Saturday, 25 February 2017

UGC NET Computer Science Previous Paper II June 2009 - Part 3

21.       Which construct in SQL is used to test whether a subquery has any tuples in its result?
(A) UNIQUE
(B) EXISTS
(C) GROUP BY
(D) EXCEPT
Answer: B
22.       ORACLE supports:
(A) inner join and outer join only
(B) outer join and semi join only
(C) inner join, outer join , semi join only
(D) inner join, outer join, semi join and anti join
Answer:
23.       Which two of the following are equivalent for an undirected graph G?
(i) G is a tree
(ii) There is at least one path between any two distinct vertices of G
(iii) G contains no cycles and has (n-1) edges
(iv) G has n edges
(A) (i) and (ii)
(B) (i) and (iii)
(C) (i) and (iv)
(D) (ii) and (iii)
Answer: B
24.       In a B tree of order m with p nodes the average number of splits is at most:
Answer: B
25.       The prepositional formula given by the tree:
is:
(A) ˄˅x2˅x1¬x1¬x1
(B) (x2˅¬x2)˄(x1˅x2)
(C) (¬x1˅x2)˄(¬x1˅x2)
(D) None
Answer: C
26.       Queue is a ............. list.
(A) LIFO
(B) LILO
(C) FILO
(D) FIFO
Answer: D
27.       In a full binary tree of height k, there are ................. internal nodes.
(A) 2k-1
(B) 2k-1
(C) 2k     
(D) 2k+1
Answer: A
28.       A binary tree is said to have heap property if the elements along any path:
(A) from leaf to root are non-increasing
(B) from leaf to root are non-decreasing
(C) from root to leaf are non-decreasing
(D) from root to leaf are non-increasing
Answer: D
29.       X.25 protocol consists of:
(A) Physical and Frame levels
(B) Frame and Packet levels
(C) Physical, Frame and Packet levels
(D) None of the above
Answer: C
30.    GSM/CDMA systems:
(A) are limited to very low speed data
(B) require no local loop wires
(C) are predominantly used for voice
(D) all of the above
Answer: D

Friday, 24 February 2017

UGC NET Computer Science Paper II December 2009 - Part 5 Solved Questions

41.       Software Engineering is a discipline that integrates ………….. for the development of computer software.
(A) Process
(B) Methods
(C) Tools
(D) All
Answer: D
42.       Any error whose cause cannot be identified anywhere within the software system is called …………..
(A) Internal error
(B) External error
(C) Inherent error
(D) Logic error
Answer: B
43.       Recorded software attributes can be used in the following endeavours :
(i) Cost and schedule estimates.
(ii) Software product reliability predictions.
(iii) Managing the development process.
(iv) No where
Codes:
(A) (i) (ii) (iv)
(B) (ii) (iii) (iv)
(C) (i) (ii) (iii)
(D) (i) (ii) (iii) (iv)
Answer: C
44.       Black Box testing is done
(A) to show that s/w is operational at its interfaces i.e. input and output.
(B) to examine internal details of code.
(C) at client side.
(D) none of above.
Answer: A
45.       The name of the transaction file shall be provided by the operator and the file that contains the edited transactions ready for execution shall be called
(A) Batch. Exe
(B) Trans. Exe
(C) Opt. Exe
(D) Edit.Exe
Answer: C
46.       The single stage network is also called
(A) one sided network
(B) two sided network
(C) recirculating network
(D) pipeline network
Answer: C
47.       Analysis of large database to retrieve information is called
(A) OLTP
(B) OLAP
(C) OLDP
(D) OLPP
Answer: B
48.       Which technology is sometime referred to as wireless cable?
(A) MMDS
(B) ATM
(C) LMDS
(D) CDMA
Answer: A
49.       Another name of IEEE 802.11 a is …………………
(A) Wi-Max
(B) Fast Ethernet
(C) Wi-Fi
(D) 802.11 g
Answer: C
50.    The unlicensed National Information Infrastructure band operates at the …………. frequency
(A) 2.4 GHz
(B) 5 GHz
(C) 33 MHz
(D) 5 MHz
Answer: B

Thursday, 23 February 2017

UGC NET Computer Science Paper II December 2009 - Part 4 Solved Questions

31.       In an absolute loading scheme which loader function is accomplished by assembler?
(A) re-allocation
(B) allocation
(C) linking
(D) loading
Answer: A
32.       Which of the following grammar is LR (1)?
(A) A®aAb, A®bAb, A®a , A®b
(B) A®aAa, A®aAb, A®c
(C) A®A+A, A®a
(D) Both (A) and (B)
Answer: D
33.       A shift-reduce parser carries out the actions specified within braces immediately after reducing with the corresponding rule of the grammar.
S®xxW[print“1”]
S®y[print“2”]
W®S2[print“3”], what is the translation of “x x x x y z z”?
(A) 1 1 2 3 1
(B) 1 1 2 3 3
(C) 2 3 1 3 1
(D) 2 3 3 2 1
Answer: C
34.       Context-free Grammar (CFG) can be recognized by
(A) Finite state automata
(B) 2-way linear bounded automata
(C) push down automata
(D) both (B) and (C)
Answer: D
35.       Synthesized attribute can be easily simulated by a
(A) LL grammar
(B) Ambiguous grammar
(C) LR grammar
(D) None of the above
Answer: C
36.       In the process management Round-robin method is essentially the pre-emptive version of …………
(A) FILO
(B) FIFO
(C) SSF
(D) Longest time first
Answer: B
37.       A page fault
(A) is an error specific page.
(B) is an access to the page not currently in memory.
(C) occur when a page program occur in a page memory.
(D) page used in the previous page reference.
Answer: B
38.       A semaphore count of negative n means (s=–n) that the queue contains ………….. waiting processes.
(A) n + 1
(B) n
(C) n – 1
(D) 0
Answer: B
39.       A program is located in the smallest available hole in the memory is ……………
(A) best – fit
(B) first – bit
(C) worst – fit
(D) buddy
Answer: A
40.    The Unix command used to find out the number of characters in a file is
(A) nc
(B) wc
(C) chcnt
(D) lc
Answer: B

Wednesday, 22 February 2017

UGC NET Computer Science Paper II December 2009 - Part 3 Solved Questions

21.       If the number of leaves in a strictly binary tree is an odd number, then what can you say with full conviction about total number of nodes in the tree?
(A) It is an odd number.
(B) It is an even number.
(C) It cannot be equal to the number of leaves.
(D) It is always greater than twice the number of leaves.
Answer: A
22.       The number of edges in a complete graph of n vertices is
(A) n
(B) n(n – 1)/2
(C) n(n + 1)/2
(D) n2/2
Answer: B
23.       At a hill station, the parking lot is one long drive way snaking up a hill side. Cars drive in and park right behind the car in front of them, one behind another. A car can’t leave until all the cars in front of it have left. Is the parking lot more like
(A) An array
(B) A stack
(C) A queue
(D) A linked list
Answer: C
24.       With regard to linked list, which of the following statement is false?
(A) An algorithm to search for an element in a singly linked list requires 0(n) operations in the worst case.
(B) An algorithm for deleting the first element in a singly linked list requires 0(n) operations in the worst case.
(C) An algorithm for finding the maximum value in a circular linked list requires 0(n) operations.
(D) An algorithm for deleting the middle node of a circular linked list requires 0(n) operations.
Answer: B
25.       A hash function f defined as f(key) = key mod 7, with linear probing used to resolve collisions. Insert the keys 37, 38, 72, 48, 98 and 11 into the table indexed from 0 to 6. What will be the location of 11?
(A) 3
(B) 4
(C) 5
(D) 6
Answer: C
26.       Device on one network can communicate with devices on another network via a
(A) Hub/Switch
(B) Utility server
(C) File server
(D) Gateway
Answer: D
27.       What is the maximum window size in sliding window protocol used in a computer network?
(A) 4
(B) 8
(C) 15
(D) 16
Answer: A
28.       Which of the following are Data Link Layer standard?
1. Ethernet
2. HSSI
3. Frame Relay
4. 10 – Base T
5. Token Ring
(A) 1, 2, 3          
(B) 1, 3, 5
(C) 1, 3, 4, 5     
(D) 1, 2, 3, 4, 5
Answer: C
29.       In case of Bus/Tree topology signal balancing issue is overcome by
(A) Modulation
(B) Polling
(C) Segmentation
(D) Strong transmitter
Answer: C
30.    Match the following :
List-I
(i) Ethernet
(ii) Token Ring
(iii) Cut-through switch
(iv) Spanning tree
List-I
(a) Deterministic
(b) Utilize the full wire speed
(c) Prevent looping
(d) Checking valid address
Codes:
(A) i – d, ii – a, iii – b, iv – c
(B) i – a, ii – d, iii – b, iv – c
(C) i – d, ii – d, iii – c, iv – b
(D) i – d, ii – c, iii – b, iv – a
Answer: A

Tuesday, 21 February 2017

UGC NET Computer Science Paper II December 2010 - Part 5 Solved MCQs

41.       Prototyping is used to
(A) test the software as an end product
(B) expand design details
(C) refine and establish requirements gathering
(D) None of the above
Answer: C
42.       Which one of these are not software maintenance activity?
(A) Error correction
(B) Adaptation
(C) Implementation of Enhancement
(D) Establishing scope
Answer: D
43.       The system specification is the first deliverable in the computer system engineering process which does not include
(A) Functional Description
(B) Cost
(C) Schedule
(D) Technical Analysis
Answer: A
44.       The COCOMO model was introduced in the book title “Software Engineering Economics” authored by
(A) Abraham Silberschatz
(B) Barry Boehm
(C) C.J. Date
(D) D.E. Knuth
Answer: B
45.       The Warnier diagram enables analyst
(A) to represent information hierarchy in a compact manner
(B) to further identify requirement
(C) to estimate the total cost involved
(D) None of the above
Answer: A
46.       A data mart may contain
(A) summarised data
(B) de-normalized data
(C) aggregate departmental data
(D) All of the above
Answer: D
47.       Data mining is
(A) the process of extracting valid, previously unknown, comprehensible and actionable information from large databases and using it to make crucial business decisions.
(B) a tool that allows end users direct access and manipulation of data from within data warehousing environment without the intervention of customised programming activity.
(C) a tool that helps end users extract useful business information from large database.
(D) All of the above
Answer: A
48.       E-Choupal refers to
(A) calling meeting of Surpanches electronically.
(B) conducting Panchayat meeting using latest electronic gadgets.
(C) providing window of information to villagers and farmers in NIC network.
(D) None of the above
Answer: C
49.       The basic concepts of ethics in information society is/are
(A) Responsibility
(B) Accountability
(C) Liability
(D) All of the above
Answer: D
50.    One of the distinguished features of super-computer over other category of computer is
(A) parallel processing
(B) highest accuracy level
(C) more speed
(D) more capacity
Answer: C