CS502 Midterm Online Quiz

0%

CS502-Midterm

1 / 50

For Chain Matrix Multiplication we can not use divide and conquer approach because,

2 / 50

We cannot make any significant improvement in the running time which is better than that of brute-force algorithm.

3 / 50

After sorting in merge sort algorithm, merging process is invoked.

4 / 50

_______________ is a graphical representation of an algorithm

5 / 50

For the heap sort, access to nodes involves simple _______________ operations.

6 / 50

In Sieve Technique we do not know which item is of interest

7 / 50

Sieve Technique applies to problems where we are interested in finding a single item from a larger set of _____________

8 / 50

A RAM is an idealized machine with ______________ random-access memory.

9 / 50

A RAM is an idealized algorithm with takes an infinitely large random-access memory.

10 / 50

Random access machine or RAM is a/an

11 / 50

Efficient algorithm requires less computational…….

12 / 50

In analysis, the Upper Bound means the function grows asymptotically no faster than its largest term.

13 / 50

One example of in place but not stable algorithm is

14 / 50

If we associate (x, y) integers pair to cars where x is the speed of the car and y is the negation of the price. High y value for a car means a ________ car.

15 / 50

The O-notation is used to state only the asymptotic ________bounds.

16 / 50

While solving Selection problem, in Sieve technique we partition input data __________w

17 / 50

The time assumed for each basic operation to execute on RAM model of computation is-----

18 / 50

The reason for introducing Sieve Technique algorithm is that it illustrates a very important special case of,

19 / 50

Divide-and-conquer as breaking the problem into a small number of

20 / 50

What is the solution to the recurrence T(n) = T(n/2)+n .

21 / 50

The definition of Theta-notation relies on proving ___________asymptotic bound.

22 / 50

Is it possible to sort without making comparisons?

23 / 50

In the analysis of Selection algorithm, we make a number of passes, in fact it could be as many as,

24 / 50

For the heap sort we store the tree nodes in

25 / 50

Due to left complete nature of binary tree, the heap can be stored in

26 / 50

For the worst-case running time analysis, the nested loop structure containing one “for” and one “while” loop, might be expressed as a pair of _________nested summations.

27 / 50

Sorting can be in _________

28 / 50

In the analysis of Selection algorithm, we eliminate a constant fraction of the array with each phase; we get the convergent _______________ series in the analysis,

29 / 50

_________ is one of the few problems, where provable lower bounds exist on how fast we can sort.

30 / 50

What type of instructions Random Access Machine (RAM) can execute?

31 / 50

Quick sort is

32 / 50

In analysis, the Lower Bound means the function grows asymptotically at least as fast as its largest term.

33 / 50

Analysis of Selection algorithm ends up with,

34 / 50

Sieve Technique applies to problems where we are interested in finding a single item

from a larger set of _____________

35 / 50

In Heap Sort algorithm, the total running time for Heapify procedure is ____________

36 / 50

The running time of quick sort depends heavily on the selection of

37 / 50

The ancient Roman politicians understood an important principle of good algorithm design that is plan-sweep algorithm.

38 / 50

In ____________ we have to find rank of an element from given input.

39 / 50

Asymptotic growth rate of the function is taken over_________ case running time.

40 / 50

In Heap Sort algorithm, if heap property is violated _________

41 / 50

One Example of in place but not stable sort is

42 / 50

In Quick sort, we don’t have the control over the sizes of recursive calls

43 / 50

Which may be a stable sort?

44 / 50

In 2d-space a point is said to be ________if it is not dominated by any other point in that space.

45 / 50

In pseudo code, the level of details depends on intended audience of the algorithm.w

46 / 50

The sieve technique is a special case, where the number of sub problems is just

47 / 50

F (n) and g (n) are asymptotically equivalent. This means that they have essentially the same __________ for large n.

48 / 50

One of the clever aspects of heaps is that they can be stored in arrays without using any _______________.

49 / 50

The Knapsack problem belongs to the domain of _______________ problems.

50 / 50

Algorithm is a mathematical entity, which is independent of a specific machine and operating system.

Your score is

The average score is 40%

0%

Qunoot e Nazilah
Dua e Hajat
4 Qul
6 Kalma
Dua-e-Akasha
Darood Akbar
Surah Fatiha
Dua-e-Ganj Ul Arsh
Dua-e-Jamilah
Ayat-ul-Kursi