Trending ▼   ResFinder  

UGC NET JUN 2011 : COMPUTER SCIENCE AND APPLICATIONS PAPER II

7 pages, 50 questions, 0 questions with responses, 0 total responses,    0    0
jc0def1sh
  
+Fave Message
 Home > jc0def1sh >

Formatting page ...

PAPER-II COMPUTER SCIENCE AND APPLICATIONS Signature and Name of Invigilator 1. (Signature) __________________________ OMR Sheet No. : ............................................... (To be filled by the Candidate) (Name) ____________________________ Roll No. 2. (Signature) __________________________ (In figures as per admission card) (Name) ____________________________ J 87 Roll No.________________________________ (In words) 1 1 1 Time : 1 /4 hours] [Maximum Marks : 100 Number of Pages in this Booklet : 8 Instructions for the Candidates 1. Write your roll number in the space provided on the top of this page. 2. This paper consists of fifty multiple-choice type of questions. 3. At the commencement of examination, the question booklet will be given to you. In the first 5 minutes, you are requested to open the booklet and compulsorily examine it as below : (i) To have access to the Question Booklet, tear off the paper seal on the edge of this cover page. Do not accept a booklet without sticker-seal and do not accept an open booklet. (ii) Tally the number of pages and number of questions in the booklet with the information printed on the cover page. Faulty booklets due to pages/questions missing or duplicate or not in serial order or any other discrepancy should be got replaced immediately by a correct booklet from the invigilator within the period of 5 minutes. Afterwards, neither the Question Booklet will be replaced nor any extra time will be given. (iii) After this verification is over, the OMR Sheet Number should be entered on this Test Booklet. 4. Each item has four alternative responses marked (A), (B), (C) and (D). You have to darken the oval as indicated below on the correct response against each item. Example : B C A D where (C) is the correct response. 5. Your responses to the items are to be indicated in the Answer Sheet given inside the Paper I Booklet only. If you mark at any place other than in the ovals in the Answer Sheet, it will not be evaluated. 6. Read instructions given inside carefully. 7. Rough Work is to be done in the end of this booklet. 8. If you write your Name, Roll Number, Phone Number or put any mark on any part of the Answer Sheet, except for the space allotted for the relevant entries, which may disclose your identity, or use abusive language or employ any other unfair means, you will render yourself liable to disqualification. 9. You have to return the test question booklet and OMR Answer sheet to the invigilators at the end of the examination compulsorily and must not carry it with you outside the Examination Hall. 10. Use only Blue/Black Ball point pen. 11. Use of any calculator or log table etc., is prohibited. 12. There is no negative marks for incorrect answers. J-87-11 Number of Questions in this Booklet : 50 1. 2. - 3. , - - , : (i) - - (ii) - / - - (iii) OMR - 4. (A), (B), (C) (D) B C A : D (C) 5. I - , 6. 7. (Rough Work) 8. - , , , , , 9. - OMR - 10. / 11. ( ) 12. 1 P.T.O. COMPUTER SCIENCE AND APPLICATIONS Paper II Note : This paper contains fifty (50) objective type questions, each question carrying two (2) marks. Attempt all the questions. 1. Any integer composed of identical digits divisible by (A) 2n (B) 3n (C) 2. 3. 4. 5 n 3n 5. 10 256 + 5 16 + 5 is n (D) 7 (A) 5 6. (B) (C) The circumference of the two concentric disks are divided into 100 sections each. For the outer disk, 100 of the sections are painted red and 100 of the sections are painted blue. For the inner disk, the sections are painted red and blue in an arbitrary manner. It is possible to align the two disks so that (A) 100 or more (B) 125 or more (C) 150 or more (D) 175 or more of the sections on the inner disks have their colours matched with the corresponding section on outer disk. (D) 8 7 6 The hexadecimal number equivalent to (1762.46)8 is (A) 3F2.89 (B) 3F2.98 (C) 2F3.89 (D) 2F3.98 7. (A + B) AB is equivalent to (A) A B (B) AuB (C) The proposition ~ p q is equivalent to (A) p q (B) q p (C) p q (D) p q (A B) u A (D) (A u B) A 8. The absorption law in Boolean algebra say that (A) X + X = X (B) X . X = X (C) x + x . y = x (D) None of the above Paper-II The number of 1 s present in the binary representation of A latch is constructed using two cross-coupled (A) AND and OR gates (B) AND gates (C) NAND and NOR gates (D) NAND gates 2 J-87-11 9. 13. A multiplexer is a logic circuit that The goal of operator overloading is (A) accepts one input and gives several output (A) to help the user of a class (B) to help the developer of a class (B) (C) to help define friend function (C) accepts many inputs and gives many output (D) None of the above accepts many inputs and gives one output 14. (D) accepts one input and gives one output The scheme of which interpreter translates the source program is known as (A) Paragraph by paragraph 8-bit 1 s complement form of 77.25 is (B) Instruction by instruction (C) Line by line (A) 01001101.0100 10. (D) None of the above (B) 01001101.0010 (C) 10110010.1011 15. Portable program means (A) Program with wheels (D) 10110010.1101 (B) 11. (C) From the point of view of the programmer, what are the major advantages of using a high-level language rather than internal machine code or assembly language ? Independent from its authors Independent of platform (D) None of the above 16. Which of the following is the recovery management technique in DDBMS ? (A) Program portability (A) 2PC (Two Phase Commit) (B) Easy development (B) Backup (C) Efficiency (C) Immediate update (D) All of the above (D) None of the above 17. 12. What features powerful ? make C++ so Which of the following is the process by which a user s privileges ascertained ? (A) Easy implementation (A) Authorization (B) Reusing old code (B) Authentication (C) Easy memory management (C) Access Control (D) None of these (D) All of the above J-87-11 3 Paper-II 18. 19. 23. Consider a hash table of size m = 10000 and the hash function A transaction can include following basic database access operations : (A) Read_item(X) (B) Write_item(X) (C) Both (A) and (B) (D) None of these 20. 21. h(k) = for ( 5 1) . The location to the 2 key k = 123456 is (A) 46 (B) 47 (C) 41 (D) 43 The number of different trees with 8 nodes is (A) 256 (B) 255 (C) 248 (D) None of these 25. 4 When the priority queue is represented by max heap, the insertion and deletion of an element can be performed in (queue containing n elements) (A) (n) and (1) respectively (B) (n) and (n) respectively (C) (1) and (1) respectively (D) None of the above 26. Given a binary tree whose inorder and preorder traversal are given by Inorder : EICFBGDJHK Preorder : BCEIFDGHJK The post order traversal of the above binary tree is (A) I E F C G J K H D B (B) I E F C J G K H D B (C) I E F C G K J H D B (D) I E F C G J K D B H Paper-II m (kA mod 1) ' A = Decomposition help in eliminating some of the problems of bad design (A) Redundancy (B) Inconsistencies (C) Anomalies (D) All of the above 22. The number of disk accesses performed by insertion operation in B-tree of height h is (A) 0(1) (B) 0(1gh) (C) 0(h) (D) None of these 24. The basic variants of time-stampbased method of concurrency control are (A) Total time stamp-ordering (B) Partial time stamp ordering (C) Multiversion Time stamp ordering (D) All of the above A comparison of frequency division and time division multiplexing system shows that (A) FDM requires a lower bandwidth, but TDM has greater noise immunity. (B) FDM has greater noise immunity and requires lower bandwidth than TDM. (C) FDM requires channel synchronization, while TDM has greater noise immunity. (D) FDM requires more multiplex while TDM requires band pass filter. J-87-11 27. 30. If carrier modulated by a digital bit stream, has one one of the possible phase of 0, 90, 180 and 270 degrees, then modulation called (A) BPSK (B) (C) (A) Circuit switching (D) MSK QAM Which of the following switching techniques is most suitable for interactive traffic ? QPSK (B) Message switching (C) Packet switching (D) All of the above 28. Consider the following statement : (i) The bandwidth of the A.M., wave depends on the band width of the modulating signal. (ii) The bandwidth of the A.M., wave depends on the modulation index. 31. Object modules generated by assembler that contains unresolved external references are resolved for two or more object module by a/an (A) Operating system (B) Loader (C) (iii) The bandwidth of the F.M, wave for all practical purpose depends on the amplitude of the carrier. Linker (D) Compiler Of these statements the correct statements are 32. (A) (i, ii) A special software that is used to create a job queue is called (B) (i, iii) (A) Drive (C) (ii, iii) (B) Spooler (C) Interpreter (D) All of the above (D) Linkage editor 29. A smart modem can dial, hangup and answer incoming calls automatically. Can you tell who provides the appropriate instructions to the modem for this purpose ? 33. Which of the following permanent database that has an entry for each terminal symbol ? (A) Communication software (A) Literal table (B) Error detection protocols (B) Identifier table (C) Link access procedure (LAP) (C) Terminal table (D) Source table (D) Telecommunications J-87-11 5 Paper-II 34. 38. In which way(s) a macroprocessor for assembly language can be implemented ? A relationship between processes such that each has some part (critical section) which must not be executed (A) Independent two-pass processor while the critical section of another (B) Independent one-pass processor is being executed, is known as (C) Expand macrocalls substitute arguments (A) Semaphore and (B) Mutual exclusion (C) Multiprogramming (D) All of the above 35. (D) Message passing Which of the following can be accessed by transfer vector approach of linking ? 39. (A) External data segments (B) Data located procedure in ? External subroutine (C) How many states can a process be (A) 3 in (C) other (B) (D) 5 2 4 (D) All of the above 40. 36. Which command allows you to view your file 24 lines at a time ? Block or Buffer caches are used to (A) improve disk performance (A) More (B) handle interrupts (B) Cat (C) increase the capacity of main memory (C) Pg (D) None of the above (D) speed up main memory Read operations 41. 37. A file organization VSAM file is Which one of the items listed below is component not one of the software engineering layers ? (A) Relative records data set (A) Process (B) Keyed sequential data set (B) Manufacturing (C) Entry sequential data set (C) Method (D) All of the above Paper-II (D) Tools 6 J-87-11 42. 46. What is the first stage in program development ? (A) storing data offline at a separate site (B) backing up data regularly (C) is related to data mining (D) uses tape as opposed to disk (A) Specification and design (B) System Analysis (C) Data warehousing refers to Testing (D) None of the above 47. 43. Virtual memory is (A) related to virtual reality (B) a form of ROM (C) a form of RAM (D) None of the above 48. M-Commerce refers to (A) a myth which does not exist in reality (B) the ability of business to reach potential customers wherever they are (C) the ability to have large capacity of memory storage dealing trade and commerce (D) None of the above 49. The principal electronic payment systems for electronic commerce is (A) Credit Card (B) Digital Wallet (C) Electronic Cheque (D) All of the above 50. Which is the most valuable electronic commerce to the individual customer in long run ? (A) Business to Customer (B) Business to Business (C) Customer to Customer (D) None of the above By means of a data flow diagram, the analyst can detect (A) Task duplication (B) Unnecessary delays (C) Task overlapping (D) All of the above 44. Which of these are the 5 generic software engineering framework activities ? (A) Communication, planning, modelling, construction, deployment (B) (C) Communication, risk management, measurement, production, reviewing Analysis, programming, maintenance designing, Debugging, (D) Analysis, planning, designing, programming, testing 45. Many causes of the software crisis can be traced to mythology based on (A) Management Myths (B) Customer Myths (C) Practitioner Myths (D) All of the above J-87-11 7 Paper-II Space For Rough Work D-0109 Paper-II 8 P.T.O. J-87-11

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

 

  Print intermediate debugging step

Show debugging info


 

Additional Info : UGC NET JUN 2011 : COMPUTER SCIENCE AND APPLICATIONS PAPER II
Tags : UGC NET JUN 2011 : COMPUTER SCIENCE AND APPLICATIONS PAPER II , UGC NET DEC 2011 : GENERAL PAPER,UGC NET,GENERAL PAPER  


© 2010 - 2025 ResPaper. Terms of ServiceContact Us Advertise with us

 

jc0def1sh chat