UGC NET Computer Science Previous Paper II June 2009 - Part 4

31.       Usually information security in a network is achieved by:
(A) Layering
(B) Cryptography
(C) Grade of service
(D) None of the above
Answer: B
32.       The linker:
(A) is similar to interpreter
(B) uses source code as its input
(C) is required to create a load module
(D) none of the above
Answer: C
33.       In which addressing mode the operand is given explicitly in the instruction itself?
(A) Absolute mode
(B) Immediate mode
(C) Indirect mode
(D) Index mode
Answer: B
34.       A compiler that runs on one machine and produces code for a different machine is called:
(A) Cross compilation
(B) One pass compilation
(C) Two pass compilation
(D) None of the above
Answer: A
35.       Any syntactic construct that can be described by a regular expression can also be described by a:
(A) Context sensitive grammar
(B) Non context free grammar
(C) Context free grammar
(D) None of the above
Answer: C

36.       Find the odd man out:
(A) tail
(B) cut
(C) wart
(D) sed
Answer: C
37.       Which of the following changes permission to deny write permission to group and others?
(A) Chmod go-w filex
(B) Chmod go w filex
(C) Chmod go=w filex
(D) None of the above
Answer: A
38.       Variable partition memory management technique with compaction results in:
(A) Reduction of fragmentation
(B) Minimal wastage
(C) Segment sharing
(D) None of the above
Answer: A
39.       Capability Maturity Model is meant for:
(A) Product
(B) Process
(C) Product and Process
(D) None of the above
Answer: B
40.     In the light of software engineering software consists of:
(A) Programs
(B) Data
(C) Documentation
(D) All of the above
Answer: D

Pages   2   3   4   5 

Post a Comment

0 Comments