Labmanual BE03000081 Data Structure Ce
Labmanual BE03000081 Data Structure Ce
Data Structures
(BE03000081)
Enrollment No
Name
Branch
Academic Term
Institute Name
CERTIFICATE
completed the Practical / Tutorial work for the subject Data structure
Place:
Date:
Preface
The Data Structures Lab Manual has been carefully designed to complement the core
theoretical concepts taught in the Data Structures course, which is foundational to the field of
Computer Science and Engineering. This manual serves as a bridge between theory and practical
implementation, helping students develop the essential skills required to design, implement, and
analyze various data structures and the algorithms that operate on them.
Data Structures form the backbone of many critical areas such as operating systems, databases,
artificial intelligence, compilers, and software engineering. Understanding and implementing them
effectively is vital for solving complex computational problems. The experiments included in this
manual are aimed at fostering problem-solving abilities, logical thinking, and programming skills in
students.
The manual encourages students to study the theoretical concepts and procedures in advance,
allowing them to perform experiments more effectively and confidently. It also supports faculty
members with guidelines and assessment rubrics to ensure student-centric, safe, and meaningful lab
sessions.
We hope this manual becomes a valuable resource in your learning journey and contributes to
building a strong foundation in data structures and algorithmic thinking.
Data Structures (BE03000081) Enrollment No:
DTE’s Vision
▪ Develop student friendly resources with a special focus on girls’ education and support to
weaker sections
▪ Develop programs relevant to industry and create a vibrant pool of technical professionals
Institute’s Vision
To transform the students into good human beings, employable engineering graduates and continuous
learners by inculcating human values and imparting excellence in technical education.
Institute’s Mission
To impart education to rural and urban students, so as to earn respect from the society and thereby
improving the living standards of their families and become asset for the industry and society. To foster
a learning environment with technology integration and individual attention, so that the students imbibe
quality technical knowledge, skill-development and character building.
Department’s Vision
To achieve excellence for providing value based education in computer science and Information
Technology through innovation, team work and ethical practices.
Department’s Mission
To produce graduates according to the need of industry, government, society and scientific
community and to develop partnership with industries, government agencies and R & D
Organizations for knowledge sharing and overall development of faculties and students.
To motivate students/graduates to be entrepreneurs.
To motivate students to participate in reputed conferences, workshops, symposiums, seminars and
related technical activities.
To impart human and ethical values in our students for better serving of society.
Data Structures (BE03000081) Enrollment No:
Programme Outcomes (POs)
Have careers in industry, research & academics focusing on the application of the information
technologies and take leadership positions in the industry and also initiate businesses offering
innovative solutions.
Capable of adapting to new technologies and constantly upgrade their skills with an attitude
towards lifelong learning.
Act conscientiously about the potentials and the responsibilities of the computing profession in the
context of science, technology, society and humanity.
Data Structures (BE03000081) Enrollment No:
C C C C C
Sr.
Practical Outcome/Title of experiment O O O O O
No.
1 2 3 4 5
6. Tree
7. Graph
important feature.
8. Searching
9. Sorting
The following industry relevant competencies are expected to be developed in the student by
undertaking the practical work of this laboratory.
1. Will be able to classify data structures and identify storage representation of primitive
and non-primitive data structures
2. Will be able to implement various operations on Stack, Queue, Link list, Tree, Graph,
Hashing and File operations.
3. Will be able to understand need of sorting and searching for various applications
4. Will be able to apply various data structure to design real time applications in efficient
manner.
1. Teacher should provide the guideline with demonstration of practical to the students
with all features.
2. Teacher shall explain basic concepts/theory related to the experiment to the students before
starting of each practical
3. Involve all the students in performance of each experiment.
4. Teacher is expected to share the skills and competencies to be developed in the
students and ensure that the respective skills and competencies are developed in the
students after the completion of the experimentation.
5. Teachers should give opportunity to students for hands-on experience after the
demonstration.
6. Teacher may provide additional knowledge and skills to the students even though not
covered in the manual but are expected from the students by concerned industry.
7. Give practical assignment and assess the performance of students based on task
assigned to check whether it is as per the instructions or not.
8. Teacher is expected to refer complete curriculum of the course and follow the
guidelines for implementation.
1. Students are expected to carefully listen to all the theory classes delivered by the faculty
members and understand the COs, content of the course, teaching and examination scheme,
skill set to be developed etc.
2. Students will have to perform experiments on computer system on which C/C++ compiler is
installed to execute programs of data structure.
3. Students should develop programs and execute all the programs using C/C++ compiler.
Students have to show output of each program in their practical file.
4. Students are instructed to submit practical list as per given sample list shown on next page.
5. Student should develop a habit of submitting the experimentation work as per the schedule
and s/he should be well prepared for the same.
Data Structures (BE03000081) Enrollment No:
Common Safety Instructions
Index
(Progressive Assessment Sheet)
Dat Sign.
Sr Date
e of Assess of Re
. Page of
N
Objective(s) of Experiment perf ment Teache mar
No. subm
o. orm Marks r with ks
ission
ance date
Field)
(d) Delete a first node of the linked list.
(e) Delete a node before specified
position.
(f) Delete a node after specified position.
3.2 Write a program to implement stack
using linked list.
3.3 Write a program to implement queue
using linked list.
4. Doubly linked list
1.1 Write a program to implement following
operations on the doubly linked list.
(a) Insert a node at the front of the linked
list.
(b) Insert a node at the end of the linked
list.
(c) Delete a last node of the linked list.
(d) Delete a node before specified
position.
5. Circular linked list
1.1 Write a program to implement following
operations on the circular linked list.
(a) Insert a node at the end of the linked
list.
(b) Insert a node before specified
position.
(c) Delete a first node of the linked list.
(d) Delete a node after specified
position.
1.2 Identify widely used application which
use Linked List for implementation of its
important feature.
6. Tree
6.1 Write a program which create binary
search tree.
6.2 Implement recursive tree traversing
methods in-order, pre-order and post-
order traversal.
6.3 Identify widely used application which
use Tree data structure for
implementation of its important feature.
7. Graph
Data Structures (BE03000081) Enrollment No:
Total
Data Structures (BE03000081) Enrollment No
Experiment No – 1
AIM: Classification of Data Structure and Stack
Theory:
A data structure is a systematic way of organizing and storing data in a computer so that it can be
accessed and modified efficiently. It is fundamental to designing efficient algorithms. The choice of
the correct data structure depends on the type of operation to be performed, the data to be handled,
and the performance needs of the application.
A data structure is typically defined using an Abstract Data Type (ADT), which specifies:
Page No
Data Structures (BE03000081) Enrollment No
● The kind of data stored
● The operations that can be performed on it (e.g., insert, delete, search)
A stack is a linear data structure that operates on the Last-In First-Out (LIFO) principle. This means
that the last element added (pushed) to the stack is the first one to be removed (popped).
Basic Operations:
● Push: Add an element to the top of the stack.
● Pop: Remove the top element from the stack.
Characteristics:
● Only one end is accessible (the top).
● Think of it like a stack of plates or books — you add/remove only from the top.
Diagrammatic Representation:
| 30 | ← Top (SP)
| 25 |
| 10 |
| |
In infix expressions, operators are written between operands (e.g., A + B). In postfix expressions,
operators are written after their operands (e.g., AB+).
Stacks are used to convert infix expressions to postfix using the following algorithm:
Algorithm:
1. Scan the infix expression from left to right.
Page No
Data Structures (BE03000081) Enrollment No
2. If the symbol is:
3. After the expression ends, pop all remaining operators from the stack to the postfix output.
Example:
Infix: A + B * C
Postfix: A B C * +
1. Primitive data structures: Primitive data structures are simple data structures
constructed using the standard data types of a computer language. Examples of primitive
data structures include variables, arrays, pointers, structures, unions, and more. These
structures are used to build more complex data structures
Page No
Data Structures (BE03000081) Enrollment No
Linear data structures are arranged as a continuous set of data elements in the memory
and can be constructed using array data types. In linear data structures, the adjacency
relationship between data elements is maintained.
✔ Add an element
✔ Delete an element
✔ Traverse
✔ Stack
✔ Queue
✔ Tables
✔ List
✔ Linked Lists.
Non-linear data structures are not arranged in a continuous manner and include data
structures such as trees and graphs. These structures can be used to represent complex
relationships between data elements.
✔ Add elements
✔ Delete elements
Page No
Data Structures (BE03000081) Enrollment No
✔ Sort the list of elements
✔ Tree
✔ Decision tree
✔ Graph
✔ Forest
1.2 Implement a program for stack that performs following operations using array.
(a) PUSH (b) POP (c) PEEP (d) CHANGE (e) DISPLAY
Program:
Page No
Data Structures (BE03000081) Enrollment No
-
Output:
Page No
Data Structures (BE03000081) Enrollment No
1.3 Implement a program to convert infix notation to postfix notation using stack.
Program:
Page No
Data Structures (BE03000081) Enrollment No
1.4 Write a program to implement the Tower of Hanoi problem.
Program:
Output:
Page No
Data Structures (BE03000081) Enrollment No
1.5 Identify widely used application which use stack data structure for implementation of its
important feature.
Stack Applications:
1. Stack is used by compilers to check for balancing of parentheses, brackets and braces.
2. Stack is used to evaluate a postfix expression.
3. Stack is used to convert an infix expression into postfix/prefix form.
4. In recursion, all intermediate arguments and return values are stored on the processor’s
stack.
5. During a function call the return address and arguments are pushed onto a stack and on return
they are popped off.
6. Depth first search uses a stack data structure to find an element from a graph.
Observations:
Conclusion:
Quiz:
Page No
Data Structures (BE03000081) Enrollment No
(3) Explain infix, prefix and postfix expressions
Suggested Reference:
Completeness
Problem Coding
Logic and accuracy
Rubric Understanding Standards Q & A Total
Building (2) (2)
s (2) (2)
Avg. Good Avg. Good Av Goo Avg. Good Av Goo
(1) (2) (1) (2) g. d (2) (1) (2) g. d (2)
(1) (1)
Marks
Page No
Data Structures (BE03000081) Enrollment No
Experiment No: 2
AIM : Queue
2.1 Write a program to implement QUEUE using arrays that performs following
operations (a)INSERT (b) DELETE (c) DISPLAY
2.2 Write a program to implement Circular Queue using arrays that performs following
operations. (a) INSERT (b) DELETE (c) DISPLAY
2.3 Identify widely used application which uses Queue data structure for implementation
of its important feature.
Theory:
Queue
A queue is a data structure that follows the First In, First Out (FIFO) principle. It is a special type of
list where items are inserted at the rear and deleted from the front end. Queues can be compared to
real-world scenarios, such as people waiting in line at a bank.
✔ Queue
✔ Circular Queue
✔ D-Queue
✔ Priority Queue
Page No
Data Structures (BE03000081) Enrollment No
2.1 Write a program to implement QUEUE using arrays that performs following
operations. (a)INSERT (b) DELETE (c) DISPLAY
Program:
Page No
Data Structures (BE03000081) Enrollment No
Output:
2.2 Write a program to implement Circular Queue using arrays that performs following
operations. (a) INSERT (b) DELETE (c) DISPLAY
Program:
Page No
Data Structures (BE03000081) Enrollment No
Output:
Page No
Data Structures (BE03000081) Enrollment No
2.3 Identify widely used application which uses Queue data structure for implementation
of its important feature.
Observations:
Conclusion:
Quiz:
Page No
Data Structures (BE03000081) Enrollment No
Suggested Reference:
Completeness
Problem Coding
Logic and accuracy
Rubric Understanding Standards Q&A Total
Building (2) (2)
s (2) (2)
Avg. Good Avg. Good Avg. Good Avg. Good Avg. Good
(1) (2) (1) (2) (1) (2) (1) (2) (1) (2)
Marks
Page No
Data Structures (BE03000081) Enrollment No
Experiment No: 3
3.1 Write a menu driven program to implement following operations on the singly linked
list.
(a) Insert a node at the front of the linked list.
(b) Insert a node at the end of the linked list.
(c) Insert a node such that linked list is in ascending order. (According to INFO field)
(d) Delete a first node of the linked list.
(e) Delete a node before specified position.
(f) Delete a node after specified position.
3.2 Write a program to implement stack using linked list
3.3 Write a program to implement queue using linked list.
Page No
Data Structures (BE03000081) Enrollment No
Operations on singly linked list
✔ Insert
- Insert at first position
- Insert at last position
- Insert into ordered list
✔ Delete
3.1 Write a menu driven program to implement following operations on the singly linked
list.
(a) Insert a node at the front of the linked list.
(b) Insert a node at the end of the linked list.
(c) Insert a node such that linked list is in ascending order.(According to INFO field)
(d) Delete a first node of the linked list.
(e) Delete a node before specified position.
(f) Delete a node after specified position.
Program:
Page No
Data Structures (BE03000081) Enrollment No
Page No
Data Structures (BE03000081) Enrollment No
Output:
Program:
Page No
Data Structures (BE03000081) Enrollment No
Output:
Program:
Page No
Data Structures (BE03000081) Enrollment No
Output:
Observations:
Conclusion:
Page No
Data Structures (BE03000081) Enrollment No
Quiz:
(1) Which are the operations on singly link list?
Suggested Reference:
Completeness
Problem Coding
Logic and accuracy
Rubric Understanding Standards Q&A Total
Building (2) (2)
s (2) (2)
Avg. Good Avg. Good Avg. Good Avg. Good Avg. Good
(1) (2) (1) (2) (1) (2) (1) (2) (1) (2)
Marks
Page No
Data Structures (BE03000081) Enrollment No
Experiment No: 4
4.1 Write a program to implement following operations on the doubly linked list.
(a) Insert a node at the front of the linked list.
(b) Insert a node at the end of the linked list.
(c) Delete a last node of the linked list.
(d) Delete a node before specified position.
Theory:
A doubly linked list is a data structure where each node contains data and two pointers - one to point
to the previous node (LPTR) and another to point to the next node (RPTR). The main advantage of a
doubly linked list is that we can traverse it in any direction, either forward or backward. Another
advantage is that we can delete a node with ease since we have pointers to both the previous and next
nodes. In contrast, a node on a singly linked list cannot be removed unless we have a pointer to its
predecessor. However, the drawback of a doubly linked list is that it requires more memory than a
singly linked list since we need an extra pointer to point to the previous node. In the image, L and R
denote the leftmost and rightmost nodes in the list, respectively. The left link of the L node and the
right link of the R node are both NULL, indicating the end of the list for each direction.
Page No
Data Structures (BE03000081) Enrollment No
Operations on doubly linked list
✔ Insert
- Insert at first position
- Insert at last position
- Insert into ordered list
✔ Delete
4.1 Write a program to implement following operations on the doubly linked list.
(a) Insert a node at the front of the linked list.
(b) Insert a node at the end of the linked list.
(c) Delete a last node of the linked list.
(d) Delete a node before specified position.
Program:
Page No
Data Structures (BE03000081) Enrollment No
Output:
Page No
Data Structures (BE03000081) Enrollment No
Observations:
Conclusion:
Quiz:
Suggested Reference:
Completeness
Problem Coding
Logic and accuracy
Rubric Understanding Standards Q&A Total
Building (2) (2)
s (2) (2)
Avg. Good Avg. Good Avg. Good Avg. Good Avg. Good
(1) (2) (1) (2) (1) (2) (1) (2) (1) (2)
Marks
Page No
Data Structures (BE03000081) Enrollment No
Experiment No: 5
5.1 Write a program to implement following operations on the circular linked list.
(a) Insert a node at the end of the linked list.
(b) Insert a node before specified position.
(c) Delete a first node of the linked list.
(d) Delete a node after specified position.
5.2 Identify widely used application which uses linked list for implementation of its
important feature.
Theory:
A circular linked list is similar to a singly linked list, except that the last node points to the first node,
creating a circular arrangement of nodes. Unlike a singly linked list, it does not contain null pointers.
Traversal can only be done in one direction, i.e., the forward direction. The biggest advantage of a
circular linked list is that it saves time when we want to go from the last node to the first node
because it directly points to the first node. A good example of an application where a circular linked
list can be used is a time-sharing problem that can be solved by the operating system.
✔ Insert
- Insert at first position
Page No
Data Structures (BE03000081) Enrollment No
- Insert at last position
- Insert into ordered list
✔ Delete
Program:
Page No
Data Structures (BE03000081) Enrollment No
Output:
5.2 Identify widely used application which uses linked list for implementation of its
important feature.
Observations:
Conclusion:
Page No
Data Structures (BE03000081) Enrollment No
Quiz:
Suggested Reference:
Marks
Page No
Data Structures (BE03000081) Enrollment No
Experiment No: 6
AIM : Tree
Theory:
A binary search tree is a binary tree in which each node possessed a key that satisfy the
following conditions
1. All key (if any) in the left sub tree of the root precedes the key in the root.
2. The key in the root precedes all key (if any) in the right sub tree.
3. The left and right sub tree sub trees of the root are again search trees.
Operations on tree
The most common operations performed on tree structure are that of traversal. This is a procedure
by which each node in the tree is processed exactly once in a systematic manner.
Page No
Data Structures (BE03000081) Enrollment No
1. Pre-order Traversal
2. In-order Traversal
3. Post-order Traversal
Pre-order
✔ If particular sub tree is empty (i.e., node has no left or right descendant) the traversal is
performed by doing nothing, In other words, a null sub tree is considered to be fully
traversed when it is encountered.
In-order
Post-order
Program:
Page No
Data Structures (BE03000081) Enrollment No
Output:
6.3 Identify widely used applications which use Tree data structure for implementation
of its important feature.
Observations:
Conclusion:
Page No
Data Structures (BE03000081) Enrollment No
Quiz:
Suggested Reference:
Completeness
Problem Coding
Logic and accuracy
Rubric Understanding Standards Q&A Total
Building (2) (2)
s (2) (2)
Avg. Good Avg. Good Avg. Good Avg. Good Avg. Good
(1) (2) (1) (2) (1) (2) (1) (2) (1) (2)
Marks
Page No
Data Structures (BE03000081) Enrollment No
Experiment No: 7
AIM : Graph
Theory:
Graph:
A graph G can be defined as a non-empty set of vertices or nodes (V) and a set of edges (E) that
represents the relationship or connection between those nodes. The edges can be defined as a
mapping from E to pairs of elements of V. A graph can be represented as G = (V, E), where V
represents the set of nodes and E represents the set of edges. Each edge of the graph G can be
associated with a pair of nodes of the graph. If an edge X belongs to E and is associated with a pair of
nodes (u, v), where u and v belong to V, then we say that edge X connects node u and node v.
DFS is a graph traversal algorithm that is similar to the preorder traversal of a tree. The traversal can
start from any vertex vi of the graph. Initially, the vertex vi is visited, and then all the adjacent
vertices to vi are traversed recursively using DFS. As a graph can have cycles, we need to avoid
revisiting a node. To achieve this, when a vertex V is visited, it is marked as visited and should not
be selected for traversal again.
Page No
Data Structures (BE03000081) Enrollment No
● Breadth First Search (BFS) starts from a vertex v0 and marks it as visited. Then, all the
vertices adjacent to v0 are visited next.
● Let the vertices adjacent to v0 be v1, v2, v3, and v4. These vertices are marked as visited.
● All unvisited vertices adjacent to v1, v2, v3, and v4 are visited next.
● The algorithm for BFS maintains a list of vertices that have been visited but not explored for
adjacent vertices. This list is stored in a queue.
● The queue initially contains the starting vertex.
● In each iteration, a vertex is removed from the queue, and its adjacent vertices, which have
not been visited yet, are added to the queue.
● The algorithm terminates when the queue becomes empty.
Program:
Page No
Data Structures (BE03000081) Enrollment No
Output:
7.2 Identify widely used applications which use graphs data structure for implementation
of its important feature.
Observations:
Conclusion:
Page No
Data Structures (BE03000081) Enrollment No
Quiz:
Suggested Reference:
Page No
Data Structures (BE03000081) Enrollment No
Experiment No: 8
AIM : Searching
Theory:
Linear/Sequential Search
● Linear search, also known as sequential search, is a technique used in computer science to
find a specific value in a list by sequentially checking each of its elements one at a time until
the desired one is found.
● It is the simplest search algorithm and a form of brute-force search. Its worst-case cost is
proportional to the number of elements in the list.
Binary Search
● If we have an array that is sorted, we can use a much more efficient algorithm called Binary
Search.
● In Binary Search, we divide the array into two equal halves and compare the middle element
with the search element.
Page No
Data Structures (BE03000081) Enrollment No
● If the middle element is equal to the search element, we have found the element and return its
index; otherwise, if the middle element is less than the search element, we look at the right
part of the array, and if the middle element is greater than the search element, we
Program:
Output:
Page No
Data Structures (BE03000081) Enrollment No
Program:
Output:
Page No
Data Structures (BE03000081) Enrollment No
8.3 Identify widely used applications which use Searching technique for implementation
of its important feature.
Observations:
Conclusion:
Quiz:
Page No
Data Structures (BE03000081) Enrollment No
Suggested Reference:
Completeness
Problem Coding
Logic and accuracy
Rubric Understanding Standards Q&A Total
Building (2) (2)
s (2) (2)
Avg. Good Avg. Good Avg. Good Avg. Good Avg. Good
(1) (2) (1) (2) (1) (2) (1) (2) (1) (2)
Marks
Page No
Data Structures (BE03000081) Enrollment No
Experiment No: 9
AIM : Sorting
Theory:
Bubble sort
Bubble sort, also known as sinking sort, is a comparison-based sorting algorithm. It works by
repeatedly scanning through the list to be sorted, comparing adjacent elements and swapping them if
they are not in the correct order. In each pass through the list, the largest element bubbles up to the
top. The algorithm repeats these processes until no more swaps are needed, indicating that the list is
sorted. Although it is simple to understand and implement, bubble sort has a worst-case and average
time complexity of O(n^2), making it too slow for large inputs. Insertion sort is a more efficient
alternative for small lists.
Merge Sort
Page No
Data Structures (BE03000081) Enrollment No
● The merge sort algorithm is based on the classical divide-and-conquer paradigm. It operates
as follows:
▪ DIVIDE: Partition the n-element sequence to be sorted into two sub sequences of
n/2 elements each.
▪ CONQUER: Sort the two sub sequences recursively using the merge sort.
▪ COMBINE: Merge the two sorted sub sequences of size n/2 each to produce the
sorted sequence consisting of n elements.
Quick Sort
Quicksort is currently the fastest known sorting algorithm and often the most practical choice for
sorting, with an average expected running time of O(n log(n)). Its operation consists of the following
steps:
● Pick an element from the array, known as a pivot.
● Reorder the array so that all elements with values less than the pivot are placed before it,
while all elements with values greater than the pivot come after it (elements with equal
values can go either way). This operation is called partitioning, and at the end of it, the pivot
is in its final position.
● Recursively apply the above steps to the sub-arrays of elements with smaller and greater
values, respectively. Quicksort, like merge sort, is a divide-and-conquer recursive
algorithm.
● The basic divide-and-conquer process for sorting a sub array is given in the following three
easy steps:
▪ Divide
▪ Conquer
▪ Combine
Page No
Data Structures (BE03000081) Enrollment No
9.1 Write a program to implement Quick Sort
Program:
Output:
Page No
Data Structures (BE03000081) Enrollment No
9.2 Write a program to implement Merge Sort
Program:
Output:
Page No
Data Structures (BE03000081) Enrollment No
Program:
Output:
Page No
Data Structures (BE03000081) Enrollment No
Program:
Output:
Page No
Data Structures (BE03000081) Enrollment No
9.5 Identify widely used applications which use Sorting technique for implementation
of its important feature.
Observations:
Conclusion:
Quiz:
(3) Which is the best suitable sorting algorithm as per its execution time?
Suggested Reference:
1. An Introduction to Data Structures with Applications. by Jean-Paul Tremblay & Paul G.
Sorenson Publisher-Tata McGraw Hill.
2. Data Structures using C & C++ -By Ten Baum Publisher – Prenctice-Hall International
3. Fundamentals of Computer Algorithms by Horowitz, Sahni,Galgotia Pub. 2001 ed.
4. http://www.geeksforgeeks.org/data-structures/
5. http://www.coursera.org/specializations/data-structures-algorithms
Marks
Page No
Data Structures (BE03000081) Enrollment No
Experiment No: 10
10.1 Write a program to create hash table and handle the collision using linear probing.
10.2 Write a program to demonstrate the file primitives such as fopen, fclose, fprintf.
10.3 Identify widely used applications which use Hashing technique for implementation of
its important feature.
Theory:
Hashing
Hashing is a method used to map a large number of data items to a smaller table by utilizing a
hashing function. This technique transforms a range of key values into a range of indexes of an
array. There are two different forms of hashing.
1. Open hashing or external hashing: Open or external hashing, allows records to be stored
in unlimited space (could be a hard disk). It places no limitation on the size of the tables.
2. Close hashing or internal hashing: Closed or internal hashing, uses a fixed space for
storage and thus limits the size of hash table.
Hashing Functions
Characteristics of a Good Hash Function
● A good hash function avoids collisions.
Page No
Data Structures (BE03000081) Enrollment No
● A good hash function is easy to compute.
1. Division-Method
2. Folding Method
3. Algebraic Coding
4. Multiplicative Hashing
5. Digit Analysis
6. Mid-square Methods
7. Length Dependent Method
● If the element to be inserted is mapped to the same location, where an element is already
inserted then we have a collision and it must be resolved.
● There are several strategies for collision resolution. The most commonly used are :
1. Separate chaining - used with open hashing
2. Open addressing - used with closed hashing
File
In computing, a file is a group of records, where each record comprises one or more fields that have
the same sequence. Typically, each field has a predetermined length.
1. Sequential files
2. Direct files
3. Index files
4. Indexed Sequential files
5. Relative files
1. Creation
2. Insertion
3. Deletion
4. Updation
5. Reading
6. Searching
Page No
Data Structures (BE03000081) Enrollment No
10.1 Write a program to create hash table and handle the collision using linear probing.
Page No
Data Structures (BE03000081) Enrollment No
Program:
Page No
Data Structures (BE03000081) Enrollment No
Output:
10.2 Write a program to demonstrate the file primitives such as fopen, fclose, fprintf.
Program:
Page No
Data Structures (BE03000081) Enrollment No
Output:
Page No
Data Structures (BE03000081) Enrollment No
10.3 Identify widely used applications which use Hashing technique for implementation of
its important feature.
Observations:
Conclusion:
Quiz:
Page No
Data Structures (BE03000081) Enrollment No
Suggested Reference:
Completeness
Problem Coding
Logic and accuracy
Rubric Understanding Standards Q&A Total
Building (2) (2)
s (2) (2)
Avg. Good Avg. Good Avg. Good Avg. Good Avg. Good
(1) (2) (1) (2) (1) (2) (1) (2) (1) (2)
Marks
Page No