Q3.The keys 12, 18, 13, 2, 3, 23, 5 and 15 are inserted into an initially empty hash table of length 10 using
open addressing with hash function h(k) = k mod 10 and linear probing. What is the resultant hash
table?
Answer : Option CExplaination / Solution: No Explaination.
Q6.Consider different activities related to email.
m1: Send an email from a mail client to a mail server
m2: Download an email from mailbox server to a mail client
m3: Checking email in a web browser
Which is the application level protocol used in each activity?
Answer : Option CExplaination / Solution:
Sending an email will be done through user agent and message transfer agent by
SMTP, downloading an email from mail box is done through POP, checking email
in a web browser is done through HTTP
Q10.In quick sort, for sorting n elements, the (n/4)th the smallest element is selected as pivot using an O(n)
time algorithm. What is the worst case time complexity of the quick sort?
Answer : Option BExplaination / Solution: No Explaination.
Total Question/Mark :
Scored Mark :
Mark for Correct Answer : 1
Mark for Wrong Answer : -0.5
Mark for Left Answer : 0