CBSE UGC NET Computer Science Paper III Solved June 2015 - Part 6

51.       What is the most appropriate function of Memory Management Unit (MMU) ?
(A) It is an associative memory to store TLB
(B) It is a technique of supporting multiprogramming by creating dynamic partitions
(C) It is a chip to map virtual address to physical address
(D) It is an algorithm to allocate and deallocate main memory to a process
Answer: C
52.       Dining Philosopher's problem is a:
(A) Producer-Consumer problem     (B) Classical IPC problem
(C) Starvation problem                       (D) Synchronization primitive
Answer: B
53.       In ............ allocation method for disk block allocation in a file system, insertion and deletion of blocks in a file is easy.
(A) Index                       (B) Linked
(C) Contiguous                        (D) Bit Map
Answer: B
54.       A unix file may be of type:
(A) Regular file                        (B) Directory File
(C) Device File             (D) Any one of the above
Answer: D
55.       Match the following:
List-I                           List-II
(a) Intelligence             (i) Contextual, tacit, transfer needs learning
(b) Knowledge             (ii) Scattered facts, easily transferrable
(c) Information              (iii) Judgemental
(d) Data                         (iv) Codifiable, endorsed with relevance and purpose
      (a)  (b)  (c)  (d)
(A) (iii)  (ii)  (iv)  (i)
(B) (iii)  (i)   (iv)  (ii)
(C) (i)   (ii)   (iii)  (iv)
(D) (i)   (iii)  (iv)  (ii)
Answer: B

56.       Match the following knowledge representation techniques with their applications:
List-I                                                   List-II
(a) Frames                                            (i) Pictorial representation of objects,
their attributes and relationships
(b) Conceptual dependencies          (ii) To describe real world stereotype events
(c) Associative networks                    (iii) Record like structures for grouping
closely related knowledge
(d) Scripts                                              (iv) Structures and primitives to represent
      (a)  (b)   (c)  (d)
(A) (iii)  (iv)  (i)   (ii)
(B) (iii)  (iv)  (ii)  (i)
(C) (iv)  (iii)  (i)   (ii)
(D) (iv)  (iii)  (ii)  (i)
Answer: A
57.       In propositional logic P↔Q is equivalent to (Where ~ denotes NOT):
(A) ~(PQ)∧~(Q∨P)      (B) (~PQ)∧(~Q∨P)
(C) (PQ)(Q∨P)          (D) ~(PQ)→~(Q∨P)
Answer: B
58.       Which of the following statements is true for Branch-and-Bound search?
(A) Underestimates of remaining distance may cause deviation from optimal path.
(B) Overestimates can’t cause right path to be overlooked.
(C) Dynamic programming principle can be used to discard redundant partial paths.
(D) All of the above
Answer: C
59.       Match the following with respect to heuristic search techniques:
List-I                                                   List-II
(a) Steepest-accent Hill Climbing     (i) Keeps track of all partial paths which
can be candidate for further exploration
(b) Branch-and-bound                                   (ii) Discover problem state(s) that satisfy
a set of constraints
(c) Constraint satisfaction                  (iii) Detects difference between current
state and goal state
(d) Means-end-analysis                     (iv) Considers all moves from current
state and selects best move
      (a)   (b)  (c)  (d)
(A) (i)    (iv)  (iii) (ii)
(B) (iv)  (i)    (ii)  (iii)
(C) (i)   (iv)   (ii)  (iii)
(D) (iv) (ii)    (i)   (iii)
Answer: B
60.    Match the following for methods of MIS development:
List-I      List-II
(a) Joint Application Design(JAD)    (i) Delivers functionality in rapid iteration
measured in weeks and needs frequent communication, development, testing and delivery
(b) Computer Aided Software Engg (ii) Reusable applications generally with one
specific function. It is closely linked with idea of
web services and service oriented architecture.
(c) Agile development                         (iii) Tools to automate many tasks of SDLC
(d) Component based technology    (iv) A group based tool for collecting user requirements and creating system design. Mostly used in analysis and design stages of SDLC
      (a)  (b)  (c)  (d)
(A) (i)   (iii)  (ii)  (iv)
(B) (iv) (iii)  (i)   (ii)
(C) (iii) (iv)  (i)   (ii)
(D) (iii) (i)   (iv)  (ii)
Answer: B

Post a Comment