Saturday, 30 November 2013

Computer Science Questions and Answers


1. A 2MB PCM(pulse code modulation) has 
a) 32 channels 
b) 30 voice channels & 1 signaling channel. 
c) 31 voice channels & 1 signaling channel. 
d) 32 channels out of which 30 voice channels, 1 signaling channel, 
& 1 Synchronization channel.
Ans: (c)

2. Time taken for 1 satellite hop in voice communication is 
a) 1/2 second 
b) 1 seconds 
c) 4 seconds 
d) 2 seconds
Ans: (a)

3. Max number of satellite hops allowed in voice communication is : 
a) only one 
b) more than one 
c) two hops 
d) four hops
Ans: (c)

4. What is the max. decimal number that can be accommodate in a byte. 
a) 128 
b) 256 
c) 255 
d) 512
Ans: (c)
 
5. Conditional results after execution of an instruction in a micro processor 
is stored in 
a) register 
b) accumulator 
c) flag register 
d) flag register part of PSW(Program Status Word)

Ans: (d)

6. Frequency at which VOICE is sampled is 
a) 4 Khz 
b) 8 Khz 
c) 16 Khz 
d) 64 Khz
Ans: (a)

7. Line of Sight is  
 a) Straight Line 
b) Parabolic  
c) Tx & Rx should be visible to each other 
d) none
Ans: (c)

8. Purpose of PC (Program Counter) in a Micro Processor is 
a) To store address of TOS (Top of Stack) 
b) To store address of next instruction to be executed. 
c) Count the number of instructions. 
d) To store base address of the stack.
Ans: (b)

9. What action is taken when the processor under execution is interrupted by  a non-mask able interrupt? 
a) Processor serves the interrupt request after completing the execution of the
 current instruction. 
b) Processor serves the interrupt request after completing the current task. 
c) Processor serves the interrupt request immediately. 
d) Processor serving the interrupt request depends upon the priority of the current
 task under execution.
Ans: (a)

10. The status of the Kernel is 
a) task 
b) process 
c) not defined. 
d) None of the above.
Ans: (b)

11. To send a data packet using datagram, connection will be established 
a) before data transmission. 
b) Connection is not established before data transmission. 
c) No connection is required. 
d) None of the above.
Ans: (c)
 
12. Word alignment is 
a) aligning the address to the next word boundary of the machine. 
b) Aligning to even boundary. 
c) Aligning to word boundary. 
d) None of the above.
Ans: (a)

13. When a 'C' function call is made, the order in which parameters passed to the function are pushed into the stack is 
a) left to right 
b) right to left 
c) bigger variables are moved first than the smaller variables. 
d) Smaller variables are moved first than the bigger ones. 
e) None of the above.
Ans: (b)

14. What is the type of signaling used between two exchanges? 
a) inband 
b) common channel signaling 
c) any of the above 
d) none of the above.
Ans: (a)

15.Buffering is  
a) the process of temporarily storing the data to allow for small variation in  device speeds 
b) a method to reduce cross talks 
c) storage of data within transmitting medium until the receiver is ready
 to receive. 
d) a method to reduce routing overhead.
Ans: (a)
 
16. Memory allocation of variables declared in a program is 
 a) allocated in RAM. 
b) Allocated in ROM. 
c) allocated on stack. 
d) Assigned to registers.
Ans: (c)
 
17. A software that allows a personal computer to pretend as a computer terminal is  
a) terminal adapter 
b) bulletin board 
c) modem 
d) terminal emulation
Ans: (d)

18. Find the output of the following program
int *p,*q; 
p=(int *)1000; 
q=(int *)2000; 
printf("%d",(q-p)); 
Ans: 500
 
19. Which addressing mode is used in the following statements:
(a) MVI B, 55  
(b) MOV B,A  
(c) MOV M,A
Ans. (a) immediate addressing mode. 
(b) Register Addressing Mode 
(c) Direct addressing mode
 
20. RS-232C standard is used in _____________.
Ans. Serial I/O

21. Memory. Management in Operating Systems is done by 
a) Memory Management Unit 
b) Memory management software of the Operating System 
c) Kernel
Ans: (b)
 
22. What is done for a Push operation?
Ans: SP is decremented and then the value is stored.

23. Binary equivalent of 52 
 Ans. 110100 
 24. Hexadecimal equivalent of 3452 
 Ans. 72A 
  
25. Explain Just In Time Concept? 
 Ans. Elimination of waste by purchasing manufacturing exactly when needed 
  
26. A good way of unit testing s/w program is 
 Ans. User test 
  
27. OOT uses 
 Ans. Encapsulated of detect methods 
  
28.EDI useful in 
 Ans. Electronic Transmission 
  
29. MRPII different from MRP 
 Ans. Modular version of man redundant initials 
  
30. Hard disk time for R/W head to move to correct sector 
 Ans. Latency Time 
  
31. The percentage of times a page number bound in associate register is called 
 Ans. Bit ratio 
  
32. Expand MODEM 
Ans. Modulator and Demodulator 
  
33. RDBMS file system can be defined as 
 Ans. Interrelated 
  
34. Super Key is 
Ans. Primary key and Attribute 
  
35. Windows 95 supports 
(a) Multi-user  
(b) n tasks  
(c) Both 
(d) None 
Ans. (a) 
 
 36.In the command scanf, h is used for  
 Ans. Short int 
  
37.A process is defined as 
Ans. Program in execution 
  
38.A thread is 
Ans. Detachable unit of executable code) 
  
39.What is the advantage of Win NT over Win 95  
Ans. Robust and secure 
 
40.How is memory management done in Win95  
Ans. Through paging and segmentation 
 
41.What is meant by polymorphism 
Ans. Redefinition of a base class method in a derived class 
  
42.What is the essential feature of inheritance  
Ans. All properties of existing class are derived 
  
43.What does the protocol FTP do 
Ans. Transfer a file b/w stations with user authentication 
  
44.In the transport layer ,TCP is what type of protocol 
Ans. Connection oriented 
  
45.Why is a gateway used  
Ans. To connect incompatible networks 
  
46.How is linked list implemented 
Ans. By referential structures 
  
47.What method is used in Win95 in multitasking 
Ans. Non preemptive check 
  
48.What is a semaphore  
Ans. A method synchronization of multiple processes 
  
49.What is the precedence order from high to low ,of the symbols ( ) ++ /  
Ans.( ) , ++, / 
 
50.Preorder of A*(B+C)/D-G 
Ans.*+ABC/-DG 
 
51.What is the efficiency of merge sort  
Ans. O(n log n) 
  
52.In which layer are routers used  
Ans.In network layer  
  
53.Which of the following sorting algorithm has average sorting behavior -- Bubble sort,merge sort,heap sort,exchange sort 
Ans. Heap sort 
  
54.In binary search tree which traversal is used for getting ascending order values--Inorder ,postorder,preorder 
 Ans.Inorder 
  
55.What are device drivers used for  
 Ans.To provide software for enabling the hardware 
  
56.What is fork command in unix  
 Ans. System call used to create process 
 
 57.What is make command in unix 
 Ans. Used for creation of more than one file 
  
58.In unix .profile contains  
 Ans. Start up program 
  
59.In unix 'ls 'stores contents in 
 Ans.inode block

 60. Which of the following involves context switch,
(a) system call  
(b) priviliged instruction 
(c) floating poitnt exception 
(d) all the above 
(e) none of the above
Ans: (a)
 
61. In OST, terminal emulation is done in
(a) sessions layer  
(b) application layer  
(c) presentation layer  
(d) transport layer
Ans: (b)

62. For 1 MB memory, the  number of address lines required,
(a)11  
(b)16  
(c)22  
(d) 24
Ans. (b)

63. Semaphore is used for
(a) synchronization  
(b) dead-lock avoidence 
(c) box  
(d) none
Ans. (a)

64. Which holds true for the following statement
     class c: public A, public B
a) 2 member in class A, B should not have same name 
b) 2 member in class A, C should not have same name 
c) both  
d) none
Ans. (a)

65.Preprocessor.. does not do which one of the following
(a) macro 
(b) conditional complication 
(c) in type checking  
(d) including load file
Ans. (c)
 
66. Piggy backing is a technique for
a) Flow control  
b) Sequence  
c) Acknowledgement  
d) retransmission
Ans. (c)

67. Which is not a memory management scheme?
a) buddy system 
b) swapping 
c) monitors 
d) paging 
Ans : c

68. There was a circuit given using three NAND gates with two inputs and one output. 
    Find the output.
a) OR 
b) AND 
c) XOR 
d) NOT
Ans. (a)

69.I integrated check value(ICV) are used as:
Ans. The client computes the ICV and then compares it with the senders value.

70. When applets are downloaded from web sites , a byte verifier performs _________?
Ans. Status check.

71. An IP/IPX packet received by a computer using... having IP/IPX  both 
how the packet is handled.
Ans. Read the, field in the packet header with to send IP or IPX protocol.

72. The UNIX shell ....
a) does not come with the rest of the system 
b) forms the interface between the user and the kernal 
c) does not give any scope for programming 
d) deos not allow calling one program from with in another 
e) all of the above
Ans. (b)

73. In UNIX a files i-node ......?
Ans. Is a data structure that defines all specifications of a file like the file size,  
        number of lines to a file, permissions etc.

74. The very first process created by the kernel that runs till the kernel 
process is halts is
a) init 
b) getty 
c) both (a) and (b) 
d) none of these
Ans. (a)

75. In the process table entry for the kernel process, the process id value is
(a) 0  
(b) 1  
(c) 2  
(d) 255  
(e) it does not have a process table entry
Ans. (a)

 
76. Which of the following API is used to hide a window
a) ShowWindow 
b) EnableWindow 
c) MoveWindow 
d) SetWindowPlacement 
e) None of the above
Ans. (a)

77. Which function is the entry point for a DLL in MS Windows 3.1
a) Main 
b) Winmain 
c) Dllmain 
d) Libmain 
e) None
Ans. (b)

78. The standard source for standard input, standard output and standard error is
a) the terminal 
b) /dev/null 
c) /usr/you/input, /usr/you/output/, /usr/you/error respectively 
d) None
Ans. (a)

79. The redirection operators > and >>
a) do the same function 
b) differ : > overwrites, while >> appends 
c) differ : > is used for input while >> is used for output 
d) differ : > write to any file while >> write only to standard output 
e) None of these
Ans. (b)

80. The command grep first second third /usr/you/myfile
a) prints lines containing the words first, second or third from the 
file /usr/you/myfile 
b) searches for lines containing the pattern first in the files 
second, third, and /usr/you/myfile and prints them 
c) searches the files /usr/you/myfiel and third for lines containing the 
words first or second and prints them 
d) replaces the word first with the word second in the files third 
and /usr/you/myfile 
e) None of the above
Ans. (b)

81. You are creating a Index on EMPNO column in the EMPLOYEE table. 
Which statement will you use? 
a) CREATE INdEX emp_empno_idx ON employee, empno; 
b) CREATE INdEX emp_empno_idx FOR employee, empno; 
c) CREATE INdEX emp_empno_idx ON employee(empno);  
d) CREATE emp_empno_idx INdEX ON employee(empno); 
 Ans. c
 
82. Which program construct must return a value? 
a) Package 
b) Function  
c) Anonymous block 
d) Stored Procedure 
e) Application Procedure 
 Ans. b
 
83. Which Statement would you use to remove the EMPLOYEE_Id_PK PRIMARY KEY 
constraint and all depending constraints fromthe EMPLOYEE table? 
a) ALTER TABLE employee dROP PRIMARY KEY CASCAdE;  
b) ALTER TABLE employee dELETE PRIMARY KEY CASCAdE; 
c) MOdIFY TABLE employee dROP CONSTRAINT employee_id_pk CASCAdE; 
d) ALTER TABLE employee dROP PRIMARY KEY employee_id_pk CASCAdE; 
e) MOdIFY TABLE employee dELETE PRIMARY KEY employee_id_pk CASCAdE; 
 Ans. a
 
84. Which three commands cause a transaction to end? (Chosse three) 
a) ALTER 
b) GRANT  
c) DELETE 
d) INSERT 
e) UPdATE 
f) ROLLBACK 
Ans. a ,b ,f

85. Under which circumstance should you create an index on a table? 
a) The table is small. 
b) The table is updated frequently. 
c) A columns values are static and contain a narrow range of values 
d) Two columns are consistently used in the WHERE clause join condition of SELECT  
     statements. 
 Ans.d

86. What was the first name given to Java Programming Language.  
 a) Oak - Java 
b) Small Talk 
c) Oak 
d) None 
Ans.a 

Friday, 29 November 2013

Important Day's to remember!

INDIA
January 9 Pravasiya Bharatiya Divas
January 12 National Youth Day
January 15 Army Day
January 25 Tourism Day
January 26 Republic Day
January 30 Martyrs' Day
February 28 National Science Day
March 3 National Defence Day
March 4 National Security Day
March 16 National Vaccination Day
April 5 National Maritime Day
May 11 National Technology Day
July 26 Kargil Victory Day
August 9 Quit India Day
August 15 Independence Day
August 20 Sadbhavna Divas
August 29 National Sports Day
September 5 Teachers' Day; Sanskrit Day
October 2 Gandhi Jayanthi
October 8 Indian Air Force Day
October 10 National Postal Day
November 14 Children’s Day
November 26 Law Day
December 4 Navy Day
December 7 Flag Day
December 18 Minorities Rights Day
December 14 National Energy Conservation Day
December 23 Farmers Day

INTERNATIONAL
January 10 World Laughter Day
January 26 International Customs Day
January 30 World Leprosy Eradication Day
March 8 International Women’s Day; International Literacy Day
March 15 World Disabled Day; World Consumer Rights Day
March 19 World Disabled Day
March 21 World Forestry Day; International Day for the Elimination of Racial Discrimination.
March 22 World Day for Water
March 23 World Meteorological Day
March 24 World TB Day
April 7 World Health Day
April 17 World Haemophilia Day
April 18 World Heritage Day
April 22 Earth Day
April 23 World Book and Copyright Day
May 1 International Labour Day
May 3 Press Freedom Day, International Energy Day
May 8 World Red Cross Day
May 12 International Nurses Day
May 15 International Day of the Family
May 17 World Telecom Day
May 24 Commonwealth Day
May 31 Anti-tobacco Day
June 5 World Environment Day
July 1 Doctor's Day
July 11 World Population Day
August 6 Hiroshima Day
August 9 Nagasaki Day
August 12 International Youth Day
August 19 World Photography Day
September 8 World Literary Day
September 15 International Day of Democracy
September 16 World Ozone Day
September 26 Day of the Deaf
September 27 World Tourism Day
October 1 International Day for the Elderly
October 2 International Non-violence Day; World Wetlands Day
October 3 World Habitat Day
October 4 World Animal Welfare Day
October 9 World Postal Day
October 10 World Mental Health Day
October 12 World Sight Day
October 16 World Food Day
October 17 International Poverty Eradication Day
October 24 United Nations Day
October 30 World Thrift Day
November 14 Diabetes Day
December 1 World AIDS Day
December 10 Human Rights Day
December 11 UNICEF Day

Tuesday, 12 November 2013

UGC NET JUNE-13 PAPER-I

1.‘www’ stands for - world wide web

2.A hard disk is divided into tracks which is further subdivided into - Sectors

3.A computer program that translates a program statement by statement into machine language is called a/an
- Interpreter

4.A Gigabyte is equal to - 1024 Megabytes

5.A Compiler is a software which converts - high level language to machine language

6.Virtual memory is - an illusion of extremely large main memory

7.The phrase ‘tragedy of commons’ is -in the context of degradation of renewable free access resources

8.Kyoto Protocol is related to - Climate change

9.Which of the following is a source of emissions leading to the eventual formation of surface ozone as a pollutant ?
(A) Transport sector

10.The smog in cities in India mainly consists of -Oxides of nitrogen and unburnt hydrocarbons

11.Which of the following types of natural hazards have the highest potential to cause damage to humans ?
(A) Droughts and Floods

12.The percentage share of renewable energy sources in the power production in India is around
(A) 10-12%

13.In which of the following categories the enrolment of students in higher education in 2010-11 was beyond the percentage of seats reserved ?
(A) OBC students

14. Which one of the following statements is not correct about the University Grants Commission (UGC) ?
(A) It receives funds from State Governments in respect of State Universities.

15. Consider the statement which is followed by two arguments (I) and (II) :
Statement : Should India switch over to a two party system ?
Arguments : (I) Yes, it will lead to stability of Government.
(II) No, it will limit the choice of voters.
(A)  Both the arguments are strong.

16.Consider the statement which is followed by two arguments (I) and (II) :
Statement : Should persons with criminal background be banned from contesting elections ?
Arguments : (I) Yes, it will decriminalise politics.
(II) No, it will encourage the ruling party to file frivolous cases against their political opponents.
(A) Only argument (I) is strong.

17.. Which of the following statement(s) is/are correct about a Judge of the Supreme Court of India ?
1. A Judge of the Supreme Court is appointed by the President of India.
2. He holds office during the pleasure of the President.
3. He can be suspended, pending an inquiry.
4. He can be removed for proven misbehaviour or incapacity.
Select the correct answer from the codes given below :
Codes :
(A)  1 and 4

18.  In the warrant of precedence, the Speaker of the Lok Sabha comes next only to
(A)  The Prime Minister

19.The black-board can be utilised best by a teacher for
(A)  writing the important and notable points

20. Nowadays the most effective mode of learning is
(A)  e-learning & blended learning

21.At the primary school stage, most of the teachers should be women because they
(A) can deal with children with love and affection

22.Which one is the highest order of learning ?
(A)  Conditioned-reflex learning

23.A person can enjoy teaching as a profession when he
(A) commands respect from students

24. “A diagram speaks more than 1000 words.”The statement means that the teacher should
(A) use teaching aids in the class

25.A research paper
(A) contains peer-reviewed original research or evaluation of research conducted by others

26.Which one of the following belongs to the category of good ‘research ethics’ ?
(A) Conducting a review of the literature that acknowledges the contributions of other people in the relevant field or relevant prior work.

27.Which of the following sampling methods is not based on probability ?
(A) Quota Sampling

28.Which one of the following references is written as per Modern Language Association (MLA) format ?
(A)  Hall, Donald. Fundamentals of Electronics.
  New Delhi : Prentice Hall of India, 2005

29.A workshop is
(A)  a brief intensive course for a small group emphasizing the development of a skill or technique for solving a specific problem.

30.A working hypothesis is
(A) a provisionally accepted hypothesis for further research.

31.Read the following passage carefully and answer the questions (31 to 36) :
The Taj Mahal has become one of the world’s best known monuments. This domed white
marble structure is situated on a high plinth at the southern end of a four-quartered garden,
evoking the gardens of paradise, enclosed within walls measuring 305 by 549 metres. Outside
the walls, in an area known as Mumtazabad, were living quarters for attendants, markets, serais
and other structures built by local merchants and nobles. The tomb complex and the other
imperial structures of Mumtazabad were maintained by the income of thirty villages given
specifically for the tomb’s support. The name Taj Mahal is unknown in Mughal chronicles, but
it is used by contemporary Europeans in India, suggesting that this was the tomb’s popular
name. In contemporary texts, it is generally called simply the Illuminated Tomb (Rauza-i-
Munavvara).
Mumtaz Mahal died shortly after delivering her fourteenth child in 1631. The Mughal
court was then residing in Burhanpur. Her remains were temporarily buried by the grief-
stricken emperor in a spacious garden known as Zainabad on the bank of the river Tapti. Six
months later her body was transported to Agra, where it was interred in land chosen for the
mausoleum. This land, situated south of the Mughal city on the bank of the Jamuna, had
belonged to the Kachhwaha rajas since the time of Raja Man Singh and was purchased from
the then current raja, Jai Singh. Although contemporary chronicles indicate Jai Singh’s willing
cooperation in this exchange, extant farmans (imperial commands) indicate that the final price
was not settled until almost two years after the mausoleum’s commencement. Jai Singh’s
further cooperation was insured by imperial orders issued between 1632 and 1637 demanding
that he provide stone masons and carts to transport marble from the mines at Makrana, within
his “ancestral domain”, to Agra where both the Taj Mahal and Shah Jahan’s additions to the
Agra fort were constructed concurrently.
Work on the mausoleum was commenced early in 1632. Inscriptional evidence indicates
much of the tomb was completed by 1636. By 1643, when Shah Jahan most lavishly celebrated
the ‘Urs ceremony for Mumtaz Mahal’, the entire complex was virtually complete.
------------------------------------------------------------------------------------------------
31. Marble stone used for the construction of the Taj Mahal was brought from the ancestral
domain of Raja Jai Singh. The name of the place where mines of marble is
(A) Makrana.

32.The popular name Taj Mahal was given by
(A) European travellers.

33.Point out the true statement from the following :
(A) The Taj Mahal is surrounded by a four-quartered garden known as Chahr Bagh.

34.In the contemporary texts the Taj Mahal is known
(A)  Rauza-i-Munavvara

35.The construction of the Taj Mahal was completed between the period
(A) 1632 – 1643 A.D.

36.The documents indicating the ownership of land, where the Taj Mahal was built, known as
(A) Farman
---------------------------------------------------------------------------------------------
37.In the process of communication, which one of the following is in the chronological order ?
(A)  Communicator, Message, Medium, Receiver, Effect

38.Bengal Gazette, the first Newspaper in India was started in 1780 by
(A) James Augustus Hicky

39.Press censorship in India was imposed during the tenure of the Prime Minister
(A)  Indira Gandhi

40.Communication via New media such as computers, teleshopping, internet and mobile telephony is termed as
(A)) Interactive communication

41.Classroom communication of teacher rests on the principle of
(A)) Edutainment

42.________ is important when a teacher communicates with his/her student.
(A)  Empathy

43.In a certain code GALIB is represented by HBMJC. TIGER will be represented by
(A) UJHFS

44.In a certain cricket tournament 45 matches were played. Each team played once against each of the other
teams. The number of teams participated in the tournament is
(A) 10

45.The missing number in the series 40, 120, 60, 180, 90, ?, 135 is
(A)  270 (40x3=120, 120/2=60, 60x3=180, 180/2=90, 90x3=270, 270/2=135)

46.The odd numbers from 1 to 45 which are exactly divisible by 3 are arranged in an ascending order. The number at 6th position is
(A) 33

47. The mean of four numbers a, b, c, d is 100. If c = 70, then the mean of the remaining numbers is 
(A) 110

48.If the radius of a circle is increased by 50%, the perimeter of the circle will increase by
(A) 50%

49.If the statement ‘some men are honest’ is false, which among the following statements will be true.
    Choose the correct code given below :
    (i) All men are honest.
    (ii) No men are honest.
    (iii) Some men are not honest.
    (iv) All men are dishonest.
    Codes :
    (A) (ii), (iii) and (iv)

50.Choose the proper alternative given in the codes to replace the question mark.
Bee – Honey, Cow – Milk, Teacher – ?
    (A)  Wisdom

51.P is the father of R and S is the son of Q and T is the brother of P. If R is the sister of S, how is Q related to T ?
(A)  Sister-in-law

52.A definition put forward to resolve a dispute by influencing attitudes or stirring emotions is called
(A)Persuasive

53.Which of the codes given below contains only the correct statements ?
Statements :
(i) Venn diagram is a clear methodof notation.
(ii) Venn diagram is the most directmethod of testing the validity of categorical syllogisms.
(iii) In Venn diagram method the premises and the conclusion of a categorical syllogism is diagrammed.
(iv) In Venn diagram method the three overlapping circles are drawn for testing a categorical syllogism.
Codes :
(A) (i), (ii) & (iv)

54.Inductive reasoning presupposes
(A)  uniformity in human nature
























































UGC NET june-13 PAPER-III

1.The Software Maturity Index (SMI) is defined as SMI = [Mf – (Fa + Fc + Fd)] / M Where Mf = the number of modules in the current release. Fa = the number of modules in the current release that have been added. Fc = the number of modules in the current release that have been changed. Fd = the number of modules in the current release that have been deleted. The product begins to stabilize when
(A) SMI approaches 1

2.Match the following :
(A)
a. Watson-Felix model - Cost estimation
b. Quick-Fix model - Maintenence
c.Putnam resource allocation model-Project planning
d.Logarithmetic-Poisson Model - Failure intensity

3.__________ is a process model that removes defects before they can precipitate serious hazards.
(A) Cleanroom software engineering

4.Equivalence partitioning is a __________ method that divides the input domain of a program into classes of data from which test cases can be derived.
(A)  Black-box testing

5.The following three golden rules :
(i) Place the user in control
(ii) Reduce the user’s memory load
(iii) Make the interface consistent are for
(A) Good interface design

6.Software safety is a __________ activity that focuses on the identification and assessment of potential hazards that may affect software negatively and cause an entire system to fail.
(A) Software quality assurance

7.The “PROJECT” operator of a relational algebra creates a new table that has always
 (A)  Same number of rows as the original table

8.The employee information of an Organization is stored in the relation :
Employee (name, sex, salary,deptname) Consider the following SQL query
Select deptname from Employee Where sex = ‘M’
   group by deptname
  having avg (salary) > {select  avg (salary) from Employee}
Output of the given query corresponds to
(A) Average salary of male employees in a department is more than average salary of the organization.

9.For a database relation R(a, b, c, d) where the domains of a, b, c, d include only the atomic values. The functional dependency a → c, b → d holds in the following relation
(A) In 1NF not in 2NF

10. Match the following :
a. RAID 0 i. Bit interleaved parity
b. RAID 1 ii. Non redundant stripping
c. RAID 2 iii. Mirrored disks
d. RAID 3 iv. Error correcting codes

11.The golden ratio φ and its conjugate– φ both satisfy the equation
(A) x2 – x – 1 = 0

12.The solution of recurrence relation, T(n) = 2T(floor ( n)) + logn is
(A) O(logn log logn)

13.In any n-element heap, the number of nodes of height h is
(A) less than equal to n/[2to the power of h + 1]

14.A data file of 1,00,000 characters
contains only the characters g-l, with
the frequencies as indicated in table :
           g   h  i  j k l
Frequency  45 13 12 16 9 5
in thousand using the variable-length code by Huffman codes, the file can be encoded with
(A)  2,24,000 bits

15.A vertex cover of an undirected graph G(V, E) is a subset V1 ⊆ V vertices such that
(A) If (u, v) ∈ E then u ∈ V1 or v ∈ V1

16.In a fully connected mesh network with n devices, there are ________ physical channels to link all devices.
(A) n(n–1)/2

17.The baud rate of a signal is 600 baud/second. If each signal unit carries 6 bits, then the bit rate of a signal is ________.
(A) 3600

18. Match the following :
(A)
a. Data link             -Node to node delivery
b. Network layer          -Routing layer
c. Transport layer       -Flow layer control
d. Application             -Mail services   

19.An image is 1024∗800 pixels with  3 bytes/pixel. Assume the image is uncompressed. How long does it take to transmit it over a 10-Mbps Ethernet ?
(A) 1.966 seconds

20.The ________ measures the relative strengths of two signals or a signal at two different points.
(A) decibel

21.Which one of the following media is multidrop ?
(A) Thick Coaxial cable

22.What is the baud rate of the standard 10 Mbps Ethernet ?
(A) 20 megabaud

23.At any iteration of simplex method, if Δj (Zj – Cj) corresponding to any   non-basic variable Xj is obtained as  zero, the solution under the test is
(A) Alternative solution

24.A basic feasible solution to a m-origin, n-destination transportation problem is said to be _________ if the number of positive allocations are less than m + n – 1.
(A) degenerate

25.he total transportation cost in an initial basic feasible solution to the following transportation problem using Vogel’s Approximation method is
        W1        W2         W3         W4         W5     Supply
F1        4         2         3           2         6         8
F2         5         4         5          2         1          12
F3        6        5         4          7         3       14
Demand     4        4         6          8         8
(A) 80

26.An actor in an animation is a small program invoked _______ per frame to determine the characteristics of some object in the animation.
(A) once

27.Bresenham line drawing algorithm is attractive because it uses
(A) Integer arithmetic only

28.The refresh rate above which a picture stops flickering and fuses into a steady image is called _________.
(A) Critical fusion frequency

29.In homogenous coordinate system (x, y, z) the points with z = 0 are called
(A) Point at infinity

30.If 40 black lines interleaved with 40 white lines can be distinguished across one inch, the resolution is
(A) 40 line-pairs per inch

31.Images tend to be very large collection of data. The size of memory required for a 1024 by 1024 image in which the colour of each pixel is represented by a n-bit number, (in an 8 bit machines) is
(A) n / 8 MB

32.Arrays in C language can have _________ with reference to memory representation.
(A)only one subscript

33.Refer the points as listed below :
(a) What are the precedence rules ?
(b) What are the associativity rules ?
(c) What is the order of operand evaluation ?
(d) Are there restrictions on operand evaluation side effects ?
Which of the above must be considered as primary design issues for arithmetic expressions ?
(A) (a), (b), (c) and (d)

34.Horn clauses are special kinds of propositions which can be described as
(A) A single atomic proposition on left side or an empty left side.

35.Which of the following is/are the fundamental semantic model(s) of parameter passing ?
(A) all of the above

36.The grammar with production rules S → aSb |SS|λ generates language L given by :
(A) L = {w∈{a, b}* | na(w) = nb(w)and na(v) ≥ nb(v) where v is any prefix of w}

37.A pushdown automation M = (Q, Σ,Γ, δ, q0, z, F) is set to be deterministic subject to which of the following condition(s), for every q ∈ Q, a ∈ Σ ∪ {λ} and b ∈ Γ
(s1) δ(q, a, b) contains at most one element
(s2) if δ(q, λ, b) is not empty then δ(q, c, b) must be empty for every c∈Σ
(A) Both s1 and s2

38.For every context free grammar (G) there exists an algorithm that passes any w ∈ L(G) in number of steps proportional to
  (A) |w|3

39.Match the following :
(A)
a. Context sensitive language - Recursive language                 
b. Regular grammar               - Deterministic finite automation   
c. Context free grammar       - Pushdown automation                  
d. Unrestricted grammar       - Recursive enumerable            

40.The statements s1 and s2 are given as :
s1 : Context sensitive languages are closed under intersection, concatenation, substitution and inverse homomorphism.
s2 : Context free languages are closed under complementation, substitution and homomorphism.
Which of the following is correct statement ?
(A) s1 is correct and s2 is not correct.

41.Which one of the following is not an addressing mode ?
(A) Relative indexed

42.Computers can have instruction formats with
(A) zero address, one address, two address and three address instructions

43.Which is not a typical program control instruction ?
(A) SHL

44.Interrupt which arises from illegal orerroneous use of an instruction or data is
(A) Internal interrupt

45.The simplified function in product of sums of Boolean function F(W, X, Y, Z) = Σ(0, 1, 2, 5, 8, 9, 10) is
(A) (W' + X') (Y' + Z') (X' + Z)

46.Match the following :
(A)
a. TTL        -Evolution of “diode-transistor-logic”    
b. ECL         -High speed digital circuits              
c. MOS      -High component density                      
d. CMOS     -Low power consumption                        

47.Match the following :
(A)
a. Foreign keys                 -Referential integrity
b. Private key                    -Domain constraint
c. Event control action model    -Trigger
d. Data security                -Encryption

48.When an array is passed as a parameter to a function which of the following statements is correct ?
(A) The function can change values in the original array.

49.Suppose you want to delete the name that occurs before “Vivek” in an alphabetical listing. Which of the following data structures shall be most efficient for this operation ?
(A) Doubly linked list

50.What will be the output of the
following segment of the program ?
main()
{
char *s = “hello world”;
int i = 7;
printf(“%, *s”, i, s);
}
(A)%, *s

51.Trace the error :
void main( )
{
int *b, &a;
*b = 20
printf(“%d, %d”, a, *b)
}
(A) Syntax error

52.Match the following :
a. calloc( )    -Allocates space for array 
b. free( )      -Frees previously allocated space 
c. malloc( )    -Allocates requested size of space
d. realloc( )      -Modifies previously allocated space

53.Binary symmetric channel uses
(A) Half duplex protocol

54.Hamming distance between 100101000110 and 110111101101 is
(A) 6

55.Given code word 1110001010 is to be transmitted with even parity check bit. The encoded word to be transmitted for this code is
(A) 11100010101

56.The number of distinct binary images which can be generated from a given binary image of right M × N are
(A) 2to the power of MN

57.If f(x, y) is a digital image, then x, y and amplitude values of f are
(A) Finite

58.Consider the following processes with time slice of 4 milliseconds (I/O
requests are ignored) :
Process         A        B          C      D 
Arrival time     0        1        2      3
CPU cycle        8       4       9     5
The average turn around time of these processes will be
(A) 18.25 milliseconds

59.A job has four pages A, B, C, D and the main memory has two page frames only. The job needs to process its pages in following order :
ABACABDBACD
Assuming that a page interrupt occurs when a new page is brought in the main memory, irrespective of whether the page is swapped out or not. The number of page interrupts in FIFO and LRU page replacement algorithms are
(A) 9 and 8

60.Suppose S and Q are two semaphores
initialized to 1. P1 and P2 are two
processes which are sharing resources.
P1 has statements P2 has statements
wait(S) ;    wait(Q) ;
wait(Q) ;    wait(S) ;
critical-    critical-
section 1;    section 2;
signal(S) ;    signal(Q) ;
signal(Q) ;    signal(S) ;
Their execution may sometimes lead
to an undesirable situation called
(A) Deadlock

61.An operating system using banker’s algorithm for deadlock avoidance has ten dedicated devices (of same type) and has three processes P1, P2 and P3 with maximum resource requirements of 4, 5 and 8 respectively. There are two states of allocation of devices as follows :
State 1 Processes P1   P2   P3
Devices
allocated         2    3    4
State 2 Processes P1   P2   P3
Devices
allocated           0    2    4
Which of the following is correct ?
(A) State 1 is unsafe and state 2 is safe.

62.Let the time taken to switch between user mode and kernel mode of execution be T1 while time taken to switch between two user processes be T2. Which of the following is correct ?
(A) T1 < T2

63.Working set model is used in memory management to implement the concept of
(A) Principal of Locality

64.A UNIX file system has 1 KB block size and 4-byte disk addresses. What is the maximum file size if the inode contains ten direct block entries, one single indirect block entry, one double indirect block entry and one triple indirect block entry ?
(A) 16 GB

65.A thread is usually defined as a light weight process because an Operating System (OS) maintains smaller data structure for a thread than for a process. In relation to this, which of the following statement is correct ?
(A) OS maintains only CPU registers for each thread

66.The versions of windows operating system like windows XP and window Vista uses following file system :
(1) FAT-16
(2) FAT-32
(3) NTFS (NT File System)
(A) All of the above

67.Which one of the following is a correct implementation of the meta-predicate “not” in PROLOG (Here G represents a goal) ?
(A) not(G):– call(G), !, fail. not(G).

68.Which one of the following is not an informed search technique ?
(A) Depth first search

69.If we convert ∃u ∀v ∀x ∃y (P(f(u),v, x, y) → Q(u,v,y)) to ∀v ∀x (P(f(a),v, x, g(v,x)) → Q(a,v,g(v,x))) This process is known as
(A) Skolemization

70.Given two jugs of capacities 5 litres and 3 litres with no measuring markers on them. Assume that there is endless supply of water. Then the minimum number of states to measure 4 litres water will be
(A) 7

71.The map colouring problem can be solved using which of the following technique ?
(A) Constraint satisfaction

72.Which of the following is a knowledge representation technique used to represent knowledge about stereotype situation ?
(A) Scripts

73.If A and B are two fuzzy sets with membership functions μA(x) = {0.6, 0.5, 0.1, 0.7, 0.8} μB(x) = {0.9, 0.2, 0.6, 0.8, 0.5} ––––– Then the value of μA ∪ B(x) will be
(A){0.1, 0.5, 0.4, 0.2, 0.2}

74.A fuzzy set A on R is ________ iff A(λx1 + (1 – λ)x2) ≥ min [A(x1),A(x2)] for all x1, x2 ∈ R and all λ ∈ [0, 1], where min denotes the minimumoperator.
(A) Convex









































































































ugc net june-13 paper-ii

1.COCOMO stands for
(A) COnstructive COst MOdel

2.Match the following :
a. Good quality  i. Program does not fail for a specified time in a given environment
b. Correctness   ii. Meets the functional requirements
c. Predictable   iii. Meets both functional and non-functional requirements
d. Reliable      iv. Process is under statistical control
Codes :
     a   b  c  d
(A) iii  ii iv i

3.While estimating the cost of software, Lines Of Code (LOC) and Function Points (FP) are used to measure which one of the following ?
(A) Size of software

4.A good software design must have
(C) Low module coupling, High module cohesion

5.Cyclometric complexity of a flow graph G with n vertices and e edges is
(A) V(G) = e–n+2

6.When the following code is executed what will be the value of x and y ?
int x = 1, y = 0;
    y = x++;
(A) 2,1

7.How many values can be held by an array A(–1,m;1,m) ?
(A) m(m+2)

8.What is the result of the expression
(1&2)+(3/4) ?
(A) 0

9.How many times the word ‘print’ shall be printed by the following program segment ?
    for (i=1, i<2,i++)
    for (j=1,j<2,j++)
    for(k=1,k<2,k++)
    printf("print/n")
    (A) 8

10.Which of the following is not a type of Database Management System ?
(A) Sequential

11.Manager’s salary details are to be  hidden from Employee Table. This Technique is called as
(A)External level Datahiding

12.A Network Schema
(A)  permits many to many relationship

13.Which normal form is considered as adequate for usual database design ?
(A) 3NF

14.If D1,D2, .. ..Dn are domains in a relational model, then the relation is a table, which is a subset of
(A)D1×D2× ... ×Dn

15.Which of the following addresses is used to deliver a message to the correct application program running on a host ?
(A) Port

16.In ________ substitution, a character in the plaintext is always changed to the same character in the ciphertext, regardless of its position in the text.
(A) polyalphabetic

17.In classful addressing, the IP address 190.255.254.254 belongs to
(A) Class B

18.In hierarchical routing with 4800 routers, what region and cluster sizes should be chosen to minimize the size of the routing table for a three- layer hierarchy ?
(A)  15 clusters, 16 regions and 20 routers

19.In IPv4 header, the ______ field is needed to allow the destination host to determine which datagram a newly arrived fragments belongs to.
(A) identification

20.Given L1=L(a*baa*) and L2=L(ab*). The regular expression corresponding to language L3 = L1/L2 (right quotient) is given by
(A) a*ba*

21.Given the production rules of a grammar G1 as S1 → AB | aaB A → a | Aa B→b and the production rules of a grammar G2 as
S2 → aS2bS2 | bS2aS2 | λ Which of the following is correct statement ?
(A) G1 is ambiguous and G2 is ambiguous.

22.Given a grammar : S1 → Sc, S → SA | A, A → aSb | ab, there is a rightmost derivation S1 ⇒ Sc ⇒ SAC ⇒ SaSbc Thus, SaSbc is a right sentential form, and its handle is
(A) aSb

23.The equivalent production rules corresponding to the production rules S → Sα1 |Sα2 | β1 | β2 is
(A) S → β1 | β2 | β1A | β2A,
    A → α1A | α2A | λ

24.Given a Non-deterministic Finite Automation (NFA) with states p and r as initial and final states respectively and transition table as given below :
      a    b
p     –     q
q     r     s
r     r     s
s     r     s
The minimum number of states required in Deterministic Finite Automation (DFA) equivalent to NFA is
(A) 3

25.Which is the correct statement(s) for Non Recursive predictive parser ?
S1 : First(α) = {t| α ⇒* tβ for some string β} ⇒*tβ
S2 : Follow(X)={ a| S⇒*αXaβ some strings α and β}
(A) Both statements S1 and S2 correct.

26.Given an open address hash table with load factor α < 1, the expected number of probes in a successful search is
(B) Atmost 1/α in 1/1– α

27.For a B-tree of height h and degree t,the total CPU time used to insert a node is
(A) O(th)

28.The time complexity to build a heap with a list of n numbers is
(A) O(n)

29.The value of postfix expression :
8 3 4 + – 3 8 2 / + * 2 $ 3 + is
(A) 52

30.Consider the following statements for priority queue :
S1 : It is a data structure in which the intrinsic ordering of the elements does determine the result of its basic operations.
S2 : The elements of a priority queue may be complex structures that are ordered on one or several fields.
(A) Both S1 and S2 are correct

31.Repository of information gathered from multiple sources, storing under unified scheme at a single site is called as
(A)Data warehousing

32.The task of correcting and pre processing data is called as
(A) Data cleaning

33.Using data p=3, q=11, n=pq, d=7 in RSA algorithm find the cipher text of the given plain text SUZANNE
(A) BUTAEEZ

34.The relation “divides” on a set of positive integers is ________.
(A) Anti symmetric and transitive

35.Give as good a big–O estimate as possible for the following functions :
(nlogn+n2)(n3+2)and(n!+2n)(n3+log(n2+1))
(A) O(n5) & O(n3* n!)

36.A test contains 100 true/false questions. How many different ways can a student answer the questions on the test, if the answer may be left blank also.
(A) 3 to the power of 100

37.Which of the following connected simple graph has exactly one spanning tree ?
 Complete graph
 Hamiltonian graph
 Euler graph
(A) None of the above

38.How many edges must be removed to produce the spanning forest of a graph with N vertices, M edges and C connected components ?
(A)M–N+C

39.Which of the following shall be a compound proposition involving the propositions p, q and r, that is true when exactly two of the p, q and r are true and is false otherwise ?
(C) (p ∧ q ∧⎤ r) ∨ ( p ∧ ⎤ q ∧ r) ∨ (⎤ p ∧ q ∧ r)

40.The truth value of the statements :
∃!xP(x) → ∃xP(x) and ∃!x⎤ P(x) → ⎤∀xP(x), (where the notation ∃!xP(x) denotes the proposition “There exists a unique x such that P(x) is true”) are :
(A) True and True

41.How many different Boolean functions of degree 4 are there ?
(A) 2 to the power of 16

42.A Boolean operator s is defined as follows :
1 s 1 = 1, 1 s 0 = 0, 0 s 1 = 0 and 0s0=1 What will be the truth value of the expression (x s y) s z = x s (y s z) ?
(A)Always true

43.Which one of the following is decimal value of a signed binary number 1101010, if it is in 2’s  complement form ?
(A) – 22

44.A set of processors P1, P2, ......, Pk can execute in parallel if Bernstein’s conditions are satisfied on a pairwise
   basis; that is  P1 || P2 || P3 || ..... || Pk if and only if :
   (A) Pi || Pj for all i ≠ j
 
45.When a mobile telephone physically moves from one to another cell, the base station transfers ownership to the cell getting strongest signal. This process is known as _______.
(A) handoff

46.A virtual memory based memory management algorithm partially swaps out a process. This is an example of
(A) medium term scheduling

47.Assuming that the disk head is located initially at 32, find the number of disk moves required with FCFS if the disk queue of I/O block requests are 98, 37, 14, 124, 65, 67 :
(A)321

48.Let the page fault service time be 10 millisecond(ms) in a computer with average memory access time being 20 nanosecond(ns). If one page fault is generated for every 106 memory accesses, what is the effective access time for memory ?
(A) 30 ns

49.Consider the following UNIX command : sort <in> temp; head – 30 <temp; rm temp  Which of the following functions shall be performed by this command ?
(A) Sort, taking the input from “in” and writing the output to “temp” then prints 30 lines from temp on terminal. Finally  “temp” is removed.

50.The mv command changes
(A) the directory entry



























































































Oracle Reserved Words

Oracle  Reserved Words The following words are reserved by Oracle. That is, they have a special meaning to Oracle and so cannot be redefi...