UGC NET Computer Science Paper II Jun 2010
1. Any integer composed of 3n identical
digits divisible by
(A) 2n (B) 3n (C) 5n
(D)
7n
2. The circumference of the two concentric disks are divided into 100
sections each. For the outer disk, 100 of the sections are painted red and 100
of the sections are painted blue. For the inner disk, the sections are painted
red and blue in an arbitrary manner. It is possible to align the two disks so
that
(A) 100 or more
(B) 125 or more
(C) 150 or more
(D) 175 or more
of the sections on the inner disks have their colours matched with
the corresponding section on outer disk.
3. The proposition ~ p Ú q is equivalent to
(A) p ® q
(B) q ® p
(C) p « q
(D) p Ú q
4. The absorption law in Boolean algebra say that
(A) X + X = X
(B) X . X = X
(C) x + x . y = x
(D) None of the above
5. The number of 1’s present in the binary representation of
10 × 256 + 5 × 16 + 5 is
(A) 5 (B) 6 (C) 7 (D) 8
6. The hexadecimal number equivalent to (1762.46)8
is
(A) 3F2.89 (B) 3F2.98 (C) 2F3.89 (D) 2F3.98
7. (A + B)AB
is equivalent to
(A) A Å B
(B) A☉B
(C) (A Å B)☉A
(D) (A☉B) Å A
8. A latch is constructed using two cross-coupled
(A) AND and OR gates
(B) AND gates
(C) NAND and NOR gates
(D) NAND gates
9. A multiplexer is a logic circuit that
(A) accepts one input and gives several output
(B) accepts many inputs and gives many output
(C) accepts many inputs and gives one output
(D) accepts one input and gives one output
10. 8-bit 1’s complement form of –77.25 is
(A) 01001101.0100
(B) 01001101.0010
(C) 10110010.1011
(D) 10110010.1101
11. From the point of view of the programmer, what are the major advantages
of using a high-level language rather than internal machine code or assembly language
?
(A) Program portability
(B) Easy development
(C) Efficiency
(D) None of the above
12. What features make C++ so powerful ?
(A) Easy implementation
(B) Reusing old code
(C) Easy memory management
(D) All of the above
13. The goal of operator overloading is
(A) to help the user of a class
(B) to help the developer of a class
(C) to help define friend function
(D) None of the above
14. The scheme of which interpreter translates the source program is known
as
(A) Paragraph by paragraph
(B) Instruction by instruction
(C) Line by line
(D) None of the above
15. Portable program means
(A) Program with wheels
(B) Independent from its authors
(C) Independent of platform
(D) None of the above
16. Which of the following is the recovery management technique in DDBMS
?
(A) 2PC (Two Phase Commit)
(B) Backup
(C) Immediate update
(D) All of the above
17. Which of the following is the process by which a user’s privileges
ascertained ?
(A) Authorization
(B) Authentication
(C) Access Control
(D) None of these
18. The basic variants of time-stamp based method of concurrency
control are
(A) Total time stamp-ordering
(B) Partial time stamp-ordering
(C) Multiversion Time stamp-ordering
(D) All of the above
19. A transaction can include following basic database access
operations :
(A) Read_item(X)
(B) Write_item(X)
(C) Both (A) and (B)
(D) None of these
20. Decomposition help in eliminating some of the problems of bad
design
(A) Redundancy
(B) Inconsistencies
(C) Anomalies
(D) All of the above
21. The number of different trees with 8 nodes is
(A) 256 (B) 255 (C) 248 (D) None of these
Hint: (2^n)-n i.e (2^8)-8 = 256-8 = 248
Hint: (2^n)-n i.e (2^8)-8 = 256-8 = 248
22. Given a binary tree whose inorder and preorder traversal are given
by
Inorder : EICFBGDJHK
Preorder : BCEIFDGHJK
The post order traversal of the above binary tree is
(A) I E FCGJ KHDB
(B) I E FC J GKHDB
(C) I E FCGKJ HDB
(D) I E FCGJ
KDBH
23. The number of disk accesses performed by insertion operation in B-tree
of height h is
(A) 0(1) (B) 0(1gh) (C) 0(h) (D) None of these
24. Consider a hash table of size m = 10000 and the hash function
h(k) = └m (kA mod 1) ' ┘for A = ( √5 – 1)/ 2. The location to the key
k = 123456 is
(A) 46 (B) 47 (C) 41 (D) 43
25. When the priority queue is represented by max heap, the insertion
and deletion of an element can be performed in (queue containing n elements)
(A) q(n)
and q(1)
respectively
(B) q(n)
and q(n)
respectively
(C) q(1)
and q(1)
respectively
(D) None of the above
26. A comparison of frequency division and time division multiplexing system
shows that
(A) FDM requires a lower bandwidth, but TDM has greater noise
immunity.
(B) FDM has greater noise immunity and requires lower bandwidth
than TDM.
(C) FDM requires channel synchronization, while TDM has greater
noise immunity.
(D) FDM requires more multiplex while TDM requires band pass filter.
27. If carrier modulated by a digital bit stream, has one of the
possible phase of 0, 90, 180 and 270 degrees, then modulation called
(A) BPSK (B) QPSK (C) QAM (D) MSK
28. Consider the following statement :
(i) The bandwidth of the A.M., wave depends on the band width of
the modulating signal.
(ii) The bandwidth of the A.M., wave depends on the modulation
index.
(iii) The bandwidth of the F.M, wave for all practical purpose depends
on the amplitude of the carrier.
Of these statements the correct statements are
(A) (i, ii)
(B) (i, iii)
(C) (ii, iii)
(D) All of the above
29. A smart modem can dial, hangup and answer incoming calls automatically. Can you tell who provides the appropriate instructions to the modem for this purpose ?
29. A smart modem can dial, hangup and answer incoming calls automatically. Can you tell who provides the appropriate instructions to the modem for this purpose ?
(A) Communication software
(B) Error detection protocols
(C) Link access procedure (LAP)
(D) Telecommunications
30. Which of the following switching techniques is most suitable for interactive
traffic ?
(A) Circuit switching
(B) Message switching
(C) Packet switching
(D) All of the above
31. Object modules generated by assembler that contains unresolved external
references are resolved for two or more object module by a/an
(A) Operating system
(B) Loader
(C) Linker
(D) Compiler
32. A special software that is used to create a job queue is called
(A) Drive
(B) Spooler
(C) Interpreter
(D) Linkage editor
33. Which of the following permanent database that has an entry for
each terminal symbol ?
(A) Literal table
(B) Identifier table
(C) Terminal table
(D) Source table
34. In which way(s) a macroprocessor for assembly language can be implemented
?
(A) Independent two-pass processor
(B) Independent one-pass processor
(C) Expand macrocalls and substitute arguments
(D) All of the above
35. Which of the following can be accessed by transfer vector approach of linking ?
(A) External data segments
(B) External subroutine
(C) Data located in other procedure
(D) All of the above
36. Block or Buffer caches are used to
(A) improve disk performance
(B) handle interrupts
(C) increase the capacity of main memory
(D) speed up main memory Read operations
37. A file organization component VSAM file is
(A) Relative records data set
(B) Keyed sequential data set
(C) Entry sequential data set
(D) All of the above
38. A relationship between processes such that each has some part
(critical section) which must not be executed while the critical section of
another is being executed, is known as
(A) Semaphore
(B) Mutual exclusion
(C) Multiprogramming
(D) Message passing
39. How many states can a process be in ?
(A) 3 (B) 4 (C) 2 (D) 5
40. Which command allows you to view your file 24 lines at a time ?
(A) More (B) Cat (C) Pg (D) None of the above
41. Which one of the items listed below is not one of the software engineering
layers ?
(A) Process
(B) Manufacturing
(C) Method
(D) Tools
42. What is the first stage in program development ?
(A) Specification and design
(B) System Analysis
(C) Testing
(D) None of the above
43. By means of a data flow diagram, the analyst can detect
(A) Task duplication
(B) Unnecessary delays
(C) Task overlapping
(D) All of the above
44. Which of these are the 5 generic software engineering framework activities
?
(A) Communication, planning, modelling, construction, deployment
(B) Communication, risk management, measurement, production,
reviewing
(C) Analysis, designing, programming, Debugging, maintenance
(D) Analysis, planning, designing, programming, testing
45. Many causes of the software crisis can be traced to mythology
based on
(A) Management Myths
(B) Customer Myths
(C) Practitioner Myths
(D) All of the above
46. Data warehousing refers to
(A) storing data offline at a separate site
(B) backing up data regularly
(C) is related to data mining
(D) uses tape as opposed to disk
47. Virtual memory is
(A) related to virtual reality
(B) a form of ROM
(C) a form of RAM
(D) None of the above
48. “M-Commerce” refers to
(A) a myth which does not exist in reality
(B) the ability of business to reach potential customers wherever they
are
(C) the ability to have large capacity of memory storage dealing
trade and commerce
(D) None of the above
49. The principal electronic payment systems for electronic commerce
is
(A) Credit Card
(B) Digital Wallet
(C) Electronic Cheque
(D) All of the above
50. Which is the most valuable electronic commerce to the individual
customer in long run ?
(A) Business to Customer
(B) Business to Business
(C) Customer to Customer
(D) None of the above
0 comments:
Post a Comment