Wednesday, 1 April 2015

UGC NET Computer Science Paper II June 2010 - Part 2 MCQs

21.       If we have six stack operations pushing and popping each of A, B and C-such that push (A) must occur before push (B) which must occur before push (C), then A, C, B is a possible order for the pop operations, since this could be our sequence : push (A), pop (A), push (B), push (C), pop (C), pop (B). Which one of the following orders could not be the order the pop operations are run, if we are to satisfy the requirements described above ?
(A) ABC             (B) CBA
(C) BAC             (D) CAB
Answer: D
22.       What is the most appropriate data structure to implement a priority queue ?
(A) Heap                        (B) Circular array
(C) Linked list               (D) Binary tree
Answer: A
23.       In a complete binary tree of n nodes, how far are the two most distant nodes ? Assume each edge in the path counts as !
(A) About log2n                        (B) About 2 log2n
(C) About n log2n        (D) About 2n
Answer: B
24.       A chained hash table has an array size of 100. What is the maximum number of entries that can be placed in the table ?
(A) 100               (B) 200
(C) 10000          (D) There is no upper limit
25.       In a B tree of order 5, the following keys are inserted as follows :
7, 8, 1, 4, 13, 20, 2, 6 and 5
How many elements are present in the root of the tree ?
(A) 1                   (B) 2
(C) 3                   (D) 4
Answer: B
26.       The …………… field is the SNMP PDV reports an error in a response message.
(A) error index              (B) error status
(C) set request             (D) agent index
Answer: B
27.       What does the URL need to access documents ?
I. Path name
II. Host name
IV. Retrieval method
V. Server port number
(A) I, II, III           (B) I, III, V
(C) I, II, IV          (D) III, IV, V
Answer: B
28.       End-to-End connectivity is provided from Last-to-Last in
(A) Network layer                     (B) Session layer
(C) Transport layer                  (D) Data link layer
Answer: C
29.       What services does the internet layer provide ?
1. Quality of service
2. Routing
3. Addressing
4. Connection oriented delivery
5. Framing bits
(A) 1, 2, 3           (B) 2, 3, 4
(C) 1, 3, 4, 5      (D) 2, 3, 4, 5
30.    What is the maximum operating rate of a wireless LAN using infrared communication ?
(A) 1 mbps        (B) 2 mbps
(C) 5 mbps        (D) 11mbps
Answer: A
31.    In an absolute loading scheme, which loader function is accomplished by a loader ?
(A) Re-allocation         (B) Allocation
(C) Linking                    (D) Loading
Answer: D
32.    Which of the following expression is represented by the parse tree ?
(A) (A + B) * C               (B) A + * BC
(C) A + B * C                 (D) A * C + B
Answer: A
33.    Consider the following left associative operators in decreasing order of precedence :
– subtraction (highest precedence)
* multiplication
$ exponentiation (lowest precedence)
What is the result of the following expression ?
3 – 2 * 4 $ | * 2**3
(A) – 61              (B) 64
(C) 512              (D) 4096
Answer: D
34.    Which of the following is the most general phase structured grammar ?
(A) Regular                   (B) Context-sensitive
(C) Context free           (D) None of the above
Answer: B
35.    Which of the following is used for grouping of characters into tokens (in a computer) ?
(A) A parser                  (B) Code optimizer
(C) Code generator     (D) Scanner
Answer: D
36.    Match the following :
(a) Disk scheduling                 1. Round-robin
(b) Batch processing               2. SCAN
(c) Time sharing                       3. LIFO
(d) Interrupt processing          4. FIFO
Codes :
    (a) (b) (c) (d)
(A) 3   4   2   1
(B) 4   3   2   1
(C) 2   4   1   3
(D) 1   4   3   2
Answer: C
37.    ………….. synchronizes critical resources to prevent dead lock.
(A) P-operator              (B) V-operator
(C) Semaphore            (D) Swapping
Answer: C
38.    …………….. is one of pre-emptive scheduling algorithm.
(A) RR               (B) SSN
(C) SSF             (D) Priority based
Answer: A
39.    In order to allow only one process to enter its critical section, binary semaphore are initialized to
(A) 0       (B) 1
(C) 2       (D) 3
Answer: B
40.    Remote Computing Service involves the use of time sharing and …………..
(A) multi-processing    (B) interactive processing
(C) batch processing  (D) real-time processing
Answer: C
41.    Software engineering primarily aims on
(A) reliable software
(B) cost effective software
(C) reliable and cost effective software
(D) none of the above
Answer: C
42.    Top-down design does not require
(A) step-wise refinement        (B) loop invariants
(C) flow charting                      (D) modularity
Answer: B
43.    Which model is simplest model in Software Development ?
(A) Waterfall model     (B) Prototyping
(C) Iterative                   (D) None of these
Answer: A
44.    Design phase will usually be
(A) top-down     (B) bottom-up
(C) random       (D) centre fringing
Answer: A
45.    Applications-software
(A) is used to control the operating system
(B) includes programs designed to help programmers
(C) performs a specific task for computer users
(D) all of the above
Answer: C
46.    The cost of the network is usually determined by
(A) time complexity      (B) switching complexity
(C) circuit complexity  (D) none of these
Answer: B
47.    A leased special high-speed connection from the local telephone carrier for business users that transmits at 1.544 mbps is known as ……………. carrier.
(A) T1      (B) T2
(C) T3     (D) T4
Answer: A
48.    CDMA Cell uses …………… carriers of 1.25 MHz.
(A) 9       (B) 18
(C) 22     (D) 64
Answer: A
49.    At any given time Parallel Virtual Machine (PVM) has ……………. send buffer and …………… receive buffer.
(A) one-one                  (B) one-two
(C) two-two                   (D) two-one
Answer: B
50.    Data Mining uses ………….., …………….. and …………….. to build effective predictive model.
(i) Data set
(ii) Information set
(iii) Input set
(iv) Process set
(v) Output set
(vi) Test set
(A) (i), (ii) and (iv)
(B) (ii), (iv) and (v)
(C) (i), (v) and (vi)
(D) (ii), (iii) and (v)

  Part 1   Part 2 

1 comment: