UGC NET Computer Science Paper II December 2009 - Part 2 Solved Questions

11.       Recursive functions are executed in a
(A) First in first out-order
(B) Last in first out-order
(C) Parallel fashion
(D) Load balancing
Answer: B
12.       What would be the output of the following program, if run from the command line as “myprog 1 2 3”?
main (int argc, char * argv[ ])
{  int i ;
i = argv[1] + argv[2] + argv[3] ;
printf (“% d”, i) ;
}
(A) 123
(B) 6
(C) Error
(D) “123”
Answer: C
13.       A …………….. is a special method used to initialize the instance variable of a class.
(A) Member function
(B) Destructor
(C) Constructor
(D) Structure
Answer: C
14.       Encapsulation is
(A) Dynamic binding
(B) A mechanism to associate the code and data.
(C) Data abstraction
(D) Creating new class
Answer: B
15.       Which of the statements are true?
I. Function overloading is done at compile time.
II. Protected members are accessible to the member of derived class.
III. A derived class inherits constructors and destructors.
IV. A friend function can be called like a normal function.
V. Nested class is a derived class.
(A) I, II, III
(B) II, III, V
(C) III, IV, V
(D) I, II, IV
Answer: D

16.       The E-R model is expressed in term of
I. Entities
II. The relationship among entities.
III. The attributes of the entities.
IV. Functional relationship.
(A) I, II
(B) I, II, IV
(C) II, II, IV
(D) I, II, III
Answer: D
17.       Specialization is …………… process.
(A) top-down
(B) bottom up
(C) both (A) and (B)
(D) none of these
Answer: A
18.       Match the following :
List-I
(1) Determinants
(2) Candidate key
(3) Non-redundancy
(4) Functional dependency
List-I
(a) No attribute can be added
(b) Uniquely identified a row
(c) A constraint between two attribute
(d) Group of attributes on the left hand side of arrow of function dependency.
(A) 1 – d, 2 – b, 3 – a, 4 – c
(B) 2 – d, 3 – a, 1 – b, 4 – c
(C) 4 – a, 3 – b, 2 – c, 1 – d
(D) 3 – a, 4 – b, 1 – c, 2 – d
Answer: A
19.       A function that has no partial functional dependencies is in ……………. form.
(A) 3 NF
(B) 2 NF
(C) 4 NF
(D) BCNF
Answer: B
20.    Which of the following statement is wrong?
I. 2-phase locking protocol suffer from dead lock.
II. Time stamp protocol suffer from more aborts.
III. A block hole in a DFD is a data store with only inbound flows.
IV. Multivalued dependency among attribute is checked at 3 NF level.
V. An entity-relationship diagram is a tool to represent event model.
(A) I, II, II
(B) II, III, IV
(C) III, IV, V
(D) II, IV, V
Answer: C

Pages   2   3   4   5 

Post a Comment

0 Comments