Friday, 3 April 2015

UGC NET Computer Science Paper II December 2009 - Part 1 Solved Questions

1.       If she is my friend and you are her friend, then we are friends. Given this, the friend relationship in this context is …………...
(i) commutative            (ii) transitive
(iii) implicative              (iv) equivalence
(A) (i) and (ii)                            (B) (iii)
(C) (i), (ii), (iii) and (iv)             (D) None of these
Answer: D
2.       Circle has …………….
(A) No vertices                         (B) Only 1 vertex
(C) ∞ vertices                (D) None of these
Answer: A
3.       If in an error detection and correction code a message M : “You are good students” is stored as M' : Youare areyou aregood goodare goodstudents studentsgood. What is the space required to store M' in general ? (assume that ‘n’ is the length of M)
(A) 2n     (B) 3n
(C) 4n    (D) less than 4n
Answer: D
4.       P : “Program is a step by step execution of the instructions”. Given P, which of the following is true?
(A) Program is a subset of an instruction set.
(B) Program is a sequence of a subset of an instruction set.
(C) Program is a partially ordered set of an instruction set.
(D) All of the above
Answer: B
5.       In a MIU puzzle, either of the letters M, I or U could go as a start symbol. Production rules are given below :
R1 : U®IU
R2 : M.x®M.x.x where ːˑ is string concatenation operator. Given this, which of the following holds for
(i) MIUIUIUIUIU                        (ii) MIUIUIUIUIUIUIUIU
(A) Either (i) or (ii) but not both of these are valid words.
(B) Both (i) and (ii) are valid words and they take identical number of transformations for the production.
(C) Both (i) and (ii) are valid words but they involve different number of transformations in the production.
(D) None of these
Answer: C
6.       The simplified form of the Boolean expression (X+Y+XY)(X+Z) is
(A) X + Y + ZX + Y       (B) XY – YZ
(C) X + YZ                     (D) XZ + Y
Answer: C
7.       Identify the logic function performed by the circuit shown
(A) exclusive OR         (B) exclusive NOR
(C) NAND                     (D) NOR
Answer: B
8.       The highest noise margin is offered by
(A) BICMOS      (B) TTL
(C) ECL                         (D) CMOS
Answer: B
9.       The answer of the operation (10111)2*(1110)2 in hex equivalence is
(A) 150               (B) 241
(C) 142             (D) 101011110
Answer: C
10.    How many 1’s are present in the binary representation of
3 × 512 + 7 × 64 + 5 × 8 + 3
(A) 8                   (B) 9
(C) 10                 (D) 11
Answer: B
11.    Recursive functions are executed in a
(A) First in first out-order        (B) Last in first out-order
(C) Parallel fashion                 (D) Load balancing
Answer: B
12.    What would be the output of the following program, if run from the command line as “myprog 1 2 3” ?
main (int argc, char * argv[ ])
{  int i ;
i = argv[1] + argv[2] + argv[3] ;
printf (“% d”, i) ;
}
(A) 123               (B) 6
(C) Error            (D) “123”
Answer: C
13.    A …………….. is a special method used to initialize the instance variable of a class.
(A) Member function   (B) Destructor
(C) Constructor            (D) Structure
Answer: C
14.    Encapsulation is
(A) Dynamic binding
(B) A mechanism to associate the code and data.
(C) Data abstraction
(D) Creating new class
Answer: B
15.    Which of the statements are true?
I. Function overloading is done at compile time.
II. Protected members are accessible to the member of derived class.
III. A derived class inherits constructors and destructors.
IV. A friend function can be called like a normal function.
V. Nested class is a derived class.
(A) I, II, III           (B) II, III, V
(C) III, IV, V        (D) I, II, IV
Answer: D
16.    The E-R model is expressed in term of
I. Entities
II. The relationship among entities.
III. The attributes of the entities.
IV. Functional relationship.
(A) I, II                (B) I, II, IV
(C) II, II, IV         (D) I, II, III
Answer: D
17.    Specialization is …………… process.
(A) top-down                 (B) bottom up
(C) both (A) and (B)     (D) none of these
Answer: A
18.    Match the following :
(1) Determinants                      (a) No attribute can be added
(2) Candidate key                    (b) Uniquely identified a row
(3) Non-redundancy               (c) A constraint between two attribute
(4) Functional dependency   (d) Group of attributes on the left
hand side of arrow of function dependency.
(A) 1 – d, 2 – b, 3 – a, 4 – c
(B) 2 – d, 3 – a, 1 – b, 4 – c
(C) 4 – a, 3 – b, 2 – c, 1 – d
(D) 3 – a, 4 – b, 1 – c, 2 – d
Answer: A
19.    A function that has no partial functional dependencies is in ……………. form.
(A) 3 NF             (B) 2 NF
(C) 4 NF            (D) BCNF
Answer: B
20.    Which of the following statement is wrong ?
I. 2-phase locking protocol suffer from dead lock.
II. Time stamp protocol suffer from more aborts.
III. A block hole in a DFD is a data store with only inbound flows.
IV. Multivalued dependency among attribute is checked at 3 NF level.
V. An entity-relationship diagram is a tool to represent event model.
(A) I, II, II            (B) II, III, IV
(C) III, IV, V        (D) II, IV, V
Answer: C

  Part 1   Part 2 

0 comments:

Post a Comment

UGC NET Computer Science

Computer GK App