Wednesday, 1 April 2015

UGC NET Computer Science Paper II June 2010 - Part 1 MCQs

1.       x1 is a clone of x” means x1 is identical to x in terms of the physical attributes namely, height, weight and complexion. Given, height, weight and complexion only form a complete set of attributes for an entity, cloning is an equivalence relation. What is your impression about this statement ?
(A) The statement is true
(B) The statement is false
(C) The truth value of the statement cannot be computed
(D) None of these
Answer: A
2.       ‘R is a robot of M’ means R can perform some of the tasks that otherwise M would do and R is unable to do anything else. Which of the following is the most appropriate representation to model this situation ?












Answer:
3.       “My Lafter Machin (MLM) recognizes the following strings :
(i) a
(ii) aba
(iii) abaabaaba
(iv) abaabaabaabaabaabaabaabaaba
Using this as an information, how would you compare the following regular expressions?
(i) (aba)3x
(ii) a.(baa)3x–1. ba
(iii) ab.(aab).3x–1.a
(A) (ii) and (iii) are same, (i) is different.
(B) (ii) and (iii) are not same.
(C) (i), (ii) and (iii) are different.
(D) (i), (ii) and (iii) are same.
Answer: D
4.       S1 : I teach algorithms and maths.
S2 : My professor teaches maths, electronics and computer science.
S3 : I have a student of maths.
S4 : Algorithm is a part of computer science.
S5 : Maths students know computer science.
What would be the chromatic number of a graph, vertices of which are the actors/entities that are involved in the sentences S1 to S5 and edges-to represent the associations/relationships amongst the entities/actors as expressed in the sentences S1 to S5 above?
(A) 2       (B) 3
(C) 4       (D) None of these
Answer:
5.       For your ATM debit card, you have a 4-decimal-digit personal secret code. In the absence of any clue, a brute-force attack takes time-‘t’ to crack the code on an ATM terminal. Therefore ‘t’ is the secure-time for a customer to report in case the card is misplaced. Your Bank has decided to facilitate an increased secure-time. Out of the following, which option should provide the largest rise in the value of ‘t’ ?
(A) Instead of 4-decimal-digits, maintain the personal secret code in 4-hexadecimal-digits.
(B) Instead of 4-decimal digits, maintain a 5-decimal-digit personal secret code.
(C) Reduce the processing speed of the ATM terminals to the half of their current speed.
(D) None of the above provides any improvement.
Answer: B
6.       The logic expression for the output of the circuit shown in the figure is
(A) A’C’+B’C’+CD    (B) AC’+BC’+C’D
(C) ABC+C’D’           (D) A’B’+B’C’+C’D’
Answer: C
7.       Advantage of synchronous sequential circuits over asynchronous ones is
(A) faster operation
(B) ease of avoiding problems due to hazard
(C) lower hardware requirement
(D) better noise immunity
Answer: A
8.       What is the transitive voltage for the voltage input of a CMOS operating from 10V supply?
(A) 1V    (B) 2V
(C) 5V    (D) 10 V
Answer: C
9.       What is decimal equivalent of BCD 11011.1100 ?
(A) 22.0             (B) 22.2
(C) 20.2                         (D) 21.2
Answer: B
10.    The function represented by the kmap given below is
(A) A.B               (B) AB+BC+CA
(C) (BÅC)’         (D) A.B.C
Answer:
11.    The statement
print f (“ % d”, 10 ? 0 ? 5 : 1 : 12);
will print
(A) 10     (B) 0
(C) 12     (D) 1
Answer: D
12.    What will be the output of the following c-code ?
void main ( )
{
char *P = "ayqm" ;
char c;
c = ++*p ;
printf ("%c", c);
}
(A) a                   (B) c
(C) b                   (D) q
Answer: C
13.    Member of a class specified as …………… are accessible only to method of the class.
(A) private         (B) public
(C) protected     (D) derive
Answer: A
14.    Match the following :
(a) Garbage collection in                    1. Java
(b) Nameless object                            2. generic programming
(c) Template support                           3. defines a class
(d) A forward reference                      4. member function
(e) Derived class inherits
from base class                                5. within a statement
Codes :
 (a) (b) (c)  (d)  (e)
(A) 1   5   4    2     3
(B) 1   5   2    3     4
(C) 5   1   2    3     4
(D) 5   4   3    1     2
Answer: B
15.    The data type created by the data abstraction process is called
(A) class                                    (B) structure
(C) abstract data type  (D) user defined data type
Answer: C
16.    An entity instance is a single occurrence of an …………..
(A) entity type
(B) relationship type
(C) entity and relationship type
(D) None of these
Answer: A
17.    Generalization is ………… process.
(A) top-down                 (B) bottom up
(C) both (A) & (B)         (D) None of these
Answer: B
18.    Match the following :
I. 2 NF                (a) transitive dependencies eliminated
II. 3 NF               (b) multivalued attribute removed
III. 4 NF             (c) contain no partial functional dependencies
IV. 5 NF             (d) contains no join dependency
Codes :
    I    II   III   IV
(A) (a) (c) (b)  (d)
(B) (d) (a) (b)  (c)
(C) (c) (d) (a)  (b)
(D) (d) (b) (a)  (c)
Answer: B
19.    Which data management language component enabled the DBA to define the schema components ?
(A) DML                         (B) Sub-schema DLL
(C) Schema DLL          (D) All of these
Answer: C
20.    The PROJECT Command will create new table that has
(A) more fields than the original table
(B) more rows than original table
(C) both (A) & (B)
(D) none of these
Answer: D

  Part 1   Part 2 

1 comment:

UGC NET Computer Science

Computer GK App