UGC NET COMPUTER SCIENCE DECEMBER 2013 PAPER SOLVED PAPER 3
1. If the primal Linear Programming problem has
unbounded solution, then it's dual problem will have
(A) feasible solution
(B) alternative solution
(C) no feasible solution at all
(D) no bounded solution at all
(A) feasible solution
(B) alternative solution
(C) no feasible solution at all
(D) no bounded solution at all
Ans.: c.)
Linear programming.
2. Match the following :
List -1 List-II
a. Data coupling i. Module A and Moduie B have shared data
b. Stamp coupling ii. Dependency between modules is based on the fact they communicate by only passing of data
c. Common coupling iii. When complete data structure is passed from one module to another
d. Content coupling iV. When the control is passed from one module to the middle of another
Codes :
a b c d
(A) iii ii i iv
(B) ii iii i iv
(C) ii iii iv i
(D) iii ii iv i
List -1 List-II
a. Data coupling i. Module A and Moduie B have shared data
b. Stamp coupling ii. Dependency between modules is based on the fact they communicate by only passing of data
c. Common coupling iii. When complete data structure is passed from one module to another
d. Content coupling iV. When the control is passed from one module to the middle of another
Codes :
a b c d
(A) iii ii i iv
(B) ii iii i iv
(C) ii iii iv i
(D) iii ii iv i
Ans.: b.)
Software engineering
3. A process
which defines a series of tasks that have the following four primary objectives
is known as
1. to identify all items that collectively define the software configuration.
2. to manage changes to one or more of these items.
3. to facilitate the construction of different versions of an application.
4. to ensure that software quality is maintained as the configuration evolves over time.
(A) Software Quality Management Process
(B) Software Configuration Management Process
(C) Software Version Management Process
(D) Software Change Management Process
1. to identify all items that collectively define the software configuration.
2. to manage changes to one or more of these items.
3. to facilitate the construction of different versions of an application.
4. to ensure that software quality is maintained as the configuration evolves over time.
(A) Software Quality Management Process
(B) Software Configuration Management Process
(C) Software Version Management Process
(D) Software Change Management Process
Ans.: b.)
Software engineering
(A) they are not effective.
(B) they do not explore combinations of input circumstances.
(C) they explore combinations of input circumstances.
(D) none of the above.
Ans.: b.)
Software testing
5. Which once of the following is not a software
myth?
(A) Once we write the program and get it to work, our job is done.
(B) Project requirements continually change, but change can be easily accommodated because software is flexible.
(C) If we get behind schedule, we can add more pro grammers and catch up.
(D) If an organization does not understand how to control software projects internally, it will invariably struggle when it outsources software projects
(A) Once we write the program and get it to work, our job is done.
(B) Project requirements continually change, but change can be easily accommodated because software is flexible.
(C) If we get behind schedule, we can add more pro grammers and catch up.
(D) If an organization does not understand how to control software projects internally, it will invariably struggle when it outsources software projects
Ans.: d.)
Software engineering
6. Match the following with respect to relationship
between objects and classes:
List -I List -II
a. State diagram i. Useful for both abstract modelling and for designing actual program
b. Object diagram ii. Describes object classes
c. Class diagram iii. Useful for documenting test cases
d. Instance diagram iv. Describing the behaviour of a single class of objects.
Codes :
a b c d
(A) iv i ii iii
(B) ii iii iv i
(C) iii iv ii i
(D) ii iv i iii
List -I List -II
a. State diagram i. Useful for both abstract modelling and for designing actual program
b. Object diagram ii. Describes object classes
c. Class diagram iii. Useful for documenting test cases
d. Instance diagram iv. Describing the behaviour of a single class of objects.
Codes :
a b c d
(A) iv i ii iii
(B) ii iii iv i
(C) iii iv ii i
(D) ii iv i iii
Ans.: c.)
OOAD
7. Match the following style rules for reusability:
List -I List -II
a. Keep methods coherent i. Write a method to get the last element of a list
b. Keep methods small ii. Maintain parallel structure when possible
c. Keep methods consistent iii. Breaking a method methods into smaller parts
d. Provide uniform coverage iv. Performs a single function or a group of closely related functions.
Codes :
a b C d
(A) iv iii ii i
(B) ii i iv iii
(C) iii iv ii i
(D) ii iii iv i
List -I List -II
a. Keep methods coherent i. Write a method to get the last element of a list
b. Keep methods small ii. Maintain parallel structure when possible
c. Keep methods consistent iii. Breaking a method methods into smaller parts
d. Provide uniform coverage iv. Performs a single function or a group of closely related functions.
Codes :
a b C d
(A) iv iii ii i
(B) ii i iv iii
(C) iii iv ii i
(D) ii iii iv i
Ans.: a.)
8. Which is the protocol for performing RPCs
between applications in a language and system independent way?
(A) Hyper Text Transmission Protocol (HTTP)
(B) Simple network Management Protocol (SNMP)
(C) Simple Object Access Protocol (SOAP)
(D) Simple Mail Transfer Protocol (SMTP)
(A) Hyper Text Transmission Protocol (HTTP)
(B) Simple network Management Protocol (SNMP)
(C) Simple Object Access Protocol (SOAP)
(D) Simple Mail Transfer Protocol (SMTP)
Ans.: c.)
Networking
SOAP
(Simple Object Access Protocol) is a way for a program running in one kind of
operating system (such
as Windows 2000) to communicate
with a progam in the same or another kind of an operating system (such as Linux)
by using the World Wide Web's Hypertext Transfer Protocol (HTTP)and its
Extensible Markup Language (XML) as the mechanisms for information exchange
9. The document that is used by XSLT to indicate,
how to transform the elements of the XML document to another format is
(A) HTML page
(B) DOC type procedure
(C) Style sheet
(D) Stored procedure
(A) HTML page
(B) DOC type procedure
(C) Style sheet
(D) Stored procedure
Ans.: c.)
Web design
10. Which of the following concepts means adding
new concepts to a program as it runs ?
(A) Data hiding
(B) Dynamic loading
(C) Dynamic typing
(D) Dynamic binding
(A) Data hiding
(B) Dynamic loading
(C) Dynamic typing
(D) Dynamic binding
Ans.: b.)
OOPS
Dynamic loading is a mechanism by which a computer
program can, at run time, load a library into memory, retrieve the addresses of
functions and variables contained in the library, execute those functions or
access those variables, and unload the library from memory
11. Which of the following correctly describes
overloading of functions?
(A) Virtual polymorphism
(B) Transient polymorphism
(C) Ad-hoc polymorphism
(D) Pseudo polymorphism
(A) Virtual polymorphism
(B) Transient polymorphism
(C) Ad-hoc polymorphism
(D) Pseudo polymorphism
Ans.: c.)
OOPS
12. Match the following with respect to programming
languages :
List -1 List - II
a. Structured Language i. JAVA
b. Non-structured Language ii. BASIC
c. Object Oriented Language iii. PASCAL
d. Interpreted Language iv. FORTRAN
Language Codes :
a b c d
(A) iii iv i ii
(B) iv iii ii i
(C) ii iv i iii
(D) ii iii iv i
List -1 List - II
a. Structured Language i. JAVA
b. Non-structured Language ii. BASIC
c. Object Oriented Language iii. PASCAL
d. Interpreted Language iv. FORTRAN
Language Codes :
a b c d
(A) iii iv i ii
(B) iv iii ii i
(C) ii iv i iii
(D) ii iii iv i
Ans.: a.)
13. The compiler converts all operands upto the type of
the largest operand is called
(A) Type Promotion
(B) Type Evaluation
(C) Type Conversion
(D) Type Declaration
(A) Type Promotion
(B) Type Evaluation
(C) Type Conversion
(D) Type Declaration
Ans.: a.)
Compilers
14. Important advantage of using new and delete
operators in C++ is
(A) Allocation of memory
(B) Frees the memory previously allocated
(C) Initialization of memory easily
(D) Allocation of memory and frees the memory previously allocated.
(A) Allocation of memory
(B) Frees the memory previously allocated
(C) Initialization of memory easily
(D) Allocation of memory and frees the memory previously allocated.
Ans.: d.)
OOPS .
Very simple question.
15. Match the following control strategies of prolog :
List -1 List - II
a. Forward movement i. Variable can be done with a constant, another variable or a function.
b. Unification ii. The entire conjunctive goal is executed.
c. Deep backtracking iii. Previous sub goal to find alternative solutions.
d. Shallow backtracking iv.Chooses sub goal with possible unifier.
Codes :
a b c d
(A) iv i ii iii
(B) ii iv i iii
(C) iii i iv ii
(D) ii iii iv i
List -1 List - II
a. Forward movement i. Variable can be done with a constant, another variable or a function.
b. Unification ii. The entire conjunctive goal is executed.
c. Deep backtracking iii. Previous sub goal to find alternative solutions.
d. Shallow backtracking iv.Chooses sub goal with possible unifier.
Codes :
a b c d
(A) iv i ii iii
(B) ii iv i iii
(C) iii i iv ii
(D) ii iii iv i
Ans.: b.)
Artificial intelligence
16. High level knowledge which
relates to the use of sentences in different contexts and how the context
affect the meaning of the sentences ?
(A) Morphological
(B) Syntactic
(C) Semantic
(D) Pragmatic
(B) Syntactic
(C) Semantic
(D) Pragmatic
Ans.: d.)
17. The objective of__________procedure is to discover
at least one________that causes two literals to match.
(A) unification, validation
(B) unification, substitution
(C) substitution, unification
(D) minimax, maximum
(A) unification, validation
(B) unification, substitution
(C) substitution, unification
(D) minimax, maximum
Ans.:
b.)
18. In alpha-beta pruning, _________is used to cut
off the search at maximizing level only and _________is used to cut
off the search at minimizing level only.
(A) alpha, beta
(B) beta, alpha
(C) alpha, alpha
(D) beta, beta
(A) alpha, beta
(B) beta, alpha
(C) alpha, alpha
(D) beta, beta
Ans.: b.)
Artificial intelligence
19. Find the false statement:
(A) In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption.
(B) The symmetric cipher DES (Data Encryption Standard) was widely used in the industry for security product.
(C) The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.
(D) Public key algorithms use two different keys for Encryption and Decryption.
(A) In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption.
(B) The symmetric cipher DES (Data Encryption Standard) was widely used in the industry for security product.
(C) The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.
(D) Public key algorithms use two different keys for Encryption and Decryption.
Ans.: c .)
Network security and cryptography
20. In
IPV 4, the IP address 200.200.200.200 belongs to
(A) Class A (B) Class B
(C) Class C (D) Class D
(A) Class A (B) Class B
(C) Class C (D) Class D
Ans.:
c.)
Networks
Explanation:
Class
|
Address
Range
|
Class
A
|
0.0.0.0
|
Class
B
|
128.0.0.0
|
Class
C
|
192.0.0.0
|
Class
D
|
224.0.0.0
|
Class
E
|
240.0.0.0
|
21. Which layer of OS I reference
model is responsible for decomposition of messages and generation of sequence
numbers to ensure correct re-composition from end to end of the network ?
(A) Physical
(B) Data-link
(C) Transport (D) Application
(C) Transport (D) Application
Ans.: c.)
Networks
22. The start and stop bits are used in serial
communication for
(A) error detection
(B) error correction
(C) synchronization
(D) slowing down the communication
(A) error detection
(B) error correction
(C) synchronization
(D) slowing down the communication
Ans.: c.)
Synchronization is
the coordination of events to operate a system in unison
23. ________is a type of transmission impairment in
which the signal looses strength due to the resistance of the transmission
medium.
(A) Attenuation (B) Distortion
(C) Noise (D) Decibel
(A) Attenuation (B) Distortion
(C) Noise (D) Decibel
Ans.: a.)
24. a. Indexed Addressing i. is not used when an operand is moved from memory into a register or from a register to memory.
b. Direct Addressing ii. Memory address is computed by adding up two registers plus an (optional) offset.
c. Register Addressing iii. Addressing memory by giving a register plus a content offset.
d. Base-Indexed Addressing iv. can only be used to access global variables whose address is known at compile time.
Codes :
a b c d
(A) ii i iv iii
(B) ii iv i iii
(C) iii iv i ii
(D) iii i iv ii
Ans.: c.)
Microprocessor
25. Synchronization is achieved timing device called
a_______which generates a periodic train of ________.
(A) clock generator, clock pulse
(B) master generator, clock pulse
(C) generator, clock
(D) master clock generator, clock pulse
(A) clock generator, clock pulse
(B) master generator, clock pulse
(C) generator, clock
(D) master clock generator, clock pulse
Ans.: a.)
26. What will be the output of the following logic diagram ?
(A) x OR y
(B) x AND y
(C) x XOR y
(D) X XNOR y
(B) x AND y
(C) x XOR y
(D) X XNOR y
Ans.: c.)
Digital logics
Explanation:
x
|
y
|
-
X
|
-
y
|
-
x.y
|
-
xy
|
-
-
(xy) + (xy)
|
0
|
0
|
1
|
1
|
0
|
0
|
0
|
0
|
1
|
1
|
0
|
0
|
1
|
1
|
1
|
0
|
0
|
1
|
1
|
0
|
1
|
1
|
1
|
0
|
0
|
0
|
0
|
0
|
27. The essential difference between traps and
interrupts is
(A) traps are asynchronous and interrupts are synchronous with the program.
(B) traps are synchronous and interrupts are asynchronous with the program.
(C) traps are synchronous and interrupts are asynchronous with the I/O devices.
(D) None of these.
(A) traps are asynchronous and interrupts are synchronous with the program.
(B) traps are synchronous and interrupts are asynchronous with the program.
(C) traps are synchronous and interrupts are asynchronous with the I/O devices.
(D) None of these.
Ans.: b.)
DLF
28. Which of the following is not true with respect
to a trackball and/or spaceball ?
I. A trackball is a two dimensional positioning device while as a spaceball provides six degrees of freedom.
II. Unlike the trackball a spaceball does not actually move.
III. A trackball is a three dimensional positioning device while as a spaceball provides six degrees of freedom.
(A) I & II (B) II & III
(C) II only (D) III only
I. A trackball is a two dimensional positioning device while as a spaceball provides six degrees of freedom.
II. Unlike the trackball a spaceball does not actually move.
III. A trackball is a three dimensional positioning device while as a spaceball provides six degrees of freedom.
(A) I & II (B) II & III
(C) II only (D) III only
Ans.: d.)
Windows
29. Which of the following statement(s) is (are)
true ?
I. Two successive translations are additive.
II. Two successive rotations are additive.
III. Two successive scaling operations are multiplicative.
(A) I and II
(B) I and III
(C) II and III
(D) All the above
I. Two successive translations are additive.
II. Two successive rotations are additive.
III. Two successive scaling operations are multiplicative.
(A) I and II
(B) I and III
(C) II and III
(D) All the above
Ans.: d.)
Computer Graphics
30. In Unix, how do you check that two given
strings a and b are equal ?
(A) test $a -eq $b
(B) test Sa -equal $b
(C) test $a = Sb
(D) Sh -C test $a = = $b
(A) test $a -eq $b
(B) test Sa -equal $b
(C) test $a = Sb
(D) Sh -C test $a = = $b
Ans.: c.)
Unix
31. To place a sound into a word document,
following feature of windows is used :
(A) Clip board
(B) Task switching
(C) C Win App
(D) OLE
(A) Clip board
(B) Task switching
(C) C Win App
(D) OLE
Ans.: d.)
Windows
32. Translation Look-aside Buffer (TLB) is
(A) a cache-memory in which item to be searched is compared one-by-one with the keys.
(B) a cache-memory in which item to be searched is compared with all the keys simultaneously.
(C) an associative memory in which item to be searched is compared one-by-one with the keys.
(D) an associative memory in which item to be searched is compared with all the keys simultaneously.
(A) a cache-memory in which item to be searched is compared one-by-one with the keys.
(B) a cache-memory in which item to be searched is compared with all the keys simultaneously.
(C) an associative memory in which item to be searched is compared one-by-one with the keys.
(D) an associative memory in which item to be searched is compared with all the keys simultaneously.
Ans.: d.)
OS
33. Simplest way of deadlock recovery is
(A) Roll back
(B) Preempt resource
(C) Lock one of the processes
(D) Kill one of the processes
(A) Roll back
(B) Preempt resource
(C) Lock one of the processes
(D) Kill one of the processes
Ans.: a.)
OS
34. The directory structure used in Unix file
system is called
(A) Hierarchical directory
(B) Tree structured directory
(C) Directed acyclic graph
(D) Graph structured directory
(A) Hierarchical directory
(B) Tree structured directory
(C) Directed acyclic graph
(D) Graph structured directory
Ans.: a.)
Unix
Unix
35. Possible thread states in Windows 2000
operating system include :
(A) Ready, running and waiting
(B) Ready, standby, running, waiting, transition and terminated
(C) Ready, running, • waiting, transition and terminated
(D) Standby, running, transition and terminated
(A) Ready, running and waiting
(B) Ready, standby, running, waiting, transition and terminated
(C) Ready, running, • waiting, transition and terminated
(D) Standby, running, transition and terminated
Ans.: b.)
Windows
No comments:
Post a Comment