COP Study Union - Fall 2017
|
|
- Neil Snow
- 5 years ago
- Views:
Transcription
1 COP Study Union - Fall 2017 Chris Marsh Contents 1 Tries Insertion Worst Case Runtime Best Case Runtime Retrieval Worst Case Runtime Best Case Runtime Deletion Worst Case Runtime Best Case Runtime Why Tries? Heaps Insertion Worst Case Runtime Best Case Runtime Deletion Worst Case Runtime Best Case Runtime Representation Heapify Hashtables Linear Probing Worst Case Runtime Best Case Runtime Average Case Runtime Quadratic Probing Worst Case Runtime Best Case Runtime
2 3.2.3 Average Case Runtime Seperate Chaining Worst Case Runtime Best Case Runtime Average Case Runtime Deletion Number Bases and Base Conversion 22 5 Bitwise Operators 24 6 Two s Complement 25 7 Bitmasks 26 8 Backtracking The Jedi and Clone Troopers Recurrence Relations (Just in case!) 31 2
3 1 Tries 1) How are strings represented in a trie? 2) Create a typical trie node struct in C. How can we modify this struct to include other useful information about a string represented in the trie? Observe the mystical glory that is the trie data structure below. 3
4 3) What strings are represented in the trie above? How many times does each string occur? 1.1 Insertion 1) Insert the string cake into the trie above. 2) Insert the word in into the trie above. 3) Insert the word integrate into the trie above. 4) Insert the empty string into the trie above Worst Case Runtime What is the worst case runtime for insertion into a trie? Why? Best Case Runtime What is the best case runtime for insertion into a trie? Why? 4
5 1.2 Retrieval Worst Case Runtime What is the worst case runtime for retrieval in a trie? Why? Best Case Runtime What is the best case runtime for retrieval in a trie? Why? 1.3 Deletion This is the same trie from above, before you did all of that crazy insertion. 5
6 1) Delete the string nonexistance from the trie. 2) Delete the string cats from the trie. 3) Delete the string cat from the trie. 4) Delete the string cake from the trie. 5) Delete the string donut from the trie. 6) Delete the empty string from the trie. 6
7 1.3.1 Worst Case Runtime What is the worst case runtime for deletion in a trie? Why? Best Case Runtime What is the best case runtime for deletion in a trie? Why? 1.4 Why Tries? 1) What are the benefits of tries? Why use a trie over another data structure like a binary search tree, or an array? 2) What practical applications would you possibly choose a trie data structure for? 7
8 2 Heaps 3) What does it mean for a binary tree to be complete? Can you draw some examples? 4) What does it mean for a binary tree to be full? Can you draw some examples? 5) What does it mean for a binary tree to be perfect? Can you draw some examples? 8
9 6) What is the precise height of a complete binary tree with n nodes? 7) What is the structural property for a heap? 8) What is the ordering property for a minheap? 9) What is the ordering property for a maxheap? 10) What operations do we support for heaps? 9
10 2.1 Insertion 1) What is the algorithm for insertion into a minheap? 2) Is the binary tree below a minheap? 2) Insert the value 87 into the heap above. 3) Insert the value 6 into the heap above. 4) Insert the value 1 into the heap above Worst Case Runtime What is the worst case runtime for insertion into a heap? Why? 10
11 2.1.2 Best Case Runtime What is the best case runtime for insertion into a heap? Why? 2.2 Deletion 1) What is the algorithm for deleting arbitrary elements from a heap? 2) What is the algorithm for deleting the root of a minheap? 3) Delete 12 from the heap below. 4) Delete 1 from the heap below. 11
12 3) Delete 30 from the heap below. 5) Delete 1 from the heap below. 12
13 2.2.1 Worst Case Runtime What is the worst case runtime for deletion from a heap? What assumptions did you make when coming up with this runtime? Can you draw a heap that would cause this runtime? 13
14 2.2.2 Best Case Runtime What is the best case runtime for deletion from a heap? What assumptions did you make when coming up with this runtime? Can you draw a heap that would cause this runtime? 2.3 Representation 1) How are heaps typically represented in code? (Hint: Do we use node structs like we do with all of the other binary trees you have covered this semester?) 14
15 2.4 Heapify 1) How does heapify work? What is its runtime? Why? 15
16 3 Hashtables 1) Obtain the hash values for the keys using the hash function below. Keys: 64, 89, 77, 50, 99, 159 int hash(int key, int table_size) { return ((key - 47) * 3) % table_size; } hash(64) = hash(89) = hash(77) = hash(50) = hash(99) = hash(159) = 3.1 Linear Probing 1) Insert the keys above, using the hashtable obtained above using linear probing as your collision resolution policy Worst Case Runtime What is the worst case runtime for for insertion and search using linear probing? Why? 16
17 3.1.2 Best Case Runtime What is the best case runtime for for insertion and search using linear probing? Why? Average Case Runtime What is the average case runtime for for insertion and search using linear probing? Why? 3.2 Quadratic Probing 1) Insert the keys above, using the hashtable obtained above using quadratic probing as your collision resolution policy. 17
18 2) What conditions are required to guarantee that quadratic probing will find an empty position in the hash table? 3) Are these conditions required for linear probing for any reason? If not, is there any benefit to fufilling these requirements anyway? Worst Case Runtime What is the worst case runtime for insertion and search using quadratic probing? Why? Best Case Runtime What is the best case runtime for for insertion and search using quadratic probing? Why? 18
19 3.2.3 Average Case Runtime What is the average case runtime for for insertion and search using quadratic probing? Why? 3.3 Seperate Chaining 1) Insert the keys above, using the hashtable obtained above using seperate chaining as your collision resolution policy. 19
20 2) Are the conditions described in the quadratic probing section required for seperate chaining? If not, is there any benefit to fufilling these requirements anyway? Worst Case Runtime What is the worst case runtime for for insertion and search using seperate chaining? Why? 20
21 3.3.2 Best Case Runtime What is the best case runtime for for insertion and search using seperate chaining? Why? Average Case Runtime What is the average case runtime for for insertion and search using seperate chaining? Why? 3.4 Deletion What are some ways that you can delete from a hash table? 21
22 4 Number Bases and Base Conversion 1) Convert ( ) 2 to base 10. 2) Convert (63526) 7 to base 10. 3) Convert (ef45) 16 to base 3. Do the following converstions without using decimal as an intermediary base. Why is this possible? 4) Convert (42763) 8 to base 2. 5) Convert (5362) 9 to base 3. 22
23 6) Convert (211021) 3 to base 9. Fun questions about number bases. 7) How many different integers can we represent with 5 digits in base 2? 8) How many different integers can we represent with 3 digits in base 4? 9) How many different integers can we represent with m digits in base n? 23
24 5 Bitwise Operators 1) What is the output of each printf() statement in the following program. #include <stdio.h> int main(void) { int c = 5; printf("%d\n", c << 2); printf("%d\n", c); printf("%d\n", 92 << 3); printf("%d\n", c = c << 31); printf("%d\n", c = (~c) + 1); printf("%u\n", ~c); printf("%d\n", 0xfe1); printf("%d\n", 011); printf("%d\n", 92 & 78); printf("%d\n", 92 78); printf("%d\n", 92 ^ 78); printf("%d\n", ~92); printf("%d\n", ~2); printf("%d\n", ~3); printf("%d\n", ~4); printf("%d\n", ~(-78)); 24
25 } return 0; 6 Two s Complement 1) What is decimal value of the following signed 32-bit numbers, using twos complement? a) b) c) d) e) f) ) What is the range of positive values including the integer 0 than you can make with 32-bit numbers, using two s complement? 3) What is the range of negative values that you can make with 32-bit numbers, using two s complement? 25
26 7 Bitmasks Observe the code segment below. #define LIGHT_SIDE 0x0001 #define FORCE_SENSITIVE 0x0002 #define DARTH_VADER 0x0004 #define LIKES_SAND 0x0008 typedef struct StarWarsCharacter { unsigned int attributes; char *name; } StarWarsCharacter; void panic(char *s) { fprintf(stderr, "%s\n", s); exit(1); } Character *createcharacter(char *name) { Character *c = NULL; if ((c = malloc(sizeof(character))) == NULL) panic("failed to allocate enough memory in createcharacter()!\n"); c->attributes = -1; c->name = malloc(sizeof(char) * (strlen(name) + 1)); strcpy(c->name, name); } return c; int main(void) { StarWarsCharacter *anakin = createcharacter("anakin"); // Assume there is code here that sets the least significant // binary digits of anakin s attributes member to unknown 26
27 // values, and the rest of the digits are zeros // (1) // (2) // (3) // (4) } return 0; Let the integer with the identifier attributes, use the bitmasks as follows: a) If the first bit is 1, the StarWarsCharacter is on the light side, and not on the lightside otherwise. b) If the second bit is 1, the StarWarsCharacter is force sensitive, and not force sensitive otherwise. c) If the third bit is 1, the StarWarsCharacter is Darth Vader, and not Darth Vader otherwise. 1) Beneath the comment labeled (1) in the code segment above, using bitwise operators, and the defined bitmasks, write a line of code that will modify the attributes member of the StarWarsCharacter referenced by anakin, such that anakin will be force sensitive. 2) Beneath the comment labeled (2) in the code segment above, using bitwise operators, and the defined bitmasks, write a line of code that will modify the attributes member of the StarWarsCharacter referenced by anakin, such that anakin will be on the Dark Side. 3) Beneath the comment labeled (3) in the code segment above, using bitwise operators, and the defined bitmasks, write a line of code that will modify the attributes member of the StarWarsCharacter referenced by anakin, such that we toggle (what does toggle mean?) the digit that represents whether or not anakin is Darth Vader. 27
28 4) Beneath the comment labeled (4) in the code segment above, using bitwise operators, and the defined bitmasks, write a line of code that will modify the attributes member of the StarWarsCharacter referenced by anakin, such that anakin will not like sand. 28
29 8 Backtracking 8.1 The Jedi and Clone Troopers Using your healthy knowlege of backtracking, construct a tree diagram of states to find a path to a solution to the problem described below. To avoid drawing a potentially explosive state tree (Study Union is short!), it will suffice to find a single repeated state, and a single invalid state. Problem Statement: Three Jedi and three Clone Troopers must cross a river of lava using a transport only big enough to support two people. If on either side of the lava, there are more Clone Troopers than Jedi, than the Clone Troopers will take the Jedi to Emperor Palpatine. The transport cannot cross the river of lava without at least one person on board. The goal is to get all three Jedi, and all three Clone Troopers to the other side of the river of lava such that no Jedi gets taken to Emperor Palpatine. Hint: This is a river crossing problem very similar to the Fox, Goose, and Bag of Beans problem covered in class (and even more similar to the Missionaries and Cannibals problem mentioned in Dr. Szumlanski s notes). Make sure you check for infeasible states, and states that you have already seen before! 29
30 30
31 9 Recurrence Relations (Just in case!) Derive a closed form for the following recurrence relation taken Dr. More Recursion; Recurrence Relations. Szumlanski s page T (0) = T (1) = c 1 T (n) = n + T (n/2) for n 2 31
Study Union Final Review
University of Central Florida COP 352: Computer Science Study Union Final Review Student Academic Resource Center created by, Chris Marsh April 8, 28 Contents Tries 2. Insertion................................................
More informationUniversity of Central Florida COP 3502: Computer Science 1
University of Central Florida COP 3502: Computer Science 1 Student Academic Resource Center presents... Computer Science 1 Study Union Review Written by: Soliman Alnaizy Fall 2018 Contents 1 TRIES 2 1.1
More informationCOP 3502 Spring 2018 Study Union Review
Page 1 COP 3502 Spring 2018 Study Union Review Alec May Table of Contents: Tries 2 Heaps 3 Hash Tables 5 Base Conversion 6 Bitwise Operators 7 Backtracking 8 Sorts 9 Linked Lists 10 Tips and Resources
More informationFoundation Exam - Sample Problems for New Topics
Foundation Exam - Sample Problems for New Topics Fall 2016 Dynamic Memory Allocation Sample Question #1 Consider the following struct to store a single Uno playing card: typedef struct char color[20];
More informationComputer Science Foundation Exam
Computer Science Foundation Exam August 26, 2017 Section I A DATA STRUCTURES NO books, notes, or calculators may be used, and you must work entirely on your own. Name: UCFID: NID: Question # Max Pts Category
More informationComputer Science Foundation Exam
Computer Science Foundation Exam August 6, 017 Section I A DATA STRUCTURES SOLUTIONS NO books, notes, or calculators may be used, and you must work entirely on your own. Question # Max Pts Category Passing
More informationComputer Science Foundation Exam
Computer Science Foundation Exam December 13, 2013 Section I A COMPUTER SCIENCE NO books, notes, or calculators may be used, and you must work entirely on your own. SOLUTION Question # Max Pts Category
More informationCSE 332 Spring 2014: Midterm Exam (closed book, closed notes, no calculators)
Name: Email address: Quiz Section: CSE 332 Spring 2014: Midterm Exam (closed book, closed notes, no calculators) Instructions: Read the directions for each question carefully before answering. We will
More informationCOP 3223 Introduction to Programming with C - Study Union - Fall 2017
COP 3223 Introduction to Programming with C - Study Union - Fall 2017 Chris Marsh and Matthew Villegas Contents 1 Code Tracing 2 2 Pass by Value Functions 4 3 Statically Allocated Arrays 5 3.1 One Dimensional.................................
More informationCSE 332 Spring 2013: Midterm Exam (closed book, closed notes, no calculators)
Name: Email address: Quiz Section: CSE 332 Spring 2013: Midterm Exam (closed book, closed notes, no calculators) Instructions: Read the directions for each question carefully before answering. We will
More informationCIS 2107 Computer Systems and Low-Level Programming Fall 2011 Midterm
Fall 2011 Name: Page Points Score 1 5 2 10 3 10 4 7 5 8 6 15 7 4 8 7 9 16 10 18 Total: 100 Instructions The exam is closed book, closed notes. You may not use a calculator, cell phone, etc. For each of
More informationCOP 3502 (Computer Science I) Test #3: Data Structures Date: 11/1/2013 VERSION A
COP 3502 (Computer Science I) Test #3: Data Structures Date: 11/1/2013 VERSION A Directions: This is a multiple choice test. Each question is worth 5 points. Please choose the most accurate answer listed.
More informationCOP 3223 Introduction to Programming with C - Study Union - Fall 2017
COP 3223 Introduction to Programming with C - Study Union - Fall 2017 Chris Marsh and Matthew Villegas Contents 1 Code Tracing 2 2 Pass by Value Functions 4 3 Statically Allocated Arrays 5 3.1 One Dimensional.................................
More informationComputer Science Foundation Exam
Computer Science Foundation Exam December 16, 2016 Section I A DATA STRUCTURES NO books, notes, or calculators may be used, and you must work entirely on your own. Name: UCFID: NID: Question # Max Pts
More informationCSE 332 Autumn 2013: Midterm Exam (closed book, closed notes, no calculators)
Name: Email address: Quiz Section: CSE 332 Autumn 2013: Midterm Exam (closed book, closed notes, no calculators) Instructions: Read the directions for each question carefully before answering. We will
More informationCOP 3502 (Computer Science I) Final Exam 12/10/2015. Last Name:, First Name:
COP 3502 (Computer Science I) Final Exam 12/10/2015 Last Name:, First Name: 1) (10 pts) Perform the following base conversions: a) 134710 converted to base 7. b) 45628 converted to base 10. c) 100111010111012
More informationComputer Science Foundation Exam
Computer Science Foundation Exam December 16, 2016 Section I A DATA STRUCTURES NO books, notes, or calculators may be used, and you must work entirely on your own. SOLUTION Question # Max Pts Category
More information2016 Spring COP 3502 Final Exam. Date: 4/28/2016. Name:
2016 Spring COP 3502 Final Exam Date: 4/28/2016 Name: 1) (10 pts) Consider implementing a hash table that stores integers, using the linear probing strategy. Assume that the hash table uses the hash function,
More information15 122: Principles of Imperative Computation. Practice Exam August 4, 2015
15 122: Principles of Imperative Computation Practice Exam August 4, 2015 15-122 Practice Exam Page 2 of 17 1. Fun with C. The following C programs have between 0 and 1 errors in them. If the function
More informationA few examples are below. Checking your results in decimal is the easiest way to verify you ve got it correct.
CS107 Handout 22S Spring 2007 May 4, 2007 Assignment 5 Solution Brought to you by Julie Zelenski and Jerry Cain. Problem 1: Binary numbers and bit operations A few examples are below. Checking your results
More informationSection 05: Midterm Review
Section 05: Midterm Review 1. Asymptotic Analysis (a) Applying definitions For each of the following, choose a c and n 0 which show f(n) O(g(n)). Explain why your values of c and n 0 work. (i) f(n) = 5000n
More informationTables. The Table ADT is used when information needs to be stored and acessed via a key usually, but not always, a string. For example: Dictionaries
1: Tables Tables The Table ADT is used when information needs to be stored and acessed via a key usually, but not always, a string. For example: Dictionaries Symbol Tables Associative Arrays (eg in awk,
More informationComputer Science 1 Study Union Practice Problems. What are the arguments to malloc? calloc? realloc? What do they do?
Study Union Review Jacob Cornett 1 Computer Science 1 Study Union Practice Problems!This may not be a comprehensive review of everything that will be on your exam and we may go over more during the session.
More informationYou must include this cover sheet. Either type up the assignment using theory5.tex, or print out this PDF.
15-122 Assignment 5 Page 1 of 11 15-122 : Principles of Imperative Computation Fall 2012 Assignment 5 (Theory Part) Due: Tuesday, October 30, 2012 at the beginning of lecture Name: Andrew ID: Recitation:
More informationECE264 Fall 2013 Exam 3, November 20, 2013
ECE264 Fall 2013 Exam 3, November 20, 2013 In signing this statement, I hereby certify that the work on this exam is my own and that I have not copied the work of any other student while completing it.
More informationMLR Institute of Technology
MLR Institute of Technology Laxma Reddy Avenue, Dundigal, Quthbullapur (M), Hyderabad 500 043 Phone Nos: 08418 204066 / 204088, Fax : 08418 204088 TUTORIAL QUESTION BANK Course Name : DATA STRUCTURES Course
More informationNET/JRF-COMPUTER SCIENCE & APPLICATIONS. Time: 01 : 00 Hour Date : M.M. : 50
1 NET/JRF-COMPUTER SCIENCE & APPLICATIONS UNIT TEST : DATA STRUCTURE Time: 01 : 00 Hour Date : 02-06-2017 M.M. : 50 INSTRUCTION: Attempt all the 25 questions. Each question carry TWO marks. 1. Consider
More informationCSE 373 Autumn 2012: Midterm #2 (closed book, closed notes, NO calculators allowed)
Name: Sample Solution Email address: CSE 373 Autumn 0: Midterm # (closed book, closed notes, NO calculators allowed) Instructions: Read the directions for each question carefully before answering. We may
More informationSecond Examination Solution
University of Illinois at Urbana-Champaign Department of Computer Science Second Examination Solution CS 225 Data Structures and Software Principles Fall 2007 7p-9p, Thursday, November 8 Name: NetID: Lab
More informationSection 1: True / False (1 point each, 15 pts total)
Section : True / False ( point each, pts total) Circle the word TRUE or the word FALSE. If neither is circled, both are circled, or it impossible to tell which is circled, your answer will be considered
More informationCOP 3223 Introduction to Programming with C - Study Union - Spring 2018
COP 3223 Introduction to Programming with C - Study Union - Spring 2018 Chris Marsh and Matthew Villegas Contents 1 Code Tracing 2 2 Pass by Value Functions 4 3 Statically Allocated Arrays 5 3.1 One Dimensional.................................
More informationCPSC 211, Sections : Data Structures and Implementations, Honors Final Exam May 4, 2001
CPSC 211, Sections 201 203: Data Structures and Implementations, Honors Final Exam May 4, 2001 Name: Section: Instructions: 1. This is a closed book exam. Do not use any notes or books. Do not confer with
More informationA6-R3: DATA STRUCTURE THROUGH C LANGUAGE
A6-R3: DATA STRUCTURE THROUGH C LANGUAGE NOTE: 1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO contains FIVE questions. 2. PART ONE is to be answered in the TEAR-OFF
More informationInstructions. Definitions. Name: CMSC 341 Fall Question Points I. /12 II. /30 III. /10 IV. /12 V. /12 VI. /12 VII.
CMSC 341 Fall 2013 Data Structures Final Exam B Name: Question Points I. /12 II. /30 III. /10 IV. /12 V. /12 VI. /12 VII. /12 TOTAL: /100 Instructions 1. This is a closed-book, closed-notes exam. 2. You
More informationCSL 201 Data Structures Mid-Semester Exam minutes
CL 201 Data tructures Mid-emester Exam - 120 minutes Name: Roll Number: Please read the following instructions carefully This is a closed book, closed notes exam. Calculators are allowed. However laptops
More informationData Structure and Algorithm Homework #3 Due: 1:20pm, Thursday, May 16, 2017 TA === Homework submission instructions ===
Data Structure and Algorithm Homework #3 Due: 1:20pm, Thursday, May 16, 2017 TA email: dsa1@csie.ntu.edu.tw === Homework submission instructions === For Problem 1-3, please put all your solutions in a
More informationData Structures And Algorithms
Data Structures And Algorithms Hashing Eng. Anis Nazer First Semester 2017-2018 Searching Search: find if a key exists in a given set Searching algorithms: linear (sequential) search binary search Search
More informationFriday Four Square! 4:15PM, Outside Gates
Binary Search Trees Friday Four Square! 4:15PM, Outside Gates Implementing Set On Monday and Wednesday, we saw how to implement the Map and Lexicon, respectively. Let's now turn our attention to the Set.
More informationNYU SCPS X Section 1 Unix System Calls. Fall 2004 Handout 8. Source code on the Web at mm64/x /src/doubly2.
Fall 2004 Handout 8 Source code on the Web at http://i5.nyu.edu/ mm64/x52.9232/src/doubly2.c 1 /* 2 Let the user type in positive numbers, not necessarily unique. Store them in 3 ascending order in a dynamically
More informationComputer Science Foundation Exam
Computer Science Foundation Exam January 12, 2019 Section I A DATA STRUCTURES NO books, notes, or calculators may be used, and you must work entirely on your own. Name: UCFID: NID: Question # Max Pts Category
More informationCS300 Final Review Questions 1
CS300 Final Review Questions 1 This is not a complete list of questions and topics, but a good sampling of questions that will help you study for the final. I strongly advise you to work through every
More informationCS61, Fall 2012 Section 2 Notes
CS61, Fall 2012 Section 2 Notes (Week of 9/24-9/28) 0. Get source code for section [optional] 1: Variable Duration 2: Memory Errors Common Errors with memory and pointers Valgrind + GDB Common Memory Errors
More informationCIS 2107 Computer Systems and Low-Level Programming Fall 2011 Midterm Solutions
Fall 2011 Name: Page Points Score 1 7 2 10 3 8 4 13 6 17 7 4 8 16 9 15 10 10 Total: 100 Instructions The exam is closed book, closed notes. You may not use a calculator, cell phone, etc. For each of the
More informationCS 241 Data Organization Binary Trees
CS 241 Data Organization Binary Trees Brooke Chenoweth University of New Mexico Fall 2017 Binary Tree: Kernighan and Ritchie 6.5 Read a file and count the occurrences of each word. now is the time for
More informationMidterm 2 Exam Principles of Imperative Computation. Tuesday 31 st March, This exam is closed-book with one sheet of notes permitted.
Midterm 2 Exam 15-122 Principles of Imperative Computation Tuesday 31 st March, 2015 Name: Andrew ID: Recitation Section: Instructions This exam is closed-book with one sheet of notes permitted. You have
More informationComputer Science Foundation Exam
Computer Science Foundation Exam May 19, 2018 Section I A DATA STRUCTURES SOLUTION NO books, notes, or calculators may be used, and you must work entirely on your own. Name: UCFID: NID: Question # Max
More informationYou must print this PDF and write your answers neatly by hand. You should hand in the assignment before recitation begins.
15-122 Homework 4 Page 1 of 13 15-122 : Principles of Imperative Computation, Summer 1 2014 Written Homework 4 Due: Thursday, June 12 before recitation Name: Andrew ID: Recitation: In this assignment,
More information11 'e' 'x' 'e' 'm' 'p' 'l' 'i' 'f' 'i' 'e' 'd' bool equal(const unsigned char pstr[], const char *cstr) {
This document contains the questions and solutions to the CS107 midterm given in Spring 2016 by instructors Julie Zelenski and Michael Chang. This was an 80-minute exam. Midterm questions Problem 1: C-strings
More informationExam Principles of Imperative Computation, Summer 2011 William Lovas. June 24, 2011
Exam 3 15-122 Principles of Imperative Computation, Summer 2011 William Lovas June 24, 2011 Name: Sample Solution Andrew ID: wlovas Instructions This exam is closed-book with one double-sided sheet of
More informationCSE 373 Winter 2009: Midterm #1 (closed book, closed notes, NO calculators allowed)
Name: Email address: CSE 373 Winter 2009: Midterm #1 (closed book, closed notes, NO calculators allowed) Instructions: Read the directions for each question carefully before answering. We may give partial
More informationESC101N: Fundamentals of Computing End-sem st semester
ESC101N: Fundamentals of Computing End-sem 2010-11 1st semester Instructor: Arnab Bhattacharya 8:00-11:00am, 15th November, 2010 Instructions 1. Please write your name, roll number and section below. 2.
More informationCOMP 2355 Introduction to Systems Programming
COMP 2355 Introduction to Systems Programming Christian Grothoff christian@grothoff.org http://grothoff.org/christian/ 1 Functions Similar to (static) methods in Java without the class: int f(int a, int
More informationCSE 332: Data Structures & Parallelism Lecture 10:Hashing. Ruth Anderson Autumn 2018
CSE 332: Data Structures & Parallelism Lecture 10:Hashing Ruth Anderson Autumn 2018 Today Dictionaries Hashing 10/19/2018 2 Motivating Hash Tables For dictionary with n key/value pairs insert find delete
More informationHashing. 5/1/2006 Algorithm analysis and Design CS 007 BE CS 5th Semester 2
Hashing Hashing A hash function h maps keys of a given type to integers in a fixed interval [0,N-1]. The goal of a hash function is to uniformly disperse keys in the range [0,N-1] 5/1/2006 Algorithm analysis
More informationCOMP1917 Computing 1 Written Exam Sample Questions
COMP1917 Computing 1 Written Exam Sample Questions Note: these sample questions are intended to provide examples of a certain style of question which did not occur in the tutorial or laboratory exercises,
More informationDraw the resulting binary search tree. Be sure to show intermediate steps for partial credit (in case your final tree is incorrect).
Problem 1. Binary Search Trees (36 points) a) (12 points) Assume that the following numbers are inserted into an (initially empty) binary search tree in the order shown below (from left to right): 42 36
More informationContents of Lecture 3
Contents of Lecture 3 Repetition of matrices double a[3][4]; double* b; double** c; Terminology Linkage Types Conversions Jonas Skeppstedt (js@cs.lth.se) Lecture 3 2014 1 / 33 A global matrix: double a[3][4]
More informationCS 112 Final May 8, 2008 (Lightly edited for 2012 Practice) Name: BU ID: Instructions
CS 112 Final May 8, 2008 (Lightly edited for 2012 Practice) Name: BU ID: This exam is CLOSED book and notes. Instructions The exam consists of six questions on 11 pages. Please answer all questions on
More informationSample Examination. Family Name:... Other Names:... Signature:... Student Number:...
Family Name:... Other Names:... Signature:... Student Number:... THE UNIVERSITY OF NEW SOUTH WALES SCHOOL OF COMPUTER SCIENCE AND ENGINEERING Sample Examination COMP1917 Computing 1 EXAM DURATION: 2 HOURS
More information1. [1 pt] What is the solution to the recurrence T(n) = 2T(n-1) + 1, T(1) = 1
Asymptotics, Recurrence and Basic Algorithms 1. [1 pt] What is the solution to the recurrence T(n) = 2T(n-1) + 1, T(1) = 1 2. O(n) 2. [1 pt] What is the solution to the recurrence T(n) = T(n/2) + n, T(1)
More informationFall, 2015 Prof. Jungkeun Park
Data Structures and Algorithms Binary Search Trees Fall, 2015 Prof. Jungkeun Park Copyright Notice: This material is modified version of the lecture slides by Prof. Rada Mihalcea in Univ. of North Texas.
More informationProblem 2 Add the two 2 s complement signed 8-bit values given below, and express your answer in decimal.
Problem 1 Recall the definition of root in project 1. (The declaration of struct entrynode appears below.) struct entrynode * root; Give the type of each of the following expressions. The answer may be
More informationMidterm Sample Questions. a) What evaluates to FALSE in C? What evaluates to TRUE?
Midterm Syllabus: 1. Number systems a. Signed and unsigned representations b. Conversion between different representations c. Overflow condition 2. C Pointers 3. Dynamic Memory Allocation 4. C Data structures:
More informationINDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR Stamp / Signature of the Invigilator
INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR Stamp / Signature of the Invigilator EXAMINATION ( End Semester ) SEMESTER ( Spring ) Roll Number Section Name Subject Number C S 1 0 0 0 1 Subject Name Programming
More informationCS171 Final Practice Exam
CS171 Final Practice Exam Name: You are to honor the Emory Honor Code. This is a closed-book and closed-notes exam. You have 150 minutes to complete this exam. Read each problem carefully, and review your
More informationIntroduction hashing: a technique used for storing and retrieving information as quickly as possible.
Lecture IX: Hashing Introduction hashing: a technique used for storing and retrieving information as quickly as possible. used to perform optimal searches and is useful in implementing symbol tables. Why
More informationTopic HashTable and Table ADT
Topic HashTable and Table ADT Hashing, Hash Function & Hashtable Search, Insertion & Deletion of elements based on Keys So far, By comparing keys! Linear data structures Non-linear data structures Time
More informationCS61, Fall 2012 Midterm Review Section
CS61, Fall 2012 Midterm Review Section (10/16/2012) Q1: Hexadecimal and Binary Notation - Solve the following equations and put your answers in hex, decimal and binary. Hexadecimal Decimal Binary 15 +
More information: Principles of Imperative Computation Victor Adamchik. Practice Exam - I
15-122 Practice Exam - I Page 1 of 10 15-122 : Principles of Imperative Computation Victor Adamchik Practice Exam - I Name: Andrew ID: Answer the questions in the space provided following each question.
More informationTime: 8:30-10:00 pm (Arrive at 8:15 pm) Location What to bring:
ECE 120 Midterm 1 HKN Review Session Time: 8:30-10:00 pm (Arrive at 8:15 pm) Location: Your Room on Compass What to bring: icard, pens/pencils, Cheat sheet (Handwritten) Overview of Review Binary IEEE
More informationComputer Science Foundation Exam
Computer Science Foundation Exam January 13, 2018 Section I A DATA STRUCTURES NO books, notes, or calculators may be used, and you must work entirely on your own. Name: UCFID: NID: Question # Max Pts Category
More informationCSE 333 Midterm Exam 2/14/14
Name There are 4 questions worth a total of 100 points. Please budget your time so you get to all of the questions. Keep your answers brief and to the point. The exam is closed book, closed notes, closed
More informationHow much space does this routine use in the worst case for a given n? public static void use_space(int n) { int b; int [] A;
How much space does this routine use in the worst case for a given n? public static void use_space(int n) { int b; int [] A; } if (n
More informationSymbol Table. Symbol table is used widely in many applications. dictionary is a kind of symbol table data dictionary is database management
Hashing Symbol Table Symbol table is used widely in many applications. dictionary is a kind of symbol table data dictionary is database management In general, the following operations are performed on
More informationQuiz 0 Review Session. October 13th, 2014
Quiz 0 Review Session October 13th, 2014 Topics (non-exhaustive) Binary. ASCII. Algorithms. Pseudocode. Source code. Compiler. Object code. Scratch. Statements. Boolean expressions. Conditions. Loops.
More informationComp Sci 1MD3 Mid-Term II 2004 Dr. Jacques Carette
Comp Sci 1MD3 Mid-Term II 2004 Dr. Jacques Carette Name: Student No.: Duration : 50 minutes This midterm contains 18 questions on 4 pages This midterm will be marked out of 50. There are 60 total marks
More informationProgramming and Data Structure Solved. MCQs- Part 2
Programming and Data Structure Solved MCQs- Part 2 Programming and Data Structure Solved MCQs- Part 2 Unsigned integers occupies Two bytes Four bytes One byte Eight byte A weather forecasting computation
More informationECE 242 Data Structures and Algorithms. Hash Tables II. Lecture 25. Prof.
ECE 242 Data Structures and Algorithms http://www.ecs.umass.edu/~polizzi/teaching/ece242/ Hash Tables II Lecture 25 Prof. Eric Polizzi Summary previous lecture Hash Tables Motivation: optimal insertion
More informationCSCE 2014 Final Exam Spring Version A
CSCE 2014 Final Exam Spring 2017 Version A Student Name: Student UAID: Instructions: This is a two-hour exam. Students are allowed one 8.5 by 11 page of study notes. Calculators, cell phones and computers
More informationIntroducing Hashing. Chapter 21. Copyright 2012 by Pearson Education, Inc. All rights reserved
Introducing Hashing Chapter 21 Contents What Is Hashing? Hash Functions Computing Hash Codes Compressing a Hash Code into an Index for the Hash Table A demo of hashing (after) ARRAY insert hash index =
More informationCpt S 223. School of EECS, WSU
Hashing & Hash Tables 1 Overview Hash Table Data Structure : Purpose To support insertion, deletion and search in average-case constant t time Assumption: Order of elements irrelevant ==> data structure
More informationComputer Science Foundation Exam
Computer Science Foundation Exam August 25, 2018 Section I A DATA STRUCTURES SOLUTION NO books, notes, or calculators may be used, and you must work entirely on your own. Name: UCFID: NID: Question # Max
More information! A Hash Table is used to implement a set, ! The table uses a function that maps an. ! The function is called a hash function.
Hash Tables Chapter 20 CS 3358 Summer II 2013 Jill Seaman Sections 201, 202, 203, 204 (not 2042), 205 1 What are hash tables?! A Hash Table is used to implement a set, providing basic operations in constant
More informationECE250: Algorithms and Data Structures Midterm Review
ECE250: Algorithms and Data Structures Midterm Review Ladan Tahvildari, PEng, SMIEEE Associate Professor Software Technologies Applied Research (STAR) Group Dept. of Elect. & Comp. Eng. University of Waterloo
More informationGoals for this Week. CSC 2400: Computer Systems. Bits, Bytes and Data Types. Binary number system. Finite representations of binary integers
CSC 2400: Computer Systems Bits, Bytes and Data Types 1 Goals for this Week Binary number system Why binary? Converting between decimal and binary and octal and hexadecimal number systems Finite representations
More informationCS113: Lecture 9. Topics: Dynamic Allocation. Dynamic Data Structures
CS113: Lecture 9 Topics: Dynamic Allocation Dynamic Data Structures 1 What s wrong with this? char *big_array( char fill ) { char a[1000]; int i; for( i = 0; i < 1000; i++ ) a[i] = fill; return a; void
More informationReg. No. : Question Paper Code : 27157
WK 3 Reg. No. : Question Paper Code : 27157 B.E./B.Tech. DEGREE EXAMINATION, NOVEMBER/DECEMBER 2015. Time : Three hours Second Semester Computer Science and Engineering CS 6202 PROGRAMMING AND DATA STRUCTURES
More informationCOS 226 Algorithms and Data Structures Spring Midterm
COS 226 Algorithms and Data Structures Spring 2015 Midterm This test has 9 questions worth a total of 55 points. You have 0 minutes. The exam is closed book, except that you are allowed to use a one page
More informationCP2 Revision. theme: dynamic datatypes & data structures
CP2 Revision theme: dynamic datatypes & data structures structs can hold any combination of datatypes handled as single entity struct { }; ;
More informationBRONX COMMUNITY COLLEGE of the City University of New York DEPARTMENT OF MATHEMATICS AND COMPUTER SCIENCE. Sample Final Exam
BRONX COMMUNITY COLLEGE of the City University of New York DEPARTMENT OF MATHEMATICS AND COMPUTER SCIENCE CSI33 Sample Final Exam NAME Directions: Solve problems 1 through 5 of Part I and choose 5 of the
More informationQ1 Q2 Q3 Q4 Q5 Q6 Total
Name: SSN: Computer Science Foundation Exam May 5, 006 Computer Science Section 1A Q1 Q Q3 Q4 Q5 Q6 Total KNW KNW KNW ANL,DSN KNW DSN You have to do all the 6 problems in this section of the exam. Partial
More informationData Structures Question Bank Multiple Choice
Section 1. Fundamentals: Complexity, Algorthm Analysis 1. An algorithm solves A single problem or function Multiple problems or functions Has a single programming language implementation 2. A solution
More informationHomework 3 CS161 Computer Security, Fall 2008 Assigned 10/07/08 Due 10/13/08
Homework 3 CS161 Computer Security, Fall 2008 Assigned 10/07/08 Due 10/13/08 For your solutions you should submit a hard copy; either hand written pages stapled together or a print out of a typeset document
More informationUNIVERSITY OF WATERLOO DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING ECE 250 ALGORITHMS AND DATA STRUCTURES
UNIVERSITY OF WATERLOO DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING ECE 250 ALGORITHMS AND DATA STRUCTURES Final Examination Instructor: R.E.Seviora 9-12 AM, Dec 14, 2002 Name (last, first) Student
More informationFundamentals of Programming
Fundamentals of Programming Lecture 3 - Constants, Variables, Data Types, And Operations Lecturer : Ebrahim Jahandar Borrowed from lecturer notes by Omid Jafarinezhad Outline C Program Data types Variables
More informationHash Tables. Hashing Probing Separate Chaining Hash Function
Hash Tables Hashing Probing Separate Chaining Hash Function Introduction In Chapter 4 we saw: linear search O( n ) binary search O( log n ) Can we improve the search operation to achieve better than O(
More informationVariables Data types Variable I/O. C introduction. Variables. Variables 1 / 14
C introduction Variables Variables 1 / 14 Contents Variables Data types Variable I/O Variables 2 / 14 Usage Declaration: t y p e i d e n t i f i e r ; Assignment: i d e n t i f i e r = v a l u e ; Definition
More informationINSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad
INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad -500 043 COMPUTER SCIENCE AND ENGINEERING TUTORIAL QUESTION BANK Course Name : DATA STRUCTURES Course Code : A30502 Class : II B.
More informationData Structures and Algorithms 2018
Question 1 (12 marks) Data Structures and Algorithms 2018 Assignment 4 25% of Continuous Assessment Mark Deadline : 5pm Monday 12 th March, via Canvas Sort the array [5, 3, 4, 6, 8, 4, 1, 9, 7, 1, 2] using
More informationMIDTERM EXAM. CS 217 October 28, Name: Precept: Honor Code: Score: Problem Score Max
MIDTERM EXAM CS 217 October 28, 1999 Name: Precept: Honor Code: Score: Problem Score Max 1 15 2 5 3 10 4 15 5 5 6 10 7 10 Total 70 1 1. Number Systems (a) Translate the following decimal numbers to binary,
More information