## Description

1. (2 marks) Consider a hash table of size N = 7 where we are going to store integer values. The

hash function is h(k) = k mod 7. Draw the table that results after inserting, in the given order, the

following values: 19, 27, 12, 47, 15. Assume that collisions are handled by separate chaining.

2. (2 marks) Show the result of the previous exercise, assuming collisions are handled by linear probing.

3. (2 marks) Repeat exercise (1) assuming collisions are handled by double hashing, using a secondary

hash function h

′

(k) = 5 − (k mod 5).

4. (3.5 marks) Solve the following recurrence equation using repeated substitution and give the order

of f(n). You must show how you solved the equation.

f(1) = 3

f(n) = f(n − 1) + 2n + 1

5.(i) (7 marks) A tree is called symmetric if for every internal node u all the children of u store the same

value. For example the following tree with root a is symmetric, but the tree with root b is not symmetric as one child of node v stores value 2 while the other stores 3.

Write in pseudocode an algorithm isSymmetric(r) that receives as input the root r of a tree and it

outputs the value true if the tree is symmetric and false if it is not. For a node v let v.value denote the

value stored in v. To access the children of a node r use the following pseudocode

for each child c of r do

a b 3

7 7 7

4 4 4 1 1 1 6

5 5

3

7 7 7

4 4 4 1 1 1 6

2 3

v

5.(ii) (3.5 marks) Compute the worst case time complexity of your algorithm as a function of the total

number n of nodes in the tree. You must

• explain what the worst case for the algorithm is

• explain how you computed the time complexity

• give the order of the time complexity of the algorithm

1