Sunday, 5 April 2015

UGC NET Computer Science Questions Paper II December 2008 - Part 1

1.       The channel capacity of a band-limited Gaussian channel is given by:
(A) B log2(2+S/N)         (B) B log2(1+S/N)
(C) B log10(1+S/N)       (D) B loge(1+S/N)
Answer: B
2.       The graph K3,4 has:
(A) 3 edges       (B) 4 edges
(C) 7 edges       (D) 12 edges
Answer: D
3.       The total number of spanning trees that can be drawn using five labeled vertices is:
(A) 125               (B) 64
(C) 36                 (D) 16
Answer: A
4.       Extremely low power dissipation and low cost per gate can be achieved in:
(A) MOS ICs     (B) C MOS ICs
(C) TTL ICs       (D) ECL ICs
Answer: B
5.       An example of a universal building block is:
(A) EX-OR gate            (B) AND gate
(C) OR gate                  (D) NOR gate
Answer: D
6.       An example of a layer that is absent in broadcast networks is:
(A) Physical layer        (B) Presentation layer
(C) Network layer         (D) Application layer
Answer: C
7.       The ATM cell is:
(A) 48 bytes long         (B) 53 bytes long
(C) 64 bytes long         (D) 69 bytes long
Answer: B
8.       Four jobs J1, J2, J3 and J4 are waiting to be run. Their expected run times are 9, 6, 3 and 5 respectively. In order to minimize average response time, the jobs should be run in the order:
(A) J1 J2 J3 J4                (B) J4 J3 J2 J1
(C) J3 J4 J1 J2                (D) J3 J4 J2 J1
Answer: D
9.       Suppose it takes 100 ns to access page table and 20 ns to access associative memory. If the average access time is 28 ns, the corresponding hit rate is:
(A) 100 percent                        (B) 90 percent
(C) 80 percent              (D) 70 percent
Answer: B
10.    Transmission of N signals, each band limited to fm Hz by TDM, requires a minimum band-width of:
(A) fm                  (B) 2 fm              
(C) N fm              (D) 2N fm
Answer: C
11.    If a code is ‘t’ error detecting, the minimum hamming distance should be equal to:
(A) t-1                 (B) t    
(C) t+1                (D) 2t+1
Answer: C
12.    A relation R in {1,2,3,4,5,6} is given by {(1,2),(2,3),(3,4),(4,4),(4,5)}. This relation is:
(A) reflexive     
(B) symmetric
(C) transitive    
(D) not reflexive, not symmetric and not transitive
Answer: D
13.    The dual of the switching function x+yz is:
(A) x+yz             (B) x’+y’z’
(C) x(y+z)          (D) x’(y’+z’)
Answer: D
14.    The characteristic equation of D flip-flop is:
(A) Q=1              (B) Q=0         
(C) Q=D’            (D) Q=D
Answer: D
15.    If 4 input multiplexers drive a 4 input multiplexer, we get a:
(A) 16 input MUX         (B) 8 input MUX
(C) 4 input MUX           (D) 2 input MUX
Answer: A
16.    The throughput of slotted ALOHA is given by:
(A) S=G             (B) S=GeG
(C) S=Ge-G        (D) S=eG
Answer: C
17.    Congestion control is done by:
(A) Network layer                     (B) Physical layer
(C) Presentation layer                        (D) Application layer
Answer: A
18.    Assertion (A): Twisted pairs are widely used as transmission medium.
Reasoning (R): Twisted pairs have adequate performance and low cost.
(A) Both (A) and (R) are true and (R) is the correct explanation for (A)
(B) Both (A) and (R) are true but (R) is not the correct explanation
(C) (A) is true but (R) is false
(D) (A) is false but (R) is true
Answer: A
19.    An example of a non-adaptive routing algorithm is:
(A) Shortest path routing                   
(B) Centralised routing
(C) Baran’s hot potato routing          
(D) Baran’s backward learning algorithm
Answer: A
20.    IP address in B class is given by:
(A)        (B)
(C)        (D)
Answer: B

  Part 1   Part 2 

1 comment: