UGC NET COMPUTER SCIENCE DECEMBER 2013 SOLVED
PAPER 2 WITH EXPLANATION
1. When data and acknowledgement are sent in the
same frame, this is called as
(A) Piggy packing
(B) Piggy backing
(C) Back packing
(D) Good packing
(A) Piggy packing
(B) Piggy backing
(C) Back packing
(D) Good packing
Ans.: b.)
Piggybacking is a
bi-directional data
transmission technique
in the network layer (OSI
model).
Network question.
2. Encryption and Decryption is the
responsibility of Layer.
(A) Physical
(B) Network
(C) Application
(D) Datalink
(A) Physical
(B) Network
(C) Application
(D) Datalink
Ans.: c.)
Networking related.
Encryption is
typically done at this level too, although it can be done on the application, session, transport,
or network layers.
3. Using the RSA public key crypto system, if
p = 13, q = 31 and d = 7, then the value of e is
(A) 101 (C) 105
(B) 103 (D) 107
(A) 101 (C) 105
(B) 103 (D) 107
Ans.: b.)
Network security and cryptography
4. FAN IN of a component A is defined as
(A) Number of components that can call or pass control to component A.
(B) Number of components that are called by component A.
(C) Number of components related to component A.
(D) Number of components dependent on component A.
(A) Number of components that can call or pass control to component A.
(B) Number of components that are called by component A.
(C) Number of components related to component A.
(D) Number of components dependent on component A.
Ans.: a.)
Fan-in is the number of inputs a gate can handle
Fan out is the number of gate inputs you can connect to a
gate output
5. The relationship of data elements in a module is called
(A) Coupling
(B) Modularity
(C) Cohesion
(D) Granularity
Ans.: c.)
Software engineering
cohesion refers
to the degree to which the elements of a module belong together.
the tendency to stick together
6. Testing of software with actual data and
in actual environment is called
(A) Alpha testing
(B) Beta testing
(C) Regression testing
(D) None of the above
(A) Alpha testing
(B) Beta testing
(C) Regression testing
(D) None of the above
Ans.: b.)
Software testing concept.
Beta testing is a part of acceptance test.
7. Software Configuration Management is the
discipline for systematically controlling
(A) the changes due to the evolution of work products as the project proceeds.
(B) the changes due to defects (bugs) being found and then fixed.
(C) the changes due to requirement changes
(D) all of the above
(A) the changes due to the evolution of work products as the project proceeds.
(B) the changes due to defects (bugs) being found and then fixed.
(C) the changes due to requirement changes
(D) all of the above
Ans.: d.)
Software engineering concept.
8. Which one of the following is not a step of
requirement engineering ?
(A) Requirement elicitation
(B) Requirement analysts
(C) Requirement design
(D) Requirement documentation
(A) Requirement elicitation
(B) Requirement analysts
(C) Requirement design
(D) Requirement documentation
Ans.: c.)
STEPS IN REQUIREMENT ENGINEERING:
Requirements inception
Requirements identification
Requirements
analysis and negotiation
Requirements
specification
(Software Requirements Specification)
(Software Requirements Specification)
System
modeling
Requirements
validation
Requirements
management
9. The student marks should not be greater
than 100. This is
(A) Integrity constraint
(B) Referential constraint
(C) Over-defined constraint
(D) Feasible constraint
(A) Integrity constraint
(B) Referential constraint
(C) Over-defined constraint
(D) Feasible constraint
Ans.: a.)
Rdbms concept
Easy question.
Note: Integrity means to ensure
accuracy and consistency of data
10. GO BOTTOM and SKIP-3
commands are given one after another in a database file of 30 records. It
shifts the control to
(A) 28th record (B) 27th record
(C) 3rd record (D) 4th record
(A) 28th record (B) 27th record
(C) 3rd record (D) 4th record
Ans.: b.)
Simple logical question.
Go to the last record and leave the last 3
recrods, therefore, the control will be shifted to 27th record.
11. An ER Model includes
I. An ER diagram portraying entity types.
II. Attributes for each entity type
III. Relationships among entity types.
IV. Semantic integrity constraints that reflects the business rules about data not captured in the ER diagram.
I. An ER diagram portraying entity types.
II. Attributes for each entity type
III. Relationships among entity types.
IV. Semantic integrity constraints that reflects the business rules about data not captured in the ER diagram.
(A) I, II, III & IV (B) I&IV
(C) I, II & IV (D) I & III
(C) I, II & IV (D) I & III
Ans.: a.)
Rdbms concept
12. What does the following declaration mean
?
int (*ptr) [10];
(A) ptr is an array of pointers of 10 integers.
(B) ptr is a pointer to an array of 10 integers.
(C) ptr is an array of 10 integers.
(D) none of the above.
int (*ptr) [10];
(A) ptr is an array of pointers of 10 integers.
(B) ptr is a pointer to an array of 10 integers.
(C) ptr is an array of 10 integers.
(D) none of the above.
Ans.: b.)
Simple question.
Related to c language.
13. Which of the following operators can not
be overloaded in C+ + ?
(A) * (B) + =
(C) = = (D) ::
(A) * (B) + =
(C) = = (D) ::
Ans.: d.)
Very simple.
14. allows to create classes which are
derived from other classes, so that they automatically include some of its
"parent's" members, plus its own members.
(A) Overloading
(B) Inheritance
(C) Polymorphism
(D) Encapsulation
(A) Overloading
(B) Inheritance
(C) Polymorphism
(D) Encapsulation
Ans.: b.)
OOPS concept.
15. _________ is often used to prove the
correctness of a recursive function.
(A) Diagonaliization
(B) Communitivity
(C) Mathematical Induction
(D) Matrix Multiplication
(A) Diagonaliization
(B) Communitivity
(C) Mathematical Induction
(D) Matrix Multiplication
Ans.: c.)
16. Which of the following derivations does a
top-down parser use while parsing an input string ? The input is scanned from
left to right.
(A) Leftmost derivation
(B) Leftmost derivation traced out in reverse
(C) Rightmost derivation traced out in reverse
(D) Rightmost derivation
(A) Leftmost derivation
(B) Leftmost derivation traced out in reverse
(C) Rightmost derivation traced out in reverse
(D) Rightmost derivation
Ans.: a.)
Compiler design.
17. The process of assigning load addresses
to the various parts of the program and adjusting the code and data in the
program to reflect the assigned addresses is called
____________
(A) Symbol resolution
(B) Parsing
(C) Assembly
(D) Relocation
(A) Symbol resolution
(B) Parsing
(C) Assembly
(D) Relocation
Ans.: d.)
Operating systems
program
relocatability refer to the ability to load and execute a program into an
arbitrary place in memory
18. Active X controls are Pentium binary
programs that can be embedded in ____________
(A) Word pages
(B) URL pages
(C) Script pages
(D) Web pages
(A) Word pages
(B) URL pages
(C) Script pages
(D) Web pages
Ans.: d.)
Windows programming
ActiveX is a
loosely defined set of technologies developed by Microsoft in 1996 for sharing
information among different applications
Example: Internet Explorer's
Flash player is an ActiveX control.
19. Match the following :
List-I List - II
a. Wireless Application Environment i. HTTP
b. Wireless Transaction Protocol ii. IP
c. Wireless Datagram Protocol iii Scripts
d. Wireless iv. UDP
Codes :
a b c d
(A) ii iv i iii
(B) iv iii ii i
(C) iv iii i ii
(D) iii i iv ii
List-I List - II
a. Wireless Application Environment i. HTTP
b. Wireless Transaction Protocol ii. IP
c. Wireless Datagram Protocol iii Scripts
d. Wireless iv. UDP
Codes :
a b c d
(A) ii iv i iii
(B) iv iii ii i
(C) iv iii i ii
(D) iii i iv ii
Ans.: d.)
Mobile computing
20. Which of the following is widely used
inside the telephone system for long-haul data traffic ?
(A) ISDN
(B) ATM
(C) Frame Relay
(D) ISTN
(A) ISDN
(B) ATM
(C) Frame Relay
(D) ISTN
Ans.: b.)
Networks
21. The document standards for EDI were first
developed by large business house during the 1970s and are now under the
control of the following standard organisation :
(A) ISO
(B) ANSI
(C) ITU-T
(D) IEEE
(A) ISO
(B) ANSI
(C) ITU-T
(D) IEEE
Ans.: b.)
ANSI (American
National Standards Institute)
Current trends and technologies
22. Electronic Data Interchange Software
consists of the following four layers :
(A) Business application, Internal format conversion, Network translator, EDI envelope
(B) Business application, Internal format conversion, EDI translator, EDI envelope
(C) Application layer, Transport layer, EDI translator, EDI envelope
(D) Application layer, Transport layer, IP layer, EDI envelope
(A) Business application, Internal format conversion, Network translator, EDI envelope
(B) Business application, Internal format conversion, EDI translator, EDI envelope
(C) Application layer, Transport layer, EDI translator, EDI envelope
(D) Application layer, Transport layer, IP layer, EDI envelope
Ans.: d.)
Current trends and technologies
23. Linux operating system uses
(A) Affinity Scheduling
(B) Fair Preemptive Scheduling
(C) Hand Shaking
(D) Highest Penalty Ratio Next
(A) Affinity Scheduling
(B) Fair Preemptive Scheduling
(C) Hand Shaking
(D) Highest Penalty Ratio Next
Ans.: b.)
OS
24. The VLF and LF bauds use propagation for
communication.
(A) Ground (B) Sky
(C) Line of sight (D) Space
(A) Ground (B) Sky
(C) Line of sight (D) Space
Ans.: a.)
Mobile computing
25. Data Integrity control uses
(A) Upper and lower limits on numeric data.
(B) Passwords to prohibit unauthorised access to files.
(C) Data dictionary to keep the data
(D) Data dictionary to find last access of data
(A) Upper and lower limits on numeric data.
(B) Passwords to prohibit unauthorised access to files.
(C) Data dictionary to keep the data
(D) Data dictionary to find last access of data
Ans.: d.)
RDBMS concept
RDBMS concept
No comments:
Post a Comment