CS3301 Data Structures Important 2&16 Mark Question Bank
CS3301 Data Structures Important 2&16 Mark Question Bank
in/
QUESTION BANK
.in
BT
Q.No Questions Level
Competence
an
1 Define ADT. Give any two examples. BTL-1 Remember
2 Distinguish between linear and non linear data structures. BTL-2 Understand
Compare calloc() and realloc() function and mention its application in linked
iya
3 BTL-4 Analyze
list.
4 Describe the differences between singly and doubly linked lists. BTL-1 Remember
or
5 List out the areas in which data structures are applied extensively. BTL-1 Remember
6 Define non linear data structure. BTL-1 Remember
p
7 Compare singly linked list with circular linked list. BTL-5 Evaluate
8 What are the types of linked list?
w.
BTL-1 Remember
9 List out the advantage of circular linked list. BTL-1 Remember
10 Binary search cannot be performed on a linked list. Examine. BTL-3 Apply
ww
11 Discuss the advantages and disadvantages of linked lists and arrays. BTL-2 Understand
12 Give an example for linked list application. BTL-2 Understand
13 Specify the use of Header node in a linked list. BTL-6 Create
14 Illustrate the use of linked list with an example. BTL-3 Apply
15 Show the ways in which list ADT can be implemented. BTL-3 Apply
https://www.poriyaan.in/paper/data-structure-75/
www.poriyaan.in https://cse.poriyaan.in/
Should arrays or linked lists be used for the following types of applications?
Support your justification.
19 BTL-5 Evaluate
1. Many search operations in sorted list.
2. Many search operations in Unsorted list.
20 Develop an algorithm for insertion operation in a singly linked list. BTL-6 Create
PART – B
Describe the following:
1 i. Applications of lists. (5) BTL-1 Remember
ii. Polynomial manipulation. (8)
i. What is a linked list? (2)
2 BTL-1 Remember
ii. Describe the suitable routine segments for any four operations. (11)
List an algorithm to perform the following operations in a doubly linked list.
3 i.Insert a node at the end of the list.(6) BTL-1 Remember
.in
ii.Delete the last node in the list. (7)
i. Discuss the insertion and deletion procedures for cursor based linked
an
4 lists.(7) BTL-2 Understand
ii. Give an algorithm for the deletion and reverse operations on doubly linked
list. (6)
iya
i. Give the algorithm to perform insertion on a doubly linked list.(7)
5 BTL-2 Understand
ii. Give the algorithm to perform deletion on a doubly linked list.(6)
Write an algorithm to demonstrate a polynomial using a linked list for
or
Analyze and write algorithm for Circular Linked list for the following
w.
11 Describe the various operations of the list ADT with examples. (13) BTL-1 Remember
https://www.poriyaan.in/paper/data-structure-75/
www.poriyaan.in https://cse.poriyaan.in/
.in
an
iya
p or
w.
ww
https://www.poriyaan.in/paper/data-structure-75/
www.poriyaan.in https://cse.poriyaan.in/
PART – C
1 Create an algorithm to add two polynomials using linked list.(15) BTL-6 Create
Explain an algorithm to split a linked list into two sub lists containing odd and
2 BTL-5 Evaluate
even ordered elements in them respectively.(15)
Explain an algorithm to merge two sorted linked lists into a single sorted
3 BTL-5 Evaluate
list.(15)
.in
Design algorithm for various operations performed on circular linked list.
4 Extend the algorithm defined in the previous question for the doubly linked BTL-6 Create
circular list. (15)
an
UNIT II - LINEAR DATA STRUCTURES – STACKS, QUEUES
Stack ADT – Evaluating arithmetic expressions- other applications- Queue ADT – circular queue
iya
implementation – Double ended Queues – applications of queues
PART – A
or
BT
Q.No Questions Level
Competence
p
1 Point out the advantage of representing stack using a linked list than array. BTL-4 Analyze
2 Point out the rules followed during the infix to postfix conversions. BTL-4 Analyze
w.
3 Compare the working of stack and queue data structure. BTL-5 Evaluate
4 Develop an algorithm for inserting a new element into the stack. BTL-6 Create
ww
https://www.poriyaan.in/paper/data-structure-75/
www.poriyaan.in https://cse.poriyaan.in/
18 Analyze and write a routine to check whether the queue is full or empty. BTL-4 Analyze
.in
an
iya
p or
w.
ww
https://www.poriyaan.in/paper/data-structure-75/
www.poriyaan.in https://cse.poriyaan.in/
19 For railway reservation the queue data structure is preferred –Justify. BTL-5 Evaluate
20 Develop an algorithm for deleting an element in a double ended queue. BTL-6 Create
PART – B
Describe with an example how to evaluate arithmetic expressions using
1 stacks. (13) BTL-1 Remember
.in
i. Write an algorithm to convert an infix expression to a postfix expression.
Trace the algorithm to convert the infix expression ‘(a+b)*c/d+e/f” to a postfix
5
an
BTL-5 Evaluate
expression.(8)
ii. Justify the need for Infix and Postfix expression. (5)
i. Give an algorithm for push and pop operations on stack using a linked
iya
list.(7)
6 BTL-2 Understand
ii. Discuss about addition and deletion operations performed on a circular
queue with necessary algorithms. (6)
or
11 Analyze and write an algorithm to implement queue functions using arrays. BTL-4 Analyze
(13)
Develop an algorithm to perform the four operations in a double ended queue
12 BTL-6 Create
that is implemented as an array. (13)
13 Discuss circular queue and its implementation. (13) BTL-2 Understand
14 Illustrate the enqueue and dequeue operations on double ended queues. (13) BTL-3 Analyze
PART – C
Develop and Show the simulation using stack for the following expression :
1 BTL-6 Create
12 + 3 * 14 – (5 * 16) + 7 .(15)
https://www.poriyaan.in/paper/data-structure-75/
www.poriyaan.in https://cse.poriyaan.in/
.in
an
iya
p or
w.
ww
https://www.poriyaan.in/paper/data-structure-75/
www.poriyaan.in https://cse.poriyaan.in/
Assess the difference between double ended queue and circular queue.
3 Show the simulation using stack for the following expression to convert infix BTL-5 Evaluate
to postpix : p * q = (r-s / t).(15)
Develop an algorithm to explain Priority Queue, deQueue and the applications
4 of queues. (15) BTL-6 Create
.in
2 For the given binary search tree, if we remove the root and replace it with
something from left subtree. What will be the value of the new root? Justify
an
your answer.
14
2 22 BTL 5 Evaluate
iya
1 5 20 30
4 17 40
or
8 What are threaded binary trees? Give its advantages BTL 2 Understand
9 Define balance factor of AVL Tree. BTL 1 Remember
10 How do we calculate the balance factor for each node in a AVL tree? BTL 2 Understand
11 Simulate the result of inserting 3,1,4,6,2,8,9 into an initially empty AVL
BTL 6 Create
Tree.
12 Give an example for expression tree. BTL 2 Understand
13 Number the following binary tree to traverse it in
i.Preorder
ii.Inorder
BTL 2 Understand
14 Explain why binary search cannot be performed on a linked list. BTL 4 Analyze
https://www.poriyaan.in/paper/data-structure-75/
www.poriyaan.in https://cse.poriyaan.in/
.in
an
iya
p or
w.
ww
https://www.poriyaan.in/paper/data-structure-75/
www.poriyaan.in https://cse.poriyaan.in/
PART B
Write an algorithm for preorder, inorder and postorder traversal of a binary
1 BTL 1 Remember
tree. (13)
Explain the following operations on a binary search tree with suitable
algorithms
2 BTL 4 Analyze
i. Find a node (6)
ii. Find the minimum and maximum elements of binary search tree (7)
.in
i. Write short notes on threaded binary tree (7)
3 BTL 1 Remember
ii. Describe an iterative algorithm to traverse a tree in preorder (6)
Write an algorithm for inserting and deleting a node in a binary search tree.
an
4. BTL 1 Remember
(13)
Discuss in detail the various methods in which a binary tree can be BTL 2 Understand
5
represented. Discuss the advantage and disadvantage of each method (13)
iya
i. Explain the B+ tree and its properties with an Example (7)
6 BTL 5 Evaluate
ii. What are the steps to convert general tree to binary tree? (6)
i. Construct B Tree to insert the following key elements(order of the tree is
or
8 ii. Explain how deletion can take place in AVL trees with suitable algorithms BTL 2 Understand
w.
(6)
i. What are AVL trees? Describe the different rotations defined for AVL tree.
(7)
ww
9 BTL 1 Remember
ii. Insert the following elements step by step in sequence into an empty AVL
tree 15,18,20,21,28,2330,26 (6)
i. Point out the operations of B-tree using 2-3 tree. (7)
10 ii.Explain the operations of threaded binary tree. (6) BTL 4
Analyze
https://www.poriyaan.in/paper/data-structure-75/
www.poriyaan.in https://cse.poriyaan.in/
PART C
1 Consider the binary search tree given below.
Find the result of in-order, pre-order, and post-order traversals.
Show the deletion of the root node
Insert 11, 22, 33, 44, 55, 66, and 77 in the tree
BTL 5 Evaluate
(15)
.in
2 i. Compare B trees with B+ trees. (7)
ii. Create a B+ tree of order 5 for the following data arriving in sequence: BTL 6 Create
90, 27, 7, 9, 18, 21, 3, 4, 16, 11, 21, 72 (8)
an
i. Draw B – Tree pf order m = 5 for the keys
{K, O,S,V,MF,B,G,T,U,W} (5)
3 ii. Delete the keys K and G in order. (5)
iya
iii. Justify the number of splits needed for inserts / delete with proper BTL 5 Evaluate
reasons. (5)
Construct AVL tree for the followings after rotation.(4+4+7)
i. ii.
or
1 1
4
p
4
8
w.
1
iii.
4 BTL 6 Create
ww
1 20
1
2
https://www.poriyaan.in/paper/data-structure-75/
www.poriyaan.in https://cse.poriyaan.in/
3 Find out the in-degree and out-degree of each node in the given graph
BTL 3 Apply
.in
4 Create a complete undirected graph having five nodes BTL 6 Create
an
5 Given the following adjacency matrix, draw the weighted graph.
iya
BTL 2 Understand
or
PART-B
1 Describe in detail about the following representations of a graph.
BTL 1 Remember
i. Adjacency Matrix (7)
https://www.poriyaan.in/paper/data-structure-75/
www.poriyaan.in https://cse.poriyaan.in/
A B E F
D
(7)
G
BTL 3
Apply
ii. Consider the graph given below and show its adjacency list in the
memory
.in
an
(6)
3 i. Explain the topological sorting of a graph G with example. (7) BTL 1 Remember
iya
ii. Quote the step wise procedure for topological sort (6)
4 Differentiate depth-first search and breadth-first search traversal of a graph
BTL 4 Analyze
with suitable examples. (13)
5 i. Explain with algorithm, How DFS be performed on a undirected
or
graph. (7)
ii. Show the algorithm for finding connected components of an undirected BTL 4 Analyze
p
graph using DFS, and derive the time complexity of the algorithm.
(6)
w.
7
graph. (7)
ii. Trace the algorithm for the following graph
7
1 2
6 BTL 3 Apply
1 1
5
3 4 5
3 5
(6)
8 Compare any two applications of Graph with your own example (13) BTL 5 Remember
9 Describe any one of the shortest path algorithms with suitable example BTL 1 Remember
(13)
10 Discuss the prims algorithm for minmum spanning tree.Give an example. BTL 2 Understand
(13)
11 i. Write a program to find an Euler circuit in a graph. (7) BTL 1
Remember
ii. Trace the algorithm for the given graph.(6)
https://www.poriyaan.in/paper/data-structure-75/
www.poriyaan.in https://cse.poriyaan.in/
3
5 V2 V3 2
V1 2
V7
3
V6 3
1
4
V5 V4
12 Develop an algorithm to compute the shortest path using Dijkstra’s BTL 6 Create
algorithm. Validate the algorithm with suitable example. (13)
13 Explain the depth first approach of finding articulation points in a connected BTL 4 Analyze
graph with necessary algorithm.(13)
14 i. Write short notes on Bi-connectivity. (7) BTL 2 Understand
.in
ii. Express different types of graphs with example. (6)
PART C
an
1 Given the adjacency matrix of a graph, write a program to calculate the in- BTL 4 Analyze
degree and the out-degree of a node N in the graph. (15)
2. Consider five cities: (1) New Delhi, (2) Mumbai, (3) Chennai, (4) Bangalore,
iya
and (5) Kolkata, and a list of flights that connect these cities as shown in the
following table.Use the given information to construct a graph.(15)
Flight No Origin Destination
or
101 2 3
102 3 2
103 5 3
p
BTL 6 Create
104 3 4
w.
105 2 5
106 5 2
107 5 1
ww
108 1 4
109 5 4
110 4 5
3 i.How can we efficiently check whether or not a graph is disconnected? (7)
ii.Describe an algorithm that uses a brute force approach to find all the BTL 5 Evaluate
articulation points in G in O(V (V + E)) time. (8)
4 i. Given a rooted tree, one desires to find the shortest path from the root
to a given node v. Which algorithm would one use to find this shortest
path.(7) BTL 6 Create
ii. Write a program to determine whether there is at least one path from
the source to the destination. (8)
https://www.poriyaan.in/paper/data-structure-75/
www.poriyaan.in https://cse.poriyaan.in/
PART – A
Q.N BT
o
Questions Level
Competence
What is meant by internal and external sorting? Give any two examples for
4 BTL-1 Remember
each type.
5 Describe the complexity of bubble sort. BTL-1 Remember
6 Name the applications of linear and binary search techniques. BTL-1 Remember
7 Give the time complexities of bubble sort and quick sort. BTL-2 Understand
.in
8 Predict the fastest sorting algorithm, justify. BTL-2 Understand
9 Compare internal and external sorting. BTL-4 Analyze
an
10 Distinguish between linear and binary search technique. BTL-2 Understand
11 Classify the different sorting methods. BTL-3 Apply
12 Develop an algorithm for a quick sort. BTL-6 Create
iya
13 Which hashing technique is best and illustrate with an example? BTL-3 Apply
14 Summarize the open addressing hashing method with an example. BTL-5 Evaluate
or
Select the best sorting method out of the following - insertion sort, quick sort
17 BTL-5 Evaluate
w.
19 Identify the advantage of shell sort over insertion sort. BTL-1 Remember
20 Develop a simple algorithm for a linear search. BTL-6 Create
PART – B
Describe how the divide and conquer technique is implemented in binary
1 BTL-1 Remember
search. (13)
Describe the algorithm to sort the following array: 77, 33, 44, 11, 88, 22, 66,
55
2 i. Insertion sort (7) BTL-1 Remember
ii. Shell Sort (6)
https://www.poriyaan.in/paper/data-structure-75/
www.poriyaan.in https://cse.poriyaan.in/
.in
ii. Write and Explain a C code to sort an integer array. (6)
i. Create a algorithm to perform a binary Search. (7)
10 BTL-6 Create
ii. Develop an algorithm for Merge sort with an example.(6)
an
i. Write short notes on Bubble Sort.(5)
11 BTL-3 Analyze
ii. Illustrate an algorithm to sort the elements using bubble sort. (8)
iya
Describe the following collision resolution techniques in detail with an
example.
12 BTL-1 Remember
i. Separate chaining. (7)
or
PART – C
1 Develop an algorithm to search a number in a given set of numbers using
BTL-6 Create
binary search. Develop and algorithm to explain Extendible Hashing.(15)
2 Explain a C code to sort an integer array using Selection Sort and Radix BTL-5 Evaluate
Sort.(15)
3 Explain an algorithm for Shell Sort and Merge Sort and explain with
BTL-5 Evaluate
example.(15)
4 Prepare a quick sort algorithm and explain with suitable example Give its
BTL-6 Create
worst case, average case and best case time complexities.(15)
https://www.poriyaan.in/paper/data-structure-75/
Civil
CSE
Home Mech
e
EEE
CSE –2nd sem Reg 2021 ECE
Physics
Basic for Engineering
Electrical and Data Structure
Problem Solving and Science Engineering
Electronics
Python Programming Object Oriented
Programming in C
Programming
Elective-Management
Professional Elective II
Professional Elective IV