Sunday 3 November 2013

UGC NET COMPUTER SCIENCE DECEMBER 2013 EXPECTED SOLVED PAPER

IMPORTANT SOLVED QUESTION AND ANSWERS FOR UGC NET COMPUTER SCIENCE


1. A file is downloaded in a home computer using a 56 kbps MODEM connected to an Internet Service Provider. If the download of file completes in 2 minutes, what is the maximum size of data downloaded ?

(A) 112 Mbits (B) 6.72 Mbits
(C) 67.20 Mbits (D) 672 Mbits

Ans.: (B) 6.72 Mbits.
very simple though logical.

Explanation: 56kbps means 56kb of data is downloaded per second.
So in 2 minutes (i.e., 120 seconds) the size of data downloaded will be 56*120=6720kb
Now we have to convert kb to mb. To do it, divide by 1000.
6720kb=6720/1000=6.72Mb.

2. Which of the following substitution technique have the relationship between a character in the plaintext
and a character in the ciphertext as one-to-many ?
(A) Monoalphabetic
(B) Polyalphabetic
(C) Transpositional
(D) None of the above

Ans.: (B) Polyalphabetic

3. What is the maximum length of CAT-5 UTP cable in Fast Ethernet network ?
(A) 100 meters (B) 200 meters
(C) 1000 meters (D) 2000 meters

Ans.: (A) 100 meters


4. In ______ CSMA protocol, after the station finds the line idle, it sends or refrains from sending based on the outcome of a random number generator.
(A) Non-persistent
(B) 0-persistent
(C) 1-persistent
(D) p-persistent

Ans.: (D) p-persistent

5. The ______ is a set of standards that defines how a dynamic web document should be written, how input data should be supplied to the program, and how the output result should be used.
(A) Hyper Text Markup Language
(B) File Transfer Protocol
(C) Hyper Text Transfer Protocol
(D) Common Gateway Interface

Ans.: Common Gateway Interface(CGI)

6. The count-to-infinity problem is associated with
(A) Flooding algorithm
(B) Hierarchical routing algorithm
(C) Distance vector routing\ algorithm
(D) Link state routing algorithm

Ans.: (C) Distance vector routing  algorithm

7. The IEEE single-precision and double-precision format to represent floating-point numbers, has a length
of ______ and ______ respectively.
(A) 8 bits and 16 bits
(B) 16 bits and 32 bits
(C) 32 bits and 64 bits
(D) 64 bits and 128 bits

Ans.: (C) 32 bits and 64 bits

8. The minimum number of nodes in a
binary tree of depth d (root is at level 0)
is
(A) 2d – 1
(B) 2d + 1 – 1
(C) d + 1
(D) d

Ans.: (C) d + 1

9. The efficient data structure to
insert/delete a number in a stored set
of numbers is
(A) Queue
(B) Linked list
(C) Doubly linked list
(D) Binary tree

Ans.: (C) Doubly linked list

10. A simple graph G with n-vertices is connected if the graph has
(A) (n – 1) (n – 2)/2 edges
(B) more than (n – 1) (n – 2)/2 edges
(C) less than (n – 1) (n – 2)/2 edges
(D) Σk i=1 C(ni, 2) edges

Ans.: (B) more than (n – 1) (n – 2)/2 edges

11. Which one of the following set of gates is best suited for ‘parity’ checking and ‘parity’ generation ?
(A) AND, OR, NOT
(B) NAND, NOR
(C) EX-OR, EX-NOR
(D) None of the above

Ans.: (C) EX-OR, EX-NOR

12. In which one of the following,
continuous process improvement is
done ?
(A) ISO9001
(B) RMMM
(C) CMM
(D) None of the above

Ans.: (C) CMM (Capability Maturity Model)


13. The ______ of a program or computing system is the structure or structures of the system, which comprise software components, the externally visible properties of these components, and the relationship
among them.
(A) E-R diagram
(B) Data flow diagram
(C) Software architecture
(D) Software design

Ans.: (C) Software architecture

14. Working software is not available until late in the process in
(A) Waterfall model
(B) Prototyping model
(C) Incremental model
(D) Evolutionary Development model

Ans.: (A) Waterfall model

15. Equivalence partitioning is a ______ testing method that divides the input domain of a program into classes of data from which test cases can be derived.
(A) White box 
(B) Black box
(C) Regression 
(D) Smoke

Ans.: (B) Black box
very often asked question 

16. Views are useful for _____ unwanted
information, and for collecting
together information from more than
one relation into a single view.
(A) Hiding
(B) Deleting
(C) Highlighting
(D) All of the above

Ans.: (A) Hiding

17. The decision tree classifier is a widely used technique for ______.
(A) Classification 
(B) Association
(C) Partition 
(D) Clustering

Ans.: (A) Classification 

18. Cross_tab displays permit users to view ______ of multidimensional data at a time.
(A) One dimension
(B) Two dimensions
(C) Three dimensions
(D) Multidimensions

Ans.: (B) Two dimensions


19. A method to provide secure transmission of email is called ____.
(A) TLS 
(B) SA
(C) IPSec
 (D) PGP

Ans.: (D) PGP (Pretty Good Privacy)

20. Thoma’s-write rule is ______.
(A) Two phase locking protocol
(B) Timestamp ordering protocol
(C) One phase locking protocol
(D) Sliding window protocol

Ans.: (B) Timestamp ordering protocol

ALL THE BEST FOR UGC NET DEC 2013 EXAM.

2 comments:

  1. Good to see this. Helps for the next appearing people.
    Any other smart ideas are welcomed.
    Thanks.

    ReplyDelete