SlideShare a Scribd company logo
1 of 10
The link to download
CS270 Module 4 Midterm Exam (Data
Structures (Grantham University)
1.

A ____ is a list in which each element contains a key, such that the key in the
element at position k in the list is at least as large as the key in the element at
position 2k + 1 (if it exists) and 2k + 2 (if it exists).

A) hemp

B) hash table

C) heap

Points Earned: 2.5/2.5

2.

A linked list is a collection of ____.

A) addresses

B) classes

C) nodes

Points Earned: 0.0/2.5

3.

The structured design approach is also known as ____.

A) top-down design

B) object design

C) bottom-up design

Points Earned: 2.5/2.5
4.

Operations, such as finding the height, determining the number of nodes,
checking whether the tree is empty, tree traversal, and so on, on AVL trees
cannot be implemented the same way they are implemented on binary trees.

A) True

B) False

Points Earned: 2.5/2.5

5.

____ iterators are forward iterators that can also iterate backward over the
elements.

A) Output

B) Bidirectional

C) Input

Points Earned: 2.5/2.5

6.

A list is ordered if its elements are ordered according to some criteria.

A) True

B) False

Points Earned: 0.0/2.5

7.

The analysis of algorithms enables programmers to decide which algorithm to
use for a specific application.

A) True

B) False

Points Earned: 2.5/2.5

8.
The number of key comparisons in a sequential search depends on the value
of the search item.

A) True

B) False

Points Earned: 2.5/2.5

9.

A precondition is a statement specifying the condition(s) that must be true
before the function is called.

A) True

B) False

Points Earned: 2.5/2.5

10.

The header node is placed at the ____ of a list.

A) end

B) middle

C) beginning

Points Earned: 2.5/2.5

11.

The copy constructor automatically executes when, as a parameter, an object
is passed by value.

A) True

B) False

Points Earned: 2.5/2.5

12.

When the destructor ____ the queue, it deallocates the memory occupied by
the elements of the queue.

A) allocates
B) destroys

C) instantiates

Points Earned: 2.5/2.5

13.

The expression vecList.front() moves an element to the front of the vector.

A) True

B) False

Points Earned: 2.5/2.5

14.

We can traverse a singly linked list backward starting from the last node.

A) True

B) False

Points Earned: 2.5/2.5

15.

When you declare a derived class object, this object inherits the members of
the base class, but the derived class object cannot directly access the ____.

A) base class constructors

B) private data members of the base class

C) data members in its own class

Points Earned: 2.5/2.5

16.

The expression vecCont.empty() empties the vector container of all elements.

A) True

B) False

Points Earned: 2.5/2.5
17.

The components of a class are called the ____ of the class.

A) objects

B) members

C) operators

Points Earned: 2.5/2.5

18.

In a doubly linked list, some of the operations require modification from how
they were implemented for a regular linked list, because of the ____ pointer(s)
in each node.

A) two

B) three

C) null

Points Earned: 2.5/2.5

19.

The syntax for accessing a class (struct) member using the operator -> is
____.

A) pointerVariableName&->classMemberName

B) pointerVariableName.classMemberName

C) pointerVariableName->classMemberName

Points Earned: 2.5/2.5

20.

If the list is stored in an array, we can traverse the list in either direction using
an ____.

A) increment variable

B) index variable

C) interface variable
Points Earned: 2.5/2.5

21.

With the help of the ____, two values can be combined into a single unit and,
therefore, can be treated as one unit.

A) class double

B) class tuple

C) class unit

D) class pair

Points Earned: 2.5/2.5

22.

The deque class is a type of container adapter.

A) True

B) False

Points Earned: 2.5/2.5

23.

The operation ____ reinitializes the stack to an empty state.

A) init

B) alloc

C) initializeStack

Points Earned: 2.5/2.5

24.

In the random probing method, the ith slot in the probe sequence is ____.

A) (h(X) % ri) + HTSize

B) (h(X) % HTSize) + ri

C) (h(X) + HTSize) % ri
D) (h(X) + ri) % HTSize

Points Earned: 2.5/2.5

25.

The binary search algorithm uses the ____ technique to search the list.

A) divide-and-divide

B) conquer-and-resign

C) divide-and-conquer

Points Earned: 2.5/2.5

26.

To define new classes, you create new ____ files.

A) friend

B) header

C) placeholder

Points Earned: 2.5/2.5

27.

To remove, or pop, an element from the stack ____.

A) incrementstackTop by 1

B) decrementstackTop by 1

C) invertstackTop

Points Earned: 2.5/2.5

28.

Every call to a recursive function requires the system to allocate memory for
the local variables and formal parameters

A) True

B) False
Points Earned: 2.5/2.5

29.

A technique in which one system models the behavior of another system is
called ____.

A) referencing

B) simulation

C) bench testing

Points Earned: 2.5/2.5

30.

Because a queue is an important data structure, the Standard Template
Library (STL) provides a class to implement queues in a program.

A) True

B) False

Points Earned: 2.5/2.5

31.

The derived class can redefine public member functions of a base class.

A) True

B) False

Points Earned: 0.0/2.5

32.

Containers are class templates.

A) True

B) False

Points Earned: 2.5/2.5

33.

Containers are essentially used ____.
A) to update objects that are part of a given set of elements

B) to manipulate data

C) to manage objects of a given type

Points Earned: 2.5/2.5

34.

In breadth first traversal, starting at the first vertex, the graph is traversed as
little as possible.

A) True

B) False

Points Earned: 2.5/2.5

35.

If the list is stored in a linked list, we can traverse the list in only one direction
starting at the first node because the links are only in one direction.

A) True

B) False

Points Earned: 2.5/2.5

36.

Default arguments can be used with an overloaded operator.

A) True

B) False

Points Earned: 2.5/2.5

37.

In a shallow copy, two pointers of different data types point to the same
memory.

A) True

B) False
Points Earned: 2.5/2.5

38.

In a ____, customers or jobs with higher priority are pushed to the front of the
queue.

A) false queue

B) priority queue

C) free queue

D) double queue

Points Earned: 2.5/2.5

39.

The statement vecList.push_back(elem) deletes the element elem from the
vector.

A) True

B) False

Points Earned: 2.5/2.5

40.

The use of a queue structure ensures that the items are processed in the
order they are received.

A) True

B) False

Points Earned: 2.5/2.5

More Related Content

Recently uploaded

Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jNeo4j
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideStefan Dietze
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessUXDXConf
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfUK Journal
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 

Recently uploaded (20)

Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 

Featured

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

Featured (20)

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 

Cs270 module 4 midterm exam (data structures (grantham university)

  • 1. The link to download CS270 Module 4 Midterm Exam (Data Structures (Grantham University) 1. A ____ is a list in which each element contains a key, such that the key in the element at position k in the list is at least as large as the key in the element at position 2k + 1 (if it exists) and 2k + 2 (if it exists). A) hemp B) hash table C) heap Points Earned: 2.5/2.5 2. A linked list is a collection of ____. A) addresses B) classes C) nodes Points Earned: 0.0/2.5 3. The structured design approach is also known as ____. A) top-down design B) object design C) bottom-up design Points Earned: 2.5/2.5
  • 2. 4. Operations, such as finding the height, determining the number of nodes, checking whether the tree is empty, tree traversal, and so on, on AVL trees cannot be implemented the same way they are implemented on binary trees. A) True B) False Points Earned: 2.5/2.5 5. ____ iterators are forward iterators that can also iterate backward over the elements. A) Output B) Bidirectional C) Input Points Earned: 2.5/2.5 6. A list is ordered if its elements are ordered according to some criteria. A) True B) False Points Earned: 0.0/2.5 7. The analysis of algorithms enables programmers to decide which algorithm to use for a specific application. A) True B) False Points Earned: 2.5/2.5 8.
  • 3. The number of key comparisons in a sequential search depends on the value of the search item. A) True B) False Points Earned: 2.5/2.5 9. A precondition is a statement specifying the condition(s) that must be true before the function is called. A) True B) False Points Earned: 2.5/2.5 10. The header node is placed at the ____ of a list. A) end B) middle C) beginning Points Earned: 2.5/2.5 11. The copy constructor automatically executes when, as a parameter, an object is passed by value. A) True B) False Points Earned: 2.5/2.5 12. When the destructor ____ the queue, it deallocates the memory occupied by the elements of the queue. A) allocates
  • 4. B) destroys C) instantiates Points Earned: 2.5/2.5 13. The expression vecList.front() moves an element to the front of the vector. A) True B) False Points Earned: 2.5/2.5 14. We can traverse a singly linked list backward starting from the last node. A) True B) False Points Earned: 2.5/2.5 15. When you declare a derived class object, this object inherits the members of the base class, but the derived class object cannot directly access the ____. A) base class constructors B) private data members of the base class C) data members in its own class Points Earned: 2.5/2.5 16. The expression vecCont.empty() empties the vector container of all elements. A) True B) False Points Earned: 2.5/2.5
  • 5. 17. The components of a class are called the ____ of the class. A) objects B) members C) operators Points Earned: 2.5/2.5 18. In a doubly linked list, some of the operations require modification from how they were implemented for a regular linked list, because of the ____ pointer(s) in each node. A) two B) three C) null Points Earned: 2.5/2.5 19. The syntax for accessing a class (struct) member using the operator -> is ____. A) pointerVariableName&->classMemberName B) pointerVariableName.classMemberName C) pointerVariableName->classMemberName Points Earned: 2.5/2.5 20. If the list is stored in an array, we can traverse the list in either direction using an ____. A) increment variable B) index variable C) interface variable
  • 6. Points Earned: 2.5/2.5 21. With the help of the ____, two values can be combined into a single unit and, therefore, can be treated as one unit. A) class double B) class tuple C) class unit D) class pair Points Earned: 2.5/2.5 22. The deque class is a type of container adapter. A) True B) False Points Earned: 2.5/2.5 23. The operation ____ reinitializes the stack to an empty state. A) init B) alloc C) initializeStack Points Earned: 2.5/2.5 24. In the random probing method, the ith slot in the probe sequence is ____. A) (h(X) % ri) + HTSize B) (h(X) % HTSize) + ri C) (h(X) + HTSize) % ri
  • 7. D) (h(X) + ri) % HTSize Points Earned: 2.5/2.5 25. The binary search algorithm uses the ____ technique to search the list. A) divide-and-divide B) conquer-and-resign C) divide-and-conquer Points Earned: 2.5/2.5 26. To define new classes, you create new ____ files. A) friend B) header C) placeholder Points Earned: 2.5/2.5 27. To remove, or pop, an element from the stack ____. A) incrementstackTop by 1 B) decrementstackTop by 1 C) invertstackTop Points Earned: 2.5/2.5 28. Every call to a recursive function requires the system to allocate memory for the local variables and formal parameters A) True B) False
  • 8. Points Earned: 2.5/2.5 29. A technique in which one system models the behavior of another system is called ____. A) referencing B) simulation C) bench testing Points Earned: 2.5/2.5 30. Because a queue is an important data structure, the Standard Template Library (STL) provides a class to implement queues in a program. A) True B) False Points Earned: 2.5/2.5 31. The derived class can redefine public member functions of a base class. A) True B) False Points Earned: 0.0/2.5 32. Containers are class templates. A) True B) False Points Earned: 2.5/2.5 33. Containers are essentially used ____.
  • 9. A) to update objects that are part of a given set of elements B) to manipulate data C) to manage objects of a given type Points Earned: 2.5/2.5 34. In breadth first traversal, starting at the first vertex, the graph is traversed as little as possible. A) True B) False Points Earned: 2.5/2.5 35. If the list is stored in a linked list, we can traverse the list in only one direction starting at the first node because the links are only in one direction. A) True B) False Points Earned: 2.5/2.5 36. Default arguments can be used with an overloaded operator. A) True B) False Points Earned: 2.5/2.5 37. In a shallow copy, two pointers of different data types point to the same memory. A) True B) False
  • 10. Points Earned: 2.5/2.5 38. In a ____, customers or jobs with higher priority are pushed to the front of the queue. A) false queue B) priority queue C) free queue D) double queue Points Earned: 2.5/2.5 39. The statement vecList.push_back(elem) deletes the element elem from the vector. A) True B) False Points Earned: 2.5/2.5 40. The use of a queue structure ensures that the items are processed in the order they are received. A) True B) False Points Earned: 2.5/2.5