Study Union Final Review
|
|
- Britton Henderson
- 6 years ago
- Views:
Transcription
1 University of Central Florida COP 352: Computer Science Study Union Final Review Student Academic Resource Center created by, Chris Marsh April 8, 28
2 Contents Tries 2. Insertion Worst Case Runtime Best Case Runtime Retrieval Worst Case Runtime Best Case Runtime Deletion Worst Case Runtime Best Case Runtime Why Tries? Heaps 8 2. Insertion Worst Case Runtime Best Case Runtime Deletion Worst Case Runtime Best Case Runtime Representation Heapify Hashtables 6 3. Linear Probing Worst Case Runtime Best Case Runtime Average Case Runtime Quadratic Probing Worst Case Runtime Best Case Runtime Average Case Runtime Seperate Chaining Worst Case Runtime Best Case Runtime Average Case Runtime Deletion Number Bases and Base Conversion 22 5 Bitwise Operators 24 6 Two s Complement 25 7 Bitmasks 26 8 Backtracking The Jedi and Clone Troopers Recurrence Relations (Just in case!) 3
3 Tries ) Create a typical trie node struct in C. How can we modify this struct to include other useful information about a string represented in the trie? 2) Given the trie node struct you created in Question, how are strings actually represented in a Trie? Observe the mystical glory that is the trie data structure below. It will be redrawn several times for your convenience c k e t s d o n u t p r f i x a s e o 2
4 c k e t s d o n u t p r f i x a s e o ) What strings are represented in the trie above? How many times does each string occur? 3
5 . Insertion ) Insert the string cake into the trie below. 2) Insert the word yoda into the trie below. 3) Insert the word produce into the trie below. 4) Insert the empty string into the trie below c k e t s d o n u t p r f i x a s e o 4
6 .. Worst Case Runtime What is the worst case runtime for insertion into a trie? Why?..2 Best Case Runtime What is the best case runtime for insertion into a trie? Why?.2 Retrieval.2. Worst Case Runtime What is the worst case runtime for retrieval in a trie? Why?.2.2 Best Case Runtime What is the best case runtime for retrieval in a trie? Why? 5
7 .3 Deletion This is the same trie from the earlier, before you did all of that crazy insertion. c p a d 5 r k t o n o e e 2 s u f i s t 56 8 x ) Delete the string nonexistence from the trie. 2) Delete the string cats from the trie. 3) Delete the string cats from the trie. 4) Delete the string cake from the trie. 5) Delete the string donut from the trie. 6) Delete the empty string from the trie. 6
8 .3. Worst Case Runtime What is the worst case runtime for deletion in a trie? Why?.3.2 Best Case Runtime What is the best case runtime for deletion in a trie? Why?.4 Why Tries? ) What are the benefits of tries? Why use a trie over another data structure like a binary search tree, or an array? 2) What practical applications would you possibly choose a trie data structure for? 7
9 2 Heaps ) What does it mean for a binary tree to be complete? Can you draw some examples? 2) What does it mean for a binary tree to be full? Can you draw some examples? 3) What does it mean for a binary tree to be perfect? Can you draw some examples? 8
10 4) What is the precise height of a complete binary tree with n nodes? 5) What is the structural property for a heap? 6) What is the ordering property for a minheap? 7) What is the ordering property for a maxheap? 8) What operations do heaps support? 9
11 2. Insertion ) Using a maximum of 2 sentences, can you describe the algorithm for insertion into a minheap? ) Insert the value 87 into the minheap above. 3) Insert the value 6 into the minheap above. 4) Insert the value into the minheap above. 2.. Worst Case Runtime What is the worst case runtime for insertion into a heap? Why? 2..2 Best Case Runtime What is the best case runtime for insertion into a heap? Why?
12 2.2 Deletion ) What is the algorithm for deleting arbitrary elements from a heap? 2) What is the algorithm for deleting the root of a minheap? 3) Delete 2 from the heap below. 4) Delete from the heap below
13 5) Delete 3 from the heap below. 6) Delete from the heap below
14 2.2. Worst Case Runtime What is the worst case runtime for deletion from a heap? What assumptions did you make when coming up with this runtime? Can you draw a heap, and insert a value that would cause this runtime? Best Case Runtime What is the best case runtime for deletion from a heap? What assumptions did you make when coming up with this runtime? Can you draw a heap, and insert a value that would cause this runtime? 3
15 2.3 Representation ) How are heaps typically represented in code? (Hint: Do we use node structs like we do with all of the other binary trees you have covered this semester?)
16 2.4 Heapify ) What is the purpose of Heapify? 2) Can you describe the algorithm for heapify in a maximum of 2 sentences? 3) What is the runtime of Heapify? Why? 5
17 3 Hashtables ) Obtain the hash values for the keys using the hash function below. (Keep this page on hand, you will need the keys, and their respective hash values for the next few pages) Keys: 64, 89, 77, 5, 99, 59 int hash(int key, int table_size) { return ((key - 47) * 3) % table_size; } hash(64) = hash(89) = hash(77) = hash(5) = hash(99) = hash(59) = 3. Linear Probing ) Insert the keys above, using the hash values obtained above using linear probing as your collision resolution policy. 6
18 3.. Worst Case Runtime What is the worst case runtime for for insertion and search using linear probing? Why? 3..2 Best Case Runtime What is the best case runtime for for insertion and search using linear probing? Why? 3..3 Average Case Runtime What is the average case runtime for for insertion and search using linear probing? Why? 7
19 3.2 Quadratic Probing ) Insert the keys above, using the hash values obtained above using quadratic probing as your collision resolution policy. 2) What conditions are required to guarantee that quadratic probing will find an empty position in the hash table? 3) Are these conditions required for linear probing for any reason? If not, is there any benefit to fufilling these requirements anyway? 8
20 3.2. Worst Case Runtime What is the worst case runtime for insertion and search using quadratic probing? Why? Best Case Runtime What is the best case runtime for for insertion and search using quadratic probing? Why? Average Case Runtime What is the average case runtime for for insertion and search using quadratic probing? Why? 9
21 3.3 Seperate Chaining ) Insert the keys above, using the hashtable obtained above using seperate chaining as your collision resolution policy. 2) Are the conditions described in the quadratic probing section required for seperate chaining? If not, is there any benefit to fufilling these requirements anyway? 2
22 3.3. Worst Case Runtime What is the worst case runtime for for insertion and search using seperate chaining? Why? Best Case Runtime What is the best case runtime for for insertion and search using seperate chaining? Why? Average Case Runtime What is the average case runtime for for insertion and search using seperate chaining? Why? 3.4 Deletion What are some methods for deletion in a hash table? What can we do to ensure that the deletion operation in our hash table does not interfere with our insertion and search operations? 2
23 4 Number Bases and Base Conversion ) Convert () 2 to base. 2) Convert (63526) 7 to base. 3) Convert (2) 3 to base 5. 22
24 Do the following converstions without using decimal as an intermediary base. Why is this possible? 4) Convert (42763) 8 to base 2. 5) Convert (ef45) 6 to base 2. 6) Convert (5362) 9 to base 3. 7) Convert (22) 3 to base 9. Fun questions about number bases. 8) How many different integers can we represent with 5 digits in base 2? 9) What is the maximum decimal integer that we can we represent with 5 digits in base 2? ) How many different integers can we represent with 3 digits in base 4? ) What is the maximum decimal integer that we can we represent with 3 digits in base 4? ) How many different integers can we represent with k digits in base n? 2) What is the maximum decimal integer that we can we represent with k digits in base n? 23
25 5 Bitwise Operators ) What is the output of each printf() statement in the following program. #include <stdio.h> int main(void) { int c = 5; printf("%d\n", c << 2); printf("%d\n", c); printf("%d\n", 92 << 3); printf("%d\n", c = c << 3); printf("%d\n", c = (~c) + ); printf("%u\n", ~c); printf("%d\n", xfe); printf("%d\n", ); printf("%d\n", 92 & 78); printf("%d\n", 92 78); printf("%d\n", 92 ^ 78); printf("%d\n", ~92); printf("%d\n", ~2); printf("%d\n", ~3); printf("%d\n", ~4); printf("%d\n", ~(-78)); } return ; 24
26 6 Two s Complement ) What is decimal value of the following signed 32-bit numbers, using twos complement? a) b) c) d) e) f) 2) What is the range of positive integer values including the integer than you can make with 32-bit integers, using two s complement? 3) What is the range of negative integer values that you can make with 32-bit integers, using two s complement? 4) Using (2), and (3) above, what is the full range of integer values that you can represent with 32-bit integers, using two s complement? 25
27 7 Bitmasks Observe the code segment below. #define LIGHT_SIDE x #define FORCE_SENSITIVE x2 #define DARTH_VADER x4 #define LIKES_SAND x8 typedef struct StarWarsCharacter { unsigned int attributes; char *name; } StarWarsCharacter; int main(void) { // You can assume that createcharacter() properly allocates memory // for the StarWarsCharacter struct, initializes the attributes member // to, and the name member to the string passed in as an argument StarWarsCharacter *anakin = createcharacter("anakin"); // Assume there is code here that sets the least significant // binary digits of anakin s attributes member to unknown // values, and the rest of the digits are zeros // () // (2) // (3) // (4) } return ; 26
28 Let the integer with the identifier attributes, use the bitmasks as follows: a) If the first bit is, the StarWarsCharacter is on the light side, and not on the lightside otherwise. b) If the second bit is, the StarWarsCharacter is force sensitive, and not force sensitive otherwise. c) If the third bit is, the StarWarsCharacter is Darth Vader, and not Darth Vader otherwise. d) If the fourth bit is, the StarWarsCharacter is likes sand, and does not like sand otherwise. ) Beneath the comment labeled () in the code segment above, using bitwise operators, and the defined bitmasks, write a line of code that will modify the attributes member of the StarWarsCharacter referenced by anakin, such that anakin will be force sensitive. 2) Beneath the comment labeled (2) in the code segment above, using bitwise operators, and the defined bitmasks, write a line of code that will modify the attributes member of the StarWarsCharacter referenced by anakin, such that anakin will be on the Dark Side. 3) Beneath the comment labeled (3) in the code segment above, using bitwise operators, and the defined bitmasks, write a line of code that will modify the attributes member of the StarWarsCharacter referenced by anakin, such that we toggle (what does toggle mean?) the digit that represents whether or not anakin is Darth Vader. 4) Beneath the comment labeled (4) in the code segment above, using bitwise operators, and the defined bitmasks, write a line of code that will modify the attributes member of the StarWarsCharacter referenced by anakin, such that anakin will not like sand. 27
29 8 Backtracking 8. The Jedi and Clone Troopers Using your healthy knowlege of backtracking, construct a tree diagram of states to find a path to a solution to the problem described below. Problem Statement: Three Jedi and three Clone Troopers must cross a river of lava using a transport only big enough to support two people. If on either side of the lava, there are more Clone Troopers than Jedi, than the Clone Troopers will Execute Order 66. The transport cannot cross the river of lava without at least one person on board. The goal is to get all three Jedi, and all three Clone Troopers to the other side of the river of lava such that Order 66 is not executed. Hint: This is a river crossing problem very similar to the Fox, Goose, and Bag of Beans problem covered in class (and even more similar to the Missionaries and Cannibals problem mentioned in Dr. Szumlanski s notes). Make sure you check for infeasible states, and states that you have already seen before! To avoid drawing a potentially explosive state tree (Study Union is short!), it will suffice to find a single repeated state, and a single invalid state. See Figure (a), and Figure (b) for examples on how to draw the states. In general, I will let the symbol J designate a single Jedi, the symbol C will designate a single Clone Trooper, and the rectangle will represent the transport. (a) State where all Jedi, Clone Troopers, and the Transport are North of the river (b) State where Jedi and 3 Clone Troopers are North of the river, while Jedi and the Transport are South of the river. Figure : Jedi and Clone Trooper State Diagram Examples *The next page was intentionally left blank for your tree diagram.* 28
30 29
31 9 Recurrence Relations (Just in case!) Derive a closed form for the following recurrence relation taken Dr. Szumlanski s page More Recursion; Recurrence Relations. T () = T () = c T (n) = n + T (n/2) for n 2 3
32 3
COP Study Union - Fall 2017
COP 3502 - Study Union - Fall 2017 Chris Marsh Contents 1 Tries 3 1.1 Insertion...................................... 4 1.1.1 Worst Case Runtime........................... 4 1.1.2 Best Case Runtime............................
More informationUniversity of Central Florida COP 3502: Computer Science 1
University of Central Florida COP 3502: Computer Science 1 Student Academic Resource Center presents... Computer Science 1 Study Union Review Written by: Soliman Alnaizy Fall 2018 Contents 1 TRIES 2 1.1
More informationCOP 3502 Spring 2018 Study Union Review
Page 1 COP 3502 Spring 2018 Study Union Review Alec May Table of Contents: Tries 2 Heaps 3 Hash Tables 5 Base Conversion 6 Bitwise Operators 7 Backtracking 8 Sorts 9 Linked Lists 10 Tips and Resources
More informationFoundation Exam - Sample Problems for New Topics
Foundation Exam - Sample Problems for New Topics Fall 2016 Dynamic Memory Allocation Sample Question #1 Consider the following struct to store a single Uno playing card: typedef struct char color[20];
More informationComputer Science Foundation Exam
Computer Science Foundation Exam August 26, 2017 Section I A DATA STRUCTURES NO books, notes, or calculators may be used, and you must work entirely on your own. Name: UCFID: NID: Question # Max Pts Category
More informationComputer Science Foundation Exam
Computer Science Foundation Exam December 13, 2013 Section I A COMPUTER SCIENCE NO books, notes, or calculators may be used, and you must work entirely on your own. SOLUTION Question # Max Pts Category
More informationComputer Science Foundation Exam
Computer Science Foundation Exam August 6, 017 Section I A DATA STRUCTURES SOLUTIONS NO books, notes, or calculators may be used, and you must work entirely on your own. Question # Max Pts Category Passing
More informationCSE 332 Spring 2014: Midterm Exam (closed book, closed notes, no calculators)
Name: Email address: Quiz Section: CSE 332 Spring 2014: Midterm Exam (closed book, closed notes, no calculators) Instructions: Read the directions for each question carefully before answering. We will
More informationCSE 332 Spring 2013: Midterm Exam (closed book, closed notes, no calculators)
Name: Email address: Quiz Section: CSE 332 Spring 2013: Midterm Exam (closed book, closed notes, no calculators) Instructions: Read the directions for each question carefully before answering. We will
More informationComputer Science 1 Study Union Practice Problems. What are the arguments to malloc? calloc? realloc? What do they do?
Study Union Review Jacob Cornett 1 Computer Science 1 Study Union Practice Problems!This may not be a comprehensive review of everything that will be on your exam and we may go over more during the session.
More informationCOP 3223 Introduction to Programming with C - Study Union - Fall 2017
COP 3223 Introduction to Programming with C - Study Union - Fall 2017 Chris Marsh and Matthew Villegas Contents 1 Code Tracing 2 2 Pass by Value Functions 4 3 Statically Allocated Arrays 5 3.1 One Dimensional.................................
More informationCSE 332 Autumn 2013: Midterm Exam (closed book, closed notes, no calculators)
Name: Email address: Quiz Section: CSE 332 Autumn 2013: Midterm Exam (closed book, closed notes, no calculators) Instructions: Read the directions for each question carefully before answering. We will
More informationComputer Science Foundation Exam
Computer Science Foundation Exam December 16, 2016 Section I A DATA STRUCTURES NO books, notes, or calculators may be used, and you must work entirely on your own. Name: UCFID: NID: Question # Max Pts
More informationCOP 3223 Introduction to Programming with C - Study Union - Fall 2017
COP 3223 Introduction to Programming with C - Study Union - Fall 2017 Chris Marsh and Matthew Villegas Contents 1 Code Tracing 2 2 Pass by Value Functions 4 3 Statically Allocated Arrays 5 3.1 One Dimensional.................................
More informationCOP 3502 (Computer Science I) Final Exam 12/10/2015. Last Name:, First Name:
COP 3502 (Computer Science I) Final Exam 12/10/2015 Last Name:, First Name: 1) (10 pts) Perform the following base conversions: a) 134710 converted to base 7. b) 45628 converted to base 10. c) 100111010111012
More informationA6-R3: DATA STRUCTURE THROUGH C LANGUAGE
A6-R3: DATA STRUCTURE THROUGH C LANGUAGE NOTE: 1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO contains FIVE questions. 2. PART ONE is to be answered in the TEAR-OFF
More informationComputer Science Foundation Exam
Computer Science Foundation Exam December 16, 2016 Section I A DATA STRUCTURES NO books, notes, or calculators may be used, and you must work entirely on your own. SOLUTION Question # Max Pts Category
More information: Principles of Imperative Computation Victor Adamchik. Practice Exam - I
15-122 Practice Exam - I Page 1 of 10 15-122 : Principles of Imperative Computation Victor Adamchik Practice Exam - I Name: Andrew ID: Answer the questions in the space provided following each question.
More informationA few examples are below. Checking your results in decimal is the easiest way to verify you ve got it correct.
CS107 Handout 22S Spring 2007 May 4, 2007 Assignment 5 Solution Brought to you by Julie Zelenski and Jerry Cain. Problem 1: Binary numbers and bit operations A few examples are below. Checking your results
More informationCOP 3502 (Computer Science I) Test #3: Data Structures Date: 11/1/2013 VERSION A
COP 3502 (Computer Science I) Test #3: Data Structures Date: 11/1/2013 VERSION A Directions: This is a multiple choice test. Each question is worth 5 points. Please choose the most accurate answer listed.
More informationCIS 2107 Computer Systems and Low-Level Programming Fall 2011 Midterm
Fall 2011 Name: Page Points Score 1 5 2 10 3 10 4 7 5 8 6 15 7 4 8 7 9 16 10 18 Total: 100 Instructions The exam is closed book, closed notes. You may not use a calculator, cell phone, etc. For each of
More informationCSE 332: Data Structures & Parallelism Lecture 10:Hashing. Ruth Anderson Autumn 2018
CSE 332: Data Structures & Parallelism Lecture 10:Hashing Ruth Anderson Autumn 2018 Today Dictionaries Hashing 10/19/2018 2 Motivating Hash Tables For dictionary with n key/value pairs insert find delete
More informationTables. The Table ADT is used when information needs to be stored and acessed via a key usually, but not always, a string. For example: Dictionaries
1: Tables Tables The Table ADT is used when information needs to be stored and acessed via a key usually, but not always, a string. For example: Dictionaries Symbol Tables Associative Arrays (eg in awk,
More informationCOP 3223 Introduction to Programming with C - Study Union - Spring 2018
COP 3223 Introduction to Programming with C - Study Union - Spring 2018 Chris Marsh and Matthew Villegas Contents 1 Code Tracing 2 2 Pass by Value Functions 4 3 Statically Allocated Arrays 5 3.1 One Dimensional.................................
More informationCPSC 211, Sections : Data Structures and Implementations, Honors Final Exam May 4, 2001
CPSC 211, Sections 201 203: Data Structures and Implementations, Honors Final Exam May 4, 2001 Name: Section: Instructions: 1. This is a closed book exam. Do not use any notes or books. Do not confer with
More informationMLR Institute of Technology
MLR Institute of Technology Laxma Reddy Avenue, Dundigal, Quthbullapur (M), Hyderabad 500 043 Phone Nos: 08418 204066 / 204088, Fax : 08418 204088 TUTORIAL QUESTION BANK Course Name : DATA STRUCTURES Course
More informationECE264 Fall 2013 Exam 3, November 20, 2013
ECE264 Fall 2013 Exam 3, November 20, 2013 In signing this statement, I hereby certify that the work on this exam is my own and that I have not copied the work of any other student while completing it.
More information2016 Spring COP 3502 Final Exam. Date: 4/28/2016. Name:
2016 Spring COP 3502 Final Exam Date: 4/28/2016 Name: 1) (10 pts) Consider implementing a hash table that stores integers, using the linear probing strategy. Assume that the hash table uses the hash function,
More informationData Structure and Algorithm Homework #3 Due: 1:20pm, Thursday, May 16, 2017 TA === Homework submission instructions ===
Data Structure and Algorithm Homework #3 Due: 1:20pm, Thursday, May 16, 2017 TA email: dsa1@csie.ntu.edu.tw === Homework submission instructions === For Problem 1-3, please put all your solutions in a
More information1. [1 pt] What is the solution to the recurrence T(n) = 2T(n-1) + 1, T(1) = 1
Asymptotics, Recurrence and Basic Algorithms 1. [1 pt] What is the solution to the recurrence T(n) = 2T(n-1) + 1, T(1) = 1 2. O(n) 2. [1 pt] What is the solution to the recurrence T(n) = T(n/2) + n, T(1)
More informationCSL 201 Data Structures Mid-Semester Exam minutes
CL 201 Data tructures Mid-emester Exam - 120 minutes Name: Roll Number: Please read the following instructions carefully This is a closed book, closed notes exam. Calculators are allowed. However laptops
More informationData Structures And Algorithms
Data Structures And Algorithms Hashing Eng. Anis Nazer First Semester 2017-2018 Searching Search: find if a key exists in a given set Searching algorithms: linear (sequential) search binary search Search
More informationCS 104 (Spring 2014) Final Exam 05/09/2014
CS 104 (Spring 2014) Final Exam 05/09/2014 G o o d L u c k Your Name, USC username, and Student ID: This exam has 8 pages and 8 questions. If yours does not, please contact us immediately. Please read
More informationSection 05: Midterm Review
Section 05: Midterm Review 1. Asymptotic Analysis (a) Applying definitions For each of the following, choose a c and n 0 which show f(n) O(g(n)). Explain why your values of c and n 0 work. (i) f(n) = 5000n
More informationYou must include this cover sheet. Either type up the assignment using theory5.tex, or print out this PDF.
15-122 Assignment 5 Page 1 of 11 15-122 : Principles of Imperative Computation Fall 2012 Assignment 5 (Theory Part) Due: Tuesday, October 30, 2012 at the beginning of lecture Name: Andrew ID: Recitation:
More informationFriday Four Square! 4:15PM, Outside Gates
Binary Search Trees Friday Four Square! 4:15PM, Outside Gates Implementing Set On Monday and Wednesday, we saw how to implement the Map and Lexicon, respectively. Let's now turn our attention to the Set.
More informationNET/JRF-COMPUTER SCIENCE & APPLICATIONS. Time: 01 : 00 Hour Date : M.M. : 50
1 NET/JRF-COMPUTER SCIENCE & APPLICATIONS UNIT TEST : DATA STRUCTURE Time: 01 : 00 Hour Date : 02-06-2017 M.M. : 50 INSTRUCTION: Attempt all the 25 questions. Each question carry TWO marks. 1. Consider
More informationComputer Science Foundation Exam
Computer Science Foundation Exam January 12, 2019 Section I A DATA STRUCTURES NO books, notes, or calculators may be used, and you must work entirely on your own. Name: UCFID: NID: Question # Max Pts Category
More informationCSE 373 Autumn 2012: Midterm #2 (closed book, closed notes, NO calculators allowed)
Name: Sample Solution Email address: CSE 373 Autumn 0: Midterm # (closed book, closed notes, NO calculators allowed) Instructions: Read the directions for each question carefully before answering. We may
More informationComputer Science Foundation Exam
Computer Science Foundation Exam August 25, 2018 Section I A DATA STRUCTURES SOLUTION NO books, notes, or calculators may be used, and you must work entirely on your own. Name: UCFID: NID: Question # Max
More informationIntroduction hashing: a technique used for storing and retrieving information as quickly as possible.
Lecture IX: Hashing Introduction hashing: a technique used for storing and retrieving information as quickly as possible. used to perform optimal searches and is useful in implementing symbol tables. Why
More informationSection 1: True / False (1 point each, 15 pts total)
Section : True / False ( point each, pts total) Circle the word TRUE or the word FALSE. If neither is circled, both are circled, or it impossible to tell which is circled, your answer will be considered
More informationFundamentals of Programming
Fundamentals of Programming Lecture 3 - Constants, Variables, Data Types, And Operations Lecturer : Ebrahim Jahandar Borrowed from lecturer notes by Omid Jafarinezhad Outline C Program Data types Variables
More informationSecond Examination Solution
University of Illinois at Urbana-Champaign Department of Computer Science Second Examination Solution CS 225 Data Structures and Software Principles Fall 2007 7p-9p, Thursday, November 8 Name: NetID: Lab
More informationVariables Data types Variable I/O. C introduction. Variables. Variables 1 / 14
C introduction Variables Variables 1 / 14 Contents Variables Data types Variable I/O Variables 2 / 14 Usage Declaration: t y p e i d e n t i f i e r ; Assignment: i d e n t i f i e r = v a l u e ; Definition
More informationDraw the resulting binary search tree. Be sure to show intermediate steps for partial credit (in case your final tree is incorrect).
Problem 1. Binary Search Trees (36 points) a) (12 points) Assume that the following numbers are inserted into an (initially empty) binary search tree in the order shown below (from left to right): 42 36
More informationHashing. 5/1/2006 Algorithm analysis and Design CS 007 BE CS 5th Semester 2
Hashing Hashing A hash function h maps keys of a given type to integers in a fixed interval [0,N-1]. The goal of a hash function is to uniformly disperse keys in the range [0,N-1] 5/1/2006 Algorithm analysis
More informationUniversity of Waterloo Department of Electrical and Computer Engineering ECE 250 Algorithms and Data Structures
University of Waterloo Department of Electrical and Computer Engineering ECE 250 Algorithms and Data Structures Final Examination (17 pages) Instructor: Douglas Harder April 14, 2004 9:00-12:00 Name (last,
More informationSample Examination. Family Name:... Other Names:... Signature:... Student Number:...
Family Name:... Other Names:... Signature:... Student Number:... THE UNIVERSITY OF NEW SOUTH WALES SCHOOL OF COMPUTER SCIENCE AND ENGINEERING Sample Examination COMP1917 Computing 1 EXAM DURATION: 2 HOURS
More informationMidterm Sample Questions. a) What evaluates to FALSE in C? What evaluates to TRUE?
Midterm Syllabus: 1. Number systems a. Signed and unsigned representations b. Conversion between different representations c. Overflow condition 2. C Pointers 3. Dynamic Memory Allocation 4. C Data structures:
More informationMidterm 2 Exam Principles of Imperative Computation. Tuesday 31 st March, This exam is closed-book with one sheet of notes permitted.
Midterm 2 Exam 15-122 Principles of Imperative Computation Tuesday 31 st March, 2015 Name: Andrew ID: Recitation Section: Instructions This exam is closed-book with one sheet of notes permitted. You have
More informationCSE 332 Winter 2015: Midterm Exam (closed book, closed notes, no calculators)
_ UWNetID: Lecture Section: A CSE 332 Winter 2015: Midterm Exam (closed book, closed notes, no calculators) Instructions: Read the directions for each question carefully before answering. We will give
More informationContents of Lecture 3
Contents of Lecture 3 Repetition of matrices double a[3][4]; double* b; double** c; Terminology Linkage Types Conversions Jonas Skeppstedt (js@cs.lth.se) Lecture 3 2014 1 / 33 A global matrix: double a[3][4]
More informationCSE332 Summer 2010: Midterm Exam Sample Solutions
CSE332 Summer 2010: Midterm Exam Sample Solutions Closed notes, closed book; calculator ok. Read the instructions for each problem carefully before answering. Problems vary in point-values, difficulty
More informationDepartment of Computer Science & Engineering Indian Institute of Technology Kharagpur. Practice Sheet #09. Topic: Structures in C Date:
Department of Computer Science & Engineering Indian Institute of Technology Kharagpur Practice Sheet #09 Topic: Structures in C Date: 20-03-2017 2- Which languages necessarily need heap allocation in the
More information15 122: Principles of Imperative Computation. Practice Exam August 4, 2015
15 122: Principles of Imperative Computation Practice Exam August 4, 2015 15-122 Practice Exam Page 2 of 17 1. Fun with C. The following C programs have between 0 and 1 errors in them. If the function
More informationProblem 2 Add the two 2 s complement signed 8-bit values given below, and express your answer in decimal.
Problem 1 Recall the definition of root in project 1. (The declaration of struct entrynode appears below.) struct entrynode * root; Give the type of each of the following expressions. The answer may be
More informationC Programming. Course Outline. C Programming. Code: MBD101. Duration: 10 Hours. Prerequisites:
C Programming Code: MBD101 Duration: 10 Hours Prerequisites: You are a computer science Professional/ graduate student You can execute Linux/UNIX commands You know how to use a text-editing tool You should
More informationComputer Science Foundation Exam
Computer Science Foundation Exam May 19, 2018 Section I A DATA STRUCTURES SOLUTION NO books, notes, or calculators may be used, and you must work entirely on your own. Name: UCFID: NID: Question # Max
More informationINSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad
INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad -500 043 COMPUTER SCIENCE AND ENGINEERING TUTORIAL QUESTION BANK Course Name : DATA STRUCTURES Course Code : A30502 Class : II B.
More informationFinal Examination CSE 100 UCSD (Practice)
Final Examination UCSD (Practice) RULES: 1. Don t start the exam until the instructor says to. 2. This is a closed-book, closed-notes, no-calculator exam. Don t refer to any materials other than the exam
More informationCS301 - Data Structures Glossary By
CS301 - Data Structures Glossary By Abstract Data Type : A set of data values and associated operations that are precisely specified independent of any particular implementation. Also known as ADT Algorithm
More informationUNIT III BALANCED SEARCH TREES AND INDEXING
UNIT III BALANCED SEARCH TREES AND INDEXING OBJECTIVE The implementation of hash tables is frequently called hashing. Hashing is a technique used for performing insertions, deletions and finds in constant
More informationYou must print this PDF and write your answers neatly by hand. You should hand in the assignment before recitation begins.
15-122 Homework 4 Page 1 of 13 15-122 : Principles of Imperative Computation, Summer 1 2014 Written Homework 4 Due: Thursday, June 12 before recitation Name: Andrew ID: Recitation: In this assignment,
More informationCSE 333 Midterm Exam 2/14/14
Name There are 4 questions worth a total of 100 points. Please budget your time so you get to all of the questions. Keep your answers brief and to the point. The exam is closed book, closed notes, closed
More informationExam Principles of Imperative Computation, Summer 2011 William Lovas. June 24, 2011
Exam 3 15-122 Principles of Imperative Computation, Summer 2011 William Lovas June 24, 2011 Name: Sample Solution Andrew ID: wlovas Instructions This exam is closed-book with one double-sided sheet of
More information11 'e' 'x' 'e' 'm' 'p' 'l' 'i' 'f' 'i' 'e' 'd' bool equal(const unsigned char pstr[], const char *cstr) {
This document contains the questions and solutions to the CS107 midterm given in Spring 2016 by instructors Julie Zelenski and Michael Chang. This was an 80-minute exam. Midterm questions Problem 1: C-strings
More informationCSE 351: The Hardware/Software Interface. Section 2 Integer representations, two s complement, and bitwise operators
CSE 351: The Hardware/Software Interface Section 2 Integer representations, two s complement, and bitwise operators Integer representations In addition to decimal notation, it s important to be able to
More information(b) If a heap has n elements, what s the height of the tree?
CISC 5835 Algorithms for Big Data Fall, 2018 Homework Assignment #4 1 Answer the following questions about binary tree and heap: (a) For a complete binary tree of height 4 (we consider a tree with just
More informationFundamental of Programming (C)
Borrowed from lecturer notes by Omid Jafarinezhad Fundamental of Programming (C) Lecturer: Vahid Khodabakhshi Lecture 3 Constants, Variables, Data Types, And Operations Department of Computer Engineering
More informationBRONX COMMUNITY COLLEGE of the City University of New York DEPARTMENT OF MATHEMATICS AND COMPUTER SCIENCE. Sample Final Exam
BRONX COMMUNITY COLLEGE of the City University of New York DEPARTMENT OF MATHEMATICS AND COMPUTER SCIENCE CSI33 Sample Final Exam NAME Directions: Solve problems 1 through 5 of Part I and choose 5 of the
More informationESC101N: Fundamentals of Computing End-sem st semester
ESC101N: Fundamentals of Computing End-sem 2010-11 1st semester Instructor: Arnab Bhattacharya 8:00-11:00am, 15th November, 2010 Instructions 1. Please write your name, roll number and section below. 2.
More informationExam Principles of Imperative Computation, Summer 2011 William Lovas. June 24, 2011
Exam 3 15-122 Principles of Imperative Computation, Summer 2011 William Lovas June 24, 2011 Name: Andrew ID: Instructions This exam is closed-book with one double-sided sheet of notes permitted. You have
More informationCS 61B Summer 2005 (Porter) Midterm 2 July 21, SOLUTIONS. Do not open until told to begin
CS 61B Summer 2005 (Porter) Midterm 2 July 21, 2005 - SOLUTIONS Do not open until told to begin This exam is CLOSED BOOK, but you may use 1 letter-sized page of notes that you have created. Problem 0:
More informationReg. No. : Question Paper Code : 27157
WK 3 Reg. No. : Question Paper Code : 27157 B.E./B.Tech. DEGREE EXAMINATION, NOVEMBER/DECEMBER 2015. Time : Three hours Second Semester Computer Science and Engineering CS 6202 PROGRAMMING AND DATA STRUCTURES
More informationSection Notes - Week 1 (9/17)
Section Notes - Week 1 (9/17) Why do we need to learn bits and bitwise arithmetic? Since this class is about learning about how computers work. For most of the rest of the semester, you do not have to
More informationCS Programming In C
CS 24000 - Programming In C Week Two: Basic C Program Organization and Data Types Zhiyuan Li Department of Computer Science Purdue University, USA 2 int main() { } return 0; The Simplest C Program C programs
More informationCS300 Final Review Questions 1
CS300 Final Review Questions 1 This is not a complete list of questions and topics, but a good sampling of questions that will help you study for the final. I strongly advise you to work through every
More informationCSE 373 Winter 2009: Midterm #1 (closed book, closed notes, NO calculators allowed)
Name: Email address: CSE 373 Winter 2009: Midterm #1 (closed book, closed notes, NO calculators allowed) Instructions: Read the directions for each question carefully before answering. We may give partial
More informationCS 112 Final May 8, 2008 (Lightly edited for 2012 Practice) Name: BU ID: Instructions
CS 112 Final May 8, 2008 (Lightly edited for 2012 Practice) Name: BU ID: This exam is CLOSED book and notes. Instructions The exam consists of six questions on 11 pages. Please answer all questions on
More information200 points total. Start early! Update March 27: Problem 2 updated, Problem 8 is now a study problem.
CS3410 Spring 2014 Problem Set 2, due Saturday, April 19, 11:59 PM NetID: Name: 200 points total. Start early! Update March 27: Problem 2 updated, Problem 8 is now a study problem. Problem 1 Data Hazards
More informationYork University AK/ITEC INTRODUCTION TO DATA STRUCTURES. Final Sample II. Examiner: S. Chen Duration: Three hours
York University AK/ITEC 262 3. INTRODUCTION TO DATA STRUCTURES Final Sample II Examiner: S. Chen Duration: Three hours This exam is closed textbook(s) and closed notes. Use of any electronic device (e.g.
More informationSubject: PROBLEM SOLVING THROUGH C Time: 3 Hours Max. Marks: 100
Code: DC-05 Subject: PROBLEM SOLVING THROUGH C Time: 3 Hours Max. Marks: 100 NOTE: There are 11 Questions in all. Question 1 is compulsory and carries 16 marks. Answer to Q. 1. must be written in the space
More informationGoals for this Week. CSC 2400: Computer Systems. Bits, Bytes and Data Types. Binary number system. Finite representations of binary integers
CSC 2400: Computer Systems Bits, Bytes and Data Types 1 Goals for this Week Binary number system Why binary? Converting between decimal and binary and octal and hexadecimal number systems Finite representations
More informationComputer Organization & Systems Exam I Example Questions
Computer Organization & Systems Exam I Example Questions 1. Pointer Question. Write a function char *circle(char *str) that receives a character pointer (which points to an array that is in standard C
More informationCPSC 331 Term Test #2 March 26, 2007
CPSC 331 Term Test #2 March 26, 2007 Name: Please DO NOT write your ID number on this page. Instructions: Answer all questions in the space provided. Point form answers are acceptable if complete enough
More informationPractice final for EECS 380, 2001: Prof Markov
Practice final for EECS 380, 2001: Prof Markov Available in Postscript and PDF Total pages: 5 Exam duration: 1hr 50min. Write your name and uniqname on every sheet, including the cover. Maximum score:
More informationECE 250 Algorithms and Data Structures
ECE 250 Algorithms and Data Structures Sections 001 and 002 FINAL EXAMINATION Douglas Wilhelm Harder dwharder@uwaterloo.ca EIT 4018 x37023 2015-4-15T16:00/18:30 Rooms: PAC 6, 7 IF YOU ARE NOT ENROLLED
More informationOutline. hash tables hash functions open addressing chained hashing
Outline hash tables hash functions open addressing chained hashing 1 hashing hash browns: mixed-up bits of potatoes, cooked together hashing: slicing up and mixing together a hash function takes a larger,
More informationSymbol Table. Symbol table is used widely in many applications. dictionary is a kind of symbol table data dictionary is database management
Hashing Symbol Table Symbol table is used widely in many applications. dictionary is a kind of symbol table data dictionary is database management In general, the following operations are performed on
More informationModule Contact: Dr Geoff McKeown, CMP Copyright of the University of East Anglia Version 1
UNIVERSITY OF EAST ANGLIA School of Computing Sciences Main Series UG Examination 2015-16 DATA STRUCTURES AND ALGORITHMS CMP-5014Y Time allowed: 3 hours Section A (Attempt any 4 questions: 60 marks) Section
More informationCS & IT Conversions. Magnitude 10,000 1,
CS & IT Conversions There are several number systems that you will use when working with computers. These include decimal, binary, octal, and hexadecimal. Knowing how to convert between these number systems
More informationCS 2301 Exam 3 B-Term 2011
NAME: CS 2301 Exam 3 B-Term 2011 Questions 1-3: (15) Question 4: (15) Question 5: (20) Question 6: (10) Question 7: (15) Question 8: (15) Question 9: (10) TOTAL: (100) You may refer to one sheet of notes
More informationa) Do exercise (5th Edition Patterson & Hennessy). Note: Branches are calculated in the execution stage.
CS3410 Spring 2015 Problem Set 2 (version 3) Due Saturday, April 25, 11:59 PM (Due date for Problem-5 is April 20, 11:59 PM) NetID: Name: 200 points total. Start early! This is a big problem set. Problem
More informationCOSC160: Data Structures Hashing Structures. Jeremy Bolton, PhD Assistant Teaching Professor
COSC160: Data Structures Hashing Structures Jeremy Bolton, PhD Assistant Teaching Professor Outline I. Hashing Structures I. Motivation and Review II. Hash Functions III. HashTables I. Implementations
More informationQuiz 0 Review Session. October 13th, 2014
Quiz 0 Review Session October 13th, 2014 Topics (non-exhaustive) Binary. ASCII. Algorithms. Pseudocode. Source code. Compiler. Object code. Scratch. Statements. Boolean expressions. Conditions. Loops.
More informationTime: 8:30-10:00 pm (Arrive at 8:15 pm) Location What to bring:
ECE 120 Midterm 1 HKN Review Session Time: 8:30-10:00 pm (Arrive at 8:15 pm) Location: Your Room on Compass What to bring: icard, pens/pencils, Cheat sheet (Handwritten) Overview of Review Binary IEEE
More informationTopic HashTable and Table ADT
Topic HashTable and Table ADT Hashing, Hash Function & Hashtable Search, Insertion & Deletion of elements based on Keys So far, By comparing keys! Linear data structures Non-linear data structures Time
More informationModule 2: Classical Algorithm Design Techniques
Module 2: Classical Algorithm Design Techniques Dr. Natarajan Meghanathan Associate Professor of Computer Science Jackson State University Jackson, MS 39217 E-mail: natarajan.meghanathan@jsums.edu Module
More informationDo not turn this page until you have received the signal to start. In the meantime, please read the instructions below carefully.
UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING FINAL EXAMINATION, APRIL 2017 CSC 190 HIS - COMPUTER ALGORITHMS AND DATA STRUCTURES Exam Type: A NO calculator allowed Duration: 2.5 hours
More information