网站大量收购闲置独家精品文档,联系QQ:2885784924

数据结构试题(修改).doc

  1. 1、本文档共7页,可阅读全部内容。
  2. 2、有哪些信誉好的足球投注网站(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
  3. 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载
  4. 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
数据结构试题(修改)

200X年试题 选择题 (1)Suppose 1,2,3,4 is the order which these elements push onto a stack. The sequence obtained is () A.4.1.2.3 B.3.2.4.1 C.3.4.1.2 D.4.3.1.2 (2)Suppose that a linear list contains n=31 nodes, the binary search is applied to the list, the maximum times in searching is () A 4 B 5 C 25-1 D 24-1 (3)In the following sorting algorithms, which is unstable() A Selection sort B Merge sort C Bubble sort D Insertion sort (4)Bubble sort is used for n nodes, the minimum number of comparisons is () A n-1 B n C n(n-1/2) D n(n+1)/2 (5)How many binary trees in different forms can at most be built by three nodes? A 4 B 5 C 6 D 7 填空题 .(1)The stack takes on character of _______________________________ (2)The postfix expression is ‘abcdef*/-*+’. Its infix expression is _____________________ (3)The advantage of circular queues is _____________________ .(4)If the depth of full binary tree is k, then the number of nodes in the tree at least_____________ (5)The selection sort is used to sort n nodes, the number of its comparisons is ______________________ 三.(1) Write a function Deletion in C for linear list. (5 points) (2)Write a function Pop in C for linked stack. (5 points) (3)Write a function in C for binary search. (10 point ) (4)Write some sentences in C which delete the node b in the following figure. (5 point)(附图) (5)Write some sentences in C which insert the node b in the following figure(5pont)(附图) 四. (1) Write a function in C of randex(基数)sort. (10 point ) (2)Write a function in C of quick sort. (10 point ) (3)Suppose that a hash table contains 5 entries indexed from 0 through 4 and that the following keys are to be mapped into the table. 12,19,17,14,10,24,15 Hash function h(k)=k mod 5. (a)Determine the hash addresses and resolute collision by chaining. (b)Write a function in C for search by chaining. (10point) 五. (1)Write a function in C which will in

文档评论(0)

xcs88858 + 关注
实名认证
内容提供者

该用户很懒,什么也没介绍

版权声明书
用户编号:8130065136000003

1亿VIP精品文档

相关文档