Computer Science Study Materials for Competitive Exams

Sample Questions, Previous Year Solved Papers, Study Materials For Competitive Examinations Like UGC NET, SET And GATE Computer Science.

Friday, 28 April 2017

UGC NET Computer Science Questions Paper II December 2008 - Part 5

41.       In which of the following, ready to execute processes must be present in RAM?
(A) multiprocessing
(B) multiprogramming
(C) multitasking
(D) all of the above
Answer: D
42.       If the executing program size is greater than the existing RAM of a computer, it is still possible to execute the program if the OS supports:
(A) multitasking
(B) virtual memory
(C) paging system
(D) none of the above
Answer: B
43.       Software Quality Assurance(SQA) encompasses:
(A) verification                                     
(B) validation
(C) both verification and validation 
(D) none of the above
Answer: C
44.       Which level is called as “defined” in capability maturity model?
(A) level 0
(B) level 3
(C) level 4
(D) level 1
Answer: B
45.       COCOMO model is used for:
(A) product quality estimation          
(B) product complexity estimation
(C) product cost estimation               
(D) all of the above
Answer: C

46.       Font sizes are usually expressed in points. One point is:
(A) 0.0069 inch
(B) 0.0138 inch
(C) 0.0207 inch
(D) 0.0276 inch
Answer: B
47.       Assertion (A): Cellular telephone systems can handle a multitude of users.
Reasoning (R): Cellular telephone systems permit extensive frequency reuse in a small local area.
(A) Both (A) and (R) are true and (R) is the correct explanation for (A)
(B) Both (A) and (R) are true but (R) is not the correct explanation
(C) (A) is true but (R) is false
(D) (A) is false but (R) is true
Answer: A
48.       E-commerce involves:
(A) Electronic Data Interchange      
(B) Electronic mail
(C) Electronic Bulletin Boards         
(D) All of the above
Answer: D
49.       An example of a data mining algorithm which uses squared error score function is:
(A) CART algorithm                
(B) back propagation algorithm
(C) a priority algorithm                       
(D) vector space algorithm
Answer: B
50.    (I) Each object in the active directory of windows 2000 has an access control list.
(II) The scheme is a blueprint of all objects in the domain of windows 2000.
Which of the following is true?
(A) only (I)                    
(B) only (II)
(C) both (I) and (II)      
(D) none of the above
Answer: C

Pages   2   3   4   5 

No comments:

Post a Comment