Tuesday, 24 July 2012

D-8709 UGC NET Computer Science Dec 2009 Paper - II

1.      If she is my friend and you are her friend, then we are friends. Given this, the friend relationship in this context is                                                                     .
(i)       commutative         (ii)       transitive         (iii)   implicative           (iv)     equivalence
(A)     (i) and (ii)                                            (B)    (iii)
(C)     (i), (ii), (iii) and (iv)                            (D)    None of these


2.     Circle has                       

(A)
No vertices
(B)
Only 1 vertex
(C)
vertices
(D)
None of these

3.      If in an error detection and correction code a message M : You are good students is stored as M' : Youare areyou aregood goodare goodstudents studentsgood. What is the space required to store M' in general ? (assume that n’ is the length of M)
(A)     2n                        (B)      3n                   (C)    4n                       (D)     less than 4n


4.      P : Program is a step by step execution of the instructions. Given P, which of the following is true ?
(A)     Program is a subset of an instruction set.
(B)      Program is a sequence of a subset of an instruction set. (C)            Program is a partially ordered set of an instruction set. (D)       All of the above

5.      In a MIU puzzle, either of the letters M, I or U could go as a start symbol. Production rules are given below :
R1 : U IU



R2  : M.x M.x.x where following holds for


. .
.  is string concatenation operator. Given this, which of the


(i)       MIUIUIUIUIU                                    (ii)     MIUIUIUIUIUIUIUIU (A)   Either (i) or (ii) but not both of these are valid words.
(B)      Both   (i)   and   (ii)   are   valid   words   and   they   take   identical   number   of transformations for the production.
(C)      Both  (i)  and  (ii)  are  valid  words  but  they  involve  different  number  of transformations in the production.
(D)     None of these


6.      The simplified form of the Boolean expression (X + Y + XY) (X + Z) is
(A)     X + Y + ZX + Y (B)      XY YZ        (C)    X + YZ               (D)     XZ + Y

8.      The highest noise margin is offered by

(A)
BICMOS
(B)
TTL
(C)
ECL
(D)
CMOS


9.      The answer of the operation (10111)2 * (1110)2 in hex equivalence is
(A)     150                      (B)      241                 (C)    142                     (D)     101011110


10.   How many 1s are present in the binary representation of
3 × 512 + 7 × 64 + 5 × 8 + 3
(A)     8                          (B)      9                     (C)    10                       (D)     11


11.   Recursive functions are executed in a

(A)
First in first out-order
(B)
Last in first out-order
(C)
Parallel fashion
(D)
Load balancing


12.   What would be the output of the following program, if run from the command line as
myprog 1 2 3?
main (int argc, char argv[ ])
{  int i ;
i = argv[1] + argv[2] + argv[3] ;
printf (% d, i) ;
}
(A)     123                       (B)     6                     (C)     Error                   (D)     123”


13.   A                    is a special method used to initialize the instance variable of a class.

(A)
Member function
(B)     Destructor
(C)
Constructor
(D)    Structure


14.   Encapsulation is
(A)     Dynamic binding
(B)        A mechanism to associate the code and data. (C)          Data abstraction
(D)     Creating new class


15.   Which of the statements are true ?

I.
II.
Function overloading is done at compile time.
Protected members are accessible to the member of derived class.

III.
A derived class inherits constructors and destructors.
IV.
A friend function can be called like a normal function.
V.
Nested class is a derived class.
(A)
I, II, III                 (B)     II, III, V          (C)     III, IV, V             (D)
I, II, IV



16.
The
I. II. III.
E-R model is expressed in term of
Entities
The relationship among entities. The attributes of the entities.


IV.
(A)
Functional relationship.
I, II                      (B)      I, II, IV

(C)

II, II, IV

(D)

I, II, III


17.   Specialization is                     process.

(A)
top-down
(B)
bottom up
(C)
both (A) and (B)
(D)
none of these


18.   Match the following :
(1)   Determinants                      (a)    No attribute can be added
(2)   Candidate key                    (b)   Uniquely identified a row
(3)   Non-redundancy                 (c)    A constraint between two attribute
(4)   Functional dependency        (d)   Group of attributes on the left hand side of arrow of function dependency.
(A)     1 d,   2 b,   3 a,   4 c (B) 2 d,   3 a,   1 b,   4 c (C)      4 a,   3 b,   2 c,   1 d (D)            3 a,   4 b,   1 c,   2 d

19.   A function that has no partial functional dependencies is in                       form. (A)           3 NF     (B)        2 NF      (C)                      4 NF   (D)                          BCNF

20.   Which  of the following statement is wrong ?
I.        2-phase locking protocol suffer from dead lock. II.  Time stamp protocol suffer from more aborts.
III.      A block hole in a DFD is a data store with only inbound flows.
IV.      Multivalued dependency among attribute is checked at 3 NF level. V.          An entity-relationship diagram is a tool to represent event model.
(A)     I, II, II                  (B)      II, III, IV         (C)    III, IV, V             (D)     II, IV, V

21.   If the number of leaves in a strictly binary tree is an odd number, then what can you say with full conviction about total number of nodes in the tree ?
(A)     It is an odd number.
(B)      It is an even number.
(C)      It cannot be equal to the number of leaves.
(D)     It is always greater than twice the number of leaves.

22.   The number of edges in a complete graph of n vertices is
(A)     n                          (B)     n(n 1)/2       (C)    n(n + 1)/2            (D)     n2/2

23.   At a hill station, the parking lot is one long drive way snaking up a hill side. Cars drive in and park right behind the car in front of them, one behind another. A car cant leave until all the cars in front of it have left. Is the parking lot more like
(A)     An array              (B)      A stack           (C)    A queue             (D)     A linked list

24.   With regard to linked list, which of the following statement is false ?
(A)     An  algorithm  to  search  for  an  element  in  a  singly  linked  list  requires  0(n)
operations in the worst case.
(B)      An algorithm for deleting the first element in a singly linked list requires 0(n)
operations in the worst case.
(C)      An algorithm for finding the maximum value in a circular linked list requires 0(n)
operations.
(D)     An algorithm for deleting the middle node of a circular linked list requires 0(n)
operations.

25.   A hash function f defined as f(key) = key mod 7, with linear probing used to resolve collisions. Insert the keys 37, 38, 72, 48, 98 and 11 into the table indexed from 0 to 6. What will be the location of 11 ?
(A)     3                          (B)      4                     (C)    5                         (D)     6

26.   Device on one network can communicate with devices on another network via a
(A)
Hub/Switch
(B)     Utility server
(C)
File server
(D)    Gateway
27.   What is the maximum window size in sliding window protocol used in a computer network ?
(A)     4                          (B)      8                     (C)    15                       (D)     16

28.   Which of the following are Data Link Layer standard ?
1.
Ethernet
2.
HSSI
3.       Frame Relay

4.
10 Base T
5.
Token Ring



(A)
1, 2, 3
(B)
1, 3, 5
(C)     1, 3, 4, 5
(D)
1, 2, 3, 4, 5

29.   In case of Bus/Tree topology signal balancing issue is overcome by
(A)
Modulation
(B)    Polling
(C)
Segmentation
(D)    Strong transmitter

30.   Match the following :
(i)     Ethernet                       (a)    Deterministic
(ii)   Token Ring                   (b)   Utilize the full wire speed
(iii)  Cut-through switch        (c)    Prevent looping
(iv)  Spanning tree                (d)   Checking valid address
Codes :
(A)     i d,  ii a,  iii b,  iv – c                 (B)    i a,  ii d,  iii b,  iv c
(C)      i d,  ii d,  iii c,  iv – b                    (D)    i d,  ii c,  iii b,  iv a

No comments:

Post a Comment