Monday 25 November 2013

TIPS ON HOW TO CLEAR PAPER 2 AND PAPER 3 OF UGC NET COMPUTER SCIENCE

               HOW TO PASS PAPER 2 AND PAPER 3 OF UGC NET COMPUTER SCIENCE


Welcome back friends.
Today I desire to unlock some tips and tricks on how to pass paper 2 and paper 3 of UGC NET COMPUTER SCIENCE.

Tip No. 1: 
From June 2012, UGC has shifted to objective mode, which was a good news for many but the problem is that the candidate has to get the minimum cut off marks in each paper and also get the minimum cumulative score when the total of all three papers is added together to get qualified in the exam.



Monday 18 November 2013

DATABASE MANAGEMENT SYSTEM: IMPORTANT SOLVED QUESTION AND ANSWERS FOR UGC NET COMPUTER SCIENCE

DATABASE MANAGEMENT SYSTEM:SOLVED MODEL TEST PAPER FOR UGC NET COMPUTER SCIENCE DECEMBER 2013

1. What is meant by functional dependency.
Functional dependency is the relationship between attributes such that the value of an attribute is determined by value of another attribute.
Example: Regno->Name (Functional Dependency)
That is, 'Name' is dependent on the attribute 'Regno'.
In this case, Regno is a primary key.

2. What is meant by transitive dependency.
Transitive dependency occurs when a non key attribute value is functionally dependent on another non key attribute.
Example: Empid->Jobtype
               Jobtype->Hourpay
In this case, Jobtype is dependent on Empid.
In the second case, Hourpay is dependent on Jobtype, which is a non key attribute.
Therefore, when a non key attribute is dependent on another non key attribute, it is called as transitive dependency.

Note: In Database Management System, dependencies are not required. So we go for NORMALIZATION    
to reduce dependencies.

Friday 15 November 2013

UGC NET COMPUTER SCIENCE:NETWORK SECURITY AND CRYPTOGRAPHY SOLVED MCQ TEST

 NETWORK SECURITY AND CRYPTOGRAPHY BASICS SOLVED QUESTION AND ANSWERS

1. What is meant by network security.
Network security is the mechanism of protecting data flowing on a network from unauthorized access.
Some of the network security measures involves Data Encryption techniques and use of Passwords.

2. What is the difference between share level security and user level security.
Share level security: In share level security, access to a particular resource is based on password.
User level security: In user level security, access to a particular resource is based on username.

The security level of share level security is less than that of user level security because user level security is dependent on username.
                                          Share level security<User level security

Thursday 7 November 2013

UGC NET GENERAL PAPER 1 MODEL SOLVED MCQS FOR DECEMBER 2013

              UGC NET FIRST PAPER SOLVED MODEL PAPER FOR DECEMBER 2013

1. Telephone is an example of
(A) linear communication
(B) non-linear communication
(C) circular
(D) mechanised

Ans.: (A) linear communication

2. Means of grapevine communication are
(A) formal
(B) informal
(C) critical
(D) corporate

Ans.: (B) informal

3. Classroom communication is normally considered as
(A) effective 
(B) affective
(C) cognitive 
(D) non-selective

Ans.: (C) cognitive 


Sunday 3 November 2013

UGC NET COMPUTER SCIENCE DECEMBER 2013 EXPECTED SOLVED PAPER

IMPORTANT SOLVED QUESTION AND ANSWERS FOR UGC NET COMPUTER SCIENCE


1. A file is downloaded in a home computer using a 56 kbps MODEM connected to an Internet Service Provider. If the download of file completes in 2 minutes, what is the maximum size of data downloaded ?

(A) 112 Mbits (B) 6.72 Mbits
(C) 67.20 Mbits (D) 672 Mbits

Ans.: (B) 6.72 Mbits.
very simple though logical.

Explanation: 56kbps means 56kb of data is downloaded per second.
So in 2 minutes (i.e., 120 seconds) the size of data downloaded will be 56*120=6720kb
Now we have to convert kb to mb. To do it, divide by 1000.
6720kb=6720/1000=6.72Mb.

2. Which of the following substitution technique have the relationship between a character in the plaintext
and a character in the ciphertext as one-to-many ?
(A) Monoalphabetic
(B) Polyalphabetic
(C) Transpositional
(D) None of the above

Ans.: (B) Polyalphabetic

3. What is the maximum length of CAT-5 UTP cable in Fast Ethernet network ?
(A) 100 meters (B) 200 meters
(C) 1000 meters (D) 2000 meters

Ans.: (A) 100 meters