NTA UGC NET Computer Science Paper II Solved July 2018 - Part 1

1.       The definitions in an XML document are said to be .............. when the tagging system and definitions in the DTD are all in compliance.
(1) well-formed
(2) reasonable
(3) valid
(4) logical
Answer: 3
2.       Consider the JavaScript Code :
var y= “12”;
function f( ) {
var y = “6”;
alert (this.y);
function g( ) {alert (y); }
g( );
}
f( );
If M is the number of alert dialog boxes generated by this JavaScript code and D1, D2, ............, DM represents the content displayed in each of the M dialog boxes, then:
(1) M=3; D1 displays “12”; D2 displays “6”; D3 displays “12”.
(2) M=3; D1 displays “6”; D2 displays “12”; D3 displays “6”.
(3) M=2; D1 displays “6”; D2 displays “12”.
(4) M=2; D1 displays “12”; D2 displays “6”.
Answer: 4
3.       What is the output of the following JAVA program?
class simple
{
public static void main(String[ ] args)
{
simple obj = new simple( );
obj.start( );
}
void start( )
{
long [ ] P= {3, 4, 5};
long [ ] Q= method (P);
System.out.print (P[0] + P[1] + P[2]+”:”);
System.out.print (Q[0] + Q[1] + Q[2]);
}
long [ ] method (long [ ] R)
{
R [1]=7;
return R;
}
} //end of class
(1) 12 : 15
(2) 15 : 12
(3) 12 : 12
(4) 15 : 15
Answer: 4
4.       What is the output of the following ‘C’ program? (Assuming little - endian representation of multi-byte data in which Least Significant Byte (LSB) is stored at the lowest memory address.)
#include <stdio.h>
#include <stdlib.h>
/* Assume short int occupies two bytes of storage */
int main ( )
{
union saving
{
short int one;
char two[2];
};
union saving m;
m.two [0] = 5;
m.two [1] = 2;
printf(’’%d, %d, %d\n”, m.two [0], m.two [1], m.one);
}/* end of main */
(1) 5, 2, 1282
(2) 5, 2, 52
(3) 5, 2, 25
(4) 5, 2, 517
Answer: 4
5.       Given below are three implementations of the swap( ) function in C++ :
Which of these would actually swap the contents of the two integer variables p and q?
(1) (a) only
(2) (b) only
(3) (c) only
(4) (b) and (c) only
Answer: 2
6.       In Java, which of the following statements is/are True?
S1: The ‘final’ keyword applied to a class definition prevents the class from being extended through derivation.
S2: A class can only inherit one class but can implement multiple interfaces.
S3: Java permits a class to replace the implementation of a method that it has inherited. It is called method overloading.
Code:
(1) S1 and S2 only
(2) S1 and S3 only
(3) S2 and S3 only
(4) All of S1, S2 and S3
Answer: 1
7.       Which of the following statements is/are True?
P: C programming language has a weak type system with static types.
Q: Java programming language has a strong type system with static types.
Code:
(1) P only
(2) Q only
(3) Both P and Q
(4) Neither P nor Q
Answer: 3
8.       A graphic display system has a frame buffer that is 640 pixels wide, 480 pixels high and 1 bit of color depth. If the access time for each pixel on the average is 200 nanoseconds, then the refresh rate of this frame buffer is approximately:
(1) 16 frames per second
(2) 19 frames per second
(3) 21 frames per second
(4) 23 frames per second
Answer: 1
9.       Which of the following statements is/are True regarding the solution to the visibility problem in 3D graphics?
S1: The Painter’s algorithm sorts polygons by depth and then paints (scan - converts) each Polygon on to the screen starting with the most nearest polygon.
S2: Backface Culling refers to eliminating geometry with backfacing normals.
Code:
(1) S1 only
(2) S2 only
(3) Both S1 and S2
(4) Neither S1 nor S2
Answer: 2
10.    Consider the matrix
representing a set of planar (2D) geometric transformations in homogeneous coordinates. Which of the following statements about the matrix M is True?
(1) M represents first, a scaling of vector (2,1) followed by translation of vector (1,1)
(2) M represents first, a translation of vector (1,1) followed by scaling of vector (2,1)
(3) M represents first, a scaling of vector (3,1) followed by shearing of parameters (-1,1)
(4) M represents first, a shearing of parameters (-1,1) followed by scaling of vector (3,1)
Answer: 2
11.    Assume the following regarding the development of a software system P:
- Estimated lines of code of P: 33, 480 LOC
- Average productivity for P: 620 LOC per person-month
- Number of software developers: 6
- Average salary of a software developer: Rs. 50,000 per month
If E, D and C are the estimated development effort (in person-months), estimated development time (in months), and estimated development cost (in Rs Lac) respectively, then (E, D, C) = ...............
(1) (48, 8, 24)
(2) (54, 9, 27)
(3) (60, 10, 30)
(4) (42, 7, 21)
Answer: 2
12.    Match the following in Software Engineering:
List - I                                       
(a) Product Complexity
(b) Structured System Analysis
(c) Coupling and Cohesion
(d) Symbolic Execution
List - II
(i) Software Requirements Definition
(ii) Software Design
(iii) Validation Technique
(iv) Software Cost Estimation
Code:
     (a)   (b)  (c)   (d)
(1) (ii)   (iii)  (iv)  (i)
(2) (iii)  (i)   (iv)   (ii)
(3) (iv)  (i)   (ii)   (iii)
(4) (iii)  (iv)  (i)   (ii)
Answer: 3
13.    Which one of the following is not typically provided by Source Code Management Software?
(1) Synchronisation
(2) Versioning and Revision history
(3) Syntax highlighting
(4) Project forking
Answer: 3
14.    A software system crashed 20 times in the year 2017 and for each crash, it took 2 minutes to restart. Approximately, what was the software availability in that year?
(1) 96.9924%
(2) 97.9924%
(3) 98.9924%
(4) 99.9924%
Answer: 4
15.    Match the 5 CMM Maturity levels/CMMI staged representations in List- I with their characterizations in List-II:
List - I
(a) Initial
(b) Repeatable
(c) Defined
(d) Managed
(e) Optimizing
List - II
(i) Processes are improved quantitatively and continually.
(ii) The plan for a project comes from a template for plans.
(iii) The plan uses processes that can be measured quantitatively.
(iv) There may not exist a plan or it may be abandoned.
(v) There’s a plan and people stick to it.
Code:
      (a)  (b)   (c)  (d)  (e)
(1) (iv)  (v)   (i)   (iii)  (ii)
(2) (i)    (ii)   (iv)  (v)  (iii)
(3) (v)   (iv)  (ii)   (iii)  (i)
(4) (iv)  (v)   (ii)   (iii)  (i)
Answer: 4
16.    Coupling is a measure of the strength of the interconnections between software modules. Which of the following are correct statements with respect to module coupling?
P: Common coupling occurs when one module controls the flow of another module by passing it information on what to do.
Q: In data coupling, the complete data structure is passed from one module to another through parameters.
R: Stamp coupling occurs when modules share a composite data structure and use only parts of it.
Code:
(1) P and Q only
(2) P and R only
(3) Q and R only
(4) All of P, Q and R
Answer: 3
17.    A software design pattern often used to restrict access to an object is:
(1) adapter
(2) decorator
(3) delegation
(4) proxy
Answer: 4
18.    Reasons to re-engineer a software include :
P: Allow legacy software to quickly adapt to the changing requirements
Q: Upgrade to newer technologies/platforms/paradigm (for example, object-oriented)
R: Improve software maintainability
S: Allow change in the functionality and architecture of the software
Code:
(1) P, R and S only
(2) P and R only
(3) P, Q and S only
(4) P, Q and R only
Answer: 4
19.    Which of the following is not a key strategy followed by the clean room approach to software development?
(1) Formal specification
(2) Dynamic verification
(3) Incremental development
(4) Statistical testing of the system
Answer: 2
20.    Which of the following statements is/are True?
P: Refactoring is the process of changing a software system in such a way that it does not alter the external behaviour of the code yet improves the internal architecture.
Q: An example of refactoring is adding new features to satisfy a customer requirement discovered after a project is shipped.
Code:
(1) P only
(2) Q only
(3) Both P and Q
(4) Neither P nor Q
Answer: 1

Pages   2   3   4   5 

Post a comment

0 Comments