Tuesday 10 May 2016

UGC NET COMPUTER SCIENCE SOLVED MODEL PAPER FOR JULY 2016

UGC NET COMPUTER SCIENCE SOLVED MODEL PAPER FOR JULY 2016

1. Consider the following statements-
(a) Depth - first search is used to traverse a rooted tree.
(b) Pre - order, Post-order and Inorder are used to list the vertices of an ordered rooted tree.
(c) Huffman's algorithm is used to find an optimal binary tree with given weights.
(d) Topological sorting provides a labelling such that the parents have larger labels than their children.
Which of the above statements are true ?
        A. (a) and (b)
B. (c) and (d)
C.  (a) , (b) and (c)
D.  (a), (b) , (c) and (d)
Ans.:D

2.  Which of the following, in C++, is inherited in a derived class from base class ?
     A.     constructor
B.     destructor
C.      data members
D.     virtual methods
Ans.:C

 3. Drop Table cannot be used to drop a Table referenced by ------ constraint.
(a) Primary key (b) Sub key (c) Super key (d) Foreign key   
                        A.     (a)
B.                 (a), (b) and (c)
C.                  (d)
D.                 (a) and (d)
Ans.:C


4. Database applications were built directly on top of file system to overcome the following drawbacks of using filesystems
(a) Data redundancy and inconsistency
(b) Difficulty in accessing Data
(c) Data isolation
(d) Integrity problems
                        A.     (a)
B.                 (a) and (d)
C.                  (a), (b) and (c)
D.                 (a), (b), (c) and (d)
Ans.:D

5. Level order Traversal of a rooted Tree can be done by starting from root and performing -
                         A.     Breadth First Search
B.                 Depth first search
C.                  Root search
D.                 Deep search
Ans.:A

6. To determine the efficiency of an algorithm the time factor is measured by
                        A.     Counting micro seconds
B.                 Counting number of key operations
C.                  Counting number of statement
D.                 Counting kilobytes of algorithm
Ans.:B

7. Match the following port numbers with their uses :

List-I
List-II
(a) 23
(i) World wide web
(b) 25
(ii) Remote Login
(c) 80
(iii) USENET news
(d) 119
(iv) Email

      (a)  (b)  (c)  (d)
A.     (iv)   (i)  (ii)  (iii)
B.     (ii)   (i)  (iv)  (iii)
C.      (ii)   (iv)  (iii)   (i)
D.     (ii)   (iv)  (i)   (iii)
Ans.:D

8. Match the following:

List-I
List-II
(a) Forward Reference Table
(i) Assembler directive
(b) Mnemonic Table
(ii) Uses array data structure
(c) Segment Register Table
(iii) Contains machine OP code
(d) EQU
(iv) Uses linked list data structure

     (a)   (b)   (c)  (d)
                          A.     (ii)   (iii)  (iv)  (i)
B.                 (iii)   (iv)  (ii)  (i)
C.                  (iv)   (i)  (iii)  (ii)
D.                 (iv)   (iii)  (ii)  (i)
Ans.:D

Click to buy Aruhant's UGC NET Computer Sceince Book
9. The translator which performs macro calls expansion is called :
                       A  .     Macro processor
B.                 Micro pre-processor
C.                  Macro pre-processor
D.                 Dynamic linker
Ans.:C

10. If all the production rules have single non - terminal symbol on the left side, the grammar defined is:
                         A.     context free grammar
B.                 context sensitive grammar
C.                  unrestricted grammar
D.                 phrase grammar
Ans.:A

11. Which phase of compiler generates stream of atoms ?
                       A.     Syntax analysis
B.                 Lexical Analysis
C.                  Code generation
D.                 Code optimization
Ans.:A

12. What does the following command do ?
grep − vn  "abc" x
                        A.     It will print all of the lines in the file x that match the search string "abc"
B.                 It will print all of the lines in file x that do not match the search string "abc"
C.                  It will print total no of the lines in file x that match the search string "abc".
D.                 It will print the specific line numbers of file x in which there is a match for the string "abc".
Ans.:B

13. Match the following

List - I
List - II
(a) Size-oriented metric
(i) uses number of external interfaces as one of the measurement parameters
(b) Function-oriented metrics
(ii) originally designed to be applied to business information system
(c) Extended Function Point Metrics
(iii) derived by normalizing quality and/ or productivity measures by considering the size of the software.
(d) Function Point
(iv) uses algorithm characteristics as of the measurement parameter

      (a)  (b)  (c)  (d)
                       A.     (iii)  (iv)  (i)   (ii)
B.                 (ii)  (i)  (iv)   (iii)
C.                  (iv)  (ii)  (iii)   (i)
D.                 (iii)  (i)  (iv)   (ii)
Ans.:B

 14. Which process model is also called as classic life cycle model?
                               A.     Waterfall model
B.                 RAD model
C.                  Prototyping  model
D.                 Incremental model
Ans.:A


15. Cohesion is an extension of :
A.     Abstraction concept
B.                 Refinement concept
C.                  Information hiding concept
D.                 Modularity

Ans.:C

16. Which one from the following is highly associated activity of project planning?
                      A.     Keep track of the project
B.                 Compare actual and planned progress and costs
C.                  Identify the activities, milestones and deliverables produced by a project
D.                 Both (2) and (3)
Ans.:C

17. Requirements prioritization and negotiation belongs to :
A.        Requirements validation
B.        Requirements elicitation
C.        Feasibility Study
D.        Requirement reviews
Ans.:B


18. Which of the following conversion is not possible (algorithmically)?
(a) Regular grammar to context-free grammar
(b) Non-deterministic FSA to deterministic FSA
(c) Non-deterministic PDA to deterministic PDA
(d) Non-deterministic Turing machine to deterministic Turing machine
Ans.: C

19. The shell command chmod
(a) Is used to change the file permission.
(b) Is used to list change the password.
(c) Is used to remove files.
(d) None of the above
Ans.: A

20. The 8-bit encoding format used to store data in a computer is ______ .
(a) ASCII
(b) EBCDIC
 (c) ANCI
(d) USCII
Ans.B


No comments:

Post a Comment