IMPORTANT SOLVED QUESTION AND ANSWERS FOR UGC NET COMPUTER SCIENCE
1. A file is downloaded in a home computer using a 56 kbps MODEM connected to an Internet Service Provider. If the download of file completes in 2 minutes, what is the maximum size of data downloaded ?
(A) 112 Mbits (B) 6.72 Mbits
(C) 67.20 Mbits (D) 672 Mbits
Ans.: (B) 6.72 Mbits.
very simple though logical.
Explanation: 56kbps means 56kb of data is downloaded per second.
So in 2 minutes (i.e., 120 seconds) the size of data downloaded will be 56*120=6720kb
Now we have to convert kb to mb. To do it, divide by 1000.
6720kb=6720/1000=6.72Mb.
2. Which of the following substitution technique have the relationship between a character in the plaintext
and a character in the ciphertext as one-to-many ?
(A) Monoalphabetic
(B) Polyalphabetic
(C) Transpositional
(D) None of the above
Ans.: (B) Polyalphabetic
3. What is the maximum length of CAT-5 UTP cable in Fast Ethernet network ?
(A) 100 meters (B) 200 meters
(C) 1000 meters (D) 2000 meters
Ans.: (A) 100 meters
4. In ______ CSMA protocol, after the station finds the line idle, it sends or refrains from sending based on the outcome of a random number generator.
(A) Non-persistent
(B) 0-persistent
(C) 1-persistent
(D) p-persistent
Ans.: (D) p-persistent
5. The ______ is a set of standards that defines how a dynamic web document should be written, how input data should be supplied to the program, and how the output result should be used.
(A) Hyper Text Markup Language
(B) File Transfer Protocol
(C) Hyper Text Transfer Protocol
(D) Common Gateway Interface
Ans.: Common Gateway Interface(CGI)
6. The count-to-infinity problem is associated with
(A) Flooding algorithm
(B) Hierarchical routing algorithm
(C) Distance vector routing\ algorithm
(D) Link state routing algorithm
Ans.: (C) Distance vector routing algorithm
7. The IEEE single-precision and double-precision format to represent floating-point numbers, has a length
of ______ and ______ respectively.
(A) 8 bits and 16 bits
(B) 16 bits and 32 bits
(C) 32 bits and 64 bits
(D) 64 bits and 128 bits
Ans.: (C) 32 bits and 64 bits
8. The minimum number of nodes in a
binary tree of depth d (root is at level 0)
is
(A) 2d – 1
(B) 2d + 1 – 1
(C) d + 1
(D) d
Ans.: (C) d + 1
9. The efficient data structure to
insert/delete a number in a stored set
of numbers is
(A) Queue
(B) Linked list
(C) Doubly linked list
(D) Binary tree
Ans.: (C) Doubly linked list
10. A simple graph G with n-vertices is connected if the graph has
(A) (n – 1) (n – 2)/2 edges
(B) more than (n – 1) (n – 2)/2 edges
(C) less than (n – 1) (n – 2)/2 edges
(D) Σk i=1 C(ni, 2) edges
Ans.: (B) more than (n – 1) (n – 2)/2 edges
1. A file is downloaded in a home computer using a 56 kbps MODEM connected to an Internet Service Provider. If the download of file completes in 2 minutes, what is the maximum size of data downloaded ?
(A) 112 Mbits (B) 6.72 Mbits
(C) 67.20 Mbits (D) 672 Mbits
Ans.: (B) 6.72 Mbits.
very simple though logical.
Explanation: 56kbps means 56kb of data is downloaded per second.
So in 2 minutes (i.e., 120 seconds) the size of data downloaded will be 56*120=6720kb
Now we have to convert kb to mb. To do it, divide by 1000.
6720kb=6720/1000=6.72Mb.
2. Which of the following substitution technique have the relationship between a character in the plaintext
and a character in the ciphertext as one-to-many ?
(A) Monoalphabetic
(B) Polyalphabetic
(C) Transpositional
(D) None of the above
Ans.: (B) Polyalphabetic
3. What is the maximum length of CAT-5 UTP cable in Fast Ethernet network ?
(A) 100 meters (B) 200 meters
(C) 1000 meters (D) 2000 meters
Ans.: (A) 100 meters
4. In ______ CSMA protocol, after the station finds the line idle, it sends or refrains from sending based on the outcome of a random number generator.
(A) Non-persistent
(B) 0-persistent
(C) 1-persistent
(D) p-persistent
Ans.: (D) p-persistent
5. The ______ is a set of standards that defines how a dynamic web document should be written, how input data should be supplied to the program, and how the output result should be used.
(A) Hyper Text Markup Language
(B) File Transfer Protocol
(C) Hyper Text Transfer Protocol
(D) Common Gateway Interface
Ans.: Common Gateway Interface(CGI)
6. The count-to-infinity problem is associated with
(A) Flooding algorithm
(B) Hierarchical routing algorithm
(C) Distance vector routing\ algorithm
(D) Link state routing algorithm
Ans.: (C) Distance vector routing algorithm
7. The IEEE single-precision and double-precision format to represent floating-point numbers, has a length
of ______ and ______ respectively.
(A) 8 bits and 16 bits
(B) 16 bits and 32 bits
(C) 32 bits and 64 bits
(D) 64 bits and 128 bits
Ans.: (C) 32 bits and 64 bits
8. The minimum number of nodes in a
binary tree of depth d (root is at level 0)
is
(A) 2d – 1
(B) 2d + 1 – 1
(C) d + 1
(D) d
Ans.: (C) d + 1
9. The efficient data structure to
insert/delete a number in a stored set
of numbers is
(A) Queue
(B) Linked list
(C) Doubly linked list
(D) Binary tree
Ans.: (C) Doubly linked list
10. A simple graph G with n-vertices is connected if the graph has
(A) (n – 1) (n – 2)/2 edges
(B) more than (n – 1) (n – 2)/2 edges
(C) less than (n – 1) (n – 2)/2 edges
(D) Σk i=1 C(ni, 2) edges
Ans.: (B) more than (n – 1) (n – 2)/2 edges
11. Which one of the following set of gates is best suited for ‘parity’ checking and ‘parity’ generation ?
(A) AND, OR, NOT
(B) NAND, NOR
(C) EX-OR, EX-NOR
(D) None of the above
Ans.: (C) EX-OR, EX-NOR
12. In which one of the following,
continuous process improvement is
done ?
(A) ISO9001
(B) RMMM
(C) CMM
(D) None of the above
Ans.: (C) CMM (Capability Maturity Model)
13. The ______ of a program or computing system is the structure or structures of the system, which comprise software components, the externally visible properties of these components, and the relationship
among them.
(A) E-R diagram
(B) Data flow diagram
(C) Software architecture
(D) Software design
Ans.: (C) Software architecture
14. Working software is not available until late in the process in
(A) Waterfall model
(B) Prototyping model
(C) Incremental model
(D) Evolutionary Development model
Ans.: (A) Waterfall model
15. Equivalence partitioning is a ______ testing method that divides the input domain of a program into classes of data from which test cases can be derived.
(A) White box
(B) Black box
(C) Regression
(D) Smoke
Ans.: (B) Black box
very often asked question
16. Views are useful for _____ unwanted
information, and for collecting
together information from more than
one relation into a single view.
(A) Hiding
(B) Deleting
(C) Highlighting
(D) All of the above
Ans.: (A) Hiding
17. The decision tree classifier is a widely used technique for ______.
(A) Classification
(B) Association
(C) Partition
(D) Clustering
Ans.: (A) Classification
18. Cross_tab displays permit users to view ______ of multidimensional data at a time.
(A) One dimension
(B) Two dimensions
(C) Three dimensions
(D) Multidimensions
Ans.: (B) Two dimensions
19. A method to provide secure transmission of email is called ____.
(A) TLS
(B) SA
(C) IPSec
(D) PGP
Ans.: (D) PGP (Pretty Good Privacy)
20. Thoma’s-write rule is ______.
(A) Two phase locking protocol
(B) Timestamp ordering protocol
(C) One phase locking protocol
(D) Sliding window protocol
Ans.: (B) Timestamp ordering protocol
ALL THE BEST FOR UGC NET DEC 2013 EXAM.
thank u sir
ReplyDelete:)
Good to see this. Helps for the next appearing people.
ReplyDeleteAny other smart ideas are welcomed.
Thanks.