This is the Fully Solved Question paper of UGC NET examination on Computer Science and Applications Paper II, examination held on December 2010. We have a compilation of 10 years question paper of UGC NET Computer Science and Applications. You can browse through all solved UGC NET question papers visiting the links below.
1. The
number of integers between 1 and 250 that are divisible by 2, 5 and 7
is
(A) 2 (B) 3
(C) 5 (D) 8
Ans: B
2. An
undirected graph possesses an eulerian circuit if and only if it is
connected and its vertices are
(A) all of even
degree
(B) all of odd
degree
(C) of any degree
(D) even in number
Ans: A
3. A
partially ordered set is said to be a lattice if every two elements
in the set have
(A) a unique least
upper bound
(B) a unique
greatest lower bound
(C) both (A) and
(B)
(D) none of the
above
Ans: C
4. The
minimum number of edges in a connected graph with ‘n’ vertices is
equal to
(A)
n(n–1)
(B) n(n–1)/2
(C) n2
(D) n–1
Ans: D
5. Consider
the problem of connecting 19 lamps to a single electric outlet by
using extension cords each of which has four outlets. The number of
extension cords required is
(A) 4 (B) 5
(C) 6 (D) 7
Ans: C
6. The
decimal number equivalent of (4057.06)8 is
(A) 2095.75
(B) 2095.075
(C) 2095.937
(D) 2095.0937
Ans: D
7. AB+(A+B)’
is equivalent to
(A) AÅB
(B) AʘB
(C) (AÅB)ʘA
(D) (AʘB)ÅA
Ans: B
8. An
astable multivibrator has
(A) one stable
state
(B) two stable
states
(C) no stable
states
(D) none of these
Ans: C
9. 12-bit
2’s complement of –73.75 is
(A) 01001001.1100
(B) 11001001.1100
(C) 10110110.0100
(D) 10110110.1100
Ans: C
10. Encoding of
data bits 0011 into 7-bit even Parity Hamming Code is
(A) 0011110
(B) 0101110
(C) 0010110
(D) 0011100
Ans: A
11. How many of
the following declarations are correct ?
int z = 7.0;
double void =
0.000;
short array [2] =
{0, 1, 2};
char c = “\n”;
(A) None
(B) One is correct
(C) Two are
correct
(D) All four are
correct
Ans: C
12. The value of
the following expression (13/4*3)%5+1 is
(A) 5.75 (B)
2.95
(C) 1.4875
(D) 5
Ans: A
13. Which one of
the following will set the value of y to 5 if x has the value 3, but
not otherwise ?
(A) if (x = 3) y =
5
(B) if x = = 3 (y
= 5)
(C) if (x = = 3);
y = 5
(D) if (x = = 3) y
= 5
Ans: D
14. Which one of
the following sentences is true ?
(A) The body of a
while loop is executed at least once.
(B) The body of a
do … while loop is executed at least once.
(C) The body of a
do … while loop is executed zero or more
times.
(D) A for loop can
never be used in place of a while loop.
Ans: B
15. “Black”
refers in the “Black-box” testing means
(A) Characters of
the movie “Black”
(B) I – O is
hidden
(C) Design is
hidden
(D) Users are
hidden
Ans: C
16. In
generalisation, the differences between members of an entity is
(A) maximized
(B) minimized
(C) both (A) &
(B)
(D) None of these
Ans: A
17. The
dependency preservation decomposition is a property to decompose
database schema D, in which each functional dependency X®Y specified
in F,
(A) appeared
directly in one of the relation schemas Ri in the decomposed D.
(B) could be
inferred from dependencies that appear in some Ri.
(C) both (A) and
(B)
(D) None of these
Ans: C
18. Which of the
following is an optimistic concurrency control method ?
(A) Validation
based
(B) Time stamp
ordering
(C) Lock-based
(D) None of these
Ans: A
19. Optical
storage is a
(A) high-speed
direct access storage device.
(B) low-speed
direct access storage device.
(C) medium-speed
direct access storage device.
(D) high-speed
sequential access storage device.
Ans: C
20. Which of the
following is the process by which a user’s access to physical data
in the application is limited, based on his privileges ?
(A) Authorization
(B) Authentication
(C) Access Control
(D) All of these
Ans: C
21. What is the
maximum number of nodes in a B-tree of order 10
of depth 3
(root at depth 0) ?
(A) 111 (B) 999
(C) 9999 (D) None
of the above
Ans: D
22. A binary tree
with 27 nodes has _______ null branches.
(A) 54 (B) 27
(C) 26 (D)
None of the above
Ans: D
23. The time
complexity to build a heap of n elements is
(A) 0(1) (B)
0(lgn)
(C) 0(n) (D)
0(nlgn)
Ans: D
24. Linear
probing suffers from a problem known as
(A) Secondary
clustering
(B) Primary
clustering
(C) Both (A) and
(B)
(D) None of these
Ans: B
25. Which of the
following can be the sequence of nodes examined in binary search tree
while searching for key 88 ?
(A) 90, 40, 65,
50, 88
(B) 90, 110, 80,
85, 88
(C) 190, 60, 90,
85, 88
(D) 65, 140, 80,
70, 88
Ans: C
26. Frequency
shift keying is used mostly in
(A) Radio
transmission
(B) Telegraphy
(C) Telephone
(D) None of the
above
Ans: B
27. The baud rate
is
(A) always equal
to the bit transfer rate
(B) equal to twice
the bandwidth of an ideal channel
(C) not equal to
the signalling rate
(D) equal to half
of the bandwidth of an ideal channel
Ans: B
28. How much
bandwidth is there in 1 micron of spectrum at a wavelength of 1
micron ?
(A) 300 MHz
(B) 3 GHz
(C) 300 THz
(D) 30 KHz
Ans: C
29. Which of the
following file transfer protocols use TCP and establishes two virtual
circuits between the local and remote server ?
(A) FTP (B)
TFTP
(C) TELNET
(D) NFS
Ans: A
30. The threshold
effect in demodulator is
(A) exhibited by
all demodulator, when the input signal to noise ratio is low.
(B) the rapid fall
on output signal to noise ratio when the input signal to noise ratio
fall below a particular value.
(C) the property
exhibited by all A.M. suppressed carrier coherent demodulator.
(D) the property
exhibited by correlation receiver.
Ans: B
31. Object code
is the output of ______.
(A) Operating
System
(B) Compiler or
Assembler
(C) only Assembler
(D) only Compiler
Ans: B
32. ‘Macro’
in an assembly level program is _______.
(A) sub program
(B) a complete
program
(C) a hardware
portion
(D) relative
coding
Ans: A
33. Grammar of
the programming is checked at ________ phase of compiler.
(A) semantic
analysis
(B) code
generation
(C) syntax
analysis
(D) code
optimization
Ans: C
34. The register
or main memory location which contains the effective address of the
operand is known as
(A) pointer
(B) special
location
(C) indexed
register
(D) None of the
above
Ans: A
35.
Macro-processors are ______.
(A) Hardware
(B) Compiler
(C) Registers
(D) None of the above
Ans: B
36. The dynamic
allocation of storage areas with VSAM files is accomplished by
(A) Hashing
(B) Control splits
(C) Overflow areas
(D) Relative
recoding
Ans: B
37. Which of the
following command the file names in multiple columns?
(A) IS–X
(B) IS
(C) IS–1
(D) IS–f–X
Ans: B
38. WINDOWS is a
_________ operating.
(A) Real time
(B) Multi-user
(C) Preemptive
(D) Non-preemptive
Ans: C
39. Page making
process from main memory to disk is called
(A) Interruption
(B) Termination
(C) Swapping
(D) None of the above
Ans: C
40. A Dead-lock
in an Operating System is
(A) Desirable
process
(B) Undesirable
process
(C) Definite
waiting process
(D) All of the
above
Ans: C
41. Prototyping
is used to
(A) test the
software as an end product
(B) expand design
details
(C) refine and
establish requirements gathering
(D) None of the
above
Ans: C
42. Which one of
these are not software maintenance activity ?
(A) Error
correction
(B) Adaptation
(C) Implementation
of Enhancement
(D) Establishing
scope
Ans: D
43. The system
specification is the first deliverable in the computer system
engineering process which does not include
(A) Functional
Description
(B) Cost
(C) Schedule
(D) Technical
Analysis
Ans: A
44. The COCOMO
model was introduced in the book title “Software Engineering
Economics” authored by
(A) Abraham
Silberschatz
(B) Barry Boehm
(C) C.J. Date
(D) D.E. Knuth
Ans: B
45. The Warnier
diagram enables analyst
(A) to represent
information hierarchy in a compact manner
(B) to further
identify requirement
(C) to estimate
the total cost involved
(D) None of the
above
Ans: A
46. A data mart
may contain
(A) summarised
data
(B) de-normalized
data
(C) aggregate
departmental data
(D) All of the
above
Ans: D
47. Data mining
is
(A) the process of
extracting valid, previously unknown, comprehensible and actionable
information from large databases and using it to make crucial
business decisions.
(B) a tool that
allows end users direct access and manipulation of data from within
datawarehousing environment without the intervention of customised
programming activity.
(C) a tool that
helps end users extract useful business information from large
database.
(D) All of the
above
Ans: A
48. E-Choupal
refers to
(A) calling
meeting of Surpanches electronically.
(B) conducting
Panchayat meeting using latest electronic gadgets.
(C) providing
window of information to villagers and farmers in NIC network.
(D) None of the
above
Ans: C
49. The basic
concepts of ethics in information society is/are
(A) Responsibility
(B) Accountability
(C) Liability
(D) All of the
above
Ans: D
50. One of the
distinguished features of super-computer over other category of
computer is
(A) parallel
processing
(B) highest
accuracy level
(C) more speed
(D) more capacity
Ans: C
0 comments:
Post a Comment