II B.Tech I Semester Examinations,November 2010 ADVANCED DATA STRUCTURES AND ALGORITHMS Common to Information Technology, Computer Science And Systems Engineering Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks ????? 1. (a) Develop a routine in C++ to delete a minimum key from a binary heap. (b) Write a C++ implementation for merging two equally sized binomial trees. [10+6] 2. (a) What is the use of detecting end of file? Explain how to detect an end of file. (b) Differentiate file stream and string stream.
[8+8]
3. (a) What are the advantages of new operator than malloc in C? (b) What are the uses of new and delete operator?
[6+10]
4. (a) Differentiate between greedy method and dynamic programming? (b) Explain prim’s algorithm with an example.
[8+8]
5. Detail a C++ class with all operations that contain two stacks in which a single array is used to represent both stacks, and they should grow towards the middle of the array. [16] 6. (a) What is linear probing? Write a C++ class that shows the data members and constructors for the hash table class. (b) Write a C++ program to implement a search operation in a hash table. [6+10] 7. Write and explain a non recursive algorithm for in - order traversal of binary tree with n example? [16] 8. Discuss in detail about deletion from a binary search tree with one suitable example? [16] ?????
www.questionpaperdownload.com
www.questionpaperdownload.com
Code No: 07A3EC20
R07
Set No. 4
II B.Tech I Semester Examinations,November 2010 ADVANCED DATA STRUCTURES AND ALGORITHMS Common to Information Technology, Computer Science And Systems Engineering Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks ????? 1. Detail a C++ class with all operations that contain two stacks in which a single array is used to represent both stacks, and they should grow towards the middle of the array. [16] 2. (a) What is linear probing? Write a C++ class that shows the data members and constructors for the hash table class. (b) Write a C++ program to implement a search operation in a hash table. [6+10] 3. Discuss in detail about deletion from a binary search tree with one suitable example? [16] 4. Write and explain a non recursive algorithm for in - order traversal of binary tree with n example? [16] 5. (a) What is the use of detecting end of file? Explain how to detect an end of file. (b) Differentiate file stream and string stream.
[8+8]
6. (a) Develop a routine in C++ to delete a minimum key from a binary heap. (b) Write a C++ implementation for merging two equally sized binomial trees. [10+6] 7. (a) Differentiate between greedy method and dynamic programming? (b) Explain prim’s algorithm with an example.
[8+8]
8. (a) What are the advantages of new operator than malloc in C? (b) What are the uses of new and delete operator?
[6+10]
?????
www.questionpaperdownload.com
www.questionpaperdownload.com
Code No: 07A3EC20
R07
Set No. 1
II B.Tech I Semester Examinations,November 2010 ADVANCED DATA STRUCTURES AND ALGORITHMS Common to Information Technology, Computer Science And Systems Engineering Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks ????? 1. Discuss in detail about deletion from a binary search tree with one suitable example? [16] 2. (a) What are the advantages of new operator than malloc in C? (b) What are the uses of new and delete operator?
[6+10]
3. (a) Develop a routine in C++ to delete a minimum key from a binary heap. (b) Write a C++ implementation for merging two equally sized binomial trees. [10+6] 4. Detail a C++ class with all operations that contain two stacks in which a single array is used to represent both stacks, and they should grow towards the middle of the array. [16] 5. (a) What is linear probing? Write a C++ class that shows the data members and constructors for the hash table class. (b) Write a C++ program to implement a search operation in a hash table. [6+10] 6. (a) What is the use of detecting end of file? Explain how to detect an end of file. (b) Differentiate file stream and string stream.
[8+8]
7. (a) Differentiate between greedy method and dynamic programming? (b) Explain prim’s algorithm with an example.
[8+8]
8. Write and explain a non recursive algorithm for in - order traversal of binary tree with n example? [16] ?????
www.questionpaperdownload.com
www.questionpaperdownload.com
Code No: 07A3EC20
R07
Set No. 3
II B.Tech I Semester Examinations,November 2010 ADVANCED DATA STRUCTURES AND ALGORITHMS Common to Information Technology, Computer Science And Systems Engineering Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks ????? 1. Detail a C++ class with all operations that contain two stacks in which a single array is used to represent both stacks, and they should grow towards the middle of the array. [16] 2. Write and explain a non recursive algorithm for in - order traversal of binary tree with n example? [16] 3. (a) What are the advantages of new operator than malloc in C? (b) What are the uses of new and delete operator?
[6+10]
4. Discuss in detail about deletion from a binary search tree with one suitable example? [16] 5. (a) What is linear probing? Write a C++ class that shows the data members and constructors for the hash table class. (b) Write a C++ program to implement a search operation in a hash table. [6+10] 6. (a) Develop a routine in C++ to delete a minimum key from a binary heap. (b) Write a C++ implementation for merging two equally sized binomial trees. [10+6] 7. (a) Differentiate between greedy method and dynamic programming? (b) Explain prim’s algorithm with an example.
[8+8]
8. (a) What is the use of detecting end of file? Explain how to detect an end of file. (b) Differentiate file stream and string stream.
constructors for the hash table class. (b) Write a C++ program to implement a search operation in a hash table. [6+10]. 7. Write and explain a non recursive ...
Explain how in a population of telomere deficient cells, the loss of p53 facilitates. the development of cancer? [16] ? ? ? ? ? www.questionpaperdownload.com ...
Page 2 of 8. Code No: R05420306 R05 Set No. 2. Figure 6. 7. (a) Explain the application of industrial Robots in stamping - press operation. (b) What are the ...
iii. the energy stored. 7. Explain about the parameters of the open wire line at high frequencies? [16]. 8. (a) List out the applications of transmission lines.
Explain universal soil loss equation (USLE) and estimation of various factors in. USLE. [16]. 5. Explain how remote sensing and GIS is useful for preparation of ...
(a) Explain synchronus an asynchronus time division multiplexing of PCM sig- nals? (b) âPulse modulation systems are not digital, where as, pulse-code ...
Use partial fraction method to express X(z) as a sum of terms. iii. Determine x(n) [4+12]. 2. (a) Find the Fourier series of the wave shown in figure 1a. Figure 1a.
State and prove the perceptron convergence theorem. [16]. 4. State and explain the generalized delta learning rule applied in back propagation. algorithm. [16].
1.a) Discuss various customer myths and realities in software development. b) What do you mean by software affliction? [8+8]. 2.a) Explain how would you select ...
illustrate overloaded constructor and copy constructor? [5+4+7]. 3.a) Difference between Static Binding and Dynamic Binding with example? b) Explain at least ...
Explain different phases of action potential of cardiac muscle fibre of heart? [16]. 4. Explain pulmonary ventilation in detail and sketch the neat diagram of lungs ...
(b) What is cipher feedback mode? Why it is used? [10+6] ? ? ? ? ? Page 1 of 1. B Tech 3-1 R05 CN Question Paper.pdf. B Tech 3-1 R05 CN Question Paper.pdf.
plates is 2cm and the accelerating voltage is 1000volts. [8+8] ? ? ? ? ? 1. www.QuestionPaperDownload.com www.QuestionPaperDownload.com. Page 1 of 4 ...
Construct a FA for the following Right Linear Grammar (R.L.G) and write the. conversion procedure? S A â 0. A A â10 / â. [16]. 5.a) Describe the language in ...
where X(k) is the 10-point DFT of x(n). (c) Find the 10-point sequence y(n) that has a DFT Y(K)=X(K)W(K) where. X(K)is the 10-point DFT of the sequence.
(a) Explain how a server generates dynamic content. (b) Give a note on request time errors. [8+8]. 7. Java server pages simplify the delivery of dynamic web ...
What are the models available in supply chain management? Explain any one of. the model with a suitable example. [16]. 7. Define data mining and describe its ...