UGC NET COMPUTER SCIENCE SOLVED PAPER SET-2
21. Find the suitable match for
the following:
List – I List –
II
A. DDL i. Rename
B. DML ii. Select
C. BASIC Operation iii. Set
Difference
D. BINARY Operation iv. Drop
(a) A- ii, B-I, C- iii, D- iv (b)
A- I, B- ii, C- iv, D- iii
(c)
A-iv, B- ii, C- iii, D- i (d) A- iv, B- ii, C- i, D- iii
Ans.:d
22. Specialization Lattice stands
for
(a) An entity type can
participate as a subclass in only one specialization.
(b) An entity type can
participate as a subclass in more than one specialization.
(c) An entity type that can
participate in one specialization.
(d)
An entity type that can participate in one generalization.
Ans.:b
23. Overlay is
(a) a part of an operating system
(b) a specific memory location
(c) a single contiguous memory
that was used in the olden days for running large programs byswapping.
(d)
overloading the system with many user files.
Ans.:c
24. Which of the following system
cells resulting in sending of SYN packets?
(a)
socket (b) bind (c) liston (d) connect
Ans.:
d
25. Match the following
(1) Session layer (I) connects
DCE into physical channel
(2) Transport layer (2) provides
end to end accountability
(3) Application layer (3)
provides organised means to exchange data between users
(like synchronisation points)
(4) MDI (iv) supports an end user
process and performs required file transfer.
(a) 1-III, 2-IV, 3-II, 4-I (b)
1-III, 2-II, 3-IV, 4-I
(c)
1-II, 2-IV, 3-I, 4-III (d) 1-IV, 2-III, 3-II, 4-I
Ans.:
b
26. Which of the following
statements is incorrect?
(a) Friend keyword can be used in
the class to allow access to another class.
(b) Friend keyword can be used
for a function in the public section of a class.
(c) Friend keyword can be used
for a function in the private section of a class.
(d)
Friend keyword can be used on main().
Ans.:
d
27. In Spiral Model this is an
observation “the compiler version is not as recent as the version the client
has
or that the programmers are
proficient in HTML but not proficient in PHP”. In Which phase this observation
is made ?
(a)
Planning (b) Engineering (c) Risk Analysis
(d) Evaluating Alternatives
Ans.:
c
28. Match the following :
(i) OLAP (A) Regression
(ii) OLTP (B) Data Warehouse
(iii) Decision Tree (C) RDBMS
(iv) Neural Network (D)
Classification
(i) (ii) (iii) (iv)
(a) (B) (C) (A) (D)
(b) (B) (C) (D) (A)
(c) (C) (B) (A) (D)
(d)
(C) (B) (D) (A)
Ans.:
b
29. Which of the following is a
good reason to use linked lists in a program?
(a) To make execution faster
(b) To access any element
randomly
(c) To allocate space dynamically
whenever needed
(d)
To make deletion of elements easier
Ans.:
c
30. Which of the
following statements is false?
A (a)
Every NFA can be converted to an equivalent DFA
B (b)
Every non-deterministic Turing machine can be converted to an equivalent
deterministic Turing machine
C (c)
Every regular language is also a context-free language
D (d) Every subset of a
recursively enumerable set is recursive
Ans.: d
31. When installing an Ethernet
10BASE-T network, what type of cable is used?
(a)
Fiber Optic (b) Coaxial Cable (c) Twisted Pair (d) Wireless
Ans.:
c
32. The ......................
algorithm divides a 2D space into 9 regions, of which only the middle part
(viewport) is
visible.
(a) Cohen-Sutherland (b) Liang
Barsky
(c)
Sutherland Hodegeman (d) N-L-N
Ans.:
d
33. A feasible solution to an LPP
(a) Must satisfy all of the
problem’s constraints simultaneously
(b) Must be a corner point of the
feasible region.
(c) Need not satisfy all of the
constraints, only some of them
(d)
Must optimize the value of the objective function
Ans.:
a
34. Match the following with link
quality measurement and handoff initiation :
(A) Networked- Controlled Handoff
(NCHO) (i) MS connect to BS
(B) Mobile- Assisted Handoff
(MAHO) (ii) Process via channel the target BS
(C) Forward Handoff (iii) First
Generation Analog Cellular System
(D) Hard Handoff (iv) Second
Generation Digital Cellular System
A B C D
(a) (iii) (iv) (ii) (i)
(b) (ii) (iii) (i) (iv)
(c) (ii) (i) (iv) (iii)
(d)
(iv) (iii) (i) (ii)
Ans.:
a
35. The incremental model of
software development is
(a) A reasonable approach when
requirements are well defined.
(b) A good approach when a
working core product is required quickly.
(c) The best approach to use for
projects with large development teams.
(d)
A revolutionary model that is not used for commercial products.
Ans.:
b
36. The WINWIN spiral model of
software development is
(a) A used when requirements must
be defined by customer negotiation.
(b) Useful when a customer is
able to provide requirements completely.
(c) The best approach to use for
projects with large development teams.
(d)
Like the spiral model without the risk assessment step.
Ans.:
a
37. If an artificial variable is
present in the basis of an optimal table with positive value, then the problem.
(a) has unbounded solution (b)
has no feasible solution
(c)
has a degenerate solution (d) none of the above.
Ans.:
b
38. Which of these
Hypertext-level design patterns focus on the design of navigation features that
allow a user
navigate through WebApp content?
(a)
Contour (b) Web Ring (c) tree (d) Sieve
Ans.:
a
39.The best products to sell in
B2C e-commerce are
(a) Small products (b)
Digital products (c) Specialty products (d) Fresh products
Ans.: b
40. The reliability of a program
be 0.8. The reliability of an equivalent program (i.e. another program that
serves the
same purpose) is 0.9. The
probability that both the programs give the wrong result for same input is
(a)
0.72 (b) 1.7 (c) 0.1 (d) 0.02
Ans.:
d
No comments:
Post a Comment