Wednesday 17 February 2016

UGC NET COMPUTER SCIENCE SOLVED PAPER SET-2

UGC NET COMPUTER SCIENCE SOLVED PAPER SET-2

21. Find the suitable match for the following:
List – I List – II
A. DDL i. Rename
B. DML ii. Select
C. BASIC Operation iii. Set Difference
D. BINARY Operation iv. Drop
(a) A- ii, B-I, C- iii, D- iv (b) A- I, B- ii, C- iv, D- iii
(c) A-iv, B- ii, C- iii, D- i (d) A- iv, B- ii, C- i, D- iii
Ans.:d

22. Specialization Lattice stands for
(a) An entity type can participate as a subclass in only one specialization.
(b) An entity type can participate as a subclass in more than one specialization.
(c) An entity type that can participate in one specialization.
(d) An entity type that can participate in one generalization.
Ans.:b

23. Overlay is
(a) a part of an operating system
(b) a specific memory location
(c) a single contiguous memory that was used in the olden days for running large programs byswapping.
(d) overloading the system with many user files.
Ans.:c


24. Which of the following system cells resulting in sending of SYN packets?
(a) socket (b) bind (c) liston (d) connect
Ans.: d

25. Match the following
(1) Session layer (I) connects DCE into physical channel
(2) Transport layer (2) provides end to end accountability
(3) Application layer (3) provides organised means to exchange data between users
(like synchronisation points)
(4) MDI (iv) supports an end user process and performs required file transfer.
(a) 1-III, 2-IV, 3-II, 4-I (b) 1-III, 2-II, 3-IV, 4-I
(c) 1-II, 2-IV, 3-I, 4-III (d) 1-IV, 2-III, 3-II, 4-I
Ans.: b

26. Which of the following statements is incorrect?
(a) Friend keyword can be used in the class to allow access to another class.
(b) Friend keyword can be used for a function in the public section of a class.
(c) Friend keyword can be used for a function in the private section of a class.
(d) Friend keyword can be used on main().
Ans.: d

27. In Spiral Model this is an observation “the compiler version is not as recent as the version the client has
or that the programmers are proficient in HTML but not proficient in PHP”. In Which phase this observation
is made ?
(a)    Planning (b) Engineering (c) Risk Analysis (d) Evaluating Alternatives
Ans.: c
28. Match the following :
(i) OLAP (A) Regression
(ii) OLTP (B) Data Warehouse
(iii) Decision Tree (C) RDBMS
(iv) Neural Network (D) Classification
(i) (ii) (iii) (iv)
(a) (B) (C) (A) (D)
(b) (B) (C) (D) (A)
(c) (C) (B) (A) (D)
(d) (C) (B) (D) (A)
Ans.: b

29. Which of the following is a good reason to use linked lists in a program?
(a) To make execution faster
(b) To access any element randomly
(c) To allocate space dynamically whenever needed
(d) To make deletion of elements easier
Ans.: c

30. Which of the following statements is false?
A (a) Every NFA can be converted to an equivalent DFA
B (b) Every non-deterministic Turing machine can be converted to an equivalent deterministic Turing machine
C (c) Every regular language is also a context-free language
D (d) Every subset of a recursively enumerable set is recursive
Ans.: d

31. When installing an Ethernet 10BASE-T network, what type of cable is used?
(a) Fiber Optic (b) Coaxial Cable (c) Twisted Pair (d) Wireless
Ans.: c

32. The ...................... algorithm divides a 2D space into 9 regions, of which only the middle part (viewport) is
visible.
(a) Cohen-Sutherland (b) Liang Barsky
(c) Sutherland Hodegeman (d) N-L-N
Ans.: d

33. A feasible solution to an LPP
(a) Must satisfy all of the problem’s constraints simultaneously
(b) Must be a corner point of the feasible region.
(c) Need not satisfy all of the constraints, only some of them
(d) Must optimize the value of the objective function
Ans.: a

34. Match the following with link quality measurement and handoff initiation :
(A) Networked- Controlled Handoff (NCHO) (i) MS connect to BS
(B) Mobile- Assisted Handoff (MAHO) (ii) Process via channel the target BS
(C) Forward Handoff (iii) First Generation Analog Cellular System
(D) Hard Handoff (iv) Second Generation Digital Cellular System
A B C D
(a) (iii) (iv) (ii) (i)
(b) (ii) (iii) (i) (iv)
(c) (ii) (i) (iv) (iii)
(d) (iv) (iii) (i) (ii)
Ans.: a

35. The incremental model of software development is
(a) A reasonable approach when requirements are well defined.
(b) A good approach when a working core product is required quickly.
(c) The best approach to use for projects with large development teams.
(d) A revolutionary model that is not used for commercial products.
Ans.: b

36. The WINWIN spiral model of software development is
(a) A used when requirements must be defined by customer negotiation.
(b) Useful when a customer is able to provide requirements completely.
(c) The best approach to use for projects with large development teams.
(d) Like the spiral model without the risk assessment step.
Ans.: a

37. If an artificial variable is present in the basis of an optimal table with positive value, then the problem.
(a) has unbounded solution (b) has no feasible solution
(c) has a degenerate solution (d) none of the above.
Ans.: b

38. Which of these Hypertext-level design patterns focus on the design of navigation features that allow a user
navigate through WebApp content?
(a)    Contour (b) Web Ring (c) tree (d) Sieve
Ans.: a

39.The best products to sell in B2C e-commerce are
(a) Small products (b) Digital products (c) Specialty products (d) Fresh products
Ans.: b

40. The reliability of a program be 0.8. The reliability of an equivalent program (i.e. another program that serves the
same purpose) is 0.9. The probability that both the programs give the wrong result for same input is
(a)    0.72 (b) 1.7 (c) 0.1 (d) 0.02

Ans.: d

No comments:

Post a Comment