UGC NET Computer Science Solved Paper -III Dec 2015

UGC NET Computer Science Solved Paper -III Dec 2015

1.    The three outputs x1x2x3 from the 8 x 3 priority encoder are used to provide a vector address of the form 101x1x2x300. What is the second highest priority vector address in hexadecimal if the vector adIresses are starting from the one with the highest priority ?
(1)     BC    (2)     A4    (3)     BD    (4)     AC

2.    What will be the output at PORT1 if the following program is executed ?
MVI B, 82H
MOV A, B
MOV C, A
MVI D, 37H
OUT PORT1
HLT
(1)  37H       (2)  82H      (3)  B9H      (4)   00H

3.    Which of the following 8085 microprocessor hardware interrupt has the lowest priority ?
(1)     RST6.5    (2)     RST 7.5    (3)     TRAP    (4)     INTR

4.    A dynamic RAM has refresh cycle of 32 times per msec. Each refresh operation requires 100 nsec and a memory cycle requires 250 nsec. What percentage of memory’s total operating time is required for refreshes?
(1)     0.64    (2)     0.96    (3)     2.00    (4)     0.32

5.    A DMA controller transfers 32-bit words to memory using cycle Stealing. The words are assembled from a device that transmits characters at a rate of 4800 characters per second. The CPU is fetching and executing instructions at an average rate of one million instructions per second.  By how much will the CPU be slowed down because of the DMA transfer ?
(1)     0.06%    (2)     0.12%    (3)     1.2%    (4)     2.5%

6.    A CPU handles interrupt by executing interrupt service subroutine_________.
(1)    by checking interrupt register after execution of each instruction
(2)    by checking interrupt register at the end of the fetch cycle
(3)    whenever an interrupt is registered
(4)    by checking interrupt register at regular time interval

7.    Given the following set of prolog clauses :
father(X, Y) :
parent(X/ Y),
male(X),
parentally, Bob),
parent(Jim, Bob),
parent(Alice, Jane),
parent(Thomas, Jane),
male(Bob),
male(Jim),
female(Salley),
female(Alice).
How many atoms are matched to the variable ‘X’ before the query father(X, Jane) reports a Result ?
(1)     1    (2)     2    (3)     3    (4)     4

8.    Forward chaining systems are _________ where as backward chaining systems are
(1)     Data driven, Data driven    (2)     Goal driven, Data driven
(3)     Data driven, Goal driven    (4)     Goal driven, Goal driven

9.    Match the following w.r.t. programming languages :
List-I              List-II
(a)    JAVA         (i)      Dynamically object oriented
(b)    Python      (ii)     Statically Non-object oriented
(c)    Prolog        (iii)    Statically object oriented
(d)    ADA          (iv)    Dynamically non-object oriented Codes :
(a)     (b)     (c)     (d)
(1)    (iii)    (i)      (ii)     (iv)
(2)    (i)      (iii)    (ii)     (iv)
(3)    (i)      (iii)    (iv)    (ii)
(4)    (ii)     (iv)    (i)      (iii)

10.    The combination of an IP address and a port number is known as______.
(1)     network number            (2)     socket address
(3)     subnet mask number    (4)     MAC address

11.    A network with bandwidth of 10 Mbps can pass only an average of 15,000 frames per minute with each frame carrying an average of 8,000 bits. What is the throughput of this network ?
(1)     2 Mbps    (2)     60 Mbps    (3)     120 Mbps    (4)     10 Mbps

12.    Consider a subnet with 720 routers. If a three-level hierarchy is choosen with eight clusters, each containing 9 regions of 10 routers, then total number of entries in the routing table is
(1)     25    (2)     27    (3)     53    (4)     72

13.    In a classful addressing, the IP addresses with 0 (zero) as network number :
(1)    refers to the current network
(2)    refers to broadcast on the local network
(3)    refers to broadcast on a distant network
(4)    refers to loopback testing

14.    In electronic mail, which of the following protocols allows the transfer of multimedia messages ?
(1)     IMAP    (2)     SMTP    (3)     POP3    (4)     MIME

15.    A device is sending out data at the rate of 2000 bps. How long does it take to send a file of 1,00,000 characters ?
(1)     50    (2)     200    (3)     400    (4)     800

16.    In Activity – Selection problem, each activity i has a start time Si and a finish time fi where si ≤ fi. Activities i and j are compatible if :
(1)     Si ≥ fj    (2)     Sj ≥ fi   (3)     Si ≥ fj or Sj ≥ fi      (4)  Si ≥ fj and Sj ≥ fi

17.    Given two sequences X and Y:
X = <a,b, c, b, d, a, b>
Y = <b, d, c, a, b, a>
The longest common subsequence of X and Y is :
(1)     <b, c, a>    (2)     <c, a, b>    (3)     <b, c, a, a>    (4)     <b, c, b, a>

18.    If there are n integers to sort, each integer has d digits and each digit is in the set {1, 2, …, k}, radix sort can sort the numbers in:
(1)     O(d n k)    (2)     O(d nk)    (3)     O((d + n)k)    (4)     O(d(n + k))

19.    The solution of the recurrence relation
dec2015_19
is:
(1)     O(lgn)       (2)    O(n)
(3)     O(nlgn)    (4)    None of the above

20.    Floyd-Warshall algorithm utilizes to solve the all-pairs shortest paths problem on a directed graph in time.
(1)     Greedy algorithm, θ(V3)                 (2)    Greedy algorithm, θ(V2 lgn)
(3)     Dynamic programming, θ(V3      (4)    Dynamic programming, θ(V2 lgn)

21.    Let n = 4 and (a1, a2, a3, a4) = (do, if, int, while).    Let p(1 : 4) = (3/8 , 3/8, 1/8,  1/8) and q(1:4) = (2/8,3/8,1/8,1/8,1/8) where p(i) and q(i) denotes the probability with which we search ai and the identifier x being searched satisfy ai < x < ai+1 respectively. The optimal search tree is given by:

dec2015_21Ans: (2)

22. The family of context sensitive languages is __________ under union and ______ under reversal.
(1)     closed, not closed    (2)     not closed, not closed
(3)     closed, closed           (4)     not closed, closed

23.  Match the following :
List-I                                                                             List-II
(a)    {anbn| n > 0} is a deterministic                (i) but not recursive language.
context free language
(b)    The complement of { anbnan| n > 0}       (ii)  but not context free language.
is a context free language
(c) {anbnan} is context sensitive language    (iii)  but cannot be accpeted by a deterministic pushdown
automata.
(d)    L is a recursive language                          (iv) but not regular
Codes :
(a)    (b)     (c)   (d)
(1)    (i)    (ii)    (iii)    (iv)
(2)    (i)    (ii)    (iv)    (iii)
(3)    (iv)   (iii)    (ii)    (i)
(4)    (iv)   (iii)    (i)     (ii)

24.    The language of all non-null strings of a’s   can be   defined by a context free grammar as follow :
S→ aS|Sa| a
The word a3 can be generated by________different trees.
(1)     Two    (2)     Three    (3)     Four    (4)     Five

25.    Which one of the following non-functional quality attributes is not highly affected by the architecture of the software ?
(1)     Performance    (2)     Reliability    (3)     Usability    (4)     Portability

26.    The context free grammar given by
S→ XYX
X→ aX|bX|λ
Y→ bbb
generates the language which is defined by regular expression :
(1)     (a + b)*bbb                     (2)     abbb(a + b)*
(3)     (a + b)*(bbb)(a + b)*    (4)     (a + b)(bbb)(a + b)*

27.    There are exactly_________ different finite automata with three states x, y and z over the alphabet {a, b} where x is always the start state.
(1)     64    (2)     256    (3)     1024    (4)     5832

28.    Given the following two languages :
L1 = {an b an | n >0}
L2 = {an b an   bn+1   |   n >0}
Which of the following is correct?
(1)    L1 is context free language and L2 is not context free language
(2)    L1 is not context free language and L2 is context free language
(3)    Both L1 and L2 are context free languages
(4)    Both L1 and L2 are not context free languages

29.    Which of the following is used to make an Abstract class ?
(1)    Making atleast one member function as pure virtual function
(2)    Making atleast one member function as virtual function
(3)    Declaring as Abstract class using virtual keyword
(4)    Declaring as Abstract class using  static keyword

30.    Match the following with reference to object oriented modelling :
List – I                                                  List-II
(a)     Polymorphism         (i) Picking both operator and attributes with operations appropriate to model an object
(b)     Inheritance             (ii) Hiding implementation details of methods from users of objects
(c)     Encapsulation        (iii) Using similar operations to do similar things
(d)     Abstraction           (iv) Create new classes from existing class
Codes :
(a)     (b)     (c)    (d)
(1)     (iv)    (iii)    (i)    (ii)
(2)     (iii)    (iv)    (i)    (ii)
(3)     (iii)    (i)      (ii)    (iv)
(4)     (iv)    (iii)    (ii)    (i)

31.    In CRC based design, a CRC Team consists of :
(a)    one or two users representatives
(b)    several programmers
(c)    project co-ordinators
(d)    one or two system analysts
Codes :
(1)     (a) and(c)            (2)     (a), (b), (c) and (d)
(3)     (a), (c) and (d)    (4)     (a), (b) and (d)

32.    The end points of a given line are (0, 0) and (6,18). Compute each value of y as x steps from 0 to 3, by using equation of straight line :
(1)    For x = 0, y = 0; x = 1,  y = 3; x = 2, y = 6;    x = 3,    y = 9
(2)    For x = 0, y = l; x =1,  y = 3; x = 2, y = 4;    x = 3,    y = 9
(3)    For x = 0, y = 2; x = 1, y = 3; x = 2, y = 6;    x = 3,    y = 9
(4)    For x = 0, y = 0; x = 1,  y = 3; x = 2, y = 4;    x = 3,    y = 6

33.    Which of the following graphic primitives are considered as the basic building blocks of computer graphics ?
(a)     Points                  (b)     Lines      (c)    Polylines              (d) Polygons
Codes :
(1)     (a) only                        (2)    (a) and (b)
(3)     (a), (b) and (c)            (4)    (a), (b), (c) and (d)

34.    Javascript and Java has similar name because is/are true.
(a)    Javascripts syntax is loosely based on Java’s syntax
(b)    Javascript is stripped down version of Java
(c)    Java and Javascript are originated from Island of Java
Codes :
(1)     (a) only            (2)  (a), (b) and (c)              (3)  (a) and (b)       (4)  (a) and (c)

35.    Which of the following statements are true with reference to the way of describing XML data?
(a)    XML uses DTD to describe the data
(b)    XML uses XSL to describe the data
(c)    XML uses a description node to describe the data Codes :
(1)     (a) only    (2)     (b) only    (3)     (a) and (b)    (4)     (a) and (c)

36.    Which of the following is/are correct with reference to Abstract class and interface ?
(a)    A class can inherit only one Abstract class but may inherit several interfaces.
(b)    An Abstract class can provide complete and default code but an interface has no code.

Codes :
(1)     (a) is true                                  (2)     (b) is true
(3)     Both (a) and (b) are true       (4)     Neither (a) nor (b) is true

37. Match the following with respect to various memory management algorithms :
List-I                         List-II
(a)     Demand paging              (i)    degree of multiprogramming
(b)     Segmentation                (ii)    working set
(c)     Dynamic partitions      (iii)    supports user view of memory
(d)     Fixed partitions           (iv)    compaction
Codes :
(a)     (b)     (c)     (d)
(1)     (iii)    (iv)    (ii)     (i)
(2)     (ii)     (iii)    (i)      (iv)
(3)     (iv)    (iii)    (ii)     (i)
(4)     (ii)     (iii)    (iv)    (i)

38.    Function of memory management unit is :
(1)     Address translation    (2)     Memory allocation
(3)     Cache management    (4)     All of the above

39.    Consider a system with twelve magnetic tape drives and three processes P1, P2, and P3. Process P1 requires maximum ten tape drives, process P2 may need as many as four tape drives and P3 may need upto nine tape drives. Suppose that at time t1,  process p1 is holding five tape drives, process P2 is holding two tape drives and process P3, is holding three tape drives.  At time t1, system is in:
(1)     safe state    (2)     unsafe state    (3)     deadlocked state          (4)     starvation state

40.    In Unix operating system, special files are used to :
(1)    buffer data received in its input from where a process reads
(2)    provide a mechanism to map physical device to file names
(3)    store list of file names plus pointers associated with i-nodes
(4)    store information entered by a user application program or utility program

Comments are closed.