Trending ▼   ResFinder  

UGC NET JUN 2010 : COMPUTER SCIENCE AND APPLICATIONS PAPER II

8 pages, 50 questions, 50 questions with responses, 112 total responses,    0    0
ugc_net
  
+Fave Message
 Home > ugc_net >   F Also featured on: abhijay22 adi30

Instantly get Model Answers to questions on this ResPaper. Try now!
NEW ResPaper Exclusive!

Formatting page ...

Signature and Name of Invigilator 1. (Signature) __________________________ (Name) ____________________________ 2. (Signature) __________________________ (Name) ____________________________ J 87 Time : 1 1/4 hours] 10 (To be filled by the Candidate) Roll No. (In figures as per admission card) Roll N o.____________________________ (In words) Test Booklet No. PAPER-II [Maximum Marks : 100 COMPUTER SCIENCE AND APPLICATIONS Number of Pages in this Booklet : 8 Instructions for the Candidates 1. Write your roll number in the space provided on the top of this page. 2. This paper consists of fifty multiple-choice type of questions. 3. At the commencement of examination, the question booklet will be given to you. In the first 5 minutes, you are requested to open the booklet and compulsorily examine it as below : (i) To have access to the Question Booklet, tear off the paper seal on the edge of this cover page. Do not accept a booklet without sticker-seal and do not accept an open booklet. (ii) Tally the number of pages and number of questions in the booklet with the information printed on the cover page. Faulty booklets due to pages/questions missing or duplicate or not in serial order or any other discrepancy should be got replaced immediately by a correct booklet from the invigilator within the period of 5 minutes. Afterwards, neither the Question Booklet will be replaced nor any extra time will be given. (iii) After this verification is over, the Test Booklet Number should be entered in the OMR Sheet and the OMR Sheet Number should be entered on this Test Booklet. 4. Each item has four alternative responses marked (A), (B), (C) and (D). You have to darken the oval as indicated below on the correct response against each item. B C A Example : D where (C) is the correct response. 5. Your responses to the items are to be indicated in the Answer Sheet given inside the Paper I Booklet only. If you mark at any place other than in the ovals in the Answer Sheet, it will not be evaluated. 6. Read instructions given inside carefully. 7. Rough Work is to be done in the end of this booklet. 8. If you write your name or put any mark on any part of the test booklet, except for the space allotted for the relevant entries, which may disclose your identity, you will render yourself liable to disqualification. 9. You have to return the test question booklet and OMR Answer sheet to the invigilators at the end of the examination compulsorily and must not carry it with you outside the Examination Hall. 10. Use only Blue/Black Ball point pen. 11. Use of any calculator or log table etc., is prohibited. 12. There is no negative marks for incorrect answers. D-0109 J-87-10 OMR Sheet No. : ......................................... Number of Questions in this Booklet : 50 1. 2. - 3. , - - : (i) - - (ii) - / - - (iii) - OMR OMR - 4. (A), (B), (C) (D) B C A D : (C) 5. I - , 6. 7. (Rough Work) 8. - , 9. - OMR - 10. / 11. ( ) 12. P.T.O. 1 P.T.O. COMPUTER SCIENCE & APPLICATIONS Paper II Note : This paper contains fifty (50) objective type questions, each question carrying two (2) marks. Attempt all the questions. 1. x1 is a clone of x means x1 is identical to x in terms of the physical attributes namely, height, weight and complexion. Given, height, weight and complexion only form a complete set of attributes for an entity, cloning is an equivalence relation. What is your impression about this statement ? 3. The statement is false (C) The truth value of the statement cannot be computed (D) None of these 4. 2. R is a robot of M means R can perform some of the tasks that otherwise M would do and R is unable to do anything else. Which of the following is the most appropriate representation to model this situation ? (A) (B) (C) (D) None of these Paper-II x (aba)3 x a.(baa)3 1. ba x ab.(aab).3 1.a (ii) and (iii) are same, (i) is different. (B) (ii) and (iii) are not same. (C) (i), (ii) and (iii) are different. (D) (i), (ii) and (iii) are same. (i) (ii) (iii) (A) (A) The statement is true (B) My Lafter Machin (MLM) recognizes the following strings : (i) a (ii) aba (iii) abaabaaba (iv) abaabaabaabaabaabaabaabaaba Using this as an information, how would you compare the following regular expressions ? 2 S1 : I teach algorithms and maths. S2 : My professor teaches maths, electronics and computer science. S3 : I have a student of maths. S4 : Algorithm is a part of computer science. S5 : Maths students know computer science. What would be the chromatic number of a graph, vertices of which are the actors/entities that are involved in the sentences S1 to S5 and edges-to represent the associations/relationships amongst the entities/actors as expressed in the sentences S1 to S5 above ? (A) 2 (B) 3 (C) 4 (D) None of these J-8710 5. 7. Four your ATM debit card, you have a 4-decimal-digit personal secret code. In the absence of any clue, a brute-force attack takes time- t to crack the code on an ATM terminal. Therefore t is the secure-time for a customer to report in case the card is misplaced. Your Bank has decided to facilitate an increased secure-time. Out of the following, which option should provide the largest rise in the value of t ? (A) faster operation (B) (C) ease of avoiding problems due to hazard (C) lower hardware requirement (D) better noise immunity 8. What is the transitive voltage for the voltage input of a CMOS operating from 10V supply ? (A) 1V 9. Instead of 4-decimal digits, maintain a 5-decimal-digit personal secret code. (B) (C) (A) Instead of 4-decimal-digits, maintain the personal secret code in 4-hexadecimal-digits. (B) Advantage of synchronous sequential circuits over asynchronous ones is (D) 10 V 5V 2V What is decimal equivalent of BCD 11011.1100 ? (A) 22.0 (C) Reduce the processing speed of the ATM terminals to the half of their current speed. 10. (B) (D) 21.2 20.2 22.2 The function represented by the kmap given below is BC (D) None of the above provides any improvement. A 0 0 1 1 6. 1 0 0 1 (A) A B The logic expression for the output of the circuit shown in the figure is (B) AB + BC + CA (C) B C (D) A B C 11. (A) AC + BC + CD (B) (C) print f ( % d , 10 ? 0 ? 5 : 1 : 12); AC + BC + CD will print ABC + CD (A) 10 3 (B) (C) (D) AB + BC + CD J-8710 The statement (D) 1 12 0 Paper-II 12. 13. 17. (C) Generalization is _______ process. (A) top-down (B) bottom up (C) both (A) & (B) (D) None of these Match the following : I. 2 NF (a) transitive dependencies eliminated II. 3 NF (b) multivalued attribute removed III. 4 NF (c) contain no partial functional dependencies IV. 5 NF (d) contains no join dependency Codes : I II III IV (A) (a) (c) (b) (d) (B) (d) (a) (b) (c) (C) (c) (d) (a) (b) (D) (d) (b) (a) (c) (D) derive protected public An entity instance is a single occurrence of an _______. (A) entity type (B) relationship type (C) entity and relationship type (D) None of these 18. (B) The data type created by the data abstraction process is called (A) class (B) structure (C) abstract data type (D) user defined data type 16. Member of a class specified as _______ are accessible only to method of the class. (A) private 14. 15. What will be the output of the following c-code ? void main ( ) { char *P = "ayqm" ; char c; c = ++*p ; printf ("%c", c); } (A) a (B) c (C) b (D) q Match the following : (a) Garbage collection in 1. Java (b) Nameless object 2. generic programming (c) Template support 3. defines a class (d) A forward 4. reference member function (e) Derived 5. class inherits from base class within a statement Codes : (a) (b) (c) (d) (e) (A) 1 5 4 2 3 (B) 1 5 2 3 4 (C) 5 1 2 3 4 (D) 5 4 3 1 2 Paper-II 4 J-8710 19. Which data management language component enabled the DBA to define the schema components ? (A) DML (B) Sub-schema DLL (C) Schema DLL (D) All of these 20. The PROJECT Command will create new table that has (A) more fields than the original table (B) more rows than original table (C) both (A) & (B) (D) none of these 21. 24. 25. 22. 27. What does the URL need to access documents ? I. Path name II. Host name III. DNS IV. Retrieval method V. Server port number (A) I, II, III (B) I, III, V (C) I, II, IV (D) III, IV, V 28. In a complete binary tree of n nodes, how far are the two most distant nodes ? Assume each edge in the path counts as ! (A) About log2n (B) About 2 log2n (C) About n log2n (D) About 2n The ______ field is the SNMP PDV reports an error in a response message. (A) error index (B) error status (C) set request (D) agent index End-to-End connectivity is provided from Last-to-Last in (A) Network layer (B) Session layer (C) Transport layer (D) Data link layer What is the most appropriate data structure to implement a priority queue ? (A) Heap (B) Circular array (C) Linked list (D) Binary tree 23. In a B tree of order 5, the following keys are inserted as follows : 7, 8, 1, 4, 13, 20, 2, 6 and 5 How many elements are present in the root of the tree ? (A) 1 (B) 2 (C) 3 (D) 4 26. If we have six stack operationspushing and popping each of A, B and C-such that push (A) must occur before push (B) which must occur before push (C), then A, C, B is a possible order for the pop operations, since this could be our sequence : push (A), pop (A), push (B), push (C), pop (C), pop (B). Which one of the following orders could not be the order the pop operations are run, if we are to satisfy the requirements described above ? (A) ABC (B) CBA (C) BAC (D) CAB A chained hash table has an array size of 100. What is the maximum number of entries that can be placed in the table ? (A) 100 (B) 200 (C) 10000 (D) There is no upper limit J-8710 5 Paper-II 29. 34. 30. 36. Match the following : (a) Disk 1. Round-robin scheduling (b) Batch 2. SCAN processing (c) Time 3. LIFO sharing (d) Interrupt 4. FIFO processing Codes : (a) (b) (c) (d) (A) 3 4 2 1 (B) 4 3 2 1 (C) 2 4 1 3 (D) 1 4 3 2 37. ________ synchronizes critical resources to prevent dead lock. (A) P-operator (B) V-operator (C) Semaphore (D) Swapping 38. In an absolute loading scheme, which loader function is accomplished by a loader ? (A) Re-allocation (B) Allocation (C) Linking (D) Loading Which of the following is used for grouping of characters into tokens (in a computer) ? (A) A parser (B) Code optimizer (C) Code generator (D) Scanner _______ is one of pre-emptive scheduling algorithm. (A) RR (B) SSN (C) SSF (D) Priority based What is the maximum operating rate of a wireless LAN using infrared communication ? (A) 1 mbps (B) 2 mbps (C) 5 mbps (D) 11mbps 31. Which of the following is the most general phase structured grammar ? (A) Regular (B) Context-sensitive (C) Context free (D) None of the above 35. What services does the internet layer provide ? 1. Quality of service 2. Routing 3. Addressing 4. Connection oriented delivery 5. Framing bits (A) 1, 2, 3 (B) 2, 3, 4 (C) 1, 3, 4, 5 (D) 2, 3, 4, 5 32. Which of the following expression is represented by the parse tree ? (A) (A + B) * C (B) A + * BC (C) A + B * C (D) A * C + B 33. Consider the following left associative operators in decreasing order of precedence : subtraction (highest precedence) * multiplication $ exponentiation (lowest precedence) What is the result of the following expression ? 3 2 * 4 $ | * 2**3 (A) 61 (B) 64 (C) 512 (D) 4096 Paper-II 6 J-8710 39. In order to allow only one process to enter its critical section, binary semaphore are initialized to (A) 0 (B) 1 (C) 2 (D) 3 40. Remote Computing Service involves the use of time sharing and _______. (A) multi-processing (B) interactive processing (C) batch processing (D) real-time processing 41. 42. 43. 46. 47. Software engineering primarily aims on (A) reliable software (B) cost effective software (C) reliable and cost effective software (D) none of the above (D) T4 7 At any given time Parallel Virtual Machine (PVM) has ________ send buffer and ________ receive buffer. (A) one-one (B) one-two (C) two-two (D) two-one 50. Applications-software (A) is used to control the operating system (B) includes programs designed to help programmers (C) performs a specific task for computer users (D) all of the above CDMA Cell uses ________ carriers of 1.25 MHz. (A) 9 (B) 18 (C) 22 (D) 64 49. Design phase will usually be (A) top-down (B) bottom-up (C) random (D) centre fringing J-8710 T3 48. Which model is simplest model in Software Development ? (A) Waterfall model (B) Prototyping (C) Iterative (D) None of these 45. A leased special high-speed connection from the local telephone carrier for business users that transmits at 1.544 mbps is known as ________ carrier. (A) T1 (B) T2 (C) Top-down design does not require (A) step-wise refinement (B) loop invariants (C) flow charting (D) modularity 44. The cost of the network is usually determined by (A) time complexity (B) switching complexity (C) circuit complexity (D) none of these Data Mining uses ________, ________ and ________ to build effective predictive model. (i) Data set (ii) Information set (iii) Input set (iv) Process set (v) Output set (vi) Test set (A) (i), (ii) and (iv) (B) (ii), (iv) and (v) (C) (i), (v) and (vi) (D) (ii), (iii) and (v) Paper-II Space For Rough Works Paper-II 8 J-8710

Formatting page ...

Top Contributors
to this ResPaper
(answers/comments)


preeth

(19)

me2rahul

(13)

sunilverma

(9)

diya

(9)

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

 

  Print intermediate debugging step

Show debugging info


 

Additional Info : Ugc Net June 2010 Question Paper - Computer Science And Applications Paper II
Tags : cbse ugc net question papers, UGC NET Solved Sample Question Paper, UGC NET Exam Papers, ugc net past question papers, ugc net syllabus, ugc net specimen, ugc net study material, UGC NET Study Materials FREE, UGC NET Exam Pattern, Free Ugc Net Online Practice Tests, ugc net previous question papers, central board of secondary education,  

© 2010 - 2025 ResPaper. Terms of ServiceContact Us Advertise with us

 

ugc_net chat