Monday 4 January 2016

UGC NET Computer Science and Applications June 2006 PAPER 2 SOLUTION




 1.      Which  of  the  following  strings  is  in  the  language  defined  by  grammar  
 OA, A  1A/0A/1  
(A)  01100                   (B)   00101                   (C)  10011                   (D)  11111
 Hints: 

2.             For a complete graph with N vertices, the total number of spanning trees is given by :  (A)  2N-1                  (B)   NN-1                   (C)  NN-2                     (D)  2N+1 

 3.             The preposition (p  q)  (~ q  p) is equivalent to :  
 (A)     p        (B)   p  q (C)    (q  p)  (p  q)        (D)  (p  q)  (q  p) 

 4.             The logic of pumping lemma is a good example of :  
(A)pigeon hole principle(B)recursion
(C)divide and conquer technique(D)iteration
   5.             Let A={ x |-1 < x < 1 }=B. The function f (x)= from A to B is :
(A)injective(B)   surjective
(C)both injective and surjective(D)  neither injective nor surjective

 6.             The number of 1’s present in the binary representation of is :  (A)  8                            (B)   9                            (C)  10                          (D)  11 
Hints: 

 7.             Which of the following expression removes static hazard from a two level AND - OR gate implementation of x y + z x’ 
(A)y + zx’(B)y + zx’+ wyz
(C)x y + z x’+ yz(D)y+ zx’+ wz
  
8.             Which of the following logic has the maximum fan out ?   
(A)  RTL                       (B)   ECL                      (C)  NMOS                   (D)  CMOS 

 9.             In a weighted code with weight 6, 4, 2, 23 the decimal 5 is represented by :  
(A)  0101(B)   0111(C)  1011(D)  1000

10.        Upto how many variables, can the Karnaugh map be used ?  
 (A)  3                            (B)   4                           (C)  5                            (D)  6 

 11.        What is the output of the following program segment ?  
 main ( )  
{  
int   count;
 int digit=0; 
count=1;
while(digit<=9)
 {printf (“%d/n”, ++count); 
  ++digit;
}  
}  
(A)  10                          (B)   9                            (C)  12                          (D)  11

12.        A static variable is one :  
 (A)        Which cannot be initialized  

 (B)         Which is initialized once at the commencement of execution and cannot be changed at runtime   
(C)        Which retains its value throughout the life of the program  
 (D)         Which is the same as an automatic variable but is placed at the head of a program    

13.        If the following loop is implemented   
Main() 
{  
int num=0; 
 do { - - num; 
 printf("%d",num); 
num++;} while (num >=0);
}
   
  (A)        the loop will run infinitely many times   
  (B)        the program will not enter the loop
  (C)        there will be compilation error reported
  (D)        a run time error will be reported  

 14.        # define max (xyx=(x > y) ? x : y is a macro definition, which can find the maximum of two numbers x and y if :

  (A)        and y are both integers only        
 (B)        and y are both declared as float only  
 (C)        and y are both declared as double only 
  (D)        and y are both integers, float or double  
  
15.        The function sprintf ( ) works like printf ( ), but operates on :  
(A)  Data in a file    (B)   stdrr           (C)  stdin        (D)  string

16.        A relation R5{A, B, C, D, E, F} is given with following set of functional dependencies :  = {A  B, AD  C, B  F, A  E}  
Which of the following is candidate key ? 
 (A)  A                           (B)   AC                        (C)  AD               (D)  None of these 

 17.        Immediate updates as a recovery protocol is preferable, when : 
  (A)        Database reads more than writes  
 (B)        Writes are more than reads  
 (C)        It does not matter as it is good in both the situations  
 (D)        There are only writes   

18.        Which of the following statement is wrong ?
  (A)        2 - phase locking protocol suffers from dead locks
  (B)        Time - Stamp protocol suffers from more abort  
 (C)        Time stamp protocol suffers from cascading rollbacks where as 2 - phase locking protocol do not 
 (D)        None of these  

 19.        Which data management language component enabled the DBA to define the schema components ?  
(A)DML(B)Subschema DLL
(C)Schema DLL(D)All of these

 20.        A subclass having more than one super class is called __________ .  
(A)Category(B)Classification
(C)Combination(D)Partial participation

 21.  In the balanced binary tree given below, how many nodes will become unbalanced when a node is inserted as a child of the node “g”. 



(A)  1                            (B)   3                            (C)  7                            (D)  8

 22.        Preorder is also known as :  
(A)Depth first order(B)Breadth first order
(C)Topological order(D)Linear order

23.        Which of the following statement is false ? 
  (A)        Every tree is a bipartite graph   
(B)        A tree contains a cycle 
(C)        A tree with n nodes contains (n-1) edges  
 (D)        A tree is connected graph   

24.        If the post fix form of a string is ABC+-D*, The actual string is :  
(A)  (A-(B+C))*D(B)   ((A-B)+C)*D
(C)  ((A+B)-C)*D(D)  (A+(B-C)*D)

 25.        Application of data structure queue is :  
(A)Levelwise printing of tree(B)   Implementation of priority queues
(C)Function call implementation(D)  Depth first search in a graph

 26.        What is the transmission signal coding method for a T1 carrier called ?  
 (A)  Binary          (B)   NRZ                      (C)  Bipolar                 (D)  Manchester 

 27.        How much bandwidth is required to send 132 voice - grade channels by FDM on an international satellite system ?   
(A)  500 MHz              (B)   10 MHz                (C)  1320 MHz             (D)  50 MHz 

 28.        What is the difference between the Ethernet frame preamble field and the IEEE 802.3 preamble and start of frame Delimiter fields ?   
(A)  1 byte                   (B)   1 bit                      (C)  4 bits                     (D)  16 bits 

 29.        What is the function of a translating bridge ?  
 (A)        Connect similar remote LANs  
 (B)        Connect similar local LANs  
 (C)        Connect different types of LANs 
 (D)        Translate the network addresses into a layer 2 address  

 30.        The program used to determine the round - trip delay between a workstation and a destination address is :   
(A)  Tracert    B)   Traceroute         (C)  Ping                      (D)  Pop 

 31.        Which statement is wrong ?  
 (A)        If linked origin  translated origin, relocation must be performed by the linker
  (B)        If load  linked origin, the loader must perform relocation  
 (C)        A linker always perform relocation, whereas some loaders do not 
 (D)        None of thses  

32.        Tasks done in parsing are :  
   (A)        Check the validity of a source string 
   (B)        Determine the syntactic structure of a source string
   (C)        Both (A) and (B)   
  (D)        None of these   

33.        YACC builds up __________ parsing table.  
 (A)  LALR                   (B)   LR                         (C)  SLR                       (D)  LLR 

 34.        The action of passing the source program into the proper syntactic class is known as :  
(A)Syntax analysis(B)Lexical analysis
(C)Interpretation analysis(D)Uniform symbol generation

 35.        The dynamic binding occurs during the :  
(A)Compile time(B)Run time
(C)Linking time(D)Pre - processing time

 36.        The first operating system of Microprocessor is __________ .   
(A)  ATLAS                 (B)   CP/M                    (C)  SAGE                   (D)  T.H.E.  

37.        In processor management, round robin method essentially uses the preemptive version of __________ .   
(A)  FILO                      (B)   FIFO        (C)  SJF          (D)  Longest time first 

38.        A page fault __________ .  
 (A)        is an error in specific page  
 (B)        is an access to the page not currently in main memory  
 (C)        occurs when a page program accesses a page of memory  
 (D)        is reference to the page which belongs to another program  

 39.        __________ synchronize critical resources to prevent deadlock.  
 (A)  P - operator         (B)   V - operator         (C)  Semaphores      (D)  Hard disk

40.        The memory allocation scheme subjected to “external” fragmentation is :  
(A)Segmentation(B)Swapping
(C)Demand paging(D)Multiple contiguous fixed partitions

 41.        In software project planning, work Breakdown structure must be __________ .  
(A)A graph(B)   A tree
(C)A Eular’s graph(D)  None of the above
           

42.        In Software Metrics, McCABE’S cyclomatic number is given by following formula :  
(A)  c=e-n+2p(B)C=e-n-2p
(C)  c=e+n+2p(D)C=e-n* 2p

43.        In a good software design, __________ coupling is desirable between modules.  (A)  Highest                 (B)   Lowest                (C)  Internal                  (D)  External  

44.        System study yields the following :  
(A)Requirement specifications(B)Prevailing process description
(C)Data source identification(D)All the above
   
 45.        The COCOMO model is used for __________ .  
(A)software design(B)software cost estimation
(C)software cost approximation(D)software analysis
   
 46.        MMS (Multimedia Messaging Service) uses __________ types of messages to perform messaging transactions.   
(A)  4                            (B)   6                           (C)  8                            (D)  10 

  47.        Bluetooth technology uses the transmission media.  
(A)Radio links(B)Microwave links
(C)VSAT communication(D)Optical fiber links

  48.        Downflow is the process associated with __________ and back up of data in a warehouse.   
(A)  packaging            (B)   archiving            (C)  extraction              (D)  loading  

 49.        Predictive modeling in data mining uses __________ technique.  
(A)Statistical(B)Association Discovery
(C)Value prediction(D)None of these

  50.        The use of a smart card represents a form of :  
(A)password encryption(B)user - ID encryption
(C)authorization(D)authentication



No comments:

Post a Comment