UGC NET
COMPUTER SCIENCE SOLVED MODEL PAPER FOR JULY 2016
1. Consider the following statements-
(a) Depth - first search is used to traverse a rooted
tree.
(b) Pre - order, Post-order and Inorder are used to
list the vertices of an ordered rooted tree.
(c) Huffman's algorithm is used to find an optimal
binary tree with given weights.
(d) Topological sorting provides a labelling such that
the parents have larger labels than their children.
Which of the above statements are true ?
A. (a) and (b)
B. (c) and (d)
C. (a)
, (b) and (c)
D. (a), (b) , (c) and (d)
Ans.:D
2. Which of the following, in C++, is inherited
in a derived class from base class ?
A.
constructor
B. destructor
C. data members
D. virtual
methods
Ans.:C
3. Drop Table cannot be used to drop a Table referenced
by ------ constraint.
(a) Primary key (b) Sub key (c) Super key (d) Foreign
key
A.
(a)
B.
(a), (b) and (c)
C.
(d)
D.
(a) and (d)
Ans.:C
4. Database applications were built directly on top of
file system to overcome the following drawbacks of using filesystems
(a) Data redundancy and inconsistency
(b) Difficulty in accessing Data
(c) Data isolation
(d) Integrity problems
A.
(a)
B.
(a) and (d)
C.
(a), (b) and (c)
D.
(a),
(b), (c) and (d)
Ans.:D
5. Level order Traversal of a rooted Tree can be done
by starting from root and performing -
A.
Breadth
First Search
B.
Depth first search
C.
Root search
D.
Deep search
Ans.:A
6. To determine the efficiency of an algorithm the
time factor is measured by
A.
Counting micro seconds
B.
Counting
number of key operations
C.
Counting number of statement
D.
Counting kilobytes of algorithm
Ans.:B
7. Match the following port numbers with their uses :
List-I
|
List-II
|
(a) 23
|
(i) World wide web
|
(b) 25
|
(ii) Remote Login
|
(c) 80
|
(iii) USENET news
|
(d) 119
|
(iv) Email
|
(a) (b) (c) (d)
A.
(iv) (i) (ii) (iii)
B. (ii) (i) (iv) (iii)
C. (ii) (iv) (iii) (i)
D. (ii) (iv) (i) (iii)
Ans.:D
8. Match the following:
List-I
|
List-II
|
(a) Forward Reference Table
|
(i) Assembler directive
|
(b) Mnemonic Table
|
(ii) Uses array data structure
|
(c) Segment Register Table
|
(iii) Contains machine OP code
|
(d) EQU
|
(iv) Uses linked list data structure
|
(a) (b) (c) (d)
A.
(ii) (iii) (iv) (i)
B.
(iii) (iv) (ii) (i)
C.
(iv) (i) (iii) (ii)
D.
(iv) (iii) (ii) (i)
Ans.:D
9. The translator which performs macro calls expansion
is called :
A .
Macro processor
B.
Micro pre-processor
C.
Macro
pre-processor
D.
Dynamic linker
Ans.:C
10. If all the production rules have single non -
terminal symbol on the left side, the grammar defined is:
A.
context
free grammar
B.
context sensitive grammar
C.
unrestricted grammar
D.
phrase grammar
Ans.:A
11. Which phase of compiler generates stream of atoms
?
A.
Syntax
analysis
B.
Lexical Analysis
C.
Code generation
D.
Code optimization
Ans.:A
12. What does the following command do ?
grep − vn "abc" x
A.
It will print all of the lines in the file
x that match the search string "abc"
B.
It
will print all of the lines in file x that do not match the search string
"abc"
C.
It will print total no of the lines in
file x that match the search string "abc".
D.
It will print the specific line numbers of
file x in which there is a match for the string "abc".
Ans.:B
13. Match the following
List - I
|
List - II
|
(a) Size-oriented metric
|
(i) uses number of external interfaces as one of the measurement parameters
|
(b) Function-oriented metrics
|
(ii) originally designed to be applied to business information system
|
(c) Extended Function Point Metrics
|
(iii) derived by normalizing quality and/ or productivity measures by
considering the size of the software.
|
(d) Function Point
|
(iv) uses algorithm characteristics as of the measurement parameter
|
(a) (b) (c) (d)
A.
(iii) (iv) (i) (ii)
B.
(ii) (i) (iv) (iii)
C.
(iv) (ii) (iii) (i)
D.
(iii) (i) (iv) (ii)
Ans.:B
14. Which process model is also called as
classic life cycle model?
A.
Waterfall
model
B.
RAD model
C.
Prototyping model
D.
Incremental model
Ans.:A
15. Cohesion is an extension of :
A.
Abstraction concept
B.
Refinement concept
C.
Information
hiding concept
D.
Modularity
Ans.:C
16. Which one from the following is highly associated
activity of project planning?
A.
Keep track of the project
B.
Compare actual and planned progress and
costs
C.
Identify
the activities, milestones and deliverables produced by a project
D.
Both (2) and (3)
Ans.:C
17. Requirements prioritization and negotiation belongs to :
A. Requirements
validation
B. Requirements
elicitation
C. Feasibility
Study
D. Requirement
reviews
Ans.:B
18.
Which
of the following conversion is not possible (algorithmically)?
(a) Regular grammar to context-free
grammar
(b) Non-deterministic FSA to
deterministic FSA
(c) Non-deterministic PDA to
deterministic PDA
(d) Non-deterministic Turing machine to
deterministic Turing machine
Ans.: C
19. The shell command chmod
(a) Is used to change the file
permission.
(b) Is used to list change the
password.
(c) Is used to remove files.
(d) None of the above
Ans.: A
20. The 8-bit encoding format used to
store data in a computer is ______ .
(a) ASCII
(b) EBCDIC
(c) ANCI
(d) USCII
Ans.B
No comments:
Post a Comment