Sunday 7 February 2016

UGC NET COMPUTER SCIENCE SOLVED MODEL PAPER SET-1

UGC NET COMPUTER SCIENCE SOLVED MODEL PAPER SET -1

1. Which of the following statements is false?
(a) Every NFA can be converted to an equivalent DFA
(b) Every non-deterministic Turing machine can be converted to an equivalent deterministic Turing machine.
(c) Every regular language is also a context-free language
(d) Every subset of recursively enumerable set is recursive.
Ans.: d

2. Task of the lexical analysis
(a) To parse the source program into the basic elements or tokens of the language
(b) To build a literal table and an identifier table
(c) To build a uniform symbol table
(d) All of these
Ans.:d

3. Which of the following is not correct?
(a) feasible solution of an LPP is independent of the objective function
(b) the feasible region of an LPP must be a convex set
(c) the feasible region for a constraint is restricted if its ‘’ or ‘’ sign is replaced by a ‘=’ sign.
(d) it is not possible to obtain feasible solution of an LPP by graphical method.
Ans.:d
        
                                                                                                                             
4. In the context of primal-dual relationship of LPP, choose the most correct among the following
(a) if primal or its dual have a finite optimum solution, then the other problem may or may not have a finite
optimum.
(b) if dual is unbounded, then primal has no feasible solution.
(c) if the primal problem is in its standard form, dual variables will be non-negative.
(d) if primal or dual has no feasible solution, the other problem will have a feasible solution.
Ans.:b

5. The transportation problem is balanced, if
(a) total demand and total supply are equal and the number of sources equals the number of destinations.
(b) total demand equals total supply irrespective of the number of sources and destinations.
(c) number of sources matches with the number of destinations.
(d) none of the routes is prohibited.
Ans.:b

6. For 16-bit compiler allowable range for integer constants is ________?
(a) -3.4e38 to 3.4e38
 (b) -32767 to 32768
(c) -32668 to 32667
(d) -32768 to 32767
Ans.:b

7. What number would be shown on the screen after the following statements of C are executed?
charch;
inti;
ch = ‘G’;
i = ch-’A’;
printf(“%d”, i);
(a)   5
(b)    6
(c)     7
(d)    8
Ans.:b

8. What is purpose of abstract class ?
(a) to provide help with database connectivity.
(b) to provide data input to other classes.
(c) to provide security to other classes.
(d) to provide an appropriate base class from which other classes can inherit.
Ans.:d

9. Suspend thread can be revived by using
(a) start() method
(b) Suspend() method
(c) resume() method
 (d) yield() method
Ans.:c

10. An assembler that runs on one machine but produces machine code for another machine is called
(a) simulator
(b) emulator
 (c) cross-assembler
(d) boot-strap loader
Ans.:c

11. Which of the following are typical characteristics of a RISC machine?
(I) instruction taking multiple cycles
(II) high pipelined
(III) instruction interpreted by micro programs
(IV) multiple register set
(a)   I, III
(b)    (b) I
(c)     (c) III
(d)    (d) II, IV
Ans.:d
Click to buy Cosmo's UGC NET Computer Sceince Book

12.The correct matching for the following pairs is
(A) DMA I/O (I) High speed RAM
(B) Cache (II) Disk
(C) Interrupt I/O (III) Printer
(D) Condition code register (IV) ALU
(a) A-IV, B-III, C-I, D-II
 (b) A-II, B-I, C-III, D-IV
(c) A-IV, B-III, C-II, D-I
(d) A-II, B-III, C-IV, D-I
Ans.:b

13. Which of the following calls nevers returns an error?
(a) getpid
 (b) fork
 (c) open
 (d) none of the above
Ans.:a

14. A process executes the following code
for (i = 0; i < n; i++)
fork();
The total number of child process cheated is
(a)   n
(b)    2n–1
(c)    2n
(d)    2n+1 –1
Ans.:b

15. The default permission bit on a file when it is created for the first time, is controlled by
(a) chmod value
(b) fmask value
(c) umask value
 (d) none of the above.
Ans.:c

16. the ‘nice’ command used in UNIX
(a) to decrease priority
 (b) to increase priority
(c) to get highest priority
 (d) none of these
Ans.:a

17. Which of the following OS treated hardware as a file system
(a) UNIX
(b) DOS
 (c) Window
 (d) none of these
Ans.:a

18. UNIX command used to find out number of character in file is
(a) hc
 (b) wc
 (c) chcnt
 (d) lc
Ans.:b

19. The algorithm, which may suffer from cascading roll back, is:
(a) 2 phase locking Protocol
 (b) Strictly two phase locking Protocol
(c) Strictly two phase
(d) Time stamp ordering Protocol
Ans.:a

20. The Aggregate function count( ) in relational algebra always return the count of
(a) Distinct values
(b) Duplicate values
(c) Duplicate or distinct
 (d) None of these
Ans.:a


No comments:

Post a Comment