This is the Fully Solved Question paper of UGC NET examination on Computer Science and Applications Paper II, examination held on June 2011. We have a compilation of 10 years question paper of UGC NET Computer Science and Applications. You can browse through all solved UGC NET question papers visiting the links below.
1. Any
integer composed of 3n identical digits divisible by
(A) 2n (B) 3n
(C) 5n (D) 7n
Ans: B
2. The
circumferences of the two concentric disks are divided into 100
sections each. For the outer disk, 100 of the sections are painted
red and 100 of the sections are painted blue. For the inner disk, the
sections are painted red and blue in an arbitrary manner. It is
possible to align the two disks so that
(A) 100 or more
(B) 125 or more
(C) 150 or more
(D) 175 or more
of the sections on
the inner disks have their colours matched with the corresponding
section on outer disk.
Ans: A
3. The
proposition ~pÚq is equivalent to
(A) p®q (B) q®p
(C) p«q (D) pÚq
Ans: A
4. The
absorption law in Boolean algebra say that
(A) X + X = X
(B) X . X = X
(C) x + x . y = x
(D) None of the
above
Ans: C
5. The
number of 1’s present in the binary representation of
10 × 256 + 5 ×
16 + 5 is
(A) 5 (B) 6
(C) 7 (D) 8
Ans: B
6. The
hexadecimal number equivalent to (1762.46)8 is
(A) 3F2.89
(B) 3F2.98
(C) 2F3.89
(D) 2F3.98
Ans: B
7. (A +
B)(AB)’ is equivalent to
(A) AÅB (B)
AʘB
(C)(AÅB)ʘA
(D)(AʘB)ÅA
Ans: A
8. A latch
is constructed using two cross-coupled
(A) AND and OR
gates
(B) AND gates
(C) NAND and NOR
gates
(D) NAND gates
Ans: D
9. A
multiplexer is a logic circuit that
(A) accepts one
input and gives several output
(B) accepts many
inputs and gives many output
(C) accepts many
inputs and gives one output
(D) accepts one
input and gives one output
Ans: C
10. 8-bit 1’s
complement form of –77.25 is
(A) 01001101.0100
(B) 01001101.0010
(C) 10110010.1011
(D) 10110010.1101
Ans: C
11. From the
point of view of the programmer, what are the major advantages of
using a high-level language rather than internal machine code or
assembly language ?
(A) Program
portability
(B) Easy
development
(C) Efficiency
(D) None of the
above
Ans: B
12. What features
make C++ so powerful ?
(A) Easy
implementation
(B) Reusing old
code
(C) Easy memory
management
(D) All of the
above
Ans: D
13. The goal of
operator overloading is
(A) to help the
user of a class
(B) to help the
developer of a class
(C) to help define
friend function
(D) None of the
above
Ans: A
14. The scheme of
which interpreter translates the source program is known as
(A) Paragraph by
paragraph
(B) Instruction by
instruction
(C) Line by line
(D) None of the
above
Ans: C
15. Portable
program means
(A) Program with
wheels
(B) Independent
from its authors
(C) Independent of
platform
(D) None of the
above
Ans: C
16. Which of the
following is the recovery management technique in DDBMS ?
(A) 2PC (Two Phase
Commit)
(B) Backup
(C) Immediate
update
(D) All of the
above
Ans: D
17. Which of the
following is the process by which a user’s privileges ascertained ?
(A) Authorization
(B) Authentication
(C) Access Control
(D) None of these
Ans: A
18. The basic
variants of time-stampbased method of concurrency control are
(A) Total time
stamp-ordering
(B) Partial time
stamp ordering
(C) Multiversion
Time stamp ordering
(D) All of the
above
Ans: D
19. A transaction
can include following basic database access operations :
(A) Read_item(X)
(B) Write_item(X)
(C) Both (A) and
(B)
(D) None of these
Ans: C
20. Decomposition
help in eliminating some of the problems of bad design
(A) Redundancy
(B)
Inconsistencies
(C) Anomalies
(D) All of the
above
Ans: D
21. The number of
different trees with 8 nodes is
(A) 256 (B) 255
(C) 248 (D) None
of these
Ans: C
22. Given a
binary tree whose inorder and preorder traversal are given by
Inorder :
EICFBGDJHK
Preorder :
BCEIFDGHJK
The post order
traversal of the above binary tree is
(A) IEFCGJKHDB
(B) IEFCJGKHDB
(C) IEFCGKJHDB
(D) IEFCGJKDBH
Ans: A
23. The number of
disk accesses performed by insertion operation in B-tree of height h
is
(A) 0(1) (B)
0(1gh)
(C) 0(h) (D)
None of these
Ans: C
24. Consider a
hash table of size m = 10000 and the hash function h(k) = ∟m(kA mod
1)'┘ for A = (√5–1)/2. The location to the key k = 123456 is
(A) 46 (B) 47
(C) 41 (D) 43
Ans: C
25. When the
priority queue is represented by max heap, the insertion and deletion
of an element can be performed in (queue containing n elements)
(A) q(n) and q(1)
respectively
(B) q(n) and q(n)
respectively
(C) q(1) and q(1)
respectively
(D) None of the
above
Ans: C
26. A comparison
of frequency division and time division multiplexing system shows
that
(A) FDM requires a
lower bandwidth, but TDM has greater noise immunity.
(B) FDM has
greater noise immunity and requires lower bandwidth than TDM.
(C) FDM requires
channel synchronization, while TDM has greater noise immunity.
(D) FDM requires
more multiplex while TDM requires band pass filter.
Ans: C
27. If carrier
modulated by a digital bit stream, has one one of the possible phase
of 0, 90, 180 and 270 degrees, then modulation called
(A) BPSK (B)
QPSK
(C) QAM (D) MSK
Ans: B
28. Consider the
following statement :
(i) The bandwidth
of the A.M., wave depends on the band width of the modulating signal.
(ii) The bandwidth
of the A.M., wave depends on the modulation index.
(iii) The
bandwidth of the F.M, wave for all practical purpose depends on the
amplitude of the carrier. Of these statements the correct statements
are
(A) (i, ii)
(B) (i, iii)
(C) (ii, iii)
(D) All of the
above
Ans: B
29. A smart modem
can dial, hangup and answer incoming calls automatically. Can you
tell who provides the appropriate instructions to the modem for this
purpose ?
(A) Communication
software
(B) Error
detection protocols
(C) Link access
procedure (LAP)
(D)
Telecommunications
Ans: A
30. Which of the
following switching techniques is most suitable for interactive
traffic ?
(A) Circuit
switching
(B) Message
switching
(C) Packet
switching
(D) All of the
above
Ans: C
31. Object
modules generated by assembler that contains unresolved external
references are resolved for two or more object module by a/an
(A) Operating
system
(B) Loader
(C) Linker
(D) Compiler
Ans: C
32. A special
software that is used to create a job queue is called
(A) Drive
(B) Spooler
(C) Interpreter
(D) Linkage editor
Ans: B
33. Which of the
following permanent database that has an entry for each terminal
symbol ?
(A) Literal table
(B) Identifier
table
(C) Terminal table
(D) Source table
Ans: C
34. In which
way(s) a macroprocessor for assembly language can be implemented ?
(A) Independent
two-pass processor
(B) Independent
one-pass processor
(C) Expand
macrocalls and substitute arguments
(D) All of the
above
Ans: D
35. Which of the
following can be accessed by transfer vector approach of linking ?
(A) External data
segments
(B) External
subroutine
(C) Data located
in other procedure
(D) All of the
above
Ans: B
36. Block or
Buffer caches are used to
(A) improve disk
performance
(B) handle
interrupts
(C) increase the
capacity of main memory
(D) speed up main
memory Read operations
Ans: D
37. A file
organization component VSAM file is
(A) Relative
records data set
(B) Keyed
sequential data set
(C) Entry
sequential data set
(D) All of the
above
Ans: D
38. A
relationship between processes such that each has some part (critical
section) which must not be executed while the critical section of
another is being executed, is known as
(A) Semaphore
(B) Mutual
exclusion
(C)
Multiprogramming
(D) Message
passing
Ans: B
39. How many
states can a process be in ?
(A) 3 (B) 4
(C) 2 (D) 5
Ans: D
40. Which command
allows you to view your file 24 lines at a time ?
(A) More (B) Cat
(C) Pg (D)
None of the above
Ans: A
41. Which one of
the items listed below is not one of the software engineering layers
?
(A) Process
(B) Manufacturing
(C) Method
(D) Tools
Ans: B
42. What is the
first stage in program development ?
(A) Specification
and design
(B) System
Analysis
(C) Testing
(D) None of the
above
Ans: B
43. By means of a
data flow diagram, the analyst can detect
(A) Task
duplication
(B) Unnecessary
delays
(C) Task
overlapping
(D) All of the
above
Ans: D
44. Which of
these are the 5 generic software engineering framework activities ?
(A) Communication,
planning, modelling, construction,
deployment
(B) Communication,
risk management, measurement, production, reviewing
(C) Analysis,
designing, programming, Debugging, maintenance
(D) Analysis,
planning, designing, programming, testing
Ans: A
45. Many causes
of the software crisis can be traced to mythology based on
(A) Management
Myths
(B) Customer Myths
(C) Practitioner
Myths
(D) All of the
above
Ans: D
46. Data
warehousing refers to
(A) storing data
offline at a separate site
(B) backing up
data regularly
(C) is related to
data mining
(D) uses tape as
opposed to disk
Ans: C
47. Virtual
memory is
(A) related to
virtual reality
(B) a form of ROM
(C) a form of RAM
(D) None of the
above
Ans: C
48. “M-Commerce”
refers to
(A) a myth which
does not exist in reality
(B) the ability of
business to reach potential customers wherever they are
(C) the ability to
have large capacity of memory storage dealing trade and commerce
(D) None of the
above
Ans: D
49. The principal
electronic payment systems for electronic commerce is
(A) Credit Card
(B) Digital Wallet
(C) Electronic
Cheque (D) All of the above
Ans: D
50. Which is the
most valuable electronic commerce to the individual customer in long
run ?
(A) Business to
Customer
(B) Business to
Business
(C) Customer to
Customer
(D) None of the
above
Ans: B
0 comments:
Post a Comment