Data Structures and Algorithm Analysis-Midterms
Data Structures and Algorithm Analysis-Midterms
1) ......... form of access is used to add and remove nodes from a queue.
C. Both a and b
D. None of these
2) In liked representation of stack ....... holds the elements of the stack.
A. INFO fields
B. TOP fields
C. LINK fields
D. NULL fields
A. LIFO
B. FIFO
C. Both A and B
D. None of these
4) In the linked representation of the stack ......... behaves as the top pointer variable of stack.
A. Stop pointer
B. Begin pointer
C. Start pointer
D. Avail pointer
A. Front
B. Back
C. Middle
D. Both A and B
6) In linked representation of stack the null pointer of the last node in the list signals ..........
D. No Changes happens
8) A queue is a .........
A. FIFO
B. LIFO
C. FILO
D. LOFI
A. FIFO lists
B. LIFO lists
C. Piles
A. push
B. pop
C. retrieval
D. access
A. Array
B. Lists
C. Stacks
D. Trees
12) Which is the pointer associated with the stack?
A. FIRST
B. FRONT
C. TOP
D. REAR
A. Reverse
B. Hierarchical
C. Alternative
D. Sequential
A. insert
B. push
C. pop
D. top
A. Push
B. Pull
C. Pop
D. Pump
A. LIFO
B. FIFO
C. LRU
D. RANDOM
17) .......... is the term used to delete an element from the stack.
A. Push
B. Pull
C. Pop
D. Pump
A. front
B. rear
C. top
D. list
19) A pointer variable which contains the location at the top element of the stack is called .....
A. Top
B. Last
C. Final
D. End
A. finding factorial
B. tower of Hanoi
C. infix to postfix
A) Arrays
B) Linked lists
4. A linear list in which each node has pointers to point to the predecessor and successors nodes is called
as ..
5. A .................... is a linear list in which insertions and deletions are made to from either end of the
structure.
A) circular queue
B) random of queue
C) priority
D) dequeue
D) any position
A) O(n)
B) O(n2)
C) O(n log n)
D) O(log n)
A) finding factorial
B) tower of Hanoi
C) infix to postfix conversion
A) queue
B) stack
C) tree
D) graph
10. A list which displays the relationship of adjacency between elements is said to be
A) linear
B) non linear
C) linked list
D) trees
1. Which of the following is not the type of queue?
A) Ordinary queue
C) Circular queue
D) Priority queue
ii) Nodes that are not root and not leaf are called as internal nodes.
A) True, True
B) True, False
C) False, True
D) False, False
4. Any node is the path from the root to the node is called
A) Successor node
B) Ancestor node
C) Internal node
A) True, True
B) True, False
C) False, True
D) False, False
B) only a and b
A) Function calls
8. A …………… is an acyclic digraph, which has only one node with indegree 0, and other nodes have in-
degree 1.
A) Directed tree
B) Undirected tree
C) Dis-joint tree
9. …………………. Is a directed tree in which outdegree of each node is less than or equal to two.
A) Unary tree
B) Binary tree
C) Trinary tree
D) Both B and C
A) True, False
B) False, True
C) True, True
D) False, False
A. Linear arrays
B. Linked lists
C. Queue
D. Stack
12. Which of the following data structure store the homogeneous data elements?
A. Arrays
B. Records
C. Pointers
D. Lists
13. When new data are to be inserted into a data structure, but there is not available space; this situation
is usually called ....
A. Underflow
B. overflow
C. houseful
D. saturated
14. A data structure where elements can be added or removed at either end but not in the middle is called
...
A. linked lists
B. stacks
C. queues
D. dequeue
A. creation
B. destruction
C. selection
16. The way in which the data item or items are logically related defines .....
A. storage structure
B. data structure
C. data relationship
D. data operation
17. Which of the following are the operations applicable an primitive data structures?
A. create
B. destroy
C. update
18. The use of pointers to refer elements of a data structure in which elements are logically adjacent is ....
A. pointers
B. linked allocation
C. stack
D. queue
B. for the size of the structure and the data in the structure are constantly changing
B. Data elements in linked list need not be stored in adjacent space in memory
D. Linked lists are collection of the nodes that contain information part and next pointer.
1. Which if the following is/are the levels of implementation of data structure
A) Abstract level
B) Application level
C) Implementation level
2. A binary search tree whose left subtree and right subtree differ in hight by at most 1 unit is called ……
A) AVL tree
B) Red-black tree
C) Lemma tree
A) Abstract level
B) Application level
C) Implementation level
5. Which of the following is true about the characteristics of abstract data types?
i) It exports a type.
A) True, False
B) False, True
C) True, True
D) False, False
A) Operations
B) Storage Structures
C) Algorithms
D) None of above
A) Data
B) Operations
8. Inserting an item into the stack when stack is not full is called …………. Operation and deletion of item
form the stack, when stack is not empty is called ………..operation.
A) push, pop
B) pop, push
C) insert, delete
D) delete, insert
9. ……………. Is a pile in which items are added at one end and removed from the other.
A) Stack
B) Queue
C) List
10. ………… is very useful in situation when data have to stored and then retrieved in reverse order.
A) Stack
B) Queue
C) List
D) Link list
11. Which data structure allows deleting data elements from and inserting at rear?
A) Stacks
B) Queues
C) Dequeues
12. Which of the following data structure can't store the non-homogeneous data elements?
A) Arrays
B) Records
C) Pointers
D) Stacks
13. A ....... is a data structure that organizes data similar to a line in the supermarket, where the first one
in line is the first one out.
C) Both of them
D) Neither of them
A) Stacks
B) List
C) Strings
D) Trees
A) Graphs
B) Stacks
C) Binary tree
D) Queues
16. Which data structure is used in breadth first search of a graph to hold nodes?
A) Stack
B) queue
C) Tree
D) Array
17. Identify the data structure which allows deletions at both ends of the list but insertion at only one end.
C) Priority queues
D) Stack
A) Strings
B) Lists
C) Stacks
D) Graph
A) Graph
B) Trees
C) Binary tree
D) Stack
20. To represent hierarchical relationship between elements, Which data structure is suitable?
A) Dequeue
B) Priority
C) Tree
D) Graph
1) Linked lists are best suited .....
B. for the size of the structure and the data in the structure are constantly changing.
C. data structure
A. sorting
B. merging
C. inserting
D. traversal
A. Underflow
B. Overflow
C. Houseful
D. Saturated
A. 2
B. 3
C. 1
D. 4
A. FIRST
B. AVAIL
C. TOP
D. REAR
7) Value of first linked list index is ....
A. 0
B. 1
C. -1
D. 2
D. linked list
A. Three fields
B. Two fields
C. Four fields
D. Five fields
11) In a linked list the .......... field contains the address of next element in the list.
A. Link field
C. Start field
D. Info field
A. successor node
B. predecessor node
C. head node
D. last node
A. List
B. Tree
C. Graph
D. Edge
C. number of records
A. Guard
B. Sentinel
C. End pointer
D. Last pointer
16) A ........ is a linear list in which insertions and deletions are made to from either end of the
structure.
A. circular queue
B. random of queue
C. priority
D. dequeue
17) Indexing the ........ element in the list is not possible in linked lists.
A. middle
B. first
C. last
18) A linear list in which the pointer points only to the successive node is ......
19) .......... may take place only when there is some minimum amount(or) no space left in free
storage list.
A. Memory management
B. Garbage collection
C. Recycle bin
D. Memory management
20) A linear list in which the last node points to the first node is ........
A. Discovering
B. Finding
C. Searching
D. Mining
A. Insertion Sort
B. Bubble Sort
C. Merge Sort
D. Tree Sort
A. Insertion sort
B. Heap sort
C. Bubble sort
D. Quick sort
A. Tape Sort
C. Merge Sort
D. Tree Sort
5) Sorting a file F usually refers to sorting F with respect to a particular key called .....
A. Basic key
B. Primary key
C. Starting key
D. Index key
6) The time complexity of quick sort is ........
A. O(n)
B. O(logn)
C. O(n2)
D. O(n logn)
7) Selection sort first finds the .......... element in the list and put it in the first position.
A. Middle element
B. Largest element
C. Last element
D. Smallest element
A. merge sort
B. tree sort
C. shell sort
9) The operation that combines the element is of A and B in a single sorted list C with n=r+s element is
called ....
A. Inserting
B. Mixing
C. Merging
D. Sharing
A. quick
B. shell
C. heap
D. selection
11) .......... sorting is good to use when alphabetizing large list of names.
A. Merge
B. Heap
C. Radix
D. Bubble
A. quick sort
B. shell sort
C. heap sort
D. selection sort
13) Which of the following sorting algorithm is of divide and conquer type?
A. Bubble sort
B. Insertion sort
C. Quick sort
D. Merge sort
14) Merging k sorted tables into a single sorted table is called ......
A. k way merging
B. k th merge
C. k+1 merge
D. k-1 merge
15) The function used to modify the way of sorting the keys of records is called ........
A. Indexing function
B. Hash function
C. Addressing function
A. Merge
B. Heap
C. Radix
D. Bubble
A. O(n logn)
B. O(2n)
C. O(n2)
D. O(n)
18) If the number of record to be sorted large and the key is long, then ...... sorting can be efficient.
A. Merge
B. Heap
C. Quick
D. Bubble
A. O(n)
B. O(logn)
C. O(n2)
D. O(n logn)
A. O(n)
B. O(n2)
C. O(n logn)
D. O(logn)
1) The worst case occur in linear search algorithm when .......
A. Item is somewhere in the middle of the array
B. Item is not in the array at all
C. Item is the last element in the array
D. Item is the last element in the array or item is not there at all
2) If the number of records to be sorted is small, then ...... sorting can be efficient.
A. Merge
B. Heap
C. Selection
D. Bubble
3) The complexity of sorting algorithm measures the ...... as a function of the number n of items to be
sorter.
A. average time
B. running time
C. average-case complexity
D. case-complexity
D. Item is the last element in the array or item is not there at all
6) Binary search algorithm cannot be applied to ...
A. sorted linked list
B. sorted binary trees
C. sorted linear array
D. pointer array
7) Complexity of linear search algorithm is .........
A. O(n)
B. O(logn)
C. O(n2)
D. O(n logn)
8) Sorting algorithm can be characterized as ......
A. Simple algorithm which require the order of n2 comparisons to sort n items.
B. Sophisticated algorithms that require the O(nlog2n) comparisons to sort items.
C. Both of the above
D. None of the above
9) The complexity of bubble sort algorithm is .....
A. O(n)
B. O(logn)
C. O(n2)
D. O(n logn)
10) State True or False for internal sorting algorithms.
i) Internal sorting are applied when the entire collection if data to be sorted is small enough that the
sorting can take place within main memory.
ii) The time required to read or write is considered to be significant in evaluating the performance of
internal sorting.
A. i-True, ii-True
B. i-True, ii-False
C. i-False, ii-True
D. i-False, ii-False
11) The complexity of merge sort algorithm is ......
A. O(n)
B. O(logn)
C. O(n2)
D. O(n logn)
12) .......... is putting an element in the appropriate place in a sorted list yields a larger sorted order list.
A. Insertion
B. Extraction
C. Selection
D. Distribution
13) ............order is the best possible for array sorting algorithm which sorts n item.
A. O(n logn)
B. O(n2)
C. O(n+logn)
D. O(logn)
14) ......... is rearranging pairs of elements which are out of order, until no such pairs remain.
A. Insertion
B. Exchange
C. Selection
D. Distribution
15) ............ is the method used by card sorter.
A. Radix sort
B. Insertion
C. Heap
D. Quick
16) Which of the following sorting algorithm is of divide and conquer type?
A. Bubble sort
B. Insertion sort
C. Merge sort
D. Selection sort
17) ........ sorting algorithm is frequently used when n is small where n is total number of elements.
A. Heap
B. Insertion
C. Bubble
D. Quick
18) Which of the following sorting algorithm is of priority queue sorting type?
A. Bubble sort
B. Insertion sort
C. Merge sort
D. Selection sort
19) Which of the following is not the required condition for binary search algorithm?
A. The list must be sorted
B. There should be the direct access to the middle element in any sub list
C. There must be mechanism to delete and/or insert elements in list.
D. Number values should only be present
20) Partition and exchange sort is ........
A. quick sort
B. tree sort
C. heap sort
D. bubble sort
1) To insert a new node in linked list free node will be available in ........
A. Available list
B. Avail list
C. Free node list
D. Memory space lis
2) A singly linked list is also called as ........
A. linked list
B. one way chain
C. two way chain
D. right link
3) A ..... list is a header list where the node points back to the header node.
A. Circular header
B. Grounded header
C. Two way header
D. One way header
4) A doubly linked list has .......... pointers with each node.
A. 0
B. 1
C. 2
D. 3
5) Header linked lists are frequently used for maintaining ........ in memory.
A. Polynomials
B. Binomial
C. Trinomial
D. Quadratic equation
6) The pointer that points to the first node in the list is ........
A. FIRST
B. AVAIL
C. TOP
D. REAR
7) Two-way list may be maintained in memory by means of .............
A. Queues
B. Linear arrays
C. Non linear arrays
D. Stacks
8) A doubly linked list is also called as ..........
A. linked list
B. one way chain
C. two way chain
D. right link
9) The list that requires two pointer variables FIRST and LAST is called ........
A. Circular list
B. Header list
C. One way list
D. Two way list
10) If the availability list is null, then the condition is said to be .........
A. nil block
B. availability list underflow
C. availability list overflow
D. memory loss
11) The list which has its own pointer is called ........
A. pointer list
B. self pointer
C. free pool
D. own pointer
12) Which of the following is two way lists?
A. Grounded header list
B. Circular header list
C. Linked list with header and trailer nodes
D. None of the above
13) A .......... is a header list where the last node contains the null pointer.
A. grounded header list
B. bottom header list
C. down header list
D. dropped header list
14) RLINK is the pointer pointing to the ...
A. successor node
B. predecessor node
C. head node
D. last node
15) A ............. is a header list where the last node points back to the header node.
A. rounded header list
B. circular header list
C. common header list
D. forward header list
16) In a linked list, insertion can be done as .........
A. beginning
B. end
C. middle
D. all of the above
17) In a two-way lists each node is divided into .......parts.
A. 1
B. 2
C. 3
D. 4
18) The disadvantage in using a circular linked list is .......
A. it is possible to get into infinite loop
B. last node points to fist node.
C. time consuming
D. requires more memory space.
19) Which of the following conditions checks available free space in avail list?
A. Avail=Null
B. Null=Avail
C. Avail=Max stack
D. Avail=Top
20) A linear list in which each node has point to the predecessor and successors nodes is called ........
A. singly linked list
B. circular linked list
C. doubly linked list
D. linear linked list
A) 1 NF
B) 2 NF
C) 3 NF
D) Normal form
A) 2NF
B) 3NF
C) BCNF
D) 1NF
A) Functional dependency
B) Multivalued dependency
C) Join dependency
D) Domain key
A) functional dependency
B) transitive dependency
C) 4 NF
D) BCNF
5. In 2NF
A) 2NF
B) 3NF
C) BCNF
D) 4NF
8. Which normal form is considered adequate for normal relational database design?
A) 2NF
B) 5NF
C) 4NF
D) 3NF
A) BCNF
B) 3NF
C) 4NF
D) DKNF
10. A relation is ................... if every field contains only atomic values that is, no lists or sets.
A) 1 NF
B) 2 NF
C) 3 NF
D) BCNF
A) Embedded Programs
B) Dynamic Program
C) Query Language
D) Static Language Programs
2. The file in DBMS is called as .................. in RDBMS.
A) console
B) schema
C) table
D) object
3. In ..................... , we have a strict parent-child relationship only
A) hierarchical databases.
B) network databases
C) object oriented databases
D) relational databases
4. Which normal form is considered adequate for relational database design?
A) 2 NF
B) 3 NF
C) 4 NF
D) BCNF
5. What operator tests column for the absence of data?
A) IS NULL operator
B) ASSIGNMENT operator
C) LIKE operator
D) NOT operator
6. Which is proper subset designed to support views belonging to different classes of users in
order to hide or protect information.
A) Schema
B) Sub-schema
C) Non-schema
D) Non-sub schema
7. Which contain information about a file needed by system programs for accessing file records?
A) File blocks
B) File operators
C) File headers
D) None of these
8. A .................... DBMS distributes data processing tasks between the workstation and network
server.
A) Network
B) Relational
C) Client Server
D) Hierarchical
9. The .................... refers to the way data is organized in and accessible from DBMS.
A) database hierarchy
B) data organization
C) data sharing
D) data model
10. ................. is a statement that is executed automatically by the system.
A) trigger
B) assertion
C) durability
D) integrity constraint
21. In SQL, which command is used to issue multiple CREATE TABLE, CREATE VIEW and
GRANT statements in a single transaction?
A) CREATE PACKAGE
B) CREATE SCHEMA
C) CREATE CLUSTER
A) to create a place in the database for storage of scheme objects, rollback segments, and
naming the data files to comprise the tablespace.
B) to create a database trigger.
C) to add/rename data files, to change storage
3. Which character function can be used to return a specified portion of a character string?
A) INSTR
B) SUBSTRING
C) SUBSTR
D) POS
6. Which is the subset of SQL commands used to manipulate Oracle Database Structures,
including tables
A) Data Definition Language
B) Data Manipulation Language
C) Data Described Language
D) Data Retrieval Language
A) 6789
B) 2345
C) 1234
D) 456789
8. Which of the following SQL command can be used to modify existing data in a database
table?
A) MODIFY
B) UPDATE
C) CHANGE
D) NEW
9. When SQL statements are embedded inside 3GL, we call such a program as ..........
A) nested query
B) nested programming
C) distinct query
D) embedded SQL
10. ................ provides option for entering SQL queries as execution time, rather than at the
development stage.
A) PL/SQL
B) SQL*Plus
C) SQL
D) Dynamic SQL
12) To change column value in a table the ......... command can be used.
A. create
B. insert
C. alter
D. update
14) To pass on granted privileges to other user the ...... clause is used
A. create option
B. grant option
C. update option
D. select option
18) A ............. represents the number of entities to which another entity can be associated
A. mapping cardinality
B. table
C. schema
D. information
19) Which two files are used during operation of the DBMS
A. Query languages and utilities
B. DML and query language
C. Data dictionary and transaction log
D. Data dictionary and query language
9. A logical schema
A) is the entire database
B) is a standard way of organizing information into accessible parts.
C) Describes how data is actually stored on disk.
D) All of the above
14) The collection of information stored in a database at a particular moment is called as ......
A. schema
B. instance of the database
C. data domain
D. independence
A. primary key
B. secondary key
C. foreign key
D. none of the above
A. DDL
B. TCL
C. DCL
D. DML
A) Alternate Key
B) Primary Key
C) Foreign Key
A) Unique predicate
B) Like Predicate
C) Null predicate
D) In predicate
B) ELIMINATE
C) DISTINCT
D) None of these
A) i-true, ii-false
B) i-false, ii-true
C) i-true, ii-true
D) i-false, ii-false
A) Normalization
B) Generalization
C) Specialization
7. A ………………. Does not have a distinguishing attribute if its own and mostly are dependent
entities, which are part of some another entity.
A) Weak entity
B) Strong entity
D) Dependent entity
A) Sub string
B) Drop Table
C) Predict
D) Predicate
A) Constraints
B) Stored Procedure
C) Triggers
D) Cursors
10. The number of tuples in a relation is called its …………. While the number of attributes in a
relation is called it’s ………………..
A) Degree, Cardinality
B) Cardinality, Degree
C) Rows, Columns
D) Columns, Rows
11) The language that requires a user to specify the data to be retrieved without specifying
exactly how to get it is
A. Procedural DML
B. Non-Procedural DML
C. Procedural DDL
D. Non-Procedural DDL
12) Which two files are used during operation of the DBMS?
A. HLL
B. DML
C. DDL
D. DCL
14) The way a particular application views the data from the database that the application uses is
a
A. module
B. relational model
C. schema
D. sub schema
C. The data dictionary contains the name and description of each data element.
A. Groups
B. Table
C. Attributes
D. Switchboards
A. External
B. Internal
C. Physical
D. Conceptual
19) Which are the two ways in which entities can participate in a relationship?
A. RAW
B. CHAR
C. NUMERIC
D. VARCHAR
B. Immediate update
C. Two-phase commit
D. Recovery management
A. Recovery measures
B. Security measures
C. Concurrency measures
D. Authorization measures
A. system recovery
B. media recovery
C. database recovery
D. failure recovery
A. Filter
B. Recovery
C. Security
D. Scalability
A. disk errors
B. hard errors
C. system errors
D. power failures
A. Filter
B. Recovery
C. Security
D. Scalability
A. transaction recovery
B. database recovery
C. system recovery
D. value recovery
8) The .......... consists of the various applications and database that play a role in a backup and
recovery strategy.
9) In which the database can be restored up to the last consistent state after the system failure?
A. Backup
B. Recovery
C. Both
D. None
A. recovery procedure
B. recovery block
C. stored block
D. stored script
B. records
C. blocks
D. numbers
A. set up
B. registration
C. start up
D. enrolment
A. Disk recovery
B. Shadow paging
C. Dish shadowing
D. Crash recovery
14) Most backup and recovery commands in ........... are executed by server sessions.
A. Backup Manager
B. Recovery Manager
D. Database Manager
15) ........ systems typically allows to replace failed disks without stopping access to the system.
A. RAM
B. RMAN
C. RAD
D. RAID
16) An ......... is an exact copy of a single datafile, archived redo log file, or control file.
A. image copy
B. datafile copy
C. copy log
D. control copy
17) .......... known as memory-style error correcting-code(ECC) organization, employs parity bits.
A. RAID level 1
B. RAID level 2
C. RAID level 3
D. RAID level 4
18) The remote backup site is sometimes called the .......... site.
A. primary
B. secondary
C. ternary
D. to create Schedule.
20) The simplest approach to introducing redundancy is to duplicate every disk is called .....
A. mirroring
B. imaging
C. copying
D. All of the above
1. Which of the following query is correct for using comparison operators in SQL?
B) SELECT sname, coursename FROM studentinfo WHERE age>50 and age <80;
C) SELECT sname, coursename FROM studentinfo WHERE age>50 and WHERE age<80;
2.How to select all data from studentinfo table starting the name from letter 'r'?
3. Which of the following SQL query is correct for selecting the name of staffs from 'tblstaff'
table where salary is 15,000 or 25,000?
B) SELECT sname from tblstaff WHERE salary BETWEEN 15000 AND 25000;
C) Both A and B
4. The SELECT statement, that retrieves all the columns from empinfo table name starting with
d to p is ..........................
5. Select a query that retrieves all of the unique countries from the student table?
6. Which query is used for sorting data that retrieves the all the fields from empinfo table and
listed them in the ascending order?
8. How to Delete records from studentinfo table with name of student 'Hari Prasad'?
9. Constraint checking can be disabled in existing ............. and .............. constraints so that any
data you modify or add to the table is not checked against the constraint.
10. ..................... joins two or more tables based on a specified column value not equaling a
specified column value in another table.
A) OUTER JOIN
B) NATURAL JOIN
C) NON-EQUIJOIN
D) EQUIJOIN
1. In SQL, which command is used to remove a stored function from the database?
A) REMOVE FUNCTION
B) DELETE FUNCTION
C) DROP FUNCTION
D) ERASE FUNCTION
2. In SQL, which command is used to select only one copy of each set of duplicate rows
A) SELECT DISTINCT
B) SELECT UNIQUE
C) SELECT DIFFERENT
A) Values
B) Distinct values
C) Groups
D) Columns
A) One column
5. What command is used to get back the privileges offered by the GRANT command?
A) Grant
B) Revoke
C) Execute
D) Run
6. Which command displays the SQL command in the SQL buffer, and then executes it?
A) CMD
B) OPEN
C) EXECUTE
D) RUN
7. What is a DATABLOCK?
A) Set of Extents
B) Set of Segments
C) Smallest Database storage unit
D) Set of blocks
8. If two groups are not linked in the data model editor, what is the hierarchy between them?
B) The group that is right ranks higher than the group that is to right or below it.
C) The group that is above or leftmost ranks higher than the group that is to right or below
it.
D) The group that is left ranks higher than the group that is to the right.
A) Instead of Trigger
B) DML Trigger
C) System Trigger
D) DDL Trigger
A) IS NULL operator
B) ASSIGNMENT operator
C) LIKE operator
D) NOT operator
Select one:
a.
Item is the last element in the array or item is not there at all
b.
Item is the last element in the array
c.
Item is somewhere in the middle of the array
d.
Item is not in the array at all