Sunday 24 May 2015

UGC NET COMPUTER SCIENCE MODEL SOLVED PAPER FOR JUNE 2015


UGC NET COMPUTER SCIENCE MODEL SOLVED PAPER FOR JUNE 2015

1. The midpoint circle drawing algorithm also uses the __of the circle to generate?
(a) two-way symmetry
 (b) four-way symmetry
(c) eight-way symmetry
(d) both (a) & (b)
Ans.: c

2.  Both TCP and UDP belong to which layer of the OSI model?
(a) Session
(b) Transport
 (c) Network
 (d) Data Link
Ans.: b

3.  Which of the following is used in TCP to provide extreme reliability?
(a) Checksum
(b) Sequence number
(c) TCP header length
(d) None of the above
Ans.: a


4.  Which allows you to create a derived class that inherits properties from more than one base class?
(a) Multilevel inheritance
 (b) Multiple inheritance
(c) Hybrid Inheritance
(d) Hierarchical Inheritance
Ans.: b

5.  Unix operating system is based on
(a) Language structure
(b) Kernel approach
(c) Virtual machine
(d) Time sharing
Ans.: b

6. TLB is acronym for
(a) Translation Looking Buffer
(b) Translation Look aside Buffer
(c) Translation Left Buffer
(d) Translation Look Block
Ans.: b

7. The principle of ‘locality of references’ justify the use of
(a) DMA
 (b) Polling
 (c) Cache memory
 (d) Virtual memory
Ans.: c

8. A disk scheduling algorithm in an operating system causes the disk arm to sweep back and forth across the disk
surface servicing all requests in its path. This is a
(a) FCFS
 (b) Shortest seek time
(c) Scan
(d) Eschenback scheme
Ans.: c

9. Aging is
(a) Keeping track of cache contents
(b) Keeping track of what pages are currently residing in the memory
(c) Keeping track of how many times a given page is referenced
(d) Increasing the priority of jobs to ensure termination in a finite time
Ans.: d

10. Which of the following command is used to update access and modification of a file?
(a) grep
(b) wc
 (c) touch
 (d) nice

Ans.: c
Click to buy Trueman's UGC NET Computer Sceince Book
11. What is command for system shutdown and reboot
(a) init 1
(b) init 2
(c) init 5
(d) init 6
Ans.: d

12. The following C programs print
main ( )
{
fork( );
fork ( );
print (“1”)
}
(a) 1
(b) 11
(c) 111
(d) 1111
Ans.: d

13. Which of the following is not a SHELL in UNIX system?
(a) Bourne shell
(b) C shell
 (c) Net shell
 (d) korn shell
Ans.: c

14. The dual of a primal maximization LPP having m constraints and n non-negative variable should
(a) be a minimization LPP
(b) have n constraints and m non-negative variables
(c) both (a) and (b)
(d) none of the above

Ans.: c

15. If dual has an unbounded solution, primal has
(a) an unbounded solution
(b) an infeasible solution
(c) a feasible solution
(d) none of the above
Ans.: b

16. If there are n workers and n jobs, there would be
(a) n solutions
(b) n! solutions
(c) (n–1)! Solutions
 (d) (n!)n solutions
Ans.: b

17. Identify the correct statements
(a) Horizontal programming supports short control word
(b) Vertical programming supports short control word
(c) both (a) and (b)
(d) none.
Ans.: b

18. Enterprise Resource Planning (ERP)
(a) has existed for over a decade.
(b) does not integrate well with the functional areas other than operations.
(c) is inexpensive to implement.
(d) automate and integrates the majority of business processes.
Ans.: d

19. To compare, overlay or cross analyze to maps in GIS
(a) both maps must be in digital form
(b) both maps must be at the same equivalent scale.
(c) both maps must be on the same coordinate system
(d) All of the above
Ans.: d

20. Which of the following systems analyzes spatial information?
(a) Neural network
 (b) Genetic algorithm
(c) Intelligent agent
 (d) Geographical information system
Ans.: d

2 comments: