## Wednesday, 15 April 2015

### UGC NET Computer Science Solved Paper II June 2007 - Part 2

21.       The time required to find shortest path in a graph with n vertices and e edges is:
(A) O(e)              (B) O(n)
(C) O(e2)            (D) O(n2)
22.       Pre order is also known as:
(A) Depth first order                 (B) Breadth first order
(C) Topological order              (D) Linear order
23.       The equivalent post fix express for d/(e+f) + b*c is:
(A) defbc/++                  (B) def+/bc+*
(C) def+/bc*+                (D) None of these
24.       Which algorithm has same average, worst case and best case time?
(A) Binary search        (B) Maximum of n numbers
(C) Quick sort               (D) Fibonacci search
25.       Application of data structure in queue is:
(A) Level wise printing of tree
(B) Implementation of priority queues
(C) Function call implementation
(D) Depth first search in a graph
26.       In case of Bus/Tree topology signal balancing issue is overcome by:
(A) Strong Transmitter                        (B) Polling
(C) Segmentation                    (D) Modulation
27.       Which of the following techniques are used to control data flow?
1. Windowing   2. Routing     3. RPCs         4. Buffering
(A) 1, 4               (B) 2, 3, 4
(C) 1, 3, 4          (D) 1, 2, 3, 4
28.       TDM is ................
(A) A primary/secondary type protocol
(B) A peer/peer protocol
(C) A Non-priority peer/peer protocol
(D) A priority type protocol
29.       What services does the Internet Layer provide?
1. Quality of service                2. Routing
5. Framing bits
(A) 1, 2, 3                       (B) 2, 3, 4
(C) 1, 3, 4, 5                  (D) 2, 3, 4, 5
30.    Which of the following protocols is used to prevent looping?
(A) OSPF                      (B) Spanning tree
(C) SRB                         (D) Fragment free switching

31.    The parsing technique that avoids back tracking is:
(A) Top-down parsing
(B) Recursive-descent parsing
(C) Predictive
(D) Syntax tree
32.    A Top-down Parse generates:
(A) Right-most derivation
(B) Right-most derivation in reverse
(C) Left-most derivation
(D) Left-most derivation in reverse
(C) Reallocation          (D) Both (A) and (B)
34.    Symbol table can be used for:
(A) Checking type compatibility
(B) Suppressing duplication of error message
(C) Storage allocation
(D) All of these above
35.    Moving process from main memory to disk is called:
(A) Caching                  (B) Termination
(C) Swapping               (D) Interruption
36.    Part of a program where the shared memory is accessed and which should be executed indivisibly, is called:
(A) Semaphores                      (B) Directory
(C) Critical Section                  (D) Mutual exclusion
37.    Windows is a .................. operating system.
(A) Non pre-emptive                (B) Pre-emptive
(C) Multi-user                           (D) Real time
38.    The “nice” command is used in Unix:
(A) to decrease the priority of a process
(B) to increase the priority of a process
(C) to get the highest priority
(D) nothing to do with the priorities
Explanation:
For Increase or decrease the priority of a job/Process we use Nice command, and its range -19 to 20.
If we need to increase the priority then we needs to decrease the priority number
If we need to decrease the priority then we needs to increase the priority number
Ex:- Nice -n 10 <cmd>
39.    Which page replacement policy suffers from Belady’s anomaly?
(A) LRU             (B) LFU
(C) FIFO            (D) OPTIMAL
40.    Cache memory is:
(A) High Speed Register        (B) Low-Speed RAM
(C) Non-Volatile RAM             (D) High-Speed RAM
41.    Which of the following combination is preferred with respect to cohesion and coupling?
(A) low and low                        (B) low and high
(C) high and low          (D) high and high
42.    Difference between flow-chart and data-flow diagram is:
(A) there is no difference
(B) usage in high level design and low level design
(C) control flow and data flow
(D) used in application programs and system programs
43.    Match the following:
(a) Unit test                   (i) Requirements
(b) System test             (ii) Design
(c) Validation test         (iii) Code
(d) Integration test       (iv) System Engineering
Which of the following is true?
(a)     (b)      (c)    (d)
(A)   (ii)     (iii)      (iv)    (i)
(B)   (i)      (ii)       (iv)   (iii)
(C)   (iii)    (iv)      (i)     (ii)
(D)   None of the above
44.    Problems with waterfall model are:
1.    Real projects rarely follow this model proposes
2.    It is often difficult for the customer
3.    Working model is available only in the end
4.    Developers are delayed unnecessarily
Which of the following is true?
(A) 1 and 4 only           (B) 2 and 3 only
(C) 1, 2 and 3 only       (D) 1, 2, 3 and 4
45.    Which one of the following is a object-oriented approaches:
(A) The Booch method
(B) The Rumbaugh method
(C) The Coad and Yomdon method
(D) All of the above
46.    Which technical concept sets cellular apart from all preceding mobile/radio systems?
(A) FM-Transmission
(B) Duplex Functionality
(C) Frequency Reuse
(D) TDMA Technology
47.    Wireless interconnections to the PSTN are also known as:
(A) Localities                (B) CLECs
(C) POPs                       (D) IXCs
48.    Dimensional modeling  in Data mining refers to:
(A) view and interrogate data
(B) define structures and store data
(C) retrieve information only
(D) none of these
49.    The U-NII(Unlicensed National Information Infrastructure) band operates at the ............. frequency.
(A) 2.4 GHz       (B) 33 MHz
(C) 5 GHz          (D) 16 GHz
50.    Which digital radio technology employs an N=1 frequency-reuse plan?
(A) GSM                        (B) TDMA
(C) D AMPS      (D) CDMA