Sunday 8 March 2015

UGC NET AND DRDO COMPUTER SCIENCE SOLVED MODEL PAPER

UGC NET AND DRDO COMPUTER SCIENCE SOLVED MODEL PAPER 

1. The rules which govern the formation of valid lexical units in the source program are
(a) Syntax rules
(b) Semantic rules
(c) Lexical rules
(d) Syntehesis phase
Ans.: A

2. Consider the following statement about kernel level thread and user level thread. Which one of the following is false?
(a) Context switch time is longer for kernel level threads than for user level threads
(b) User level threads do not need any hardware support
(c) Related kernel level thread can be scheduled on different processors in multiprocessor system
(d) Blocking one kernel level thread blocks all related thread
Ans.: D

3. Fuzzy Set theory defines fuzzy operators. Choose the fuzzy operators from the following.
(a) AND
 (b) OR
 (c) NOT
(d) All of the above
Ans.: D

4. There are also other operators, more linguistic in nature, called __________ that can be applied to fuzzy set theory.
(a) Hedges
(b) Lingual Variable
(c) Fuzz Variable
(d) None of the mentioned
Ans.: A

5. What’s the difference between servlets and applets?
(1) Servlets executes on Servers, where as Applets executes on Browser
(2) Servlets have no GUI, where as an Applet has GUI
(3) Servlets creates static web pages, where as Applets creates dynamic web pages
(4) Servlets can handle only a single request, where as Applet can handle multiple requests
(a) 1,2,3 are correct
(b) 1,2 are correct
(c) 1,3 are correct
(d) 1,2,3,4 are correct
Ans.: B

6. AppletViewer tool is available in which of the folder of JDK
(a) Bin
(b) Lib
(c) Source
(d) Class
Ans.: A

7. Which is the method that starts the applet?
(a) Main()
(b) Destroy()
(c) Init()
(d) Reprint()
Ans.: C

Click to buy Trueman's UGC NET Computer Sceince Book
8. Which of the following concepts means adding new concepts to a program as it runs ?
(a) Data hiding
(b) Dynamic loading
(c) Dynamic typing
(d) Dynamic binding
Ans.: B

9. Match the following with respect to programming languages :
List -1                                           List - II
(A) Structured Language          (i) JAVA
(B) Non-structured Language  (ii) BASIC
(C) Object Oriented Language (iii) PASCAL
(D) Interpreted Language          (iv) FORTRAN
Language Codes :
A B C D
(a) iii iv i ii
(b) iv iii ii i
(c) ii iv i iii
(d) ii iii iv i
Ans.: A

10. Important advantage of using new and delete operators in C++ is
(a) Allocation of memory
(b) Frees the memory previously allocated
(c) Initialization of memory easily
(d) Allocation of memory and frees the memory previously allocated.
Ans.: D

11. Which LAN standard has the highest data rate?
(a) 10Base5
(b) 10Base-T
(c) Twisted Pair Token Ring
(d) FDDI
Ans.: D

12. Which of the following IP Network addresses is a reserved address?
(a) 127.0.0.0
(b) 130.50.0.0
 (c) 197.65.10.0
 (d) 4.0.0.0
Ans.: A

13. When installing an Ethernet 10BASE-T network, what type of cable is used?
(a) Fiber Optic
(b) Coaxial Cable
(c) Twisted Pair
(d) Wireless
Ans.: C

14. The key requirement/s for a routing function in packet-switching networks is/are:
(a) Efficiency
(b) Correctness, Simplicity and Fairness
(c) Optimality, Robustness and Stability
(d) All of the above
Ans.: A

15. In alternate routing scheme (circuit-switched networks), the responsibility to select the appropriate route for each call rests on the:
(a) End station
(b) Routing station or switch at mid-point
(c) Originating switch
(d) End station and the originating switch
Ans.: B

16. The length of a Hamiltonian path (if exists) in a connected graph of n vertices is
(a) n
(b) n – 1
(c) n + 1
(d) n/2
Ans.: B

17. A graph with n vertices and n – 1 edges that is not a tree, is
(a) Euler
(b) A circuit
(c) Disconnected
(d) Connected.
Ans.: C

18. The midpoint circle drawing algorithm also uses the __of the circle to generate?
(a) two-way symmetry
 (b) four-way symmetry
(c) eight-way symmetry
(d) both (a) & (b)
Ans.: C

 19. Consider the following two statements:
P: Every regular grammar is LL(1)
 Q: Every regular set has a LR(1) grammar
Which of the following is TRUE?
 (a) Both P and Q are true
(b) P is true and Q is false
(c) P is false and Q is true
(d) Both P and Q are false
Ans.: C

20. What is the appropriate pairing of items in the two columns listing various activities encountered in a software life cycle?
(P) Requirements capture (1) Module development and integration
(Q) Design                        (2) Domain analysis
(R) Implementation          (3) Structural and behavioural modeling
(S) Maintenance                (4) Performance tuning
(a) P-3, Q-2, R-4, S-1 (b) P-2, Q-3, R-1, S-4
(c) P-3, Q-2, R-1, S-4 (d) P-2, Q-3, R-4, S-1
Ans.: B
BC


No comments:

Post a Comment