Study Union Final Review

Size: px
Start display at page:

Download "Study Union Final Review"

Transcription

1 University of Central Florida COP 352: Computer Science Study Union Final Review Student Academic Resource Center created by, Chris Marsh April 8, 28

2 Contents Tries 2. Insertion Worst Case Runtime Best Case Runtime Retrieval Worst Case Runtime Best Case Runtime Deletion Worst Case Runtime Best Case Runtime Why Tries? Heaps 8 2. Insertion Worst Case Runtime Best Case Runtime Deletion Worst Case Runtime Best Case Runtime Representation Heapify Hashtables 6 3. Linear Probing Worst Case Runtime Best Case Runtime Average Case Runtime Quadratic Probing Worst Case Runtime Best Case Runtime Average Case Runtime Seperate Chaining Worst Case Runtime Best Case Runtime Average Case Runtime Deletion Number Bases and Base Conversion 22 5 Bitwise Operators 24 6 Two s Complement 25 7 Bitmasks 26 8 Backtracking The Jedi and Clone Troopers Recurrence Relations (Just in case!) 3

3 Tries ) Create a typical trie node struct in C. How can we modify this struct to include other useful information about a string represented in the trie? 2) Given the trie node struct you created in Question, how are strings actually represented in a Trie? Observe the mystical glory that is the trie data structure below. It will be redrawn several times for your convenience c k e t s d o n u t p r f i x a s e o 2

4 c k e t s d o n u t p r f i x a s e o ) What strings are represented in the trie above? How many times does each string occur? 3

5 . Insertion ) Insert the string cake into the trie below. 2) Insert the word yoda into the trie below. 3) Insert the word produce into the trie below. 4) Insert the empty string into the trie below c k e t s d o n u t p r f i x a s e o 4

6 .. Worst Case Runtime What is the worst case runtime for insertion into a trie? Why?..2 Best Case Runtime What is the best case runtime for insertion into a trie? Why?.2 Retrieval.2. Worst Case Runtime What is the worst case runtime for retrieval in a trie? Why?.2.2 Best Case Runtime What is the best case runtime for retrieval in a trie? Why? 5

7 .3 Deletion This is the same trie from the earlier, before you did all of that crazy insertion. c p a d 5 r k t o n o e e 2 s u f i s t 56 8 x ) Delete the string nonexistence from the trie. 2) Delete the string cats from the trie. 3) Delete the string cats from the trie. 4) Delete the string cake from the trie. 5) Delete the string donut from the trie. 6) Delete the empty string from the trie. 6

8 .3. Worst Case Runtime What is the worst case runtime for deletion in a trie? Why?.3.2 Best Case Runtime What is the best case runtime for deletion in a trie? Why?.4 Why Tries? ) What are the benefits of tries? Why use a trie over another data structure like a binary search tree, or an array? 2) What practical applications would you possibly choose a trie data structure for? 7

9 2 Heaps ) What does it mean for a binary tree to be complete? Can you draw some examples? 2) What does it mean for a binary tree to be full? Can you draw some examples? 3) What does it mean for a binary tree to be perfect? Can you draw some examples? 8

10 4) What is the precise height of a complete binary tree with n nodes? 5) What is the structural property for a heap? 6) What is the ordering property for a minheap? 7) What is the ordering property for a maxheap? 8) What operations do heaps support? 9

11 2. Insertion ) Using a maximum of 2 sentences, can you describe the algorithm for insertion into a minheap? ) Insert the value 87 into the minheap above. 3) Insert the value 6 into the minheap above. 4) Insert the value into the minheap above. 2.. Worst Case Runtime What is the worst case runtime for insertion into a heap? Why? 2..2 Best Case Runtime What is the best case runtime for insertion into a heap? Why?

12 2.2 Deletion ) What is the algorithm for deleting arbitrary elements from a heap? 2) What is the algorithm for deleting the root of a minheap? 3) Delete 2 from the heap below. 4) Delete from the heap below

13 5) Delete 3 from the heap below. 6) Delete from the heap below

14 2.2. Worst Case Runtime What is the worst case runtime for deletion from a heap? What assumptions did you make when coming up with this runtime? Can you draw a heap, and insert a value that would cause this runtime? Best Case Runtime What is the best case runtime for deletion from a heap? What assumptions did you make when coming up with this runtime? Can you draw a heap, and insert a value that would cause this runtime? 3

15 2.3 Representation ) How are heaps typically represented in code? (Hint: Do we use node structs like we do with all of the other binary trees you have covered this semester?)

16 2.4 Heapify ) What is the purpose of Heapify? 2) Can you describe the algorithm for heapify in a maximum of 2 sentences? 3) What is the runtime of Heapify? Why? 5

17 3 Hashtables ) Obtain the hash values for the keys using the hash function below. (Keep this page on hand, you will need the keys, and their respective hash values for the next few pages) Keys: 64, 89, 77, 5, 99, 59 int hash(int key, int table_size) { return ((key - 47) * 3) % table_size; } hash(64) = hash(89) = hash(77) = hash(5) = hash(99) = hash(59) = 3. Linear Probing ) Insert the keys above, using the hash values obtained above using linear probing as your collision resolution policy. 6

18 3.. Worst Case Runtime What is the worst case runtime for for insertion and search using linear probing? Why? 3..2 Best Case Runtime What is the best case runtime for for insertion and search using linear probing? Why? 3..3 Average Case Runtime What is the average case runtime for for insertion and search using linear probing? Why? 7

19 3.2 Quadratic Probing ) Insert the keys above, using the hash values obtained above using quadratic probing as your collision resolution policy. 2) What conditions are required to guarantee that quadratic probing will find an empty position in the hash table? 3) Are these conditions required for linear probing for any reason? If not, is there any benefit to fufilling these requirements anyway? 8

20 3.2. Worst Case Runtime What is the worst case runtime for insertion and search using quadratic probing? Why? Best Case Runtime What is the best case runtime for for insertion and search using quadratic probing? Why? Average Case Runtime What is the average case runtime for for insertion and search using quadratic probing? Why? 9

21 3.3 Seperate Chaining ) Insert the keys above, using the hashtable obtained above using seperate chaining as your collision resolution policy. 2) Are the conditions described in the quadratic probing section required for seperate chaining? If not, is there any benefit to fufilling these requirements anyway? 2

22 3.3. Worst Case Runtime What is the worst case runtime for for insertion and search using seperate chaining? Why? Best Case Runtime What is the best case runtime for for insertion and search using seperate chaining? Why? Average Case Runtime What is the average case runtime for for insertion and search using seperate chaining? Why? 3.4 Deletion What are some methods for deletion in a hash table? What can we do to ensure that the deletion operation in our hash table does not interfere with our insertion and search operations? 2

23 4 Number Bases and Base Conversion ) Convert () 2 to base. 2) Convert (63526) 7 to base. 3) Convert (2) 3 to base 5. 22

24 Do the following converstions without using decimal as an intermediary base. Why is this possible? 4) Convert (42763) 8 to base 2. 5) Convert (ef45) 6 to base 2. 6) Convert (5362) 9 to base 3. 7) Convert (22) 3 to base 9. Fun questions about number bases. 8) How many different integers can we represent with 5 digits in base 2? 9) What is the maximum decimal integer that we can we represent with 5 digits in base 2? ) How many different integers can we represent with 3 digits in base 4? ) What is the maximum decimal integer that we can we represent with 3 digits in base 4? ) How many different integers can we represent with k digits in base n? 2) What is the maximum decimal integer that we can we represent with k digits in base n? 23

25 5 Bitwise Operators ) What is the output of each printf() statement in the following program. #include <stdio.h> int main(void) { int c = 5; printf("%d\n", c << 2); printf("%d\n", c); printf("%d\n", 92 << 3); printf("%d\n", c = c << 3); printf("%d\n", c = (~c) + ); printf("%u\n", ~c); printf("%d\n", xfe); printf("%d\n", ); printf("%d\n", 92 & 78); printf("%d\n", 92 78); printf("%d\n", 92 ^ 78); printf("%d\n", ~92); printf("%d\n", ~2); printf("%d\n", ~3); printf("%d\n", ~4); printf("%d\n", ~(-78)); } return ; 24

26 6 Two s Complement ) What is decimal value of the following signed 32-bit numbers, using twos complement? a) b) c) d) e) f) 2) What is the range of positive integer values including the integer than you can make with 32-bit integers, using two s complement? 3) What is the range of negative integer values that you can make with 32-bit integers, using two s complement? 4) Using (2), and (3) above, what is the full range of integer values that you can represent with 32-bit integers, using two s complement? 25

27 7 Bitmasks Observe the code segment below. #define LIGHT_SIDE x #define FORCE_SENSITIVE x2 #define DARTH_VADER x4 #define LIKES_SAND x8 typedef struct StarWarsCharacter { unsigned int attributes; char *name; } StarWarsCharacter; int main(void) { // You can assume that createcharacter() properly allocates memory // for the StarWarsCharacter struct, initializes the attributes member // to, and the name member to the string passed in as an argument StarWarsCharacter *anakin = createcharacter("anakin"); // Assume there is code here that sets the least significant // binary digits of anakin s attributes member to unknown // values, and the rest of the digits are zeros // () // (2) // (3) // (4) } return ; 26

28 Let the integer with the identifier attributes, use the bitmasks as follows: a) If the first bit is, the StarWarsCharacter is on the light side, and not on the lightside otherwise. b) If the second bit is, the StarWarsCharacter is force sensitive, and not force sensitive otherwise. c) If the third bit is, the StarWarsCharacter is Darth Vader, and not Darth Vader otherwise. d) If the fourth bit is, the StarWarsCharacter is likes sand, and does not like sand otherwise. ) Beneath the comment labeled () in the code segment above, using bitwise operators, and the defined bitmasks, write a line of code that will modify the attributes member of the StarWarsCharacter referenced by anakin, such that anakin will be force sensitive. 2) Beneath the comment labeled (2) in the code segment above, using bitwise operators, and the defined bitmasks, write a line of code that will modify the attributes member of the StarWarsCharacter referenced by anakin, such that anakin will be on the Dark Side. 3) Beneath the comment labeled (3) in the code segment above, using bitwise operators, and the defined bitmasks, write a line of code that will modify the attributes member of the StarWarsCharacter referenced by anakin, such that we toggle (what does toggle mean?) the digit that represents whether or not anakin is Darth Vader. 4) Beneath the comment labeled (4) in the code segment above, using bitwise operators, and the defined bitmasks, write a line of code that will modify the attributes member of the StarWarsCharacter referenced by anakin, such that anakin will not like sand. 27

29 8 Backtracking 8. The Jedi and Clone Troopers Using your healthy knowlege of backtracking, construct a tree diagram of states to find a path to a solution to the problem described below. Problem Statement: Three Jedi and three Clone Troopers must cross a river of lava using a transport only big enough to support two people. If on either side of the lava, there are more Clone Troopers than Jedi, than the Clone Troopers will Execute Order 66. The transport cannot cross the river of lava without at least one person on board. The goal is to get all three Jedi, and all three Clone Troopers to the other side of the river of lava such that Order 66 is not executed. Hint: This is a river crossing problem very similar to the Fox, Goose, and Bag of Beans problem covered in class (and even more similar to the Missionaries and Cannibals problem mentioned in Dr. Szumlanski s notes). Make sure you check for infeasible states, and states that you have already seen before! To avoid drawing a potentially explosive state tree (Study Union is short!), it will suffice to find a single repeated state, and a single invalid state. See Figure (a), and Figure (b) for examples on how to draw the states. In general, I will let the symbol J designate a single Jedi, the symbol C will designate a single Clone Trooper, and the rectangle will represent the transport. (a) State where all Jedi, Clone Troopers, and the Transport are North of the river (b) State where Jedi and 3 Clone Troopers are North of the river, while Jedi and the Transport are South of the river. Figure : Jedi and Clone Trooper State Diagram Examples *The next page was intentionally left blank for your tree diagram.* 28

30 29

31 9 Recurrence Relations (Just in case!) Derive a closed form for the following recurrence relation taken Dr. Szumlanski s page More Recursion; Recurrence Relations. T () = T () = c T (n) = n + T (n/2) for n 2 3

32 3

COP Study Union - Fall 2017

COP Study Union - Fall 2017 COP 3502 - Study Union - Fall 2017 Chris Marsh Contents 1 Tries 3 1.1 Insertion...................................... 4 1.1.1 Worst Case Runtime........................... 4 1.1.2 Best Case Runtime............................

More information

University of Central Florida COP 3502: Computer Science 1

University of Central Florida COP 3502: Computer Science 1 University of Central Florida COP 3502: Computer Science 1 Student Academic Resource Center presents... Computer Science 1 Study Union Review Written by: Soliman Alnaizy Fall 2018 Contents 1 TRIES 2 1.1

More information

COP 3502 Spring 2018 Study Union Review

COP 3502 Spring 2018 Study Union Review Page 1 COP 3502 Spring 2018 Study Union Review Alec May Table of Contents: Tries 2 Heaps 3 Hash Tables 5 Base Conversion 6 Bitwise Operators 7 Backtracking 8 Sorts 9 Linked Lists 10 Tips and Resources

More information

Foundation Exam - Sample Problems for New Topics

Foundation Exam - Sample Problems for New Topics Foundation Exam - Sample Problems for New Topics Fall 2016 Dynamic Memory Allocation Sample Question #1 Consider the following struct to store a single Uno playing card: typedef struct char color[20];

More information

Computer Science Foundation Exam

Computer Science Foundation Exam Computer Science Foundation Exam August 26, 2017 Section I A DATA STRUCTURES NO books, notes, or calculators may be used, and you must work entirely on your own. Name: UCFID: NID: Question # Max Pts Category

More information

Computer Science Foundation Exam

Computer Science Foundation Exam Computer Science Foundation Exam December 13, 2013 Section I A COMPUTER SCIENCE NO books, notes, or calculators may be used, and you must work entirely on your own. SOLUTION Question # Max Pts Category

More information

Computer Science Foundation Exam

Computer Science Foundation Exam Computer Science Foundation Exam August 6, 017 Section I A DATA STRUCTURES SOLUTIONS NO books, notes, or calculators may be used, and you must work entirely on your own. Question # Max Pts Category Passing

More information

CSE 332 Spring 2014: Midterm Exam (closed book, closed notes, no calculators)

CSE 332 Spring 2014: Midterm Exam (closed book, closed notes, no calculators) Name: Email address: Quiz Section: CSE 332 Spring 2014: Midterm Exam (closed book, closed notes, no calculators) Instructions: Read the directions for each question carefully before answering. We will

More information

CSE 332 Spring 2013: Midterm Exam (closed book, closed notes, no calculators)

CSE 332 Spring 2013: Midterm Exam (closed book, closed notes, no calculators) Name: Email address: Quiz Section: CSE 332 Spring 2013: Midterm Exam (closed book, closed notes, no calculators) Instructions: Read the directions for each question carefully before answering. We will

More information

Computer Science 1 Study Union Practice Problems. What are the arguments to malloc? calloc? realloc? What do they do?

Computer Science 1 Study Union Practice Problems. What are the arguments to malloc? calloc? realloc? What do they do? Study Union Review Jacob Cornett 1 Computer Science 1 Study Union Practice Problems!This may not be a comprehensive review of everything that will be on your exam and we may go over more during the session.

More information

COP 3223 Introduction to Programming with C - Study Union - Fall 2017

COP 3223 Introduction to Programming with C - Study Union - Fall 2017 COP 3223 Introduction to Programming with C - Study Union - Fall 2017 Chris Marsh and Matthew Villegas Contents 1 Code Tracing 2 2 Pass by Value Functions 4 3 Statically Allocated Arrays 5 3.1 One Dimensional.................................

More information

CSE 332 Autumn 2013: Midterm Exam (closed book, closed notes, no calculators)

CSE 332 Autumn 2013: Midterm Exam (closed book, closed notes, no calculators) Name: Email address: Quiz Section: CSE 332 Autumn 2013: Midterm Exam (closed book, closed notes, no calculators) Instructions: Read the directions for each question carefully before answering. We will

More information

Computer Science Foundation Exam

Computer Science Foundation Exam Computer Science Foundation Exam December 16, 2016 Section I A DATA STRUCTURES NO books, notes, or calculators may be used, and you must work entirely on your own. Name: UCFID: NID: Question # Max Pts

More information

COP 3223 Introduction to Programming with C - Study Union - Fall 2017

COP 3223 Introduction to Programming with C - Study Union - Fall 2017 COP 3223 Introduction to Programming with C - Study Union - Fall 2017 Chris Marsh and Matthew Villegas Contents 1 Code Tracing 2 2 Pass by Value Functions 4 3 Statically Allocated Arrays 5 3.1 One Dimensional.................................

More information

COP 3502 (Computer Science I) Final Exam 12/10/2015. Last Name:, First Name:

COP 3502 (Computer Science I) Final Exam 12/10/2015. Last Name:, First Name: COP 3502 (Computer Science I) Final Exam 12/10/2015 Last Name:, First Name: 1) (10 pts) Perform the following base conversions: a) 134710 converted to base 7. b) 45628 converted to base 10. c) 100111010111012

More information

A6-R3: DATA STRUCTURE THROUGH C LANGUAGE

A6-R3: DATA STRUCTURE THROUGH C LANGUAGE A6-R3: DATA STRUCTURE THROUGH C LANGUAGE NOTE: 1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO contains FIVE questions. 2. PART ONE is to be answered in the TEAR-OFF

More information

Computer Science Foundation Exam

Computer Science Foundation Exam Computer Science Foundation Exam December 16, 2016 Section I A DATA STRUCTURES NO books, notes, or calculators may be used, and you must work entirely on your own. SOLUTION Question # Max Pts Category

More information

: Principles of Imperative Computation Victor Adamchik. Practice Exam - I

: Principles of Imperative Computation Victor Adamchik. Practice Exam - I 15-122 Practice Exam - I Page 1 of 10 15-122 : Principles of Imperative Computation Victor Adamchik Practice Exam - I Name: Andrew ID: Answer the questions in the space provided following each question.

More information

A few examples are below. Checking your results in decimal is the easiest way to verify you ve got it correct.

A few examples are below. Checking your results in decimal is the easiest way to verify you ve got it correct. CS107 Handout 22S Spring 2007 May 4, 2007 Assignment 5 Solution Brought to you by Julie Zelenski and Jerry Cain. Problem 1: Binary numbers and bit operations A few examples are below. Checking your results

More information

COP 3502 (Computer Science I) Test #3: Data Structures Date: 11/1/2013 VERSION A

COP 3502 (Computer Science I) Test #3: Data Structures Date: 11/1/2013 VERSION A COP 3502 (Computer Science I) Test #3: Data Structures Date: 11/1/2013 VERSION A Directions: This is a multiple choice test. Each question is worth 5 points. Please choose the most accurate answer listed.

More information

CIS 2107 Computer Systems and Low-Level Programming Fall 2011 Midterm

CIS 2107 Computer Systems and Low-Level Programming Fall 2011 Midterm Fall 2011 Name: Page Points Score 1 5 2 10 3 10 4 7 5 8 6 15 7 4 8 7 9 16 10 18 Total: 100 Instructions The exam is closed book, closed notes. You may not use a calculator, cell phone, etc. For each of

More information

CSE 332: Data Structures & Parallelism Lecture 10:Hashing. Ruth Anderson Autumn 2018

CSE 332: Data Structures & Parallelism Lecture 10:Hashing. Ruth Anderson Autumn 2018 CSE 332: Data Structures & Parallelism Lecture 10:Hashing Ruth Anderson Autumn 2018 Today Dictionaries Hashing 10/19/2018 2 Motivating Hash Tables For dictionary with n key/value pairs insert find delete

More information

Tables. The Table ADT is used when information needs to be stored and acessed via a key usually, but not always, a string. For example: Dictionaries

Tables. The Table ADT is used when information needs to be stored and acessed via a key usually, but not always, a string. For example: Dictionaries 1: Tables Tables The Table ADT is used when information needs to be stored and acessed via a key usually, but not always, a string. For example: Dictionaries Symbol Tables Associative Arrays (eg in awk,

More information

COP 3223 Introduction to Programming with C - Study Union - Spring 2018

COP 3223 Introduction to Programming with C - Study Union - Spring 2018 COP 3223 Introduction to Programming with C - Study Union - Spring 2018 Chris Marsh and Matthew Villegas Contents 1 Code Tracing 2 2 Pass by Value Functions 4 3 Statically Allocated Arrays 5 3.1 One Dimensional.................................

More information

CPSC 211, Sections : Data Structures and Implementations, Honors Final Exam May 4, 2001

CPSC 211, Sections : Data Structures and Implementations, Honors Final Exam May 4, 2001 CPSC 211, Sections 201 203: Data Structures and Implementations, Honors Final Exam May 4, 2001 Name: Section: Instructions: 1. This is a closed book exam. Do not use any notes or books. Do not confer with

More information

MLR Institute of Technology

MLR Institute of Technology MLR Institute of Technology Laxma Reddy Avenue, Dundigal, Quthbullapur (M), Hyderabad 500 043 Phone Nos: 08418 204066 / 204088, Fax : 08418 204088 TUTORIAL QUESTION BANK Course Name : DATA STRUCTURES Course

More information

ECE264 Fall 2013 Exam 3, November 20, 2013

ECE264 Fall 2013 Exam 3, November 20, 2013 ECE264 Fall 2013 Exam 3, November 20, 2013 In signing this statement, I hereby certify that the work on this exam is my own and that I have not copied the work of any other student while completing it.

More information

2016 Spring COP 3502 Final Exam. Date: 4/28/2016. Name:

2016 Spring COP 3502 Final Exam. Date: 4/28/2016. Name: 2016 Spring COP 3502 Final Exam Date: 4/28/2016 Name: 1) (10 pts) Consider implementing a hash table that stores integers, using the linear probing strategy. Assume that the hash table uses the hash function,

More information

Data Structure and Algorithm Homework #3 Due: 1:20pm, Thursday, May 16, 2017 TA === Homework submission instructions ===

Data Structure and Algorithm Homework #3 Due: 1:20pm, Thursday, May 16, 2017 TA   === Homework submission instructions === Data Structure and Algorithm Homework #3 Due: 1:20pm, Thursday, May 16, 2017 TA email: dsa1@csie.ntu.edu.tw === Homework submission instructions === For Problem 1-3, please put all your solutions in a

More information

1. [1 pt] What is the solution to the recurrence T(n) = 2T(n-1) + 1, T(1) = 1

1. [1 pt] What is the solution to the recurrence T(n) = 2T(n-1) + 1, T(1) = 1 Asymptotics, Recurrence and Basic Algorithms 1. [1 pt] What is the solution to the recurrence T(n) = 2T(n-1) + 1, T(1) = 1 2. O(n) 2. [1 pt] What is the solution to the recurrence T(n) = T(n/2) + n, T(1)

More information

CSL 201 Data Structures Mid-Semester Exam minutes

CSL 201 Data Structures Mid-Semester Exam minutes CL 201 Data tructures Mid-emester Exam - 120 minutes Name: Roll Number: Please read the following instructions carefully This is a closed book, closed notes exam. Calculators are allowed. However laptops

More information

Data Structures And Algorithms

Data Structures And Algorithms Data Structures And Algorithms Hashing Eng. Anis Nazer First Semester 2017-2018 Searching Search: find if a key exists in a given set Searching algorithms: linear (sequential) search binary search Search

More information

CS 104 (Spring 2014) Final Exam 05/09/2014

CS 104 (Spring 2014) Final Exam 05/09/2014 CS 104 (Spring 2014) Final Exam 05/09/2014 G o o d L u c k Your Name, USC username, and Student ID: This exam has 8 pages and 8 questions. If yours does not, please contact us immediately. Please read

More information

Section 05: Midterm Review

Section 05: Midterm Review Section 05: Midterm Review 1. Asymptotic Analysis (a) Applying definitions For each of the following, choose a c and n 0 which show f(n) O(g(n)). Explain why your values of c and n 0 work. (i) f(n) = 5000n

More information

You must include this cover sheet. Either type up the assignment using theory5.tex, or print out this PDF.

You must include this cover sheet. Either type up the assignment using theory5.tex, or print out this PDF. 15-122 Assignment 5 Page 1 of 11 15-122 : Principles of Imperative Computation Fall 2012 Assignment 5 (Theory Part) Due: Tuesday, October 30, 2012 at the beginning of lecture Name: Andrew ID: Recitation:

More information

Friday Four Square! 4:15PM, Outside Gates

Friday Four Square! 4:15PM, Outside Gates Binary Search Trees Friday Four Square! 4:15PM, Outside Gates Implementing Set On Monday and Wednesday, we saw how to implement the Map and Lexicon, respectively. Let's now turn our attention to the Set.

More information

NET/JRF-COMPUTER SCIENCE & APPLICATIONS. Time: 01 : 00 Hour Date : M.M. : 50

NET/JRF-COMPUTER SCIENCE & APPLICATIONS. Time: 01 : 00 Hour Date : M.M. : 50 1 NET/JRF-COMPUTER SCIENCE & APPLICATIONS UNIT TEST : DATA STRUCTURE Time: 01 : 00 Hour Date : 02-06-2017 M.M. : 50 INSTRUCTION: Attempt all the 25 questions. Each question carry TWO marks. 1. Consider

More information

Computer Science Foundation Exam

Computer Science Foundation Exam Computer Science Foundation Exam January 12, 2019 Section I A DATA STRUCTURES NO books, notes, or calculators may be used, and you must work entirely on your own. Name: UCFID: NID: Question # Max Pts Category

More information

CSE 373 Autumn 2012: Midterm #2 (closed book, closed notes, NO calculators allowed)

CSE 373 Autumn 2012: Midterm #2 (closed book, closed notes, NO calculators allowed) Name: Sample Solution Email address: CSE 373 Autumn 0: Midterm # (closed book, closed notes, NO calculators allowed) Instructions: Read the directions for each question carefully before answering. We may

More information

Computer Science Foundation Exam

Computer Science Foundation Exam Computer Science Foundation Exam August 25, 2018 Section I A DATA STRUCTURES SOLUTION NO books, notes, or calculators may be used, and you must work entirely on your own. Name: UCFID: NID: Question # Max

More information

Introduction hashing: a technique used for storing and retrieving information as quickly as possible.

Introduction hashing: a technique used for storing and retrieving information as quickly as possible. Lecture IX: Hashing Introduction hashing: a technique used for storing and retrieving information as quickly as possible. used to perform optimal searches and is useful in implementing symbol tables. Why

More information

Section 1: True / False (1 point each, 15 pts total)

Section 1: True / False (1 point each, 15 pts total) Section : True / False ( point each, pts total) Circle the word TRUE or the word FALSE. If neither is circled, both are circled, or it impossible to tell which is circled, your answer will be considered

More information

Fundamentals of Programming

Fundamentals of Programming Fundamentals of Programming Lecture 3 - Constants, Variables, Data Types, And Operations Lecturer : Ebrahim Jahandar Borrowed from lecturer notes by Omid Jafarinezhad Outline C Program Data types Variables

More information

Second Examination Solution

Second Examination Solution University of Illinois at Urbana-Champaign Department of Computer Science Second Examination Solution CS 225 Data Structures and Software Principles Fall 2007 7p-9p, Thursday, November 8 Name: NetID: Lab

More information

Variables Data types Variable I/O. C introduction. Variables. Variables 1 / 14

Variables Data types Variable I/O. C introduction. Variables. Variables 1 / 14 C introduction Variables Variables 1 / 14 Contents Variables Data types Variable I/O Variables 2 / 14 Usage Declaration: t y p e i d e n t i f i e r ; Assignment: i d e n t i f i e r = v a l u e ; Definition

More information

Draw the resulting binary search tree. Be sure to show intermediate steps for partial credit (in case your final tree is incorrect).

Draw the resulting binary search tree. Be sure to show intermediate steps for partial credit (in case your final tree is incorrect). Problem 1. Binary Search Trees (36 points) a) (12 points) Assume that the following numbers are inserted into an (initially empty) binary search tree in the order shown below (from left to right): 42 36

More information

Hashing. 5/1/2006 Algorithm analysis and Design CS 007 BE CS 5th Semester 2

Hashing. 5/1/2006 Algorithm analysis and Design CS 007 BE CS 5th Semester 2 Hashing Hashing A hash function h maps keys of a given type to integers in a fixed interval [0,N-1]. The goal of a hash function is to uniformly disperse keys in the range [0,N-1] 5/1/2006 Algorithm analysis

More information

University of Waterloo Department of Electrical and Computer Engineering ECE 250 Algorithms and Data Structures

University of Waterloo Department of Electrical and Computer Engineering ECE 250 Algorithms and Data Structures University of Waterloo Department of Electrical and Computer Engineering ECE 250 Algorithms and Data Structures Final Examination (17 pages) Instructor: Douglas Harder April 14, 2004 9:00-12:00 Name (last,

More information

Sample Examination. Family Name:... Other Names:... Signature:... Student Number:...

Sample Examination. Family Name:... Other Names:... Signature:... Student Number:... Family Name:... Other Names:... Signature:... Student Number:... THE UNIVERSITY OF NEW SOUTH WALES SCHOOL OF COMPUTER SCIENCE AND ENGINEERING Sample Examination COMP1917 Computing 1 EXAM DURATION: 2 HOURS

More information

Midterm Sample Questions. a) What evaluates to FALSE in C? What evaluates to TRUE?

Midterm Sample Questions. a) What evaluates to FALSE in C? What evaluates to TRUE? Midterm Syllabus: 1. Number systems a. Signed and unsigned representations b. Conversion between different representations c. Overflow condition 2. C Pointers 3. Dynamic Memory Allocation 4. C Data structures:

More information

Midterm 2 Exam Principles of Imperative Computation. Tuesday 31 st March, This exam is closed-book with one sheet of notes permitted.

Midterm 2 Exam Principles of Imperative Computation. Tuesday 31 st March, This exam is closed-book with one sheet of notes permitted. Midterm 2 Exam 15-122 Principles of Imperative Computation Tuesday 31 st March, 2015 Name: Andrew ID: Recitation Section: Instructions This exam is closed-book with one sheet of notes permitted. You have

More information

CSE 332 Winter 2015: Midterm Exam (closed book, closed notes, no calculators)

CSE 332 Winter 2015: Midterm Exam (closed book, closed notes, no calculators) _ UWNetID: Lecture Section: A CSE 332 Winter 2015: Midterm Exam (closed book, closed notes, no calculators) Instructions: Read the directions for each question carefully before answering. We will give

More information

Contents of Lecture 3

Contents of Lecture 3 Contents of Lecture 3 Repetition of matrices double a[3][4]; double* b; double** c; Terminology Linkage Types Conversions Jonas Skeppstedt (js@cs.lth.se) Lecture 3 2014 1 / 33 A global matrix: double a[3][4]

More information

CSE332 Summer 2010: Midterm Exam Sample Solutions

CSE332 Summer 2010: Midterm Exam Sample Solutions CSE332 Summer 2010: Midterm Exam Sample Solutions Closed notes, closed book; calculator ok. Read the instructions for each problem carefully before answering. Problems vary in point-values, difficulty

More information

Department of Computer Science & Engineering Indian Institute of Technology Kharagpur. Practice Sheet #09. Topic: Structures in C Date:

Department of Computer Science & Engineering Indian Institute of Technology Kharagpur. Practice Sheet #09. Topic: Structures in C Date: Department of Computer Science & Engineering Indian Institute of Technology Kharagpur Practice Sheet #09 Topic: Structures in C Date: 20-03-2017 2- Which languages necessarily need heap allocation in the

More information

15 122: Principles of Imperative Computation. Practice Exam August 4, 2015

15 122: Principles of Imperative Computation. Practice Exam August 4, 2015 15 122: Principles of Imperative Computation Practice Exam August 4, 2015 15-122 Practice Exam Page 2 of 17 1. Fun with C. The following C programs have between 0 and 1 errors in them. If the function

More information

Problem 2 Add the two 2 s complement signed 8-bit values given below, and express your answer in decimal.

Problem 2 Add the two 2 s complement signed 8-bit values given below, and express your answer in decimal. Problem 1 Recall the definition of root in project 1. (The declaration of struct entrynode appears below.) struct entrynode * root; Give the type of each of the following expressions. The answer may be

More information

C Programming. Course Outline. C Programming. Code: MBD101. Duration: 10 Hours. Prerequisites:

C Programming. Course Outline. C Programming. Code: MBD101. Duration: 10 Hours. Prerequisites: C Programming Code: MBD101 Duration: 10 Hours Prerequisites: You are a computer science Professional/ graduate student You can execute Linux/UNIX commands You know how to use a text-editing tool You should

More information

Computer Science Foundation Exam

Computer Science Foundation Exam Computer Science Foundation Exam May 19, 2018 Section I A DATA STRUCTURES SOLUTION NO books, notes, or calculators may be used, and you must work entirely on your own. Name: UCFID: NID: Question # Max

More information

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad -500 043 COMPUTER SCIENCE AND ENGINEERING TUTORIAL QUESTION BANK Course Name : DATA STRUCTURES Course Code : A30502 Class : II B.

More information

Final Examination CSE 100 UCSD (Practice)

Final Examination CSE 100 UCSD (Practice) Final Examination UCSD (Practice) RULES: 1. Don t start the exam until the instructor says to. 2. This is a closed-book, closed-notes, no-calculator exam. Don t refer to any materials other than the exam

More information

CS301 - Data Structures Glossary By

CS301 - Data Structures Glossary By CS301 - Data Structures Glossary By Abstract Data Type : A set of data values and associated operations that are precisely specified independent of any particular implementation. Also known as ADT Algorithm

More information

UNIT III BALANCED SEARCH TREES AND INDEXING

UNIT III BALANCED SEARCH TREES AND INDEXING UNIT III BALANCED SEARCH TREES AND INDEXING OBJECTIVE The implementation of hash tables is frequently called hashing. Hashing is a technique used for performing insertions, deletions and finds in constant

More information

You must print this PDF and write your answers neatly by hand. You should hand in the assignment before recitation begins.

You must print this PDF and write your answers neatly by hand. You should hand in the assignment before recitation begins. 15-122 Homework 4 Page 1 of 13 15-122 : Principles of Imperative Computation, Summer 1 2014 Written Homework 4 Due: Thursday, June 12 before recitation Name: Andrew ID: Recitation: In this assignment,

More information

CSE 333 Midterm Exam 2/14/14

CSE 333 Midterm Exam 2/14/14 Name There are 4 questions worth a total of 100 points. Please budget your time so you get to all of the questions. Keep your answers brief and to the point. The exam is closed book, closed notes, closed

More information

Exam Principles of Imperative Computation, Summer 2011 William Lovas. June 24, 2011

Exam Principles of Imperative Computation, Summer 2011 William Lovas. June 24, 2011 Exam 3 15-122 Principles of Imperative Computation, Summer 2011 William Lovas June 24, 2011 Name: Sample Solution Andrew ID: wlovas Instructions This exam is closed-book with one double-sided sheet of

More information

11 'e' 'x' 'e' 'm' 'p' 'l' 'i' 'f' 'i' 'e' 'd' bool equal(const unsigned char pstr[], const char *cstr) {

11 'e' 'x' 'e' 'm' 'p' 'l' 'i' 'f' 'i' 'e' 'd' bool equal(const unsigned char pstr[], const char *cstr) { This document contains the questions and solutions to the CS107 midterm given in Spring 2016 by instructors Julie Zelenski and Michael Chang. This was an 80-minute exam. Midterm questions Problem 1: C-strings

More information

CSE 351: The Hardware/Software Interface. Section 2 Integer representations, two s complement, and bitwise operators

CSE 351: The Hardware/Software Interface. Section 2 Integer representations, two s complement, and bitwise operators CSE 351: The Hardware/Software Interface Section 2 Integer representations, two s complement, and bitwise operators Integer representations In addition to decimal notation, it s important to be able to

More information

(b) If a heap has n elements, what s the height of the tree?

(b) If a heap has n elements, what s the height of the tree? CISC 5835 Algorithms for Big Data Fall, 2018 Homework Assignment #4 1 Answer the following questions about binary tree and heap: (a) For a complete binary tree of height 4 (we consider a tree with just

More information

Fundamental of Programming (C)

Fundamental of Programming (C) Borrowed from lecturer notes by Omid Jafarinezhad Fundamental of Programming (C) Lecturer: Vahid Khodabakhshi Lecture 3 Constants, Variables, Data Types, And Operations Department of Computer Engineering

More information

BRONX COMMUNITY COLLEGE of the City University of New York DEPARTMENT OF MATHEMATICS AND COMPUTER SCIENCE. Sample Final Exam

BRONX COMMUNITY COLLEGE of the City University of New York DEPARTMENT OF MATHEMATICS AND COMPUTER SCIENCE. Sample Final Exam BRONX COMMUNITY COLLEGE of the City University of New York DEPARTMENT OF MATHEMATICS AND COMPUTER SCIENCE CSI33 Sample Final Exam NAME Directions: Solve problems 1 through 5 of Part I and choose 5 of the

More information

ESC101N: Fundamentals of Computing End-sem st semester

ESC101N: Fundamentals of Computing End-sem st semester ESC101N: Fundamentals of Computing End-sem 2010-11 1st semester Instructor: Arnab Bhattacharya 8:00-11:00am, 15th November, 2010 Instructions 1. Please write your name, roll number and section below. 2.

More information

Exam Principles of Imperative Computation, Summer 2011 William Lovas. June 24, 2011

Exam Principles of Imperative Computation, Summer 2011 William Lovas. June 24, 2011 Exam 3 15-122 Principles of Imperative Computation, Summer 2011 William Lovas June 24, 2011 Name: Andrew ID: Instructions This exam is closed-book with one double-sided sheet of notes permitted. You have

More information

CS 61B Summer 2005 (Porter) Midterm 2 July 21, SOLUTIONS. Do not open until told to begin

CS 61B Summer 2005 (Porter) Midterm 2 July 21, SOLUTIONS. Do not open until told to begin CS 61B Summer 2005 (Porter) Midterm 2 July 21, 2005 - SOLUTIONS Do not open until told to begin This exam is CLOSED BOOK, but you may use 1 letter-sized page of notes that you have created. Problem 0:

More information

Reg. No. : Question Paper Code : 27157

Reg. No. : Question Paper Code : 27157 WK 3 Reg. No. : Question Paper Code : 27157 B.E./B.Tech. DEGREE EXAMINATION, NOVEMBER/DECEMBER 2015. Time : Three hours Second Semester Computer Science and Engineering CS 6202 PROGRAMMING AND DATA STRUCTURES

More information

Section Notes - Week 1 (9/17)

Section Notes - Week 1 (9/17) Section Notes - Week 1 (9/17) Why do we need to learn bits and bitwise arithmetic? Since this class is about learning about how computers work. For most of the rest of the semester, you do not have to

More information

CS Programming In C

CS Programming In C CS 24000 - Programming In C Week Two: Basic C Program Organization and Data Types Zhiyuan Li Department of Computer Science Purdue University, USA 2 int main() { } return 0; The Simplest C Program C programs

More information

CS300 Final Review Questions 1

CS300 Final Review Questions 1 CS300 Final Review Questions 1 This is not a complete list of questions and topics, but a good sampling of questions that will help you study for the final. I strongly advise you to work through every

More information

CSE 373 Winter 2009: Midterm #1 (closed book, closed notes, NO calculators allowed)

CSE 373 Winter 2009: Midterm #1 (closed book, closed notes, NO calculators allowed) Name: Email address: CSE 373 Winter 2009: Midterm #1 (closed book, closed notes, NO calculators allowed) Instructions: Read the directions for each question carefully before answering. We may give partial

More information

CS 112 Final May 8, 2008 (Lightly edited for 2012 Practice) Name: BU ID: Instructions

CS 112 Final May 8, 2008 (Lightly edited for 2012 Practice) Name: BU ID: Instructions CS 112 Final May 8, 2008 (Lightly edited for 2012 Practice) Name: BU ID: This exam is CLOSED book and notes. Instructions The exam consists of six questions on 11 pages. Please answer all questions on

More information

200 points total. Start early! Update March 27: Problem 2 updated, Problem 8 is now a study problem.

200 points total. Start early! Update March 27: Problem 2 updated, Problem 8 is now a study problem. CS3410 Spring 2014 Problem Set 2, due Saturday, April 19, 11:59 PM NetID: Name: 200 points total. Start early! Update March 27: Problem 2 updated, Problem 8 is now a study problem. Problem 1 Data Hazards

More information

York University AK/ITEC INTRODUCTION TO DATA STRUCTURES. Final Sample II. Examiner: S. Chen Duration: Three hours

York University AK/ITEC INTRODUCTION TO DATA STRUCTURES. Final Sample II. Examiner: S. Chen Duration: Three hours York University AK/ITEC 262 3. INTRODUCTION TO DATA STRUCTURES Final Sample II Examiner: S. Chen Duration: Three hours This exam is closed textbook(s) and closed notes. Use of any electronic device (e.g.

More information

Subject: PROBLEM SOLVING THROUGH C Time: 3 Hours Max. Marks: 100

Subject: PROBLEM SOLVING THROUGH C Time: 3 Hours Max. Marks: 100 Code: DC-05 Subject: PROBLEM SOLVING THROUGH C Time: 3 Hours Max. Marks: 100 NOTE: There are 11 Questions in all. Question 1 is compulsory and carries 16 marks. Answer to Q. 1. must be written in the space

More information

Goals for this Week. CSC 2400: Computer Systems. Bits, Bytes and Data Types. Binary number system. Finite representations of binary integers

Goals for this Week. CSC 2400: Computer Systems. Bits, Bytes and Data Types. Binary number system. Finite representations of binary integers CSC 2400: Computer Systems Bits, Bytes and Data Types 1 Goals for this Week Binary number system Why binary? Converting between decimal and binary and octal and hexadecimal number systems Finite representations

More information

Computer Organization & Systems Exam I Example Questions

Computer Organization & Systems Exam I Example Questions Computer Organization & Systems Exam I Example Questions 1. Pointer Question. Write a function char *circle(char *str) that receives a character pointer (which points to an array that is in standard C

More information

CPSC 331 Term Test #2 March 26, 2007

CPSC 331 Term Test #2 March 26, 2007 CPSC 331 Term Test #2 March 26, 2007 Name: Please DO NOT write your ID number on this page. Instructions: Answer all questions in the space provided. Point form answers are acceptable if complete enough

More information

Practice final for EECS 380, 2001: Prof Markov

Practice final for EECS 380, 2001: Prof Markov Practice final for EECS 380, 2001: Prof Markov Available in Postscript and PDF Total pages: 5 Exam duration: 1hr 50min. Write your name and uniqname on every sheet, including the cover. Maximum score:

More information

ECE 250 Algorithms and Data Structures

ECE 250 Algorithms and Data Structures ECE 250 Algorithms and Data Structures Sections 001 and 002 FINAL EXAMINATION Douglas Wilhelm Harder dwharder@uwaterloo.ca EIT 4018 x37023 2015-4-15T16:00/18:30 Rooms: PAC 6, 7 IF YOU ARE NOT ENROLLED

More information

Outline. hash tables hash functions open addressing chained hashing

Outline. hash tables hash functions open addressing chained hashing Outline hash tables hash functions open addressing chained hashing 1 hashing hash browns: mixed-up bits of potatoes, cooked together hashing: slicing up and mixing together a hash function takes a larger,

More information

Symbol Table. Symbol table is used widely in many applications. dictionary is a kind of symbol table data dictionary is database management

Symbol Table. Symbol table is used widely in many applications. dictionary is a kind of symbol table data dictionary is database management Hashing Symbol Table Symbol table is used widely in many applications. dictionary is a kind of symbol table data dictionary is database management In general, the following operations are performed on

More information

Module Contact: Dr Geoff McKeown, CMP Copyright of the University of East Anglia Version 1

Module Contact: Dr Geoff McKeown, CMP Copyright of the University of East Anglia Version 1 UNIVERSITY OF EAST ANGLIA School of Computing Sciences Main Series UG Examination 2015-16 DATA STRUCTURES AND ALGORITHMS CMP-5014Y Time allowed: 3 hours Section A (Attempt any 4 questions: 60 marks) Section

More information

CS & IT Conversions. Magnitude 10,000 1,

CS & IT Conversions. Magnitude 10,000 1, CS & IT Conversions There are several number systems that you will use when working with computers. These include decimal, binary, octal, and hexadecimal. Knowing how to convert between these number systems

More information

CS 2301 Exam 3 B-Term 2011

CS 2301 Exam 3 B-Term 2011 NAME: CS 2301 Exam 3 B-Term 2011 Questions 1-3: (15) Question 4: (15) Question 5: (20) Question 6: (10) Question 7: (15) Question 8: (15) Question 9: (10) TOTAL: (100) You may refer to one sheet of notes

More information

a) Do exercise (5th Edition Patterson & Hennessy). Note: Branches are calculated in the execution stage.

a) Do exercise (5th Edition Patterson & Hennessy). Note: Branches are calculated in the execution stage. CS3410 Spring 2015 Problem Set 2 (version 3) Due Saturday, April 25, 11:59 PM (Due date for Problem-5 is April 20, 11:59 PM) NetID: Name: 200 points total. Start early! This is a big problem set. Problem

More information

COSC160: Data Structures Hashing Structures. Jeremy Bolton, PhD Assistant Teaching Professor

COSC160: Data Structures Hashing Structures. Jeremy Bolton, PhD Assistant Teaching Professor COSC160: Data Structures Hashing Structures Jeremy Bolton, PhD Assistant Teaching Professor Outline I. Hashing Structures I. Motivation and Review II. Hash Functions III. HashTables I. Implementations

More information

Quiz 0 Review Session. October 13th, 2014

Quiz 0 Review Session. October 13th, 2014 Quiz 0 Review Session October 13th, 2014 Topics (non-exhaustive) Binary. ASCII. Algorithms. Pseudocode. Source code. Compiler. Object code. Scratch. Statements. Boolean expressions. Conditions. Loops.

More information

Time: 8:30-10:00 pm (Arrive at 8:15 pm) Location What to bring:

Time: 8:30-10:00 pm (Arrive at 8:15 pm) Location What to bring: ECE 120 Midterm 1 HKN Review Session Time: 8:30-10:00 pm (Arrive at 8:15 pm) Location: Your Room on Compass What to bring: icard, pens/pencils, Cheat sheet (Handwritten) Overview of Review Binary IEEE

More information

Topic HashTable and Table ADT

Topic HashTable and Table ADT Topic HashTable and Table ADT Hashing, Hash Function & Hashtable Search, Insertion & Deletion of elements based on Keys So far, By comparing keys! Linear data structures Non-linear data structures Time

More information

Module 2: Classical Algorithm Design Techniques

Module 2: Classical Algorithm Design Techniques Module 2: Classical Algorithm Design Techniques Dr. Natarajan Meghanathan Associate Professor of Computer Science Jackson State University Jackson, MS 39217 E-mail: natarajan.meghanathan@jsums.edu Module

More information

Do not turn this page until you have received the signal to start. In the meantime, please read the instructions below carefully.

Do not turn this page until you have received the signal to start. In the meantime, please read the instructions below carefully. UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING FINAL EXAMINATION, APRIL 2017 CSC 190 HIS - COMPUTER ALGORITHMS AND DATA STRUCTURES Exam Type: A NO calculator allowed Duration: 2.5 hours

More information