This is the Fully Solved Question paper of UGC NET examination on Computer Science and Applications Paper II, examination held on June 2012. We have a compilation of 10 years question paper of UGC NET Computer Science and Applications. You can browse through all solved UGC NET question papers visiting the links below.
1. The
postfix expression AB + CD – * can be evaluated using a
(A) stack (B)
tree
(C) queue (D)
linked list
Ans: A
2. The post
order traversal of a binary tree is DEBFCA. Find out the preorder
traversal.
(A) ABFCDE
(B) ADBFEC
(C) ABDECF
(D) None of the above
Ans: C
3. The
branch logic that provides making capabilities in the control unit is
known as
(A) Controlled
transfer (B) Conditional transfer
(C) Unconditional
transfer (D) None of the above
Ans: A
4. The
number of colours required to properly colour the vertices of every
planer graph is
(A) 2 (B) 3
(C) 4 (D) 5
Ans: D
5. Networks
that use different technologies can be connected by using
(A) Packets
(B) Switches
(C) Bridges
(D) Routers
Ans: d
6. Both
hosts and routers are TCP/IP protocol software. However, routers do
not use protocol from all layers. The layer for which protocol
software is not needed by a router is
(A) Layer – 5
(Application)
(B) Layer – 1
(Physical)
(C) Layer – 3
(Internet)
(D) Layer – 2
(Network Interface)
Ans: A
7. In
multiuser database if two users wish to update the same record at the
same time, they are prevented from doing so by
(A) Jamming
(B) Password
(C) Documentation
(D) Record lock
Ans: D
8. A binary
search tree is a binary tree :
(A) All items in
the left subtree are less than root
(A) All items
in the right subtree are greater than or equal to the root
(C) Each subtree
is itself a binary search tree
(D) All of the
above
Ans: D
9. What
deletes the entire file except the file structure ?
(A) ERASE
(B) DELETE
(C) ZAP (D)
PACK
Ans: C
10. Which command
is the fastest among the following ?
(A) COPY TO <NEW
FILE>
(B) COPY STRUCTURE
TO <NEW FILE>
(C) COPY FILE
<FILE 1> <FILE 2>
(D) COPY TO
MFILE-DAT DELIMITED
Ans: B
11. B+ tree are
preferred to binary tree in Database because
(A) Disk
capacity are greater than memory capacities
(B) Disk access
is much slower than memory access
(C) Disk data
transfer rates are much less than memory data transfer rate
(D) Disks are
more reliable than memory
Ans: B
12. A Transaction
Manager is which of the following ?
(A) Maintains a
log of transactions
(B) Maintains
before and after database images
(C) Maintains
appropriate concurrency control
(D) All of the
above
Ans: D
13. Leaves of
which of the following trees are at the same level ?
(A) Binary tree
(B) B-tree
(C) AVL-tree
(D) Expression tree
Ans: B
14. Which of the
following TCP/IP Internet protocol is diskless machine uses to obtain
its IP address from a server ?
(A) RAP (B)
RIP
(C) ARP (D)
X.25
Ans: C
15. Decryption
and encryption of data are the responsibility of which of the
following layer ?
(A) Physical layer
(B) Data Link layer
(C) Presentation
layer (D) Session layer
Ans: C
16. In which
circuit switching, delivery of data is delayed because data must be
stored and retrieved from RAM ?
(A) Space division
(B) Time division
(C) Virtual
(D) Packet
Ans: B
17. In which
Routing Method do all the routers have a common database?
(A) Distance
vector (B) Link state
(C) Link vector
(D) Dijkestra method
Ans: B
18. Page Shift
Keying (PSK) Method is used to modulate digital signal at 9600 bps
using 16 level. Find the line signals and speed (i.e. modulation
rate).
(A) 2400 bauds
(B) 1200 bauds
(C) 4800 bauds
(D) 9600 bauds
Ans: A
19. The station
to hub distance in which it is 2000 metres.
(A) 100 Base-Tx
(B) 100 Base-Fx
(C) 100 Base-T4
(D) 100 Base-T1
Ans: B
20. Main aim of
software engineering is to produce
(A) program
(B) software
(C) within
budget
(D) software
within budget in the given schedule
Ans: D
21. Key process
areas of CMM level 4 are also classified by a process which is
(A) CMM level 2
(B) CMM level 3
(C) CMM level 5
(D) All of the above
Ans: C
22. Validation
means
(A) are we
building the product right
(B) are we
building the right product
(C) verification
of fields
(D) None of the
above
Ans: B
23. If a process
is under statistical control, then it is
(A) Maintainable
(B) Measurable
(C) Predictable
(D) Verifiable
Ans: C
24. In a function
oriented design, we
(A) minimize
cohesion and maximize coupling
(B) maximize
cohesion and minimize coupling
(C) maximize
cohesion and maximize coupling
(D) minimize
cohesion and minimize coupling
Ans: B
25. Which of the
following metric does not depend on the programming language used ?
(A) Line of code
(B) Function count
(C) Member of
token (D) All of the above
Ans: B
26. A / B+ tree
index is to be built on the name attribute of the relation STUDENT.
Assume that all students names are of length 8 bytes, disk block are
of size 512 bytes and index pointers are of size 4 bytes. Given this
scenario what would be the best choice of the degree (i.e. the number
of pointers per node) of the B+ tree ?
(A) 16 (B) 42
(C) 43 (D) 44
Ans: A
27. The Inorder
traversal of the tree will yield a sorted listing of elements of tree
in
(A) Binary tree
(B) Binary search tree
(C) Heaps
(D) None of the above
Ans: B
28. Mobile IP
provides two basic functions.
(A) Route
discovery and registration
(B) Agent
discovery and registration
(C) IP binding and
registration
(D) None of the
above
Ans: B
29. Pre-emptive
scheduling is the strategy of temporarily suspending a gunning
process
(A) before the CPU
time slice expires
(B) to allow
starving processes to run
(C) when it
requests I/O
(D) to avoid
collision
Ans: A
30. In round
robin CPU scheduling as time quantum is increased the average turn
around time
(A) increases
(B) decreases
(C) remains
constant (D) varies irregularly
Ans: D
31. Resources are
allocated to the process on non-sharable basis is
(A) mutual
exclusion (B) hold and wait
(C) no pre-emption
(D) circular wait
Ans: A
32. Cached and
interleaved memories are ways of speeding up memory access between
CPU’s and slower RAM. Which memory models are best suited (i.e.
improves the performance most) for which programs ?
(i) Cached memory
is best suited for small loops.
(ii) Interleaved
memory is best suited for small loops
(iii) Interleaved
memory is best suited for large sequential code.
(iv) Cached memory
is best suited for large sequential code.
(A) (i) and (ii)
are true.
(B) (i) and (iii)
are true.
(C) (iv) and (ii)
are true.
(D) (iv) and (iii)
are true.
Ans: B
33. Consider the
following page trace : 4,3, 2, 1, 4, 3, 5, 4, 3, 2, 1, 5. Percentage
of page fault that would occur if FIFO page replacement algorithm is
used with number of frames for the JOB m=4 will be
(A) 8 (B) 9
(C) 10 (D) 12
Ans: C
34. Check sum
used along with each packet computes the sum of the data, where data
is treated as a sequence of
(A) Integer
(B) Character
(C) Real numbers
(D) Bits
Ans: D
35. If an integer
needs two bytes of storage, then the maximum value of a signed
integer is
(A) 216 – 1
(B) 215 – 1
(C) 216 (D)
215
Ans: B
36. Which of the
following logic families is well suited for high-speed operations ?
(A) TTL (B)
ECL
(C) MOS (D)
CMOS
Ans: B
37. Interrupts
which are initiated by an instruction are
(A) Internal
(B) External
(C) Hardware
(D) Software
Ans: D
38. printf(“%c”,
100);
(A) prints 100
(B) prints ASCII
equivalent of 100
(C) prints garbage
(D) none of the
above
Ans: B
39. For the
transmission of the signal, Bluetooth wireless technology uses
(A) time division
multiplexing
(B) frequency
division multiplexing
(C) time division
duplex
(D) frequency
division duplex
Ans: C
40. Consider the
following statements :
I. Recursive
languages are closed under complementation.
II. Recursively
enumerable languages are closed under union.
III. Recursively
enumerable languages are closed under complementation.
Which of the above
statements are true ?
(A) I only
(B) I and II
(C) I and III
(D) II and III
Ans: B
41. What is the
routing algorithm used by RIP and IGRP ?
(A) OSPF (B)
Link-state
(C) Dynamic
(D) Dijkestra vector
Ans: D
42. Identify the
incorrect statement :
(A) The overall
strategy drives the E-Commerce data warehousing strategy.
(B) Data
warehousing in an E-Commerce environment should be done in a
classical manner.
(C) E-Commerce
opens up an entirely new world of web server.
(D) E-Commerce
security threats can be grouped into three major categories.
Ans: D
43. Reliability
of software is directly dependent on
(A) quality of the
design
(B) number of
errors present
(C) software
engineers experience
(D) user
requirement
Ans: B
44. ______ is not
an E-Commerce application.
(A) House banking
(B) Buying stocks
(C) Conducting an
auction
(D) Evaluating an
employee
Ans: D
45. ______ is a
satellite based tracking system that enables the determination of
person’s position.
(A) Bluetooth
(B) WAP
(C) Short
Message Service
(D) Global
Positioning System
Ans: D
46. A complete
microcomputer system consists of
(A) Microprocessor
(B) Memory
(C) Peripheral
equipment
(D) All of the
above
Ans: D
47. Where does a
computer add and compare data ?
(A) Hard disk
(B) Floppy disk
(C) CPU chip
(D) Memory chip
Ans: C
48. Pipelining
strategy is called implement
(A) instruction
execution
(B) instruction
prefetch
(C) instruction
decoding
(D) instruction
manipulation
Ans: B
49. Which of the
following data structure is linear type ?
(A) Strings
(B) Lists
(C) Queues
(D) All of the above
Ans: D
50. To represent
hierarchical relationship between elements, which data structure is
suitable ?
(A) Dequeue
(B) Priority
(C) Tree (D)
All of the above
Ans: C
0 comments:
Post a Comment