Trending ▼   ResFinder  

UGC NET DEC 2005 : COMPUTER SCIENCE AND APPLICATIONS PAPER II

7 pages, 50 questions, 51 questions with responses, 66 total responses,    0    0
ugc_net
  
+Fave Message
 Home > ugc_net >

Formatting page ...

Signature and Name of Invigilator Answer Sheet No. : ................................................ (To be filled by the Candidate) 1. (Signature) Roll No. (Name) (In figures as per admission card) Roll No. 2. (Signature) (In words) (Name) Test Booklet No. D 8 7 0 5 PAPER II COMPUTER APPLICATIONS Time : 1 hours] Number of Pages in this Booklet : 8 [Maximum Marks : 100 Number of Questions in this Booklet : 50 U Instructions for the Candidates 1. Write your roll number in the space provided on the top of this page. 1. U DU U S U U U U 2. This paper consists of fifty multiple-choice type of questions. 3. U U U, - S U U U 3. At the commencement of examination, the question booklet will be given to you. In the first 5 minutes, you are requested to open the booklet and compulsorily examine it as below : (i) 2. - - S U (i) - S U U U U S U U- U S S U U (ii) To have access to the Question Booklet, tear off the paper seal on the edge of this cover page. Do not accept a booklet without sticker-seal and do not accept an open booklet. U DU U U U - S DU U U U U U U S DU / U U U U U S S U U U U U S U U - S U U - S U UQ (ii) (iii) 4. Tally the number of pages and number of questions in the booklet with the information printed on the cover page. Faulty booklets due to pages/questions missing or duplicate or not in serial order or any other discrepancy should be got replaced immediately by a correct booklet from the invigilator within the period of 5 minutes. Afterwards, neither the question booklet will be replaced nor any extra time will be given. After this verification is over, the Serial No. of the booklet should be entered in the Answer-sheets and the Serial No. of Answer Sheet should be entered on this Booklet. (iii) - S R U- U Each item has four alternative responses marked (A), (B), (C) and (D). You have to darken the oval as indicated below on the correct response against each item. 4. U U (A), (B), (C) (D) Example : A B C U U U U- R - S U U U U U U U D where (C) is the correct response. 5. Read instructions given inside carefully. 7. Rough Work is to be done in the end of this booklet. 8. If you write your name or put any mark on any part of the test booklet, except for the space allotted for the relevant entries, which may disclose your identity, you will render yourself liable to disqualification. 9. C D U U U S U U U , U 6. U U 7. (Rough Work) S DU U U 8. U- S U , U U U U 9. U # U U- S U U U U U # U U U You have to return the test question booklet to the invigilators at the end of the examination compulsorily and must not carry it with you outside the Examination Hall. / U Z U S U U ( U U) U U 12. U U 10. 10. Use only Blue/Black Ball point pen. 11. 11. Use of any calculator or log table etc., is prohibited. 12. There is NO negative marking. D 8705 B 5. U U I U U- U Your responses to the items are to be indicated in the Answer Sheet given inside the Paper I booklet only. If you mark at any place other than in the ovals in the Answer Sheet, it will not be evaluated. 6. A ( C) U 1 P.T.O. Computer Science and Applications PAPER II Note : 1. This paper contains fifty (50) objective-type questions, each question carrying two (2) marks. Attempt all of them. T is a graph with n vertices. T is connected and has exactly n-1 edges, then : (A) (B) T contains no cycles (C) Every pairs of vertices in T is connected by exactly one path (D) 2. T is a tree All of these If the proposition 7 P Q is true, then the truth value of the proportion 7 PV (P Q) is : (A) (B) Multi - Valued (C) 3. True Flase (D) Can not determined Let A and B be two arbitrary events, then : (A) (B) P(P B) 5 P(A) 1P (B) (C) 4. P(A B) 5 P(A) P (B) P(A B) [ P(A) 1P (B) (D) P(A/B) 5 P(A B) 1P (B) Which sentence can be generated by S d/bA, A d/ccA : (A) 5. (B) aabccd (C) ababccd (D) abbbd {a, b} (D) None of these Regular expression a1b denotes the set : (A) 6. bccddd {a} (B) {e, a, b} (C) Which of the following is divisible by 4 ? (A) (B) 1110001110001 (C) 7. 100101100 11110011 (D) 10101010101010 A half-adder is also known as : (A) AND Circuit (B) NAND Circuit (C) NOR Circuit (D) EX-OR Circuit D 8705 2 8. Consider the following sequence of instructions : a5a b, b5a b, a5b a This Sequence (A) (B) complements the value of a and b (C) swap a and b (D) 9. retains the value of the a and b negates values of a and b Consider the following circuit : to make it a Tautology the (A) 10. NAND gate (B) should be : AND gate (C) OR gate EX-OR gate When an inventor is placed between both inputs of an S-R flip flop, the resulting flip flop is : (A) JK flip-flop (B) D-flip-flop (C) 11. (D) T flip-flop (D) None of these What is the output of the following C-program main () : {print f(''%d%d%d'', size of (3.14f), size of (3.14), size of (3.141));} (A) 12. (B) 4 8 10 (C) 848 (D) 888 (C) 42 (D) 39 The bitwise OR of 35 with 7 in C will be : (A) 13. 444 35 (B) 7 Data members and member function of a class by default is repectively : (A) (B) public (C) 14. private and public public and private (D) private Function over loading done at : (A) Runtime (B) Compile time (C) Linking time (D) Switching from function to function D 8705 3 P.T.O. 15. What will be the value of i for the following expression : int i511, i53 ; i15(f >3) ? i & 2:5 ; (A) 16. 2 (B) 5 (C) 13 (D) data elements (B) record relationship (D) all of the above One approach to standarolizing storing of data : (A) MIS (B) CODASYL (C) Structured Programing (D) None of the above In a relational schema, each tuple is divided in fields called : (A) 19. Relations (B) Domains (C) Queries An embedded printer provides : (A) Physical record key (B) An inserted Index (C) 20. A secondary access path (D) All the above A locked file can be : (A) accessed by only one user (B) modified by users with the correct possword (C) is used to hide sensitive imformation (D) 21. both (B) and (C) In what tree, for every node the height of its left subtree and right subtree differ at least by one : (A) Binary search tree (B) AVL - tree (C) 22. All the above records and files (C) 18. (D) A schema describes : (A) 17. 12 Threaded binary tree (D) Complete tree A hash function f defined as f(key)5key mod 7, with linear probing it is used to insert the key 37,38,72,48,98,11,56 into a table index from 0 to 6. What will be the locations of 11 : (A) D 8705 3 (B) 4 (C) 4 5 (D) 6 23. Consider the graph, which of the following is a valid topological sorting ? (A) 24. ABCD (B) BACD (C) BADC (D) The initial configuration of quaue is a, b, c, d. a is at the front. To get the configuration d, c, b, a how many deletions and additions required : (A) 2 deletions, 3 additions (B) 3 deletions, 2 additions (C) 25. 3 deletions, 4 additions (D) 3 deletions, 3 additions Which traversal techniques lists the nodes of a binary search tree in ascending order ? (A) post - order (B) in - order (C) 26. pre - order (D) linear - order The data unit in the TCP/IP application Layer is called a __________ . (A) 27. (B) segment (C) datagram HTML (B) Veronica (C) DNS (B) FTP (C) TELNET HTTP (D) All the above __________ provide a method to recover data that has been delivered but not get used : Segmentation (B) Concatenation (C) Transalation (D) Synchronization Encryption and decryption are the functions of the __________ layer of OSI model : (A) 31. frame (D) WAIS (A) 30. (D) Which of following is an example of a client - server model : (A) 29. message Which of following file retrieval methods use hypermedia ? (A) 28. ABDC transport (B) session (C) router (D) presentation The Register or main memory location which contains the effective address of the operand is known as : (A) Pointer (B) Indexed register (C) Special Locations (D) Scratch Pad D 8705 5 P.T.O. 32. 33. A Top - down Parse generates : (A) Left most derivation (C) Right - most derivation in reverse (B) (D) Right - most derivation Left - most derivation in reverse A general macroprocessor is an in built function of : (A) Loader (B) Linker (C) Editor (D) Assembler 34. Which of the following is not collision Resolution Technique : (A) Hash addressing (B) Chainning (C) Indexing (D) None of these 35. Which activities is not included in the first pass of two pass assembler ? (A) build the symbol table (B) construct the Intermediate code (C) separate memonic opcode and operand field. (D) none of these 36. Producer consumer problem can be solved using : (A) semaphores (B) event counters (C) monitors (D) all the above 37. If you want to execute more than one program at a time, the systems software that are used must be capable of : (A) word processing (B) virtual memory (C) compiling (D) multitasking 38. Which of the following checks cannot be carried out on the input data to a system ? (A) Consistency check (B) Syntax check (C) Range check (D) All the above 39. Nonmodifiable procedures are called : (A) Serially usable procedure (B) (C) Reentrant procedure (D) Concurrent procedure Topdown procedure 40. Banker s algorithm is used for __________ purpose : (A) Deadlock avoidance (B) Deadlock removal (C) Deadlock prevention (D) Deadlock continuations 41. The testing of software against SRS is called : (A) Acceptance testing (B) Integration testing (C) Regression testing (D) Series testing D 8705 6 42. The lower degree of cohesion is : (A) (B) coincidential cohesion (C) 43. logical cohesion procedural cohesion (D) communicational cohesion The Reliability of the software is directly dependent upon : (A) (B) Programmer s experience (C) 44. Quality of the design Number of error (D) Set of user requirements Succesive layer of design in software using but ton-up design is called : (A) (B) Layer of Construction (C) 45. Layer of Definement Layer of abstraction (D) None of the above Sliding window concept of software project management is : (A) (B) Preperation of the various stages of development (C) Ad-hoc planning (D) 46. Preperation of comprehenciable plan Requirement analysis Which of the following transonission media is used in Blue tooth Technology : (A) (B) Microwave links (C) 47. Radio links VSAT Communication (D) Fiber - optic Which of the following is a EDI standard ? (A) 48. (B) ANSI X.14 (C) ANSI X.13 OLTP (B) OLAP (C) OLDP ANSI X.12 (D) TLPP The cost of the network is usually determined by : (A) Time complexity (B) Switching complexity (C) 50. (D) Analysis of large database to retrive information is called : (A) 49. ANSI X.15 Circuit complexity (D) None of these The mechanism with which several uses can share a medium without interference is : (A) Frequency modulation (B) Amplitude modulation (C) Multiplexing (D) None of these -o0oD 8705 7 P.T.O.

Formatting page ...

Formatting page ...

Top Contributors
to this ResPaper
(answers/comments)


jc0def1sh

(31)

rajneesh2013

(8)

amanugc

(7)

geethubejith

(6)

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

 

  Print intermediate debugging step

Show debugging info


 

Additional Info : Ugc Net December 2005 Question Paper - Computer Science And Applications Paper II
Tags : cbse ugc net question papers, UGC NET Solved Sample Question Paper, UGC NET Exam Papers, ugc net past question papers, ugc net syllabus, ugc net specimen, ugc net study material, UGC NET Study Materials FREE, UGC NET Exam Pattern, Free Ugc Net Online Practice Tests, ugc net previous question papers, central board of secondary education,  


© 2010 - 2025 ResPaper. Terms of ServiceContact Us Advertise with us

 

ugc_net chat