UGC NET Computer Science Paper II December 2010 - Part 2 Solved MCQs

11.       How many of the following declarations are correct?
int z = 7.0;
double void = 0.000;
short array [2] = {0, 1, 2};
char c = “\n”;
(A) None
(B) One is correct
(C) Two are correct
(D) All four are correct
Answer: C
12.       The value of the following expression (13/4*3)%5+1 is
(A) 5.75
(B) 2.95
(C) 1.4875
(D) 5
Answer: A
13.       Which one of the following will set the value of y to 5 if x has the value 3, but not otherwise?
(A) if (x = 3) y = 5
(B) if x = = 3 (y = 5)
(C) if (x = = 3); y = 5
(D) if (x = = 3) y = 5
Answer: D
14.       Which one of the following sentences is true?
(A) The body of a while loop is executed at least once.
(B) The body of a do … while loop is executed at least once.
(C) The body of a do … while loop is executed zero or more times.
(D) A for loop can never be used in place of a while loop.
Answer: B
15.       “Black” refers in the “Black-box” testing means
(A) Characters of the movie “Black”
(B) I – O is hidden
(C) Design is hidden
(D) Users are hidden
Answer: C

16.       In generalisation, the differences between members of an entity is
(A) maximized
(B) minimized
(C) both (A) & (B)
(D) None of these
Answer: A
17.       The dependency preservation decomposition is a property to decompose database schema D, in which each functional dependency X®Y specified in F,
(A) appeared directly in one of the relation schemas Ri in the decomposed D.
(B) could be inferred from dependencies that appear in some Ri.
(C) both (A) and (B)
(D) None of these
Answer: C
18.       Which of the following is an optimistic concurrency control method?
(A) Validation based
(B) Time stamp ordering
(C) Lock-based
(D) None of these
Answer: A
19.       Optical storage is a
(A) high-speed direct access storage device.
(B) low-speed direct access storage device.
(C) medium-speed direct access storage device.
(D) high-speed sequential access storage device.
Answer: C
20.    Which of the following is the process by which a user’s access to physical data in the application is limited, based on his privileges?
(A) Authorization
(B) Authentication
(C) Access Control
(D) All of these
Answer: C

Pages   2   3   4   5 

Post a Comment


  1. lot of question has wrong answers plz correct it.......

    1. pls mention the question number found wrong..