NTA UGC NET Computer Science Paper II Solved July 2018 - Part 1

1.       The definitions in an XML document are said to be .............. when the tagging system and definitions in the DTD are all in compliance.
(1) well-formed
(2) reasonable
(3) valid
(4) logical
Answer: 3
2.       Consider the JavaScript Code :
var y= “12”;
function f( ) {
var y = “6”;
alert (this.y);
function g( ) {alert (y); }
g( );
f( );
If M is the number of alert dialog boxes generated by this JavaScript code and D1, D2, ............, DM represents the content displayed in each of the M dialog boxes, then:
(1) M=3; D1 displays “12”; D2 displays “6”; D3 displays “12”.
(2) M=3; D1 displays “6”; D2 displays “12”; D3 displays “6”.
(3) M=2; D1 displays “6”; D2 displays “12”.
(4) M=2; D1 displays “12”; D2 displays “6”.
Answer: 4
3.       What is the output of the following JAVA program?
class simple
public static void main(String[ ] args)
simple obj = new simple( );
obj.start( );
void start( )
long [ ] P= {3, 4, 5};
long [ ] Q= method (P);
System.out.print (P[0] + P[1] + P[2]+”:”);
System.out.print (Q[0] + Q[1] + Q[2]);
long [ ] method (long [ ] R)
R [1]=7;
return R;
} //end of class
(1) 12 : 15
(2) 15 : 12
(3) 12 : 12
(4) 15 : 15
Answer: 4
4.       What is the output of the following ‘C’ program? (Assuming little - endian representation of multi-byte data in which Least Significant Byte (LSB) is stored at the lowest memory address.)
#include <stdio.h>
#include <stdlib.h>
/* Assume short int occupies two bytes of storage */
int main ( )
union saving
short int one;
char two[2];
union saving m;
m.two [0] = 5;
m.two [1] = 2;
printf(’’%d, %d, %d\n”, m.two [0], m.two [1], m.one);
}/* end of main */
(1) 5, 2, 1282
(2) 5, 2, 52
(3) 5, 2, 25
(4) 5, 2, 517
Answer: 4
5.       Given below are three implementations of the swap( ) function in C++ :
Which of these would actually swap the contents of the two integer variables p and q?
(1) (a) only
(2) (b) only
(3) (c) only
(4) (b) and (c) only
Answer: 2
6.       In Java, which of the following statements is/are True?
S1: The ‘final’ keyword applied to a class definition prevents the class from being extended through derivation.
S2: A class can only inherit one class but can implement multiple interfaces.
S3: Java permits a class to replace the implementation of a method that it has inherited. It is called method overloading.
(1) S1 and S2 only
(2) S1 and S3 only
(3) S2 and S3 only
(4) All of S1, S2 and S3
Answer: 1
7.       Which of the following statements is/are True?
P: C programming language has a weak type system with static types.
Q: Java programming language has a strong type system with static types.
(1) P only
(2) Q only
(3) Both P and Q
(4) Neither P nor Q
Answer: 3
8.       A graphic display system has a frame buffer that is 640 pixels wide, 480 pixels high and 1 bit of color depth. If the access time for each pixel on the average is 200 nanoseconds, then the refresh rate of this frame buffer is approximately:
(1) 16 frames per second
(2) 19 frames per second
(3) 21 frames per second
(4) 23 frames per second
Answer: 1
9.       Which of the following statements is/are True regarding the solution to the visibility problem in 3D graphics?
S1: The Painter’s algorithm sorts polygons by depth and then paints (scan - converts) each Polygon on to the screen starting with the most nearest polygon.
S2: Backface Culling refers to eliminating geometry with backfacing normals.
(1) S1 only
(2) S2 only
(3) Both S1 and S2
(4) Neither S1 nor S2
Answer: 2
10.    Consider the matrix
representing a set of planar (2D) geometric transformations in homogeneous coordinates. Which of the following statements about the matrix M is True?
(1) M represents first, a scaling of vector (2,1) followed by translation of vector (1,1)
(2) M represents first, a translation of vector (1,1) followed by scaling of vector (2,1)
(3) M represents first, a scaling of vector (3,1) followed by shearing of parameters (-1,1)
(4) M represents first, a shearing of parameters (-1,1) followed by scaling of vector (3,1)
Answer: 2
11.    Assume the following regarding the development of a software system P:
- Estimated lines of code of P: 33, 480 LOC
- Average productivity for P: 620 LOC per person-month
- Number of software developers: 6
- Average salary of a software developer: Rs. 50,000 per month
If E, D and C are the estimated development effort (in person-months), estimated development time (in months), and estimated development cost (in Rs Lac) respectively, then (E, D, C) = ...............
(1) (48, 8, 24)
(2) (54, 9, 27)
(3) (60, 10, 30)
(4) (42, 7, 21)
Answer: 2
12.    Match the following in Software Engineering:
List - I                                       
(a) Product Complexity
(b) Structured System Analysis
(c) Coupling and Cohesion
(d) Symbolic Execution
List - II
(i) Software Requirements Definition
(ii) Software Design
(iii) Validation Technique
(iv) Software Cost Estimation
     (a)   (b)  (c)   (d)
(1) (ii)   (iii)  (iv)  (i)
(2) (iii)  (i)   (iv)   (ii)
(3) (iv)  (i)   (ii)   (iii)
(4) (iii)  (iv)  (i)   (ii)
Answer: 3
13.    Which one of the following is not typically provided by Source Code Management Software?
(1) Synchronisation
(2) Versioning and Revision history
(3) Syntax highlighting
(4) Project forking
Answer: 3
14.    A software system crashed 20 times in the year 2017 and for each crash, it took 2 minutes to restart. Approximately, what was the software availability in that year?
(1) 96.9924%
(2) 97.9924%
(3) 98.9924%
(4) 99.9924%
Answer: 4
15.    Match the 5 CMM Maturity levels/CMMI staged representations in List- I with their characterizations in List-II:
List - I
(a) Initial
(b) Repeatable
(c) Defined
(d) Managed
(e) Optimizing
List - II
(i) Processes are improved quantitatively and continually.
(ii) The plan for a project comes from a template for plans.
(iii) The plan uses processes that can be measured quantitatively.
(iv) There may not exist a plan or it may be abandoned.
(v) There’s a plan and people stick to it.
      (a)  (b)   (c)  (d)  (e)
(1) (iv)  (v)   (i)   (iii)  (ii)
(2) (i)    (ii)   (iv)  (v)  (iii)
(3) (v)   (iv)  (ii)   (iii)  (i)
(4) (iv)  (v)   (ii)   (iii)  (i)
Answer: 4
16.    Coupling is a measure of the strength of the interconnections between software modules. Which of the following are correct statements with respect to module coupling?
P: Common coupling occurs when one module controls the flow of another module by passing it information on what to do.
Q: In data coupling, the complete data structure is passed from one module to another through parameters.
R: Stamp coupling occurs when modules share a composite data structure and use only parts of it.
(1) P and Q only
(2) P and R only
(3) Q and R only
(4) All of P, Q and R
Answer: 3
17.    A software design pattern often used to restrict access to an object is:
(1) adapter
(2) decorator
(3) delegation
(4) proxy
Answer: 4
18.    Reasons to re-engineer a software include :
P: Allow legacy software to quickly adapt to the changing requirements
Q: Upgrade to newer technologies/platforms/paradigm (for example, object-oriented)
R: Improve software maintainability
S: Allow change in the functionality and architecture of the software
(1) P, R and S only
(2) P and R only
(3) P, Q and S only
(4) P, Q and R only
Answer: 4
19.    Which of the following is not a key strategy followed by the clean room approach to software development?
(1) Formal specification
(2) Dynamic verification
(3) Incremental development
(4) Statistical testing of the system
Answer: 2
20.    Which of the following statements is/are True?
P: Refactoring is the process of changing a software system in such a way that it does not alter the external behaviour of the code yet improves the internal architecture.
Q: An example of refactoring is adding new features to satisfy a customer requirement discovered after a project is shipped.
(1) P only
(2) Q only
(3) Both P and Q
(4) Neither P nor Q
Answer: 1

Pages   2   3   4   5 

Post a Comment