Sudo Placement [1.8]

Question 1
A Priority-Queue is implemented as a Max-Heap. Initially, it has 5 elements. The level-order traversal of the heap is given below: 10, 8, 5, 3, 2 Two new elements "1" and "7" are inserted in the heap in that order. The level-order traversal of the heap after the insertion of the elements is:
Cross
10, 8, 7, 5, 3, 2, 1
Cross
10, 8, 7, 2, 3, 1, 5
Cross
10, 8, 7, 1, 2, 3, 5
Tick
10, 8, 7, 3, 2, 1, 5


Question 2
We are given a set of n distinct elements and an unlabeled binary tree with n nodes. In how many ways can we populate the tree with the given set so that it becomes a binary search tree?
Cross
0
Tick
1
Cross
N!
Cross
(1/(n+1)).2nCn


Question 3
You are given the postorder traversal, P, of a binary search tree on the n elements 1, 2, ..., n. You have to determine the unique binary search tree that has P as its postorder traversal. What is the time complexity of the most efficient algorithm for doing this?
Cross
O(LogN)
Tick
O(N)
Cross
O(NLogN)
Cross
None of the above, as the tree cannot be uniquely determined.


Question 4
Consider a B+-tree in which the maximum number of keys in a node is 5. What is the minimum number of keys in any non-root node?
Cross
1
Tick
2
Cross
3
Cross
4


Question 5
Which of the following is not a backtracking algorithm?
Cross
Knight tour problem
Cross
N queen problem
Tick
Tower of hanoi
Cross
M coloring problem


Question 6
Which of the following sorting algorithms can be used to sort a random linked list with minimum worst case time complexity?
Cross
Insertion Sort
Tick
Merge Sort
Cross
Heap Sort
Cross
Quick Sort


Question 7
Which one of the following is NOT desired in a good Software Requirement Specifications (SRS) document?
Cross
Functional Requirements
Cross
Non-Functional Requirements
Cross
Goals of Implementation
Tick
Algorithms for Software Implementation


Question 8
Which of the following are used to generate a message digest by the network security protocols?
(P) RSA
(Q) SHA-1
(R) DES
(S) MD5
Cross
R and S only
Tick
Q and S only
Cross
Q and R only
Cross
P and R only


Question 9
The subnet mask for a particular network is 255.255.31.0. Which of the following pairs of IP addresses could belong to this network?
Cross
172.57.88.62 and 172.56.87.233
Cross
10.35.28.2 and 10.35.29.4
Cross
191.203.31.87 and 191.234.31.88
Tick
128.8.129.43 and 128.8.161.55


Question 10
The shell command
find -name passwd -print
is executed in /etc directory of a computer system running Unix. Which of the following shell commands will give the same information as the above command when executed in the same directory?
Cross
ls passwd
Cross
cat passwd
Tick
grep name passwd
Cross
grep print passwd


There are 15 questions to complete.

  • Last Updated : 31 Aug, 2018

Share your thoughts in the comments
Similar Reads