UGC NET DEC 2015 Computer Science Paper – II Modal Exam By Eandhizhai | December 21, 2015 - 4:21 pm |October 1, 2020 Welcome to your UGC NET DECEMBER 2018 Computer Science Paper - II Modal Exam Name Email Phone Number 1. How many edges are there in a forest of t-trees containing a total of n vertices ? n+1 n*t n-t nt 2. Data security threats include privacy invasion fraudulent manipulation of data encryption and decryption hardware failure 3. The relationship of data elements in a module is called Cohesion Modularity Coupling Granularity 4. The number of bits required for an IPV 6 address is 32 128 16 64 5. Component level design is concerned with Class based analysis Both of the above Flow oriented analysis None of the above 6. The Mobile Application Protocol (MAP) typically runs on top of which protocol ? SNMP (Simple Network Management Protocol) HTTP (Hyper Text Transfer Protocol) SMTP (Simple Mail Transfer Protocol) SS7 (Signalling System 7) 7. A station in a network forward incoming packets by placing them on its shortest output queue. What routing algorithm is being used ? Flooding Delta routing Static routing Hot potato routing 8. All of the following are examples of real security and privacy risks except Identify theft Hackers Viruses Spam 9. In which tree, for every node the height of its left subtree and right subtree differ almost by one Complète Binary Tree Threaded Binary Tree AVL tree Binary search tree 10. Match the following IC families with their basic circuits : a. TTL 1. NAND b. ECL 2. NOR c. CMOS 3. Inverter Code a-1,b-2,c-3 a-1,b-3,c-2 a-3,b-2,c-1 a-2,b-3,c-1 11. A chip having 150 gates will be classified as VLSI MSI LSI SSI 12. The post order traversal of a binary tree is DEBFCA. Find out the preorder traversal. ADBFEC ABFCDE ABDECF ABDCEF 13. In how many ways can 15 indistinguishable fish be placed into 5 different ponds, so that each pond contains atleast one fish ? 775 1001 3876 200 14. The time complexity to build a heap of n elements is O(n) O(nlgn) O(lgn) O(1) 15. Consider a logical address space of 8 pages of 1024 words mapped with memory of 32 frames. How many bits are there in the physical address ? 13 Bits 11 Bits 9 Bits 15 Bits 16. How much space will be required to store the bit map of a 1.3 GB disk with 512 bytes block size ? 266.2 KB 332.8 KB 256.6 KB 83.6 KB 17. The amount of uncertainty in a system of symbol is called Bandwidth Loss Entropy Quantum 18. The worst case time complexity of AVL tree is better in comparison to binary search tree for Search, Insert and Delete Operations Insert and Delete Operations Search and Delete Operations Search and Insert Operations 19. Which of the following can be the sequence of nodes examined in binary search tree while searching for key 88 ? 65, 140, 80, 70, 88 90, 110, 80, 85, 88 90, 40, 65, 50, 88 190, 60, 90, 85, 88 20. A hash function f defined as f (key) = key mod 13, with linear probing is used to insert keys 55, 58, 68, 91, 27, 145. What will be the location of 79 ? 3 1 5 7 21. B + tree are preferred to binary tree in database because Disk data transfer rates are much less than memory data transfer rate Disk are more reliable than memory Disk capacities are greater than memory capacities Disk access much slower than memory access 22. What is the size of the Unicode character in Windows Operating System? None of the above 32-Bits 16-Bits 8-Bits 23. The design issue of Datalink Layer in OSI Reference Model is Framing Connection control Synchronization of bits Representation of bits 24. The VLF and LF bauds use propagation for communication Ground Sky Space Line of sight 25. The ‘C’ language is Context free language None of the above Context sensitive language Regular language 26. In UNIX, which of the following command is used to set the task priority ? PS nice init kill 27. Basis path testing falls under white box testing black box testing system testing unit testing 28. Encryption and Decryption is the responsibility of Layer. Application Datalink Physical Network 29. Which of the following is true ? A relation in 3NF is always in BCNF A relation in BCNF is always in 3NF A relation in BCNF is not in 3NF BCNF and 3NF are same 30. Which API is used to draw a circle ? Ellipse ( ) Round Rect ( ) Pie() Circle () 31. Consider the tree given below : Using the property of eccentricity of a vertex, find every vertex that is the centre of the given tree. c & k c & h d & h g, b, c, h, i, m 32. What is the result of the following expression ? (l&2) + (3&4) 2 1 3 0 33. Linux operating system uses Fair Preemptive Scheduling Hand Shaking Highest Penalty Ratio Next Affinity Scheduling 34. “Black” refers in the “Black-box” testing means Functions are hidden Design is hidden Users are hidden I – O is hidden 35. Emergency fixes known as patches are result of adaptive maintenance none of the above corrective maintenance perfective maintenance 36. RAD stands for______. Rapid Application Development Rapid Application Design Rapid Aided Development Rapid and Design 37. Dijkestra banking algorithm in an operating system, solves the problem of deadlock avoidance mutual exclusion context switching deadlock recovery 38. The maturity levels used to measure a process are None of the above Initial, Stating, Defined, Managed, Optimized Initial, Repeatable, Defined, Managed, Optimized Primary, Secondary, Defined, Managed, Optimized 39. The problem of indefinite blockage of low-priority jobs in general priority scheduling algorithm can be solved using : Compaction Parity bit Timer Aging 40. A graph is non-planar if and only if it contains a subgraph homomorphic to k3,3 or k5 k2,3 or k6 K3,2 or K5 k3,3 or k6 41. Encoding of data bits 0011 into 7-bit even Parity Hamming Code is 0010110 0011100 0011110 0101110 42. Optical storage is a low-speed direct access storage device medium-speed direct access storage device high-speed direct access storage device high-speed sequential access storage device 43. Testing of software with actual data and in actual environment is called Alpha testing None of the above Regression testing Beta testing 44. The value of the following expression (13 / 4 * 3) % 5 + 1 is 1.4875 5 2.95 5.75 45. Web Mining is not used in which of the following areas ? Crime fighting on the internet Click stream analysis Information filtering Online transaction processing 46. Match the following with respect to C++ data types : a. User defined type 1. Qualifier b. Built in type 2. Union c. Derived type 3. Void d. Long double 4. Pointer a-2,b-3,c-4,d-1 a-1,b-2,c-3,d-4 a-3,b-4,c-1,d-2 a-2,b-4,c-3,d-1 47. The number of bit strings of length eight that will either start with a 1 bit or end with two bits 00 shall be 160 32 128 64 48. Active X controls are Pentium binary programs that can be embedded in ____________ Web pages Word pages URL pages Script pages 49. Which of the following is a bad example of recursion ? Tower of Hanoi Fibonacci numbers Factorial Tree traversal 50. If a packet arrive with an M-bit value is ‘1’ and a fragmentation offset value ‘0’, then it is______ fragment First Last All the above Middle 51. Match the following : List-I List – II a. Wireless Application Environment i. HTTP b. Wireless Transaction Protocol ii. IP c. Wireless Datagram Protocol iii. Scripts d. Wireless iv. UDP a-iii,b-ii,c-iv,d-i a-i,b-ii,c-iii,d-iv a-ii,b-iii,c-i,d-iv a-iii,b-i,c-iv,d-ii Please fill in the comment box below. Be sure to click Submit Quiz to see your results! Time's up Bookmark the permalink.