

MCQOPTIONS
Saved Bookmarks
This section includes 721 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.
1. |
Each data item in a record may be a group item composed of sub-items; those items which areindecomposable are called ________ |
A. | elementary items. |
B. | atoms. |
C. | scalars. |
D. | structure. |
Answer» E. | |
2. |
The logical or mathematical model of a particular organization of data is called a _______________. |
A. | data structure. |
B. | algorithms. |
C. | structure. |
D. | logic structure. |
Answer» B. algorithms. | |
3. |
The time required in best case for search operation in binary tree is ____________. |
A. | O(n). |
B. | O(2n). |
C. | O(log n). |
D. | O( log 2n). |
Answer» D. O( log 2n). | |
4. |
Binary search algorithm cannot be applied to________ concept. |
A. | unsorted linked list. |
B. | sorted binary trees. |
C. | sorted linear array. |
D. | pointer array. |
Answer» B. sorted binary trees. | |
5. |
In a graph G if e=(u,v), then u and v are called ___________. |
A. | endpoints. |
B. | adjacent nodes. |
C. | neighbours. |
D. | all of the above. |
Answer» E. | |
6. |
B-tree of order n is a order-n multiway tree in which each non-root node contains |
A. | at most (n – 1)/2 keys |
B. | exact (n – 1)/2 keys |
C. | at least 2n keys |
D. | at least (n – 1)/2 keys |
Answer» E. | |
7. |
Which of the following is true while inserting a new node in the list? |
A. | Check there is node in the list. |
B. | Check in the free node in the pool. |
C. | There is no node. |
D. | Underflow. |
Answer» C. There is no node. | |
8. |
Linked lists are suitable for which of the following problems? |
A. | Insertion sort |
B. | Binary search |
C. | Radix sort |
D. | dequeue. |
Answer» C. Radix sort | |
9. |
The concatenation of two list can performed in O(1) time. Which of the following variation oflinked list can be used? |
A. | Singly linked list |
B. | Doubly linked list |
C. | Circular doubly linked list |
D. | Array implementation of list |
Answer» D. Array implementation of list | |
10. |
The earliest use of__________ sorting was in conjunction with network analysis. |
A. | topological. |
B. | bubble. |
C. | radix. |
D. | heap. |
Answer» B. bubble. | |
11. |
What is the average case time complexity for finding the height of the binary tree? |
A. | h = O(loglogn) |
B. | h = O(nlogn) |
C. | h = O(n) |
D. | h = O(log n) |
Answer» E. | |
12. |
The elements of an array are allocated in spaces________. |
A. | successively. |
B. | randomly. |
C. | alternately. |
D. | on any order. |
Answer» B. randomly. | |
13. |
The pointer of the last node contains a special value called_____________. |
A. | null pointer. |
B. | index pointer. |
C. | pointer link. |
D. | address pointer. |
Answer» C. pointer link. | |
14. |
The number of possible undirected graphs which may have self loops but no multiple edges andhave n vertices is |
A. | 2((n*(n-1))/2) |
B. | 2((n*(n+1))/2) |
C. | 2((n-1)*(n-1))/2) |
D. | 2((n*n)/2) |
Answer» E. | |
15. |
Each node in a singly linked lists have ______ fields |
A. | 2 |
B. | 3 |
C. | 4 |
D. | 5 |
Answer» B. 3 | |
16. |
In a linked list the _________field contains the address of next element in the list. |
A. | Link field. |
B. | Next element field. |
C. | Start field. |
D. | Info field . |
Answer» B. Next element field. | |
17. |
Divide and conquer is an important algorithm design paradigm based on _______. |
A. | multi-branched recursion. |
B. | single-branched recursion. |
C. | two-way recursion. |
D. | None. |
Answer» B. single-branched recursion. | |
18. |
Given an empty AVL tree, how would you construct AVL tree when a set of numbers are givenwithout performing any rotations? |
A. | just build the tree with the given input |
B. | find the median of the set of elements given, make it as root and construct the tree |
C. | use trial and error |
D. | use dynamic programming to build the tree |
Answer» C. use trial and error | |
19. |
Which of the following is not an application of binary search? |
A. | To find the lower/upper bound in an ordered sequence |
B. | Union of intervals |
C. | Debugging |
D. | To search in unordered list |
Answer» E. | |
20. |
The complexity of Binary search algorithm is ____________. |
A. | O(n). |
B. | O(log n ). |
C. | O(n2). |
D. | O(n log n). |
Answer» C. O(n2). | |
21. |
If every node u in G is adjacent to every other node v in G, A graph is said to be _______. |
A. | isolate. |
B. | complete. |
C. | finite. |
D. | Strongly connected. |
Answer» C. finite. | |
22. |
A variable whose size is determined at compile time and cannot be changed at run time is_________. |
A. | static variable. |
B. | dynamic variable. |
C. | not a variable. |
D. | data variable. |
Answer» B. dynamic variable. | |
23. |
__________involves maintaining two tables in memory. |
A. | Arranging. |
B. | Bonding. |
C. | Combing. |
D. | Chaining. |
Answer» E. | |
24. |
Number of vertices with odd degrees in a graph having a eulerian walk is |
A. | 0 |
B. | Can’t be predicted |
C. | 2 |
D. | either 0 or 2 |
Answer» E. | |
25. |
If the elements A, B, C and D are placed in a stack and are deleted one at a time, what is the order ofremoval? |
A. | ABCD |
B. | DCBA |
C. | DCAB |
D. | ABDC |
Answer» C. DCAB | |
26. |
____________ is finding a path/tour through the graph such that every vertex is visited exactly once. |
A. | Travelling Salesman tour. |
B. | Eulerian tour. |
C. | Hamiltonian tour. |
D. | None. |
Answer» D. None. | |
27. |
The data items in a record form a ________ structure which can be described by means of level numbers. |
A. | hierarchical. |
B. | procedural. |
C. | indexed. |
D. | leveled. |
Answer» B. procedural. | |
28. |
Data items that are divided into subitems are called ___________. |
A. | single items. |
B. | group items. |
C. | elementary items. |
D. | entity items. |
Answer» C. elementary items. | |
29. |
The binary tree that has n leaf nodes. The number of nodes of degree 2 in this tree is |
A. | log2N |
B. | n-1 |
C. | n |
D. | None of the above |
Answer» C. n | |
30. |
Sub algorithms fall into two basic categories: function sub algorithms and ____________ sub algorithms. |
A. | procedure. |
B. | argument. |
C. | processor. |
D. | methods. |
Answer» B. argument. | |
31. |
When elements are deleted the nodes go to_________. |
A. | registers. |
B. | free pool. |
C. | recycle bin. |
D. | gets deleted permanently. |
Answer» C. recycle bin. | |
32. |
A queue follows |
A. | FIFO (First In First Out) principle |
B. | LIFO (Last In First Out) principle |
C. | Ordered array |
D. | Linear tree |
Answer» B. LIFO (Last In First Out) principle | |
33. |
A connected graph T without any cycles is called _____________. |
A. | a tree graph. |
B. | free tree. |
C. | a tree. |
D. | all of the above. |
Answer» E. | |
34. |
The post-order traversal of a binary tree is O P Q R S T. Then possible pre-order traversal will be |
A. | T Q R S O P |
B. | T O Q R P S |
C. | T Q O P S R |
D. | T Q O S P R |
Answer» D. T Q O S P R | |
35. |
A self – balancing binary search tree can be used to implement |
A. | Priority queue |
B. | Hash table |
C. | Heap sort |
D. | Priority queue and Heap sort |
Answer» B. Hash table | |
36. |
trees are B-trees of order 4. They are an isometric of trees. |
A. | AVL |
B. | AA |
C. | 2-3 |
D. | Red-Black |
Answer» E. | |
37. |
In a binary search tree, which of the following traversals would print the numbers in the ascendingorder? |
A. | Level-order traversal |
B. | Pre-order traversal |
C. | Post-order traversal |
D. | In-order traversal |
Answer» E. | |
38. |
The Postfix equivalent of the Prefix Notation * + ab - cd is |
A. | ab + cd - * |
B. | abcd +-* |
C. | ab+cd*- |
D. | ab+-cd* |
Answer» B. abcd +-* | |
39. |
The given array is arr = {1, 2, 4, 3}. Bubble sort is used to sort the array elements. How manyiterations will be done to sort the array? |
A. | 4 |
B. | 2 |
C. | 1 |
Answer» B. 2 | |
40. |
The possibility of two different keys k1 & k2 yielding the same hash address is called__________. |
A. | merge. |
B. | obstacle. |
C. | overlapping. |
D. | collision. |
Answer» D. collision. | |
41. |
Program module contains its own list of variables called ____________. |
A. | global. |
B. | scope. |
C. | local. |
D. | external. |
Answer» D. external. | |
42. |
What is the value of the postfix expression 6 3 2 4 + – *? |
A. | 1 |
B. | 40 |
C. | 74 |
D. | -18 |
Answer» E. | |
43. |
The queue which wraps around upon reaching the end of the array is called as____________. |
A. | circular queue. |
B. | linked queue. |
C. | doubly linked list. |
D. | representation of queue. |
Answer» B. linked queue. | |
44. |
The prefix form of an infix expression (p + q) – (r * t) is? |
A. | + pq – *rt |
B. | – +pqr * t |
C. | – +pq * rt |
D. | – + * pqrt |
Answer» D. – + * pqrt | |
45. |
What is the advantage of selection sort over other sorting techniques? |
A. | It requires no additional storage space |
B. | It is scalable |
C. | It works best for inputs which are already sorted |
D. | It is faster than any other sorting technique |
Answer» B. It is scalable | |
46. |
The sequence (1,1) (2,1) (3,1) (1,2) (2,2) (3,2) . . . .represents _________. |
A. | row major order. |
B. | column major order. |
C. | random order. |
D. | successive order. |
Answer» C. random order. | |
47. |
Maximum degree in any vector in a graph with n vertices is ________. |
A. | n. |
B. | n-1. |
C. | n+1. |
D. | 2n+1. |
Answer» C. n+1. | |
48. |
Circular Queue is also known as |
A. | Ring Buffer |
B. | Square Buffer |
C. | Rectangle Buffer |
D. | Curve Buffer |
Answer» B. Square Buffer | |
49. |
Which of the following is useful in traversing a given graph by Breath first search? |
A. | Stack. |
B. | Set. |
C. | List. |
D. | Queue. |
Answer» E. | |
50. |
Which of the following should be used to sort a huge database on a fixed-length key field? |
A. | Insertion sort |
B. | Merge sort |
C. | LSD radix sort |
D. | Quick sort |
Answer» D. Quick sort | |