Department of Computer Science Admission Test for PhD Program. Part I Time : 30 min Max Marks: 15

Similar documents
Department of Computer Science Admission Test for PhD Program. Part I Time : 30 min Max Marks: 15

Algorithm Complexity Analysis: Big-O Notation (Chapter 10.4) Dr. Yingwu Zhu

THE UNIVERSITY OF WESTERN AUSTRALIA

CSCE 2014 Final Exam Spring Version A

Code No: R Set No. 1

CS171 Final Practice Exam

Problems and Solutions to the January 1994 Core Examination

CS 315 Data Structures mid-term 2

COMP171 Data Structures and Algorithms Fall 2006 Midterm Examination

Computer Science Engineering Sample Papers

CSE 332 Spring 2014: Midterm Exam (closed book, closed notes, no calculators)

University of Waterloo Department of Electrical and Computer Engineering ECE250 Algorithms and Data Structures Fall 2014

CS171 Midterm Exam. October 29, Name:

1. Write step by step code to delete element from existing Doubly Linked List. Suppose that all declarations are done

THE UNIVERSITY OF WESTERN AUSTRALIA

CSE 373 Autumn 2010: Midterm #1 (closed book, closed notes, NO calculators allowed)

Algorithm Efficiency & Sorting. Algorithm efficiency Big-O notation Searching algorithms Sorting algorithms

CS171 Final Practice Exam

CSE 373 Spring 2010: Midterm #1 (closed book, closed notes, NO calculators allowed)

Q1 Q2 Q3 Q4 Q5 Q6 Total

ASSIGNMENT-1 M.Sc. DEGREE EXAMINATION, MAY 2018 (First Year) INFORMATION TECHNOLOGY Basics of Information Technology

Data Structures Question Bank Multiple Choice

M.Sc. (Previous) DEGREE EXAMINATION, MAY First Year Information Technology. Time : 03 Hours Maximum Marks : 75

CS251-SE1. Midterm 2. Tuesday 11/1 8:00pm 9:00pm. There are 16 multiple-choice questions and 6 essay questions.

Name :. Roll No. :... Invigilator s Signature : INTRODUCTION TO PROGRAMMING. Time Allotted : 3 Hours Full Marks : 70

Leftist Heaps and Skew Heaps. (Leftist Heaps and Skew Heaps) Data Structures and Programming Spring / 41

Lecture 19 Sorting Goodrich, Tamassia

CPSC 211, Sections : Data Structures and Implementations, Honors Final Exam May 4, 2001

CS 216 Exam 1 Fall SOLUTION

COMP 250 Midterm #2 March 11 th 2013

CSE 332 Spring 2013: Midterm Exam (closed book, closed notes, no calculators)

CSE 332 Winter 2015: Midterm Exam (closed book, closed notes, no calculators)

Computer Science. Section 1B

Computer Science Foundation Exam. May 6, Computer Science. Section 1A. No Calculators! KEY. Score: 50

NATIONAL UNIVERSITY OF SINGAPORE

NET/JRF-COMPUTER SCIENCE & APPLICATIONS. Time: 01 : 00 Hour Date : M.M. : 50

CS 360 Exam 1 Fall 2014 Name. 1. Answer the following questions about each code fragment below. [8 points]

Chapter 6 Heaps. Introduction. Heap Model. Heap Implementation

University of Waterloo Department of Electrical and Computer Engineering ECE250 Algorithms and Data Structures Fall 2017

MUHAMMAD FAISAL MIT 4 th Semester Al-Barq Campus (VGJW01) Gujranwala

Largest Online Community of VU Students

COMP 250 Fall recurrences 2 Oct. 13, 2017

Course goals. exposure to another language. knowledge of specific data structures. impact of DS design & implementation on program performance

INSTITUTE OF AERONAUTICAL ENGINEERING

DATA STRUCTURES AND ALGORITHMS

CHENNAI MATHEMATICAL INSTITUTE M.Sc. / Ph.D. Programme in Computer Science

GLA University, Mathura

Operations on Heap Tree The major operations required to be performed on a heap tree are Insertion, Deletion, and Merging.

Computer Science E-22 Practice Final Exam

Memory Management. COMP755 Advanced Operating Systems

University of Illinois at Urbana-Champaign Department of Computer Science. Final Examination

Test #2. Login: 2 PROBLEM 1 : (Balance (6points)) Insert the following elements into an AVL tree. Make sure you show the tree before and after each ro

ECE250: Algorithms and Data Structures Midterm Review

Section I B COMPUTER SCIENCE SOLUTION

Prelim 2 SOLUTION. 5:30 PM, 25 April Total Question Name Short Search/ Collections Trees Graphs

Start of Lecture: February 10, Chapter 6: Scheduling

Heap Model. specialized queue required heap (priority queue) provides at least

Computer Science Spring 2005 Final Examination, May 12, 2005

CSE 332 Autumn 2016 Final Exam (closed book, closed notes, no calculators)

FORM 2 (Please put your name and form # on the scantron!!!!)

Department of Computer Science and Technology

CSE 373 Winter 2009: Midterm #1 (closed book, closed notes, NO calculators allowed)

R10 SET - 1. Code No: R II B. Tech I Semester, Supplementary Examinations, May

We've tried to include the common errors and grading standard for every question.

Computer Science E-119 Practice Midterm

The Complexity of Algorithms (3A) Young Won Lim 4/3/18

MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION

Binary Trees. Height 1

17/05/2018. Outline. Outline. Divide and Conquer. Control Abstraction for Divide &Conquer. Outline. Module 2: Divide and Conquer

CMPS 111 Spring 2013 Prof. Scott A. Brandt Midterm Examination May 6, Name: ID:

MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION (Autonomous) (ISO/IEC Certified)

CS4311 Design and Analysis of Algorithms. Lecture 1: Getting Started

AP Computer Science 4325

5. (a) What is secondary storage? How does it differ from a primary storage? (b) Explain the functions of (i) cache memory (ii) Register

Priority Queues. 04/10/03 Lecture 22 1

BEng (Hons) Electronic Engineering. BEng (Hons) Telecommunications. Examinations for / Semester 2

Section 1: True / False (2 points each, 30 pts total)

g(n) time to computer answer directly from small inputs. f(n) time for dividing P and combining solution to sub problems

MID TERM MEGA FILE SOLVED BY VU HELPER Which one of the following statement is NOT correct.

Answers. 1. (A) Attempt any five : 20 Marks

Suppose that the following is from a correct C++ program:

LECTURE NOTES OF ALGORITHMS: DESIGN TECHNIQUES AND ANALYSIS

CSCI-1200 Data Structures Fall 2018 Lecture 23 Priority Queues II

Data Structure and Algorithm Midterm Reference Solution TA

CLO Assessment CLO1 Q1(10) CLO2 Q2 (10) CLO3 Q4 (10) CLO4 Q3a (4)

Chapter 3:- Divide and Conquer. Compiled By:- Sanjay Patel Assistant Professor, SVBIT.

(b) int count = 0; int i = 1; while (i<m) { for (int j=i; j<n; j++) { count = count + 1; i = i + 1; O(M + N 2 ) (c) int count = 0; int i,j,k; for (i=1

Operating Systems Comprehensive Exam. Spring Student ID # 2/17/2011

Binary heaps (chapters ) Leftist heaps

CS2351 Data Structures. Lecture 1: Getting Started

15110 Principles of Computing, Carnegie Mellon University - CORTINA. Binary Search. Required: List L of n unique elements.

Merge Sort. Algorithm Analysis. November 15, 2017 Hassan Khosravi / Geoffrey Tien 1

University of Illinois at Urbana-Champaign Department of Computer Science. Second Examination

Sorting Pearson Education, Inc. All rights reserved.

1996 ILLINOIS JETS TEAMS DISTRICT COMPUTER FUNDAMENTALS TEST. 1. A computer program is:

// a stack is printed from bottom (leftmost) to top (rightmost) System.out.println(stk);

The Limits of Sorting Divide-and-Conquer Comparison Sorts II

Example Sheet for Operating Systems I (Part IA)

Mergesort again. 1. Split the list into two equal parts

CS210 (161) with Dr. Basit Qureshi Final Exam Weight 40%

Transcription:

Department of Computer Science Admission Test for PhD Program Part I Time : 0 min Max Marks: 5 Each Q carries marks. ¼ mark will be deducted for every wrong answer. Part II of only those candidates will be evaluated who will score at least 6 marks in Part I.. Consider a linked list whose node has two fields: info field containing information and next field containing address of the next node in the list. The code to insert a node pointed to by q, at the end of the list is ) for (ptr = list; ptr-> next!= Null; ptr = ptr->next) ptr -> next = q; ) for (ptr = list; ptr!= Null; ptr = ptr->next) ptr -> next = q; ) for (ptr = list; ptr-> next!= Null; ptr = ptr->next); ptr ->next = q; 4) for (ptr = list; ptr!= Null; ptr = ptr->next) ptr = q;. What will be the output of the following code segment, if the function is called as fn(0, 0)? int fn(int x, int y) { int temp = x; if (temp < y) { temp = y; return y; } else return x; cout << "Larger of " << x << " and " << y << " is " << max; } () Program will not compile as the function has two return statements. () Larger of 0 and 0 is 0. () Larger of 0 and 0 is 0. (4) No output.. The internal data structure used by the system (compiler/assembler) to implement procedure calls is ) Arrays ) Linked list ) Queues 4) Stacks

4. To insert an element into a sorted list, which of the following is true? ) The element can be inserted in a sorted array in constant time. ) The element can be inserted in a sorted linked list in constant time. ) The element can be inserted in a binary search tree in O(log n) time, where n is the number of elements in the list. 4) None of the above. 5. You have an array of student records in descending order of their roll-numbers. Which algorithm will put the array in increasing order of the roll-numbers in minimum time? ) Insertion sort ) Quick sort ) Merge sort 4) Selection sort 6. Consider Insertion Sort performed on an array of n elements. The number of comparisons performed by the algorithm to insert the ith element into the sorted sublist consisting of the first i elements in the worst case is ) n ) ) i - 4) n - 7. Consider the following algorithm to compute x^n for any x. Assume n = ^m, where m is a non negative integer. prod = x; for i = to m do prod = prod * prod; Output prod; The recurrence relation for the time complexity of the above algorithm is ) T(n) = T(n/) + ) T(n) = T(n-) + n ) T(n) = *T(n/) + 4) None of the above 8. In the cable TV with multiple channels running several programs with commercial breaks, which of the following is/are used? ) Frequency Division Multiplexing only ) Time Division Multiplexing only

) Both Frequency Division Multiplexing and Time Division Multiplexing 4) Code Division Multiplexing 9. What is the role of MAC sub-layer in computer networks? ) Map the IP addresses to MAC addresses. ) Control the access to the channel so that the chances of collision are reduced. ) Route the data frames from one LAN to another. 4) Enhance the quality of the signal. 0. Http is a/an ) application layer protocol ) transport layer protocol ) network layer protocol 4) Internet layer protocol. Which of the following is true? ) There is no internal fragmentation in paging scheme. ) There is no external fragmentation in segmentation scheme. ) There is no internal fragmentation in segmentation scheme. 4) There is no fragmentation in paging scheme.. Which of the following sets of scheduling schemes suffer from the problem of starvation? ) Shortest Job First and Round Robin. ) Priority Scheduling and First Come First Serve. ) Round Robin and First Come First Serve. 4) Shortest Job First and Priority Scheduling.. The binary representation of -6 in signed s complement requires at least bits. ) 4 ) 5 ) 4) 6 4. A -bit processor has ) registers ) I/O devices ) Mb of RAM 4) a -bit bus and -bit registers

5. Cache memory enhances ) memory capacity ) memory access time ) secondary storage capacity 4) secondary storage access time

Department of Computer Science Admission Test for PhD Program Part II Time : hour Max Marks: 0. Write a recursive function in C to compute the maximum of n elements in an array.. What is the difference between int and long int in a typical programming language?. What is the height of a binary search tree with n nodes in the worst case? 4. What is the difference between data type and data structure? 5. What are the main advantages and disadvantages of arrays over linked list? 6. Write a for-loop in C/C++/Java to insert an element x in an array A containing n elements at position k (k<n). 7. Which sorting algorithm is best suited to sort the roll numbers of the students in a university. The roll numbers are 7 digit numbers. What is the time complexity of the algorithm? 8. A large integer is an integer number that cannot be stored in a constant number of memory words and the number of words it requires grows as the value of the integer number grows. Give an algorithm to add two large integers. 9. What is the difference between local IP address and public IP address? 0. Give two advantages of framing, in a computer network.. Write -48 in s complement representation.. What do you understand by a core--duo processor?. Differentiate between logical address and physical address. Explain very briefly with the help of an example. 4. What do you understand by virtual memory space? Explain very briefly with the help of an example. 5. What is the role of an operating system in a computer? Write in no more than 5 words.