- Condider the following binary search tree:
If we remove the root node, which of the root from the left subtree will be the new root?
(1) 11 (2) 12
(3) 13 (4) 16
answer is 4
Explanation:
- Consider the following operations performed on a stack of size 5:
Push (a);Pop();Push(b);Push(c);Pop();
Push(d);Pop();Pop();Push(e)
which of the following statement is correct?
(1) underflow occurs
(2) stack operations are performed smoothly
(3) overflow occurs
(4) none of the above
answer is 2
Explanation:
- Suppose you are giving a binary tree with n nodes, such thar each node has exactly either zero or two children. the maximum height of the tree will be
(1) n/2-1 (2) n/2+1
(3) (n-1)/2 (4) (n+1)/2
answer is 3
Explanation:
- Which of the following is not an inherent application of stack?
(1) impliment of recursion
(2) evaluation of postfix expression
(3) job scheduling
(4) reverse a string
answer is 3
Explanation:
Applications of stack:
- Parsing
- Recursive Function
- Calling Function
- Expression Evaluation
- Expression Conversion
- Infix to Postfix
- Infix to Prefix
- Postfix to Infix
- Prefix to Infix
- Towers of hanoi
- In how many ways cam the string (^ means intersection)
A^B-A^B-A
be fully parenthesized to yield an infix expression?
(1) 15 (2) 14
(3) 13 (4) 12
answer is 2
- A multiplexer combines four 100-kbps channels using a time slot of 2 bits. What is the bit rate?
(1) 100kbps (2)200kbps
(3) 400kbps (4)1000kbps
answer is 3
Explanation:
- In a fully connected mesh metwork with 10 computers, total _______ number of cables are requires and _______ number of ports are required for each device.
(1) 40,9 (2) 45,10
(3) 45,9 (4) 50,10
answer is 3
Explanation:
apply formula
no. Of cables= n(n-1)/2 where n = 10
and no. Of Ports= n-1 where n= 10
- In TCP/IP Reference model, the job of ________ layer is to permit hosts to inject packets into any network and travel them independently to the destination.
(1) physical (2) transport
(3) application (4)host-to-network
answer is 4
- If there are N people in the world and are using secret key encryption/decryption for privacy purpose, then member of secret keys required will be:
(1) N (2) (N-1)
(3) N(N-1)/2 (4) N(N+1)/2
answer is 3
- optical fiber uses reflection to guide light through a channel, in which angle of incidence is________ the critical angle.
(1) equal to (2) less than
(3) greater than (4) less than or equal to
answer is 3