# UGC NET Computer Science Solved Paper -II June2010

## UGC NET Computer Science Solved Paper -II June2010

1. “X1 is a clone of ” means X1 identical to X in terms of the physical attributes namely, height, weight and complexion. Given, height, weight and complexion only form a complete set of attributes for an entity, cloning is an equivalence relation. What is your impression about this statement ?
(A) The statement is true
(B) The statement is false
(C) The truth value of the statement cannot be computed
(D) None of these

2.‘R is a robot of M’ means R can perform some of the tasks that otherwise M would do and R is unable to do anything else. Which of the following is the most appropriate representation to model this situation ? 3. “My Lafter Machin (MLM) recognizes the following strings :
(i) a
(ii) aba
(iii) abaabaaba
(iv) abaabaabaabaabaabaabaabaaba
Using this as an information, how would you compare the following regular expressions ?
(i) (aba)3x
(ii) a.(baa)3x–1. ba
(iii) ab.(aab).3x–1.a
(A) (ii) and (iii) are same, (i) is different.
(B) (ii) and (iii) are not same.
(C) (i), (ii) and (iii) are different.
(D) (i), (ii) and (iii) are same.

4. S1 : I teach algorithms and maths.
S2 : My professor teaches maths,electronics and computer science.
S3 : I have a student of maths.
S4 : Algorithm is a part of computer science.
S5 : Maths students know computer science.
What would be the chromatic number of a graph, vertices of which are the actors/entities that are
involved in the sentences S1 to S5 and edges-to represent the associations/relationships amongst
the entities/actors as expressed in the sentences S1 to S5 above ?
(A) 2
(B) 3
(C) 4
(D) None of these

5. Four your ATM debit card, you have a 4-decimal-digit personal secret code. In the absence of any clue, a brute-force attack takes time-‘t’ to crack the code on an ATM terminal. Therefore ‘t’ is the secure-time for a customer to report in case the card is misplaced. Your Bank has decided to facilitate an increased secure-time. Out of the following, which option should provide the largest rise in the value of ‘t’ ?
(B) Instead of 4-decimal digits, maintain a 5-decimal-digit personal secret code.
(C) Reduce the processing speed of the ATM terminals to the half of their current speed.
(D) None of the above provides any improvement

6. The logic expression for the output of the circuit shown in the figure is Ans: C

7. Advantage of synchronous sequential circuits over asynchronous ones is
(A) faster operation
(B) ease of avoiding problems due to hazard
(C) lower hardware requirement
(D) better noise immunity

8. What is the transitive voltage for the voltage input of a CMOS operating from 10V supply ?
(A) 1V   (B) 2V  (C) 5V  (D) 10 V

9. What is decimal equivalent of BCD 11011.1100 ?
(A) 22.0   (B) 22.2  (C) 20.2   (D) 21.2

10. The function represented by the kmap given below is Note: All the options are wrong:                       correct answer is C’

11. The statement print f (“ % d”, 10 ? 0 ? 5 : 1 : 12); will print
(A) 10  (B) 0  (C) 12  (D) 1

12. What will be the output of the following c-code ?
void main ( )
{
char *P = “ayqm” ;
char c;
c = ++*p ;
printf (“%c”, c);
}
(A) a (B) c (C) b  (D) q

13. Member of a class specified as _______ are accessible only to method of the class.
(A) private (B) public (C) protected (D) derive

14. Match the following :
(a) Garbage collection in                          1. Java
(b) Nameless object                                 2. generic programming
(c) Template support                                3. defines a class
(d) A forward reference                           4. member function
(e) Derived class inherits from base class  5. within a statement
Codes :
(a) (b) (c) (d) (e)
(A) 1   5    4   2   3
(B) 1   5    2   3   4
(C) 5   1    2   3   4
(D) 5   4    3   1   2

15. The data type created by the data abstraction process is called
(A) class
(B) structure
(C) abstract data type
(D) user defined data type

16. An entity instance is a single occurrence of an _______.
(A) entity type
(B) relationship type
(C) entity and relationship type
(D) None of these

17. Generalization is _______ process.
(A) top-down
(B) bottom up
(C) both (A) & (B)
(D) None of these

18. Match the following :
I.   2 NF      (a) transitive dependencies eliminated
II.  3 NF      (b) multivalued attribute removed
III. 4 NF      (c) contain no partial functional dependencies
IV. 5 NF      (d) contains no join dependency
Codes :
I   II  III  IV
(A) (a) (c) (b) (d)
(B) (d) (a) (b) (c)
(C) (c) (d) (a) (b)
(D) (d) (b) (a) (c)

19. Which data management language component enabled the DBA todefine the schema components ?
(A) DML
(B) Sub-schema DLL
(C) Schema DLL
(D) All of these

20. The PROJECT Command will create new table that has
(A) more fields than the original table
(B) more rows than original table
(C) both (A) & (B)
(D) none of these

21. If we have six stack operations-pushing and popping each of A, B and C-such that push (A) must occur before push (B) which must occur before push (C), then A, C, B is a possible order for the pop operations, since this could be our sequence : push (A), pop (A), push (B), push (C), pop (C), pop (B). Which one of the following orders could not be the order the pop operations are run, if we are to satisfy the requirements described above ?
(A) ABC (B) CBA (C) BAC  (D) CAB

22. What is the most appropriate data structure to implement a priority queue ?
(A) Heap  (B) Circular array  (C) Linked list  (D) Binary tree

23. In a complete binary tree of n nodes, how far are the two most distant nodes ? Assume each edge in the path counts as 1