1. A 2MB PCM(pulse code modulation) has a) 32 channels b) 30 voice channels & 1 signaling channel. c) 31 voice channels & 1 signaling channel. d) 32 channels out of which 30 voice channels, 1 signaling channel, & 1 Synchronization channel. Ans: (c) 2. Time taken for 1 satellite hop in voice communication is a) 1/2 second b) 1 seconds c) 4 seconds d) 2 seconds Ans: (a) 3. Max number of satellite hops allowed in voice communication is : a) only one b) more than one c) two hops d) four hops Ans: (c) 4. What is the max. decimal number that can be accommodate in a byte. a) 128 b) 256 c) 255 d) 512 Ans: (c) 5. Conditional results after execution of an instruction in a micro processor is stored in a) register b) accumulator c) flag register d) flag register part of PSW(Program Status Word) Ans: (d) 6. Frequency at which VOICE is sampled is a) 4 Khz b) 8 Khz c) 16 Khz d) 64 Khz Ans: (a) 7. Line of Sight is a) Straight Line b) Parabolic c) Tx & Rx should be visible to each other d) none Ans: (c) 8. Purpose of PC (Program Counter) in a Micro Processor is a) To store address of TOS (Top of Stack) b) To store address of next instruction to be executed. c) Count the number of instructions. d) To store base address of the stack. Ans: (b) 9. What action is taken when the processor under execution is interrupted by a non-mask able interrupt? a) Processor serves the interrupt request after completing the execution of the current instruction. b) Processor serves the interrupt request after completing the current task. c) Processor serves the interrupt request immediately. d) Processor serving the interrupt request depends upon the priority of the current task under execution. Ans: (a) 10. The status of the Kernel is a) task b) process c) not defined. d) None of the above. Ans: (b) 11. To send a data packet using datagram, connection will be established a) before data transmission. b) Connection is not established before data transmission. c) No connection is required. d) None of the above. Ans: (c) 12. Word alignment is a) aligning the address to the next word boundary of the machine. b) Aligning to even boundary. c) Aligning to word boundary. d) None of the above. Ans: (a) 13. When a 'C' function call is made, the order in which parameters passed to the function are pushed into the stack is a) left to right b) right to left c) bigger variables are moved first than the smaller variables. d) Smaller variables are moved first than the bigger ones. e) None of the above. Ans: (b) 14. What is the type of signaling used between two exchanges? a) inband b) common channel signaling c) any of the above d) none of the above. Ans: (a) 15.Buffering is a) the process of temporarily storing the data to allow for small variation in device speeds b) a method to reduce cross talks c) storage of data within transmitting medium until the receiver is ready to receive. d) a method to reduce routing overhead. Ans: (a) 16. Memory allocation of variables declared in a program is a) allocated in RAM. b) Allocated in ROM. c) allocated on stack. d) Assigned to registers. Ans: (c) 17. A software that allows a personal computer to pretend as a computer terminal is a) terminal adapter b) bulletin board c) modem d) terminal emulation Ans: (d) 18. Find the output of the following program int *p,*q; p=(int *)1000; q=(int *)2000; printf("%d",(q-p)); Ans: 500 19. Which addressing mode is used in the following statements: (a) MVI B, 55 (b) MOV B,A (c) MOV M,A Ans. (a) immediate addressing mode. (b) Register Addressing Mode (c) Direct addressing mode 20. RS-232C standard is used in _____________. Ans. Serial I/O 21. Memory. Management in Operating Systems is done by a) Memory Management Unit b) Memory management software of the Operating System c) Kernel Ans: (b) 22. What is done for a Push operation? Ans: SP is decremented and then the value is stored. 23. Binary equivalent of 52 Ans. 110100 24. Hexadecimal equivalent of 3452 Ans. 72A 25. Explain Just In Time Concept? Ans. Elimination of waste by purchasing manufacturing exactly when needed 26. A good way of unit testing s/w program is Ans. User test 27. OOT uses Ans. Encapsulated of detect methods 28.EDI useful in Ans. Electronic Transmission 29. MRPII different from MRP Ans. Modular version of man redundant initials 30. Hard disk time for R/W head to move to correct sector Ans. Latency Time 31. The percentage of times a page number bound in associate register is called Ans. Bit ratio 32. Expand MODEM Ans. Modulator and Demodulator 33. RDBMS file system can be defined as Ans. Interrelated 34. Super Key is Ans. Primary key and Attribute 35. Windows 95 supports (a) Multi-user (b) n tasks (c) Both (d) None Ans. (a) 36.In the command scanf, h is used for Ans. Short int 37.A process is defined as Ans. Program in execution 38.A thread is Ans. Detachable unit of executable code) 39.What is the advantage of Win NT over Win 95 Ans. Robust and secure 40.How is memory management done in Win95 Ans. Through paging and segmentation 41.What is meant by polymorphism Ans. Redefinition of a base class method in a derived class 42.What is the essential feature of inheritance Ans. All properties of existing class are derived 43.What does the protocol FTP do Ans. Transfer a file b/w stations with user authentication 44.In the transport layer ,TCP is what type of protocol Ans. Connection oriented 45.Why is a gateway used Ans. To connect incompatible networks 46.How is linked list implemented Ans. By referential structures 47.What method is used in Win95 in multitasking Ans. Non preemptive check 48.What is a semaphore Ans. A method synchronization of multiple processes 49.What is the precedence order from high to low ,of the symbols ( ) ++ / Ans.( ) , ++, / 50.Preorder of A*(B+C)/D-G Ans.*+ABC/-DG 51.What is the efficiency of merge sort Ans. O(n log n) 52.In which layer are routers used Ans.In network layer 53.Which of the following sorting algorithm has average sorting behavior -- Bubble sort,merge sort,heap sort,exchange sort Ans. Heap sort 54.In binary search tree which traversal is used for getting ascending order values--Inorder ,postorder,preorder Ans.Inorder 55.What are device drivers used for Ans.To provide software for enabling the hardware 56.What is fork command in unix Ans. System call used to create process 57.What is make command in unix Ans. Used for creation of more than one file 58.In unix .profile contains Ans. Start up program 59.In unix 'ls 'stores contents in Ans.inode block 60. Which of the following involves context switch, (a) system call (b) priviliged instruction (c) floating poitnt exception (d) all the above (e) none of the above Ans: (a) 61. In OST, terminal emulation is done in (a) sessions layer (b) application layer (c) presentation layer (d) transport layer Ans: (b) 62. For 1 MB memory, the number of address lines required, (a)11 (b)16 (c)22 (d) 24 Ans. (b) 63. Semaphore is used for (a) synchronization (b) dead-lock avoidence (c) box (d) none Ans. (a) 64. Which holds true for the following statement class c: public A, public B a) 2 member in class A, B should not have same name b) 2 member in class A, C should not have same name c) both d) none Ans. (a) 65.Preprocessor.. does not do which one of the following (a) macro (b) conditional complication (c) in type checking (d) including load file Ans. (c) 66. Piggy backing is a technique for a) Flow control b) Sequence c) Acknowledgement d) retransmission Ans. (c) 67. Which is not a memory management scheme? a) buddy system b) swapping c) monitors d) paging Ans : c 68. There was a circuit given using three NAND gates with two inputs and one output. Find the output. a) OR b) AND c) XOR d) NOT Ans. (a) 69.I integrated check value(ICV) are used as: Ans. The client computes the ICV and then compares it with the senders value. 70. When applets are downloaded from web sites , a byte verifier performs _________? Ans. Status check. 71. An IP/IPX packet received by a computer using... having IP/IPX both how the packet is handled. Ans. Read the, field in the packet header with to send IP or IPX protocol. 72. The UNIX shell .... a) does not come with the rest of the system b) forms the interface between the user and the kernal c) does not give any scope for programming d) deos not allow calling one program from with in another e) all of the above Ans. (b) 73. In UNIX a files i-node ......? Ans. Is a data structure that defines all specifications of a file like the file size, number of lines to a file, permissions etc. 74. The very first process created by the kernel that runs till the kernel process is halts is a) init b) getty c) both (a) and (b) d) none of these Ans. (a) 75. In the process table entry for the kernel process, the process id value is (a) 0 (b) 1 (c) 2 (d) 255 (e) it does not have a process table entry Ans. (a) 76. Which of the following API is used to hide a window a) ShowWindow b) EnableWindow c) MoveWindow d) SetWindowPlacement e) None of the above Ans. (a) 77. Which function is the entry point for a DLL in MS Windows 3.1 a) Main b) Winmain c) Dllmain d) Libmain e) None Ans. (b) 78. The standard source for standard input, standard output and standard error is a) the terminal b) /dev/null c) /usr/you/input, /usr/you/output/, /usr/you/error respectively d) None Ans. (a) 79. The redirection operators > and >> a) do the same function b) differ : > overwrites, while >> appends c) differ : > is used for input while >> is used for output d) differ : > write to any file while >> write only to standard output e) None of these Ans. (b) 80. The command grep first second third /usr/you/myfile a) prints lines containing the words first, second or third from the file /usr/you/myfile b) searches for lines containing the pattern first in the files second, third, and /usr/you/myfile and prints them c) searches the files /usr/you/myfiel and third for lines containing the words first or second and prints them d) replaces the word first with the word second in the files third and /usr/you/myfile e) None of the above Ans. (b) 81. You are creating a Index on EMPNO column in the EMPLOYEE table. Which statement will you use? a) CREATE INdEX emp_empno_idx ON employee, empno; b) CREATE INdEX emp_empno_idx FOR employee, empno; c) CREATE INdEX emp_empno_idx ON employee(empno); d) CREATE emp_empno_idx INdEX ON employee(empno); Ans. c 82. Which program construct must return a value? a) Package b) Function c) Anonymous block d) Stored Procedure e) Application Procedure Ans. b 83. Which Statement would you use to remove the EMPLOYEE_Id_PK PRIMARY KEY constraint and all depending constraints fromthe EMPLOYEE table? a) ALTER TABLE employee dROP PRIMARY KEY CASCAdE; b) ALTER TABLE employee dELETE PRIMARY KEY CASCAdE; c) MOdIFY TABLE employee dROP CONSTRAINT employee_id_pk CASCAdE; d) ALTER TABLE employee dROP PRIMARY KEY employee_id_pk CASCAdE; e) MOdIFY TABLE employee dELETE PRIMARY KEY employee_id_pk CASCAdE; Ans. a 84. Which three commands cause a transaction to end? (Chosse three) a) ALTER b) GRANT c) DELETE d) INSERT e) UPdATE f) ROLLBACK Ans. a ,b ,f 85. Under which circumstance should you create an index on a table? a) The table is small. b) The table is updated frequently. c) A columns values are static and contain a narrow range of values d) Two columns are consistently used in the WHERE clause join condition of SELECT statements. Ans.d 86. What was the first name given to Java Programming Language. a) Oak - Java b) Small Talk c) Oak d) None Ans.a
Saturday, 30 November 2013
Computer Science Questions and Answers
Friday, 29 November 2013
Important Day's to remember!
INDIA | |
January 9 | Pravasiya Bharatiya Divas |
January 12 | National Youth Day |
January 15 | Army Day |
January 25 | Tourism Day |
January 26 | Republic Day |
January 30 | Martyrs' Day |
February 28 | National Science Day |
March 3 | National Defence Day |
March 4 | National Security Day |
March 16 | National Vaccination Day |
April 5 | National Maritime Day |
May 11 | National Technology Day |
July 26 | Kargil Victory Day |
August 9 | Quit India Day |
August 15 | Independence Day |
August 20 | Sadbhavna Divas |
August 29 | National Sports Day |
September 5 | Teachers' Day; Sanskrit Day |
October 2 | Gandhi Jayanthi |
October 8 | Indian Air Force Day |
October 10 | National Postal Day |
November 14 | Children’s Day |
November 26 | Law Day |
December 4 | Navy Day |
December 7 | Flag Day |
December 18 | Minorities Rights Day |
December 14 | National Energy Conservation Day |
December 23 | Farmers Day |
INTERNATIONAL | |
January 10 | World Laughter Day |
January 26 | International Customs Day |
January 30 | World Leprosy Eradication Day |
March 8 | International Women’s Day; International Literacy Day |
March 15 | World Disabled Day; World Consumer Rights Day |
March 19 | World Disabled Day |
March 21 | World Forestry Day; International Day for the Elimination of Racial Discrimination. |
March 22 | World Day for Water |
March 23 | World Meteorological Day |
March 24 | World TB Day |
April 7 | World Health Day |
April 17 | World Haemophilia Day |
April 18 | World Heritage Day |
April 22 | Earth Day |
April 23 | World Book and Copyright Day |
May 1 | International Labour Day |
May 3 | Press Freedom Day, International Energy Day |
May 8 | World Red Cross Day |
May 12 | International Nurses Day |
May 15 | International Day of the Family |
May 17 | World Telecom Day |
May 24 | Commonwealth Day |
May 31 | Anti-tobacco Day |
June 5 | World Environment Day |
July 1 | Doctor's Day |
July 11 | World Population Day |
August 6 | Hiroshima Day |
August 9 | Nagasaki Day |
August 12 | International Youth Day |
August 19 | World Photography Day |
September 8 | World Literary Day |
September 15 | International Day of Democracy |
September 16 | World Ozone Day |
September 26 | Day of the Deaf |
September 27 | World Tourism Day |
October 1 | International Day for the Elderly |
October 2 | International Non-violence Day; World Wetlands Day |
October 3 | World Habitat Day |
October 4 | World Animal Welfare Day |
October 9 | World Postal Day |
October 10 | World Mental Health Day |
October 12 | World Sight Day |
October 16 | World Food Day |
October 17 | International Poverty Eradication Day |
October 24 | United Nations Day |
October 30 | World Thrift Day |
November 14 | Diabetes Day |
December 1 | World AIDS Day |
December 10 | Human Rights Day |
December 11 | UNICEF Day |
Tuesday, 12 November 2013
UGC NET JUNE-13 PAPER-I
1.‘www’ stands for - world wide web
2.A hard disk is divided into tracks which is further subdivided into - Sectors
3.A computer program that translates a program statement by statement into machine language is called a/an
- Interpreter
4.A Gigabyte is equal to - 1024 Megabytes
5.A Compiler is a software which converts - high level language to machine language
6.Virtual memory is - an illusion of extremely large main memory
7.The phrase ‘tragedy of commons’ is -in the context of degradation of renewable free access resources
8.Kyoto Protocol is related to - Climate change
9.Which of the following is a source of emissions leading to the eventual formation of surface ozone as a pollutant ?
(A) Transport sector
10.The smog in cities in India mainly consists of -Oxides of nitrogen and unburnt hydrocarbons
11.Which of the following types of natural hazards have the highest potential to cause damage to humans ?
(A) Droughts and Floods
12.The percentage share of renewable energy sources in the power production in India is around
(A) 10-12%
13.In which of the following categories the enrolment of students in higher education in 2010-11 was beyond the percentage of seats reserved ?
(A) OBC students
14. Which one of the following statements is not correct about the University Grants Commission (UGC) ?
(A) It receives funds from State Governments in respect of State Universities.
15. Consider the statement which is followed by two arguments (I) and (II) :
Statement : Should India switch over to a two party system ?
Arguments : (I) Yes, it will lead to stability of Government.
(II) No, it will limit the choice of voters.
(A) Both the arguments are strong.
16.Consider the statement which is followed by two arguments (I) and (II) :
Statement : Should persons with criminal background be banned from contesting elections ?
Arguments : (I) Yes, it will decriminalise politics.
(II) No, it will encourage the ruling party to file frivolous cases against their political opponents.
(A) Only argument (I) is strong.
17.. Which of the following statement(s) is/are correct about a Judge of the Supreme Court of India ?
1. A Judge of the Supreme Court is appointed by the President of India.
2. He holds office during the pleasure of the President.
3. He can be suspended, pending an inquiry.
4. He can be removed for proven misbehaviour or incapacity.
Select the correct answer from the codes given below :
Codes :
(A) 1 and 4
18. In the warrant of precedence, the Speaker of the Lok Sabha comes next only to
(A) The Prime Minister
19.The black-board can be utilised best by a teacher for
(A) writing the important and notable points
20. Nowadays the most effective mode of learning is
(A) e-learning & blended learning
21.At the primary school stage, most of the teachers should be women because they
(A) can deal with children with love and affection
22.Which one is the highest order of learning ?
(A) Conditioned-reflex learning
23.A person can enjoy teaching as a profession when he
(A) commands respect from students
24. “A diagram speaks more than 1000 words.”The statement means that the teacher should
(A) use teaching aids in the class
25.A research paper
(A) contains peer-reviewed original research or evaluation of research conducted by others
26.Which one of the following belongs to the category of good ‘research ethics’ ?
(A) Conducting a review of the literature that acknowledges the contributions of other people in the relevant field or relevant prior work.
27.Which of the following sampling methods is not based on probability ?
(A) Quota Sampling
28.Which one of the following references is written as per Modern Language Association (MLA) format ?
(A) Hall, Donald. Fundamentals of Electronics.
New Delhi : Prentice Hall of India, 2005
29.A workshop is
(A) a brief intensive course for a small group emphasizing the development of a skill or technique for solving a specific problem.
30.A working hypothesis is
(A) a provisionally accepted hypothesis for further research.
31.Read the following passage carefully and answer the questions (31 to 36) :
The Taj Mahal has become one of the world’s best known monuments. This domed white
marble structure is situated on a high plinth at the southern end of a four-quartered garden,
evoking the gardens of paradise, enclosed within walls measuring 305 by 549 metres. Outside
the walls, in an area known as Mumtazabad, were living quarters for attendants, markets, serais
and other structures built by local merchants and nobles. The tomb complex and the other
imperial structures of Mumtazabad were maintained by the income of thirty villages given
specifically for the tomb’s support. The name Taj Mahal is unknown in Mughal chronicles, but
it is used by contemporary Europeans in India, suggesting that this was the tomb’s popular
name. In contemporary texts, it is generally called simply the Illuminated Tomb (Rauza-i-
Munavvara).
Mumtaz Mahal died shortly after delivering her fourteenth child in 1631. The Mughal
court was then residing in Burhanpur. Her remains were temporarily buried by the grief-
stricken emperor in a spacious garden known as Zainabad on the bank of the river Tapti. Six
months later her body was transported to Agra, where it was interred in land chosen for the
mausoleum. This land, situated south of the Mughal city on the bank of the Jamuna, had
belonged to the Kachhwaha rajas since the time of Raja Man Singh and was purchased from
the then current raja, Jai Singh. Although contemporary chronicles indicate Jai Singh’s willing
cooperation in this exchange, extant farmans (imperial commands) indicate that the final price
was not settled until almost two years after the mausoleum’s commencement. Jai Singh’s
further cooperation was insured by imperial orders issued between 1632 and 1637 demanding
that he provide stone masons and carts to transport marble from the mines at Makrana, within
his “ancestral domain”, to Agra where both the Taj Mahal and Shah Jahan’s additions to the
Agra fort were constructed concurrently.
Work on the mausoleum was commenced early in 1632. Inscriptional evidence indicates
much of the tomb was completed by 1636. By 1643, when Shah Jahan most lavishly celebrated
the ‘Urs ceremony for Mumtaz Mahal’, the entire complex was virtually complete.
------------------------------------------------------------------------------------------------
31. Marble stone used for the construction of the Taj Mahal was brought from the ancestral
domain of Raja Jai Singh. The name of the place where mines of marble is
(A) Makrana.
32.The popular name Taj Mahal was given by
(A) European travellers.
33.Point out the true statement from the following :
(A) The Taj Mahal is surrounded by a four-quartered garden known as Chahr Bagh.
34.In the contemporary texts the Taj Mahal is known
(A) Rauza-i-Munavvara
35.The construction of the Taj Mahal was completed between the period
(A) 1632 – 1643 A.D.
36.The documents indicating the ownership of land, where the Taj Mahal was built, known as
(A) Farman
---------------------------------------------------------------------------------------------
37.In the process of communication, which one of the following is in the chronological order ?
(A) Communicator, Message, Medium, Receiver, Effect
38.Bengal Gazette, the first Newspaper in India was started in 1780 by
(A) James Augustus Hicky
39.Press censorship in India was imposed during the tenure of the Prime Minister
(A) Indira Gandhi
40.Communication via New media such as computers, teleshopping, internet and mobile telephony is termed as
(A)) Interactive communication
41.Classroom communication of teacher rests on the principle of
(A)) Edutainment
42.________ is important when a teacher communicates with his/her student.
(A) Empathy
43.In a certain code GALIB is represented by HBMJC. TIGER will be represented by
(A) UJHFS
44.In a certain cricket tournament 45 matches were played. Each team played once against each of the other
teams. The number of teams participated in the tournament is
(A) 10
45.The missing number in the series 40, 120, 60, 180, 90, ?, 135 is
(A) 270 (40x3=120, 120/2=60, 60x3=180, 180/2=90, 90x3=270, 270/2=135)
46.The odd numbers from 1 to 45 which are exactly divisible by 3 are arranged in an ascending order. The number at 6th position is
(A) 33
47. The mean of four numbers a, b, c, d is 100. If c = 70, then the mean of the remaining numbers is
(A) 110
48.If the radius of a circle is increased by 50%, the perimeter of the circle will increase by
(A) 50%
49.If the statement ‘some men are honest’ is false, which among the following statements will be true.
Choose the correct code given below :
(i) All men are honest.
(ii) No men are honest.
(iii) Some men are not honest.
(iv) All men are dishonest.
Codes :
(A) (ii), (iii) and (iv)
50.Choose the proper alternative given in the codes to replace the question mark.
Bee – Honey, Cow – Milk, Teacher – ?
(A) Wisdom
51.P is the father of R and S is the son of Q and T is the brother of P. If R is the sister of S, how is Q related to T ?
(A) Sister-in-law
52.A definition put forward to resolve a dispute by influencing attitudes or stirring emotions is called
(A)Persuasive
53.Which of the codes given below contains only the correct statements ?
Statements :
(i) Venn diagram is a clear methodof notation.
(ii) Venn diagram is the most directmethod of testing the validity of categorical syllogisms.
(iii) In Venn diagram method the premises and the conclusion of a categorical syllogism is diagrammed.
(iv) In Venn diagram method the three overlapping circles are drawn for testing a categorical syllogism.
Codes :
(A) (i), (ii) & (iv)
54.Inductive reasoning presupposes
(A) uniformity in human nature
2.A hard disk is divided into tracks which is further subdivided into - Sectors
3.A computer program that translates a program statement by statement into machine language is called a/an
- Interpreter
4.A Gigabyte is equal to - 1024 Megabytes
5.A Compiler is a software which converts - high level language to machine language
6.Virtual memory is - an illusion of extremely large main memory
7.The phrase ‘tragedy of commons’ is -in the context of degradation of renewable free access resources
8.Kyoto Protocol is related to - Climate change
9.Which of the following is a source of emissions leading to the eventual formation of surface ozone as a pollutant ?
(A) Transport sector
10.The smog in cities in India mainly consists of -Oxides of nitrogen and unburnt hydrocarbons
11.Which of the following types of natural hazards have the highest potential to cause damage to humans ?
(A) Droughts and Floods
12.The percentage share of renewable energy sources in the power production in India is around
(A) 10-12%
13.In which of the following categories the enrolment of students in higher education in 2010-11 was beyond the percentage of seats reserved ?
(A) OBC students
14. Which one of the following statements is not correct about the University Grants Commission (UGC) ?
(A) It receives funds from State Governments in respect of State Universities.
15. Consider the statement which is followed by two arguments (I) and (II) :
Statement : Should India switch over to a two party system ?
Arguments : (I) Yes, it will lead to stability of Government.
(II) No, it will limit the choice of voters.
(A) Both the arguments are strong.
16.Consider the statement which is followed by two arguments (I) and (II) :
Statement : Should persons with criminal background be banned from contesting elections ?
Arguments : (I) Yes, it will decriminalise politics.
(II) No, it will encourage the ruling party to file frivolous cases against their political opponents.
(A) Only argument (I) is strong.
17.. Which of the following statement(s) is/are correct about a Judge of the Supreme Court of India ?
1. A Judge of the Supreme Court is appointed by the President of India.
2. He holds office during the pleasure of the President.
3. He can be suspended, pending an inquiry.
4. He can be removed for proven misbehaviour or incapacity.
Select the correct answer from the codes given below :
Codes :
(A) 1 and 4
18. In the warrant of precedence, the Speaker of the Lok Sabha comes next only to
(A) The Prime Minister
19.The black-board can be utilised best by a teacher for
(A) writing the important and notable points
20. Nowadays the most effective mode of learning is
(A) e-learning & blended learning
21.At the primary school stage, most of the teachers should be women because they
(A) can deal with children with love and affection
22.Which one is the highest order of learning ?
(A) Conditioned-reflex learning
23.A person can enjoy teaching as a profession when he
(A) commands respect from students
24. “A diagram speaks more than 1000 words.”The statement means that the teacher should
(A) use teaching aids in the class
25.A research paper
(A) contains peer-reviewed original research or evaluation of research conducted by others
26.Which one of the following belongs to the category of good ‘research ethics’ ?
(A) Conducting a review of the literature that acknowledges the contributions of other people in the relevant field or relevant prior work.
27.Which of the following sampling methods is not based on probability ?
(A) Quota Sampling
28.Which one of the following references is written as per Modern Language Association (MLA) format ?
(A) Hall, Donald. Fundamentals of Electronics.
New Delhi : Prentice Hall of India, 2005
29.A workshop is
(A) a brief intensive course for a small group emphasizing the development of a skill or technique for solving a specific problem.
30.A working hypothesis is
(A) a provisionally accepted hypothesis for further research.
31.Read the following passage carefully and answer the questions (31 to 36) :
The Taj Mahal has become one of the world’s best known monuments. This domed white
marble structure is situated on a high plinth at the southern end of a four-quartered garden,
evoking the gardens of paradise, enclosed within walls measuring 305 by 549 metres. Outside
the walls, in an area known as Mumtazabad, were living quarters for attendants, markets, serais
and other structures built by local merchants and nobles. The tomb complex and the other
imperial structures of Mumtazabad were maintained by the income of thirty villages given
specifically for the tomb’s support. The name Taj Mahal is unknown in Mughal chronicles, but
it is used by contemporary Europeans in India, suggesting that this was the tomb’s popular
name. In contemporary texts, it is generally called simply the Illuminated Tomb (Rauza-i-
Munavvara).
Mumtaz Mahal died shortly after delivering her fourteenth child in 1631. The Mughal
court was then residing in Burhanpur. Her remains were temporarily buried by the grief-
stricken emperor in a spacious garden known as Zainabad on the bank of the river Tapti. Six
months later her body was transported to Agra, where it was interred in land chosen for the
mausoleum. This land, situated south of the Mughal city on the bank of the Jamuna, had
belonged to the Kachhwaha rajas since the time of Raja Man Singh and was purchased from
the then current raja, Jai Singh. Although contemporary chronicles indicate Jai Singh’s willing
cooperation in this exchange, extant farmans (imperial commands) indicate that the final price
was not settled until almost two years after the mausoleum’s commencement. Jai Singh’s
further cooperation was insured by imperial orders issued between 1632 and 1637 demanding
that he provide stone masons and carts to transport marble from the mines at Makrana, within
his “ancestral domain”, to Agra where both the Taj Mahal and Shah Jahan’s additions to the
Agra fort were constructed concurrently.
Work on the mausoleum was commenced early in 1632. Inscriptional evidence indicates
much of the tomb was completed by 1636. By 1643, when Shah Jahan most lavishly celebrated
the ‘Urs ceremony for Mumtaz Mahal’, the entire complex was virtually complete.
------------------------------------------------------------------------------------------------
31. Marble stone used for the construction of the Taj Mahal was brought from the ancestral
domain of Raja Jai Singh. The name of the place where mines of marble is
(A) Makrana.
32.The popular name Taj Mahal was given by
(A) European travellers.
33.Point out the true statement from the following :
(A) The Taj Mahal is surrounded by a four-quartered garden known as Chahr Bagh.
34.In the contemporary texts the Taj Mahal is known
(A) Rauza-i-Munavvara
35.The construction of the Taj Mahal was completed between the period
(A) 1632 – 1643 A.D.
36.The documents indicating the ownership of land, where the Taj Mahal was built, known as
(A) Farman
---------------------------------------------------------------------------------------------
37.In the process of communication, which one of the following is in the chronological order ?
(A) Communicator, Message, Medium, Receiver, Effect
38.Bengal Gazette, the first Newspaper in India was started in 1780 by
(A) James Augustus Hicky
39.Press censorship in India was imposed during the tenure of the Prime Minister
(A) Indira Gandhi
40.Communication via New media such as computers, teleshopping, internet and mobile telephony is termed as
(A)) Interactive communication
41.Classroom communication of teacher rests on the principle of
(A)) Edutainment
42.________ is important when a teacher communicates with his/her student.
(A) Empathy
43.In a certain code GALIB is represented by HBMJC. TIGER will be represented by
(A) UJHFS
44.In a certain cricket tournament 45 matches were played. Each team played once against each of the other
teams. The number of teams participated in the tournament is
(A) 10
45.The missing number in the series 40, 120, 60, 180, 90, ?, 135 is
(A) 270 (40x3=120, 120/2=60, 60x3=180, 180/2=90, 90x3=270, 270/2=135)
46.The odd numbers from 1 to 45 which are exactly divisible by 3 are arranged in an ascending order. The number at 6th position is
(A) 33
47. The mean of four numbers a, b, c, d is 100. If c = 70, then the mean of the remaining numbers is
(A) 110
48.If the radius of a circle is increased by 50%, the perimeter of the circle will increase by
(A) 50%
49.If the statement ‘some men are honest’ is false, which among the following statements will be true.
Choose the correct code given below :
(i) All men are honest.
(ii) No men are honest.
(iii) Some men are not honest.
(iv) All men are dishonest.
Codes :
(A) (ii), (iii) and (iv)
50.Choose the proper alternative given in the codes to replace the question mark.
Bee – Honey, Cow – Milk, Teacher – ?
(A) Wisdom
51.P is the father of R and S is the son of Q and T is the brother of P. If R is the sister of S, how is Q related to T ?
(A) Sister-in-law
52.A definition put forward to resolve a dispute by influencing attitudes or stirring emotions is called
(A)Persuasive
53.Which of the codes given below contains only the correct statements ?
Statements :
(i) Venn diagram is a clear methodof notation.
(ii) Venn diagram is the most directmethod of testing the validity of categorical syllogisms.
(iii) In Venn diagram method the premises and the conclusion of a categorical syllogism is diagrammed.
(iv) In Venn diagram method the three overlapping circles are drawn for testing a categorical syllogism.
Codes :
(A) (i), (ii) & (iv)
54.Inductive reasoning presupposes
(A) uniformity in human nature
UGC NET june-13 PAPER-III
1.The Software Maturity Index (SMI) is defined as SMI = [Mf – (Fa + Fc + Fd)] / M Where Mf = the number of modules in the current release. Fa = the number of modules in the current release that have been added. Fc = the number of modules in the current release that have been changed. Fd = the number of modules in the current release that have been deleted. The product begins to stabilize when
(A) SMI approaches 1
2.Match the following :
(A)
a. Watson-Felix model - Cost estimation
b. Quick-Fix model - Maintenence
c.Putnam resource allocation model-Project planning
d.Logarithmetic-Poisson Model - Failure intensity
3.__________ is a process model that removes defects before they can precipitate serious hazards.
(A) Cleanroom software engineering
4.Equivalence partitioning is a __________ method that divides the input domain of a program into classes of data from which test cases can be derived.
(A) Black-box testing
5.The following three golden rules :
(i) Place the user in control
(ii) Reduce the user’s memory load
(iii) Make the interface consistent are for
(A) Good interface design
6.Software safety is a __________ activity that focuses on the identification and assessment of potential hazards that may affect software negatively and cause an entire system to fail.
(A) Software quality assurance
7.The “PROJECT” operator of a relational algebra creates a new table that has always
(A) Same number of rows as the original table
8.The employee information of an Organization is stored in the relation :
Employee (name, sex, salary,deptname) Consider the following SQL query
Select deptname from Employee Where sex = ‘M’
group by deptname
having avg (salary) > {select avg (salary) from Employee}
Output of the given query corresponds to
(A) Average salary of male employees in a department is more than average salary of the organization.
9.For a database relation R(a, b, c, d) where the domains of a, b, c, d include only the atomic values. The functional dependency a → c, b → d holds in the following relation
(A) In 1NF not in 2NF
10. Match the following :
a. RAID 0 i. Bit interleaved parity
b. RAID 1 ii. Non redundant stripping
c. RAID 2 iii. Mirrored disks
d. RAID 3 iv. Error correcting codes
11.The golden ratio φ and its conjugate– φ both satisfy the equation
(A) x2 – x – 1 = 0
12.The solution of recurrence relation, T(n) = 2T(floor ( n)) + logn is
(A) O(logn log logn)
13.In any n-element heap, the number of nodes of height h is
(A) less than equal to n/[2to the power of h + 1]
14.A data file of 1,00,000 characters
contains only the characters g-l, with
the frequencies as indicated in table :
g h i j k l
Frequency 45 13 12 16 9 5
in thousand using the variable-length code by Huffman codes, the file can be encoded with
(A) 2,24,000 bits
15.A vertex cover of an undirected graph G(V, E) is a subset V1 ⊆ V vertices such that
(A) If (u, v) ∈ E then u ∈ V1 or v ∈ V1
16.In a fully connected mesh network with n devices, there are ________ physical channels to link all devices.
(A) n(n–1)/2
17.The baud rate of a signal is 600 baud/second. If each signal unit carries 6 bits, then the bit rate of a signal is ________.
(A) 3600
18. Match the following :
(A)
a. Data link -Node to node delivery
b. Network layer -Routing layer
c. Transport layer -Flow layer control
d. Application -Mail services
19.An image is 1024∗800 pixels with 3 bytes/pixel. Assume the image is uncompressed. How long does it take to transmit it over a 10-Mbps Ethernet ?
(A) 1.966 seconds
20.The ________ measures the relative strengths of two signals or a signal at two different points.
(A) decibel
21.Which one of the following media is multidrop ?
(A) Thick Coaxial cable
22.What is the baud rate of the standard 10 Mbps Ethernet ?
(A) 20 megabaud
23.At any iteration of simplex method, if Δj (Zj – Cj) corresponding to any non-basic variable Xj is obtained as zero, the solution under the test is
(A) Alternative solution
24.A basic feasible solution to a m-origin, n-destination transportation problem is said to be _________ if the number of positive allocations are less than m + n – 1.
(A) degenerate
25.he total transportation cost in an initial basic feasible solution to the following transportation problem using Vogel’s Approximation method is
W1 W2 W3 W4 W5 Supply
F1 4 2 3 2 6 8
F2 5 4 5 2 1 12
F3 6 5 4 7 3 14
Demand 4 4 6 8 8
(A) 80
26.An actor in an animation is a small program invoked _______ per frame to determine the characteristics of some object in the animation.
(A) once
27.Bresenham line drawing algorithm is attractive because it uses
(A) Integer arithmetic only
28.The refresh rate above which a picture stops flickering and fuses into a steady image is called _________.
(A) Critical fusion frequency
29.In homogenous coordinate system (x, y, z) the points with z = 0 are called
(A) Point at infinity
30.If 40 black lines interleaved with 40 white lines can be distinguished across one inch, the resolution is
(A) 40 line-pairs per inch
31.Images tend to be very large collection of data. The size of memory required for a 1024 by 1024 image in which the colour of each pixel is represented by a n-bit number, (in an 8 bit machines) is
(A) n / 8 MB
32.Arrays in C language can have _________ with reference to memory representation.
(A)only one subscript
33.Refer the points as listed below :
(a) What are the precedence rules ?
(b) What are the associativity rules ?
(c) What is the order of operand evaluation ?
(d) Are there restrictions on operand evaluation side effects ?
Which of the above must be considered as primary design issues for arithmetic expressions ?
(A) (a), (b), (c) and (d)
34.Horn clauses are special kinds of propositions which can be described as
(A) A single atomic proposition on left side or an empty left side.
35.Which of the following is/are the fundamental semantic model(s) of parameter passing ?
(A) all of the above
36.The grammar with production rules S → aSb |SS|λ generates language L given by :
(A) L = {w∈{a, b}* | na(w) = nb(w)and na(v) ≥ nb(v) where v is any prefix of w}
37.A pushdown automation M = (Q, Σ,Γ, δ, q0, z, F) is set to be deterministic subject to which of the following condition(s), for every q ∈ Q, a ∈ Σ ∪ {λ} and b ∈ Γ
(s1) δ(q, a, b) contains at most one element
(s2) if δ(q, λ, b) is not empty then δ(q, c, b) must be empty for every c∈Σ
(A) Both s1 and s2
38.For every context free grammar (G) there exists an algorithm that passes any w ∈ L(G) in number of steps proportional to
(A) |w|3
39.Match the following :
(A)
a. Context sensitive language - Recursive language
b. Regular grammar - Deterministic finite automation
c. Context free grammar - Pushdown automation
d. Unrestricted grammar - Recursive enumerable
40.The statements s1 and s2 are given as :
s1 : Context sensitive languages are closed under intersection, concatenation, substitution and inverse homomorphism.
s2 : Context free languages are closed under complementation, substitution and homomorphism.
Which of the following is correct statement ?
(A) s1 is correct and s2 is not correct.
41.Which one of the following is not an addressing mode ?
(A) Relative indexed
42.Computers can have instruction formats with
(A) zero address, one address, two address and three address instructions
43.Which is not a typical program control instruction ?
(A) SHL
44.Interrupt which arises from illegal orerroneous use of an instruction or data is
(A) Internal interrupt
45.The simplified function in product of sums of Boolean function F(W, X, Y, Z) = Σ(0, 1, 2, 5, 8, 9, 10) is
(A) (W' + X') (Y' + Z') (X' + Z)
46.Match the following :
(A)
a. TTL -Evolution of “diode-transistor-logic”
b. ECL -High speed digital circuits
c. MOS -High component density
d. CMOS -Low power consumption
47.Match the following :
(A)
a. Foreign keys -Referential integrity
b. Private key -Domain constraint
c. Event control action model -Trigger
d. Data security -Encryption
48.When an array is passed as a parameter to a function which of the following statements is correct ?
(A) The function can change values in the original array.
49.Suppose you want to delete the name that occurs before “Vivek” in an alphabetical listing. Which of the following data structures shall be most efficient for this operation ?
(A) Doubly linked list
50.What will be the output of the
following segment of the program ?
main()
{
char *s = “hello world”;
int i = 7;
printf(“%, *s”, i, s);
}
(A)%, *s
51.Trace the error :
void main( )
{
int *b, &a;
*b = 20
printf(“%d, %d”, a, *b)
}
(A) Syntax error
52.Match the following :
a. calloc( ) -Allocates space for array
b. free( ) -Frees previously allocated space
c. malloc( ) -Allocates requested size of space
d. realloc( ) -Modifies previously allocated space
53.Binary symmetric channel uses
(A) Half duplex protocol
54.Hamming distance between 100101000110 and 110111101101 is
(A) 6
55.Given code word 1110001010 is to be transmitted with even parity check bit. The encoded word to be transmitted for this code is
(A) 11100010101
56.The number of distinct binary images which can be generated from a given binary image of right M × N are
(A) 2to the power of MN
57.If f(x, y) is a digital image, then x, y and amplitude values of f are
(A) Finite
58.Consider the following processes with time slice of 4 milliseconds (I/O
requests are ignored) :
Process A B C D
Arrival time 0 1 2 3
CPU cycle 8 4 9 5
The average turn around time of these processes will be
(A) 18.25 milliseconds
59.A job has four pages A, B, C, D and the main memory has two page frames only. The job needs to process its pages in following order :
ABACABDBACD
Assuming that a page interrupt occurs when a new page is brought in the main memory, irrespective of whether the page is swapped out or not. The number of page interrupts in FIFO and LRU page replacement algorithms are
(A) 9 and 8
60.Suppose S and Q are two semaphores
initialized to 1. P1 and P2 are two
processes which are sharing resources.
P1 has statements P2 has statements
wait(S) ; wait(Q) ;
wait(Q) ; wait(S) ;
critical- critical-
section 1; section 2;
signal(S) ; signal(Q) ;
signal(Q) ; signal(S) ;
Their execution may sometimes lead
to an undesirable situation called
(A) Deadlock
61.An operating system using banker’s algorithm for deadlock avoidance has ten dedicated devices (of same type) and has three processes P1, P2 and P3 with maximum resource requirements of 4, 5 and 8 respectively. There are two states of allocation of devices as follows :
State 1 Processes P1 P2 P3
Devices
allocated 2 3 4
State 2 Processes P1 P2 P3
Devices
allocated 0 2 4
Which of the following is correct ?
(A) State 1 is unsafe and state 2 is safe.
62.Let the time taken to switch between user mode and kernel mode of execution be T1 while time taken to switch between two user processes be T2. Which of the following is correct ?
(A) T1 < T2
63.Working set model is used in memory management to implement the concept of
(A) Principal of Locality
64.A UNIX file system has 1 KB block size and 4-byte disk addresses. What is the maximum file size if the inode contains ten direct block entries, one single indirect block entry, one double indirect block entry and one triple indirect block entry ?
(A) 16 GB
65.A thread is usually defined as a light weight process because an Operating System (OS) maintains smaller data structure for a thread than for a process. In relation to this, which of the following statement is correct ?
(A) OS maintains only CPU registers for each thread
66.The versions of windows operating system like windows XP and window Vista uses following file system :
(1) FAT-16
(2) FAT-32
(3) NTFS (NT File System)
(A) All of the above
67.Which one of the following is a correct implementation of the meta-predicate “not” in PROLOG (Here G represents a goal) ?
(A) not(G):– call(G), !, fail. not(G).
68.Which one of the following is not an informed search technique ?
(A) Depth first search
69.If we convert ∃u ∀v ∀x ∃y (P(f(u),v, x, y) → Q(u,v,y)) to ∀v ∀x (P(f(a),v, x, g(v,x)) → Q(a,v,g(v,x))) This process is known as
(A) Skolemization
70.Given two jugs of capacities 5 litres and 3 litres with no measuring markers on them. Assume that there is endless supply of water. Then the minimum number of states to measure 4 litres water will be
(A) 7
71.The map colouring problem can be solved using which of the following technique ?
(A) Constraint satisfaction
72.Which of the following is a knowledge representation technique used to represent knowledge about stereotype situation ?
(A) Scripts
73.If A and B are two fuzzy sets with membership functions μA(x) = {0.6, 0.5, 0.1, 0.7, 0.8} μB(x) = {0.9, 0.2, 0.6, 0.8, 0.5} ––––– Then the value of μA ∪ B(x) will be
(A){0.1, 0.5, 0.4, 0.2, 0.2}
74.A fuzzy set A on R is ________ iff A(λx1 + (1 – λ)x2) ≥ min [A(x1),A(x2)] for all x1, x2 ∈ R and all λ ∈ [0, 1], where min denotes the minimumoperator.
(A) Convex
(A) SMI approaches 1
2.Match the following :
(A)
a. Watson-Felix model - Cost estimation
b. Quick-Fix model - Maintenence
c.Putnam resource allocation model-Project planning
d.Logarithmetic-Poisson Model - Failure intensity
3.__________ is a process model that removes defects before they can precipitate serious hazards.
(A) Cleanroom software engineering
4.Equivalence partitioning is a __________ method that divides the input domain of a program into classes of data from which test cases can be derived.
(A) Black-box testing
5.The following three golden rules :
(i) Place the user in control
(ii) Reduce the user’s memory load
(iii) Make the interface consistent are for
(A) Good interface design
6.Software safety is a __________ activity that focuses on the identification and assessment of potential hazards that may affect software negatively and cause an entire system to fail.
(A) Software quality assurance
7.The “PROJECT” operator of a relational algebra creates a new table that has always
(A) Same number of rows as the original table
8.The employee information of an Organization is stored in the relation :
Employee (name, sex, salary,deptname) Consider the following SQL query
Select deptname from Employee Where sex = ‘M’
group by deptname
having avg (salary) > {select avg (salary) from Employee}
Output of the given query corresponds to
(A) Average salary of male employees in a department is more than average salary of the organization.
9.For a database relation R(a, b, c, d) where the domains of a, b, c, d include only the atomic values. The functional dependency a → c, b → d holds in the following relation
(A) In 1NF not in 2NF
10. Match the following :
a. RAID 0 i. Bit interleaved parity
b. RAID 1 ii. Non redundant stripping
c. RAID 2 iii. Mirrored disks
d. RAID 3 iv. Error correcting codes
11.The golden ratio φ and its conjugate– φ both satisfy the equation
(A) x2 – x – 1 = 0
12.The solution of recurrence relation, T(n) = 2T(floor ( n)) + logn is
(A) O(logn log logn)
13.In any n-element heap, the number of nodes of height h is
(A) less than equal to n/[2to the power of h + 1]
14.A data file of 1,00,000 characters
contains only the characters g-l, with
the frequencies as indicated in table :
g h i j k l
Frequency 45 13 12 16 9 5
in thousand using the variable-length code by Huffman codes, the file can be encoded with
(A) 2,24,000 bits
15.A vertex cover of an undirected graph G(V, E) is a subset V1 ⊆ V vertices such that
(A) If (u, v) ∈ E then u ∈ V1 or v ∈ V1
16.In a fully connected mesh network with n devices, there are ________ physical channels to link all devices.
(A) n(n–1)/2
17.The baud rate of a signal is 600 baud/second. If each signal unit carries 6 bits, then the bit rate of a signal is ________.
(A) 3600
18. Match the following :
(A)
a. Data link -Node to node delivery
b. Network layer -Routing layer
c. Transport layer -Flow layer control
d. Application -Mail services
19.An image is 1024∗800 pixels with 3 bytes/pixel. Assume the image is uncompressed. How long does it take to transmit it over a 10-Mbps Ethernet ?
(A) 1.966 seconds
20.The ________ measures the relative strengths of two signals or a signal at two different points.
(A) decibel
21.Which one of the following media is multidrop ?
(A) Thick Coaxial cable
22.What is the baud rate of the standard 10 Mbps Ethernet ?
(A) 20 megabaud
23.At any iteration of simplex method, if Δj (Zj – Cj) corresponding to any non-basic variable Xj is obtained as zero, the solution under the test is
(A) Alternative solution
24.A basic feasible solution to a m-origin, n-destination transportation problem is said to be _________ if the number of positive allocations are less than m + n – 1.
(A) degenerate
25.he total transportation cost in an initial basic feasible solution to the following transportation problem using Vogel’s Approximation method is
W1 W2 W3 W4 W5 Supply
F1 4 2 3 2 6 8
F2 5 4 5 2 1 12
F3 6 5 4 7 3 14
Demand 4 4 6 8 8
(A) 80
26.An actor in an animation is a small program invoked _______ per frame to determine the characteristics of some object in the animation.
(A) once
27.Bresenham line drawing algorithm is attractive because it uses
(A) Integer arithmetic only
28.The refresh rate above which a picture stops flickering and fuses into a steady image is called _________.
(A) Critical fusion frequency
29.In homogenous coordinate system (x, y, z) the points with z = 0 are called
(A) Point at infinity
30.If 40 black lines interleaved with 40 white lines can be distinguished across one inch, the resolution is
(A) 40 line-pairs per inch
31.Images tend to be very large collection of data. The size of memory required for a 1024 by 1024 image in which the colour of each pixel is represented by a n-bit number, (in an 8 bit machines) is
(A) n / 8 MB
32.Arrays in C language can have _________ with reference to memory representation.
(A)only one subscript
33.Refer the points as listed below :
(a) What are the precedence rules ?
(b) What are the associativity rules ?
(c) What is the order of operand evaluation ?
(d) Are there restrictions on operand evaluation side effects ?
Which of the above must be considered as primary design issues for arithmetic expressions ?
(A) (a), (b), (c) and (d)
34.Horn clauses are special kinds of propositions which can be described as
(A) A single atomic proposition on left side or an empty left side.
35.Which of the following is/are the fundamental semantic model(s) of parameter passing ?
(A) all of the above
36.The grammar with production rules S → aSb |SS|λ generates language L given by :
(A) L = {w∈{a, b}* | na(w) = nb(w)and na(v) ≥ nb(v) where v is any prefix of w}
37.A pushdown automation M = (Q, Σ,Γ, δ, q0, z, F) is set to be deterministic subject to which of the following condition(s), for every q ∈ Q, a ∈ Σ ∪ {λ} and b ∈ Γ
(s1) δ(q, a, b) contains at most one element
(s2) if δ(q, λ, b) is not empty then δ(q, c, b) must be empty for every c∈Σ
(A) Both s1 and s2
38.For every context free grammar (G) there exists an algorithm that passes any w ∈ L(G) in number of steps proportional to
(A) |w|3
39.Match the following :
(A)
a. Context sensitive language - Recursive language
b. Regular grammar - Deterministic finite automation
c. Context free grammar - Pushdown automation
d. Unrestricted grammar - Recursive enumerable
40.The statements s1 and s2 are given as :
s1 : Context sensitive languages are closed under intersection, concatenation, substitution and inverse homomorphism.
s2 : Context free languages are closed under complementation, substitution and homomorphism.
Which of the following is correct statement ?
(A) s1 is correct and s2 is not correct.
41.Which one of the following is not an addressing mode ?
(A) Relative indexed
42.Computers can have instruction formats with
(A) zero address, one address, two address and three address instructions
43.Which is not a typical program control instruction ?
(A) SHL
44.Interrupt which arises from illegal orerroneous use of an instruction or data is
(A) Internal interrupt
45.The simplified function in product of sums of Boolean function F(W, X, Y, Z) = Σ(0, 1, 2, 5, 8, 9, 10) is
(A) (W' + X') (Y' + Z') (X' + Z)
46.Match the following :
(A)
a. TTL -Evolution of “diode-transistor-logic”
b. ECL -High speed digital circuits
c. MOS -High component density
d. CMOS -Low power consumption
47.Match the following :
(A)
a. Foreign keys -Referential integrity
b. Private key -Domain constraint
c. Event control action model -Trigger
d. Data security -Encryption
48.When an array is passed as a parameter to a function which of the following statements is correct ?
(A) The function can change values in the original array.
49.Suppose you want to delete the name that occurs before “Vivek” in an alphabetical listing. Which of the following data structures shall be most efficient for this operation ?
(A) Doubly linked list
50.What will be the output of the
following segment of the program ?
main()
{
char *s = “hello world”;
int i = 7;
printf(“%, *s”, i, s);
}
(A)%, *s
51.Trace the error :
void main( )
{
int *b, &a;
*b = 20
printf(“%d, %d”, a, *b)
}
(A) Syntax error
52.Match the following :
a. calloc( ) -Allocates space for array
b. free( ) -Frees previously allocated space
c. malloc( ) -Allocates requested size of space
d. realloc( ) -Modifies previously allocated space
53.Binary symmetric channel uses
(A) Half duplex protocol
54.Hamming distance between 100101000110 and 110111101101 is
(A) 6
55.Given code word 1110001010 is to be transmitted with even parity check bit. The encoded word to be transmitted for this code is
(A) 11100010101
56.The number of distinct binary images which can be generated from a given binary image of right M × N are
(A) 2to the power of MN
57.If f(x, y) is a digital image, then x, y and amplitude values of f are
(A) Finite
58.Consider the following processes with time slice of 4 milliseconds (I/O
requests are ignored) :
Process A B C D
Arrival time 0 1 2 3
CPU cycle 8 4 9 5
The average turn around time of these processes will be
(A) 18.25 milliseconds
59.A job has four pages A, B, C, D and the main memory has two page frames only. The job needs to process its pages in following order :
ABACABDBACD
Assuming that a page interrupt occurs when a new page is brought in the main memory, irrespective of whether the page is swapped out or not. The number of page interrupts in FIFO and LRU page replacement algorithms are
(A) 9 and 8
60.Suppose S and Q are two semaphores
initialized to 1. P1 and P2 are two
processes which are sharing resources.
P1 has statements P2 has statements
wait(S) ; wait(Q) ;
wait(Q) ; wait(S) ;
critical- critical-
section 1; section 2;
signal(S) ; signal(Q) ;
signal(Q) ; signal(S) ;
Their execution may sometimes lead
to an undesirable situation called
(A) Deadlock
61.An operating system using banker’s algorithm for deadlock avoidance has ten dedicated devices (of same type) and has three processes P1, P2 and P3 with maximum resource requirements of 4, 5 and 8 respectively. There are two states of allocation of devices as follows :
State 1 Processes P1 P2 P3
Devices
allocated 2 3 4
State 2 Processes P1 P2 P3
Devices
allocated 0 2 4
Which of the following is correct ?
(A) State 1 is unsafe and state 2 is safe.
62.Let the time taken to switch between user mode and kernel mode of execution be T1 while time taken to switch between two user processes be T2. Which of the following is correct ?
(A) T1 < T2
63.Working set model is used in memory management to implement the concept of
(A) Principal of Locality
64.A UNIX file system has 1 KB block size and 4-byte disk addresses. What is the maximum file size if the inode contains ten direct block entries, one single indirect block entry, one double indirect block entry and one triple indirect block entry ?
(A) 16 GB
65.A thread is usually defined as a light weight process because an Operating System (OS) maintains smaller data structure for a thread than for a process. In relation to this, which of the following statement is correct ?
(A) OS maintains only CPU registers for each thread
66.The versions of windows operating system like windows XP and window Vista uses following file system :
(1) FAT-16
(2) FAT-32
(3) NTFS (NT File System)
(A) All of the above
67.Which one of the following is a correct implementation of the meta-predicate “not” in PROLOG (Here G represents a goal) ?
(A) not(G):– call(G), !, fail. not(G).
68.Which one of the following is not an informed search technique ?
(A) Depth first search
69.If we convert ∃u ∀v ∀x ∃y (P(f(u),v, x, y) → Q(u,v,y)) to ∀v ∀x (P(f(a),v, x, g(v,x)) → Q(a,v,g(v,x))) This process is known as
(A) Skolemization
70.Given two jugs of capacities 5 litres and 3 litres with no measuring markers on them. Assume that there is endless supply of water. Then the minimum number of states to measure 4 litres water will be
(A) 7
71.The map colouring problem can be solved using which of the following technique ?
(A) Constraint satisfaction
72.Which of the following is a knowledge representation technique used to represent knowledge about stereotype situation ?
(A) Scripts
73.If A and B are two fuzzy sets with membership functions μA(x) = {0.6, 0.5, 0.1, 0.7, 0.8} μB(x) = {0.9, 0.2, 0.6, 0.8, 0.5} ––––– Then the value of μA ∪ B(x) will be
(A){0.1, 0.5, 0.4, 0.2, 0.2}
74.A fuzzy set A on R is ________ iff A(λx1 + (1 – λ)x2) ≥ min [A(x1),A(x2)] for all x1, x2 ∈ R and all λ ∈ [0, 1], where min denotes the minimumoperator.
(A) Convex
ugc net june-13 paper-ii
1.COCOMO stands for
(A) COnstructive COst MOdel
2.Match the following :
a. Good quality i. Program does not fail for a specified time in a given environment
b. Correctness ii. Meets the functional requirements
c. Predictable iii. Meets both functional and non-functional requirements
d. Reliable iv. Process is under statistical control
Codes :
a b c d
(A) iii ii iv i
3.While estimating the cost of software, Lines Of Code (LOC) and Function Points (FP) are used to measure which one of the following ?
(A) Size of software
4.A good software design must have
(C) Low module coupling, High module cohesion
5.Cyclometric complexity of a flow graph G with n vertices and e edges is
(A) V(G) = e–n+2
6.When the following code is executed what will be the value of x and y ?
int x = 1, y = 0;
y = x++;
(A) 2,1
7.How many values can be held by an array A(–1,m;1,m) ?
(A) m(m+2)
8.What is the result of the expression
(1&2)+(3/4) ?
(A) 0
9.How many times the word ‘print’ shall be printed by the following program segment ?
for (i=1, i<2,i++)
for (j=1,j<2,j++)
for(k=1,k<2,k++)
printf("print/n")
(A) 8
10.Which of the following is not a type of Database Management System ?
(A) Sequential
11.Manager’s salary details are to be hidden from Employee Table. This Technique is called as
(A)External level Datahiding
12.A Network Schema
(A) permits many to many relationship
13.Which normal form is considered as adequate for usual database design ?
(A) 3NF
14.If D1,D2, .. ..Dn are domains in a relational model, then the relation is a table, which is a subset of
(A)D1×D2× ... ×Dn
15.Which of the following addresses is used to deliver a message to the correct application program running on a host ?
(A) Port
16.In ________ substitution, a character in the plaintext is always changed to the same character in the ciphertext, regardless of its position in the text.
(A) polyalphabetic
17.In classful addressing, the IP address 190.255.254.254 belongs to
(A) Class B
18.In hierarchical routing with 4800 routers, what region and cluster sizes should be chosen to minimize the size of the routing table for a three- layer hierarchy ?
(A) 15 clusters, 16 regions and 20 routers
19.In IPv4 header, the ______ field is needed to allow the destination host to determine which datagram a newly arrived fragments belongs to.
(A) identification
20.Given L1=L(a*baa*) and L2=L(ab*). The regular expression corresponding to language L3 = L1/L2 (right quotient) is given by
(A) a*ba*
21.Given the production rules of a grammar G1 as S1 → AB | aaB A → a | Aa B→b and the production rules of a grammar G2 as
S2 → aS2bS2 | bS2aS2 | λ Which of the following is correct statement ?
(A) G1 is ambiguous and G2 is ambiguous.
22.Given a grammar : S1 → Sc, S → SA | A, A → aSb | ab, there is a rightmost derivation S1 ⇒ Sc ⇒ SAC ⇒ SaSbc Thus, SaSbc is a right sentential form, and its handle is
(A) aSb
23.The equivalent production rules corresponding to the production rules S → Sα1 |Sα2 | β1 | β2 is
(A) S → β1 | β2 | β1A | β2A,
A → α1A | α2A | λ
24.Given a Non-deterministic Finite Automation (NFA) with states p and r as initial and final states respectively and transition table as given below :
a b
p – q
q r s
r r s
s r s
The minimum number of states required in Deterministic Finite Automation (DFA) equivalent to NFA is
(A) 3
25.Which is the correct statement(s) for Non Recursive predictive parser ?
S1 : First(α) = {t| α ⇒* tβ for some string β} ⇒*tβ
S2 : Follow(X)={ a| S⇒*αXaβ some strings α and β}
(A) Both statements S1 and S2 correct.
26.Given an open address hash table with load factor α < 1, the expected number of probes in a successful search is
(B) Atmost 1/α in 1/1– α
27.For a B-tree of height h and degree t,the total CPU time used to insert a node is
(A) O(th)
28.The time complexity to build a heap with a list of n numbers is
(A) O(n)
29.The value of postfix expression :
8 3 4 + – 3 8 2 / + * 2 $ 3 + is
(A) 52
30.Consider the following statements for priority queue :
S1 : It is a data structure in which the intrinsic ordering of the elements does determine the result of its basic operations.
S2 : The elements of a priority queue may be complex structures that are ordered on one or several fields.
(A) Both S1 and S2 are correct
31.Repository of information gathered from multiple sources, storing under unified scheme at a single site is called as
(A)Data warehousing
32.The task of correcting and pre processing data is called as
(A) Data cleaning
33.Using data p=3, q=11, n=pq, d=7 in RSA algorithm find the cipher text of the given plain text SUZANNE
(A) BUTAEEZ
34.The relation “divides” on a set of positive integers is ________.
(A) Anti symmetric and transitive
35.Give as good a big–O estimate as possible for the following functions :
(nlogn+n2)(n3+2)and(n!+2n)(n3+log(n2+1))
(A) O(n5) & O(n3* n!)
36.A test contains 100 true/false questions. How many different ways can a student answer the questions on the test, if the answer may be left blank also.
(A) 3 to the power of 100
37.Which of the following connected simple graph has exactly one spanning tree ?
Complete graph
Hamiltonian graph
Euler graph
(A) None of the above
38.How many edges must be removed to produce the spanning forest of a graph with N vertices, M edges and C connected components ?
(A)M–N+C
39.Which of the following shall be a compound proposition involving the propositions p, q and r, that is true when exactly two of the p, q and r are true and is false otherwise ?
(C) (p ∧ q ∧⎤ r) ∨ ( p ∧ ⎤ q ∧ r) ∨ (⎤ p ∧ q ∧ r)
40.The truth value of the statements :
∃!xP(x) → ∃xP(x) and ∃!x⎤ P(x) → ⎤∀xP(x), (where the notation ∃!xP(x) denotes the proposition “There exists a unique x such that P(x) is true”) are :
(A) True and True
41.How many different Boolean functions of degree 4 are there ?
(A) 2 to the power of 16
42.A Boolean operator s is defined as follows :
1 s 1 = 1, 1 s 0 = 0, 0 s 1 = 0 and 0s0=1 What will be the truth value of the expression (x s y) s z = x s (y s z) ?
(A)Always true
43.Which one of the following is decimal value of a signed binary number 1101010, if it is in 2’s complement form ?
(A) – 22
44.A set of processors P1, P2, ......, Pk can execute in parallel if Bernstein’s conditions are satisfied on a pairwise
basis; that is P1 || P2 || P3 || ..... || Pk if and only if :
(A) Pi || Pj for all i ≠ j
45.When a mobile telephone physically moves from one to another cell, the base station transfers ownership to the cell getting strongest signal. This process is known as _______.
(A) handoff
46.A virtual memory based memory management algorithm partially swaps out a process. This is an example of
(A) medium term scheduling
47.Assuming that the disk head is located initially at 32, find the number of disk moves required with FCFS if the disk queue of I/O block requests are 98, 37, 14, 124, 65, 67 :
(A)321
48.Let the page fault service time be 10 millisecond(ms) in a computer with average memory access time being 20 nanosecond(ns). If one page fault is generated for every 106 memory accesses, what is the effective access time for memory ?
(A) 30 ns
49.Consider the following UNIX command : sort <in> temp; head – 30 <temp; rm temp Which of the following functions shall be performed by this command ?
(A) Sort, taking the input from “in” and writing the output to “temp” then prints 30 lines from temp on terminal. Finally “temp” is removed.
50.The mv command changes
(A) the directory entry
(A) COnstructive COst MOdel
2.Match the following :
a. Good quality i. Program does not fail for a specified time in a given environment
b. Correctness ii. Meets the functional requirements
c. Predictable iii. Meets both functional and non-functional requirements
d. Reliable iv. Process is under statistical control
Codes :
a b c d
(A) iii ii iv i
3.While estimating the cost of software, Lines Of Code (LOC) and Function Points (FP) are used to measure which one of the following ?
(A) Size of software
4.A good software design must have
(C) Low module coupling, High module cohesion
5.Cyclometric complexity of a flow graph G with n vertices and e edges is
(A) V(G) = e–n+2
6.When the following code is executed what will be the value of x and y ?
int x = 1, y = 0;
y = x++;
(A) 2,1
7.How many values can be held by an array A(–1,m;1,m) ?
(A) m(m+2)
8.What is the result of the expression
(1&2)+(3/4) ?
(A) 0
9.How many times the word ‘print’ shall be printed by the following program segment ?
for (i=1, i<2,i++)
for (j=1,j<2,j++)
for(k=1,k<2,k++)
printf("print/n")
(A) 8
10.Which of the following is not a type of Database Management System ?
(A) Sequential
11.Manager’s salary details are to be hidden from Employee Table. This Technique is called as
(A)External level Datahiding
12.A Network Schema
(A) permits many to many relationship
13.Which normal form is considered as adequate for usual database design ?
(A) 3NF
14.If D1,D2, .. ..Dn are domains in a relational model, then the relation is a table, which is a subset of
(A)D1×D2× ... ×Dn
15.Which of the following addresses is used to deliver a message to the correct application program running on a host ?
(A) Port
16.In ________ substitution, a character in the plaintext is always changed to the same character in the ciphertext, regardless of its position in the text.
(A) polyalphabetic
17.In classful addressing, the IP address 190.255.254.254 belongs to
(A) Class B
18.In hierarchical routing with 4800 routers, what region and cluster sizes should be chosen to minimize the size of the routing table for a three- layer hierarchy ?
(A) 15 clusters, 16 regions and 20 routers
19.In IPv4 header, the ______ field is needed to allow the destination host to determine which datagram a newly arrived fragments belongs to.
(A) identification
20.Given L1=L(a*baa*) and L2=L(ab*). The regular expression corresponding to language L3 = L1/L2 (right quotient) is given by
(A) a*ba*
21.Given the production rules of a grammar G1 as S1 → AB | aaB A → a | Aa B→b and the production rules of a grammar G2 as
S2 → aS2bS2 | bS2aS2 | λ Which of the following is correct statement ?
(A) G1 is ambiguous and G2 is ambiguous.
22.Given a grammar : S1 → Sc, S → SA | A, A → aSb | ab, there is a rightmost derivation S1 ⇒ Sc ⇒ SAC ⇒ SaSbc Thus, SaSbc is a right sentential form, and its handle is
(A) aSb
23.The equivalent production rules corresponding to the production rules S → Sα1 |Sα2 | β1 | β2 is
(A) S → β1 | β2 | β1A | β2A,
A → α1A | α2A | λ
24.Given a Non-deterministic Finite Automation (NFA) with states p and r as initial and final states respectively and transition table as given below :
a b
p – q
q r s
r r s
s r s
The minimum number of states required in Deterministic Finite Automation (DFA) equivalent to NFA is
(A) 3
25.Which is the correct statement(s) for Non Recursive predictive parser ?
S1 : First(α) = {t| α ⇒* tβ for some string β} ⇒*tβ
S2 : Follow(X)={ a| S⇒*αXaβ some strings α and β}
(A) Both statements S1 and S2 correct.
26.Given an open address hash table with load factor α < 1, the expected number of probes in a successful search is
(B) Atmost 1/α in 1/1– α
27.For a B-tree of height h and degree t,the total CPU time used to insert a node is
(A) O(th)
28.The time complexity to build a heap with a list of n numbers is
(A) O(n)
29.The value of postfix expression :
8 3 4 + – 3 8 2 / + * 2 $ 3 + is
(A) 52
30.Consider the following statements for priority queue :
S1 : It is a data structure in which the intrinsic ordering of the elements does determine the result of its basic operations.
S2 : The elements of a priority queue may be complex structures that are ordered on one or several fields.
(A) Both S1 and S2 are correct
31.Repository of information gathered from multiple sources, storing under unified scheme at a single site is called as
(A)Data warehousing
32.The task of correcting and pre processing data is called as
(A) Data cleaning
33.Using data p=3, q=11, n=pq, d=7 in RSA algorithm find the cipher text of the given plain text SUZANNE
(A) BUTAEEZ
34.The relation “divides” on a set of positive integers is ________.
(A) Anti symmetric and transitive
35.Give as good a big–O estimate as possible for the following functions :
(nlogn+n2)(n3+2)and(n!+2n)(n3+log(n2+1))
(A) O(n5) & O(n3* n!)
36.A test contains 100 true/false questions. How many different ways can a student answer the questions on the test, if the answer may be left blank also.
(A) 3 to the power of 100
37.Which of the following connected simple graph has exactly one spanning tree ?
Complete graph
Hamiltonian graph
Euler graph
(A) None of the above
38.How many edges must be removed to produce the spanning forest of a graph with N vertices, M edges and C connected components ?
(A)M–N+C
39.Which of the following shall be a compound proposition involving the propositions p, q and r, that is true when exactly two of the p, q and r are true and is false otherwise ?
(C) (p ∧ q ∧⎤ r) ∨ ( p ∧ ⎤ q ∧ r) ∨ (⎤ p ∧ q ∧ r)
40.The truth value of the statements :
∃!xP(x) → ∃xP(x) and ∃!x⎤ P(x) → ⎤∀xP(x), (where the notation ∃!xP(x) denotes the proposition “There exists a unique x such that P(x) is true”) are :
(A) True and True
41.How many different Boolean functions of degree 4 are there ?
(A) 2 to the power of 16
42.A Boolean operator s is defined as follows :
1 s 1 = 1, 1 s 0 = 0, 0 s 1 = 0 and 0s0=1 What will be the truth value of the expression (x s y) s z = x s (y s z) ?
(A)Always true
43.Which one of the following is decimal value of a signed binary number 1101010, if it is in 2’s complement form ?
(A) – 22
44.A set of processors P1, P2, ......, Pk can execute in parallel if Bernstein’s conditions are satisfied on a pairwise
basis; that is P1 || P2 || P3 || ..... || Pk if and only if :
(A) Pi || Pj for all i ≠ j
45.When a mobile telephone physically moves from one to another cell, the base station transfers ownership to the cell getting strongest signal. This process is known as _______.
(A) handoff
46.A virtual memory based memory management algorithm partially swaps out a process. This is an example of
(A) medium term scheduling
47.Assuming that the disk head is located initially at 32, find the number of disk moves required with FCFS if the disk queue of I/O block requests are 98, 37, 14, 124, 65, 67 :
(A)321
48.Let the page fault service time be 10 millisecond(ms) in a computer with average memory access time being 20 nanosecond(ns). If one page fault is generated for every 106 memory accesses, what is the effective access time for memory ?
(A) 30 ns
49.Consider the following UNIX command : sort <in> temp; head – 30 <temp; rm temp Which of the following functions shall be performed by this command ?
(A) Sort, taking the input from “in” and writing the output to “temp” then prints 30 lines from temp on terminal. Finally “temp” is removed.
50.The mv command changes
(A) the directory entry
Subscribe to:
Posts (Atom)
Oracle Reserved Words
Oracle Reserved Words The following words are reserved by Oracle. That is, they have a special meaning to Oracle and so cannot be redefi...
-
Create an employee database in ms-access as follows Write javascript code as follows ------------------------------------------ 1) Ad...
-
Program using OLE Container control: 1. Select OLE control in Toolbox. 2. Place the control on the form with the...
-
CPU Scheduler Ø Selects from among the processes in memory that are ready to execute, and allocates the CPU to one of them. Ø C...