

MCQOPTIONS
Saved Bookmarks
This section includes 81 Mcqs, each offering curated multiple-choice questions to sharpen your Data Structures and Algorithms knowledge and support exam preparation. Choose a topic below to get started.
1. |
Which of the following is not a technique to avoid a collision? |
A. | Make the hash function appear random |
B. | Use the chaining method |
C. | Use uniform hashing |
D. | Increasing hash table size |
Answer» E. | |
2. |
Which of the following is a widely used form of the hash tree? |
A. | B+ – tree |
B. | T tree |
C. | Tiger tree hash |
D. | Htree |
Answer» D. Htree | |
3. |
What is the formula to find the expected number of probes for an unsuccessful search in linear probing? |
A. | ½(1+1/(1-⅄)) |
B. | ½(1+1/(1-⅄)2) |
C. | ½(1+1/(1+⅄)) |
D. | ½(1+1/(1+⅄)(1-⅄)) |
Answer» B. ½(1+1/(1-⅄)2) | |
4. |
What is the worst case search time of a hashing using separate chaining algorithm? |
A. | O(N log N) |
B. | O(N) |
C. | O(N2) |
D. | O(N3) |
Answer» C. O(N2) | |
5. |
How many probes are required on average for insertion and successful search? |
A. | 4 and 10 |
B. | 2 and 6 |
C. | 2.5 and 1.5 |
D. | 3.5 and 1.5 |
Answer» D. 3.5 and 1.5 | |
6. |
Hash tree is used in data synchronisation. In the worst case the data synchronisation takes ______ time. |
A. | O(logn) |
B. | O(n2) |
C. | O(nlogn) |
D. | O(n) |
Answer» E. | |
7. |
Which of the following is identical to that of a separate chaining hash node? |
A. | Linked list |
B. | Array |
C. | Stack |
D. | Queue |
Answer» B. Array | |
8. |
What can be the value of m in the division method? |
A. | Any prime number |
B. | Any even number |
C. | 2p – 1 |
D. | 2p |
Answer» B. Any even number | |
9. |
What is the value of h(k) for the key 123456? Given: p=14, s=2654435769, w=32 |
A. | 123 |
B. | 456 |
C. | 70 |
D. | 67 |
Answer» E. | |
10. |
What is the hash function used in Double Hashing? |
A. | (h1(k) - i*h2(k))mod m |
B. | h1(k) + h2(k) |
C. | (h1(k) + i*h2(k))mod m |
D. | (h1(k) + h2(k))mod m |
Answer» D. (h1(k) + h2(k))mod m | |
11. |
___________ is not a theoretical problem but actually occurs in real implementations of probing. |
A. | Hashing |
B. | Clustering |
C. | Rehashing |
D. | Collision |
Answer» C. Rehashing | |
12. |
Which of the following is not a collision resolution strategy for open addressing? |
A. | Linear probing |
B. | Quadratic probing |
C. | Double hashing |
D. | Rehashing |
Answer» E. | |
13. |
Which of the following schemes does quadratic probing come under? |
A. | rehashing |
B. | extended hashing |
C. | separate chaining |
D. | open addressing |
Answer» E. | |
14. |
What is the time complexity to delete an element from the direct address table? |
A. | O(n) |
B. | O(logn) |
C. | O(nlogn) |
D. | O(1) |
Answer» E. | |
15. |
Which of the following is a disadvantage of using separate chaining using linked lists? |
A. | It requires many pointers |
B. | It requires linked lists |
C. | It uses array |
D. | It does not resolve collision |
Answer» B. It requires linked lists | |
16. |
Which hash function satisfies the condition of simple uniform hashing? |
A. | h(k) = lowerbound(km) |
B. | h(k)= upperbound(mk) |
C. | h(k)= lowerbound(k) |
D. | h(k)= upperbound(k) |
Answer» B. h(k)= upperbound(mk) | |
17. |
Who invented the MinHash technique? |
A. | Weiner |
B. | Samuel F. B. Morse |
C. | Friedrich Clemens Gerke |
D. | Andrei Broder |
Answer» E. | |
18. |
What is the value of m' if the value of m is 19? |
A. | 11 |
B. | 18 |
C. | 17 |
D. | 15 |
Answer» D. 15 | |
19. |
Hashing can be used in online spelling checkers. |
A. | True |
B. | False |
Answer» B. False | |
20. |
Which of the following is the hashing function for separate chaining? |
A. | H(x)=(hash(x)+f(i)) mod table size |
B. | H(x)=hash(x)+i2 mod table size |
C. | H(x)=x mod table size |
D. | H(x)=x mod (table size * 2) |
Answer» D. H(x)=x mod (table size * 2) | |
21. |
Hash tree is generalization of ______ |
A. | Heap |
B. | Hash list |
C. | BST |
D. | B – tree |
Answer» C. BST | |
22. |
How many constraints are to be met to successfully implement quadratic probing? |
A. | 1 |
B. | 2 |
C. | 3 |
D. | 4 |
Answer» C. 3 | |
23. |
Which of the following is the correct function definition for quadratic probing? |
A. | F(i)=i2 |
B. | F(i)=i |
C. | F(i)=i+1 |
D. | F(i)=i2+1 |
Answer» B. F(i)=i | |
24. |
Which of the following is true for a Hash tree? |
A. | Hashing is used for sequential access |
B. | Indexing is used for direct access |
C. | Hash tree allows only sequential access |
D. | Hashing is used for direct access |
Answer» E. | |
25. |
Which of the following is not a collision resolution technique? |
A. | Separate chaining |
B. | Linear probing |
C. | Quadratic probing |
D. | Hashing |
Answer» E. | |
26. |
In a hash table of size 10, where is element 7 placed? |
A. | 6 |
B. | 7 |
C. | 17 |
D. | 16 |
Answer» C. 17 | |
27. |
Which indicator is used for similarity between two sets? |
A. | Rope Tree |
B. | Jaccard Coefficient |
C. | Tango Tree |
D. | MinHash Coefficient |
Answer» C. Tango Tree | |
28. |
What is the advantage of the multiplication method? |
A. | only 2 steps are involved |
B. | using constant |
C. | value of m not critical |
D. | simple multiplication |
Answer» D. simple multiplication | |
29. |
Sequential access in a Hash tree is faster than in B-trees. |
A. | True |
B. | False |
Answer» B. False | |
30. |
The case in which a key other than the desired one is kept at the identified location is called? |
A. | Hashing |
B. | Collision |
C. | Chaining |
D. | Open addressing |
Answer» C. Chaining | |
31. |
Which of the following operations are done in a hash table? |
A. | Insert only |
B. | Search only |
C. | Insert and search |
D. | Replace |
Answer» D. Replace | |
32. |
What should be the load factor for separate chaining hashing? |
A. | 0.5 |
B. | 1 |
C. | 1.5 |
D. | 2 |
Answer» C. 1.5 | |
33. |
In linear probing, the cost of an unsuccessful search can be used to compute the average cost of a successful search. |
A. | True |
B. | False |
Answer» B. False | |
34. |
The value of h2(k) can be composite relatively to the hash table size m. |
A. | True |
B. | False |
Answer» C. | |
35. |
What is the worst case time complexity of the insertion in the hash tree? |
A. | O(logk(n)) |
B. | O(n2) |
C. | O(nlogk(n)) |
D. | O(kn) |
Answer» B. O(n2) | |
36. |
Where is the hash tree used? |
A. | in digital currency |
B. | in sorting of large data |
C. | for indexing in databases |
D. | in encryption of data |
Answer» B. in sorting of large data | |
37. |
Using division method, in a given hash table of size 157, the key of value 172 be placed at position ____ |
A. | 19 |
B. | 72 |
C. | 15 |
D. | 17 |
Answer» D. 17 | |
38. |
Double hashing is one of the best methods available for open addressing. |
A. | True |
B. | False |
Answer» B. False | |
39. |
A good hash approach is to derive the hash value that is expected to be dependent of any patterns that might exist in the data. |
A. | True |
B. | False |
Answer» C. | |
40. |
Hash tree is also known as _____ |
A. | Merkle tree |
B. | T -tree |
C. | Hash table |
D. | Bx-tree |
Answer» B. T -tree | |
41. |
Which technique is used for finding similarity between two sets? |
A. | MinHash |
B. | Stack |
C. | Priority Queue |
D. | PAT Tree |
Answer» B. Stack | |
42. |
What is the hash function used in multiplication method? |
A. | h(k) = floor( m(kA mod 1)) |
B. | h(k) = ceil( m(kA mod 1)) |
C. | h(k) = floor(kA mod m) |
D. | h(k) = ceil( kA mod m) |
Answer» B. h(k) = ceil( m(kA mod 1)) | |
43. |
How many steps are involved in creating a hash function using a multiplication method? |
A. | 1 |
B. | 4 |
C. | 3 |
D. | 2 |
Answer» E. | |
44. |
Collisions can be reduced by choosing a hash function randomly in a way that is independent of the keys that are actually to be stored. |
A. | True |
B. | False |
Answer» B. False | |
45. |
Hash tree is used in effective data verification in distributed systems. |
A. | True |
B. | False |
Answer» B. False | |
46. |
Which technique was firstly used to remove duplicate web pages from search results in AltaVista search engine? |
A. | MinHash |
B. | Stack |
C. | Priority Queue |
D. | PAT Tree |
Answer» B. Stack | |
47. |
What data organization method is used in hash tables? |
A. | Stack |
B. | Array |
C. | Linked list |
D. | Queue |
Answer» D. Queue | |
48. |
When are the members of two sets more common relatively? |
A. | Jaccard Index is Closer to 1 |
B. | Jaccard Index is Closer to 0 |
C. | Jaccard Index is Closer to -1 |
D. | Jaccard Index is Farther to 1 |
Answer» B. Jaccard Index is Closer to 0 | |
49. |
Which scheme provides good performance? |
A. | open addressing |
B. | universal hashing |
C. | hashing by division |
D. | hashing by multiplication |
Answer» C. hashing by division | |
50. |
Hashing is the problem of finding an appropriate mapping of keys into addresses. |
A. | True |
B. | False |
Answer» B. False | |