Wednesday, 22 February 2017

UGC NET Computer Science Paper II December 2009 - Part 3 Solved Questions

21.       If the number of leaves in a strictly binary tree is an odd number, then what can you say with full conviction about total number of nodes in the tree?
(A) It is an odd number.
(B) It is an even number.
(C) It cannot be equal to the number of leaves.
(D) It is always greater than twice the number of leaves.
Answer: A
22.       The number of edges in a complete graph of n vertices is
(A) n
(B) n(n – 1)/2
(C) n(n + 1)/2
(D) n2/2
Answer: B
23.       At a hill station, the parking lot is one long drive way snaking up a hill side. Cars drive in and park right behind the car in front of them, one behind another. A car can’t leave until all the cars in front of it have left. Is the parking lot more like
(A) An array
(B) A stack
(C) A queue
(D) A linked list
Answer: C
24.       With regard to linked list, which of the following statement is false?
(A) An algorithm to search for an element in a singly linked list requires 0(n) operations in the worst case.
(B) An algorithm for deleting the first element in a singly linked list requires 0(n) operations in the worst case.
(C) An algorithm for finding the maximum value in a circular linked list requires 0(n) operations.
(D) An algorithm for deleting the middle node of a circular linked list requires 0(n) operations.
Answer: B
25.       A hash function f defined as f(key) = key mod 7, with linear probing used to resolve collisions. Insert the keys 37, 38, 72, 48, 98 and 11 into the table indexed from 0 to 6. What will be the location of 11?
(A) 3
(B) 4
(C) 5
(D) 6
Answer: C
26.       Device on one network can communicate with devices on another network via a
(A) Hub/Switch
(B) Utility server
(C) File server
(D) Gateway
Answer: D
27.       What is the maximum window size in sliding window protocol used in a computer network?
(A) 4
(B) 8
(C) 15
(D) 16
Answer: A
28.       Which of the following are Data Link Layer standard?
1. Ethernet
2. HSSI
3. Frame Relay
4. 10 – Base T
5. Token Ring
(A) 1, 2, 3          
(B) 1, 3, 5
(C) 1, 3, 4, 5     
(D) 1, 2, 3, 4, 5
Answer: C
29.       In case of Bus/Tree topology signal balancing issue is overcome by
(A) Modulation
(B) Polling
(C) Segmentation
(D) Strong transmitter
Answer: C
30.    Match the following :
List-I
(i) Ethernet
(ii) Token Ring
(iii) Cut-through switch
(iv) Spanning tree
List-I
(a) Deterministic
(b) Utilize the full wire speed
(c) Prevent looping
(d) Checking valid address
Codes:
(A) i – d, ii – a, iii – b, iv – c
(B) i – a, ii – d, iii – b, iv – c
(C) i – d, ii – d, iii – c, iv – b
(D) i – d, ii – c, iii – b, iv – a
Answer: A

Tuesday, 21 February 2017

UGC NET Computer Science Paper II December 2010 - Part 5 Solved MCQs

41.       Prototyping is used to
(A) test the software as an end product
(B) expand design details
(C) refine and establish requirements gathering
(D) None of the above
Answer: C
42.       Which one of these are not software maintenance activity?
(A) Error correction
(B) Adaptation
(C) Implementation of Enhancement
(D) Establishing scope
Answer: D
43.       The system specification is the first deliverable in the computer system engineering process which does not include
(A) Functional Description
(B) Cost
(C) Schedule
(D) Technical Analysis
Answer: A
44.       The COCOMO model was introduced in the book title “Software Engineering Economics” authored by
(A) Abraham Silberschatz
(B) Barry Boehm
(C) C.J. Date
(D) D.E. Knuth
Answer: B
45.       The Warnier diagram enables analyst
(A) to represent information hierarchy in a compact manner
(B) to further identify requirement
(C) to estimate the total cost involved
(D) None of the above
Answer: A
46.       A data mart may contain
(A) summarised data
(B) de-normalized data
(C) aggregate departmental data
(D) All of the above
Answer: D
47.       Data mining is
(A) the process of extracting valid, previously unknown, comprehensible and actionable information from large databases and using it to make crucial business decisions.
(B) a tool that allows end users direct access and manipulation of data from within data warehousing environment without the intervention of customised programming activity.
(C) a tool that helps end users extract useful business information from large database.
(D) All of the above
Answer: A
48.       E-Choupal refers to
(A) calling meeting of Surpanches electronically.
(B) conducting Panchayat meeting using latest electronic gadgets.
(C) providing window of information to villagers and farmers in NIC network.
(D) None of the above
Answer: C
49.       The basic concepts of ethics in information society is/are
(A) Responsibility
(B) Accountability
(C) Liability
(D) All of the above
Answer: D
50.    One of the distinguished features of super-computer over other category of computer is
(A) parallel processing
(B) highest accuracy level
(C) more speed
(D) more capacity
Answer: C

Monday, 20 February 2017

UGC NET Computer Science Paper II December 2010 - Part 4 Solved MCQs

31.       Object code is the output of ……………
(A) Operating System
(B) Compiler or Assembler
(C) only Assembler
(D) only Compiler
Answer: B
32.       ‘Macro’ in an assembly level program is …………..
(A) sub program
(B) a complete program
(C) a hardware portion
(D) relative coding
Answer: A
33.       Grammar of the programming is checked at …………… phase of compiler.
(A) semantic analysis
(B) code generation
(C) syntax analysis
(D) code optimization
Answer: C
34.       The register or main memory location which contains the effective address of the operand is known as
(A) pointer
(B) special location
(C) indexed register
(D) None of the above
Answer: A
35.       Macro-processors are ………….
(A) Hardware
(B) Compiler
(C) Registers
(D) None of the above
Answer: B
36.       The dynamic allocation of storage areas with VSAM files is accomplished by
(A) Hashing
(B) Control splits
(C) Overflow areas
(D) Relative recoding
Answer: B
37.       Which of the following command the file names in multiple columns?
(A) IS–X
(B) IS
(C) IS–1
(D) IS–f–X
Answer: B
38.       WINDOWS is a …………… operating.
(A) Real time
(B) Multi-user
(C) Preemptive
(D) Non-preemptive
Answer: C
39.       Page making process from main memory to disk is called
(A) Interruption
(B) Termination
(C) Swapping
(D) None of the above
Answer: C
40.    A Dead-lock in an Operating System is
(A) Desirable process
(B) Undesirable process
(C) Definite waiting process
(D) All of the above
Answer: C

Sunday, 19 February 2017

UGC NET Computer Science Paper II December 2010 - Part 3 Solved MCQs

21.       What is the maximum number of nodes in a B-tree of order 10 of depth 3 (root at depth 0)?
(A) 111
(B) 999
(C) 9999
(D) None of the above
Answer: D
22.       A binary tree with 27 nodes has …………. null branches.
(A) 54
(B) 27
(C) 26
(D) None of the above
Answer: D
23.       The time complexity to build a heap of n elements is
(A) O(1)
(B) O(lgn)
(C) O(n)
(D) O(nlgn)
Answer: D
24.       Linear probing suffers from a problem known as
(A) Secondary clustering
(B) Primary clustering
(C) Both (A) and (B)
(D) None of these
Answer: B
25.       Which of the following can be the sequence of nodes examined in binary search tree while searching for key 88?
(A) 90, 40, 65, 50, 88
(B) 90, 110, 80, 85, 88
(C) 190, 60, 90, 85, 88
(D) 65, 140, 80, 70, 88
Answer: C
26.       Frequency shift keying is used mostly in
(A) Radio transmission
(B) Telegraphy
(C) Telephone
(D) None of the above
Answer: B
27.       The baud rate is
(A) always equal to the bit transfer rate
(B) equal to twice the bandwidth of an ideal channel
(C) not equal to the signalling rate
(D) equal to half of the bandwidth of an ideal channel
Answer: B
28.       How much bandwidth is there in 1 micron of spectrum at a wavelength of 1 micron?
(A) 300 MHz
(B) 3 GHz
(C) 300 THz
(D) 30 KHz
Answer: C
29.       Which of the following file transfer protocols use TCP and establishes two virtual circuits between the local and remote server?
(A) FTP
(B) TFTP
(C) TELNET
(D) NFS
Answer: A
30.    The threshold effect in demodulator is
(A) exhibited by all demodulator, when the input signal to noise ratio is low.
(B) the rapid fall on output signal to noise ratio when the input signal to noise ratio fall below a particular value.
(C) the property exhibited by all A.M. suppressed carrier coherent demodulator.
(D) the property exhibited by correlation receiver.
Answer: B

Saturday, 18 February 2017

UGC NET Computer Science Paper II June 2010 - Part 5 MCQs

41.       Software engineering primarily aims on
(A) reliable software
(B) cost effective software
(C) reliable and cost effective software
(D) none of the above
Answer: C
42.       Top-down design does not require
(A) step-wise refinement
(B) loop invariants
(C) flow charting
(D) modularity
Answer: B
43.       Which model is simplest model in Software Development?
(A) Waterfall model
(B) Prototyping
(C) Iterative
(D) None of these
Answer: A
44.       Design phase will usually be
(A) top-down
(B) bottom-up
(C) random
(D) centre fringing
Answer: A
45.       Applications-software
(A) is used to control the operating system
(B) includes programs designed to help programmers
(C) performs a specific task for computer users
(D) all of the above
Answer: C
46.       The cost of the network is usually determined by
(A) time complexity
(B) switching complexity
(C) circuit complexity
(D) none of these
Answer: B
47.       A leased special high-speed connection from the local telephone carrier for business users that transmits at 1.544 mbps is known as ……………. carrier.
(A) T1
(B) T2
(C) T3
(D) T4
Answer: A
48.       CDMA Cell uses …………… carriers of 1.25 MHz.
(A) 9
(B) 18
(C) 22
(D) 64
Answer: A
49.       At any given time Parallel Virtual Machine (PVM) has ……………. send buffer and …………… receive buffer.
(A) one-one
(B) one-two
(C) two-two
(D) two-one
Answer: B
50.    Data Mining uses ………….., …………….. and …………….. to build effective predictive model.
(i) Data set
(ii) Information set
(iii) Input set
(iv) Process set
(v) Output set
(vi) Test set
(A) (i), (ii) and (iv)
(B) (ii), (iv) and (v)
(C) (i), (v) and (vi)
(D) (ii), (iii) and (v)
Answer: