NTA UGC NET Computer Science Solved Paper II December 2019 - Part 5

81.         If we want to resize a 1024 × 768 pixels image to one that is 640 pixels wide with the same aspect ratio, what would be the height of the resized image?
(1) 420 Pixels             (2) 460 Pixels
(3) 480 Pixels             (4) 540 Pixels
Answer: 3
82.         An instruction is stored at location 500 with its address field at location 501. The address field has the value 400. A processor register R1 contains the number 200. Match the addressing mode (List-I) given below with effective address (List-II) for the given instruction:
List-I                                                       List-II
(a) Direct                                                 (i) 200
(b) Register Indirect                                  (ii) 902
(c) Index with R1 as the index register       (iii) 400
(d) Relative                                              (iv) 600
Choose the correct option from those given below:
(1) (a)-(iii), (b)-(i), (c)-(iv), (d)-(ii)               (2) (a)-(i), (b)-(ii), (c)-(iii), (d)-(iv)
(3) (a)-(iv), (b)-(ii), (c)-(iii), (d)-(i)               (4) (a)-(iv), (b)-(iii), (c)-(ii), (d)-(i)
Answer: 1
83.         A tree has 2n vertices of degree 1, 3n vertices of degree 2, n vertices of degree 3. Determine the number of vertices and edges in tree.
(1) 12, 11                   (2) 11, 12
(3) 10, 11                   (4) 9, 10
Answer: 1
84.         Match List-I with List-II:
List-I                                                       List-II
(a) Micro operation                                   (i) Specify micro operations
(b) Micro programmed control unit            (ii) Improve CPU utilization
(c) Interrupts                                            (iii) Control memory
(d) Micro instruction                                  (iv) Elementary operation performed on data
stored in registers
Choose the correct option from those given below:
(1) (a)-(iv), (b)-(iii), (c)-(ii), (d)-(i)               (2) (a)-(iv), (b)-(iii), (c)-(i), (d)-(ii)
(3) (a)-(iii), (b)-(iv), (c)-(i), (d)-(ii)               (4) (a)-(iii), (b)-(iv), (c)-(ii), (d)-(i)
Answer: 1
85.         Suppose a system has 12 magnetic tape drives and at time t0, three processes are allotted tape drives out of their need as given below: 
At time t0, the system is in safe state. Which of the following is safe sequence so that deadlock is avoided?
(1) p0, p1, p2                       (2) p1, p0, p2
(3) p2, p1, p0                       (4) p0, p2, p1
Answer: 2
86.         Consider the following statements:
(a) Fiber optic cable is much lighter than copper cable.
(b) Fiber optic cable is not affected by power surges or electromagnetic interference.
(c) Optical transmission is inherently bidirectional.
Which of the statements is (are) correct?
(1) Only (a) and (b)              (2) Only (a) and (c)
(3) Only (b) and (c)              (4) (a), (b) and (c)
Answer: 1
87.         Consider the following models:
M1: Mamdani model
M2: Takagi-Sugeno-Kang model
M3: Kosko's additive model(SAM)
Which of the following option contains examples of additive rule model?
(1) Only M1 and M2               (2) Only M2 and M3
(3) Only M1 and M3               (4) M1, M2 and M3
Answer: 2
88.         Give asymptotic upper and lower bound for T(n) given below. Assume T(n) is constant for n≤2.
T(n)= 4T(√n)+lg2 n
(1) T(n)= θ(lg*(lg2 n)lg n)                           (2) T(n)= θ(lg2n lg n)
(3) T(n)= θ(lg2 n lg lg n)                            (4) T(n)= θ(lg (lg n)lg n)
Answer: 2
89.         The Boolean expression
   

is unaffected by the value of the Boolean variable …………….
(1) A                (2) B
(3) C                (4) A, B and C
Answer: 2
90.     Let A be the base class in C++ and B be the derived class from A with protected inheritance.
Which of the following statement is false for class B?
(1) Member function of class B can access protected data of class A
(2) Member function of class B can access public data of class A
(3) Member function of class B cannot access private data of class A
(4) Object of derived class B can access public base class data
Answer: 4
Comprehension:
Answer the following questions (91 - 95) based on flow graph F.
A flow graph F with entry node (1) and exit node (11) is shown below:


91.     How many nodes are there in the longest independent path?
(1) 6                (2) 7             (3) 8             (4) 9
Answer: 3
92.     How many regions are there in flow graph F?
(1) 2                (2) 3             (3) 4             (4) 5
Answer: 3
93.     How many nodes are there in flow graph F?
(1) 9                (2) 10           (3) 11           (4) 12
Answer: 1
94.     What is the cyclomatic complexity of flow graph F?
(1) 2                (2) 3             (3) 4             (4) 5
Answer: 3
95.     How many predicate nodes are there and what are their names?
(1) Three: (1, (2,3), 6)          (2) Three: (1, 4, 6)
(3) Four: ((2,3), 6, 10, 11)     (4) Four: ((2,3), 6, 9, 10)
Answer: 1
Comprehension:
Answer question (96 - 100) based on the problem statement given below:

An organization needs to maintain database having five attributes A, B, C, D, E. These attributes are functionally dependent on each other for which functionally dependency set F is given as: F: {A→ BC, D → E, BC → D, A →D}. Consider a universal relation R(A, B, C, D, E) with functional dependency set F. Also all attributes are simple and take atomic values only.

96.     Minimal cover F’ of functional dependency set F is
(1) F’ = {A → B, A → C, BC → D, D →E}
(2) F’ = {A → BC, B → D, D → E}
(3) F’ = {A → B, A → C, A → D, D → E}
(4) F’ = {A → B, A → C, B → D, C → D, D → E}
Answer: 1
97.     Assume that given table R is decomposed in two tables.
R1(A,B,C) with functional dependency set F1 = {A → B, A → C} and
R2(A,D,E) with FD set F2 = {A → D, D → E}
Which of the following option is true w.r.t. given decomposition?
(1) Dependency preservation property is followed
(2) R1 and R2 are both in 2 NF
(3) R2 is in 2 NF and R3 is in 3 NF
(4) R1 is in 3 NF and R2 is in 2 NF
Answer: 4
98.     Identify the redundant functional dependency in F
(1) BC→D                  (2) D→E
(3) A→D                              (4) A→BC
Answer: 3
99.     Identify primary key of table R with functional dependency set F
(1) BC                       (2) AD
(3) A                          (4) AB
Answer: 3
100.     Identify the normal form in which relation R belong to
(1) 1 NF                     (2) 2 NF
(3) 3 NF                     (4) BCNF
Answer: 2

Post a Comment

0 Comments