UGC NET Computer Science Data Structures Previous Year Questions (PYQs)

UGC NET Computer Science Data Structures Previous Year Questions (PYQs)

A Place for Latest Exam wise Questions, Videos, Previous Year Papers,
Study Stuff for MCA Examinations
logo

Maintaining a graph in memory by means of its adjacency matrix is known as

1
2
3
4

logo

Which of the following trees are height balanced?
  • A. Binary Search Tree
  • B. AVL Tree
  • C. Red-Black Tree
  • D. B-Tree

Choose the correct answer from the options below:

  1. A and D only
  2. A, B and D only
  3. C and D only
  4. B and C only

1
2
3
4

logo

When developing a dynamic programming algorithm, the sequence of steps followed is:

  • A. Construct an optimal solution from computed information.
  • B. Recursively define the value of an optimal solution.
  • C. Characterize the structure of an optimal solution.
  • D. Compute the value of an optimal solution, typically in a bottom-up fashion.

Choose the correct answer from the options given below:

  1. B, C, A, D
  2. B, A, C, D
  3. C, B, A, D
  4. C, B, D, A

1
2
3
4

logo

The correct sequence of constructing Huffman tree is

A. Repeat until root formed
B. Create leaf nodes
C. Build priority queue
D. Combine lowest frequency nodes

Choose the correct answer from the options given below:

1
2
3
4

logo

The longest common subsequence of $\{1,2,3,2,4,1,2\}$ and $\{2,4,3,1,2,1\}$ is

1
2
3
4

logo

List I List II
A. Circular Queue III. Dijkstra algorithm
B. Priority Queue II. CPU Scheduling
C. Double Ended Queue I. Print Queue
D. Simple Queue IV. Palindrome checking

Choose the correct answer from the options given below:


1
2
3
4

logo

Consider the following infix expression: Q = ((A + B) * D) ↑ (E − F) The equivalent postfix expression of Q is:

1
2
3
4

logo

Match List I with List II
List I (Hashing Collision Handling Method)List II (Strategy)
A. ChainingI. Check next slot
B. Linear ProbingII. Use second hash function
C. Quadratic ProbingIII. Linked list at index
D. Double HashingIV. Skip slots using quadratic step

1
2
3
4

logo

Which of the following algorithms use the Greedy strategy?
A. Dijkstra’s algorithm
B. Kruskal’s algorithm
C. Huffman coding
D. Bellman-Ford algorithm

1
2
3
4

UGC NET Computer Science


Online Test Series,
Information About Examination,
Syllabus, Notification
and More.

Click Here to
View More

UGC NET Computer Science


Online Test Series,
Information About Examination,
Syllabus, Notification
and More.

Click Here to
View More

Ask Your Question or Put Your Review.

loading...