Computer Science Study Materials for Competitive Exams

Sample Questions, Previous Year Solved Papers, Study Materials For Competitive Examinations Like UGC NET, SET And GATE Computer Science.

Sunday, 26 February 2017

UGC NET Computer Science Previous Paper II June 2009 - Part 4

31.       Usually information security in a network is achieved by:
(A) Layering
(B) Cryptography
(C) Grade of service
(D) None of the above
Answer: B
32.       The linker:
(A) is similar to interpreter
(B) uses source code as its input
(C) is required to create a load module
(D) none of the above
Answer: C
33.       In which addressing mode the operand is given explicitly in the instruction itself?
(A) Absolute mode
(B) Immediate mode
(C) Indirect mode
(D) Index mode
Answer: B
34.       A compiler that runs on one machine and produces code for a different machine is called:
(A) Cross compilation
(B) One pass compilation
(C) Two pass compilation
(D) None of the above
Answer: A
35.       Any syntactic construct that can be described by a regular expression can also be described by a:
(A) Context sensitive grammar
(B) Non context free grammar
(C) Context free grammar
(D) None of the above
Answer: C

36.       Find the odd man out:
(A) tail
(B) cut
(C) wart
(D) sed
Answer: C
37.       Which of the following changes permission to deny write permission to group and others?
(A) Chmod go-w filex
(B) Chmod go w filex
(C) Chmod go=w filex
(D) None of the above
Answer: A
38.       Variable partition memory management technique with compaction results in:
(A) Reduction of fragmentation
(B) Minimal wastage
(C) Segment sharing
(D) None of the above
Answer: A
39.       Capability Maturity Model is meant for:
(A) Product
(B) Process
(C) Product and Process
(D) None of the above
Answer: B
40.     In the light of software engineering software consists of:
(A) Programs
(B) Data
(C) Documentation
(D) All of the above
Answer: D

Pages   2   3   4   5 

No comments:

Post a Comment