26. Match the following Layers and Protocols for a user browsing with SSL :
a. Application of layer i. TCP
b. Transport layer ii. IP
c. Network layer iii. PPP
d. Datalink layer iv. HTTP
Codes :
a b c d
(1) iv i ii iii
(2) iii ii i iv
(3) ii iii iv i
(4) iii i iv ii
27. The maximum size of the data that the application layer can pass on to the TCP layer below is __________.
(1) 216 bytes (2) 216 bytes + TCP header length
(3) 216 bytes – TCP header length (4) 215 bytes
Hint: Application layer can pass any size of data on the TCP layer.
28. A packet whose destination is outside the local TCP/IP network segment is sent to _____.
(1) File server (2) DNS server (3) DHCP server (4) Default gateway
29. Distance vector routing algorithm is a dynamic routing algorithm. The routing tables in distance vector routing algorithm are updated _____.
(1) automatically
(2) by server
(3) by exchanging information with neighbour nodes
(4) with back up database
30. In link state routing algorithm after construction of link state packets, new routes are computed using :
(1) DES algorithm (2) Dijkstra’s algorithm (3) RSA algorithm (4) Packets
31. Which of the following strings would match the regular expression : p+ [3 – 5]* [xyz] ?
I. p443y II. p6y III. 3xyz IV. p35z V. p353535x VI. ppp5
(1) I, III and VI only (2) IV, V and VI only
(3) II, IV and V only (4) I, IV and V only
32. Consider the following assembly language instructions :
mov al, 15
mov ah, 15
xor al, al
mov cl, 3
shr ax, cl
add al, 90H
adc ah, 0
What is the value in ax register after execution of above instructions ?
(1) 0270H (2) 0170H (3) 01E0H (4) 0370H
33. Consider the following statements related to compiler construction :
I. Lexical Analysis is specified by context-free grammars and implemented by pushdown automata.
II. Syntax Analysis is specified by regular expressions and implemented by finite-state machine.
Which of the above statement(s) is/are correct ?
(1) Only I (2) Only II
(3) Both I and II (4) Neither I nor II
34. The contents of Register (BL) and Register (AL) of 8085 microprocessor are 49H and 3AH respectively. The contents of AL, the status of carry flag (CF) and sign flag (SF) after executing ‘SUB AL, BL’ assembly language instruction, are
(1) AL = 0FH; CF = 1; SF = 1
(2) AL = F0H; CF = 0; SF = 0
(3) AL = F1H; CF = 1; SF = 1
(4) AL = 1FH; CF = 1; SF = 1
35. Which of the following statement(s) regarding a linker software is/are true ?
I. A function of a linker is to combine several object modules into a single load module.
II A function of a linker is to replace absolute references in an object module by symbolic references to locations in other modules.
(1) Only I
(2) Only II
(3) Both I and II
(4) Neither I nor II
36. There are three processes P1, P2 and P3 sharing a semaphore for synchronizing a variable. Initial value of semaphore is one. Assume that negative value of semaphore tells us how many processes are waiting in queue. Processes access the semaphore in following order :
(a) P2 needs to access
(b) P1 needs to access
(c) P3 needs to access
(d) P2 exits critical section
(e) P1 exits critical section
The final value of semaphore will be :
(1) 0 (2) 1 (3) –1 (4) –2
37. In a paging system, it takes 30 ns to search translation Look-a-side Buffer (TLB) and 90 ns to access the main memory. If the TLB hit ratio is 70%, the effective memory access time is :
(1) 48ns (2) 147ns (3) 120ns (4) 84ns
38. Match the following w.r.t. Input/Output management :
List – I List – II
a. Device controller i. Extracts information from the controller register and store it in data buffer
b. Device driver ii. I/O scheduling
c. Interrupt handler iii. Performs data transfer
d. Kernel I/O subsystem iv. Processing of I/O request
Codes :
a b c d
(1) iii iv i ii
(2) ii i iv iii
(3) iv i ii iii
(4) i iii iv ii
39. Which of the following scheduling algorithms may cause starvation ?
a. First-come-first-served
b. Round Robin
c. Priority
d. Shortest process next
e. Shortest remaining time first
(1) a, c and e (2) c, d and e (3) b, d and e (4) b, c and d
40. Distributed operating systems consist of :
(1) Loosely coupled O.S. software on a loosely coupled hardware.
(2) Loosely coupled O.S. software on a tightly coupled hardware.
(3) Tightly coupled O.S. software on a loosely coupled hardware.
(4) Tightly coupled O.S. software on a tightly coupled hardware.
41. Software Engineering is an engineering discipline that is concerned with :
(1) how computer systems work.
(2) theories and methods that underlie computers and software systems.
(3) all aspects of software production
(4) all aspects of computer-based systems development, including hardware, software and process engineering.
42. Which of the following is not one of three software product aspects addressed by McCall’s software quality factors ?
(1) Ability to undergo change
(2) Adaptiability to new environments
(3) Operational characteristics
(4) Production costs and scheduling
43. Which of the following statement(s) is/are true with respect to software architecture ?
S1 : Coupling is a measure of how well the things grouped together in a module belong together logically.
S2 : Cohesion is a measure of the degree of interaction between software modules.
S3 : If coupling is low and cohesion is high then it is easier to change one module without affecting others.
(1) Only S1 and S2 (2) Only S3 (3) All of S1, S2 and S3 (4) Only S1
44. The prototyping model of software development is :
(1) a reasonable approach when requirements are well-defined.
(2) a useful approach when a customer cannot define requirements clearly.
(3) the best approach to use for projects with large development teams.
(4) a risky model that rarely produces a meaningful product.
45. A software design pattern used to enhance the functionality of an object at run-time is :
(1) Adapter (2) Decorator (3) Delegation (4) Proxy
46. Match the following :
List – I List – II
a. Affiliate Marketing i. Vendors ask partners to place logos on partner’s site. If customers click, come to vendors and buy.
b. Viral Marketing ii. Spread your brand on the net by wordof- mouth. Receivers will send your information to their friends.
c. Group Purchasing iii. Aggregating the demands of small buyers to get a large volume. Then negotiate a price.
d. Bartering Online iv. Exchanging surplus products and services with the process administered completely online by an intermediary. Company receives “points” for its contribution.
Codes :
a b c d
(1) i ii iii iv
(2) i iii ii iv
(3) iii ii iv i
(4) ii iii i iv
47. ________ refers loosely to the process of semi-automatically analyzing large databases to find useful patterns.
(1) Datamining (2) Data warehousing (3) DBMS (4) Data mirroring
48. Which of the following is/are true w.r.t. applications of mobile computing ?
(A) Travelling of salesman
(B) Location awareness services
(1) (A) true; (B) false.
(2) Both (A) and (B) are true.
(3) Both (A) and (B) are false.
(4) (A) false; (B) true.
49. In 3G network, W-CDMA is also known as UMTS. The minimum spectrum allocation required for W-CDMA is _______.
(1) 2 MHz (2) 20 KHz (3) 5 KHz (4) 5 MHz
50. Which of the following statements is/are true w.r.t. Enterprise Resource Planning (ERP) ?
(A) ERP automates and integrates majority of business processes.
(B) ERP provides access to information in a Real Time Environment.
(C) ERP is inexpensive to implement.
(1) (A), (B) and (C) are false.
(2) (A) and (B) false; (C) true.
(3) (A) and (B) true; (C) false.
(4) (A) true ; (B) and (C) are false.
Tagged UGC NET computer science solved papers, ugc net exam pattern, ugc net online exam, ugc net solved papers, ugc net solved papers with answer key, ugc net syllabus