Sudo Placement [1.8] Sudo Placement [1.8] Please wait while the activity loads. If this activity does not load, try refreshing your browser. Also, this page requires javascript. Please visit using a browser with javascript enabled. If loading fails, click here to try again Question 1A Priority-Queue is implemented as a Max-Heap. Initially, it has 5 elements. The level-order traversal of the heap is given below: 10, 8, 5, 3, 2 Two new elements "1" and "7" are inserted in the heap in that order. The level-order traversal of the heap after the insertion of the elements is:10, 8, 7, 5, 3, 2, 110, 8, 7, 2, 3, 1, 510, 8, 7, 1, 2, 3, 510, 8, 7, 3, 2, 1, 5 Sudo Placement [1.8] Discuss itQuestion 2We are given a set of n distinct elements and an unlabeled binary tree with n nodes. In how many ways can we populate the tree with the given set so that it becomes a binary search tree? 01N!(1/(n+1)).2nCnSudo Placement [1.8] Discuss itQuestion 3You are given the postorder traversal, P, of a binary search tree on the n elements 1, 2, ..., n. You have to determine the unique binary search tree that has P as its postorder traversal. What is the time complexity of the most efficient algorithm for doing this?O(LogN)O(N)O(NLogN)None of the above, as the tree cannot be uniquely determined.Sudo Placement [1.8] Discuss itQuestion 4Consider a B+-tree in which the maximum number of keys in a node is 5. What is the minimum number of keys in any non-root node? 1234Sudo Placement [1.8] Discuss itQuestion 5Which of the following is not a backtracking algorithm?Knight tour problemN queen problemTower of hanoiM coloring problemSudo Placement [1.8] Discuss itQuestion 6Which of the following sorting algorithms can be used to sort a random linked list with minimum worst case time complexity?Insertion SortMerge SortHeap SortQuick SortSudo Placement [1.8] Discuss itQuestion 7Which one of the following is NOT desired in a good Software Requirement Specifications (SRS) document?Functional RequirementsNon-Functional RequirementsGoals of ImplementationAlgorithms for Software ImplementationSudo Placement [1.8] Discuss itQuestion 8Which of the following are used to generate a message digest by the network security protocols? (P) RSA (Q) SHA-1 (R) DES (S) MD5R and S onlyQ and S onlyQ and R onlyP and R onlySudo Placement [1.8] Discuss itQuestion 9The subnet mask for a particular network is 255.255.31.0. Which of the following pairs of IP addresses could belong to this network?172.57.88.62 and 172.56.87.23310.35.28.2 and 10.35.29.4191.203.31.87 and 191.234.31.88128.8.129.43 and 128.8.161.55Sudo Placement [1.8] Discuss itQuestion 10The shell command find -name passwd -print is executed in /etc directory of a computer system running Unix. Which of the following shell commands will give the same information as the above command when executed in the same directory? ls passwdcat passwdgrep name passwdgrep print passwdSudo Placement [1.8] Discuss it 12 There are 15 questions to complete. You have completed questions question Your accuracy is Correct Wrong Partial-Credit You have not finished your quiz. If you leave this page, your progress will be lost. Correct Answer You Selected Not Attempted Final Score on Quiz Attempted Questions Correct Attempted Questions Wrong Questions Not Attempted Total Questions on Quiz Question Details Results Date Score Hint Time allowed minutes seconds Time used Answer Choice(s) Selected Question Text All doneNeed more practice!Keep trying!Not bad!Good work!Perfect! Last Updated : 31 Aug, 2018 Share your thoughts in the comments Add Your Comment Please Login to comment...