UGC NET Computer Science Solved Paper III Jan 2017

41. Which of the following HTML code will affect the vertical alignment of the table content ?
(1)   <td style = “vertical-align : middle”> Text Here </td>
(2)   <td valign = “centre”> Text Here </td>
(3)  <td style = “text-align : center”> Text Here </td>
(4)  <td align = “middle”> Text Here </td>

42. What can you say about the following statements ?
I. XML tags are case-insensitive.
II. In JavaScript, identifier names are case-sensitive.
III. Cascading Style Sheets (CSS) cannot be used with XML.
IV. All well-formed XML documents must contain a document type definition.
(1) only I and II are false.               (2) only III and IV are false.
(3) only I and III are false.            (4) only II and IV are false.
Note: All the options are wrong.

43. Which of the following statement(s) is/are TRUE with regard to software testing ?
I. Regression testing technique ensures that the software product runs correctly after the changes during maintenance.
II. Equivalence partitioning is a white-box testing technique that divides the input domain of a program into classes of data from which test cases can be derived.
(1) only I                      (2) only II
(3) both I and II         (4) neither I nor II

44. Which of the following are facts about a top-down software testing approach ?
I. Top-down testing typically requires the tester to build method stubs.
II. Top-down testing typically requires the tester to build test drivers.
(1) only I                          (2) Only II
(3) Both I and II             (4) Neither I nor II

45. Match the terms related to Software Configuration Management (SCM) in List – I with the descriptions in List – II.
List – I                                            List – II
I. Version                            A. An instance of a system that is distributed to customers.
II. Release                          B. An instance of a system which is functionally identical to other instances, but designed for different hardware/software configurations.
III. Variant                       C. An instance of a system that differs, in some way, from other instances.
Codes :
I II III
(1) B C A
(2) C A B
(3) C B A
(4) B A C

46. A software project was estimated at 352 Function Points (FP). A four person team will be assigned to this project consisting of an architect, two programmers, and a tester. The salary of the architect is Rs 80,000 per month, the programmer Rs 60,000 per month and the tester Rs 50,000 per month. The average productivity for the team is 8 FP per person month. Which of the following represents the projected cost of the project ?
(1) Rs 28,16,000            (2) Rs 20,90,000                (3) Rs 26,95,000                   (4) Rs 27,50,000

47. Complete each of the following sentences in List – I on the left hand side by filling in the word or phrase from the List – II on the right hand side that best completes the sentence :
List – I                                                                                               List – II
I. Determining whether you have                                          A. Software testing
built the right system is called
________
II. Determining whether you have                                        B. Software verification
built the system right is called
________
III. ________ is the process of                                            C. Software debugging
demonstrating the existence of
defects or providing confidence
that they do not appear to be
present.
IV. _______ is the process of                                                D. Software validation
discovering the cause of a defect
and fixing it.
Codes :
I  II III IV
(1) B  D  A  C
(2) B  D  C  A
(3) D  B  C  A
(4) D  B  A  C

48. A software company needs to develop a project that is estimated as 1000 function points and is planning to use JAVA as the programming language whose approximate lines of code per function point is accepted as 50. Considering a = 1.4 as multiplicative factor, b = 1.0 as exponention factor for the basic COCOMO effort equation and c = 3.0 as multiplicative factor, d = 0.33 as exponention factor for the basic COCOMO duration equation, approximately how long does the project take to complete ?
(1) 11.2 months             (2) 12.2 months               (3) 13.2 months                 (4) 10.2 months

49. A memory management system has 64 pages with 512 bytes page size. Physical memory consists of 32 page frames. Number of bits required in logical and physical address are respectively :
(1) 14 and 15                 (2) 14 and 29               (3) 15 and 14              (4) 16 and 32

50. Consider a disk queue with I/O requests on the following cylinders in their arriving order :
6, 10, 12, 54, 97, 73, 128, 15, 44, 110, 34, 45
The disk head is assumed to be at cylinder 23 and moving in the direction of decreasing number of cylinders. Total number of cylinders in the disk is 150. The disk head movement using SCAN-scheduling algorithm is :
(1) 172                        (2) 173                   (3) 227               (4) 228

51. Match the following for Unix file system :
List – I                                           List – II
a. Boot block                          i. Information about file system, free block list, free inode list etc.
b. Super block                      ii. Contains operating system files as well as program and data files created by users.
c. Inode block                      iii. Contains boot program and partition table.
d. Data block                       iv. Contains a table for every file in the file system. Attributes of files are stored here.
Codes :
a b c d
(1) iii i ii iv
(2) iii i iv ii
(3) iv iii ii i
(4) iv iii i ii

52. Some of the criteria for calculation of priority of a process are :
a. Processor utilization by an individual process.
b. Weight assigned to a user or group of users.
c. Processor utilization by a user or group of processes
In fair share scheduler, priority is calculated based on :
(1) only (a) and (b)             (2) only (a) and (c)
(3) (a), (b) and (c)              (4) only (b) and (c)

53. One of the disadvantages of user level threads compared to Kernel level threads is
(1) If a user level thread of a process executes a system call, all threads in that process are blocked.
(2) Scheduling is application dependent.
(3) Thread switching doesn’t require kernel mode privileges.
(4) The library procedures invoked for thread management in user level threads are local procedures.

54. Which statement is not correct about “init” process in Unix ?
(1) It is generally the parent of the login shell.
(2) It has PID 1.
(3) It is the first process in the system.
(4) Init forks and execs a ‘getty’ process at every port connected to a terminal.

55. Consider following two rules R1 and R2 in logical reasoning in Artificial Intelligence (AI) :
R1 : From α ⊃ β
and α / Inter β   is known as Modus Tollens (MT)
R2 : From α ⊃ β
and ¬β / Inter ¬α is known as Modus Ponens (MP)
(1) Only R1 is correct.                           (2) Only R2 is correct.
(3) Both R1 and R2 are correct.           (4) Neither R1 nor R2 is correct.

56. Consider the following AO graph :


Which is the best node to expand next by AO* algorithm ?
(1) A               (2) B                 (3) C              (4) B and C

57. In Artificial Intelligence (AI), what is present in the planning graph ?
(1) Sequence of levels                  (2) Literals               (3) Variables                  (4) Heuristic estimates

58. What is the best method to go for the game playing problem ?
(1) Optimal Search                    (2) Random Search          (3) Heuristic Search           (4) Stratified Search

59. Which of the following statements is true ?
(1) The sentence S is a logical consequence of S1,…, Sn if and only if S1 ∧ S2 ∧…….. ∧
Sn → S is satisfiable.
(2) The sentence S is a logical consequence of S1,…, Sn if and only if S1 ∧ S2 ∧…….. ∧
Sn → S is valid.
(3) The sentence S is a logical consequence of S1,…, Sn if and only if S1 ∧ S2 ∧…….. ∧
Sn ∧ ¬S is consistent.
(4) The sentence S is a logical consequence of S1,…, Sn if and only if S1 ∧ S2 ∧…….. ∧
Sn ∧ S is inconsistent.

60. The first order logic (FOL) statement ((R ∨ Q) ∧ (P ∨ ¬Q)) is equivalent to which of the following ?
(1) ((R ∨ ¬Q) ∧ (P ∨ ¬Q) ∧ (R ∨ P))
(2) ((R ∨ Q) ∧ (P ∨ ¬Q) ∧ (R ∨ P))
(3) ((R ∨ Q) ∧ (P ∨ ¬Q) ∧ (R ∨ ¬P))
(4) ((R ∨ Q) ∧ (P ∨ ¬Q) ∧ (¬R ∨ P))

61. Given the following two statements :
A. L = {w|na(w) = nb(w)} is deterministic context free language, but not linear.
B. L = {an bn} ∪ {an b2n} is linear, but not deterministic context free language.
Which of the following options is correct ?
(1) Both (A) and (B) are false.                  (2) Both (A) and (B) are true.
(3) (A) is true, (B) is false.                        (4) (A) is false, (B) is true.

62. Which of the following pairs have different expressive power ?
(1) Single-tape-turing machine and multi-dimensional turing machine.
(2) Multi-tape turing machine and multi-dimensional turing machine.
(3) Deterministic push down automata and non-deterministic pushdown automata.
(4) Deterministic finite automata and Non-deterministic finite automata

63. Which of the following statements is false ?
(1) Every context-sensitive language is recursive.
(2) The set of all languages that are not recursively enumerable is countable.
(3) The family of recursively enumerable languages is closed under union.
(4) The families of recursively enumerable and recursive languages are closed under reversal.

64. Let C be a binary linear code with minimum distance 2t + 1 then it can correct upto _____ bits of error.
(1) t + 1           (2) t               (3) t – 2           (4)t/2

65. A t-error correcting q-nary linear code must satisfy :

Where M is the number of code words and X is
(1) qn         (2) qt                         (3) q-n                                     (4) q-t

66. Names of some of the Operating Systems are given below :
(a) MS-DOS                    (b) XENIX                   (c) OS/2
In the above list, following operating systems didn’t provide multiuser facility.
(1) (a) only                        (2) (a) and (b) only
(3) (b) and (c) only          (4) (a), (b) and (c)
Note: All the options were wrong. All the above OS are mulituser

67. From the given data below :
a b b a a b b a a b
which one of the following is not a word in the dictionary created by LZ-coding (the initial words are a, b) ?
(1) a b                    (2) b b                    (3) b a                    (4) b a a b

68. With respect to a loop in the transportation table, which one of the following is not correct ?
(1) Every loop has an odd no. of cells and atleast 5.
(2) Closed loops may or may not be square in shape.
(3) All the cells in the loop that have a plus or minus sign, except the starting cell, must be occupied cells.
(4) Every loop has an even no. of cells and atleast four.

69. At which of the following stage(s), the degeneracy do not occur in transportation problem ?
(m, n represents number of sources and destinations respectively)
(a) While the values of dual variables ui and vj cannot be computed.
(b) While obtaining an initial solution, we may have less than m + n – 1 allocations.
(c) At any stage while moving towards optimal solution, when two or more occupied cells with the same minimum allocation become unoccupied simultaneously.
(d) At a stage when the no. of +ve allocation is exactly m + n – 1.
(1) (a), (b) and (c)                          (2) (a), (c) and (d)
(3) (a) and (d)                                (4) (a), (b), (c) and (d)

70. Consider the following LPP :

Ans: 1

71.

Ans: 3

72. A neuron with 3 inputs has the weight vector [0.2 –0.1 0.1]T and a bias θ = 0. If the input vector is X = [0.2 0.4 0.2]T then the total input to the neuron is :
(1) 0.20           (2) 1.0             (3) 0.02                  (4) –1.0

73. Which of the following neural networks uses supervised learning ?
(A) Multilayer perceptron
(B) Self organizing feature map
(C) Hopfield network
(1) (A) only                           (2) (B) only
(3) (A) and (B) only             (4) (A) and (C) only

74. Unix command to change the case of first three lines of file “shortlist” from lower to upper
(1) $ tr ‘[a – z]’ ‘[A – Z]’ shortlist ¦ head-3
(2) $ head-3 shortlist ¦ tr ‘[a – z]’ ‘[A – Z]’
(3) $ tr head -3 shortlist ‘[A – Z]’ ‘[a – z]’
(4) $ tr shortlist head -3 ‘[a – z]’ ‘[A – Z]’

75. Match the following vi commands in Unix :
List – I                                  List – II
a. : w                   i. saves the file and quits editing mode
b. : x                   ii. escapes unix shell
c. : q                   iii. saves file and remains in editing mode
d. : sh                iv. quits editing mode and no changes are saved to the file
Codes :
a b c d
(1) ii iii i iv
(2) iv iii ii i
(3) iii iv i ii
(4) iii i iv ii

Comments are closed.