Sunday 16 February 2014

UGC NET COMPUTER SCIENCE DECEMBER 2013 SOLVED PAPER 2 WITH EXPLANATION


UGC NET COMPUTER SCIENCE DECEMBER 2013 SOLVED PAPER 2 WITH EXPLANATION

1.  When data and acknowledgement are sent in the same frame, this is called as
(A) Piggy packing
(B) Piggy backing
(C) Back packing
(D) Good packing

Ans.: b.)
Piggybacking is a bi-directional data transmission technique in the network layer (OSI model).
Network question.

2. Encryption and Decryption is the responsibility of Layer.
(A) Physical
(B) Network
(C) Application
(D) Datalink

Ans.: c.)
Networking related.
Encryption is typically done at this level too, although it can be done on the application, session, transport, or network layers.

3. Using the RSA public key crypto system, if p = 13, q = 31 and d = 7, then the value of e is
(A) 101  (C) 105
(B) 103  (D) 107

Ans.: b.)
Network security and cryptography




4. FAN IN of a component A is defined as
(A) Number of components that can call or pass control to component A.
(B) Number of components that are called by component A.
(C) Number of components related to component A.
(D) Number of components dependent on component A.

Ans.: a.)
Fan-in is the number of inputs a gate can handle
Fan out is the number of gate inputs you can connect to a gate output

5. The relationship of data elements in a module is called
(A) Coupling
(B) Modularity
(C) Cohesion
(D) Granularity

Ans.: c.)
Software engineering
cohesion refers to the degree to which the elements of a module belong together.
the tendency to stick together

6. Testing of software with actual data and in actual environment is called
(A) Alpha testing
(B) Beta testing
(C) Regression testing
(D) None of the above

Ans.: b.)
Software testing concept.
Beta testing is a part of acceptance test.

7. Software Configuration Management is the discipline for systematically controlling
(A) the changes due to the evolution of work products as the project proceeds.
(B) the changes due to defects (bugs) being found and then fixed.
(C) the changes due to requirement changes
(D) all of the above

Ans.: d.)
Software engineering concept.

8.  Which one of the following is not a step of requirement engineering ?
(A) Requirement elicitation
(B) Requirement analysts
(C) Requirement design
(D) Requirement documentation

Ans.: c.)
STEPS IN REQUIREMENT ENGINEERING:
  Requirements inception
  Requirements identification
  Requirements analysis and negotiation
  Requirements specification
(Software Requirements Specification)
  System modeling
  Requirements validation
  Requirements management

9. The student marks should not be greater than 100. This is
(A) Integrity constraint
(B) Referential constraint
(C) Over-defined constraint
(D) Feasible constraint

Ans.: a.)
Rdbms concept
Easy question.

Note: Integrity means to ensure accuracy and consistency of data
10. GO  BOTTOM  and  SKIP-3 commands are given one after another in a database file of 30 records. It shifts the control to
(A) 28th record      (B) 27th record
(C) 3rd record       (D) 4th record

Ans.: b.)
Simple logical question.
Go to the last record and leave the last 3 recrods, therefore, the control will be shifted to 27th record.

11. An ER Model includes
I.   An ER diagram portraying entity types.
II.  Attributes for each entity type
III. Relationships among entity types.
IV.  Semantic integrity constraints that reflects the business rules about data not captured in the ER diagram.
(A) I, II, III & IV   (B) I&IV
(C) I, II & IV        (D) I & III

Ans.: a.)
Rdbms concept

12. What does the following declaration mean ?
int (*ptr) [10];
(A) ptr is an array of pointers of 10 integers.
(B) ptr is a pointer to an array of 10 integers.
(C) ptr is an array of 10 integers.
(D) none of the above.

Ans.: b.)
Simple question.
Related to c language.

13. Which of the following operators can not be overloaded in C+ + ?
(A) *     (B) + =
(C) = =     (D) ::

Ans.: d.)
Very simple.

14. allows to create classes which are derived from other classes, so that they automatically include some of its "parent's" members, plus its own members.
(A) Overloading
(B) Inheritance
(C) Polymorphism
(D) Encapsulation

Ans.: b.)
OOPS concept.

15.  _________ is often used to prove the correctness of a recursive function.
(A) Diagonaliization
(B) Communitivity
(C) Mathematical Induction
(D) Matrix Multiplication

Ans.: c.)

16. Which of the following derivations does a top-down parser use while parsing an input string ? The input is scanned from left to right.
(A) Leftmost derivation
(B) Leftmost derivation traced out in reverse
(C) Rightmost derivation traced out in reverse
(D) Rightmost derivation

Ans.: a.)
Compiler design.

17. The process of assigning load addresses to the various parts of the program and adjusting the code and data in the program to reflect the assigned addresses is called    ____________
(A) Symbol resolution
(B) Parsing
(C) Assembly
(D) Relocation

Ans.: d.)
Operating systems
program relocatability refer to the ability to load and execute a program into an arbitrary place in memory

 
18. Active X controls are Pentium binary programs that can be embedded in ____________
(A) Word pages
(B) URL pages
(C) Script pages
(D) Web pages

Ans.: d.)
Windows programming
ActiveX is a loosely defined set of technologies developed by Microsoft in 1996 for sharing information among different applications
Example:  Internet Explorer's Flash player is an ActiveX control. 

19. Match the following :
List-I                                                       List - II
a. Wireless Application Environment      i.    HTTP       
b. Wireless Transaction Protocol           ii.    IP
c. Wireless Datagram Protocol             iii    Scripts
d. Wireless                                          iv.    UDP
Codes :       
     a     b     c    d
(A) ii    iv     i    iii
(B) iv    iii     ii    i
(C) iv    iii     i    ii
(D) iii    i     iv    ii

Ans.: d.)
Mobile computing

20. Which of the following is widely used inside the telephone system for long-haul data traffic ?
(A) ISDN
(B) ATM
(C) Frame Relay
(D) ISTN

Ans.: b.)
Networks

21. The document standards for EDI were first developed by large business house during the 1970s and are now under the control of the following standard organisation :
(A) ISO
(B) ANSI
(C) ITU-T
(D) IEEE

Ans.: b.)
ANSI (American National Standards Institute)
Current trends and technologies

22. Electronic Data Interchange Software consists of the following four layers :
(A) Business application, Internal format conversion, Network translator, EDI envelope
(B) Business application, Internal format conversion, EDI translator, EDI envelope
(C) Application layer, Transport layer, EDI translator, EDI envelope
(D) Application layer, Transport layer, IP layer, EDI envelope

Ans.: d.)
Current trends and technologies

23.  Linux operating system uses
(A) Affinity Scheduling
(B) Fair Preemptive Scheduling
(C) Hand Shaking
(D) Highest Penalty Ratio Next

Ans.: b.)
OS

 24. The VLF and LF bauds use propagation for communication.
(A) Ground          (B) Sky
(C) Line of sight   (D) Space

Ans.: a.)
Mobile computing

25. Data Integrity control uses   
(A) Upper and lower limits on numeric data.
(B) Passwords to prohibit unauthorised access to files.
(C) Data dictionary to keep the data
(D) Data dictionary to find last access of data

Ans.: d.)
RDBMS concept

No comments:

Post a Comment