Sunday 3 August 2014

UGC NET COMPUTER SCIENCE JUNE 2014 SOLVED PAPER 2

UGC NET COMPUTER SCIENCE JUNE 2014 SOLVED PAPER 2

1.      Infrared signals can be used for short range  communication  in  a  closed area using propagation.
(A)   ground            (B)    sky
(C)    line of sight    (D)    space

Ans.: C.) Line of Sight
Question from Mobile Computing
Very easy

2.    A  bridge  has  access  to address in the same network.
(A)   Physical    (B)    Network
(C)    Datalink    (D)   Application

Ans.: A.) Physical Layer
Data Communication and networks

3. The bit rate of a signal is 3000 bps. If each signal unit carries 6 bits, the baud rate of the signal is    .
(A)    500 baud/sec
(B)    1000 baud/sec
(C)    3000 baud/sec
(D)    18000 baud/sec

Ans.: A.) 500 baud/sec.
Very easy
Tip: Baud rate=Bit rate/N
So 3000/6=500







4. Match the following: 
           List-I                                        List - II
a.    Physical layer           i    Allow resources to  network access
b.    Datalink layer          ii    Move packets from one destination to other
c.    Network layer         iii.   Process to process message delivery   
 
d.    Transport layer        iv.   Transmission of bit stream
e.    Application Layer    v.    Formation of frames

Codes:
    a    b    c    d    e
(A)    iv      v    ii    iii    i
(B)    v      iv    i    ii    iii
(C)    i       iii    ii    v    iv   
 
(D)    i       ii    iv     iii    v

Ans.: A.)
Data communication and network question
Very easy
OSI model question

5. A shift reduce parser suffers from
(A)    shift reduce conflict only
(B)    reduce reduce conflict only
(C)    both shift reduce conflict and reduce reduce conflict
(D)    shift handle and reduce handle conflicts
Ans.:C.)

6. Which one of the following is not a risk management technique for managing the risk due to unrealistic schedules and budgets ?
(A)    Detailed multi source cost and schedule estimation.
(B)    Design cost
(C)    Incremental development
(D)    Information hiding
Ans.:D.)
Very simple, because Information hiding is a OOPS concept.

Click to buy Cosmo's UGC NET Computer Sceince Book
7. ________of a system is the structure or structures of the system which comprise software elements, the externally visible properties of these elements and the relationship amongst them.
(A)    Software construction
(B)    Software evolution
(C)    Software architecture
(D)    Software reuse

Ans.: C.)
Easy one once again.
Tip: Key word in the question is externally visible.

Software Engineering question

8. Regression testing is primarily related to
(A)    Functional testing
(B)    Development testing
(C)    Data flow testing
(D)    Maintenance testing


Software Testing question

Ans.: D.)

9. .    Match the following with respect to the    mobile computing technologies :
    List-I        List-II
a.    GPRS    i.  An integrated digital radio standard
b.    GSM    ii. 3G wireless/Mobile technology
c.    UMTS    iii.Nine different schemes for modulation and error correction
d.    EDGE    iv. An emerging wireless service that offers g mobile data
Codes :
    a    b    c    d    
(A)    iii    iv    ii    i
(B)    iv     i    ii    iii
(c)    ii    iii    iv    i
(d)    ii    i    iv    iii


Ans.: B.)

10. A software agent is defined as
I.      A software developed for accomplishing a given task.
II.    A computer program which is capable of acting on behalf of the user in order to accomplish a given computational task.
III.    An   open   source   software   for accomplishing a given task. 
(A)    I
(B)    II
(C)    III
(D)    All of the above

Ans.: B)


11. SET, an open encryption and security specification model that is designed for protecting credit card transactions on the internet, stands for
(A)    Secure Electronic Transaction
(B)    Secular Enterprise for Transaction
(C)    Security Electronic Transmission
(D)    Secured Electronic Termination

Ans.: A.)

12. Match the following 
                  List -I                                  List - II
a.    Multilevel feedback queue             i. Time-slicing
b.    FCFS                                          ii. Criteria to move processes between queues 
c.    Shortest process next                   iii. Batch processing 
d.    Round robin  scheduling               iv. Exponential smoothening
Codes
         a    b    c    d
(A)    i    iii    ii    iv
(B)    iv    iii    ii    i
(C)    iii    i    iv    ii
(D)    ii    iii    iv    i    


Ans.: D)

13. Match the following    
    List -1                                                   List - II
a. Contiguous allocation    i.    This scheme supports very large file sizes.
b. Linked allocation          ii.    This allocation technique supports only sequential files.
c. Indexed allocation        iii.    Number of disks required to access file is minimal.
d. Multi- level indexed      iv.   This technique suffers from maximum wastage of space in storing pointers.
Codes:        
         a       b    c    d
(A)   iii      iv    ii    i
(B)   iii      ii    iv    i
(C)    i       ii    iv    iii
(D)    i       iv    ii    iii


Ans.: A)

14. Mergesort makes two recursive calls. Which statement is true after these two recursive calls finish, but before the merge step ?
(A)    The array elements form a heap.
(B)    Elements in each half of the array are sorted amongst themselves.
(C)    Elements in the first half of the array are less than or equal to elements in second half of the array.
(D)    All of the above


Ans.: B)

15. Match the following :
    List -1                List - II
a. Automatic storage class    i.    Scope of the variable is global.
b. Register storage class    ii.    Value of the variable persists between different function calls.
c. Static storage class        iii.    Value stored in memory and local to the block in which the variable is defined.
d. External storage class    iv.     Value stored in CPU registers.
Codes :        
    a      b    c    d
(A)   iii     iv    i    ii
(B)   iii      iv    ii    i
(C)   iv      iii    ii    i
(D)   iv      iii    i    ii


Ans.: B)

16. When we pass an array as an argument to a function, what actually gets passed ?
(A)    Address of the array
(B)    Values of the elements of the array
(C)    Base address of the array
(D)    Number of elements of the array

Ans.: C)

17. An algorithm is made up of 2 modules M1  and M2.  If time  complexity of modules M1 and M2 are h(n) and g(n) respectively, the time complexity of the algorithm is
(A)    min (h(n), g(n))
(B)    max (h(n), g(n))
(C)    h(n) + g(n)
(D)    h(n)*g(n)


Ans.: B.)

18. .    Which of the following is the correct value returned to the operating system upon the successful completion of a program ?
(A)    0
(B)    1
(C)    -1
(D)    Program do not return a value.

Ans.: A)

19. Manager's salary details are hidden from the employee. This is called as
(A)    Conceptual level data hiding
(B)    Physical level data hiding
(C)    External level data hiding
(D)    Local level data hiding


Ans.: C)

20. Match the following :
      List-I                                  List- II
a.    DDL                             i.   LOCK TABLE
b.    DML                            ii. COMMIT
c.    TCL                             iii. Natural Difference
d.    BINARY Operation     iv. REVOKE
Codes:
         a       b     C    d
(A)    ii       i      iii     iv
(B)    i       ii      iv      iii
(C)    iii     ii        i     iv
(D)    iv       i      ii     iii

Ans.: B)

21. KPA in CMM stands for
(A)    Key Process Area
(B)    Key Product Area
(C)    Key Principal Area
(D)    Key Performance Area

Ans.: A.)

22. A clustering  index  is  created when
(A)    primary key is declared and ordered
(B)    no key ordered
(C)    foreign key ordered
(D)    there is no key and no order


Ans.: A.)

23. While (87) printf("computer"); The above C statement will
(A)    print "computer" 87 times
(B)    print "computer" 0 times
(C)    print "computer" 1 times
(D)    print "computer" infinite times

Ans.: D)


Rest of the questions very shortly.

No comments:

Post a Comment