Saturday 3 August 2013

UGC NET COMPUTER SCIENCE: JUNE 2013 PAPER 3 SOLVED MCQS

1. Match the following:
a. Watson- Felix model intensity                        i. Failure
b. Quick-Fix model                                          ii. Cost estimation
c. Putnam  resource allocation model                iii. Project planning
d. Logarithmetic- Poisson Model                     iv. Maintenance
Codes:
       a b c d
(A) ii i iv iii
(B) i ii iv iii
(C) ii i iii iv
(D) ii iv iii i

Ans. D.)

Frequently aked software engineering question.

2. Equivalence partitioning is a ______ method that divides the input domain of a program into classes of data from which test cases can be derived.
(A) White-box testing (B) Black-box testing
(C) Orthogonal amIy testing
(D) Stress testing

Ans.: B.)

Very simple question from software testing.


3. ________is a process model that removes defects before they can precipitate serious hazards.
(A) Incremental model
(B) Spiral model
(C) Clean room software engineering
(D) Agile model

Ans.:C)

4. Software safety is a __________ activity that focuses on the identification and assessment of potential hazards that may affect software negatively and cause an entire system to fail.
(A) Risk mitigation, monitoring and management
(B) Software quality assurance
(C) Software cost estimation
(D) Defect removal efficiency

Ans.: A.)

5. The baud rate of a signal is 600 baud/second. If each signal unit carries 6 bits, then the bit rate of a signal is __________
(A) 3600
(B) 100
(C) 6/600
(D) None of the above


Ans.: A.)

Tip: baudrate * bit =bit rate 

Explanation:
Bit rate=600*6=3600

6. Match the following:
a. Data link layer                              i. Flow  control
b. Network layer                             ii. Node to node delivery
c. Transport layer                            iii. Mail services
d. Application layer                         iv  Routing
Codes:
       a b c d
(A) ii i iv iii
(B) ii iv i iii
(C) ii i iii iv
 
(D) ii iv iii i

Ans.: B.)

7. 
The ______ measures the relative strengths of two signals or a signal at two different points.
(A) frequency
(B) attenuation
(C) throughput
(D) decibel


Ans.: D.)

8. . An actor in an animation is a small  program invoked _______ per frame to detennine the characteristics of some object in the animation.
(A) once    
(B) twice     
 (C) 30 times       
(D) 60 times

Ans.: A.)

9. . The statements s1 and s2 are given as :
s1 : Context sensitive languages are closed under intersection. concatenation, substitution and inverse homomorphism.
s2 Context free languages are closed under complementation. substitution and homomorphism.
Which of the following is correct statement?
(A) Both s1 and s2 are correct.
(B) s1 is correct and s2 is not correct.
(C) s1 is not correct and s2 is correct.
(D) Both s1 and s2 are not correct.

Ans.: D.)

10. Which one of the following is not an addressing mode?
(A) Register indirect
(B) Autoincrement
(C) Relative indexed
(D) Immediate operand
Ans.: D.)


11. Which is not a typical program control instruction?
(A) BR   
(B) JMP    
(C) SHL     
 (D) TST

Ans.: C.)

Tip: SHL means Shift Left which is a logical instruction.

12. Match the following:
a. Foreign keys                                  i. Domain constraint
b. Private key                                    ii. Referential integrity
c. Event control action model             iii. Encryption
 
d. Data security                                 iv. Trigger
codes:
        a   b    c   d
(A)   iii   ii    i    iv
(B)   ii    i    iv   iii
(C)   iii  iv    i    ii
(D)   i   ii    iii    iv

Ans.: B.)

13. Match the following:
a. calloc()                      i. Frees previously allocated space
b. free()                        ii. Modifies previously allocated space
c. malloc()                   iii. Allocates space for array
d. realloc()                   iv. Allocates requested size of space
codes:
        a   b    c   d
(A)   iii   i    iv    ii
(B)   iii    ii    i    iv
(C)   iii  iv    i    ii
(D)   iv   ii    iii    i
Ans.: A.)

14. Interrupt which arises from illegal or erroneous use of an instruction or data is
(A) Software interrupt
(B) Internal interrupt
(C) External interrupt
(D) All ofthe above


Ans.: B.)

15. Hom clauses are special kinds of propositions which can be described as
(A) Single atomic proposition on left side.
(B) Single or multiple atomic proposition on left side.
(C) A single atomic proposition on left side and a single atomic proposition on right side.
(D) A single atomic proposition on left side or an empty left side.


Ans.: D.)

16. The following three golden rules
(i) Place the user in control
(ii) Reduce the user's memory load
(iii) Make the interface consistent are for
(A) User satisfaction
(B) Good interface design
(C) Saving system's resources
(D) None of these


Ans.: B.)

17. Working set model is used in memory management to implement the concept of
(A) Swapping
(B) Principal of Locality
(C) Segmentation
(D) Thrashing

Ans.: B.)

18. Which of the following is a knowledge representation technique used to represent knowledge about stereotype situation?
(A) Semantic network
(B) Frames
(C) Scripts
(D) Conceptual Dependency



Ans.: D.)

Recommend your friends to visit this blog.



2 comments:

  1. Hello Tanvir Khan
    Can you tell the material for preparation of UGC NET COMPUTER SCIENCE

    ReplyDelete