## UGC NET Computer Science Solved Paper -II June2010

1. “X1 is a clone of ” means X1 identical to X in terms of the physical attributes namely, height, weight and complexion. Given, height, weight and complexion only form a complete set of attributes for an entity, cloning is an equivalence relation. What is your impression about this statement ?

(A) The statement is true

(B) The statement is false

(C) The truth value of the statement cannot be computed

(D) None of these

2.‘R is a robot of M’ means R can perform some of the tasks that otherwise M would do and R is unable to do anything else. Which of the following is the most appropriate representation to model this situation ?

3. “My Lafter Machin (MLM) recognizes the following strings :

(i) a

(ii) aba

(iii) abaabaaba

(iv) abaabaabaabaabaabaabaabaaba

Using this as an information, how would you compare the following regular expressions ?

(i) (aba)3x

(ii) a.(baa)3x–1. ba

(iii) ab.(aab).3x–1.a

(A) (ii) and (iii) are same, (i) is different.

(B) (ii) and (iii) are not same.

(C) (i), (ii) and (iii) are different.

(D) (i), (ii) and (iii) are same.

4. S1 : I teach algorithms and maths.

S2 : My professor teaches maths,electronics and computer science.

S3 : I have a student of maths.

S4 : Algorithm is a part of computer science.

S5 : Maths students know computer science.

What would be the chromatic number of a graph, vertices of which are the actors/entities that are

involved in the sentences S1 to S5 and edges-to represent the associations/relationships amongst

the entities/actors as expressed in the sentences S1 to S5 above ?

(A) 2

(B) 3

(C) 4

(D) None of these

5. Four your ATM debit card, you have a 4-decimal-digit personal secret code. In the absence of any clue, a brute-force attack takes time-‘t’ to crack the code on an ATM terminal. Therefore ‘t’ is the secure-time for a customer to report in case the card is misplaced. Your Bank has decided to facilitate an increased secure-time. Out of the following, which option should provide the largest rise in the value of ‘t’ ?

(A) Instead of 4-decimal-digits, maintain the personal secretcode in 4-hexadecimal-digits.

(B) Instead of 4-decimal digits, maintain a 5-decimal-digit personal secret code.

(C) Reduce the processing speed of the ATM terminals to the half of their current speed.

(D) None of the above provides any improvement

6. The logic expression for the output of the circuit shown in the figure is

Ans: C

** **7. Advantage of synchronous sequential circuits over asynchronous ones is

(A) faster operation

(B) ease of avoiding problems due to hazard

(C) lower hardware requirement

(D) better noise immunity

8.** **What is the transitive voltage for the voltage input of a CMOS operating from 10V supply ?

(A) 1V (B) 2V (C) 5V (D) 10 V

9. What is decimal equivalent of BCD 11011.1100 ?

(A) 22.0 (B) 22.2 (C) 20.2 (D) 21.2

10. The function represented by the kmap given below is

Note: All the options are wrong: correct answer is C’

11. The statement print f (“ % d”, 10 ? 0 ? 5 : 1 : 12); will print

(A) 10 (B) 0 (C) 12 (D) 1

12. What will be the output of the following c-code ?

void main ( )

{

char *P = “ayqm” ;

char c;

c = ++*p ;

printf (“%c”, c);

}

(A) a (B) c (C) b (D) q

13. Member of a class specified as _______ are accessible only to method of the class.

(A) private (B) public (C) protected (D) derive

14. Match the following :

(a) Garbage collection in 1. Java

(b) Nameless object 2. generic programming

(c) Template support 3. defines a class

(d) A forward reference 4. member function

(e) Derived class inherits from base class 5. within a statement

Codes :

(a) (b) (c) (d) (e)

(A) 1 5 4 2 3

(B) 1 5 2 3 4

(C) 5 1 2 3 4

(D) 5 4 3 1 2

15. The data type created by the data abstraction process is called

(A) class

(B) structure

(C) abstract data type

(D) user defined data type

16. An entity instance is a single occurrence of an _______.

(A) entity type

(B) relationship type

(C) entity and relationship type

(D) None of these

17. Generalization is _______ process.

(A) top-down

(B) bottom up

(C) both (A) & (B)

(D) None of these

18. Match the following :

I. 2 NF (a) transitive dependencies eliminated

II. 3 NF (b) multivalued attribute removed

III. 4 NF (c) contain no partial functional dependencies

IV. 5 NF (d) contains no join dependency

Codes :

I II III IV

(A) (a) (c) (b) (d)

(B) (d) (a) (b) (c)

(C) (c) (d) (a) (b)

(D) (d) (b) (a) (c)

19. Which data management language component enabled the DBA todefine the schema components ?

(A) DML

(B) Sub-schema DLL

(C) Schema DLL

(D) All of these

20. The PROJECT Command will create new table that has

(A) more fields than the original table

(B) more rows than original table

(C) both (A) & (B)

(D) none of these

21. If we have six stack operations-pushing and popping each of A, B and C-such that push (A) must occur before push (B) which must occur before push (C), then A, C, B is a possible order for the pop operations, since this could be our sequence : push (A), pop (A), push (B), push (C), pop (C), pop (B). Which one of the following orders could not be the order the pop operations are run, if we are to satisfy the requirements described above ?

(A) ABC (B) CBA (C) BAC (D) CAB

22. What is the most appropriate data structure to implement a priority queue ?

(A) Heap (B) Circular array (C) Linked list (D) Binary tree

23. In a complete binary tree of n nodes, how far are the two most distant nodes ? Assume each edge in the path counts as 1

(A) About log2n

(B) About 2 log2n

(C) About n log2n

(D) About 2n

24. A chained hash table has an array size of 100. What is the maximum number of entries that can be placed in the table ?

(A) 100

(B) 200

(C) 10000

(D) There is no upper limit

25. In a B tree of order 5, the following keys are inserted as follows :7, 8, 1, 4, 13, 20, 2, 6 and 5

How many elements are present in the root of the tree ?

(A) 1 (B) 2 (C) 3 (D) 4

*1*

*2*