interpreters Parse Trees and Abstract Syntax Trees (AST's) Creating and Evaluating AST's The Table ADT and Symbol Tables 16 Using Algorithms and Data Structures
More informationOn my honor I affirm that I have neither given nor received inappropriate aid in the completion of this exercise.
CS 2413 Data Structures EXAM 2 Fall 2017, Page 1 of 10 Student Name: Student ID # OU Academic Integrity Pledge On my honor I affirm that I have neither given nor received inappropriate aid in the completion
More informationUniversity of Palestine. Final Exam 2 nd semester 2014/2015 Total Grade: 50
First Question Q1 B1 Choose the best Answer: No. of Branches (1) (10/50) 1) 2) 3) 4) Suppose we start with an empty stack and then perform the following operations: Push (A); Push (B); Pop; Push (C); Top;
More informationHashing for searching
Hashing for searching Consider searching a database of records on a given key. There are three standard techniques: Searching sequentially start at the first record and look at each record in turn until
More informationMARKING KEY The University of British Columbia MARKING KEY Computer Science 260 Midterm #2 Examination 12:30 noon, Thursday, March 15, 2012
MARKING KEY The University of British Columbia MARKING KEY Computer Science 260 Midterm #2 Examination 12:30 noon, Thursday, March 15, 2012 Instructor: K. S. Booth Time: 70 minutes (one hour ten minutes)
More information