This is the Fully Solved Question paper of UGC NET examination on Computer Science and Applications Paper II, examination held on December 2004. We have a compilation of 10 years question paper of UGC NET Computer Science and Applications. You can browse through all solved UGC NET question papers visiting the links below.
1. AVA = A
is called:
(A) Identity law
(B) De Morgan’s law
(C) Idempotant law
(D) Complement law
Ans: C
2. If f(x)
=x+1 and g(x)=x+3 then f 0 f 0 f 0 f is:
(A) g (B)
g+1
(C) g4 (D)
None of the above
Ans: B
3. The
context-free languages are closed for:
(i) Intersection
(ii) Union
(iii)
Complementation (iv) Kleene Star
then
(A) (i) and (iv)
(B) (i) and (iii)
(C) (ii) and (iv)
(D) (ii) and (iii)
Ans: C
4. The
following lists are the degrees of all the vertices of a graph:
(i) 1, 2, 3, 4, 5
(ii) 3, 4, 5, 6, 7
(iii) 1, 4, 5, 8,
6 (iv) 3, 4, 5, 6
then
(A) (i) and (ii)
(B) (iii) and (iv)
(C) (iii) and (ii)
(D) (ii) and (iv)
Ans: B
5. If Im
denotes the set of integers modulo m, then the following are fields
with respect to the operations of addition modulo m and
multiplication modulo m:
(i) Z23 (ii)
Z29
(iii) Z31 (iv)
Z33
Then
(A) (i) only
(B) (i) and (ii) only
(C) (i), (ii) and
(iii) only (D) (i), (ii), (iii) and (iv)
Ans: C
6. An
example of a binary number which is equal to its 2’s complement is:
(A) 1100
(B) 1001
(C) 1000
(D) 1111
Ans: C
7. When a
tri-state logic device is in the third state, then:
(A) it draws low
current (B) it does not draw any current
(C) it draws very
high current (D) it presents a low impedance
Ans: D
8. An
example of a connective which is not associative is:
(A) AND
(B) OR
(C) EX-OR
(D) NAND
Ans: D
9. Essential
hazards may occur in:
(A) Combinational
logic circuits
(B) Synchronous
sequential logic circuits
(C) Asynchronous
sequential logic circuits working in the fundamental mode
(D) Asynchronous
sequential logic circuits working in the pulse mode
Ans: C
10. The
characteristic equation of a T flip-flop is:
(A) Qn+1=TQ’n +
T’ Qn (B) Qn+1=T+Qn
(C) Qn+1=TQn
(D) Qn+1= T’Q’n
The symbols used
have the usual meaning.
Ans: A
11. Suppose
x and y are two Integer Variables having values 0x5AB6 and 0x61CD
respectively. The result (in hex) of applying bitwise operator and to
x and y will be:
(A) 0x5089
(B) 0x4084
(C) 0x78A4
(D) 0x3AD1
Ans: B
12. Consider
the following statements,
int i=4, j=3, k=0;
k=++i - --j + i++
- --j +j++; What will be the values of i, j and k after the
statement.
(A) 7, 2, 8
(B) 5, 2, 10
(C) 6, 2, 8
(D) 4, 2, 8
Ans: C
13. What is
the value of the arithmetic expression (Written in C)
2*3/4-3/4* 2
(A) 0 (B) 1
(C) 1.5 (D)
None of the above
Ans: B
14. A
function object:
(A) is an instance
of a class for which operator () is a member function.
(B) is an instance
of a class for which operator → is a member function.
(C) is a pointer
to any function
(D) is a member
function of a class
Ans: A
15.
Polymorphism means:
(A) A template
function
(B) Runtime type
identification within a class hierarchy
(C) Another name
for operator overloading
(D) Virtual
inheritance
Ans:
16. The E-R
model is expressed in terms of:
(i) Entities
(ii) The
relationship among entities
(iii) The
attributes of the entities
Then
(A) (i) and (iii)
(B) (i), (ii) and (iii)
(C) (ii) and (iii)
(D) None of the above
Ans: B
17.
Specialization is a ............... process.
(A) Top - down
(B) Bottom -Up
(C) Both (A) and
(B) (D) None of the above
Ans: A
18. The
completeness constraint has rules:
(A) Supertype,
Subtype
(B)Total
specialization, Partial specialization
(C)
Specialization, Generalization
(D) All of the
above
Ans: B
19. The
entity type on which the ................. type depends is called the
identifying owner.
(A) Strong entity
(B) Relationship
(C) Weak entity
(D) E - R
Ans: C
20. Match the
following:
(i) 5 NF
(a) Transitive dependencies eliminated
(ii) 2 NF
(b) Multivalued attribute removed
(iii) 3 NF
(c) Contains no partial functional dependencies
(iv) 4 NF
(d) Contains no join dependency
(A) i-a, ii-c,
iii-b, iv-d (B) i-d, ii-c, iii-a, iv-b
(C) i-d, ii-c,
iii-b, iv-a (D) i-a, ii-b, iii-c, iv-d
Ans: B
21. What
item is at the root after the following sequence of insertions into
an empty splay tree:
1, 11, 3, 10, 8,
4, 6, 5, 7, 9, 2 ?
(A) 1 (B) 2
(C) 4 (D) 8
Ans: B
22. Suppose
we are implementing quadratic probing with a Hash function, Hash
(y)=X mode 100. If an element with key 4594 is inserted and the first
three locations attempted are already occupied, then the next cell
that will be tried is:
(A) 2 (B) 3
(C) 9 (D) 97
Ans: D
23. Weighted
graph:
(A) Is a
bi-directional graph
(B) Is directed
graph
(C) Is graph in
which number associated with arc
(D) Eliminates
table method
Ans: C
24. What
operation is supported in constant time by the doubly linked list,
but not by the singly linked list?
(A) Advance
(B) Backup
(C) First
(D) Retrieve
Ans: B
25. How much
extra space is used by heap sort?
(A) O(1)
(B) O(Log n)
(C) O(n)
(D) O(n2)
Ans: A
26. Error
control is needed at the transport layer because of potential error
occurring ..............
(A) from
transmission line noise (B) in router
(C) from out of
sequence delivery (D) from packet losses
Ans: B
27. Making
sure that all the data packets of a message are delivered to the
destination is ................ control.
(A) Error
(B) Loss
(C) Sequence (D)
Duplication
Ans: A
28. Which
transport class should be used with a perfect network layer?
(A) TP0 and TP2
(B) TP1 and TP3
(C) TP0, TP1, TP3
(D) TP0, TP1, TP2, TP3, TP4
Ans: A
29. Which
transport class should be used with residual-error network layer?
(A) TP0, TP2
(B) TP1, TP3
(C) TP1, TP3, TP4
(D) TP0, TP1, TP2, TP3, TP4
Ans: B
30. Virtual
circuit is associated with a ..................... service.
(A) Connectionless
(B) Error-free
(C) Segmentation
(D) Connection-oriented
Ans: D
31. Which
activity is not included in the first pass of two pass assemblers?
(A) Build the
symbol table
(B) Construct the
intermediate code
(C) Separate
mnemonic opcode and operand fields
(D) None of the
above
Ans: D
32. Which of
the following is not collision resolution technique?
(A) Hash
addressing (B) Chaining
(C) Both (A) and
(B) (D) Indexing
Ans: D
33. Code
optimization is responsibility of:
(A) Application
programmer (B) System programmer
(C) Operating
system (D) All of the above
Ans: B
34. Which
activity is not included in the first pass of two pass assemblers?
(A) Build the
symbol table
(B) Construct the
intermediate code
(C) Separate
mnemonic opcode and operand fields
(D) None of these
Ans: D
35. In two
pass assembler the symbol table is used to store:
(A) Label and
value (B) Only value
(C) Mnemonic
(D) Memory Location
Ans: D
36.
Semaphores are used to:
(A) Synchronise
critical resources to prevent deadlock
(B) Synchronise
critical resources to prevent contention
(C) Do I/o
(D) Facilitate
memory management
Ans: A
37. In which
of the following storage replacement strategies, is a program placed
in the largest available hole in the memory?
(A) Best fit
(B) First fit
(C) Worst fit
(D) Buddy
Ans: C
38. Remote
computing system involves the use of timesharing systems and:
(A) Real time
processing (B) Batch processing
(C)
Multiprocessing (D) All of the above
Ans: B
39. Non
modifiable procedures are called
(A) Serially
useable procedures (B) Concurrent procedures
(C) Reentrant
procedures (D) Topdown procedures
Ans: C
40. Match the
following
(a) Disk
scheduling (1) Round robin
(b) Batch
processing (2) Scan
(c) Time sharing
(3) LIFO
(d) Interrupt
processing (4) FIFO
(A) a-3, b-4, c-2,
d-1 (B) a-4, b-3, c-2, d-1
(C) a-2, b-4, c-1,
d-3 (D) a-3, b-4, c-1, d-2
Ans: C
41. The main
objective of designing various modules of a software system is:
(A) To decrease
the cohesion and to increase the coupling
(B) To increase
the cohesion and to decrease the coupling
(C) To increase
the coupling only
(D) To increase
the cohesion only
Ans: B
42. Three
essential components of a software project plan are:
(A) Team
structure, Quality assurance plans, Cost estimation
(B) Cost
estimation, Time estimation, Quality assurance plan
(C) Cost
estimation, Time estimation, Personnel estimation
(D) Cost
estimation, Personnel estimation, Team structure
Ans: C
43.
Reliability of software is dependent on:
(A) Number of
errors present in software
(B) Documentation
(C) Testing suties
(D) Development
Processes
Ans: A
44. In
transform analysis, input portion is called:
(A) Afferent
branch (B) Efferent branch
(C) Central
Transform (D) None of the above
Ans: A
45. The
Function Point (FP) metric is:
(A) Calculated
from user requirements
(B) Calculated
from Lines of code
(C) Calculated
from software’s complexity assessment
(D) None of the
above
Ans: C
46. Data
Mining can be used as ................. Tool.
(A) Software
(B) Hardware
(C) Research
(D) Process
Ans: D
47. The
processing speeds of pipeline segments are usually:
(A) Equal
(B) Unequal
(C) Greater
(D) None of these
Ans: B
48. The cost
of a parallel processing is primarily determined by:
(A) Time
complexity (B) Switching complexity
(C) Circuit
complexity (D) None of the above
Ans: B
49. A data
warehouse is always ....................
(A) Subject
oriented (B) Object oriented
(C) Program
oriented (D) Compiler oriented
Ans: A
50. The term
'hacker' was originally associated with:
(A) A computer
program
(B) Virus
(C) Computer
professionals who solved complex computer problems.
(D) All of the
above
Ans: C
0 comments:
Post a Comment