UGC NET DEC 2015 Computer Science Paper – II Modal Exam By Eandhizhai | December 21, 2015 - 4:21 pm |October 1, 2020 Welcome to your UGC NET DECEMBER 2018 Computer Science Paper - II Modal Exam Name Email Phone Number 1. Match the following with respect to C++ data types : a. User defined type 1. Qualifier b. Built in type 2. Union c. Derived type 3. Void d. Long double 4. Pointer a-2,b-3,c-4,d-1 a-2,b-4,c-3,d-1 a-3,b-4,c-1,d-2 a-1,b-2,c-3,d-4 2. If a packet arrive with an M-bit value is ‘1’ and a fragmentation offset value ‘0’, then it is______ fragment First Middle All the above Last 3. Which API is used to draw a circle ? Round Rect ( ) Ellipse ( ) Circle () Pie() 4. The maturity levels used to measure a process are Primary, Secondary, Defined, Managed, Optimized None of the above Initial, Stating, Defined, Managed, Optimized Initial, Repeatable, Defined, Managed, Optimized 5. Consider the tree given below : Using the property of eccentricity of a vertex, find every vertex that is the centre of the given tree. c & h g, b, c, h, i, m c & k d & h 6. Emergency fixes known as patches are result of none of the above perfective maintenance corrective maintenance adaptive maintenance 7. What is the result of the following expression ? (l&2) + (3&4) 2 0 1 3 8. Component level design is concerned with Class based analysis Both of the above Flow oriented analysis None of the above 9. “Black” refers in the “Black-box” testing means Users are hidden I – O is hidden Design is hidden Functions are hidden 10. Dijkestra banking algorithm in an operating system, solves the problem of deadlock avoidance context switching deadlock recovery mutual exclusion 11. The amount of uncertainty in a system of symbol is called Loss Entropy Quantum Bandwidth 12. All of the following are examples of real security and privacy risks except Identify theft Viruses Hackers Spam 13. Testing of software with actual data and in actual environment is called Alpha testing Regression testing None of the above Beta testing 14. The design issue of Datalink Layer in OSI Reference Model is Framing Representation of bits Connection control Synchronization of bits 15. The ‘C’ language is Context free language Regular language None of the above Context sensitive language 16. RAD stands for______. Rapid Application Development Rapid Aided Development Rapid Application Design Rapid and Design 17. In UNIX, which of the following command is used to set the task priority ? PS init nice kill 18. Which of the following is a bad example of recursion ? Tower of Hanoi Fibonacci numbers Factorial Tree traversal 19. The relationship of data elements in a module is called Coupling Cohesion Granularity Modularity 20. Data security threats include fraudulent manipulation of data hardware failure encryption and decryption privacy invasion 21. The value of the following expression (13 / 4 * 3) % 5 + 1 is 5.75 1.4875 5 2.95 22. Web Mining is not used in which of the following areas ? Crime fighting on the internet Online transaction processing Click stream analysis Information filtering 23. Linux operating system uses Hand Shaking Highest Penalty Ratio Next Fair Preemptive Scheduling Affinity Scheduling 24. The Mobile Application Protocol (MAP) typically runs on top of which protocol ? HTTP (Hyper Text Transfer Protocol) SNMP (Simple Network Management Protocol) SMTP (Simple Mail Transfer Protocol) SS7 (Signalling System 7) 25. The worst case time complexity of AVL tree is better in comparison to binary search tree for Search, Insert and Delete Operations Search and Delete Operations Insert and Delete Operations Search and Insert Operations 26. The time complexity to build a heap of n elements is O(lgn) O(n) O(1) O(nlgn) 27. The post order traversal of a binary tree is DEBFCA. Find out the preorder traversal. ABFCDE ABDCEF ABDECF ADBFEC 28. In which tree, for every node the height of its left subtree and right subtree differ almost by one Binary search tree Threaded Binary Tree AVL tree Complète Binary Tree 29. How many edges are there in a forest of t-trees containing a total of n vertices ? nt n*t n-t n+1 30. The number of bit strings of length eight that will either start with a 1 bit or end with two bits 00 shall be 64 32 128 160 31. A graph is non-planar if and only if it contains a subgraph homomorphic to K3,2 or K5 k3,3 or k5 k2,3 or k6 k3,3 or k6 32. A hash function f defined as f (key) = key mod 13, with linear probing is used to insert keys 55, 58, 68, 91, 27, 145. What will be the location of 79 ? 1 3 7 5 33. What is the size of the Unicode character in Windows Operating System? 8-Bits 32-Bits 16-Bits None of the above 34. Encoding of data bits 0011 into 7-bit even Parity Hamming Code is 0011100 0101110 0011110 0010110 35. Optical storage is a low-speed direct access storage device medium-speed direct access storage device high-speed sequential access storage device high-speed direct access storage device 36. Encryption and Decryption is the responsibility of Layer. Physical Application Network Datalink 37. How much space will be required to store the bit map of a 1.3 GB disk with 512 bytes block size ? 83.6 KB 256.6 KB 332.8 KB 266.2 KB 38. The problem of indefinite blockage of low-priority jobs in general priority scheduling algorithm can be solved using : Timer Aging Compaction Parity bit 39. Which of the following can be the sequence of nodes examined in binary search tree while searching for key 88 ? 90, 110, 80, 85, 88 190, 60, 90, 85, 88 90, 40, 65, 50, 88 65, 140, 80, 70, 88 40. Which of the following is true ? BCNF and 3NF are same A relation in BCNF is always in 3NF A relation in BCNF is not in 3NF A relation in 3NF is always in BCNF 41. In how many ways can 15 indistinguishable fish be placed into 5 different ponds, so that each pond contains atleast one fish ? 775 200 3876 1001 42. Active X controls are Pentium binary programs that can be embedded in ____________ URL pages Word pages Script pages Web pages 43. A chip having 150 gates will be classified as SSI VLSI LSI MSI 44. Basis path testing falls under black box testing system testing white box testing unit testing 45. A station in a network forward incoming packets by placing them on its shortest output queue. What routing algorithm is being used ? Static routing Flooding Hot potato routing Delta routing 46. Consider a logical address space of 8 pages of 1024 words mapped with memory of 32 frames. How many bits are there in the physical address ? 13 Bits 9 Bits 11 Bits 15 Bits 47. The number of bits required for an IPV 6 address is 16 32 128 64 48. Match the following : List-I List – II a. Wireless Application Environment i. HTTP b. Wireless Transaction Protocol ii. IP c. Wireless Datagram Protocol iii. Scripts d. Wireless iv. UDP a-ii,b-iii,c-i,d-iv a-iii,b-ii,c-iv,d-i a-iii,b-i,c-iv,d-ii a-i,b-ii,c-iii,d-iv 49. Match the following IC families with their basic circuits : a. TTL 1. NAND b. ECL 2. NOR c. CMOS 3. Inverter Code a-3,b-2,c-1 a-2,b-3,c-1 a-1,b-2,c-3 a-1,b-3,c-2 50. The VLF and LF bauds use propagation for communication Sky Ground Space Line of sight 51. B + tree are preferred to binary tree in database because Disk are more reliable than memory Disk capacities are greater than memory capacities Disk data transfer rates are much less than memory data transfer rate Disk access much slower than memory access Please fill in the comment box below. Be sure to click Submit Quiz to see your results! Time's up Bookmark the permalink.