Computer Science Study Materials for Competitive Exams

Sample Questions, Previous Year Solved Papers, Study Materials For Competitive Examinations Like UGC NET, SET And GATE Computer Science.

Tuesday, 1 September 2015

CBSE UGC NET Computer Science Paper II Solved June 2015 - Part 2

11.       What is the output of the following program ?
(Assume that the appropriate pre-processor directives are included and there is no syntax error)
char S[ ] = "ABCDEFGH";
printf ("%C",* (& S[3]));
printf ("%s", S+4);
printf ("%u", S);
/* Base address of S is 1000 */             }
(A) ABCDEFGH1000              (B) CDEFGH1000
(C) DDEFGHH1000                (D) DEFGH1000
Answer: D
12.       Which of the following, in C++, is inherited in a derived class from base class ?
(A) constructor             (B) destructor
(C) data members        (D) virtual methods
Answer: C
13.       Given that x=7.5, j=-1.0, n=1.0, m=2.0
the value of --x+j == x>n>=m is:
(A) 0       (B) 1
(C) 2       (D) 3
Answer: A
14.       Which of the following is incorrect in C++ ?
(A) When we write overloaded function we must code the function for each usage.
(B) When we write function template we code the function only once.
(C) It is difficult to debug macros
(D) Templates are more efficient than macros
Answer: D
15.       When the inheritance is private, the private methods in base class are.................. in the derived class (in C++).
(A) inaccessible           (B) accessible
(C) protected                 (D) public
Answer: A

16.       An Assertion is a predicate expressing a condition we wish database to always satisfy. The correct syntax for Assertion is :
Answer: A
17.       Which of the following concurrency protocol ensures both conflict serializability and freedom from deadlock ?
(a) 2-phase Locking
(b) Time stamp - ordering
(A) Both (a) and (b)     (B) (a) only
(C) (b) only                    (D) Neither (a) nor (b)
Answer: C
18.       Drop Table cannot be used to drop a Table referenced by .................. constraint.
(a) Primary key             (b) Sub key    (c) Super key            (d) Foreign key
(A) (a)                 (B) (a), (b) and (c)
(C) (d)                (D) (a) and (d)
Answer: C
19.       Database applications were built directly on top of file system to overcome the following drawbacks of using file-systems
(a) Data redundancy and inconsistency
(b) Difficulty in accessing Data
(c) Data isolation
(d) Integrity problems
(A) (a)                             (B) (a) and (d)
(C) (a), (b) and (c)        (D) (a), (b), (c) and (d)
Answer: D
20.    For a weak entity set to be meaningful, it must be associated with another entity set in combination with some of their attribute values, is called as :
(A) Neighbour Set       (B) Strong Entity Set
(C) Owner entity set    (D) Weak Set
Answer: C

No comments:

Post a Comment