UGC Net
UGC Net
Table of Contents 1
Contributors 16
1 Algorithms (98) 17
1.1 Activity Selection Problem (1) 20
1.2 Algorithm Design Techniques (1) 21
1.3 Algorithm Efficiency (1) 21
1.4 Algorithms Sorting (1) 21
1.5 Array (2) 21
1.6 Artificial Intelligence (2) 22
1.7 Asymptotic Notations (8) 22
1.8 B Tree (2) 23
1.9 Binary Search Tree (1) 24
1.10 Binary Tree (4) 24
1.11 Decision Tree (1) 24
1.12 Depth First Search (2) 25
1.13 Dijkstras Algorithm (1) 25
1.14 Double Hashing (1) 25
1.15 Dynamic Programming (3) 26
1.16 Graph Algorithms (2) 26
1.17 Greedy Algorithms (1) 27
1.18 Heap (1) 27
1.19 Huffman Code (2) 27
1.20 In Place Algo (1) 27
1.21 Knapsack Problem (2) 28
1.22 Linear Search (1) 28
1.23 Longest Common Subsequence (1) 28
1.24 Matrix Chain Ordering (3) 28
1.25 Merge Sort (2) 29
1.26 Minimum Spanning Tree (1) 29
1.27 Optimal Search Tree (1) 30
1.28 Optimal Solution (1) 30
1.29 P Np Npc Nph (3) 30
1.30 Quick Sort (1) 31
1.31 Recurrence Relation (7) 31
1.32 Recursion (2) 32
1.33 Red Black Tree (1) 33
1.34 Shortest Path (2) 33
1.35 Sorting (4) 33
1.36 Space Complexity (1) 34
1.37 Time Complexity (7) 34
1.38 Tree (2) 35
1.39 Tree Search Algorithm (2) 36
1.40 Tree Traversal (1) 36
1.41 Tree Traversals (1) 36
Answer Keys 37
2 CO and Architecture (99) 38
2.1 8085 Microprocessor (6) 38
2.2 Accumultor (1) 39
2.3 Addressing Modes (10) 40
2.4 Assembly (14) 42
2.5 Byte Addressable (1) 45
2.6 Cache Memory (4) 45
2.7 Cmos (1) 46
2.8 Co And Architecture (9) 46
2.9 Computer Architecture (3) 48
2.10 Control Unit (2) 48
2.11 Cpu (1) 49
2.12 Data Transfer (1) 49
2.13 Dma (1) 49
2.14 Dynamic Ram (1) 49
2.15 Flags (1) 50
2.16 Hardware Interrupt (1) 50
2.17 Instruction Format (1) 50
2.18 Integrated Circuits (1) 50
2.19 Interrupts (3) 50
2.20 Language (1) 51
2.21 Machine Instructions (2) 51
2.22 Macros (1) 51
2.23 Memory (4) 52
2.24 Memory Data Transfer (1) 52
2.25 Microprocessors (12) 52
2.26 Microprogram Control Unit (1) 55
2.27 Parallel Computing (1) 55
2.28 Parallel Processing (1) 55
2.29 Pipelining (5) 55
2.30 Priority Encoder (1) 56
2.31 Processor Address Bus (1) 56
2.32 Register (1) 56
2.33 Speedup (2) 57
Answer Keys 57
3 Compiler Design (69) 58
3.1 Chomsky Normal Form (1) 62
3.2 Code Optimization (1) 63
3.3 Compilation Phases (1) 63
3.4 Compiler Optimization (2) 63
3.5 Constant Folding (1) 63
3.6 Control Flow Graph (1) 64
3.7 Grammar (5) 64
3.8 Infix Prefix (1) 65
3.9 Intermediate Code (1) 65
3.10 Lexical Analysis (3) 65
3.11 Linker (1) 66
3.12 Lr Parser (2) 66
3.13 Machine Instructions (1) 66
3.14 Parameter Passing (2) 67
3.15 Parsing (11) 67
3.16 Quadruple Representation (1) 70
3.17 Runtime Environment (1) 70
3.18 Shift Reduce Parser (2) 70
3.19 Symbol Table (2) 71
3.20 System Software& Compilers (1) 71
3.21 Translator (1) 71
3.22 Two Pass Assembler (1) 71
Answer Keys 72
4 Computer Networks (295) 73
4.1 Analog & Digital Transmission (1) 83
4.2 Analog Signals (1) 83
4.3 Application Layer (1) 83
4.4 Asymmetric Key Cryptography (1) 83
4.5 Binary Search Tree (1) 84
4.6 Binary Symmetric Channel (1) 84
4.7 Bit Oriented Protocol (1) 84
4.8 Bit Rate (1) 84
4.9 Bridges (1) 84
4.10 Cache Memory (1) 85
4.11 Checksum (1) 85
4.12 Classful Addressing (2) 85
4.13 Classless Addressing (1) 85
4.14 Communication (9) 86
4.15 Computer Neworks (1) 87
4.16 Crc Polynomial (2) 87
4.17 Cryptography (7) 88
4.18 Data Communication (7) 89
4.19 Data Link Layer (7) 90
4.20 Data Mining Algorithm (1) 92
4.21 Data Transmission (1) 92
4.22 Distance Vector Routing (1) 92
4.23 Edi Layer (1) 92
4.24 Electronic Payment Systems (1) 92
4.25 Encoding (2) 93
4.26 Encryption Decryption (2) 93
4.27 Entropy (1) 93
4.28 Error Correction (5) 93
4.29 Error Detection Correction (1) 94
4.30 Ethernet (5) 94
4.31 Firewall (1) 95
4.32 Hamming Code (4) 95
4.33 Hamming Distance (1) 96
4.34 Huffman Code (1) 96
4.35 Internal Memory (1) 96
4.36 Internet Security (1) 97
4.37 Internet Stack Layers (1) 97
4.38 Ip Addressing (10) 97
4.39 Ip Packet (2) 99
4.40 Ipv6 (1) 99
4.41 Lan Technologies (2) 99
4.42 Link State Routing (1) 99
4.43 Loopback Address (1) 100
4.44 Mesh Topology (3) 100
4.45 Mobile Communication (7) 100
4.46 Modulation (2) 102
4.47 Multimedia Protocol (1) 102
4.48 Multiple Access Protocol (1) 102
4.49 Multiplexing (2) 103
4.50 Network Addressing (2) 103
4.51 Network Layer (1) 103
4.52 Network Layering (5) 103
4.53 Network Protocols (10) 104
4.54 Network Security (18) 107
4.55 Network Switching (5) 110
4.56 Network Topologies (4) 111
4.57 Osi Model (11) 111
4.58 Osi Protocol (5) 114
4.59 Physical Layer (4) 115
4.60 Port Numbers (1) 115
4.61 Propagation Delay (1) 116
4.62 Propagation Time (1) 116
4.63 Protocol (1) 116
4.64 Pure Aloha (1) 116
4.65 Rarp Protocol (1) 116
4.66 Routers Bridge Hubs Switches (2) 117
4.67 Routing (4) 117
4.68 Routing Algorithm (3) 118
4.69 Rsa (1) 118
4.70 Rsa Public Key (1) 118
4.71 Rsa Security Networks (2) 119
4.72 Serial Communication (2) 119
4.73 Session Layer (1) 119
4.74 Signalling (1) 120
4.75 Signals (1) 120
4.76 Sliding Window (4) 120
4.77 Slotted Aloha (1) 121
4.78 Subnetting (2) 121
4.79 Tcp (4) 121
4.80 Tcp Header (1) 122
4.81 Tcp Ip Model (1) 122
4.82 Tcp Ip Suit Protocols (1) 122
4.83 Tele Communication (1) 122
4.84 Token Bucket (1) 123
4.85 Transmission Media (9) 123
4.86 Unguided Media (1) 124
4.87 Wifi (1) 125
4.88 Wireless Communication (1) 125
4.89 Wireless Lan (4) 125
4.90 Wireless Networks (1) 126
4.91 Wireless Protocol (1) 126
4.92 Wireless Transmission (1) 126
Answer Keys 126
5 Databases (175) 129
5.1 Aggregation (2) 135
5.2 B Tree (2) 136
5.3 B+tree (1) 136
5.4 Candidate Key (4) 136
5.5 Cardinality Ratio (1) 137
5.6 Circular Queue (1) 137
5.7 Concurrency Control Protocols (1) 137
5.8 Crosstabquery (1) 138
5.9 Data Dependency (2) 138
5.10 Data Integrity (1) 138
5.11 Data Mining (2) 139
5.12 Data Model (2) 139
5.13 Database Constraints (1) 139
5.14 Database Design (1) 140
5.15 Database Normalization (20) 140
5.16 Decomposition (3) 144
5.17 Dependency Preserving (1) 145
5.18 Distributed Database (2) 145
5.19 Enhanced Er Model (1) 145
5.20 Er Diagram (16) 146
5.21 File System (1) 149
5.22 Generalization (1) 149
5.23 Granularity (1) 149
5.24 Hierarchical Database (1) 149
5.25 Indexing (1) 150
5.26 Java (1) 150
5.27 Joins (1) 150
5.28 Object Oriented Database (2) 151
5.29 Protocol (1) 151
5.30 Rdbms (9) 152
5.31 Recovery From Failure (1) 154
5.32 Referential Integrity (2) 154
5.33 Relation (2) 154
5.34 Relational Algebra (4) 155
5.35 Relational Calculus (2) 156
5.36 Relational Model (2) 156
5.37 Relational Schema (1) 157
5.38 Relations (1) 157
5.39 Sql (34) 157
5.40 Transaction And Concurrency (9) 168
5.41 Transactions And Concurrency Control (1) 169
5.42 Weak Entity (1) 170
Answer Keys 170
6 Digital Logic (106) 172
6.1 Adder (3) 176
6.2 Boolean Algebra (8) 176
6.3 Boolean Function (1) 178
6.4 Circuit Output (1) 178
6.5 Combinational Circuit (3) 178
6.6 Digital Circuits (11) 179
6.7 Digital Counter (1) 181
6.8 Dual Function (2) 181
6.9 Encoding (1) 181
6.10 Excess 3 (1) 182
6.11 Flip Flop (7) 182
6.12 Floating Point Representation (2) 183
6.13 Full Adder (1) 183
6.14 Ieee Representation (2) 184
6.15 K Map (3) 184
6.16 Logic Circuit Diagram (1) 185
6.17 Memory (1) 185
6.18 Multiplexer (4) 185
6.19 Number Representation (12) 186
6.20 Number System (6) 188
6.21 Number Theory (1) 189
6.22 Priority Encoder (1) 189
6.23 Ripple Counter Operation (3) 189
6.24 Rom (1) 190
6.25 Sequential Circuit (6) 190
6.26 Sum Of Product (1) 191
6.27 Unix (1) 191
Answer Keys 191
7 Discrete Mathematics: Combinatory (17) 193
7.1 Binary Tree (1) 194
7.2 Counting (3) 194
7.3 Euler Phi Function (1) 195
7.4 Inclusion Exclusion (1) 195
7.5 Parenthesization (1) 195
7.6 Pigeonhole Principle (1) 195
7.7 Recurrence Relation (1) 195
Answer Keys 195
8 Discrete Mathematics: Graph Theory (46) 197
8.1 Binary Tree (1) 201
8.2 Euler Graph (2) 201
8.3 Flow Network (1) 202
8.4 Graph Coloring (3) 202
8.5 Graph Connectivity (7) 203
8.6 Graph Isomorphism (1) 204
8.7 Graph Planarity (2) 204
8.8 Hamiltonian Graph (1) 205
8.9 Handshaking Theorem (1) 205
8.10 Minimum Spanning Tree (1) 205
8.11 Non Planar (1) 206
8.12 Tree (2) 206
Answer Keys 206
9 Discrete Mathematics: Mathematical Logic (30) 207
9.1 First Order Logic (3) 209
9.2 Functions (1) 210
9.3 Prolog (1) 210
9.4 Propositional Logic (11) 211
Answer Keys 213
10 Discrete Mathematics: Set Theory & Algebra (19) 214
10.1 Boolean (1) 214
10.2 Complement In Fuzzy Set (1) 214
10.3 Euler Phi Function (1) 215
10.4 Factors (1) 215
10.5 Function Composition (1) 215
10.6 Functions (3) 215
10.7 Inclusion Exclusion (1) 216
10.8 Poset (1) 216
10.9 Power Set (1) 216
10.10 Relational Algebra (1) 217
10.11 Relations (4) 217
Answer Keys 218
11 Engineering Mathematics: Discrete Mathematics (45) 219
11.1 Boolean Function (1) 222
11.2 Equivalence Class (1) 222
11.3 First Order Logic (4) 222
11.4 Functions (2) 223
11.5 Group Theory (2) 223
11.6 Linear Programming (1) 224
11.7 Number Representation (1) 224
11.8 Partial Order (2) 224
11.9 Propositional Logic (9) 224
11.10 Quantifiers (1) 227
11.11 Relations (2) 227
11.12 Set Theory (3) 227
Answer Keys 228
12 Engineering Mathematics: Linear Algebra (2) 229
12.1 Eigen Value (1) 229
Answer Keys 229
13 Engineering Mathematics: Probability (13) 230
13.1 Binary Tree (1) 231
13.2 Joint Distribution (1) 231
13.3 Poisson Distribution (1) 232
Answer Keys 232
14 General Aptitude: Quantitative Aptitude (25) 233
14.1 Data Interpretation (5) 233
14.2 Number System (1) 235
14.3 Percentage (1) 235
14.4 Quadratic Equations (1) 236
14.5 Quantitative Aptitude (14) 236
Answer Keys 239
15 General Aptitude: Verbal Aptitude (8) 240
15.1 Logical Reasoning (2) 240
15.2 Quantitative Aptitude (2) 241
Answer Keys 241
16 Non GATE: Artificial Intelligence (45) 242
16.1 Artificial Intelligence (15) 242
16.2 Artificial Neural Network (1) 245
16.3 Back Propagation (1) 246
16.4 Blocks World Problem (1) 246
16.5 Chaining (1) 246
16.6 Expert System (2) 246
16.7 Fuzzy Logic (1) 246
16.8 Genetic Algorithms (1) 247
16.9 Heuristic Search (1) 247
16.10 Intelligence (1) 247
16.11 Linear Programming (1) 247
16.12 Machine Learning (4) 247
16.13 Map Coloring (1) 249
16.14 Means End (1) 249
16.15 Minimax Procedure (1) 249
16.16 Neural Network (3) 250
16.17 Planning (1) 250
16.18 Prolog (2) 250
16.19 Reinforcement Learning (1) 251
16.20 Searches (1) 251
16.21 Sigmoid Function (1) 251
16.22 Strips (1) 252
Answer Keys 252
17 Non GATE: Big Data Systems (1) 253
17.1 Big Data Systems (1) 253
Answer Keys 253
18 Non GATE: Cloud Computing (2) 254
18.1 Cloud Computing (2) 254
Answer Keys 254
19 Non GATE: Computer Graphics (80) 255
19.1 2d Geometry (1) 255
19.2 2d Transformation (1) 255
19.3 3d Graphics (2) 255
19.4 3d Rotation (1) 256
19.5 Animation (1) 256
19.6 Anti Aliasing (1) 256
19.7 Breshenmans Algorithm (1) 256
19.8 Color Models (1) 256
19.9 Computer Graphics (38) 257
19.10 Crt (2) 266
19.11 Digital Image Processing (5) 266
19.12 Display Devices (1) 267
19.13 Frame Buffer (1) 267
19.14 Halftoning (1) 267
19.15 Image Compression (1) 267
19.16 Image Entropy (1) 268
19.17 Line Clipping (1) 268
19.18 Line Drawing Algorithm (3) 268
19.19 Parametric Line Equation (1) 269
19.20 Phong Color Model (1) 269
19.21 Projection (8) 269
19.22 Raster Graphics (2) 271
19.23 Resolution (1) 272
19.24 Rotation (2) 272
19.25 Transformation (2) 272
Answer Keys 272
20 Non GATE: Computer Peripherals (3) 274
20.1 Computer Peripherals (1) 274
20.2 Io Devices (1) 274
20.3 Matrix Printer (1) 274
Answer Keys 274
21 Non GATE: Data Mining and Warehousing (17) 275
21.1 Data Cube (1) 275
21.2 Data Mining (1) 275
21.3 Data Mining And Warehousing (1) 275
21.4 Decision Tree (1) 275
21.5 Expert System (1) 276
21.6 Fuzzy Set (1) 276
21.7 Group Decision Support System (1) 276
21.8 K Means Clustering (1) 276
21.9 Knowledge Representation (5) 277
21.10 Olap (1) 278
21.11 Perceptron (1) 278
Answer Keys 278
22 Non GATE: Digital Image Processing (8) 279
22.1 Discovolution (1) 279
22.2 Entropy (2) 279
22.3 Fourier Transform (1) 279
22.4 Image Compression (4) 279
Answer Keys 280
23 Non GATE: Digital Signal Processing (5) 281
23.1 Butterworth Lowpass Filter (1) 281
23.2 Digital Signal Processing (1) 281
23.3 Discrete Memoryless Channel (1) 281
23.4 Spatial Mask (1) 281
Answer Keys 282
24 Non GATE: Distributed Computing (11) 283
24.1 Computing Models (1) 283
24.2 Distributed Computing (3) 283
24.3 Distributed Database (2) 283
24.4 Distributed System (2) 284
24.5 Message Passing (1) 284
24.6 Parallel Virtual Machine (1) 285
24.7 Rpc (1) 285
Answer Keys 285
25 Non GATE: Geometry (2) 286
25.1 Geometry (1) 286
25.2 Lines Curves (1) 286
Answer Keys 286
26 Non GATE: Integrated Circuits (1) 287
26.1 Integrated Circuits (1) 287
Answer Keys 287
27 Non GATE: IS&Software Engineering (204) 288
27.1 Adaptive Maintenance (1) 292
27.2 Artificial Intelligence (2) 292
27.3 Assignment Problem (1) 292
27.4 Cmm Model (3) 293
27.5 Cmmi (1) 293
27.6 Cocomo Model (3) 294
27.7 Coding And Testing (1) 294
27.8 Cohesion (2) 294
27.9 Cost Estimation Model (2) 295
27.10 Coupling (3) 295
27.11 Coupling Cohesion (1) 296
27.12 Crc Polynomial (1) 296
27.13 Cyclomatic Complexity (2) 296
27.14 Data Mining (2) 297
27.15 Digital Marketing (1) 297
27.16 Fan In (1) 297
27.17 Flow Chart (1) 298
27.18 Function Point Metric (2) 298
27.19 Git (1) 298
27.20 Information System (1) 298
27.21 Is&software Engineering (59) 299
27.22 Life Cycle Model (1) 311
27.23 Mis (1) 311
27.24 Model View Controller (1) 311
27.25 Object Oriented Modelling (1) 311
27.26 Optimization (1) 312
27.27 Project Planning (1) 312
27.28 Project Tracking (1) 312
27.29 Risk Management (3) 312
27.30 Size Metrices (1) 313
27.31 Software (1) 313
27.32 Software Configuration (1) 313
27.33 Software Cost Estimation (1) 314
27.34 Software Design (14) 314
27.35 Software Development (3) 317
27.36 Software Development Life Cycle Models (11) 317
27.37 Software Development Models (1) 320
27.38 Software Intergrity (1) 320
27.39 Software Maintenance (2) 321
27.40 Software Metrics (3) 321
27.41 Software Process (1) 322
27.42 Software Quality Assurance (2) 322
27.43 Software Quality Characteristics (1) 322
27.44 Software Reliability (8) 322
27.45 Software Requirement Specification (1) 324
27.46 Software Requirement Specifications (1) 324
27.47 Software Reuse (1) 324
27.48 Software Testing (20) 324
27.49 Software Validation (1) 328
27.50 Source Code Metric (1) 328
27.51 Uml (1) 328
27.52 Validation (1) 328
27.53 Waterfall Model (2) 329
27.54 White Box Testing (1) 329
Answer Keys 329
28 Non GATE: Java (10) 331
28.1 Abstract Method (1) 331
28.2 Applet (1) 331
28.3 Java (3) 331
28.4 Method Overriding (1) 332
28.5 Multi Threaded Programming (1) 332
28.6 Oops (1) 332
28.7 Servlet (1) 332
28.8 Wrapper Class Object (1) 333
Answer Keys 333
29 Non GATE: Numerical Methods (3) 334
29.1 Hungarian Method (1) 334
29.2 Operation Research Pert Cpm (1) 334
29.3 Simplex Method (1) 334
Answer Keys 334
30 Non GATE: Object Oriented Programming (58) 335
30.1 Abstract Class (2) 335
30.2 C++ (2) 336
30.3 Composition (1) 336
30.4 Constructor (3) 336
30.5 Cpp (1) 337
30.6 Final (1) 337
30.7 Friend Class (1) 337
30.8 Friend Function (2) 337
30.9 Inheritance (3) 338
30.10 Java (10) 338
30.11 Object Oriented Programming (24) 340
30.12 Operator Overloading (1) 346
30.13 Programming In C (1) 346
30.14 Software Design (1) 346
30.15 Template Vs Macro (1) 347
30.16 Windows (1) 347
Answer Keys 347
31 Non GATE: Optimization (18) 348
31.1 Assignment Problem (2) 348
31.2 Dual Linear Programming (1) 348
31.3 Linear Programming (1) 348
31.4 Linear Programming Problem (1) 348
31.5 Optimization (8) 349
31.6 Transportation Problem (5) 350
Answer Keys 352
32 Non GATE: Others (154) 353
32.1 3 Puzzle (1) 399
32.2 Algorithm Design (1) 400
32.3 Alpha Beta Pruning (1) 400
32.4 Alpha Cut (1) 400
32.5 Application Software (1) 400
32.6 Bigdata Hadoop (1) 400
32.7 Convex Optimization (1) 401
32.8 Data Mining (2) 401
32.9 Data Warehousing (4) 402
32.10 Debugger (1) 402
32.11 Defuzzification (1) 403
32.12 Encryption Decryption (1) 403
32.13 Fuzzy Relation (1) 403
32.14 Fuzzy Set (5) 404
32.15 Geographical Information System (1) 405
32.16 Hamming Code (1) 405
32.17 Hill Climbing Search (1) 405
32.18 Inventory (1) 406
32.19 K Mean Clustering (1) 406
32.20 Llp (1) 406
32.21 Machine Learning (1) 406
32.22 Net Exam (1) 407
32.23 Operational Research (2) 407
32.24 Optimization (1) 407
32.25 Process Scheduling (1) 407
32.26 Searching (1) 408
32.27 Shell (1) 408
32.28 Shell Script (2) 408
32.29 Simplex (1) 409
32.30 Simplex Method (2) 409
32.31 System Software& Compilers (1) 410
32.32 Time Complexity (1) 410
32.33 Transportation Problem (1) 411
32.34 Unified Modeling Language (1) 411
32.35 Unix (5) 411
32.36 Vertex Cover (1) 412
32.37 Windows (1) 413
Answer Keys 413
33 Non GATE: Web Technologies (32) 415
33.1 Activex (1) 415
33.2 Client Server Application (1) 415
33.3 Data Warehousing (1) 415
33.4 E Commerce (1) 415
33.5 Edi Layer (2) 415
33.6 Html (5) 416
33.7 Javascript (2) 417
33.8 Transmission Media (1) 417
33.9 Trojan Horse (1) 418
33.10 Web Technologies (8) 418
33.11 Xml (7) 419
33.12 Xsl (1) 420
Answer Keys 421
34 Operating System (223) 422
34.1 Applications In Windows (1) 429
34.2 Bankers Algorithm (1) 429
34.3 Binary Semaphore (1) 429
34.4 Counting Semaphores (1) 430
34.5 Critical Section (1) 430
34.6 Deadlock Prevention Avoidance Detection (9) 430
34.7 Delay (1) 432
34.8 Demand Paging (1) 432
34.9 Dijkstras Bankers Algorithm (1) 432
34.10 Directory Structure (1) 432
34.11 Disk (10) 433
34.12 Disk Cpu Memory Interrupt (1) 435
34.13 Disk Scheduling (9) 435
34.14 Distributed Computing (1) 437
34.15 Distributed System (1) 437
34.16 Dynamic Linking (1) 437
34.17 Effective Memory Access (1) 437
34.18 File System (7) 437
34.19 Fragmentation (1) 439
34.20 Hard Disk Drive (1) 439
34.21 Hit Ratio (1) 439
34.22 Input Output (2) 439
34.23 Interrupts (2) 440
34.24 Io Handling (1) 441
34.25 Java (1) 441
34.26 Least Recently Used (2) 441
34.27 Linux (1) 441
34.28 Memory Management (8) 442
34.29 Mmu (1) 443
34.30 Monitors (1) 443
34.31 Multiprogramming Os (1) 444
34.32 Mutual Exclusion (1) 444
34.33 Page Fault (7) 444
34.34 Page Replacement (5) 446
34.35 Paging (8) 447
34.36 Pipelining (1) 448
34.37 Process (2) 448
34.38 Process Model (2) 449
34.39 Process Scheduling (20) 449
34.40 Process Synchronization (2) 453
34.41 Ram (1) 454
34.42 Resource Allocation (2) 454
34.43 Round Robin Scheduling (1) 455
34.44 Runtime Environment (1) 455
34.45 Scheduling (4) 455
34.46 Seek Latency (1) 456
34.47 Semaphore (3) 457
34.48 Shell Script (7) 457
34.49 Sjf (1) 459
34.50 Sstf (1) 459
34.51 Storage Devices (1) 459
34.52 System Call (2) 460
34.53 System Reliability (1) 461
34.54 Threads (4) 461
34.55 Transaction And Concurrency (1) 461
34.56 Translation Lookaside Buffer (2) 462
34.57 Unix (24) 462
34.58 Virtual Memory (5) 467
34.59 Vsam (1) 468
34.60 Windows (5) 468
Answer Keys 469
35 Others: Others (579) 471
35.1 Acid Properties (1) 549
35.2 Artificial Intelligence (1) 549
35.3 Assembly (1) 550
35.4 Binary Codes (1) 550
35.5 Binary Tree (1) 550
35.6 Boolean Algebra (1) 550
35.7 Compilation Phases (1) 550
35.8 Crypt Arithmetic (1) 551
35.9 Data Compression (1) 551
35.10 Data Flow Diagram (1) 551
35.11 Data Mart (1) 551
35.12 Data Mining (4) 551
35.13 Data Warehousing (2) 552
35.14 Decomposition (1) 552
35.15 Digital Image Processing (3) 553
35.16 Disk (1) 553
35.17 Disk Scheduling (1) 553
35.18 Duality (1) 554
35.19 E Commerce (2) 554
35.20 E Payment (1) 554
35.21 E Technologies (3) 554
35.22 Encryption Decryption (2) 555
35.23 Enterprise Resource Planning (2) 555
35.24 File System (1) 556
35.25 Fuzzy Logic (2) 556
35.26 Fuzzy Relations (1) 556
35.27 Fuzzy Set (2) 557
35.28 General Awareness (33) 557
35.29 Hashing (2) 564
35.30 Image Compression (1) 565
35.31 Information System (1) 565
35.32 Interpreter (1) 565
35.33 Is&software Engineering (1) 565
35.34 Java (1) 565
35.35 Job (1) 565
35.36 Linear Programming (3) 566
35.37 Linker (2) 567
35.38 Linux (1) 567
35.39 Management Information System (2) 568
35.40 Microprocessors (1) 568
35.41 Minimum Spanning Tree (1) 568
35.42 Mis (1) 568
35.43 Mobile Communication (2) 569
35.44 Multiple Document Interface (1) 569
35.45 Natural Join (1) 569
35.46 Natural Language Processing (1) 570
35.47 Network Switching (1) 570
35.48 Neural Network (6) 570
35.49 Oops Concept (1) 571
35.50 Operator Overloading (1) 571
35.51 Pipelining (1) 572
35.52 Process Scheduling (2) 572
35.53 Prolog (1) 572
35.54 Quadratic Equations (1) 572
35.55 Queue (1) 572
35.56 Rdbms (2) 573
35.57 Relations (1) 573
35.58 Semantic Nets (1) 574
35.59 Shell (1) 574
35.60 Single Layer Perceptron (1) 574
35.61 Software Development Life Cycle Models (1) 575
35.62 Software Engineering Framework (1) 575
35.63 Software Testing (1) 575
35.64 System Software Compilers (1) 575
35.65 Transaction And Concurrency (3) 576
35.66 Transportation Problem (3) 576
35.67 Tree (1) 577
35.68 Unix (4) 577
35.69 Virtual Memory (1) 578
35.70 Windows (5) 578
35.71 Windows Programming (2) 579
Answer Keys 579
36 Programming and DS (27) 583
36.1 Array (2) 583
36.2 Array Of Pointers (1) 583
36.3 Dangling Pointers (1) 583
36.4 Data Types (1) 583
36.5 Input Output Statement (1) 584
36.6 Operator Precedence (2) 584
36.7 Operators (2) 584
36.8 Parameter Passing (1) 585
36.9 Pointer Declaration (1) 585
36.10 Programming In C (13) 585
36.11 Storage Classes In C (1) 588
36.12 Three Dimensional Array (1) 589
Answer Keys 589
37 Programming and DS: DS (100) 590
37.1 Avl Tree (1) 592
37.2 B And Bplus Trees (1) 592
37.3 B Tree (1) 592
37.4 Binary Heap (1) 593
37.5 Binary Search Tree (5) 593
37.6 Binary Tree (7) 594
37.7 Breadth First Search (1) 595
37.8 Cryptography (1) 595
37.9 Data Structures (7) 596
37.10 Graph Algorithms (1) 597
37.11 Graph Connectivity (1) 597
37.12 Hashing (11) 597
37.13 Heap (6) 599
37.14 Heap Sort (1) 600
37.15 Infix Prefix (1) 600
37.16 Linked List (2) 601
37.17 Max Heap (1) 601
37.18 Priority (1) 601
37.19 Priority Queue (2) 602
37.20 Queue (4) 602
37.21 Quick Sort (1) 603
37.22 Radix Sort (2) 603
37.23 Recursion (1) 603
37.24 Relational Algebra (1) 603
37.25 Spanning Tree (2) 604
37.26 Stack (12) 604
37.27 Tree (10) 606
37.28 Tree Traversal (1) 608
Answer Keys 608
38 Programming and DS: Programming (86) 610
38.1 Abstract Data Type (1) 616
38.2 Aliasing (1) 617
38.3 Array (3) 617
38.4 Binary Search Tree (1) 618
38.5 Bitwise Operation (1) 618
38.6 Data Types (2) 618
38.7 Dynamic Memory Allocation (1) 618
38.8 Evaluation Postfix (1) 619
38.9 Exception Handling (1) 619
38.10 Expression Evaluation (1) 619
38.11 File Handling (1) 619
38.12 Graph Coloring (1) 619
38.13 Io Statement (1) 619
38.14 Java (4) 620
38.15 Linked List (1) 621
38.16 Loop (1) 621
38.17 Object Oriented Programming (3) 621
38.18 Operator Precedence (1) 622
38.19 Pointers (2) 622
38.20 Programming In C (15) 623
38.21 Pseudocode (1) 626
38.22 Row Major Address Calculation (1) 626
38.23 Storage Classes In C (2) 626
38.24 Tree Traversal (1) 627
38.25 Undefined Behaviour (1) 627
38.26 Union (1) 627
38.27 Variable Scope (4) 628
Answer Keys 629
39 Theory of Computation (141) 630
39.1 Closure Property (2) 635
39.2 Complement (1) 636
39.3 Conjunctive Normal Form (1) 636
39.4 Context Free Grammar (8) 636
39.5 Context Free Language (8) 638
39.6 Context Sensitive (2) 640
39.7 Decidability (5) 640
39.8 Expression (1) 641
39.9 Finite Automata (10) 641
39.10 Grammar (15) 643
39.11 Identify Class Language (8) 647
39.12 Language (1) 648
39.13 Languages Classification (1) 649
39.14 Languages Relationships (1) 649
39.15 Minimal State Automata (1) 649
39.16 Parsing (1) 649
39.17 Pumping Lemma (3) 650
39.18 Pushdown Automata (5) 650
39.19 Recursive And Recursively Enumerable Languages (3) 651
39.20 Regular Expression (17) 652
39.21 Regular Grammar (4) 656
39.22 Regular Language (10) 657
39.23 Right Quotient (1) 659
39.24 Strings (1) 659
39.25 Turing Machine (5) 660
Answer Keys 661
40 Unknown Category (201) 663
40.1 Binary Search Tree (1) 704
40.2 Clustering (1) 705
40.3 Co And Architecture (2) 705
40.4 Database Normalization (1) 705
40.5 Disk Scheduling (1) 705
40.6 Dynamic Programming (1) 706
40.7 E Technologies (1) 706
40.8 Ethernet (1) 706
40.9 Graph Algorithms (1) 706
40.10 Heap (1) 707
40.11 Indexing (1) 707
40.12 Ip Addressing (1) 707
40.13 Linked List (1) 707
40.14 Microprocessors (1) 707
40.15 Minimum Spanning Tree (1) 707
40.16 Multiplexing (1) 708
40.17 Osi Model (1) 708
40.18 Physical Layer (1) 708
40.19 Software Testing (1) 708
40.20 Sorting (1) 709
40.21 Sql (1) 709
40.22 Stack (1) 709
40.23 Transaction And Concurrency (1) 709
Answer Keys 710
Contributors
User , Answers User Added User Done
sanjay 1108, 562 GO Editor 1346 sanjay 187
shekhar chauhan 665, 170 makhdoom ghaya 542 Arjun Suresh 140
Leen Sharma 349, 113 Arjun Suresh 324 Sankaranarayanan P.N 84
VIPIN NARAYAN 316, 177 RISHABH KUMAR 131 RISHABH KUMAR 68
Prashant Singh 220, 89 Pooja Khatri 99 VIPIN NARAYAN 46
Muktinath Vishwakarma 87, 15 soujanyareddy13 86 Prashant Singh 46
papesh 85, 28 sanjay 58 Leen Sharma 38
Debasmita Bhoumik 77, 51 Debasmita Bhoumik 37
Satbir Singh 59, 19 srestha 32
RISHABH KUMAR 45, 103 sourav. 25
Arjun Suresh 44, 13 Manoj Kumar 24
Dhananjay Kumar Sharma 41, 12 shekhar chauhan 17
Jeet 38, 16 Resmi Arjun 13
Praveen Saini 36, 4 Dhananjay Kumar Sharma 13
srestha 35, 16 papesh 12
Rajesh Pradhan 35, 26 Jeet 12
Hira 35, 45 Kapil Phulwani 10
Shaik Masthan 34, 20 asutosh kumar Biswal 10
asutosh kumar Biswal 32, 16 Krishanveer Gangwar 9
Kapil Phulwani 31, 7 Desert_Warrior 9
kunal chalotra 30, 20 Satbir Singh 9
Sayan Bose 28, 15 deepthi 9
Sankaranarayanan P.N 26, 13 Bikram 9
Digvijay 25, 9 soujanyareddy13 8
Prasanjeet Ghosh 24, 22 Hira 8
gatecse 8
shahidhope 7
shivani Sharma 7
Lakshman Patel 7
Prajwal Bhat 6
Rajesh Pradhan 6
im.raj 6
Meenakshi Sharma 6
Aboveallplayer 5
Shobhit Joshi 5
Roma Nagpal 5
Praveen Saini 5
Debashish Deka 4
Don't defeat anybody but yourself. 4
Shubham Pandey 4
Ram Swaroop1 4
Prabhanjan_1 4
Sayan Bose 4
nocturnal123 3
Suvasish Dutta 3
Pooja Palod 3
Muktinath Vishwakarma 3
Rishi yadav 3
rio 3
Prasanjeet Ghosh 3
Rishabh Gupta 3
Abhishek 3
Shaik Masthan 3
Rohit kumar1 3
Akhil Nadh PC 2
Akash Kanase 2
Mk Utkarsh 2
kunal chalotra 2
Arnabi Bej 2
Laxmikant 2
omveer 2
sushmita 2
gshivam63 2
V Sharma 2
DEVWRITT ARYA 2
SuShrut2311 2
1 Algorithms (98)
Which algorithm has same average, worst case and best case time ?
Answer key☟
A. B. C. D.
ugcnetcse-dec2004-paper2
Answer key☟
Match with
With reference to CMM developed by Software Engineering Institute (SEI)
A. B.
C. D.
ugcnetcse-oct2020-paper2 non-gate algorithms
Answer key☟
Match with
Choose the correct answer from the options given below:
A. B.
C. D.
ugcnetcse-oct2020-paper2 algorithms
Answer key☟
Match with
A. B.
C. D.
ugcnetcse-oct2020-paper2 algorithms
Answer key☟
Using Prim’s algorithm to construct a minimum spanning tree starting with node , which one of the following
sequences of edges represents a possible order in which the edges would be added to construct the minimum
spanning tree?
A.
B.
C.
D.
ugcnetcse-oct2020-paper2 algorithms
Answer key☟
Answer key☟
ugcnetcse-oct2020-paper2 algorithms
Answer key☟
Consider a Boolean function of 'n' variables. The order of an algorithm that determines whether the Boolean
function produces a output 1 is
Answer key☟
A. B.
C. D.
ugcnetcse-jan2017-paper3 algorithms
Answer key☟
1.0.11 UGC NET CSE | August 2016 | Part 3 | Question: 36 top☝
where is the set of nodes and is the set of edges in the graph.
A.
B.
C.
D.
ugcnetcse-aug2016-paper3 algorithms
Answer key☟
Answer key☟
The time complexity of an efficient algorithm to find the longest monotonically increasing subsequence of n
numbers is
Answer key☟
The post order traversal of a binary tree is DEBFCA. Find out the pre-order traversal
Answer key☟
1.1.1 Activity Selection Problem: UGC NET CSE | December 2015 | Part 3 | Question: 16 top☝
In Activity-Selection problem, each activity has a start time and a finish time where . Activities
and are compatible if
A. B.
C. or D. and
ugcnetcse-dec2015-paper3 algorithms activity-selection-problem
Answer key☟
Answer key☟
1.3.1 Algorithm Efficiency: UGC NET CSE | Junet 2015 | Part 2 | Question: 25 top☝
Answer key☟
1.4.1 Algorithms Sorting: UGC NET CSE | Junet 2015 | Part 2 | Question: 48 top☝
Which of the following algorithms sort integers, having the range to , in ascending order in
time?
Answer key☟
1.5.1 Array: UGC NET CSE | January 2017 | Part 2 | Question: 21 top☝
Which of the following is true for computation time in insertion, deletion and finding maximum and minimum
element in a sorted array ?
Answer key☟
1.5.2 Array: UGC NET CSE | June 2016 | Part 3 | Question: 32 top☝
A. B. C. D.
ugcnetcse-june2016-paper3 algorithms array
Answer key☟
1.6.1 Artificial Intelligence: UGC NET CSE | June 2014 | Part 3 | Question: 31 top☝
Consider Where function is a measure of the cost of getting from the start node to
the current node. and is an estimate of the additional cost of getting from the current node to the goal node.
Then is used in which one of the following algorithms?
A. algorithm B. algorithm
C. Greedy best first search algorithm D. Iterative algorithm
ugcnetjune2014iii artificial-intelligence algorithms
Answer key☟
1.6.2 Artificial Intelligence: UGC NET CSE | June 2014 | Part 3 | Question: 33 top☝
________ is used in game trees to reduce the number of branches of the search tree to be traversed without
affecting the solution.
Answer key☟
1.7.1 Asymptotic Notations: UGC NET CSE | December 2013 | Part 2 | Question: 35 top☝
A. B. C. D.
ugcnetcse-dec2013-paper2 asymptotic-notations
Answer key☟
1.7.2 Asymptotic Notations: UGC NET CSE | December 2013 | Part 3 | Question: 35 top☝
Let and be two matrices. The efficient algorithm to multiply the two matrices has the time
complexity
A. B. C. D.
ugcnetcse-dec2013-paper3 algorithms asymptotic-notations
Answer key☟
1.7.3 Asymptotic Notations: UGC NET CSE | December 2013 | Part 3 | Question: 36 top☝
A. O(n ) B. O(n )
C. O(n D. O(n lg n)
ugcnetcse-dec2013-paper3 algorithms asymptotic-notations recurrence-relation
Answer key☟
1.7.4 Asymptotic Notations: UGC NET CSE | January 2017 | Part 3 | Question: 31 top☝
A. B.
C. D.
ugcnetcse-jan2017-paper3 algorithms asymptotic-notations recurrence-relation
Answer key☟
1.7.5 Asymptotic Notations: UGC NET CSE | June 2014 | Part 2 | Question: 24 top☝
Big- estimates for the factorial function and the logarithm of the factorial function i.e. and is given
by
A. and B. and
C. and D. and
ugcnetcse-june2014-paper2 algorithms time-complexity asymptotic-notations
Answer key☟
1.7.6 Asymptotic Notations: UGC NET CSE | June 2014 | Part 2 | Question: 39 top☝
A. B.
C. D.
ugcnetcse-june2014-paper2 algorithms time-complexity asymptotic-notations
Answer key☟
1.7.7 Asymptotic Notations: UGC NET CSE | June 2014 | Part 3 | Question: 61 top☝
asymptotic-notations ugcnetjune2014iii
Answer key☟
1.7.8 Asymptotic Notations: UGC NET CSE | Junet 2015 | Part 3 | Question: 35 top☝
A. B.
C. D.
asymptotic-notations algorithms ugcnetcse-june2015-paper3
Answer key☟
1.8.1 B Tree: UGC NET CSE | December 2010 | Part 2 | Question: 21 top☝
What is the maximum number of nodes in a B-tree of order of depth (root at depth ) ?
Answer key☟
1.8.2 B Tree: UGC NET CSE | December 2013 | Part 2 | Question: 24 top☝
For any B-tree of minimum degree t 2, every node other than the root must have at least ____ keys and
every node can have at most ____ keys.
Answer key☟
1.9.1 Binary Search Tree: UGC NET CSE | January 2017 | Part 2 | Question: 25 top☝
A. a B. b C. c D. d
ugcnetjan2017ii algorithms binary-tree binary-search-tree
Answer key☟
1.10.1 Binary Tree: UGC NET CSE | December 2010 | Part 2 | Question: 22 top☝
Answer key☟
1.10.2 Binary Tree: UGC NET CSE | December 2011 | Part 2 | Question: 19 top☝
The post order traversal of a binary tree is DEBFCA. Find out the preorder traversal.
Answer key☟
1.10.3 Binary Tree: UGC NET CSE | December 2011 | Part 2 | Question: 50 top☝
The number of nodes in a complete binary tree of height (with roots at level ) is equal to
A. B.
C. D.
ugcnetcse-dec2011-paper2 algorithms binary-tree
Answer key☟
1.10.4 Binary Tree: UGC NET CSE | December 2014 | Part 2 | Question: 25 top☝
A. nodes B. nodes
C. nodes D. nodes
ugcnetcse-dec2014-paper2 algorithms binary-tree
Answer key☟
1.11.1 Decision Tree: UGC NET CSE | December 2014 | Part 3 | Question: 31 top☝
A. B. C. D.
ugcnetcse-dec2014-paper3 algorithms decision-tree
Answer key☟
1.12.1 Depth First Search: UGC NET CSE | December 2015 | Part 2 | Question: 36 top☝
In the following graph, discovery time stamps and finishing time stamps of Depth First Search (DFS) are
shown as , where is discovery time stamp and is finishing time stamp.
It shows which of the following depth first forest?
Answer key☟
1.12.2 Depth First Search: UGC NET CSE | June 2019 | Part 2 | Question: 65 top☝
ugcnetcse-june2019-paper2 depth-first-search
Answer key☟
1.13.1 Dijkstras Algorithm: UGC NET CSE | January 2017 | Part 3 | Question: 35 top☝
Answer key☟
1.14.1 Double Hashing: UGC NET CSE | June 2019 | Part 2 | Question: 66 top☝
A. B. C. D.
ugcnetcse-june2019-paper2 double-hashing
Answer key☟
1.15.1 Dynamic Programming: UGC NET CSE | August 2016 | Part 3 | Question: 31 top☝
Consider the problem of a chain < > of four matrices. Suppose that the dimensions of the
matrices and are and respectively. The minimum number
of scalar multiplications needed to compute the product is ____.
A. B. C. D.
ugcnetcse-aug2016-paper3 algorithms dynamic-programming numerical-answers matrix
Answer key☟
1.15.2 Dynamic Programming: UGC NET CSE | December 2013 | Part 3 | Question: 37 top☝
A. B. C. D.
ugcnetcse-dec2013-paper3 algorithms dynamic-programming
Answer key☟
1.15.3 Dynamic Programming: UGC NET CSE | June 2016 | Part 3 | Question: 36 top☝
A triangulation of a polygon is a set of chords that divide the polygon into disjoint triangles. Every
triangulation of vertex convex polygon has ____ chords and divides the polygon into ____ triangles
A. B. C. D.
ugcnetcse-june2016-paper3 algorithms dynamic-programming
Answer key☟
1.16.1 Graph Algorithms: UGC NET CSE | December 2015 | Part 3 | Question: 20 top☝
Floyd-Warshall algorithm utilizes _____ to solve the all-pairs shortest paths problem on a directed graph in
____ time
Answer key☟
1.16.2 Graph Algorithms: UGC NET CSE | June 2019 | Part 2 | Question: 61 top☝
ugcnetcse-june2019-paper2 graph-algorithms
Answer key☟
1.17.1 Greedy Algorithms: UGC NET CSE | Junet 2015 | Part 3 | Question: 64 top☝
A. B. C. D.
ugcnetcse-june2015-paper3 algorithms greedy-algorithms huffman-code
Answer key☟
1.18.1 Heap: UGC NET CSE | December 2012 | Part 3 | Question: 51 top☝
Suppose there are sorted lists of element each. The time complexity of producing a sorted list
of all these elements is (use heap data structure)
A. B.
C. D.
ugcnetcse-dec2012-paper3 algorithms time-complexity heap
Answer key☟
1.19.1 Huffman Code: UGC NET CSE | June 2016 | Part 3 | Question: 34 top☝
A. B.
C. D.
ugcnetcse-june2016-paper3 algorithms huffman-code
Answer key☟
1.19.2 Huffman Code: UGC NET CSE | June 2016 | Part 3 | Question: 59 top☝
Answer key☟
1.20.1 In Place Algo: UGC NET CSE | June 2019 | Part 2 | Question: 62 top☝
There are many sorting algorithms based on comparison. The running time of heapsort algorithm is
. Like , but unlike , heapsort sorts in place where is equal to
Answer key☟
1.21.1 Knapsack Problem: UGC NET CSE | June 2014 | Part 3 | Question: 62 top☝
Answer key☟
1.21.2 Knapsack Problem: UGC NET CSE | September 2013 | Part 3 | Question: 42 top☝
Given 0-1 knapsack problem and fractional knapsack problem and the following statements:
: 0-1 knapsack is efficiently solved using Greedy algorithm.
: Fractional knapsack is efficiently solved using Dynamic programming.
Which of the following is true?
Answer key☟
1.22.1 Linear Search: UGC NET CSE | Junet 2015 | Part 2 | Question: 24 top☝
Answer key☟
1.23.1 Longest Common Subsequence: UGC NET CSE | December 2015 | Part 3 | Question: 17 top☝
A. B.
C. D.
ugcnetcse-dec2015-paper3 algorithms longest-common-subsequence
Answer key☟
1.24.1 Matrix Chain Ordering: UGC NET CSE | December 2014 | Part 3 | Question: 35 top☝
Consider the problem of a chain of three matrices. Suppose that the dimensions of the
matrices are , and respectively. There are two different ways of parenthesization :
(i) and (ii) . Computing the product according to the first parenthesization is ______
times faster in comparison to the second parenthesization.
A. B. C. D.
ugcnetcse-dec2014-paper3 algorithms matrix-chain-ordering
Answer key☟
1.24.2 Matrix Chain Ordering: UGC NET CSE | January 2017 | Part 3 | Question: 34 top☝
The minimum number of scalar multiplication required, for parenthesization of a matrix-chain product whose
sequence of dimensions for four matrices is is
A. B. C. D.
ugcnetcse-jan2017-paper3 algorithms matrix-chain-ordering
Answer key☟
1.24.3 Matrix Chain Ordering: UGC NET CSE | September 2013 | Part 3 | Question: 39 top☝
Answer key☟
1.25.1 Merge Sort: UGC NET CSE | December 2013 | Part 2 | Question: 25 top☝
Given two sorted list of size 'm' and 'n' respectively. The number of comparisons needed in the worst case
by the merge sort algorithm will be
Answer key☟
1.25.2 Merge Sort: UGC NET CSE | June 2014 | Part 2 | Question: 36 top☝
Mergesort makes two recursive calls. Which statement is true after these two recursive calls finish, but
before the merge step ?
Answer key☟
1.26.1 Minimum Spanning Tree: UGC NET CSE | November 2017 | Part 2 | Question: 5 top☝
Use Kruskal’s algorithm to find a minimal spanning tree for the graph. The List of the edges of the tree in the order
in which they are chosen is
A. AD, AE, AG, GC, GB, BF B. GC, GB, BF, GA, AD, AE
C. GC, AD, GB, GA, BF, AE D. AD, AG, GC, AE, GB, BF
ugcnetcse-nov2017-paper2 graph-algorithms minimum-spanning-tree
Answer key☟
where and denotes the probability with which we search and the
identifier being searched satisfy respectively. The optimal search tree is given by:
Answer key☟
1.28.1 Optimal Solution: UGC NET CSE | June 2019 | Part 2 | Question: 68 top☝
Answer key☟
1.29.1 P Np Npc Nph: UGC NET CSE | December 2014 | Part 3 | Question: 33 top☝
Answer key☟
1.29.2 P Np Npc Nph: UGC NET CSE | June 2019 | Part 2 | Question: 67 top☝
Consider the complexity class as the set of languages such that , and the following
two statements:
Answer key☟
1.29.3 P Np Npc Nph: UGC NET CSE | Junet 2015 | Part 3 | Question: 32 top☝
Answer key☟
1.30.1 Quick Sort: UGC NET CSE | June 2014 | Part 3 | Question: 66 top☝
Suppose that the splits at every level of quicksort are in the proportion to , where is a
constant. The minimum depth of a leaf in the recursion tree is approximately given by
A. B.
C. D.
ugcnetjune2014iii data-structures sorting algorithms quick-sort
Answer key☟
1.31.1 Recurrence Relation: UGC NET CSE | December 2012 | Part 3 | Question: 14 top☝
A. B.
C. D.
ugcnetcse-dec2012-paper3 algorithms recurrence-relation time-complexity
Answer key☟
1.31.2 Recurrence Relation: UGC NET CSE | December 2015 | Part 3 | Question: 19 top☝
is
Answer key☟
1.31.3 Recurrence Relation: UGC NET CSE | December 2018 | Part 2 | Question: 21 top☝
A. B.
C. D.
ugcnetcse-dec2018-paper2 recurrence-relation
Answer key☟
1.31.4 Recurrence Relation: UGC NET CSE | July 2018 | Part 2 | Question: 21 top☝
A. B.
C. D.
ugcnetcse-july2018-paper2 algorithms time-complexity recurrence-relation
Answer key☟
1.31.5 Recurrence Relation: UGC NET CSE | June 2013 | Part 3 | Question: 12 top☝
A. B.
C. D.
ugcnetcse-june2013-paper3 algorithms recurrence-relation
Answer key☟
1.31.6 Recurrence Relation: UGC NET CSE | June 2014 | Part 3 | Question: 63 top☝
A. B. C. D.
ugcnetjune2014iii algorithms recurrence-relation
Answer key☟
1.31.7 Recurrence Relation: UGC NET CSE | September 2013 | Part 3 | Question: 37 top☝
Answer key☟
1.32.1 Recursion: UGC NET CSE | December 2009 | Part 2 | Question: 11 top☝
Answer key☟
1.32.2 Recursion: UGC NET CSE | December 2011 | Part 2 | Question: 3 top☝
Answer key☟
1.33 Red Black Tree (1) top☝
1.33.1 Red Black Tree: UGC NET CSE | January 2017 | Part 3 | Question: 33 top☝
Red-black trees are one of many search tree schemes that are “balanced” in order to guarantee that basic
dynamic-set operations take _____ time in the worst case.
A. B. C. D.
ugcnetcse-jan2017-paper3 algorithms red-black-tree
Answer key☟
1.34.1 Shortest Path: UGC NET CSE | December 2014 | Part 3 | Question: 34 top☝
Dijkstra algorithm, which solves the single-source shortest--paths problem, is a _______, and the Floyd-
Warshall algorithm, which finds shortest paths between all pairs of vertices, is a ________.
Answer key☟
1.34.2 Shortest Path: UGC NET CSE | Junet 2015 | Part 3 | Question: 31 top☝
Answer key☟
1.35.1 Sorting: UGC NET CSE | December 2013 | Part 3 | Question: 38 top☝
Assuming there are n keys and each key is in the range [0, m-1]. The run time of bucket sort is
Answer key☟
1.35.2 Sorting: UGC NET CSE | December 2014 | Part 2 | Question: 22 top☝
You have to sort a list , consisting of a sorted list followed by a few ‘random’ elements. Which of the
following sorting method would be most suitable for such a task ?
Answer key☟
1.35.3 Sorting: UGC NET CSE | December 2015 | Part 3 | Question: 18 top☝
If there are n integers to sort, each integer had d digits and each digit is in the set , radix sort
can sort the numbers in
A. B. C. D.
ugcnetcse-dec2015-paper3 algorithms sorting
Answer key☟
1.35.4 Sorting: UGC NET CSE | June 2019 | Part 2 | Question: 64 top☝
Which of the following is best running time to sort integers in the range to ?
A. B. C. D.
ugcnetcse-june2019-paper2 sorting
Answer key☟
1.36.1 Space Complexity: UGC NET CSE | December 2015 | Part 2 | Question: 39 top☝
Answer key☟
1.37.1 Time Complexity: UGC NET CSE | December 2010 | Part 2 | Question: 23 top☝
A. B. C. D.
ugcnetcse-dec2010-paper2 algorithms time-complexity
Answer key☟
1.37.2 Time Complexity: UGC NET CSE | December 2012 | Part 3 | Question: 11 top☝
The time complexities of some standard graph algorithms are given. Match each algorithm with its time
complexity ? ( and are no. of nodes and edges respectively)
A. B.
C. D.
ugcnetcse-dec2012-paper3 algorithms time-complexity
Answer key☟
1.37.3 Time Complexity: UGC NET CSE | December 2014 | Part 3 | Question: 32 top☝
A. B.
C. D.
ugcnetcse-dec2014-paper3 algorithms time-complexity
Answer key☟
1.37.4 Time Complexity: UGC NET CSE | Junet 2015 | Part 3 | Question: 33 top☝
Answer key☟
1.37.5 Time Complexity: UGC NET CSE | October 2020 | Part 2 | Question: 25 top☝
Answer key☟
1.37.6 Time Complexity: UGC NET CSE | October 2020 | Part 2 | Question: 52 top☝
Answer key☟
1.37.7 Time Complexity: UGC NET CSE | September 2013 | Part 2 | Question: 9 top☝
The amortized time complexity to perform ____ operation(s) in Splay trees is O(Ig n)
Answer key☟
1.38.1 Tree: UGC NET CSE | December 2015 | Part 2 | Question: 37 top☝
The number of disk pages access in B-tree search, where h is height, n is the number of keys and t is the
minimum degree, is
A. B.
C. D.
ugcnetcse-dec2015-paper2 algorithms tree
Answer key☟
1.38.2 Tree: UGC NET CSE | January 2017 | Part 3 | Question: 32 top☝
A. B.
C. D.
ugcnetcse-jan2017-paper3 algorithms tree
Answer key☟
1.39.1 Tree Search Algorithm: UGC NET CSE | Junet 2015 | Part 3 | Question: 58 top☝
Answer key☟
1.39.2 Tree Search Algorithm: UGC NET CSE | September 2013 | Part 3 | Question: 2 top☝
Answer key☟
1.40.1 Tree Traversal: UGC NET CSE | Junet 2015 | Part 2 | Question: 4 top☝
Answer key☟
1.41.1 Tree Traversals: UGC NET CSE | June 2012 | Part 3 | Question: 51 top☝
The strategy used to reduce the number of tree branches and the number of static evaluations applied in
case of a game tree is
Answer key☟
Answer Keys
1.0.1 Q-Q 1.0.2 A 1.0.3 A 1.0.4 X 1.0.5 A
1.0.6 A;C 1.0.7 Q-Q 1.0.8 A 1.0.9 Q-Q 1.0.10 D
1.0.11 Q-Q 1.0.12 D 1.0.13 B 1.0.14 C 1.1.1 C
1.2.1 Q-Q 1.3.1 B 1.4.1 C 1.5.1 C 1.5.2 D
1.6.1 C 1.6.2 C 1.7.1 B 1.7.2 B 1.7.3 X
1.7.4 C 1.7.5 B 1.7.6 B 1.7.7 B 1.7.8 D
With four programs in memory and with % average wait, the utilization is ?
A. % B. %
C. % D. %
ugcnetcse-june2009-paper2
Answer key☟
In which addressing mode the operand is given explicitly in the instruction itself ?
Answer key☟
A compiler that runs on one machine and produces code for a different machine is called :
A. Cross compilation
B. One pass compilation
C. Two pass compilation
D. None of the above
ugcnetcse-june2009-paper2
Answer key☟
2.1.1 8085 Microprocessor: UGC NET CSE | December 2014 | Part 3 | Question: 04 top☝
A. B.
C. D.
ugcnetcse-dec2014-paper3 8085-microprocessor non-gate
Answer key☟
2.1.2 8085 Microprocessor: UGC NET CSE | December 2014 | Part 3 | Question: 05 top☝
Answer key☟
2.1.3 8085 Microprocessor: UGC NET CSE | December 2014 | Part 3 | Question: 06 top☝
Specify the contents of the accumulator and the status of the and flags when
microprocessor performs addition of and .
A. B. C. D.
ugcnetcse-dec2014-paper3 8085-microprocessor non-gate
Answer key☟
2.1.4 8085 Microprocessor: UGC NET CSE | June 2016 | Part 3 | Question: 3 top☝
Answer key☟
2.1.5 8085 Microprocessor: UGC NET CSE | November 2017 | Part 2 | Question: 31 top☝
What is the value of and registers after the completion of the doloop ?
A. and B. and
C. and D. and
ugcnetcse-nov2017-paper2 co-and-architecture 8085-microprocessor
Answer key☟
2.1.6 8085 Microprocessor: UGC NET CSE | November 2017 | Part 2 | Question: 32 top☝
The contents of the destination register (in hexadecimal ) and the status of Carry Flag (CF) after the execution
of above instructions, are:
A. B.
C. D.
ugcnetcse-nov2017-paper2 8085-microprocessor non-gate
Answer key☟
2.2.1 Accumultor: UGC NET CSE | October 2020 | Part 2 | Question: 6 top☝
The following program is stored in memory unit of the basic computer. What is the content of the
accumulator after the execution of program? (All location numbers listed below are in hexadecimal).
A. B. C. D.
ugcnetcse-oct2020-paper2 accumultor assembly-language co-and-architecture
Answer key☟
2.3.1 Addressing Modes: UGC NET CSE | August 2016 | Part 3 | Question: 5 top☝
In _____ addressing mode, the operands are stored in the memory. The address of the corresponding
memory location is given in a register which is specified in the instruction.
Answer key☟
2.3.2 Addressing Modes: UGC NET CSE | December 2008 | Part 2 | Question: 38 top☝
In which addressing mode, the effective address of the operand is generated by adding a constant value to
the contents of register ?
Answer key☟
2.3.3 Addressing Modes: UGC NET CSE | December 2010 | Part 2 | Question: 34 top☝
The register or main memory location which contains the effective address of the operand is known as
Answer key☟
2.3.4 Addressing Modes: UGC NET CSE | December 2013 | Part 3 | Question: 49 top☝
A. B.
C. D.
ugcnetcse-dec2013-paper3 co-and-architecture addressing-modes
Answer key☟
2.3.5 Addressing Modes: UGC NET CSE | January 2017 | Part 3 | Question: 4 top☝
A. B.
C. D.
ugcnetcse-jan2017-paper3 co-and-architecture addressing-modes
Answer key☟
2.3.6 Addressing Modes: UGC NET CSE | June 2012 | Part 3 | Question: 27 top☝
Identify the addressing modes of the below instructions and match them :
A. B.
C. D.
ugcnetcse-june2012-paper3 co-and-architecture addressing-modes
Answer key☟
2.3.7 Addressing Modes: UGC NET CSE | June 2014 | Part 3 | Question: 40 top☝
The advantage of _______ is that it can reference memory without paying the price of having a full memory
address in the instruction.
Answer key☟
2.3.8 Addressing Modes: UGC NET CSE | June 2016 | Part 3 | Question: 5 top☝
The ____ addressing mode is similar to register indirect addressing mode, except that an offset is added to
the contents of the register. The offset and register are specified in the instruction.
Answer key☟
2.3.9 Addressing Modes: UGC NET CSE | June 2019 | Part 2 | Question: 11 top☝
Which type of addressing mode, less number of memory references are required?
Answer key☟
2.3.10 Addressing Modes: UGC NET CSE | November 2017 | Part 3 | Question: 4 top☝
Which of the following addressing mode is best suited to access elements of an array of contiguous memory
locations?
Answer key☟
2.4.1 Assembly: UGC NET CSE | August 2016 | Part 2 | Question: 32 top☝
The content of the accumulator after the execution of the following 8085 assembly language program, is
MVI A, 35H
MOV B, A
STC
CMC
RAR
XRA B
A. B. C. D.
ugcnetcse-aug2016-paper2 co-and-architecture assembly 8085-microprocessor
Answer key☟
2.4.2 Assembly: UGC NET CSE | December 2008 | Part 2 | Question: 37 top☝
Answer key☟
2.4.3 Assembly: UGC NET CSE | December 2010 | Part 2 | Question: 31 top☝
Answer key☟
2.4.4 Assembly: UGC NET CSE | December 2010 | Part 2 | Question: 35 top☝
Answer key☟
2.4.5 Assembly: UGC NET CSE | December 2015 | Part 3 | Question: 2 top☝
A. B. C. D.
ugcnetcse-dec2015-paper3 8086 assembly co-and-architecture non-gate
Answer key☟
2.4.6 Assembly: UGC NET CSE | December 2018 | Part 2 | Question: 15 top☝
The contents of the destination register (in -bit binary notation), th status of Carry Flag and Sign Flag
after the execution of above instructions, are
A. B.
C. D.
ugcnetcse-dec2018-paper2 computer-architecture assembly non-gate
Answer key☟
2.4.7 Assembly: UGC NET CSE | July 2018 | Part 2 | Question: 97 top☝
Answer key☟
2.4.8 Assembly: UGC NET CSE | June 2013 | Part 3 | Question: 41 top☝
Answer key☟
2.4.9 Assembly: UGC NET CSE | June 2013 | Part 3 | Question: 42 top☝
Answer key☟
2.4.10 Assembly: UGC NET CSE | June 2013 | Part 3 | Question: 43 top☝
Answer key☟
2.4.11 Assembly: UGC NET CSE | June 2013 | Part 3 | Question: 44 top☝
Answer key☟
2.4.12 Assembly: UGC NET CSE | June 2016 | Part 3 | Question: 4 top☝
Status register
Answer key☟
2.4.13 Assembly: UGC NET CSE | Junet 2015 | Part 2 | Question: 31 top☝
A. B.
C. D.
ugcnetcse-june2015-paper2 assembly
Answer key☟
2.4.14 Assembly: UGC NET CSE | September 2013 | Part 3 | Question: 33 top☝
The instruction : MOV CL, [BX] [DI] + 8 represents the ____ addressing mode
Answer key☟
2.5.1 Byte Addressable: UGC NET CSE | June 2014 | Part 3 | Question: 43 top☝
A byte addressable computer has a memory capacity of Kbytes and can perform operations. An
instruction involving operands and one operator needs a maximum of
A. bits B. bits
C. bits D. bits
ugcnetjune2014iii co-and-architecture byte-addressable
Answer key☟
2.6.1 Cache Memory: UGC NET CSE | December 2014 | Part 3 | Question: 01 top☝
A hierarchical memory system that uses cache memory has cache access time of nano seconds, main
memory access time of nano seconds, % of memory requests are for read, hit ratio of for read
access and the write-through scheme is used. What will be the average access time of the system both for read
and write requests ?
A. n.sec. B. n.sec.
C. n.sec. D. n.sec.
ugcnetcse-dec2014-paper3 co-and-architecture cache-memory
Answer key☟
2.6.2 Cache Memory: UGC NET CSE | July 2018 | Part 2 | Question: 98 top☝
Which of the following mapping is not used for mapping process in cache memory
Answer key☟
2.6.3 Cache Memory: UGC NET CSE | June 2016 | Part 3 | Question: 6 top☝
In ___ method, the word is written to the block in both the cache and main memory, in parallel
Answer key☟
2.6.4 Cache Memory: UGC NET CSE | October 2020 | Part 2 | Question: 5 top☝
Consider a machine with a byte addressable main memory of bytes block size of bytes. Assume that a
direct mapped cache consisting of lines used with this machine. How many bits will be there in Tag, line
and word field of format of main memory addresses?
A. B. C. D.
ugcnetcse-oct2020-paper2 co-and-architecture cache-memory
Answer key☟
2.7.1 Cmos: UGC NET CSE | July 2018 | Part 2 | Question: 91 top☝
Answer key☟
2.8.1 Co And Architecture: UGC NET CSE | December 2008 | Part 2 | Question: 39 top☝
ugcnetcse-dec2008-paper2 co-and-architecture
Answer key☟
2.8.2 Co And Architecture: UGC NET CSE | December 2010 | Part 2 | Question: 50 top☝
Answer key☟
2.8.3 Co And Architecture: UGC NET CSE | December 2012 | Part 3 | Question: 27 top☝
In an enhancement of a CPU design, the speed of a floating point unit has been increased by 20% and the
speed of a fixed point unit has been increased by 10%. What is the overall speed achieved if the ratio of the
number of floating point operations to the number of fixed point operations is 2:3 and the floating point operation
used to take twice the time taken by the fixed point operation in original design?
Answer key☟
2.8.4 Co And Architecture: UGC NET CSE | June 2012 | Part 2 | Question: 3 top☝
The branch logic that provides decision making capabilities in the control unit is known as
Answer key☟
2.8.5 Co And Architecture: UGC NET CSE | June 2012 | Part 2 | Question: 46 top☝
A. Microprocessor B. Memory
C. Peripheral equipment D. All of the above
co-and-architecture ugcnetcse-june2012-paper2
Answer key☟
2.8.6 Co And Architecture: UGC NET CSE | June 2012 | Part 2 | Question: 47 top☝
Answer key☟
2.8.7 Co And Architecture: UGC NET CSE | June 2012 | Part 3 | Question: 61 top☝
A. B.
C. D.
ugcnetcse-june2012-paper3 co-and-architecture
Answer key☟
2.8.8 Co And Architecture: UGC NET CSE | October 2020 | Part 2 | Question: 44 top☝
Which of the following statements with respect to multiprocessor system are true?
a. Multiprocessor system
b.isIncontrolled
Multiprocessor
by onesystem,
operating
c. Multiprocessor
multiple
systemcomputers isChoose
systemare the
classified
connected correct
asby
multiple answer
the means from
instruction the options
of communication
stream and lines
multiple data s
given below:
2.8.9 Co And Architecture: UGC NET CSE | September 2013 | Part 3 | Question: 31 top☝
Answer key☟
Answer key☟
2.9.2 Computer Architecture: UGC NET CSE | June 2012 | Part 2 | Question: 32 top☝
Cached and interleaved memories are ways of speeding up memory access between CPU’s and slower
RAM. Which memory models are best suited (i.e. improves the performance most) for which programs ?
Answer key☟
2.9.3 Computer Architecture: UGC NET CSE | June 2012 | Part 3 | Question: 3 top☝
The concept of pipelining is a most effective in improving performance in the tasks being performed in
different stages:
Answer key☟
2.10.1 Control Unit: UGC NET CSE | January 2017 | Part 3 | Question: 3 top☝
A. Block address register and cache memory B. Control address register and control memory
C. Branch register and cache memory D. Control address register and random access memory
ugcnetcse-jan2017-paper3 co-and-architecture control-unit
Answer key☟
2.10.2 Control Unit: UGC NET CSE | October 2020 | Part 2 | Question: 81 top☝
Answer key☟
2.11.1 Cpu: UGC NET CSE | December 2011 | Part 2 | Question: 31 top☝
Answer key☟
2.12.1 Data Transfer: UGC NET CSE | Junet 2015 | Part 3 | Question: 2 top☝
Consider a 32-bit microprocessor, with a 16-bit external data bus, driven by an 8 MHz input clock. Assume
that this microprocessor has a bus cycle whose minimum duration equals four input clock cycles. What is the
maximum data transfer rate for this microprocessor?
A. bytes/sec B. bytes/sec
C. bytes/sec D. bytes/sec
ugcnetcse-june2015-paper3 co-and-architecture data-transfer
Answer key☟
2.13.1 Dma: UGC NET CSE | December 2015 | Part 3 | Question: 5 top☝
A DMA controller transfers 32-bit words to memory using cycle Stealing. The words are assembled from a
device that transmits characters at a rate of 4800 characters per second. The CPU is fetching and executing
instructions at an average rate of one million instructions per second. By how much will the CPU be slowed down
because of the DMA transfer?
Answer key☟
2.14.1 Dynamic Ram: UGC NET CSE | December 2015 | Part 3 | Question: 4 top☝
A dynamic RAM has refresh cycle of times per msec. Each refresh operation requires msec and a
memory cycle requires msec. What percentage of memory's total operating time is required for
refreshes?
A. B. C. D.
ugcnetcse-dec2015-paper3 co-and-architecture dynamic-ram
Answer key☟
Which of the following flags are set when ‘JMP’ instruction is executed?
Answer key☟
2.16.1 Hardware Interrupt: UGC NET CSE | June 2016 | Part 3 | Question: 2 top☝
A. 2 B. 3 C. 4 D. 5
ugcnetcse-june2016-paper3 co-and-architecture hardware-interrupt
Answer key☟
2.17.1 Instruction Format: UGC NET CSE | December 2013 | Part 3 | Question: 50 top☝
Answer key☟
2.18.1 Integrated Circuits: UGC NET CSE | December 2011 | Part 2 | Question: 32 top☝
Answer key☟
2.19.1 Interrupts: UGC NET CSE | December 2015 | Part 3 | Question: 6 top☝
Answer key☟
2.19.2 Interrupts: UGC NET CSE | January 2017 | Part 3 | Question: 1 top☝
Which of the following is an interrupt according to temporal relationship with system clock?
Answer key☟
2.19.3 Interrupts: UGC NET CSE | June 2012 | Part 2 | Question: 37 top☝
Answer key☟
2.20.1 Language: UGC NET CSE | Junet 2015 | Part 3 | Question: 3 top☝
Answer key☟
2.21.1 Machine Instructions: UGC NET CSE | January 2017 | Part 2 | Question: 32 top☝
A. B. C. D.
ugcnetjan2017ii co-and-architecture machine-instructions
Answer key☟
2.21.2 Machine Instructions: UGC NET CSE | October 2020 | Part 2 | Question: 75 top☝
a. SISD b. MIMD c. SIMD Choose the correct answer from the options
given below:
A. B. C. D.
ugcnetcse-oct2020-paper2 co-and-architecture machine-instructions
Answer key☟
2.22.1 Macros: UGC NET CSE | December 2010 | Part 2 | Question: 32 top☝
2.23.1 Memory: UGC NET CSE | June 2019 | Part 2 | Question: 12 top☝
Suppose that the register and the register have the bit configuration. Only the three leftmost bits of
are compared with memory words because has ’s in these positions. Because of its organization, this
type of memory is uniquely suited to parallel searches by data association. This type of memory is known as
A. RAM B. ROM
C. content addressable memory D. secondary memory
ugcnetcse-june2019-paper2 co-and-architecture memory
Answer key☟
2.23.2 Memory: UGC NET CSE | June 2019 | Part 2 | Question: 19 top☝
How many address lines and data lines are required to provide a memory capacity of ?
A. B. C. D.
ugcnetcse-june2019-paper2 co-and-architecture memory
Answer key☟
2.23.3 Memory: UGC NET CSE | September 2013 | Part 3 | Question: 30 top☝
Answer key☟
2.23.4 Memory: UGC NET CSE | September 2013 | Part 3 | Question: 32 top☝
A given memory chip has 14 address and 8 data pins. It has the following number of locations.
A. B. C. D.
ugcnetcse-sep2013-paper3 co-and-architecture memory
Answer key☟
2.24.1 Memory Data Transfer: UGC NET CSE | Junet 2015 | Part 3 | Question: 5 top☝
The CPU of a system having 1 MIPS execution rate needs 4 machine cycles on an average for executing an
instruction. The fifty percent of the cycles use memory bus. A memory read/write employs one machine
cycle. For execution of the programs, the system utilizes 90% of the CPU time. For block data transfer, an IO
device is attached to the system while CPU executes the background programs continuously. What is the maximum
IO data transfer rate if programmed IO data transfer technique is used?
Answer key☟
2.25.1 Microprocessors: UGC NET CSE | August 2016 | Part 3 | Question: 2 top☝
A. B. C. D.
ugcnetcse-aug2016-paper3 co-and-architecture microprocessors 8085-microprocessor
2.25.2 Microprocessors: UGC NET CSE | August 2016 | Part 3 | Question: 4 top☝
Answer key☟
2.25.3 Microprocessors: UGC NET CSE | December 2013 | Part 3 | Question: 54 top☝
A. traps are asynchronous and interrupts are synchronous with the program.
B. traps are synchronous and interrupts are asynchronous with the program.
C. traps are synchronous and interrupts are asynchronous with the I/O devices.
D. None of these
ugcnetcse-dec2013-paper3 microprocessors
Answer key☟
2.25.4 Microprocessors: UGC NET CSE | January 2017 | Part 2 | Question: 34 top☝
A. B.
C. D.
ugcnetjan2017ii microprocessors machine-instructions co-and-architecture
Answer key☟
2.25.5 Microprocessors: UGC NET CSE | January 2017 | Part 3 | Question: 5 top☝
Answer key☟
2.25.6 Microprocessors: UGC NET CSE | January 2017 | Part 3 | Question: 6 top☝
Answer key☟
2.25.7 Microprocessors: UGC NET CSE | July 2018 | Part 2 | Question: 100 top☝
Answer key☟
2.25.8 Microprocessors: UGC NET CSE | November 2017 | Part 3 | Question: 1 top☝
Answer key☟
2.25.9 Microprocessors: UGC NET CSE | November 2017 | Part 3 | Question: 2 top☝
A. B. C. D.
ugcnetcse-nov2017-paper3 microprocessors 8085-microprocessor co-and-architecture
2.25.10 Microprocessors: UGC NET CSE | November 2017 | Part 3 | Question: 3 top☝
A. B.
C. D.
ugcnetcse-nov2017-paper3 microprocessors 8085-microprocessor co-and-architecture
Answer key☟
2.25.11 Microprocessors: UGC NET CSE | November 2017 | Part 3 | Question: 5 top☝
A. In memory – mapped I/O, the CPU can manipulate I/O data residing in interface registers that are not used to
manipulate memory words.
B. The isolated I/O method isolates memory and I/O addresses so that memory address range is not affected by
interface address assignment.
C. In asynchronous serial transfer of data the two units share a common clock.
D. In synchronous serial transmission of data the two units have different clocks.
Answer key☟
2.25.12 Microprocessors: UGC NET CSE | November 2017 | Part 3 | Question: 6 top☝
A micro-instruction format has micro-ops field which is divided into three subfields , , each having
seven distinct micro-operations, conditions field for four status bits, branch field having four options
used in conjunction with address field . The address space is of memory locations. The size of micro-
instruction is
Answer key☟
2.26 Microprogram Control Unit (1) top☝
2.26.1 Microprogram Control Unit: UGC NET CSE | June 2019 | Part 2 | Question: 14 top☝
The fault can be easily diagnosed in the micro-program control unit using diagnostic tools by maintaining the
contents of
Answer key☟
2.27.1 Parallel Computing: UGC NET CSE | June 2012 | Part 3 | Question: 5 top☝
Suppose that the given application is run on a 64-processor machine and that 70 percent of the application
can be parallelized. Then the expected performance improvement using Amdahl’s law is
Answer key☟
2.28.1 Parallel Processing: UGC NET CSE | Junet 2015 | Part 2 | Question: 46 top☝
In the case of parallelization, Amdahl's law states that if is the proportion of a program that can be made
parallel and is the proportion that cannot be parallelized, then the maximum speed-up that can be
achieved by using processors is:
A. B. C. D.
Answer key☟
2.29.1 Pipelining: UGC NET CSE | December 2004 | Part 2 | Question: 47 top☝
Answer key☟
2.29.2 Pipelining: UGC NET CSE | June 2012 | Part 2 | Question: 48 top☝
Answer key☟
2.29.3 Pipelining: UGC NET CSE | June 2016 | Part 2 | Question: 48 top☝
Answer key☟
2.29.4 Pipelining: UGC NET CSE | October 2020 | Part 2 | Question: 43 top☝
Which of the following statements with respect to -segment pipelining are true?
Answer key☟
2.29.5 Pipelining: UGC NET CSE | October 2020 | Part 2 | Question: 7 top☝
A non-pipeline system takes ns to process a task. The same task can be processed in six-segment
pipeline with a clockcycle of ns. Determine approximately the speedup ratio of the pipeline for tasks.
A. B. C. D.
ugcnetcse-oct2020-paper2 co-and-architecture pipelining
Answer key☟
2.30.1 Priority Encoder: UGC NET CSE | December 2015 | Part 3 | Question: 1 top☝
The three outputs from the priority encoder are used to provide a vector address of the form
. what is the second highest priority vector address in hexadecimal if the vector addresses
are starting from the one with the highest priority?
A. B. C. D.
ugcnetcse-dec2015-paper3 co-and-architecture priority-encoder
Answer key☟
2.31.1 Processor Address Bus: UGC NET CSE | June 2019 | Part 2 | Question: 49 top☝
A processor can support a maximum memory of GB where memory is word addressable and a word is
bytes. What will be the size of the address bus of the processor?
Answer key☟
2.32.1 Register: UGC NET CSE | August 2016 | Part 3 | Question: 3 top☝
The register that stores the bits required to mask the interrupts is ______.
Answer key☟
Let be the fraction of the computation (in terms of time) that is parallelizabl . the number of processors
in the system, and the speed up achievable in comparison with sequential execution – then the can be
calculated using the relation:
A. B. C. D.
ugcnetcse-dec2012-paper3 co-and-architecture speedup
Answer key☟
2.33.2 Speedup: UGC NET CSE | June 2019 | Part 2 | Question: 20 top☝
Suppose that a computer program takes seconds of execution time on a computer with multiplication
operation responsible for seconds of this time. How much do you have to improve the speed of the
multiplication operation if you are asked to execute this program four times faster?
Answer key☟
Answer Keys
2.0.1 Q-Q 2.0.2 Q-Q 2.0.3 Q-Q 2.1.1 D 2.1.2 B
2.1.3 D 2.1.4 A 2.1.5 B 2.1.6 A 2.2.1 D
2.3.1 Q-Q 2.3.2 D 2.3.3 Q-Q 2.3.4 C 2.3.5 A
2.3.6 A 2.3.7 D 2.3.8 D 2.3.9 X 2.3.10 A
2.4.1 Q-Q 2.4.2 Q-Q 2.4.3 Q-Q 2.4.4 Q-Q 2.4.5 C
2.4.6 Q-Q 2.4.7 Q-Q 2.4.8 C 2.4.9 D 2.4.10 C
2.4.11 B 2.4.12 C 2.4.13 D 2.4.14 B 2.5.1 D
2.6.1 A 2.6.2 Q-Q 2.6.3 A 2.6.4 A 2.7.1 Q-Q
2.8.1 Q-Q 2.8.2 Q-Q 2.8.3 X 2.8.4 A 2.8.5 D
2.8.6 C 2.8.7 A 2.8.8 C 2.8.9 D 2.9.1 D
2.9.2 B 2.9.3 B 2.10.1 B 2.10.2 A 2.11.1 Q-Q
2.12.1 B 2.13.1 B 2.14.1 D 2.15.1 D 2.16.1 D
2.17.1 D 2.18.1 Q-Q 2.19.1 D 2.19.2 D 2.19.3 D
2.20.1 C 2.21.1 A 2.21.2 C 2.22.1 Q-Q 2.23.1 C
2.23.2 C 2.23.3 D 2.23.4 B 2.24.1 D 2.25.1 Q-Q
2.25.2 Q-Q 2.25.3 B 2.25.4 C 2.25.5 B 2.25.6 C
2.25.7 Q-Q 2.25.8 D 2.25.9 C 2.25.10 B 2.25.11 B
2.25.12 B 2.26.1 D 2.27.1 B 2.28.1 C 2.29.1 Q-Q
2.29.2 X 2.29.3 C 2.29.4 A 2.29.5 B 2.30.1 A
2.31.1 C 2.32.1 Q-Q 2.33.1 C 2.33.2 C
3 Compiler Design (69)
Answer key☟
ugcnetcse-dec2007-paper2
Answer key☟
In which file the compiler manage various objects, which are used in windows programming?
Answer key☟
Which activity is not included in the first pass of two pass assemblers ?
Answer key☟
3.0.6 UGC NET CSE | December 2006 | Part 2 | Question: 40 top☝
Loading operating system from secondary memory to primary memory is called ____________ .
ugcnetcse-dec2006-paper2
Answer key☟
Answer key☟
A compiler for a high level language that runs on one machine and produces code for a different machine is
called :
Answer key☟
Answer key☟
Answer key☟
Answer key☟
A.
B. ,
C.
D.
ugcnetcse-june2013-paper2 compiler-design
Answer key☟
A. user defined address symbols are correlated with their binary equivalent
B. the syntax of the statement is checked and mistakes, if any, are listed
C. object program is generated
D. semantic of the source program is elucidated
ugcnetcse-dec2007-paper2
Answer key☟
Find the lexicographic ordering of the bit strings given below based on the ordering .
a.
b.
c.
d.
e.
A.
B.
C.
D.
ugcnetcse-oct2020-paper2 compiler-design
Answer key☟
Answer key☟
ugcnetcse-june2008-paper2
Answer key☟
The linker :
A. is similar to interpreter
B. uses source code as its input
C. is required to create a load module
D. none of the above
ugcnetcse-june2009-paper2
Answer key☟
Answer key☟
The process of assigning load addresses to the various parts of the program and adjusting the code and
data in the program to reflect the assigned address is called
Answer key☟
Answer key☟
The compiler converts all operands upto the type of the largest operand is called
Answer key☟
Match the description of several parts of a classic optimizing compiler in , with the names of those
parts in :
A.
B.
C.
D.
ugcnetcse-nov2017-paper2 compiler-design
Answer key☟
3.0.25 Which activity is not included in the first pass of two pass assemblers (UGC NET Dec 04) top☝
Q1. Which activity is not included in the first pass of two pass
assemblers?
(A) Build the symbol table
(B) Construct the intermediate code
(C) Separate mnemonic opcode and operand fields
(D) None of the above
Answer key☟
3.1.1 Chomsky Normal Form: UGC NET CSE | December 2012 | Part 3 | Question: 53 top☝
If the parse tree of a word w generated by a Chomsky form grammar has no path of length greater than i,
then the word w is of length
A. no greater than B. no greater than
C. no greater than D. no greater than
chomsky-normal-form ugcnetcse-dec2012-paper3 parsing
Answer key☟
3.2.1 Code Optimization: UGC NET CSE | December 2012 | Part 2 | Question: 11 top☝
A. reducing the range of values of input variables B. code optimization using cheaper machine instructions
C. reducing efficiency of program D. none of the above
code-optimization ugcnetcse-dec2012-paper2 compiler-design
Answer key☟
3.3.1 Compilation Phases: UGC NET CSE | August 2016 | Part 2 | Question: 33 top☝
In compiler optimization, operator strength reduction uses mathematical identities to replace slow math
operations with faster operations. Which of the following code replacements is an illustration of operator
strength reduction ?
A. Replace by or Replace by .
B. Replace by
C. Replace by
D. Replace by
Answer key☟
3.4.1 Compiler Optimization: UGC NET CSE | December 2015 | Part 2 | Question: 41 top☝
Answer key☟
3.4.2 Compiler Optimization: UGC NET CSE | June 2016 | Part 2 | Question: 33 top☝
In ____, the bodies of the two loops are merged together to form a single loop provided that they do not
make any references to each other.
Answer key☟
3.5.1 Constant Folding: UGC NET CSE | June 2019 | Part 2 | Question: 73 top☝
Answer key☟
3.6.1 Control Flow Graph: UGC NET CSE | December 2013 | Part 3 | Question: 4 top☝
Given a flow graph with 10 nodes, 13 edges and one connected components, the number of regions and the
number of predicate (decision) nodes in the flow graph will be
A. 4, 5 B. 5, 4 C. 3, 1 D. 13, 8
ugcnetcse-dec2013-paper3 compiler-design control-flow-graph
Answer key☟
3.7.1 Grammar: UGC NET CSE | December 2009 | Part 2 | Question: 32 top☝
3.7.2 Grammar: UGC NET CSE | December 2009 | Part 2 | Question: 35 top☝
(A) LL grammar
(C) LR grammar
Answer key☟
3.7.3 Grammar: UGC NET CSE | December 2015 | Part 3 | Question: 24 top☝
The language of all non-null strings of a's can be defined by a context free grammar as follow :
Answer key☟
3.7.4 Grammar: UGC NET CSE | June 2010 | Part 2 | Question: 34 top☝
A. Regular B. Context-sensitive
C. Context free D. None of the above
ugcnetcse-june2010-paper2 compiler-design grammar
Answer key☟
3.7.5 Grammar: UGC NET CSE | June 2014 | Part 2 | Question: 06 top☝
A grammar is if and only if the following conditions hold for two distinct productions
I. First First where is some terminal symbol of the grammar.
II. First First
III. First Follow if First
Answer key☟
3.8.1 Infix Prefix: UGC NET CSE | June 2012 | Part 2 | Question: 1 top☝
Answer key☟
3.9.1 Intermediate Code: UGC NET CSE | October 2020 | Part 2 | Question: 30 top☝
Answer key☟
3.10.1 Lexical Analysis: UGC NET CSE | December 2014 | Part 3 | Question: 20 top☝
How many tokens will be generated by the scanner for the following statement ?
;
A. B. C. D.
ugcnetcse-dec2014-paper3 compiler-design lexical-analysis
Answer key☟
3.10.2 Lexical Analysis: UGC NET CSE | January 2017 | Part 2 | Question: 33 top☝
II. Syntax Analysis is specified by regular expressions and implemented by finite-state machine.
A. Only I B. Only II
C. Both I and II D. Neither I nor II
ugcnetjan2017ii compiler-design lexical-analysis
Answer key☟
3.10.3 Lexical Analysis: UGC NET CSE | June 2010 | Part 2 | Question: 35 top☝
Which of the following is used for grouping of characters into tokens (in a computer) ?
Answer key☟
3.11.1 Linker: UGC NET CSE | August 2016 | Part 2 | Question: 34 top☝
Answer key☟
3.12.1 Lr Parser: UGC NET CSE | December 2006 | Part 2 | Question: 34 top☝
A. B. C. D. None of these
ugcnetcse-dec2006-paper2 lr-parser compiler-design
Answer key☟
3.12.2 Lr Parser: UGC NET CSE | December 2014 | Part 2 | Question: 32 top☝
Answer key☟
3.13.1 Machine Instructions: UGC NET CSE | December 2015 | Part 2 | Question: 42 top☝
What will be the hexadecimal value in the register (32-bit) after executing the following instructions?
mov al, 15
mov ah, 15
xor al, al
mov cl, 3
shr ax, cl
3.14.1 Parameter Passing: UGC NET CSE | August 2016 | Part 3 | Question: 21 top☝
Assume that the program is implementing parameter passing with ‘call by reference’. What will be
printed by following print statements in ?
Program P
{
x=10;
y=3;
funb(y,x,x)
print x;
print y;
}
funb (x,y,z)
{
y=y+4;
z=x+y+z;
}
Answer key☟
3.14.2 Parameter Passing: UGC NET CSE | December 2014 | Part 3 | Question: 19 top☝
Answer key☟
3.15.1 Parsing: UGC NET CSE | December 2009 | Part 2 | Question: 33 top☝
A shift-reduce parser carries out the actions specified within braces immediately after reducing with the
corresponding rule of the grammar.
(B) 1 1 2 3 3
(C) 2 3 1 3 1
(D) 2 3 3 2 1
A. has the higher precedence than + B. - has the higher precedence than
C. + and – have same precedence D. + has the higher precedence than
ugcnetcse-dec2012-paper2 compiler-design parsing
Answer key☟
3.15.3 Parsing: UGC NET CSE | December 2012 | Part 2 | Question: 27 top☝
Answer key☟
3.15.4 Parsing: UGC NET CSE | December 2013 | Part 2 | Question: 26 top☝
Given the following statements:
: SLR uses follow information to guide reductions. In case of LR and LALR parsers, the look-aheads are
associated with the items and they make use of the left context available to the parser.
: LR grammar is a large subclass of context free grammar as compared to that SLR and LALR grammars.
Which of the following is true?
Answer key☟
3.15.5 Parsing: UGC NET CSE | December 2015 | Part 2 | Question: 43 top☝
A. Top-down parsers are LL parsers where first L stands for left-to-right scan and second L stands for a leftmost
derivation
B. (000)* is a regular expression that matches only strings containing an odd number of zeroes, including the
empty string
C. Bottom-up parsers are in the LR family, where L stands for left-to-right scan and R stands for rightmost
derivation
D. The class of context-free languages is closed under reversal. That is, if L is any context-free language, then the
language is context-free
Answer key☟
3.15.6 Parsing: UGC NET CSE | December 2018 | Part 2 | Question: 39 top☝
Answer key☟
3.15.7 Parsing: UGC NET CSE | July 2018 | Part 2 | Question: 39 top☝
Answer key☟
3.15.8 Parsing: UGC NET CSE | June 2014 | Part 2 | Question: 07 top☝
Answer key☟
3.15.9 Parsing: UGC NET CSE | June 2014 | Part 2 | Question: 08 top☝
Answer key☟
3.15.10 Parsing: UGC NET CSE | June 2016 | Part 2 | Question: 35 top☝
A. The grammar , where is the only non-terminal symbol and is the null string, is
ambiguous
B. SLR is powerful than LALR
C. An LL(1) parser is a top-down parser
D. YACC tool is an LALR(1) parser generator
Answer key☟
3.15.11 Parsing: UGC NET CSE | Junet 2015 | Part 2 | Question: 34 top☝
Answer key☟
3.16.1 Quadruple Representation: UGC NET CSE | June 2019 | Part 2 | Question: 72 top☝
On translating the expression given below into quadruple representation, how many operations are
required?
A. B. C. D.
ugcnetcse-june2019-paper2 intermediate-code quadruple-representation
Answer key☟
3.17.1 Runtime Environment: UGC NET CSE | January 2017 | Part 2 | Question: 35 top☝
I. A function of a linker is to combine several object modules into a single load module.
II. A function of a linker is to replace absolute references in an object module by symbolic references to locations
in other modules.
A. Only I B. Only II
C. Both I and II D. Neither I nor II
ugcnetjan2017ii runtime-environment compiler-design
Answer key☟
3.18.1 Shift Reduce Parser: UGC NET CSE | December 2014 | Part 2 | Question: 31 top☝
A. Shift step that advances in the input stream by symbols and Reduce step that applies a completed
grammar rule to some recent parse trees, joining them together as one tree with a new root symbol.
B. Shift step that advances in the input stream by one symbol and Reduce step that applies a completed grammar
rule to some recent parse trees, joining them together as one tree with a new root symbol.
C. Shift step that advances in the input stream by symbols and Reduce step that applies a completed
grammar rule to form a single tree.
D. Shift step that does not advance in the input stream and Reduce step that applies a completed grammar rule to
form a single tree.
ugcnetcse-dec2014-paper2 shift-reduce-parser
Answer key☟
3.18.2 Shift Reduce Parser: UGC NET CSE | June 2019 | Part 2 | Question: 74 top☝
a. input buffer b. stack c. parse table Choose the correct option from those given
below:
Answer key☟
3.19.1 Symbol Table: UGC NET CSE | June 2019 | Part 2 | Question: 71 top☝
Which data structure is used by the compiler for managing variables and their attributes?
Answer key☟
3.19.2 Symbol Table: UGC NET CSE | October 2020 | Part 2 | Question: 41 top☝
Answer key☟
3.20.1 System Software& Compilers: UGC NET CSE | June 2010 | Part 2 | Question: 31 top☝
Answer key☟
3.21.1 Translator: UGC NET CSE | Junet 2015 | Part 2 | Question: 32 top☝
Answer key☟
3.22.1 Two Pass Assembler: UGC NET CSE | December 2014 | Part 2 | Question: 33 top☝
Answer key☟
Answer Keys
3.0.1 B 3.0.2 Q-Q 3.0.3 D 3.0.4 Q-Q 3.0.5 Q-Q
3.0.6 Q-Q 3.0.7 Q-Q 3.0.8 Q-Q 3.0.9 C 3.0.10 Q-Q
3.0.11 Q-Q 3.0.12 Q-Q 3.0.13 D 3.0.14 Q-Q 3.0.15 Q-Q
3.0.16 B 3.0.17 Q-Q 3.0.18 Q-Q 3.0.19 Q-Q 3.0.20 Q-Q
3.0.21 D 3.0.22 B 3.0.23 A 3.0.24 A 3.0.25 Q-Q
3.0.26 Q-Q 3.1.1 C 3.2.1 B 3.3.1 Q-Q 3.4.1 A
3.4.2 D 3.5.1 A 3.6.1 B 3.7.1 Q-Q 3.7.2 Q-Q
3.7.3 D 3.7.4 Q-Q 3.7.5 D 3.8.1 A 3.9.1 X
3.10.1 A 3.10.2 D 3.10.3 Q-Q 3.11.1 Q-Q 3.12.1 Q-Q
3.12.2 C 3.13.1 C 3.14.1 Q-Q 3.14.2 C 3.15.1 Q-Q
3.15.2 B 3.15.3 C 3.15.4 D 3.15.5 B 3.15.6 D
3.15.7 Q-Q 3.15.8 D 3.15.9 C 3.15.10 B 3.15.11 B
3.16.1 B 3.17.1 A 3.18.1 B 3.18.2 D 3.19.1 C
3.19.2 D 3.20.1 Q-Q 3.21.1 C 3.22.1 A
4 Computer Networks (295)
Checksum used along with each packet computes the sum of the data, where data is treated as a sequence
of
Answer key☟
Answer key☟
Consider network architecture reference model. Session layer of this model offers dialog
control, token management and ______ as services.
Answer key☟
Answer key☟
Which of the following TCP/IP Internet protocol does diskless machine uses to obtain its IP address from a
server?
Answer key☟
The ____ is a set of standards that defines how a dynamic web document should be written, how input data
should be supplied to the program, and how the output result should be used.
Answer key☟
A. B.
C. D.
ugcnetcse-june2016-paper3 computer-networks
Answer key☟
In the _______method , after the station finds the line idle , it sends or refrains from sending based on
probability
a)None-Persistent
b)One -Persistent
c) P-Persistent
d)Non-Persistent
Answer key☟
If link transmits 4000 frames per scond and each slot has 8 bits , the transmission rate of circuits of this
TDM is _____
Answer key☟
Let e : B^m → B^n is a group code. The minimum distance of ‘e’ is equal to :
A. the maximum weight of a non zero code word B. the minimum weight of a non zero code word
C. m D. n
ugcnetcse-dec2007-paper2
Answer key☟
computer-networks
Answer key☟
A. B. C. D.
computer-networks
Answer key☟
A.
B.
C.
D.
ugcnetcse-nov2017-paper3 computer-networks
Answer key☟
A. B. C. D.
ugcnetcse-june2010-paper2 computer-networks
Answer key☟
Four channels are multiplexed using TDM. If each channel sends 100 bytes/second and we multiplex 1 byte
per channel, then the bit rate for the link is
Answer key☟
4.0.17 UGC NET CSE | June 2016 | Part 3 | Question: 26 top☝
Answer key☟
What is the size (in terms of bits) of Header length field in IPV4 header?
A. 2 B. 4 C. 8 D. 16
ugcnetcse-june2012-paper3 computer-networks
Answer key☟
Making sure that all the data packets of a message are delivered to the destination is _________ control.
Answer key☟
Which of the following is widely used inside the telephone system for long-haul data traffic?
A. ISDN
B. ATM
C. Frame Relay
D. ISTN
ugcnetcse-dec2013-paper2 computer-networks
Answer key☟
A. B.
C. D.
ugcnetcse-june2013-paper2
Answer key☟
Ten signals, each requiring Hz, are multiplexed on to a single channel using FDM. How much
minimum bandwidth is required for the multiplexed channel ? Assume that the guard bands are Hz
wide.
A. B.
C. D. None of the above
ugcnetjune2014iii computer-networks
Answer key☟
4.0.23 UGC NET CSE | December 2007 | Part 2 | Question: 26 top☝
ugcnetcse-dec2007-paper2
Answer key☟
Answer key☟
In the light of the above statements, choose the correct answer from the options given below
ugcnetcse-oct2020-paper2 computer-networks
Answer key☟
Answer key☟
The network is a :
Answer key☟
Error control is needed at the transport layer because of potential error occurring __________.
Answer key☟
Answer key☟
A. and B. and
C. D.
ugcnetcse-dec2004-paper2
Answer key☟
A. B. C. D.
ugcnetcse-dec2007-paper2
Answer key☟
Answer key☟
A network with bandwidth of Mbps can pass only an average of frames per minute with each
frame carrying an average of bits. What is the throughput of this network ?
Answer key☟
ugcnetcse-dec2006-paper2
Answer key☟
4.0.35 UGC NET CSE | December 2006 | Part 2 | Question: 26 top☝
A. B. C. D.
ugcnetcse-dec2006-paper2
Answer key☟
A. Connectionless B. Error-free
C. Segmentation D. Connection-oriented
ugcnetcse-dec2004-paper2
Answer key☟
A. B.
C. D.
ugcnetcse-dec2004-paper2
Answer key☟
A multiplexer combines four 100-Kbps channels using a time slot of 2 bits. What is the bit rate?
Answer key☟
All of the following are examples of real security and privacy risks except
Answer key☟
A network is limited to :
Answer key☟
Identify the correct sequence in which the following packets are transmitted on the network by a host when a
browser requests a webpage from a remote server, assuming that the host has just been restarted.
A. HTTP GET request, DNS query, TCP SYN B. DNS query, HTTP GET request, TCP SYN
C. TCP SYN, DNS query, HTTP GET request D. DNS query, TCP SYN, HTTP GET request
ugcnetcse-dec2018-paper2 computer-networks
Answer key☟
4.0.42 UGC NET CSE | June 2009 | Part 2 | Question: 08 top☝
1. time slots
2. bandpass filters
3. handsets
4. frequency bands
ugcnetcse-june2009-paper2
Answer key☟
A. B.
C. D.
ugcnetcse-june2009-paper2 computer-networks
ugcnetcse-june2008-paper2
Answer key☟
Answer key☟
protocol consists of :
ugcnetcse-june2009-paper2
Answer key☟
With reference to hierarchical routing, the optimum number of levels for an m router subnet is:
(A) m2 (B) m
(C) ln m (D) √m
ugcnetcse-june2008-paper2
4.0.48 UGC NET CSE | June 2009 | Part 2 | Question: 47 top☝
ugcnetcse-june2009-paper2
Answer key☟
Answer key☟
E-commerce includes :
A. B.
C. D. All of the above
ugcnetcse-june2009-paper2
Answer key☟
When compared with analog cellular systems, an advantage of digital cellular system is that :
A. it is less complicated
B. it requires less of computer memory
C. it conserves spectrum bandwidth
D. it costs less
ugcnetcse-june2009-paper2
Which one of the following ISO standard is used for software process ?
A. B.
C. D.
ugcnetcse-june2009-paper2
Answer key☟
ugcnetcse-june2009-paper2
Answer key☟
A. Layering
B. Cryptography
C. Grade of service
D. None of the above
ugcnetcse-june2009-paper2
GSM/CDMA systems :
ugcnetcse-june2009-paper2
Answer key☟
A. B.
C. D.
ugcnetcse-dec2009-paper2 computer-networks
Answer key☟
A host is connected to a department network which is part of a university network. The university network, in
turn, is part of the Internet. The largest network, in which the Ethernet address of the host is unique, is
Answer key☟
A network device is sending out the data at the rate of bps. How long does it take to send a file of
characters?
A. B. C. D.
ugcnetcse-dec2015-paper3 computer-networks
Answer key☟
4.0.59 UGC NET CSE | December 2015 | Part 3 | Question: 68 top☝
Which of the following steps is/are not required for analog to digital conversion?
A. aB.and
cC.and
b a,
D.db None
and eof the above
ugcnetcse-dec2015-paper3 computer-networks
Answer key☟
For a channel of 3 KHz bandwidth and signal to noise ratio of 30 dB, the maximum data rate is:
(A) 3000 bps (B) 6000 bps
(C) 15000 bps (D) 30000 bps
ugcnetcse-june2008-paper2
Answer key☟
4.1.1 Analog & Digital Transmission: UGC NET CSE | Junet 2015 | Part 3 | Question: 15 top☝
The process of dividing an analog signal into a string of discrete outputs, each of constant amplitude, is
called:
Answer key☟
4.2.1 Analog Signals: UGC NET CSE | December 2014 | Part 2 | Question: 26 top☝
A. B. C. D.
ugcnetcse-dec2014-paper2 computer-networks analog-signals
Answer key☟
4.3.1 Application Layer: UGC NET CSE | January 2017 | Part 2 | Question: 27 top☝
The maximum size of the data that the application layer can pass on to the layer below is ________.
Answer key☟
4.4.1 Asymmetric Key Cryptography: UGC NET CSE | December 2014 | Part 3 | Question: 30 top☝
A. Private key is kept by the receiver and public key is announced to the public.
B. Public key is kept by the receiver and private key is announced to the public.
C. Both private key and public key are kept by the receiver.
D. Both private key and public key are announced to the public.
ugcnetcse-dec2014-paper3 computer-networks asymmetric-key-cryptography
Answer key☟
4.5.1 Binary Search Tree: UGC NET CSE | December 2010 | Part 2 | Question: 25 top☝
Which of the following can be the sequence of nodes examined in binary search tree while searching for key
?
A. B.
C. D.
ugcnetcse-dec2010-paper2 computer-networks binary-search-tree
Answer key☟
4.6.1 Binary Symmetric Channel: UGC NET CSE | June 2013 | Part 3 | Question: 53 top☝
Answer key☟
4.7.1 Bit Oriented Protocol: UGC NET CSE | December 2014 | Part 3 | Question: 29 top☝
________ is a bit-oriented protocol for communication over point-to-point and multipoint links.
Answer key☟
4.8.1 Bit Rate: UGC NET CSE | December 2014 | Part 2 | Question: 29 top☝
An analog signal has a bit rate of bps and a baud rate of baud. How many data elements are
carried by each signal element
A. bits/baud B. bits/baud
C. bits/baud D. None of the above
ugcnetcse-dec2014-paper2 computer-networks bit-rate
Answer key☟
4.9.1 Bridges: UGC NET CSE | December 2008 | Part 2 | Question: 36 top☝
A. layers 1 and 2
B. layers 1 through 3
C. all layers
D. none of the above
Answer key☟
4.10 Cache Memory (1) top☝
4.10.1 Cache Memory: UGC NET CSE | December 2008 | Part 2 | Question: 9 top☝
Suppose it takes to access page table and to access associative memory. If the average
access time is , the corresponding hit rate is:
A. percent
B. percent
C. percent
D. percent
Answer key☟
4.11.1 Checksum: UGC NET CSE | August 2016 | Part 3 | Question: 27 top☝
In CRC checksum method, assume that given frame for transmission is 1101011011 and the generator
polynomial is . After implementing encoder, the encoded word sent from sender
side is _____.
A. 11010110111110 B. 11101101011011
C. 110101111100111 D. 110101111001111
ugcnetcse-aug2016-paper3 computer-networks crc-polynomial checksum
Answer key☟
4.12.1 Classful Addressing: UGC NET CSE | December 2012 | Part 3 | Question: 15 top☝
A. A B. B C. C D. D
ugcnetcse-dec2012-paper3 computer-networks ip-addressing classful-addressing
Answer key☟
4.12.2 Classful Addressing: UGC NET CSE | December 2014 | Part 2 | Question: 27 top☝
A. B. C. D.
ugcnetcse-dec2014-paper2 computer-networks classful-addressing
Answer key☟
4.13.1 Classless Addressing: UGC NET CSE | Junet 2015 | Part 2 | Question: 30 top☝
Answer key☟
4.14 Communication (9) top☝
4.14.1 Communication: UGC NET CSE | December 2013 | Part 3 | Question: 43 top☝
What is the bit rate for transmitting uncompressed 800 600 pixel colour frames with 8 bits/pixel at 40
frames/second?
Answer key☟
4.14.2 Communication: UGC NET CSE | December 2013 | Part 3 | Question: 46 top☝
A client-server system uses a satellite network, with the satellite at a height of 40,000 kms. What is the best-
case delay in response to a request? (Note that the speed of light in air is 3,00,000 km/second)
Answer key☟
4.14.3 Communication: UGC NET CSE | December 2013 | Part 3 | Question: 48 top☝
____ is a type of transmission impairment in which the signal looses strength due to the resistance of the
transmission medium
Answer key☟
4.14.4 Communication: UGC NET CSE | June 2012 | Part 2 | Question: 19 top☝
Answer key☟
4.14.5 Communication: UGC NET CSE | June 2012 | Part 2 | Question: 39 top☝
Answer key☟
4.14.6 Communication: UGC NET CSE | June 2012 | Part 2 | Question: 45 top☝
_____ is a satellite based tracking system that enables the determination of person’s position
A. Bluetooth B. WAP
C. Short Message Service D. Global Positioning System
computer-networks communication ugcnetcse-june2012-paper2
Answer key☟
4.14.7 Communication: UGC NET CSE | June 2012 | Part 3 | Question: 64 top☝
Match the following with link quality measurement and handoff initiation :
A. B.
C. D.
computer-networks communication ugcnetcse-june2012-paper3
Answer key☟
4.14.8 Communication: UGC NET CSE | June 2014 | Part 2 | Question: 01 top☝
Infrared signals can be used for short range communication in a closed area using _______ propagation.
Answer key☟
4.14.9 Communication: UGC NET CSE | June 2014 | Part 3 | Question: 06 top☝
In a digital transmission, the receiver clock is percent faster than the sender clock. How many extra bits
per second does the receiver receive if the data rate is Mbps ?
Answer key☟
4.15.1 Computer Neworks: UGC NET CSE | October 2020 | Part 2 | Question: 60 top☝
Firewall is a device that filters access to the protected network from the outside network. Firewalls can filter
the packets on the basis of
Answer key☟
4.16.1 Crc Polynomial: UGC NET CSE | December 2013 | Part 3 | Question: 33 top☝
The message 11001001 is to be transmitted using the CRC polynomial to protect it from errors. The
message that should be transmitted is
Answer key☟
4.16.2 Crc Polynomial: UGC NET CSE | January 2017 | Part 3 | Question: 27 top☝
Let be generator polynomial used for CRC checking. The condition that should be satisfied by to
correct odd numbered error bits, will be:
A. is factor of B. is factor of
C. is factor of D. is factor of
ugcnetcse-jan2017-paper3 computer-networks crc-polynomial
Answer key☟
4.17.1 Cryptography: UGC NET CSE | August 2016 | Part 3 | Question: 30 top☝
The plain text message encrypted with algorithm using and and the
characters of the message are encoded using the values to for letters A to Z. Suppose character by
character encryption was implemented. Then, the Cipher Text message is _____.
Answer key☟
4.17.2 Cryptography: UGC NET CSE | December 2013 | Part 3 | Question: 32 top☝
A. In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption.
B. The symmetric cipher DES (Data Encryption Standard) was widely used in the industry for security product.
C. The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.
D. Public key algorithms use two different keys for Encryption and Decryption
Answer key☟
4.17.3 Cryptography: UGC NET CSE | December 2014 | Part 2 | Question: 30 top☝
How many distinct stages are there in algorithm, which is parameterized by a -bit key ?
A. B. C. D.
ugcnetcse-dec2014-paper2 computer-networks cryptography
Answer key☟
4.17.4 Cryptography: UGC NET CSE | July 2018 | Part 2 | Question: 45 top☝
Match the following symmetric block ciphers with corresponding block and key sizes:
A. B.
C. D.
ugcnetcse-july2018-paper2 cryptography computer-networks
Answer key☟
4.17.5 Cryptography: UGC NET CSE | June 2014 | Part 3 | Question: 56 top☝
A. B.
C. D.
ugcnetjune2014iii computer-networks network-security cryptography
Answer key☟
4.17.6 Cryptography: UGC NET CSE | October 2020 | Part 2 | Question: 32 top☝
Using ‘RSA’ public key cryptosystem, if , and , find the value of and encrypt the
number
A. B. C. D.
ugcnetcse-oct2020-paper2 computer-networks network-security cryptography
Answer key☟
4.17.7 Cryptography: UGC NET CSE | October 2020 | Part 2 | Question: 54 top☝
Answer key☟
4.18.1 Data Communication: UGC NET CSE | December 2009 | Part 2 | Question: 26 top☝
Device on one network can communicate with devices on another network via a
(A) Hub/Switch
(D) Gateway
Answer key☟
4.18.2 Data Communication: UGC NET CSE | December 2011 | Part 2 | Question: 35 top☝
A. B. C. D.
ugcnetcse-dec2011-paper2 computer-networks data-communication
Answer key☟
4.18.3 Data Communication: UGC NET CSE | December 2011 | Part 2 | Question: 37 top☝
A. Transfer an ongoing call from one base station to anotherB. Initiating a new call
C. Dropping an ongoing call D. None of above
ugcnetcse-dec2011-paper2 computer-networks data-communication
Answer key☟
4.18.4 Data Communication: UGC NET CSE | December 2011 | Part 2 | Question: 48 top☝
Answer key☟
4.18.5 Data Communication: UGC NET CSE | June 2010 | Part 2 | Question: 47 top☝
A leased special high-speed connection from the local telephone carrier for business users that transmits at
mbps is known as ________ carrier.
A. B. C. D.
ugcnetcse-june2010-paper2 computer-networks data-communication
Answer key☟
4.18.6 Data Communication: UGC NET CSE | June 2010 | Part 2 | Question: 48 top☝
A. B. C. D.
ugcnetcse-june2010-paper2 computer-networks data-communication
4.18.7 Data Communication: UGC NET CSE | Junet 2015 | Part 3 | Question: 29 top☝
Suppose a digitazed voice channel is made by digitizing 8 kHz bandwidth analog voice signal. It is required
to sample the signal at twice the highest frequency (two samples per hertz). What is the bit rate required, if it
is assumed that each sample required 8 bits?
Answer key☟
4.19.1 Data Link Layer: UGC NET CSE | December 2008 | Part 2 | Question: 16 top☝
A. B.
C. D.
ugcnetcse-dec2008-paper2 computer-networks data-link-layer
Answer key☟
4.19.2 Data Link Layer: UGC NET CSE | December 2009 | Part 2 | Question: 28 top☝
2. HSSI
3. Frame Relay
4. 10 – Base T
5. Token Ring
(A) 1, 2, 3
(B) 1, 3, 5
(C) 1, 3, 4, 5
(D) 1, 2, 3, 4, 5
Answer key☟
4.19.3 Data Link Layer: UGC NET CSE | June 2016 | Part 3 | Question: 29 top☝
Assume that we need to download text documents at the rate of 100 pages per minute. A page is in average
of 24 lines with 80 characters in each line requires 8 bits. Then the required bit rate of the channel is
Answer key☟
4.19.4 Data Link Layer: UGC NET CSE | November 2017 | Part 3 | Question: 25 top☝
Suppose we want to download text documents at the rate of pages per second. Assume that a page
consists of an average of lines with characters in each line. What is the required bit rate of the
channel?
Answer key☟
4.19.5 Data Link Layer: UGC NET CSE | November 2017 | Part 3 | Question: 27 top☝
If a file consisting of characters takes seconds to send, then the data rate is _________
Answer key☟
4.19.6 Data Link Layer: UGC NET CSE | September 2013 | Part 2 | Question: 2 top☝
In ______ CSMA protocol, after the station finds the line idle, it sends or refrains from sending based on the
outcome of a random number generated.
Answer key☟
4.19.7 Data Link Layer: UGC NET CSE | September 2013 | Part 3 | Question: 7 top☝
Suppose a file of 10,000 characters is to be sent over a line at 2400 bps. Assume that the data is sent in
frames. Each frame consists of 1000 characters and an overhead of 48 bits per frame. Using synchronous
transmission, the total overhead time is
Answer key☟
4.20.1 Data Mining Algorithm: UGC NET CSE | December 2008 | Part 2 | Question: 49 top☝
An example of a data mining algorithm which uses squared error score function is :
A. CART algorithm
B. back propagation algorithm
C. a priori algorithm
D. vector space algorithm
4.21.1 Data Transmission: UGC NET CSE | December 2014 | Part 3 | Question: 26 top☝
How many characters per second ( bits + parity) can be transmitted over a bps line if the transfer is
asynchronous ? (Assuming start bit and stop bit)
A. B. C. D.
ugcnetcse-dec2014-paper3 computer-networks data-transmission asynchronous-transmission
Answer key☟
4.22.1 Distance Vector Routing: UGC NET CSE | January 2017 | Part 2 | Question: 29 top☝
Distance vector routing algorithm is a dynamic routing algorithm. The routing tables in distance vector
routing algorithm are updated __________.
A. automatically B. by server
C. by exchanging information with neighbour nodes D. with back up database
ugcnetjan2017ii computer-networks distance-vector-routing
Answer key☟
4.23.1 Edi Layer: UGC NET CSE | December 2008 | Part 2 | Question: 48 top☝
E-commerce involves :
4.24.1 Electronic Payment Systems: UGC NET CSE | December 2015 | Part 2 | Question: 50 top☝
____ uses electronic means to transfer funds directly from one account to another rather than by cheque or
cash
4.25.1 Encoding: UGC NET CSE | December 2012 | Part 3 | Question: 68 top☝
Answer key☟
4.25.2 Encoding: UGC NET CSE | June 2013 | Part 3 | Question: 55 top☝
Given code word is to be transmitted with even parity check bit. The encoded word to be
transmitted for this code is
A. B. C. D.
computer-networks ugcnetcse-june2013-paper3 encoding
Answer key☟
4.26.1 Encryption Decryption: UGC NET CSE | July 2018 | Part 2 | Question: 50 top☝
Answer key☟
4.26.2 Encryption Decryption: UGC NET CSE | June 2019 | Part 2 | Question: 86 top☝
In the TCP/IP model, encryption and decryption are functions of ____ layer.
Answer key☟
4.27.1 Entropy: UGC NET CSE | December 2011 | Part 2 | Question: 9 top☝
Answer key☟
4.28.1 Error Correction: UGC NET CSE | December 2009 | Part 2 | Question: 03 top☝
If in an error detection and correction code a message M : “You are good students” is stored as M' : Youare
areyou aregood goodare goodstudents studentsgood. What is the space required to store M' in general ?
(assume that ‘n’ is the length of M)
A. 2n B. 3n C. 4n D. less than 4n
ugcnetcse-dec2009-paper2 computer-networks error-correction
Answer key☟
4.28.2 Error Correction: UGC NET CSE | December 2011 | Part 2 | Question: 12 top☝
Answer key☟
4.28.3 Error Correction: UGC NET CSE | July 2018 | Part 2 | Question: 49 top☝
To guarantee correction of upto errors, the minimum Hamming distance in a block code must be
______
A. B. C. D.
ugcnetcse-july2018-paper2 computer-networks error-correction error-detection
Answer key☟
4.28.4 Error Correction: UGC NET CSE | June 2009 | Part 2 | Question: 02 top☝
In order that a code is error correcting, the minimum Hamming distance should be :
1.
2.
3.
4.
ugcnetcse-june2009-paper2 error-correction
Answer key☟
4.28.5 Error Correction: UGC NET CSE | September 2013 | Part 3 | Question: 56 top☝
If the data unit is 111111 and the divisor is 1010. In CRC method, what is the dividend at the transmission
before division?
Answer key☟
4.29.1 Error Detection Correction: UGC NET CSE | June 2014 | Part 3 | Question: 57 top☝
A. B. C. D.
ugcnetjune2014iii computer-networks error-detection-correction hamming-distance
Answer key☟
The baud rate of a signal is 600 baud/second. If each signal unit carries 6 bits, then the bit rate of a signal is
____
Answer key☟
4.30.2 Ethernet: UGC NET CSE | June 2013 | Part 3 | Question: 22 top☝
Answer key☟
4.30.3 Ethernet: UGC NET CSE | June 2014 | Part 2 | Question: 03 top☝
The minimum frame length for Mbps Ethernet is ________ bytes and maximum is _______ bytes.
A. & B. &
C. & D. &
ugcnetcse-june2014-paper2 computer-networks ethernet
Answer key☟
4.30.4 Ethernet: UGC NET CSE | September 2013 | Part 2 | Question: 1 top☝
A file is downloaded in a home computer using 56 kbps MODEM connected to an Internet Service Provider.
If the download of the file completes in 2 minutes, what is the maximum size of the data downloaded?
Answer key☟
4.30.5 Ethernet: UGC NET CSE | September 2013 | Part 2 | Question: 4 top☝
What is the maximum length of CAT-5 UTP cable in Fast Ethernet network?
Answer key☟
4.31.1 Firewall: UGC NET CSE | September 2013 | Part 3 | Question: 58 top☝
A _____ can forward or block packets based on the information in the network layer and transport layer
header
Answer key☟
4.32.1 Hamming Code: UGC NET CSE | December 2010 | Part 2 | Question: 10 top☝
Answer key☟
4.32.2 Hamming Code: UGC NET CSE | January 2017 | Part 3 | Question: 64 top☝
Let C be a binary linear code with minimum distance then it can correct upto ___ bits of error
A. B. C. D.
ugcnetcse-jan2017-paper3 computer-networks hamming-code
Answer key☟
4.32.3 Hamming Code: UGC NET CSE | Junet 2015 | Part 3 | Question: 66 top☝
In a binary Hamming Code the number of check digits is r then number of message digits is equal to
A. B. C. D.
ugcnetcse-june2015-paper3 computer-networks hamming-code
Answer key☟
4.32.4 Hamming Code: UGC NET CSE | October 2020 | Part 2 | Question: 31 top☝
A. B. C. D.
ugcnetcse-oct2020-paper2 computer-networks hamming-code
Answer key☟
4.33.1 Hamming Distance: UGC NET CSE | June 2013 | Part 3 | Question: 54 top☝
A. 3 B. 4 C. 5 D. 6
ugcnetcse-june2013-paper3 computer-networks hamming-distance
Answer key☟
4.34.1 Huffman Code: UGC NET CSE | June 2013 | Part 3 | Question: 14 top☝
A data file of characters contains only the characters with the frequencies as indicated in
table:
using the variable-length code by Huffman codes, the file can be encoded with
A. bits B. bits
C. bits D. bits
ugcnetcse-june2013-paper3 computer-networks huffman-code data-link-layer
Answer key☟
For the 8 bit word 00111001,the check bits stored with it would we 0111. Suppose when the word is read
from memory, the check bits are calculated to be 1101. What is the data word that was read from memory?
Answer key☟
4.36.1 Internet Security: UGC NET CSE | July 2018 | Part 2 | Question: 47 top☝
A. Proves that she knows the secret without revealing it B. Proves that she does not know the secret
C. Reveals the secret D. Gives a challenge
ugcnetcse-july2018-paper2 computer-networks internet-security
Answer key☟
4.37.1 Internet Stack Layers: UGC NET CSE | June 2019 | Part 2 | Question: 87 top☝
Which of the following statements is/are true with regard to various layers in the Internet stack?
P: At the link layer, a packet of transmitted information is called a frame.
Q: At the network layer, a packet of transmitted information is called a segment.
Answer key☟
4.38.1 Ip Addressing: UGC NET CSE | December 2008 | Part 2 | Question: 20 top☝
A. 125.123.123.2 B. 191.023.21.54
C. 192.128.32.56 D. 10.14.12.34
ugcnetcse-dec2008-paper2 computer-networks ip-addressing
Answer key☟
4.38.2 Ip Addressing: UGC NET CSE | December 2013 | Part 3 | Question: 44 top☝
Answer key☟
4.38.3 Ip Addressing: UGC NET CSE | July 2018 | Part 2 | Question: 43 top☝
The dotted-decimal notation of the following IPV4 address in binary notation is ____
10000001 00001011 00001011 11101111
A. 111.56.45.239 B. 129.11.10.238
C. 129.11.11.239 D. 111.56.11.239
ugcnetcse-july2018-paper2 computer-networks ip-addressing
Answer key☟
4.38.4 Ip Addressing: UGC NET CSE | June 2012 | Part 3 | Question: 29 top☝
Answer key☟
4.38.5 Ip Addressing: UGC NET CSE | June 2014 | Part 3 | Question: 71 top☝
A network on the Internet has a subnet mask of . What is the maximum number of hosts it
can handle ?
A. B. C. D.
ugcnetjune2014iii computer-networks ip-addressing
Answer key☟
4.38.6 Ip Addressing: UGC NET CSE | June 2019 | Part 2 | Question: 88 top☝
What percentage of the IPv4, IP address space do all class C addresses consume?
A. B. C. D.
ugcnetcse-june2019-paper2 ip-addressing
Answer key☟
4.38.7 Ip Addressing: UGC NET CSE | Junet 2015 | Part 2 | Question: 29 top☝
Answer key☟
4.38.8 Ip Addressing: UGC NET CSE | November 2017 | Part 3 | Question: 29 top☝
The address of a class host is to be split into subnets with a – bit subnet number. What is the maximum
number of subnets and maximum number of hosts in each subnet?
Answer key☟
4.38.9 Ip Addressing: UGC NET CSE | September 2013 | Part 3 | Question: 12 top☝
Given the IP address 201.14.78.65 and the subset mask 255.255.255.224. What is the subset address?
Answer key☟
4.38.10 Ip Addressing: UGC NET CSE | September 2013 | Part 3 | Question: 8 top☝
Which of the following is the size of Network bits and Host bits of Class A of IP address?
Answer key☟
4.39 Ip Packet (2) top☝
4.39.1 Ip Packet: UGC NET CSE | December 2012 | Part 2 | Question: 9 top☝
If a packet arrive with M-bit value is ‘1’ and a fragmentation offset value ‘0’, then it is ____ fragement.
Answer key☟
4.39.2 Ip Packet: UGC NET CSE | June 2014 | Part 3 | Question: 69 top☝
Answer key☟
4.40.1 Ipv6: UGC NET CSE | November 2017 | Part 3 | Question: 30 top☝
A. (a) and (b) Only B. (b) and (c) Only C. (a) and (c) Only D. (a), (b) and (c)
ugcnetcse-nov2017-paper3 computer-networks ip-addressing ipv6
Answer key☟
4.41.1 Lan Technologies: UGC NET CSE | December 2010 | Part 2 | Question: 27 top☝
Answer key☟
4.41.2 Lan Technologies: UGC NET CSE | January 2017 | Part 3 | Question: 25 top☝
Suppose there are N stations in a slotted LAN. Each station attempts to transmit with a probability P in each
time slot. The probability that only one station transmits in a given slot is____
A. B. C. D.
ugcnetcse-jan2017-paper3 computer-networks lan-technologies
Answer key☟
4.42.1 Link State Routing: UGC NET CSE | January 2017 | Part 2 | Question: 30 top☝
In link state routing algorithm after construction of link state packets, new routes are computed using :
Answer key☟
4.43.1 Loopback Address: UGC NET CSE | June 2019 | Part 2 | Question: 85 top☝
Consider the following two statements with respect to IPv4 in computer networking:
P: The loopback (IP) address is a member of class B network.
Q: The loopback (IP) address is used to send a packet from host to itself.
What can you say about the statements P and Q?
Answer key☟
4.44.1 Mesh Topology: UGC NET CSE | December 2014 | Part 3 | Question: 25 top☝
For devices in a network, ________ number of duplex-mode links are required for a mesh topology.
A. B.
C. D.
ugcnetcse-dec2014-paper3 computer-networks network-topologies mesh-topology
Answer key☟
4.44.2 Mesh Topology: UGC NET CSE | June 2016 | Part 2 | Question: 27 top☝
In a fully connected mesh network with 10 computers, total ___ number of cables are required and ____
number od ports are required for each device
Answer key☟
4.44.3 Mesh Topology: UGC NET CSE | June 2019 | Part 2 | Question: 81 top☝
A fully connected network topology is a topology in which there is a direct link between all pairs of nodes.
Given a fully connected network with nodes, the number of direct links as a function of can be
expressed as
A. B. C. D.
ugcnetcse-june2019-paper2 mesh-topology
Answer key☟
4.45.1 Mobile Communication: UGC NET CSE | December 2012 | Part 2 | Question: 3 top☝
The GSM network is divided into the following three major systems:
Answer key☟
4.45.2 Mobile Communication: UGC NET CSE | December 2012 | Part 3 | Question: 26 top☝
Answer key☟
4.45.3 Mobile Communication: UGC NET CSE | December 2012 | Part 3 | Question: 30 top☝
Answer key☟
4.45.4 Mobile Communication: UGC NET CSE | December 2014 | Part 2 | Question: 46 top☝
Answer key☟
4.45.5 Mobile Communication: UGC NET CSE | December 2015 | Part 2 | Question: 24 top☝
In a typical mobile phone system with hexagonal cells, it is forbidden to reuse a frequency band in adjacent
cells. If 840 frequencies are available, how many can be used in a given cell?
Answer key☟
4.45.6 Mobile Communication: UGC NET CSE | June 2012 | Part 3 | Question: 60 top☝
Answer key☟
4.45.7 Mobile Communication: UGC NET CSE | June 2014 | Part 2 | Question: 26 top☝
A. B.
C. D.
ugcnetcse-june2014-paper2 computer-networks mobile-communication
Answer key☟
4.46.1 Modulation: UGC NET CSE | November 2017 | Part 3 | Question: 26 top☝
A. Frequency and phase of the carrier B. Frequency and Amplitude of the carrier
C. Amplitude and phase of the carrier D. Amplitude and Wavelength of the carrier
ugcnetcse-nov2017-paper3 computer-networks modulation physical-layer
Answer key☟
4.46.2 Modulation: UGC NET CSE | September 2013 | Part 3 | Question: 10 top☝
Which of the following is an bit rate of an 8-PSK signal having 2500 Hz bandwidth?
Answer key☟
4.47.1 Multimedia Protocol: UGC NET CSE | December 2015 | Part 3 | Question: 14 top☝
In electronic mail, which of the following protocols allows the transfer of multimedia messages?
Answer key☟
4.48.1 Multiple Access Protocol: UGC NET CSE | August 2016 | Part 3 | Question: 28 top☝
A slotted ALOHA network transmits bits frames using a shared channel with kbps bandwidth. If the
system (all stations put together) produces frames per second, then the throughput of the system is
_______.
A. B. C. D.
ugcnetcse-aug2016-paper3 computer-networks multiple-access-protocol transmission-media
Answer key☟
4.49 Multiplexing (2) top☝
4.49.1 Multiplexing: UGC NET CSE | December 2008 | Part 2 | Question: 35 top☝
A high performance switching and multiplexing technology that utilizes fixed length packets to carry different
types of traffic is:
Answer key☟
4.49.2 Multiplexing: UGC NET CSE | December 2010 | Part 2 | Question: 30 top☝
A. Exhibited by all demodulator, when the input signal to noise ratio is low.
B. The rapid fall on output signal to noise ratio when the input signal to noise ratio fall below a particular value.
C. The property exhibited by all A.M. suppressed carrier coherent demodulator.
D. The property exhibited by correlation receiver.
Answer key☟
4.50.1 Network Addressing: UGC NET CSE | December 2015 | Part 3 | Question: 10 top☝
Answer key☟
4.50.2 Network Addressing: UGC NET CSE | December 2015 | Part 3 | Question: 13 top☝
Answer key☟
4.51.1 Network Layer: UGC NET CSE | December 2015 | Part 2 | Question: 40 top☝
Answer key☟
4.52.1 Network Layering: UGC NET CSE | December 2012 | Part 2 | Question: 17 top☝
4.52.2 Network Layering: UGC NET CSE | December 2013 | Part 3 | Question: 45 top☝
Which layer of OSI reference model is responsible for decomposition of messages and generation of
sequence numbers to ensure correct re-composition from end to end of the network?
Answer key☟
4.52.3 Network Layering: UGC NET CSE | June 2012 | Part 2 | Question: 15 top☝
Decryption and encryption of data are responsibility of which of the following layer?
Answer key☟
4.52.4 Network Layering: UGC NET CSE | June 2012 | Part 2 | Question: 6 top☝
Both hosts and routers and TCP/IP protocol software. However, routers do not use protocol from all layers.
The layer for which the protocol software is not needed by a router is
Answer key☟
4.52.5 Network Layering: UGC NET CSE | June 2014 | Part 2 | Question: 05 top☝
A. B.
C. D.
ugcnetcse-june2014-paper2 computer-networks network-layering
Answer key☟
4.53.1 Network Protocols: UGC NET CSE | August 2016 | Part 2 | Question: 30 top☝
Which of the following protocols is used by email server to maintain a central repository that can be
accessed from any machine ?
A. B. C. D.
ugcnetcse-aug2016-paper2 computer-networks network-protocols
Answer key☟
4.53.2 Network Protocols: UGC NET CSE | August 2016 | Part 3 | Question: 26 top☝
A. and are true; and are false. B. and are false; and are true.
C. and are true. D. and are false.
ugcnetcse-aug2016-paper3 computer-networks ethernet network-protocols
Answer key☟
4.53.3 Network Protocols: UGC NET CSE | December 2010 | Part 2 | Question: 29 top☝
Which of the following file transfer protocols use and establishes two virtual circuits between the local
and remote server ?
A. B. C. D.
ugcnetcse-dec2010-paper2 computer-networks network-protocols
Answer key☟
4.53.4 Network Protocols: UGC NET CSE | December 2012 | Part 2 | Question: 8 top☝
The Mobile Application Protocol (MAP) typically runs on top of which protocol?
A. SNMP (Simple Network Management Protocol) B. SMTP (Simple Mail Transfer Protocol)
C. SS7 (Signalling System 7) D. HTTP (Hyper Text Transfer Protocol)
ugcnetcse-dec2012-paper2 computer-networks network-protocols
Answer key☟
4.53.5 Network Protocols: UGC NET CSE | June 2010 | Part 2 | Question: 26 top☝
The ______ field is the SNMP PDV reports an error in a response message.
Answer key☟
4.53.6 Network Protocols: UGC NET CSE | October 2020 | Part 2 | Question: 33 top☝
Protocols in which the sender sends one frame and then waits for an acknowledgment before proceeding for
next frame are called as ______
Answer key☟
4.53.7 Network Protocols: UGC NET CSE | October 2020 | Part 2 | Question: 59 top☝
Post office protocol (POP) is a message access protocol which is used to extract message for client. In this
regards, which of the following are true?
a. POP has two modes, Delete mode and keep b. In Delete mode, mail is deleted from mail box after each
retrival
c. In Delete mode, mail is deleted from mail box before each
d. In keep mode, mail is deleted before retrival
retriveal Choose the correct answer from the options given
below:
e. In keep mode, mail remains in mail box after retrival
Answer key☟
4.53.8 Network Protocols: UGC NET CSE | October 2020 | Part 2 | Question: 72 top☝
Match with
A. B.
C. D.
ugcnetcse-oct2020-paper2 computer-networks network-protocols
Answer key☟
4.53.9 Network Protocols: UGC NET CSE | September 2013 | Part 2 | Question: 42 top☝
Answer key☟
4.53.10 Network Protocols: UGC NET CSE | September 2013 | Part 3 | Question: 11 top☝
Codes:
A. B.
C. D.
ugcnetcse-sep2013-paper3 computer-networks network-protocols
Answer key☟
4.54.1 Network Security: UGC NET CSE | August 2016 | Part 2 | Question: 46 top☝
An attacker sits between the sender and receiver and captures the information and retransmits to the
receiver after some time without altering the information. This attack is called as _____.
Answer key☟
4.54.2 Network Security: UGC NET CSE | December 2010 | Part 2 | Question: 20 top☝
Which of the following is the process by which a user’s access to physical data in the application is limited,
based on his privileges?
A. Authorization B. Authentication
C. Access Control D. All of these
ugcnetcse-dec2010-paper2 computer-networks network-security
Answer key☟
4.54.3 Network Security: UGC NET CSE | December 2012 | Part 2 | Question: 37 top☝
AES is a round cipher based on the Rijndal Algorithm that uses a 128 – bit block of data. AES has three
different configurations. ______ rounds with a key size of 128-bits, ______ rounds with a key size of 192 bits
and ______ rounds with a key size of 256 –bits
Answer key☟
4.54.4 Network Security: UGC NET CSE | December 2012 | Part 3 | Question: 72 top☝
Answer key☟
4.54.5 Network Security: UGC NET CSE | December 2012 | Part 3 | Question: 8 top☝
Using RSA algorithm, what is the value of cipher text C, if the plain text M=5 and p=3, q=11 and d=7?
A. 33 B. 5 C. 25 D. 26
ugcnetcse-dec2012-paper3 computer-networks network-security
Answer key☟
4.54.6 Network Security: UGC NET CSE | December 2015 | Part 2 | Question: 25 top☝
Using p=3, q=13, d=7 and e=3 in the RSA algorithm, what is the value of ciphertext for a plain text 5?
A. 13 B. 21 C. 26 D. 33
ugcnetcse-dec2015-paper2 computer-networks network-security
Answer key☟
4.54.7 Network Security: UGC NET CSE | December 2018 | Part 2 | Question: 66 top☝
4.54.8 Network Security: UGC NET CSE | December 2018 | Part 2 | Question: 90 top☝
Suppose that everyone in a group of people wants to communicate secretly with other people
using symmetric key cryptographic system. The communication between any two persons should not be
decodable by the others in the group. The number of keys required in the system as a whole to satisfy the
confidentiality requirement is
A. B. C. D.
Answer key☟
4.54.9 Network Security: UGC NET CSE | June 2009 | Part 2 | Question: 48 top☝
After sending a message, the sender should not be able to, at a later date, deny having sent the message, is
referred to as :
A. Authenticity
B. Non-Repudiability
C. Auditability
D. Repudiability
ugcnetcse-june2009-paper2 network-security
Answer key☟
4.54.10 Network Security: UGC NET CSE | June 2010 | Part 2 | Question: 5 top☝
For your ATM debit card, you have a -decimal-digit personal secret code. In the absence of any clue, a
brute-force attack takes time- to crack the code on an ATM terminal. Therefore is the secure-time for a
customer to report in case the card is misplaced. Your Bank has decided to facilitate an increased secure-time. Out
of the following, which option should provide the largest rise in the value of ?
Answer key☟
4.54.11 Network Security: UGC NET CSE | June 2014 | Part 2 | Question: 30 top☝
SET, an open encryption and security specification model that is designed for protecting credit card
transactions on the internet, stands for
Answer key☟
4.54.12 Network Security: UGC NET CSE | June 2016 | Part 2 | Question: 29 top☝
If there are people in the world and are using secret key encryption and decryption for privacy purpose,
then the number of secret keys required will be
A. B. C. D.
ugcnetcse-june2016-paper2 computer-networks network-security
Answer key☟
4.54.13 Network Security: UGC NET CSE | June 2016 | Part 2 | Question: 46 top☝
An attacker sits between customer and banker and captures the information from the customer and
retransmits to the banker by altering the information . This attack is called as
Answer key☟
4.54.14 Network Security: UGC NET CSE | June 2016 | Part 3 | Question: 30 top☝
Encrypt the plain text message using Transposition cipher technique with the following
key :
A. B. C. D.
ugcnetcse-june2016-paper3 computer-networks network-security
Answer key☟
4.54.15 Network Security: UGC NET CSE | June 2019 | Part 2 | Question: 89 top☝
The ability to inject packets into the Internet with a false source address is known as
Answer key☟
4.54.16 Network Security: UGC NET CSE | Junet 2015 | Part 3 | Question: 27 top☝
Answer key☟
4.54.17 Network Security: UGC NET CSE | Junet 2015 | Part 3 | Question: 28 top☝
A message "COMPUTERNETWORK" encrypted (ignore quotes) using columnar transposition cipher with a
key "LAYER". The encrypted message is
A. CTTOEWMROPNRUEK B. MROUEKCTTPNROEW
C. OEWPNRCTTUEKMRO D. UEKPNRMROOEQCTT
ugcnetcse-june2015-paper3 computer-networks network-security
Answer key☟
4.54.18 Network Security: UGC NET CSE | October 2020 | Part 2 | Question: 89 top☝
Answer key☟
4.55.1 Network Switching: UGC NET CSE | August 2016 | Part 3 | Question: 25 top☝
Suppose transmission rate of a channel is kbps. If there are routes from source to destination and
each packet contains bits. Total end to end delay in sending packet is _____.
Answer key☟
4.55.2 Network Switching: UGC NET CSE | December 2011 | Part 2 | Question: 10 top☝
Which of the following network access standard disassembler is used for connection station to a packet
switched network ?
A. B. C. D.
ugcnetcse-dec2011-paper2 computer-networks network-switching
Answer key☟
4.55.3 Network Switching: UGC NET CSE | January 2017 | Part 3 | Question: 28 top☝
In a packet switching network, if the message size is 48 bytes and each packet contains a header of 3 bytes.
If 24 packets are required to transmit the message, the packet size is
Answer key☟
4.55.4 Network Switching: UGC NET CSE | July 2018 | Part 2 | Question: 46 top☝
i. Circuit
ii. Packet
iii. Switched
Message
Switched
Networks
Switched
Networks
Networks
Answer key☟
4.55.5 Network Switching: UGC NET CSE | June 2012 | Part 2 | Question: 16 top☝
In which circuit switching, delivery of data is delayed because data must be stored and retrieved from RAM?
Answer key☟
4.56.1 Network Topologies: UGC NET CSE | December 2009 | Part 2 | Question: 29 top☝
(B) Polling
(C) Segmentation
4.56.2 Network Topologies: UGC NET CSE | December 2009 | Part 2 | Question: 46 top☝
Answer key☟
4.56.3 Network Topologies: UGC NET CSE | December 2011 | Part 2 | Question: 8 top☝
Answer key☟
4.56.4 Network Topologies: UGC NET CSE | June 2013 | Part 3 | Question: 16 top☝
In a fully connected mesh network with n devices, there are _____ physical channels to link all devices.
Answer key☟
4.57.1 Osi Model: UGC NET CSE | August 2016 | Part 2 | Question: 29 top☝
A. B.
C. D.
ugcnetcse-aug2016-paper2 computer-networks osi-model
Answer key☟
4.57.2 Osi Model: UGC NET CSE | December 2008 | Part 2 | Question: 17 top☝
A. Network layer
B. Physical layer
C. Presentation layer
D. Application layer
Answer key☟
4.57.3 Osi Model: UGC NET CSE | December 2008 | Part 2 | Question: 18 top☝
A. Both (A) and (R) are true and (R) is the correct explanation for (A)
B. Both (A) and (R) are true but (R) is not the correct explanation
C. (A) is true but (R) is false
D. (A) is false but (R) is true
Answer key☟
4.57.4 Osi Model: UGC NET CSE | December 2008 | Part 2 | Question: 6 top☝
A. Physical layer
B. Presentation layer
C. Network layer
D. Application layer
Answer key☟
4.57.5 Osi Model: UGC NET CSE | December 2012 | Part 2 | Question: 43 top☝
Answer key☟
4.57.6 Osi Model: UGC NET CSE | December 2013 | Part 2 | Question: 1 top☝
When data and acknowledgement are sent in same frame, this is called as
Answer key☟
4.57.7 Osi Model: UGC NET CSE | December 2013 | Part 2 | Question: 2 top☝
4.57.8 Osi Model: UGC NET CSE | June 2010 | Part 2 | Question: 28 top☝
Answer key☟
4.57.9 Osi Model: UGC NET CSE | June 2010 | Part 2 | Question: 29 top☝
A. B. C. D.
ugcnetcse-june2010-paper2 computer-networks osi-model
Answer key☟
4.57.10 Osi Model: UGC NET CSE | June 2013 | Part 3 | Question: 18 top☝
A. B.
C. D.
ugcnetcse-june2013-paper3 computer-networks osi-model
Answer key☟
4.57.11 Osi Model: UGC NET CSE | June 2014 | Part 3 | Question: 70 top☝
Answer key☟
4.58.1 Osi Protocol: UGC NET CSE | December 2012 | Part 3 | Question: 10 top☝
Answer key☟
4.58.2 Osi Protocol: UGC NET CSE | January 2017 | Part 2 | Question: 26 top☝
Match the following Layers and Protocols for a user browsing with
A. B.
C. D.
ugcnetjan2017ii computer-networks osi-protocol
Answer key☟
4.58.3 Osi Protocol: UGC NET CSE | June 2012 | Part 3 | Question: 11 top☝
Answer key☟
4.58.4 Osi Protocol: UGC NET CSE | June 2012 | Part 3 | Question: 41 top☝
Which layer of OSI reference model uses the ICMP (Internet Control Message Protocol)?
Answer key☟
4.58.5 Osi Protocol: UGC NET CSE | Junet 2015 | Part 2 | Question: 26 top☝
Which of the following protocols is an application layer protocol that establishes, manages and terminates
multimedia sessions?
Answer key☟
Answer key☟
4.59.2 Physical Layer: UGC NET CSE | December 2013 | Part 2 | Question: 3 top☝
An analog signal carries 4 bits in each signal unit. If 1000 signal units are sent per second, then baud rate
and bit rate of the signal are _____ and _____
A. 4000 bauds/sec & 1000 bps B. 2000 bauds/sec & 1000 bps
C. 1000 bauds/sec & 500 bps D. 1000 bauds/sec & 4000 bps
ugcnetcse-dec2013-paper2 computer-networks osi-model physical-layer
Answer key☟
4.59.3 Physical Layer: UGC NET CSE | July 2018 | Part 2 | Question: 42 top☝
Answer key☟
4.59.4 Physical Layer: UGC NET CSE | June 2013 | Part 3 | Question: 21 top☝
Answer key☟
4.60.1 Port Numbers: UGC NET CSE | Junet 2015 | Part 2 | Question: 27 top☝
A. B.
C. D.
ugcnetcse-june2015-paper2 computer-networks port-numbers
Answer key☟
4.61.1 Propagation Delay: UGC NET CSE | June 2019 | Part 2 | Question: 83 top☝
You are designing a link layer protocol for a link with bandwidth of Gbps ( bits/second) over a fiber link
with length of km. Assume the speed of light in this medium is km/second. What is the
propagation delay in this link?
A. millisecond B. milliseconds
C. milliseconds D. milliseconds
ugcnetcse-june2019-paper2 propagation-delay
Answer key☟
4.62.1 Propagation Time: UGC NET CSE | December 2014 | Part 3 | Question: 28 top☝
What is the propagation time if the distance between the two points is ? Assume the propagation
speed to be metre/second in cable.
A. ms B. ms C. ms D. ms
ugcnetcse-dec2014-paper3 computer-networks propagation-time
Answer key☟
4.63.1 Protocol: UGC NET CSE | December 2014 | Part 2 | Question: 50 top☝
A. B.
C. D.
ugcnetcse-dec2014-paper2 computer-networks protocol
Answer key☟
4.64.1 Pure Aloha: UGC NET CSE | June 2016 | Part 3 | Question: 27 top☝
A Pure ALOHA Network transmits 200 bit frames using a shared channel with 200 kbps bandwidth . If the
system (all stations put together) produces 500 frames per sec , then the throughput of the system is
Answer key☟
4.65.1 Rarp Protocol: UGC NET CSE | June 2019 | Part 2 | Question: 82 top☝
What is the name of the protocol that allows a client to send a broadcast message with its MAC address and
receive an IP address in reply?
Answer key☟
The device which connects dissimilar of different topologies using different sets of communication
protocols so that information can flow from one to another is called :
A. Router
B. Bridge
C. Gateway
D. Switch
Answer key☟
4.66.2 Routers Bridge Hubs Switches: UGC NET CSE | June 2014 | Part 2 | Question: 02 top☝
A. Physical B. Network
C. Datalink D. Application
ugcnetcse-june2014-paper2 routers-bridge-hubs-switches
Answer key☟
4.67.1 Routing: UGC NET CSE | December 2011 | Part 2 | Question: 12 top☝
A station in a network in a network forward incoming packets by placing them on its shortest output queue.
What routing algorithm is being used ?
Answer key☟
4.67.2 Routing: UGC NET CSE | December 2015 | Part 3 | Question: 12 top☝
Consider a subnet with routers. If a three level hierarchy is chosen with clusters, each containing
regions of routers, then total number of entries in the routing table is _______
A. B. C. D.
computer-networks routing ugcnetcse-dec2015-paper3
Answer key☟
4.67.3 Routing: UGC NET CSE | June 2012 | Part 2 | Question: 17 top☝
Answer key☟
4.67.4 Routing: UGC NET CSE | June 2012 | Part 2 | Question: 41 top☝
Answer key☟
Answer key☟
4.68.2 Routing Algorithm: UGC NET CSE | December 2014 | Part 2 | Question: 28 top☝
Answer key☟
4.68.3 Routing Algorithm: UGC NET CSE | September 2013 | Part 2 | Question: 6 top☝
Answer key☟
4.69.1 Rsa: UGC NET CSE | June 2013 | Part 2 | Question: 33 top☝
Using data p=3, q=11, n=pq, d=7 in RSA algorithm find the cipher text of the given plain text SUZANNE
Answer key☟
4.70.1 Rsa Public Key: UGC NET CSE | December 2013 | Part 2 | Question: 5 top☝
Using the RSA public key crypto system, if p=13, q=31 and d=7, then the value of e is
Answer key☟
4.71.1 Rsa Security Networks: UGC NET CSE | January 2017 | Part 3 | Question: 29 top☝
In RSA public key cryptosystem suppose where and are primes. and are public
and private keys respectively. Let be an integer such that and .
Which of the following equations represent RSA public key cryptosystem?
I.
II.
III.
IV.
Answer key☟
4.71.2 Rsa Security Networks: UGC NET CSE | June 2019 | Part 2 | Question: 90 top☝
The RSA encryption algorithm also works in reverse, that is, you can encrypt a message with the private key
and decrypt it using the public key. This property is used in
Answer key☟
4.72.1 Serial Communication: UGC NET CSE | December 2013 | Part 3 | Question: 47 top☝
The start and stop bits are used in serial communication for
Answer key☟
4.72.2 Serial Communication: UGC NET CSE | June 2014 | Part 2 | Question: 04 top☝
The bit rate of a signal is bps. If each signal unit carries bits, the baud rate of the signal is
_________.
A. baud/sec B. baud/sec
C. baud/sec D. baud/sec.
ugcnetcse-june2014-paper2 computer-networks serial-communication
Answer key☟
4.73.1 Session Layer: UGC NET CSE | Junet 2015 | Part 2 | Question: 28 top☝
Answer key☟
4.74.1 Signalling: UGC NET CSE | August 2016 | Part 3 | Question: 59 top☝
Answer key☟
4.75.1 Signals: UGC NET CSE | June 2013 | Part 3 | Question: 20 top☝
The ______ measure the relative strengths of two signals or a signal at two different points.
Answer key☟
4.76.1 Sliding Window: UGC NET CSE | December 2009 | Part 2 | Question: 27 top☝
What is the maximum window size in sliding window protocol used in a computer
network ?
(A) 4
(B) 8
(C) 15
(D) 16
Answer key☟
4.76.2 Sliding Window: UGC NET CSE | December 2012 | Part 3 | Question: 4 top☝
The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next
outgoing data frame is known as
Answer key☟
4.76.3 Sliding Window: UGC NET CSE | January 2017 | Part 3 | Question: 26 top☝
Station uses byte packets t transmit messages to station using sliding window protocol. The round
trip delay between and is milliseconds and the bottleneck bandwidth on the path between and
is kbps. The optimal window size of is
A. B. C. D.
ugcnetcse-jan2017-paper3 computer-networks sliding-window
Answer key☟
4.76.4 Sliding Window: UGC NET CSE | June 2014 | Part 3 | Question: 72 top☝
Four bits are used for packed sequence numbering in a slinding window protocol used in a computer
network. What is the maximum window size?
A. 4 B. 8 C. 15 D. 16
ugcnetjune2014iii computer-networks sliding-window
Answer key☟
A slotted ALOHA network transmits 200-bit frames using a shared channel with a 200 Kbps bandwidth. Find
the throughput of the system (all stations put together) produces 250 frames per second:
Answer key☟
4.78.1 Subnetting: UGC NET CSE | December 2018 | Part 2 | Question: 87 top☝
An Internet Service Provider has following chunk of based addresses available with it :
. The wants to give half of this chunk addresses to organization and a quarter to
organization while retaining the remaining with itself. Which of the following is a valid allocation of addresses to
and ?
A. B.
C. D.
ugcnetcse-dec2018-paper2 computer-networks subnetting
4.78.2 Subnetting: UGC NET CSE | June 2019 | Part 2 | Question: 84 top☝
You need subnets, each with about usable host address per subnet. What network mask will you
assign using a class B network address?
A. B.
C. D.
ugcnetcse-june2019-paper2 subnetting
Answer key☟
4.79.1 Tcp: UGC NET CSE | January 2017 | Part 2 | Question: 28 top☝
A packet whose destination is outside the local network segment is sent to ________.
Answer key☟
4.79.2 Tcp: UGC NET CSE | Junet 2015 | Part 3 | Question: 26 top☝
Which one of the following control fields in TCP header is used to specify whether the sender has no more
data to transmit?
Answer key☟
4.79.3 Tcp: UGC NET CSE | Junet 2015 | Part 3 | Question: 30 top☝
Answer key☟
4.79.4 Tcp: UGC NET CSE | September 2013 | Part 3 | Question: 9 top☝
Which of the following field of the TCP header tells how many bytes may be sent starting at the byte
acknowledged?
Answer key☟
4.80.1 Tcp Header: UGC NET CSE | December 2014 | Part 3 | Question: 27 top☝
Answer key☟
4.81.1 Tcp Ip Model: UGC NET CSE | June 2016 | Part 2 | Question: 28 top☝
In TCP/IP reference model, the job of ____ layer is to permit hosts to inject packets into any network and
travel them independently to the destination
Answer key☟
4.82.1 Tcp Ip Suit Protocols: UGC NET CSE | December 2012 | Part 3 | Question: 22 top☝
Which provides an interface to the TCP/IP suit protocols in Windows 95 and Windows NT?
Answer key☟
4.83.1 Tele Communication: UGC NET CSE | Junet 2015 | Part 3 | Question: 25 top☝
Which transmission technique guarantees that data packets will be received by the receiver in the same
order in which they were sent by the sender?
A. Broadcasting B. Unicasting
C. Packet switching D. Circuit switching
ugcnetcse-june2015-paper3 computer-networks data-communication tele-communication
Answer key☟
4.84.1 Token Bucket: UGC NET CSE | January 2017 | Part 3 | Question: 30 top☝
A node on a Mbps network is regulated by a token bucket. The token bucket is filled at a rate of
Mbps. Token bucket is initially filled with megabits. The maximum duration taken by to transmit at full
rate of Mbps is ______secs.
A. B. C. D.
ugcnetcse-jan2017-paper3 computer-networks token-bucket
Answer key☟
4.85.1 Transmission Media: UGC NET CSE | August 2016 | Part 2 | Question: 26 top☝
Answer key☟
4.85.2 Transmission Media: UGC NET CSE | August 2016 | Part 2 | Question: 27 top☝
In a fast Ethernet cabling, Base- uses ______ cable and maximum segment size is ______.
Answer key☟
4.85.3 Transmission Media: UGC NET CSE | August 2016 | Part 2 | Question: 28 top☝
A network with bandwidth of Mbps can pass only an average of frames per minute with each
frame carrying an average of bits. What is the throughput of this network ?
Answer key☟
4.85.4 Transmission Media: UGC NET CSE | August 2016 | Part 3 | Question: 29 top☝
An analog signal has a bit rate of bps and a baud rate of . Then analog signal has _____ signal
elements and carry _____ data elements in each signal.
Answer key☟
4.85.5 Transmission Media: UGC NET CSE | December 2008 | Part 2 | Question: 10 top☝
Transmission of N signals, each band limited to fm Hz by TDM, requires a minimum band-width of:
A. fm
B. 2 fm
C. N fm
D. 2N fm
Answer key☟
4.85.6 Transmission Media: UGC NET CSE | December 2008 | Part 2 | Question: 7 top☝
Answer key☟
4.85.7 Transmission Media: UGC NET CSE | December 2010 | Part 2 | Question: 26 top☝
Answer key☟
4.85.8 Transmission Media: UGC NET CSE | December 2012 | Part 2 | Question: 23 top☝
Coaxial cables are categorized by Radio Government rating are adapted for specialized functions. Category
RG-59 with impedance 75 used for
Answer key☟
4.85.9 Transmission Media: UGC NET CSE | June 2016 | Part 2 | Question: 30 top☝
Optical fiber uses reflection to guide light through a channel, in which angle of incidence is ____ the critical
angle
Answer key☟
4.86.1 Unguided Media: UGC NET CSE | December 2013 | Part 2 | Question: 4 top☝
Answer key☟
4.87.1 Wifi: UGC NET CSE | December 2009 | Part 2 | Question: 49 top☝
(A) Wi-Max
(C) Wi-Fi
(D) 802.11 g
4.88.1 Wireless Communication: UGC NET CSE | June 2012 | Part 2 | Question: 28 top☝
Answer key☟
4.89.1 Wireless Lan: UGC NET CSE | December 2009 | Part 2 | Question: 48 top☝
(A) MMDS
(B) ATM
(C) LMDS
(D) CDMA
Answer key☟
4.89.2 Wireless Lan: UGC NET CSE | December 2009 | Part 2 | Question: 50 top☝
The unlicensed National Information Infrastructure band operates at the _________ frequency
(B) 5 GHz
(C) 33 MHz
(D) 5 MHz
Answer key☟
4.89.3 Wireless Lan: UGC NET CSE | December 2015 | Part 2 | Question: 21 top☝
Which of the following services is not provided by wireless access point in 802.11 WLAN?
A. Association B. Disassociation
C. Error correction D. Integration
ugcnetcse-dec2015-paper2 computer-networks wireless-lan
Answer key☟
4.89.4 Wireless Lan: UGC NET CSE | June 2010 | Part 2 | Question: 30 top☝
What is the maximum operating rate of a wireless LAN using infrared communication ?
A. Both (A) and (R) are true and (R) is the correct explanation for (A)
B. (B) Both (A) and (R) are true but (R) is not the correct explanation
C. (A) is true but (R) is false
D. (A) is false but (R) is true
4.91.1 Wireless Protocol: UGC NET CSE | December 2013 | Part 2 | Question: 42 top☝
A. B.
C. D.
ugcnetcse-dec2013-paper2 computer-networks wireless-protocol
Answer key☟
4.92.1 Wireless Transmission: UGC NET CSE | June 2012 | Part 3 | Question: 66 top☝
If the period of a signal is 1000 ms, then what is its frequency in kiliohertz?
Answer key☟
Answer Keys
4.0.1 D 4.0.2 A 4.0.3 Q-Q 4.0.4 Q-Q 4.0.5 D
4.0.6 X 4.0.7 D 4.0.8 B 4.0.9 Q-Q 4.0.10 C
4.0.11 Q-Q 4.0.12 Q-Q 4.0.13 D 4.0.14 D 4.0.15 Q-Q
4.0.16 D 4.0.17 D 4.0.18 B 4.0.19 Q-Q 4.0.20 B
4.0.21 C 4.0.22 B 4.0.23 Q-Q 4.0.24 Q-Q 4.0.25 A
4.0.26 Q-Q 4.0.27 Q-Q 4.0.28 Q-Q 4.0.29 B 4.0.30 Q-Q
4.0.31 Q-Q 4.0.32 Q-Q 4.0.33 D 4.0.34 Q-Q 4.0.35 Q-Q
4.0.36 Q-Q 4.0.37 Q-Q 4.0.38 C 4.0.39 Q-Q 4.0.40 Q-Q
4.0.41 Q-Q 4.0.42 Q-Q 4.0.43 Q-Q 4.0.44 Q-Q 4.0.45 Q-Q
4.0.46 Q-Q 4.0.47 Q-Q 4.0.48 Q-Q 4.0.49 D 4.0.50 Q-Q
4.0.51 Q-Q 4.0.52 Q-Q 4.0.53 Q-Q 4.0.54 Q-Q 4.0.55 Q-Q
4.0.56 Q-Q 4.0.57 Q-Q 4.0.58 B 4.0.59 C 4.0.60 Q-Q
4.1.1 D 4.2.1 B 4.3.1 X 4.4.1 A 4.5.1 Q-Q
4.6.1 A 4.7.1 B 4.8.1 B 4.9.1 Q-Q 4.10.1 Q-Q
4.11.1 Q-Q 4.12.1 A 4.12.2 X 4.13.1 D 4.14.1 C
4.14.2 D 4.14.3 A 4.14.4 B 4.14.5 C 4.14.6 D
4.14.7 A 4.14.8 C 4.14.9 C 4.15.1 D 4.16.1 D
4.16.2 A 4.17.1 Q-Q 4.17.2 C 4.17.3 D 4.17.4 Q-Q
4.17.5 C 4.17.6 C 4.17.7 C 4.18.1 Q-Q 4.18.2 Q-Q
4.18.3 Q-Q 4.18.4 Q-Q 4.18.5 Q-Q 4.18.6 Q-Q 4.18.7 C
4.19.1 Q-Q 4.19.2 Q-Q 4.19.3 B 4.19.4 D 4.19.5 D
4.19.6 D 4.19.7 C 4.20.1 Q-Q 4.21.1 B 4.22.1 C
4.23.1 Q-Q 4.24.1 B 4.25.1 D 4.25.2 A 4.26.1 C
4.26.2 D 4.27.1 Q-Q 4.28.1 Q-Q 4.28.2 C 4.28.3 Q-Q
4.28.4 Q-Q 4.28.5 C 4.29.1 X 4.30.1 A 4.30.2 B
4.30.3 D 4.30.4 B 4.30.5 A 4.31.1 A 4.32.1 Q-Q
4.32.2 B 4.32.3 B 4.32.4 A 4.33.1 D 4.34.1 D
4.35.1 B 4.36.1 Q-Q 4.37.1 A 4.38.1 Q-Q 4.38.2 C
4.38.3 Q-Q 4.38.4 D 4.38.5 C 4.38.6 A 4.38.7 C
4.38.8 A 4.38.9 B 4.38.10 A 4.39.1 A 4.39.2 D
4.40.1 D 4.41.1 Q-Q 4.41.2 A 4.42.1 B 4.43.1 B
4.44.1 D 4.44.2 C 4.44.3 D 4.45.1 A 4.45.2 C
4.45.3 B 4.45.4 D 4.45.5 A 4.45.6 B 4.45.7 B
4.46.1 C 4.46.2 C 4.47.1 C 4.48.1 Q-Q 4.49.1 Q-Q
4.49.2 Q-Q 4.50.1 B 4.50.2 D 4.51.1 A 4.52.1 A
4.52.2 C 4.52.3 C 4.52.4 A 4.52.5 A 4.53.1 Q-Q
4.53.2 Q-Q 4.53.3 Q-Q 4.53.4 C 4.53.5 Q-Q 4.53.6 C
4.53.7 D 4.53.8 B 4.53.9 D 4.53.10 C 4.54.1 Q-Q
4.54.2 Q-Q 4.54.3 B 4.54.4 C 4.54.5 D 4.54.6 X
4.54.7 Q-Q 4.54.8 Q-Q 4.54.9 Q-Q 4.54.10 Q-Q 4.54.11 A
4.54.12 C 4.54.13 B 4.54.14 A 4.54.15 D 4.54.16 B
4.54.17 C 4.54.18 A 4.55.1 Q-Q 4.55.2 Q-Q 4.55.3 D
4.55.4 Q-Q 4.55.5 B 4.56.1 Q-Q 4.56.2 Q-Q 4.56.3 A
4.56.4 A 4.57.1 Q-Q 4.57.2 Q-Q 4.57.3 Q-Q 4.57.4 Q-Q
4.57.5 A 4.57.6 B 4.57.7 C 4.57.8 Q-Q 4.57.9 Q-Q
4.57.10 B 4.57.11 A 4.58.1 C 4.58.2 A 4.58.3 A
4.58.4 C 4.58.5 D 4.59.1 Q-Q 4.59.2 D 4.59.3 Q-Q
4.59.4 C 4.60.1 D 4.61.1 D 4.62.1 X 4.63.1 B
4.64.1 B 4.65.1 C 4.66.1 C 4.66.2 A 4.67.1 Q-Q
4.67.2 A 4.67.3 B 4.67.4 D 4.68.1 Q-Q 4.68.2 X
4.68.3 C 4.69.1 A 4.70.1 B 4.71.1 B 4.71.2 B
4.72.1 C 4.72.2 A 4.73.1 C 4.74.1 Q-Q 4.75.1 D
4.76.1 Q-Q 4.76.2 B 4.76.3 B 4.76.4 C 4.77.1 Q-Q
4.78.1 Q-Q 4.78.2 B 4.79.1 D 4.79.2 A 4.79.3 D
4.79.4 B 4.80.1 B 4.81.1 X 4.82.1 X 4.83.1 D
4.84.1 B 4.85.1 Q-Q 4.85.2 Q-Q 4.85.3 Q-Q 4.85.4 Q-Q
4.85.5 Q-Q 4.85.6 Q-Q 4.85.7 Q-Q 4.85.8 A 4.85.9 C
4.86.1 A 4.87.1 Q-Q 4.88.1 B 4.89.1 Q-Q 4.89.2 Q-Q
4.89.3 C 4.89.4 Q-Q 4.90.1 Q-Q 4.91.1 D 4.92.1 A
5 Databases (175)
Answer key☟
ugcnetcse-dec2006-paper2
Answer key☟
A. B.
C. D.
ugcnetcse-dec2015-paper2 databases
Answer key☟
The problem that occurs when one transaction updates a database item and the transaction fails for some
reason is
Answer key☟
Answer key☟
In multiuser database if two users wish to update the same record at the same time, they are prevented from
doing so by
Answer key☟
A. B.
C. D.
ugcnetcse-june2014-paper2 databases
Answer key☟
Which one of the following pairs is correctly matched in the context of database design ?
Codes :
The User Work Area (UWA) is a set of Program variables declared in the host program to communicate the
contents of individual records between
A. DBMS and the Host record B. Host program and the Host record
C. Host program and DBMS D. Host program and Host language
ugcnetcse-dec2012-paper2 databases
Answer key☟
i. Entities
ii. The relationship among entities
iii. The attributes of the entities
Then
A. (i) and (iii) B. (i) and (ii) C. (ii) and (iii) D. None of the above
ugcnetcse-dec2004-paper2
Answer key☟
A. All the updates are done first but the entries are made in the log file later
B. All the log files entries are made first but the actual updates are done later
C. Every update is done first followed by a writing on the log file
D. Changes in the views are deferred till a query asks for a view
ugcnetcse-dec2006-paper2
Answer key☟
A data which improves the performance and accessibility of the database are called:
Answer key☟
ugcnetcse-dec2007-paper2
Answer key☟
Answer key☟
Answer key☟
Answer key☟
Answer key☟
Answer key☟
5.0.19 UGC NET CSE | December 2004 | Part 2 | Question: 17 top☝
A. Top - down B. Bottom - up C. Both (A) and (B) D. None of the above
ugcnetcse-dec2004-paper2
Answer key☟
The entity type on which the __________ type depends is called the identifying owner.
Answer key☟
Answer key☟
A. A specific concrete object with a defined set of processes (e.g. Jatin with diabetes)
B. A value given to a particular attribute (e.g. height - 230 cm)
C. A thing that we wish to collect data about zero or more, possibly real world examples of it may exist
D. A template for a group of things with the same set of characteristics that may exist in the real world
ugcnetcse-dec2015-paper2 databases
Answer key☟
Manager’s salary details are hidden from the employee. This is called as
Answer key☟
Which of the following statement(s) is/are FALSE in the context of Relational DBMS?
I. Views in a database system are important because they with access control by aloowing users to see only a
particular subset of the data in the databse
II. E-R diagrams are useful to logically model concepts
III. An update anamoly is when it is not possible to store information unless some other, unrelated information is
stored as well
IV. SQL is a procedural language
A. I and IV only B. III and IV only C. I, II and III only D. II, III and IV only
ugcnetcse-june2016-paper2 databases
Answer key☟
Answer key☟
A. B.
C. D.
ugcnetcse-dec2013-paper3 databases
Answer key☟
ORACLE supports :
ugcnetcse-june2009-paper2
Answer key☟
GO BOTTOM and SKIP-3 commands are given one after another in a database file of 30 records. It shifts
the control to
Answer key☟
Database systems that store each relation in a separate operating system file may use the operating
system's authorization scheme, instead of defining a special scheme themselves. In this case, which of the
following is false?
ugcnetcse-july2018-paper2 databases
Answer key☟
(i) includes a query language based on both relation algebra and tuple calculus
(ii) includes a query language based on tuple calculus
(iii) includes a query language based on relational algebra
(iv) includes a query language based on none of the relational algebra and tuple calculus
Which one is correct ?
A. (i) only
B. (ii) only
C. (iii) only
D. (iv) only
ugcnetcse-june2009-paper2
Answer key☟
Which construct in SQL is used to test whether a subquery has any tuples in its result ?
A. UNIQUE
B. EXISTS
C. GROUP BY
D. EXCEPT
ugcnetcse-june2009-paper2
Answer key☟
5.1.1 Aggregation: UGC NET CSE | December 2008 | Part 2 | Question: 31 top☝
Aggregation is :
Answer key☟
5.1.2 Aggregation: UGC NET CSE | June 2016 | Part 3 | Question: 39 top☝
A. Aggregation is a strong type of association between two classes with full ownership
B. Aggregation is a strong type of association between two classes with partial ownership
C. Aggregation is a weak type of association between two classes with partial ownership
D. Aggregation is a weak type of association between two classes with full ownership
ugcnetcse-june2016-paper3 databases aggregation
Answer key☟
5.2.1 B Tree: UGC NET CSE | January 2017 | Part 3 | Question: 12 top☝
A. B. C. D.
ugcnetcse-jan2017-paper3 databases b-tree
Answer key☟
5.2.2 B Tree: UGC NET CSE | June 2014 | Part 2 | Question: 22 top☝
The upper bound and lower bound for the number of leaves in a B-tree of degree with height is given by
:
A. and B. and
C. and D. and
ugcnetcse-june2014-paper2 databases b-tree
Answer key☟
5.3.1 B+tree: UGC NET CSE | January 2017 | Part 2 | Question: 20 top☝
The order of a leaf node in a tree is the maximum number of children it can have. Suppose that block
size is kilobytes, the child pointer takes bytes long and search field value takes bytes long. The order
of the leaf node is _________.
A. B. C. D.
ugcnetjan2017ii databases b+tree
Answer key☟
5.4.1 Candidate Key: UGC NET CSE | January 2017 | Part 3 | Question: 8 top☝
Answer key☟
5.4.2 Candidate Key: UGC NET CSE | June 2016 | Part 2 | Question: 20 top☝
Consider the following database table having and as its four attributes and four possible
candidate keys for this table :
If different symbols stand for different values in the table is definitely not equal to then which of the
above could not be the candidate key for the database table?
Answer key☟
5.4.3 Candidate Key: UGC NET CSE | June 2019 | Part 2 | Question: 35 top☝
Which of the following key constraints is required for functioning of foreign key in the context relational
databases?
Answer key☟
5.4.4 Candidate Key: UGC NET CSE | June 2019 | Part 2 | Question: 36 top☝
In relational database management, which of the following is/are property/properties of candidate key?
P: Uniqueness
Q: Irreducibility
Answer key☟
5.5.1 Cardinality Ratio: UGC NET CSE | December 2013 | Part 2 | Question: 14 top☝
Based on the cardinality ratio and participation ______ associated with a relationship type, choose either the
Foreign Key Design, the Cross Referencing Design or Mutual Referencing Design.
Answer key☟
5.6.1 Circular Queue: UGC NET CSE | December 2008 | Part 2 | Question: 34 top☝
If else is required in :
A. circular queue
B. linear queue
C. stack
D. deque
Answer key☟
ugcnetcse-dec2009-paper2 concurrency-control-protocols
Answer key☟
5.8.1 Crosstabquery: UGC NET CSE | September 2013 | Part 2 | Question: 41 top☝
Answer key☟
5.9.1 Data Dependency: UGC NET CSE | December 2006 | Part 2 | Question: 18 top☝
5.9.2 Data Dependency: UGC NET CSE | October 2020 | Part 2 | Question: 14 top☝
A. B. C. D.
ugcnetcse-oct2020-paper2 databases data-dependency
Answer key☟
5.10.1 Data Integrity: UGC NET CSE | December 2013 | Part 2 | Question: 15 top☝
Answer key☟
5.11.1 Data Mining: UGC NET CSE | December 2009 | Part 2 | Question: 47 top☝
(A) OLTP
(B) OLAP
(C) OLDP
(D) OLPP
Answer key☟
5.11.2 Data Mining: UGC NET CSE | January 2017 | Part 2 | Question: 47 top☝
__________ refers loosely to the process of semi-automatically analyzing large databases to find useful
patterns.
Answer key☟
5.12.1 Data Model: UGC NET CSE | June 2012 | Part 3 | Question: 8, UGCNET-Dec2012-III: 59 top☝
Which level of abstraction describes what data are stored in the database?
Answer key☟
5.12.2 Data Model: UGC NET CSE | September 2013 | Part 2 | Question: 39 top☝
Views are useful for ____ unwanted information, and for collecting together information from more than one
relation into a single view.
Answer key☟
5.13.1 Database Constraints: UGC NET CSE | December 2013 | Part 2 | Question: 11 top☝
Answer key☟
5.14.1 Database Design: UGC NET CSE | January 2017 | Part 2 | Question: 16 top☝
An attribute of datatype varchar has value 'Ram' and the attribute of datatype char has value
'Sita' in oracle. The attribute has ________ memory spaces and has _______ memory spaces.
A. B. C. D.
ugcnetjan2017ii databases database-design
Answer key☟
5.15.1 Database Normalization: UGC NET CSE | December 2008 | Part 2 | Question: 32 top☝
Suppose R is a relation schema and F is a set of functional dependencies on R. Further, suppose R1 and
R2 form a decomposition of R. Then the decomposition is a lossless join decomposition of R provided that:
A. R1∩R2→R1 is in F+
B. R1∩R2→R2 is in F+
C. both R1∩R2→R1 and R1∩R2→R2 functional dependencies are in F+
D. at least one from R1∩R2→R1 and R1∩R2→R2 is in F+
Answer key☟
5.15.2 Database Normalization: UGC NET CSE | December 2009 | Part 2 | Question: 19 top☝
(B) 2 NF
(C) 4 NF
(D) BCNF
Answer key☟
5.15.3 Database Normalization: UGC NET CSE | December 2010 | Part 2 | Question: 17 top☝
Answer key☟
5.15.4 Database Normalization: UGC NET CSE | December 2012 | Part 2 | Question: 13 top☝
Answer key☟
5.15.5 Database Normalization: UGC NET CSE | December 2012 | Part 3 | Question: 63 top☝
Answer key☟
5.15.6 Database Normalization: UGC NET CSE | December 2013 | Part 3 | Question: 59 top☝
Armstrong proposed systematic approach to derive functional dependencies. Match the following
w.r.t functional dependencies:
Codes:
A. B.
C. D.
ugcnetcse-dec2013-paper3 databases database-normalization
Answer key☟
5.15.7 Database Normalization: UGC NET CSE | December 2014 | Part 2 | Question: 19 top☝
The best normal form of relation scheme along with the set of functional dependencies
is
Answer key☟
5.15.8 Database Normalization: UGC NET CSE | December 2014 | Part 2 | Question: 20 top☝
Identify the minimal key for relational scheme with functional dependencies
A. B. C. D.
ugcnetcse-dec2014-paper2 databases database-normalization
Answer key☟
5.15.9 Database Normalization: UGC NET CSE | December 2014 | Part 3 | Question: 10 top☝
A. B.
C. D.
ugcnetcse-dec2014-paper3 databases database-normalization
Answer key☟
5.15.10 Database Normalization: UGC NET CSE | December 2014 | Part 3 | Question: 12 top☝
Answer key☟
5.15.11 Database Normalization: UGC NET CSE | December 2015 | Part 2 | Question: 20 top☝
A relation R={A,B,C,D,E,F,G} is given with following set of functional dependencies: F={AD→E, BE→F,
B→C, AF→G}. Which of the following is a candidate key?
A. A B. AB C. ABC D. ABD
ugcnetcse-dec2015-paper2 databases database-normalization
Answer key☟
5.15.12 Database Normalization: UGC NET CSE | January 2017 | Part 3 | Question: 10 top☝
For database relation where the domains of and include only atomic values,
only the following functional dependencies and those that can be inferred from them are:
The relation is in
Answer key☟
5.15.13 Database Normalization: UGC NET CSE | June 2010 | Part 2 | Question: 18 top☝
A. B.
C. D.
ugcnetcse-june2010-paper2 databases database-normalization
Answer key☟
5.15.14 Database Normalization: UGC NET CSE | June 2013 | Part 3 | Question: 9 top☝
For a database relation R(a, b, c, d) where the domains of a, b, c, d include only the atomic values. The
functional dependency a c, b d holds in the following relation.
5.15.15 Database Normalization: UGC NET CSE | June 2014 | Part 2 | Question: 49 top☝
A. CD B. EC C. AE D. AC
ugcnetcse-june2014-paper2 databases database-normalization
Answer key☟
5.15.16 Database Normalization: UGC NET CSE | June 2014 | Part 3 | Question: 22 top☝
A. Both Book and Collection are in BCNF. B. Both Book and Collection are in NF.
C. Book is in NF and Collection in NF. D. Both Book and Collection are in NF.
ugcnetjune2014iii databases database-normalization
Answer key☟
5.15.17 Database Normalization: UGC NET CSE | June 2019 | Part 2 | Question: 34 top☝
In relational databases, if relation R is in BCNF, then which of the following is true about relation R?
Answer key☟
5.15.18 Database Normalization: UGC NET CSE | Junet 2015 | Part 3 | Question: 10 top☝
The Relation
Vendor Order (V_no, V_ord_no, V_name, Qty_sup, unit_price) is in 2NF because
Answer key☟
5.15.19 Database Normalization: UGC NET CSE | November 2017 | Part 3 | Question: 9 top☝
If every non-key attribute is functionally dependent on the primary key, then the relation is in ________
Answer key☟
5.15.20 Database Normalization: UGC NET CSE | October 2022 | Part 1 | Question:: 53 top☝
Match List I with List II :
A. B.
C. D.
ugcnetcse-oct2022-paper1 database-normalization
5.16.1 Decomposition: UGC NET CSE | August 2016 | Part 3 | Question: 10 top☝
Consider the table with attributes and . The functional dependencies that hold on are :
. Which of the following statements is/are True ?
I. The decomposition of into and is lossless.
II. The decomposition of into and is lossy.
Answer key☟
5.16.2 Decomposition: UGC NET CSE | December 2012 | Part 3 | Question: 56 top☝
If a relation with a Schema R is decomposed into two relations and such that then
which one of the following is to be satisfied for a lossless joint decomposition ( indicates functional
independency)
A.
B.
C.
D.
Answer key☟
5.16.3 Decomposition: UGC NET CSE | Junet 2015 | Part 3 | Question: 11 top☝
The relation schemas and form a Lossless join decomposition of if and only if
a. b. c. d.
A. aB.and
aC.and
bahappen
D.and
dbhappen
and
c happen
c happen
ugcnetcse-june2015-paper3 databases decomposition database-normalization
Answer key☟
5.17.1 Dependency Preserving: UGC NET CSE | January 2017 | Part 2 | Question: 19 top☝
Answer key☟
5.18.1 Distributed Database: UGC NET CSE | August 2016 | Part 3 | Question: 8 top☝
The Global conceptual Schema in a distributed database contains information about global relations. The
condition that all the data of the global relation must be mapped into the fragments, that is, it must not
happen that a data item which belongs to a global relation does not belong to any fragment, is called :
Answer key☟
5.18.2 Distributed Database: UGC NET CSE | June 2016 | Part 3 | Question: 8 top☝
In distributed databases, location transparency allows for database users, programmers and administratirs
to treat the data as if it is at one location, A SQL query with location transparency needs to specify
Answer key☟
5.19.1 Enhanced Er Model: UGC NET CSE | June 2014 | Part 3 | Question: 23 top☝
Answer key☟
Consider the following Entity-Relationship diagram and three possible relationship sets I, II and
III) for this diagram:
If different symbols stand for different values (e.g., is definitely not equal to ), then which of the above could
not be the relationship set for the diagram ?
Answer key☟
5.20.2 Er Diagram: UGC NET CSE | December 2008 | Part 2 | Question: 30 top☝
An entity has:
(i) a set of properties
(ii) a set of properties and values for all the properties
(iii) a set of properties and the values for some set of properties may non-uniquely identify an entity
(iv) a set of properties and the values for some set of properties may uniquely identify an entity
Which of the above are valid?
A. (i) only
B. (ii) only
C. (iii) only
D. (iv) only
Answer key☟
5.20.3 Er Diagram: UGC NET CSE | December 2009 | Part 2 | Question: 16 top☝
(A) I, II
(B) I, II, IV
Answer key☟
5.20.4 Er Diagram: UGC NET CSE | December 2009 | Part 2 | Question: 17 top☝
(B) bottom up
Answer key☟
5.20.5 Er Diagram: UGC NET CSE | December 2010 | Part 2 | Question: 16 top☝
Answer key☟
5.20.6 Er Diagram: UGC NET CSE | December 2013 | Part 2 | Question: 13 top☝
Answer key☟
5.20.7 Er Diagram: UGC NET CSE | December 2013 | Part 3 | Question: 55 top☝
A. 2 B. 3 C. 4 D. 5
ugcnetcse-dec2013-paper3 databases er-diagram
Answer key☟
5.20.8 Er Diagram: UGC NET CSE | December 2013 | Part 3 | Question: 57 top☝
A. The relationship construct known as the weak relationship type was defined by Dey, Storey & Barron (1999)
B. A weak relationship occurs when two relationship types are linked by either Event- Precedent sequence
or Condition- recedent sequence.
C. Conceptual model is not accurate representation of “Universe of interest”.
D. Ternary, Quaternary and Quintary relationships are shown through a series of application scenario’s
and vignette’s.
Answer key☟
5.20.9 Er Diagram: UGC NET CSE | December 2014 | Part 2 | Question: 18 top☝
What kind of mechanism is to be taken into account for converting a weak entity set into strong entity set in
entity-relationship diagram
A. Generalization B. Aggregation
C. Specialization D. Adding suitable attributes
ugcnetcse-dec2014-paper2 databases er-diagram
Answer key☟
5.20.10 Er Diagram: UGC NET CSE | December 2014 | Part 3 | Question: 38 top☝
A. B. C. D.
ugcnetcse-dec2014-paper3 databases er-diagram
Answer key☟
5.20.11 Er Diagram: UGC NET CSE | December 2019 | Part 2 | Question: 23 top☝
Find minimum number of tables required for converting the following entity relationship diagram into
relational database?
A. B. C. D.
ugcnetcse-dec2019-paper2 er-diagram
Answer key☟
5.20.12 Er Diagram: UGC NET CSE | January 2017 | Part 2 | Question: 18 top☝
Let and be two entities in an diagram with simple single value attributes. and are two
relationship between and , where as , is one-to-many and , is many-to-many.
The minimum number of tables required to represent , and , in the relational model are ___________.
A. B. C. D.
ugcnetjan2017ii databases er-diagram
Answer key☟
5.20.13 Er Diagram: UGC NET CSE | July 2018 | Part 2 | Question: 64 top☝
A. 1 NF B. 2 NF C. 3 NF D. 4 NF
databases er-diagram database-normalization ugcnetcse-july2018-paper2
Answer key☟
5.20.14 Er Diagram: UGC NET CSE | June 2010 | Part 2 | Question: 16 top☝
Answer key☟
5.20.15 Er Diagram: UGC NET CSE | Junet 2015 | Part 2 | Question: 49 top☝
A. Weak entities can be deleted automatically when their strong entity is deleted
B. Weak entity set avoids the data duplication and consequent possible inconsistencies caused by duplicating the
key of the string entity
C. A weak entity set has no primary keys unless attributes of the strong entity set on which it depends are included
D. Tuples in a weak entity set are not partitioned according to their relationship with tuples with a strong entity set
Answer key☟
5.20.16 Er Diagram: UGC NET CSE | Junet 2015 | Part 3 | Question: 7 top☝
Let and be two entities in E-R diagram with simple single valued attributes. and are two
relationships between and where is one-many and is many-many. and do not have
any attribute of their own. How many minimum number of tables are required to represent this situation in the
Relational Model?
A. 4 B. 3 C. 2 D. 1
databases er-diagram ugcnetcse-june2015-paper3
Answer key☟
5.21.1 File System: UGC NET CSE | Junet 2015 | Part 2 | Question: 19 top☝
Database application were directly built on top of file system to overcome the following drawbacks of using
file-systems:
Answer key☟
5.22.1 Generalization: UGC NET CSE | June 2010 | Part 2 | Question: 17 top☝
Answer key☟
5.23.1 Granularity: UGC NET CSE | June 2012 | Part 3 | Question: 4 top☝
What is Granularity?
Answer key☟
Answer key☟
5.25.1 Indexing: UGC NET CSE | June 2014 | Part 2 | Question: 48 top☝
Answer key☟
5.26.1 Java: UGC NET CSE | December 2012 | Part 2 | Question: 22 top☝
Answer key☟
5.27.1 Joins: UGC NET CSE | December 2015 | Part 3 | Question: 63 top☝
Consider the following three tables and In this question, all the join operations are natural joins
. is the projection operation of a relation:
Possible answer tables for this question are also given as below:
A. (a) B. (b) C. (c) D. (d)
ugcnetcse-dec2015-paper3 databases joins
Answer key☟
5.28.1 Object Oriented Database: UGC NET CSE | December 2015 | Part 3 | Question: 58 top☝
Which of the following statements regarding the features of the object-oriented approach to databases are
true?
A. a,B.b b,
and
C.c a,
and
D.
c d,c,
dand
d, and
e e
ugcnetcse-dec2015-paper3 databases object-oriented-database
Answer key☟
5.28.2 Object Oriented Database: UGC NET CSE | June 2016 | Part 3 | Question: 7 top☝
A. Objects in object-oriented databse contain not only data but also methods for processing the data
B. Object-oriented database store computational instructions in the same place as the data
C. Object-oriented database are mmore adapt at handling structured (analytical) data than relational databases
D. Object-oriented databases store more types of data than relational databases and access that data faster
5.29.1 Protocol: UGC NET CSE | June 2014 | Part 3 | Question: 27, UGCNET-June2015-II: 17 top☝
Which of the following concurrency protocol ensues both conflict serializability and freedom from deadlock:
I. -phase locking
II. Time phase ordering
Answer key☟
5.30.1 Rdbms: UGC NET CSE | July 2018 | Part 2 | Question: 61 top☝
In RDBMS, which type of Join returns all rows that satisfy the join condition?
Answer key☟
5.30.2 Rdbms: UGC NET CSE | July 2018 | Part 2 | Question: 62 top☝
Consider a relation book (title, price) which contains the titles and prices of different books. Assuming that
no two books have the same price, what does the following SQL query?
Select title
from book as B
where (select count(*)
from book as T
where T.price > B. price < 7
Answer key☟
5.30.3 Rdbms: UGC NET CSE | July 2018 | Part 2 | Question: 66 top☝
For a database relation where the domains of a, b, c and d include only atomic values and only
the following functional dependencies and those that can be inferred from them hold:
A. First normal form but not in second normal form B. Second normal form but not in third normal form
C. Third normal form D. BCNF
ugcnetcse-july2018-paper2 databases rdbms
Answer key☟
5.30.4 Rdbms: UGC NET CSE | July 2018 | Part 2 | Question: 67 top☝
A many-to-one relationship exists between entity sets and . How will it be represented using functional
dependencies if denotes the primary key attribute of relation ?
A. B.
C. D.
ugcnetcse-july2018-paper2 databases rdbms
Answer key☟
5.30.5 Rdbms: UGC NET CSE | June 2013 | Part 3 | Question: 34 top☝
Answer key☟
5.30.6 Rdbms: UGC NET CSE | June 2013 | Part 3 | Question: 7 top☝
The “PROJECT” operator of a relational algebra creates a new table that has always
Answer key☟
5.30.7 Rdbms: UGC NET CSE | June 2016 | Part 2 | Question: 16 top☝
In RDBMS, the constraint that no key attribute (column) may be NULL is referred to as:
Answer key☟
5.30.8 Rdbms: UGC NET CSE | June 2016 | Part 2 | Question: 18 top☝
In a relational database model, NULL values canbe used for all but which one of the following?
A. To allow duplicate tuples in the table by filling the primary key column(s) with NULL
B. To avoid confusion with actual legitimate data values like 0 (zero) or integer columns and " (the empty string) for
string columns
C. To leave columns in a tuple marked as "unknown" when the actual value is unknown
D. To fill a column in a tuple when that column does not really "exist" for that particular tuple
Answer key☟
5.30.9 Rdbms: UGC NET CSE | November 2017 | Part 3 | Question: 10 top☝
Answer key☟
5.31.1 Recovery From Failure: UGC NET CSE | December 2014 | Part 3 | Question: 09 top☝
_________ rules used to limit the volume of log information that has to be handled and processed in the
event of system failure involving the loss of volatile information.
Answer key☟
5.32.1 Referential Integrity: UGC NET CSE | June 2019 | Part 2 | Question: 39 top☝
Following table has two attributes Employee_id and Manager_id, where Employee_id is a primary key and
manager_id is a foreign key referencing Employee_id with on-delete cascade:
On deleting the table , the set of other tuples that must be deleted to maintain the referential integrity of
table is
Answer key☟
5.32.2 Referential Integrity: UGC NET CSE | September 2013 | Part 3 | Question: 24 top☝
____ constraints ensure that a value that appears in one relation for a given set of attributes also appears
for a certain set of attributes in another relation.
Answer key☟
5.33.1 Relation: UGC NET CSE | July 2018 | Part 2 | Question: 69 top☝
Let and be two relations in which a is the foreign key of that refers to the primary
key of . Consider the following four options.
A. Operations a and b will cause violation B. Operations b and c will cause violation
C. Operations c and d will cause violation D. Operations d and a will cause violation
ugcnetcse-july2018-paper2 databases relation
Answer key☟
5.33.2 Relation: UGC NET CSE | September 2013 | Part 3 | Question: 48 top☝
A. B.
C. D.
ugcnetcse-sep2013-paper3 databases er-diagram relation
Answer key☟
A. )
B. )
C. )
D. )
Answer key☟
5.34.2 Relational Algebra: UGC NET CSE | January 2017 | Part 3 | Question: 9 top☝
Let denotes primary key of relation . A many-to-one relationship that exists between two relations
and can be expressed as follows:
A. B.
C. D.
ugcnetcse-jan2017-paper3 databases relational-algebra
Answer key☟
5.34.3 Relational Algebra: UGC NET CSE | June 2016 | Part 3 | Question: 9 top☝
Consider the relations and and the following four relational algebra queries over R ans S
I.
II.
III.
IV. where refers to the column B in table R
A. I, III and IV are the same query B. II, III and IV are the same query
C. I, II and IV are the same query D. I, II and III are the same query
ugcnetcse-june2016-paper3 databases relational-algebra
Answer key☟
5.34.4 Relational Algebra: UGC NET CSE | June 2019 | Part 2 | Question: 33 top☝
With respect to relational algebra, which of the following operations are included from mathematical set
theory?
A. aB.and
bC.and
d cD.and
c b and
d d
ugcnetcse-june2019-paper2 relational-algebra
Answer key☟
5.35.1 Relational Calculus: UGC NET CSE | June 2019 | Part 2 | Question: 31 top☝
Which of the following has same expressive power with regard to relational query language?
a. Rational algebra and b.
domain
Relational
relational
algebra
calculus
and
c. tuples
Relational
relational
algebra
calculus
andd. domain
Relational
relational
algebracalculus
and tuples
restricted
relational
to safe
calculus
expression
restricted to
Answer key☟
5.35.2 Relational Calculus: UGC NET CSE | September 2013 | Part 3 | Question: 47 top☝
5.36.1 Relational Model: UGC NET CSE | June 2019 | Part 2 | Question: 32 top☝
Answer key☟
5.36.2 Relational Model: UGC NET CSE | October 2020 | Part 2 | Question: 67 top☝
Match with
A. B.
C. D.
ugcnetcse-oct2020-paper2 databases relational-model
Answer key☟
5.37.1 Relational Schema: UGC NET CSE | November 2017 | Part 3 | Question: 12 top☝
A. Dependency preserving and lossless join B. Lossless join but dependency preserving
C. Dependency preserving but not lossless join D. Not dependency preserving and not lossless join
ugcnetcse-nov2017-paper3 databases relational-schema rdbms
Answer key☟
5.38.1 Relations: UGC NET CSE | September 2013 | Part 3 | Question: 49 top☝
Answer key☟
5.39.1 Sql: UGC NET CSE | August 2016 | Part 2 | Question: 20 top☝
Consider a database table with attributes and . Which of the following queries is illegal ?
Answer key☟
5.39.2 Sql: UGC NET CSE | August 2016 | Part 3 | Question: 11 top☝
Answer key☟
5.39.3 Sql: UGC NET CSE | December 2011 | Part 2 | Question: 21 top☝
Answer key☟
5.39.4 Sql: UGC NET CSE | December 2011 | Part 2 | Question: 22 top☝
Which command classes text file, which has been created using "SET ALTERNATIVE" "Command" ?
5.39.5 Sql: UGC NET CSE | December 2011 | Part 2 | Question: 24 top☝
Which of the following statements is true, when structure of database file with 20 records is modified ?
Answer key☟
5.39.6 Sql: UGC NET CSE | December 2011 | Part 2 | Question: 25 top☝
The Expression Select distinct . branch name from branch , branch where . assets .
assets and . branch-city = DELHI, finds the name of
A. All branches that have greater asset than any branch located in DELHI.
B. All branches that have greater assets than allocated in DELHI.
C. The branch that has the greatest asset in DELHI.
D. Any branch that has greater asset than any branch located in DELHI.
Answer key☟
5.39.7 Sql: UGC NET CSE | December 2012 | Part 2 | Question: 50 top☝
Given a Relation POSITION (Posting-No, Skill), then the query to retrieve all distinct pairs of posting-nos.
requiring skill is
A. Select p.posting-No, p.posting-No from position p where p.skill=p.skill and p.posting-No < p.posting-No
B. Select p .posting-No, p .posting-No from position p , position p where p .skill=p .skill
C. Select p .posting-No, p .posting-No from position p , position p where p .skill=p .skill and p .posting.No < p
.posting-No
D. Select p .posting-No, p .posting-No from position p , position p where p .skill=p .skill and p .posting.No = p
.posting-No
Answer key☟
5.39.8 Sql: UGC NET CSE | December 2012 | Part 3 | Question: 70 top☝
Answer key☟
5.39.9 Sql: UGC NET CSE | December 2013 | Part 3 | Question: 58 top☝
Consider the table student (stuid, name, course, marks). Which one of the following two queries is correct to
find the highest marks student in course 5?
Q.1. Select S.stuid from student S where not exist (select * from student e where e course ='5' and e marks s
marks)
Q.2. select s.stu.id From student S where s.marks > any (select distinct marks from student S where s.course =5)
A. Q.1 B. Q.2 C. Both Q.1 and Q.2 D. Neither Q.1 nor Q.2
ugcnetcse-dec2013-paper3 databases sql
Answer key☟
5.39.10 Sql: UGC NET CSE | December 2014 | Part 2 | Question: 16 top☝
Answer key☟
5.39.11 Sql: UGC NET CSE | December 2014 | Part 2 | Question: 17 top☝
Answer key☟
5.39.12 Sql: UGC NET CSE | December 2015 | Part 2 | Question: 13 top☝
Consider a "CUSTOMERS" database table having a column "CITY" filled with all the names of Indian cities
(in capital letters). The SQL statement that finds all cities that have "GAR" somewhere in its name, is:
A. select * from customers where city='%GAR%';
Answer key☟
5.39.13 Sql: UGC NET CSE | December 2015 | Part 3 | Question: 59 top☝
A. B. C. D.
ugcnetcse-dec2015-paper3 databases sql
Answer key☟
5.39.14 Sql: UGC NET CSE | December 2015 | Part 3 | Question: 60 top☝
The numbers of tuples in the result of the SQL query SQ1 and the SQL query SQ2 are given by:
Answer key☟
5.39.15 Sql: UGC NET CSE | December 2015 | Part 3 | Question: 61 top☝
Consider the following three SQL queries (Assume the data in the people table):
A. B. C. D.
ugcnetcse-dec2015-paper3 databases sql
Answer key☟
5.39.16 Sql: UGC NET CSE | December 2019 | Part 2 | Question: 22 top☝
ugcnetcse-dec2019-paper2 sql
Answer key☟
5.39.17 Sql: UGC NET CSE | January 2017 | Part 2 | Question: 17 top☝
Integrity constraints ensure that changes made to the database by authorized users do not result into loss of
data consistency. Which of the following statement(s) is (are) true w.r.t.the examples of integrity constraints?
a. An instructor Id. No. cannot be null, provided Instructor b.IdNo two citizens have same Adhar-ld.
No. being primary key.
c. Budget of a company must be zero.
A. a, b and c are true. B. a false, b and c are true.
C. a and b are true; c false. D. a,b and c are false.
ugcnetjan2017ii databases sql
Answer key☟
5.39.18 Sql: UGC NET CSE | January 2017 | Part 3 | Question: 11 top☝
A. Find the highest paid employee who earns more than the average salary of all employees of his company.
B. Find the highest paid employee who earns more than the average salary of all the employees of all
the companies.
C. Find all employees who earn more than the average salary of all employees all the companies.
D. Find all employees who earn more than the average salary of all employees of their company.
Answer key☟
5.39.19 Sql: UGC NET CSE | June 2010 | Part 2 | Question: 19 top☝
Which data management language component enabled the DBA to define the schema components ?
Answer key☟
5.39.20 Sql: UGC NET CSE | June 2010 | Part 2 | Question: 20 top☝
A. More fields than the original table B. More rows than original table
C. Both (A) & (B) D. None of these
ugcnetcse-june2010-paper2 databases sql
Answer key☟
5.39.21 Sql: UGC NET CSE | June 2013 | Part 3 | Question: 8 top☝
The employee information of an organization is stored in a relation: Employee (name, sex, salary,
deptname). Consider the following SQL query:
Select deptname from Employee where sex=’M’ group by dept name having
avg (salary) > {select avg (salary) from Employee}
Answer key☟
5.39.22 Sql: UGC NET CSE | June 2016 | Part 2 | Question: 19 top☝
Consider the following two comments C1 and C2 on the relation R from an SQL database:
C1 : drop table R;
C2 : delete from R
Answer key☟
5.39.23 Sql: UGC NET CSE | June 2016 | Part 3 | Question: 11 top☝
Answer key☟
5.39.24 Sql: UGC NET CSE | June 2019 | Part 2 | Question: 37 top☝
Set [columnname]=VALUE
Answer key☟
5.39.25 Sql: UGC NET CSE | Junet 2015 | Part 2 | Question: 16 top☝
An Assertion is predicate expressing a condition we wish database to always satisfy. The correct syntax for
Assertion is:
Answer key☟
5.39.26 Sql: UGC NET CSE | Junet 2015 | Part 2 | Question: 18 top☝
A. a B. a, b and c C. d D. a and d
ugcnetcse-june2015-paper2 databases sql
Answer key☟
5.39.27 Sql: UGC NET CSE | Junet 2015 | Part 3 | Question: 8 top☝
The STUDENT information in a university stored in the relation STUDENT (Name, SEX, Marks,
DEPT_Name). COnsider the following SQL Query:
SELECT DEPT_Name from STUDENT where SEX='M'
group by DEPT_Name having avg(Marks)>SELECT avg(Marks) from STUDENT
A. The average marks of Male students is more than the average marks of students in the department
B. The average marks of Male students is more than the average marks of students in the university
C. The average marks of students is more than the average marks of male students in the university
D. The average marks of Male students is more than the average marks of male students in the university
Answer key☟
5.39.28 Sql: UGC NET CSE | November 2017 | Part 3 | Question: 11 top☝
Answer key☟
5.39.29 Sql: UGC NET CSE | October 2020 | Part 2 | Question: 100 top☝
Consider the following table structures related to a university for the below question.
EMPLOYEE
DEPARTMENT
PROJECT WORK:
Refer table, structures given above, University decided to give all employees in the ‘SCIENCE’ department a
rise in salary. Which of the following query/queries will compute the above results?
Answer key☟
5.39.30 Sql: UGC NET CSE | October 2020 | Part 2 | Question: 96 top☝
Consider the following table structures related to a university for the below question.
EMPLOYEE
NAME VARCHAR (30) NOT NULL,
EID VARCHAR (10) NOT NULL,
DEPTNO INT (5) NOT NULL,
HODEID VARCHAR (10),
SALARY INT (10),
PRIMARY KEY (EID),
FOREIGN KEY (HODEID) REFERENCES EMPLOYEE (EID),
FOREIGN KEY (DEPTNO) REFERENCES DEPARTMENT (DID);
DEPARTMENT
DID INT (5) NOT NULL,
DNAME VARCHAR(30) NOT NULL,
HODID VARCHAR (10) NOT NULL,
HODNAME VARCHAR (30),
PRIMARY KEY (DID),
UNIQUE (DNAME),
FOREIGN KEY (HODID) REFERENCES EMPLOYEE (EID)
PROJECT WORK:
EMPID VARCHAR (10) NOTNULL,
PROJNO INT(5) NOT NULL,
PROJECTLOC VARCHAR (30) NOT NULL,
PRIMARY KEY (EMPID, PROJNO),
FOREIGN KEY (EMPID) REFERENCES EMPLOYEE (EID),
On the basis of above given table structures, retrieve the distinct employee ID (EMPID) of all employees of
university who are working on project. No. and
5.39.31 Sql: UGC NET CSE | October 2020 | Part 2 | Question: 97 top☝
Consider the following table structures related to a university for the below question.
EMPLOYEE
DEPARTMENT
PROJECT WORK:
Given below are two statements to find the sum of salaries of all employees of the English department as well as
the maximum, minimum and average salary in English department
STATEMENT :
SELECT SUM (SALARY) MAX(SALARY) MIN(SALARY),
AVG (SALARY) FROM EMPLOYEE, DEPARTMENT
WHERE DEPTNO=DID AND DNAME=’ENGLISH’
STATEMENT :
SELECT SUM (SALARY), MAX(SALARY), MIN (SALARY),
AVG (SALARY), FROM EMPLOYEE, DEPARTMENT
WHERE DNAME=’ENGLISH’
In the light of the above statements, choose the correct answer from the options given below:
Answer key☟
5.39.32 Sql: UGC NET CSE | October 2020 | Part 2 | Question: 98 top☝
Consider the following table structures related to a university for the below question.
EMPLOYEE
DEPARTMENT
PROJECT WORK:
Which of the following query/queries return the employee ID and name of employees whose salary is greater than
the salary of all employees in department number of university. Order result by employee ID (refer table
structures given above).
Answer key☟
5.39.33 Sql: UGC NET CSE | October 2020 | Part 2 | Question: 99 top☝
Consider the following table structures related to a university for the below question.
EMPLOYEE
DEPARTMENT
PROJECT WORK:
In reference to the above given table structures, which of the following query/queries will drop the ‘SALARY’ column
from ‘EMPLOYEE’ table?
Answer key☟
5.39.34 Sql: UGC NET CSE | September 2013 | Part 3 | Question: 25 top☝
A. All branches that have greater assets than some branch located in Mumbai
B. All branches that have greater assets than all branches in Mumbai
C. The branch that has greatest asset in Mumbai
D. Any branch that has greater assets than any branch in Mumbai
Answer key☟
5.40.1 Transaction And Concurrency: UGC NET CSE | December 2010 | Part 2 | Question: 18 top☝
Answer key☟
5.40.2 Transaction And Concurrency: UGC NET CSE | December 2014 | Part 3 | Question: 08 top☝
Answer key☟
5.40.3 Transaction And Concurrency: UGC NET CSE | January 2017 | Part 3 | Question: 7 top☝
Answer key☟
5.40.4 Transaction And Concurrency: UGC NET CSE | July 2018 | Part 2 | Question: 65 top☝
Answer key☟
5.40.5 Transaction And Concurrency: UGC NET CSE | June 2012 | Part 2 | Question: 12 top☝
Answer key☟
5.40.6 Transaction And Concurrency: UGC NET CSE | November 2017 | Part 3 | Question: 7 top☝
Consider the following four schedules due to three transactions (indicated by the subscript) using read and
write on a data item , denoted by and respectively. Which one of them is conflict serializable?
:
:
:
:
A. B. C. D.
ugcnetcse-nov2017-paper3 databases transaction-and-concurrency
Answer key☟
5.40.7 Transaction And Concurrency: UGC NET CSE | November 2017 | Part 3 | Question: 8 top☝
Answer key☟
5.40.8 Transaction And Concurrency: UGC NET CSE | September 2013 | Part 2 | Question: 37 top☝
Answer key☟
5.40.9 Transaction And Concurrency: UGC NET CSE | September 2013 | Part 2 | Question: 43 top☝
Thoma’s-write rule is
Answer key☟
5.41.1 Transactions And Concurrency Control: UGC NET CSE | October 2020 | Part 2 | Question: 48 top☝
In the context of concurrency control, a given pair of operations in a schedule is called conflict schedule if
a. At least one of the operations is write operation b. Both the operations are performed on the same data item
c. Both the operations are performed by different transactions
d. Both the operations are performed on different data items
Choose the correct answer from the options given below:
Answer key☟
5.42.1 Weak Entity: UGC NET CSE | Junet 2015 | Part 2 | Question: 20 top☝
For a weak entity set to be meaningful, it must be associated with another entity set in combination with
some of their attribute values, is called as:
Answer key☟
Answer Keys
5.0.1 Q-Q 5.0.2 Q-Q 5.0.3 B 5.0.4 C 5.0.5 Q-Q
5.0.6 D 5.0.7 D 5.0.8 Q-Q 5.0.9 C 5.0.10 Q-Q
5.0.11 Q-Q 5.0.12 A 5.0.13 Q-Q 5.0.14 Q-Q 5.0.15 Q-Q
5.0.16 Q-Q 5.0.17 Q-Q 5.0.18 B 5.0.19 Q-Q 5.0.20 Q-Q
5.0.21 Q-Q 5.0.22 D 5.0.23 C 5.0.24 D 5.0.25 D
5.0.26 D 5.0.27 Q-Q 5.0.28 B 5.0.29 Q-Q 5.0.30 Q-Q
5.0.31 Q-Q 5.1.1 Q-Q 5.1.2 C 5.2.1 A 5.2.2 A
5.3.1 X 5.4.1 B 5.4.2 C 5.4.3 B 5.4.4 C
5.5.1 B 5.6.1 A 5.7.1 Q-Q 5.8.1 B 5.9.1 Q-Q
5.9.2 D 5.10.1 B 5.11.1 Q-Q 5.11.2 A 5.12.1 D
5.12.2 A 5.13.1 A 5.14.1 B 5.15.1 D 5.15.2 Q-Q
5.15.3 Q-Q 5.15.4 A 5.15.5 B 5.15.6 D 5.15.7 B
5.15.8 B 5.15.9 B 5.15.10 A 5.15.11 D 5.15.12 A
5.15.13 Q-Q 5.15.14 A 5.15.15 B 5.15.16 C 5.15.17 D
5.15.18 A 5.15.19 C 5.15.20 Q-Q 5.16.1 Q-Q 5.16.2 A
5.16.3 C 5.17.1 A 5.18.1 Q-Q 5.18.2 B 5.19.1 B
5.20.1 Q-Q 5.20.2 Q-Q 5.20.3 Q-Q 5.20.4 Q-Q 5.20.5 Q-Q
5.20.6 A 5.20.7 B 5.20.8 C 5.20.9 D 5.20.10 A
5.20.11 Q-Q 5.20.12 D 5.20.13 A 5.20.14 Q-Q 5.20.15 B
5.20.16 B 5.21.1 D 5.22.1 Q-Q 5.23.1 B 5.24.1 Q-Q
5.25.1 A 5.26.1 B 5.27.1 B 5.28.1 B 5.28.2 C
5.29.1 B 5.30.1 Q-Q 5.30.2 Q-Q 5.30.3 Q-Q 5.30.4 A
5.30.5 D 5.30.6 C 5.30.7 C 5.30.8 A 5.30.9 A
5.31.1 B 5.32.1 B 5.32.2 B 5.33.1 D 5.33.2 A
5.34.1 A 5.34.3 D 5.34.4 B 5.35.1 B 5.35.2 C
5.36.1 C 5.36.2 C 5.37.1 A 5.38.1 C 5.39.1 Q-Q
5.39.2 Q-Q 5.39.3 Q-Q 5.39.4 Q-Q 5.39.5 Q-Q 5.39.6 Q-Q
5.39.7 C 5.39.8 B 5.39.9 B 5.39.10 B 5.39.11 D
5.39.12 C 5.39.13 B 5.39.14 B 5.39.15 D 5.39.16 Q-Q
5.39.17 C 5.39.18 D 5.39.19 Q-Q 5.39.20 Q-Q 5.39.21 D
5.39.22 C 5.39.23 A 5.39.24 C 5.39.25 A 5.39.26 C
5.39.27 B 5.39.28 B 5.39.29 B 5.39.30 C 5.39.31 C
5.39.32 D 5.39.33 A 5.39.34 A 5.40.1 Q-Q 5.40.2 D
5.40.3 C 5.40.4 Q-Q 5.40.5 D 5.40.6 D 5.40.7 A
5.40.8 B 5.40.9 B 5.41.1 B 5.42.1 C
6 Digital Logic (106)
The period of a signal is ms, then the frequency of this signal in kilohertz is ______
A. B. C. D.
ugcnetcse-oct2020-paper2 digital-logic
Answer key☟
A. B. C. D.
ugcnetcse-dec2007-paper2
Answer key☟
A. B. C. D.
ugcnetcse-dec2006-paper2
Answer key☟
A. B. C. D.
ugcnetcse-dec2006-paper2
A. B.
C. The symbols used have the usual meaning.
D.
ugcnetcse-dec2004-paper2
Answer key☟
i. Every logic network is equivalent to one using just NAND gates or just NOR gates.
ii. Boolean expressions and logic networks correspond to labelled acyclic diagraphs.
iii. No two Boolean algebras with n atoms are isomorphic.
iv. Non-zero elements of finite Boolean algebras are not uniquely expressible as joins of atoms
A. i and iv only B. i, ii and iii only C. i and ii only D. ii, iii, and iv only
ugcnetcse-dec2018-paper2 digital-logic
A. B. C. D.
ugcnetcse-dec2018-paper2 digital-logic
Answer key☟
A. ’s complement B. ’s complement
C. ’s complement D. ’s complement
ugcnetcse-dec2018-paper2 digital-logic
Answer key☟
i.
ii.
A. (i) is true and (ii) is false B. (i) is false and (ii) is true
C. Both (i) and (ii) are true D. Both (i) and (ii) are false
ugcnetcse-dec2018-paper2 digital-logic
Answer key☟
Find the boolean expression for the logic circuit shown below:
A. B.
C. D.
ugcnetcse-dec2018-paper2 digital-logic
Answer key☟
Answer key☟
A. B.
C. D.
ugcnetcse-june2013-paper3 digital-logic
Answer key☟
A. B.
C. D.
ugcnetcse-june2009-paper2
Answer key☟
A. B.
C. D.
ugcnetcse-june2016-paper2 digital-logic
Answer key☟
A. B. C. D.
ugcnetcse-june2016-paper2 digital-logic
Answer key☟
Answer key☟
A. x y B. x y C. x y D. x y
ugcnetcse-dec2013-paper3 digital-logic
Answer key☟
Synchronization is achieved by a timing device called a ______ which generates a periodic train of
__________.
Answer key☟
of a component is defined as
ugcnetcse-dec2013-paper2 digital-logic
Answer key☟
In order to build a counter, the minimum number of flip flops needed is equal to :
A. B. C. D.
ugcnetcse-dec2007-paper2
Answer key☟
6.1 Adder (3) top☝
6.1.1 Adder: UGC NET CSE | August 2016 | Part 2 | Question: 10 top☝
A. B.
C. D.
ugcnetcse-aug2016-paper2 digital-logic adder
Answer key☟
6.1.2 Adder: UGC NET CSE | December 2013 | Part 2 | Question: 40 top☝
I. A circuit that adds two bits, producing a sum bit and carry bit is called half adder.
II. A circuit that adds two bits, producing a sum bit and carry bit is called full adder.
III. A circuit that adds two bits and a carry bit producing a sum bit and a carry bit is called full adder.
IV. A device that accepts the value of a Boolean variable as input and produces its complement is called an
inverter.
A. I & II B. II & III C. I, II, III D. I, III & IV
ugcnetcse-dec2013-paper2 digital-logic adder
Answer key☟
6.1.3 Adder: UGC NET CSE | December 2014 | Part 2 | Question: 06 top☝
A. full adders and half adders B. full adders and half adders
C. full adders and half adders D. full adders and half adders
ugcnetcse-dec2014-paper2 digital-logic adder
Answer key☟
6.2.1 Boolean Algebra: UGC NET CSE | December 2009 | Part 2 | Question: 06 top☝
(A) X + Y + ZX + Y
(B) XY – YZ
(C) X + YZ
(D) XZ + Y
Answer key☟
6.2.2 Boolean Algebra: UGC NET CSE | June 2009 | Part 2 | Question: 03 top☝
Answer key☟
6.2.3 Boolean Algebra: UGC NET CSE | June 2011 | Part 2 | Question: 4 top☝
A. B.
C. D. None of the above
digital-logic boolean-algebra ugcnetcse-june2011-paper2
Answer key☟
6.2.4 Boolean Algebra: UGC NET CSE | June 2013 | Part 2 | Question: 41 top☝
A. B. C. D.
ugcnetcse-june2013-paper2 digital-logic boolean-algebra
Answer key☟
6.2.5 Boolean Algebra: UGC NET CSE | June 2014 | Part 2 | Question: 16 top☝
How many different truth tables of the compound propositions are there that involve the propositions & ?
A. B. C. D.
ugcnetcse-june2014-paper2 digital-logic boolean-algebra
Answer key☟
6.2.6 Boolean Algebra: UGC NET CSE | June 2014 | Part 2 | Question: 17 top☝
A. B. C. D.
ugcnetcse-june2014-paper2 digital-logic boolean-algebra
Answer key☟
6.2.7 Boolean Algebra: UGC NET CSE | Junet 2015 | Part 2 | Question: 6 top☝
a. Boolean expressions b.
andOptimal
logic gates
boolean
networks
expressions
c.correspond
Choosing
may essential
not
to labelled
correspondWhich
blocks
acyclic
to
first inofathese
simplest
digraphs statement(s)
Karnaugh
networks. is/aregreedily
map and then correct?
choosing the la
Answer key☟
6.2.8 Boolean Algebra: UGC NET CSE | October 2020 | Part 2 | Question: 42 top☝
6.3.1 Boolean Function: UGC NET CSE | June 2013 | Part 3 | Question: 45 top☝
A. B.
C. D.
ugcnetcse-june2013-paper3 digital-logic boolean-function
Answer key☟
6.4.1 Circuit Output: UGC NET CSE | December 2012 | Part 2 | Question: 1 top☝
Consider the circuit shown below. IN a certain steady state, ‘Y’ is at logical ‘l’. What are the possible values
of A, B, C?
Answer key☟
6.5.1 Combinational Circuit: UGC NET CSE | August 2016 | Part 2 | Question: 9 top☝
Which of the following logic operations is performed by the following given combinational circuit ?
Answer key☟
6.5.2 Combinational Circuit: UGC NET CSE | August 2016 | Part 3 | Question: 6 top☝
is :
A. B.
C. D.
ugcnetcse-aug2016-paper3 digital-logic combinational-circuit
Answer key☟
6.5.3 Combinational Circuit: UGC NET CSE | July 2018 | Part 2 | Question: 93 top☝
A. B.
C. D.
ugcnetcse-july2018-paper2 digital-logic combinational-circuit
Answer key☟
6.6.1 Digital Circuits: UGC NET CSE | August 2016 | Part 3 | Question: 65 top☝
A. (a) and (b) B. (b) and (c) C. (c), (d) and (e) D. (d) and (e)
ugcnetcse-aug2016-paper3 digital-logic digital-circuits
Answer key☟
6.6.2 Digital Circuits: UGC NET CSE | December 2008 | Part 2 | Question: 4 top☝
Extremely low power dissipation and low cost per gate can be achieved in:
6.6.3 Digital Circuits: UGC NET CSE | December 2008 | Part 2 | Question: 5 top☝
1. gate
2. gate
3. gate
4. gate
Answer key☟
6.6.4 Digital Circuits: UGC NET CSE | December 2010 | Part 2 | Question: 7 top☝
is equivalent to
A. B.
C. D.
ugcnetcse-dec2010-paper2 digital-logic digital-circuits
Answer key☟
6.6.5 Digital Circuits: UGC NET CSE | December 2012 | Part 2 | Question: 38 top☝
A. B.
C. D.
ugcnetcse-dec2012-paper2 digital-logic digital-circuits
Answer key☟
6.6.6 Digital Circuits: UGC NET CSE | December 2012 | Part 2 | Question: 47 top☝
A. B.
C. D.
ugcnetcse-dec2012-paper2 digital-logic digital-circuits
Answer key☟
6.6.7 Digital Circuits: UGC NET CSE | December 2012 | Part 2 | Question: 49 top☝
Answer key☟
6.6.8 Digital Circuits: UGC NET CSE | January 2017 | Part 2 | Question: 7 top☝
ECL is the fastest of all logic families. High speed in ECL is possible because transistors are used in
difference amplifier configuration, in which they are never driven into ________.
Answer key☟
6.6.9 Digital Circuits: UGC NET CSE | June 2010 | Part 2 | Question: 6 top☝
The logic expression for the output of the circuit shown in the figure is
A. B.
C. D.
ugcnetcse-june2010-paper2 digital-logic digital-circuits
Answer key☟
6.6.10 Digital Circuits: UGC NET CSE | June 2010 | Part 2 | Question: 8 top☝
What is the transitive voltage for the voltage input of a CMOS operating from supply ?
A. B. C. D.
ugcnetcse-june2010-paper2 digital-logic digital-circuits
6.6.11 Digital Circuits: UGC NET CSE | September 2013 | Part 2 | Question: 23 top☝
Which one of the following set of gates is best suited for ‘parity’ checking and ‘parity’ generation?
A. AND, OR, NOT B. NAND, NOR C. EX-OR, EX-NOR D. None of the above
ugcnetsep2013ii digital-logic digital-circuits
Answer key☟
6.7.1 Digital Counter: UGC NET CSE | June 2019 | Part 2 | Question: 15 top☝
What will be the number of states when a MOD- counter is followed by a MOD- counter?
A. B. C. D.
ugcnetcse-june2019-paper2 digital-counter
Answer key☟
6.8.1 Dual Function: UGC NET CSE | December 2008 | Part 2 | Question: 13 top☝
A. B.
C. D.
ugcnetcse-dec2008-paper2 digital-logic dual-function
Answer key☟
6.8.2 Dual Function: UGC NET CSE | December 2013 | Part 2 | Question: 31 top☝
Answer key☟
6.9.1 Encoding: UGC NET CSE | June 2014 | Part 2 | Question: 37 top☝
A. B. C. D.
ugcnetcse-june2014-paper2 computer-networks encoding
Answer key☟
6.10.1 Excess 3: UGC NET CSE | December 2014 | Part 2 | Question: 07 top☝
Answer key☟
6.11.1 Flip Flop: UGC NET CSE | December 2008 | Part 2 | Question: 14 top☝
A. = B. = C. = D. =
ugcnetcse-dec2008-paper2 digital-logic flip-flop
Answer key☟
6.11.2 Flip Flop: UGC NET CSE | December 2010 | Part 2 | Question: 8 top☝
Answer key☟
6.11.3 Flip Flop: UGC NET CSE | January 2017 | Part 2 | Question: 8 top☝
A binary -bit down counter uses - flip-flops, with inputs , and outputs , =
respectively. The minimized expression for the input from following is :
I.
II.
III.
IV.
V.
VI.
Answer key☟
6.11.4 Flip Flop: UGC NET CSE | July 2018 | Part 2 | Question: 92 top☝
In flip-flop, the output of the flip-flop at time same as the output at time , after the occurrence of
a clock pulse if :
A. B. C. D.
ugcnetcse-july2018-paper2 digital-logic flip-flop
Answer key☟
6.11.5 Flip Flop: UGC NET CSE | June 2016 | Part 2 | Question: 10 top☝
In a positive edge triggered - flip flop , if and both are high then the output will be ______on the
rising edge of the clock :
Answer key☟
6.11.6 Flip Flop: UGC NET CSE | September 2013 | Part 3 | Question: 34 top☝
The power dissipation of a flip-flop is mW. The power dissipation of a digital system with flip-flops is
given by :
A. mW B. mW C. mW D. mW
ugcnetcse-sep2013-paper3 digital-logic flip-flop
Answer key☟
6.11.7 Flip Flop: UGC NET CSE | September 2013 | Part 3 | Question: 35 top☝
An Astable multi vibrator using the timer to generate a square wave of KHz with duty cycle will
have :
A.
B.
C.
D.
Answer key☟
6.12.1 Floating Point Representation: UGC NET CSE | December 2014 | Part 2 | Question: 09 top☝
The range of representable normalized numbers in the floating point binary fractional representation in a -
bit word with -bit sign, -bit excess biased exponent and -bit mantissa is :
A. to B. to
C. to D. to
ugcnetcse-dec2014-paper2 digital-logic floating-point-representation
Answer key☟
6.12.2 Floating Point Representation: UGC NET CSE | December 2018 | Part 2 | Question: 16 top☝
The decimal floating point number represented using -bit representation and written in
hexadecimal form is
A. B. C. D.
ugcnetcse-dec2018-paper2 digital-logic number-representation floating-point-representation
Answer key☟
6.13.1 Full Adder: UGC NET CSE | Junet 2015 | Part 2 | Question: 7 top☝
Answer key☟
6.14.1 Ieee Representation: UGC NET CSE | June 2016 | Part 2 | Question: 7 top☝
The double precision format to represent floating point numbers, has a length of ______ bits.
A. B. C. D.
ugcnetcse-june2016-paper2 digital-logic ieee-representation
Answer key☟
6.14.2 Ieee Representation: UGC NET CSE | September 2013 | Part 2 | Question: 7 top☝
The single-precision and double-precision format to represent floating-point numbers, has a length of
______ and ________ respectively.
Answer key☟
6.15.1 K Map: UGC NET CSE | August 2016 | Part 2 | Question: 8 top☝
A. B.
C. D.
ugcnetcse-aug2016-paper2 digital-logic k-map
Answer key☟
6.15.2 K Map: UGC NET CSE | July 2018 | Part 2 | Question: 99 top☝
A. B.
C. D.
ugcnetcse-july2018-paper2 digital-logic k-map
Answer key☟
6.15.3 K Map: UGC NET CSE | June 2010 | Part 2 | Question: 10 top☝
Answer key☟
6.16.1 Logic Circuit Diagram: UGC NET CSE | September 2013 | Part 2 | Question: 49 top☝
A. B. C. D.
ugcnetsep2013ii digital-logic logic-circuit-diagram
Answer key☟
6.17.1 Memory: UGC NET CSE | December 2009 | Part 2 | Question: 08 top☝
A. B. C. D.
ugcnetcse-dec2009-paper2 digital-logic memory
6.18.1 Multiplexer: UGC NET CSE | December 2008 | Part 2 | Question: 15 top☝
A. input
B. input
C. input
D. input
Answer key☟
6.18.2 Multiplexer: UGC NET CSE | June 2009 | Part 2 | Question: 05 top☝
Answer key☟
6.18.3 Multiplexer: UGC NET CSE | June 2012 | Part 3 | Question: 53 top☝
Consider the below circuit and find the output function f(x, y, z)
A. B.
C. D.
ugcnetcse-june2012-paper3 digital-logic multiplexer
Answer key☟
6.18.4 Multiplexer: UGC NET CSE | June 2014 | Part 3 | Question: 68 top☝
A terminal multiplexer has six bps terminals and bps terminals connected to it. If the outgoing
line is bps, what is the value of ?
A. B. C. D.
ugcnetjune2014iii digital-logic multiplexer
Answer key☟
6.19.1 Number Representation: UGC NET CSE | August 2016 | Part 2 | Question: 6 top☝
A. and B. and
C. and D. and
ugcnetcse-aug2016-paper2 digital-logic number-representation
Answer key☟
6.19.2 Number Representation: UGC NET CSE | August 2016 | Part 2 | Question: 7 top☝
Which of the following is the most efficient to perform arithmetic operations on the numbers ?
A. Sign-magnitude B. complement
C. complement D. complement
ugcnetcse-aug2016-paper2 digital-logic number-representation
Answer key☟
6.19.3 Number Representation: UGC NET CSE | December 2009 | Part 2 | Question: 09 top☝
(A) 150
(B) 241
(C) 142
(D) 101011110
Answer key☟
6.19.4 Number Representation: UGC NET CSE | December 2009 | Part 2 | Question: 10 top☝
(A) 8
(B) 9
(C) 10
(D) 11
Answer key☟
6.19.5 Number Representation: UGC NET CSE | December 2010 | Part 2 | Question: 6 top☝
A. B. C. D.
ugcnetcse-dec2010-paper2 digital-logic number-representation
Answer key☟
6.19.6 Number Representation: UGC NET CSE | December 2010 | Part 2 | Question: 9 top☝
-bit complement of is
A. B.
C. D.
ugcnetcse-dec2010-paper2 digital-logic number-representation
Answer key☟
6.19.7 Number Representation: UGC NET CSE | July 2018 | Part 2 | Question: 95 top☝
A. D24 B. 1 B D C. 1 A E D. 1 A D
ugcnetcse-july2018-paper2 digital-logic number-representation
Answer key☟
6.19.8 Number Representation: UGC NET CSE | July 2018 | Part 2 | Question: 96 top☝
Perform the following operation for the binary equivalent of the decimal numbers . The
solution in 8 bit representation is
Answer key☟
6.19.9 Number Representation: UGC NET CSE | June 2009 | Part 2 | Question: 13 top☝
A. B. C. D.
ugcnetcse-june2009-paper2 number-representation
Answer key☟
6.19.10 Number Representation: UGC NET CSE | June 2012 | Part 2 | Question: 35 top☝
If an integer needs two bytes of storage, then the maximum value of signed integer is
A. B. C. D.
digital-logic number-representation ugcnetcse-june2012-paper2
Answer key☟
6.19.11 Number Representation: UGC NET CSE | June 2014 | Part 2 | Question: 18 top☝
A. & B. & C. D.
ugcnetcse-june2014-paper2 digital-logic number-representation
Answer key☟
6.19.12 Number Representation: UGC NET CSE | November 2017 | Part 2 | Question: 7 top☝
A. B. C. D.
ugcnetcse-nov2017-paper2 number-representation
Answer key☟
6.20.1 Number System: UGC NET CSE | December 2013 | Part 2 | Question: 32 top☝
Given that in some number system . The base of that number system is
Answer key☟
6.20.2 Number System: UGC NET CSE | January 2017 | Part 2 | Question: 10 top☝
A. B. C. D.
ugcnetjan2017ii digital-logic number-system
Answer key☟
6.20.3 Number System: UGC NET CSE | January 2017 | Part 2 | Question: 15 top☝
A. B. C. D.
ugcnetjan2017ii digital-logic number-system
Answer key☟
6.20.4 Number System: UGC NET CSE | January 2017 | Part 2 | Question: 9 top☝
A. B. C. D.
ugcnetjan2017ii digital-logic number-system
Answer key☟
6.20.5 Number System: UGC NET CSE | June 2019 | Part 2 | Question: 18 top☝
A. B. C. D.
ugcnetcse-june2019-paper2 number-system
Answer key☟
6.20.6 Number System: UGC NET CSE | Junet 2015 | Part 3 | Question: 4 top☝
Answer key☟
6.21.1 Number Theory: UGC NET CSE | June 2010 | Part 2 | Question: 9 top☝
A. B. C. D.
ugcnetcse-june2010-paper2 digital-logic number-theory
Answer key☟
6.22.1 Priority Encoder: UGC NET CSE | June 2019 | Part 2 | Question: 17 top☝
The parallel bus arbitration technique uses an external priority encoder and a decoder. Suppose, a parallel
arbiter has bus arbiters. What will be the size of priority encoder and decoder respectively?
A. B.
C. D.
ugcnetcse-june2019-paper2 priority-encoder
Answer key☟
6.23.1 Ripple Counter Operation: UGC NET CSE | August 2016 | Part 3 | Question: 1 top☝
A ripple counter is a :
6.23.2 Ripple Counter Operation: UGC NET CSE | July 2018 | Part 2 | Question: 94 top☝
Answer key☟
6.23.3 Ripple Counter Operation: UGC NET CSE | September 2013 | Part 3 | Question: 36 top☝
A binary ripple counter is required to count up to 16383. How many flip-flops are required?
6.24.1 Rom: UGC NET CSE | December 2014 | Part 2 | Question: 10 top☝
The size of the required to build an 8-bit adder / subtractor with mode control, carry input, carry
output and two's complement overflow output is given as
A. B.
C. D.
ugcnetcse-dec2014-paper2 digital-logic rom
Answer key☟
6.25.1 Sequential Circuit: UGC NET CSE | June 2009 | Part 2 | Question: 14 top☝
A reduced state table has rows. The minimum number of Flip-flops needed to implement the sequential
machine is :
A. B. C. D.
ugcnetcse-june2009-paper2 digital-logic sequential-circuit
Answer key☟
6.25.2 Sequential Circuit: UGC NET CSE | June 2010 | Part 2 | Question: 7 top☝
Answer key☟
6.25.3 Sequential Circuit: UGC NET CSE | June 2014 | Part 3 | Question: 42 top☝
Answer key☟
6.25.4 Sequential Circuit: UGC NET CSE | June 2014 | Part 3 | Question: 44 top☝
A. flip-flop B. flip-flop
C. Master-slave flip-flop D. None of the above
ugcnetjune2014iii digital-logic sequential-circuit flip-flop
Answer key☟
6.25.5 Sequential Circuit: UGC NET CSE | June 2016 | Part 3 | Question: 1 top☝
Answer key☟
6.25.6 Sequential Circuit: UGC NET CSE | Junet 2015 | Part 3 | Question: 6 top☝
A. 8 B. 9 C. 27 D. 11
ugcnetcse-june2015-paper3 digital-logic sequential-circuit flip-flop
Answer key☟
6.26.1 Sum Of Product: UGC NET CSE | December 2013 | Part 2 | Question: 33 top☝
A.
B.
C.
D.
Answer key☟
6.27.1 Unix: UGC NET CSE | December 2015 | Part 3 | Question: 40 top☝
ugcnetcse-dec2015-paper3 unix
Answer key☟
Answer Keys
6.0.1 C 6.0.2 Q-Q 6.0.3 Q-Q 6.0.4 Q-Q 6.0.5 Q-Q
6.0.6 Q-Q 6.0.7 Q-Q 6.0.8 Q-Q 6.0.9 D 6.0.10 Q-Q
6.0.11 C 6.0.12 A 6.0.13 C 6.0.14 Q-Q 6.0.15 C
6.0.16 A 6.0.17 C 6.0.18 C 6.0.19 A 6.0.20 A
6.0.21 Q-Q 6.1.1 Q-Q 6.1.2 D 6.1.3 D 6.2.1 Q-Q
6.2.2 Q-Q 6.2.3 C 6.2.4 D 6.2.5 D 6.2.6 D
6.2.7 D 6.2.8 D 6.3.1 A 6.4.1 A;D 6.5.1 Q-Q
6.5.2 Q-Q 6.5.3 Q-Q 6.6.1 Q-Q 6.6.2 Q-Q 6.6.3 Q-Q
6.6.4 Q-Q 6.6.5 A 6.6.6 A 6.6.7 B;D 6.6.8 B
6.6.9 Q-Q 6.6.10 Q-Q 6.6.11 C 6.7.1 B 6.8.1 Q-Q
6.8.2 C 6.9.1 B 6.10.1 A OR C 6.11.1 Q-Q 6.11.2 Q-Q
6.11.3 D 6.11.4 Q-Q 6.11.5 D 6.11.6 D 6.11.7 X
6.12.1 D 6.12.2 Q-Q 6.13.1 A 6.14.1 D 6.14.2 C
6.15.1 Q-Q 6.15.2 Q-Q 6.15.3 Q-Q 6.16.1 B 6.17.1 Q-Q
6.18.1 Q-Q 6.18.2 Q-Q 6.18.3 A 6.18.4 B 6.19.1 Q-Q
6.19.2 Q-Q 6.19.3 Q-Q 6.19.4 Q-Q 6.19.5 Q-Q 6.19.6 Q-Q
6.19.7 Q-Q 6.19.8 Q-Q 6.19.9 Q-Q 6.19.10 B 6.19.11 C
6.19.12 B 6.20.1 D 6.20.2 C 6.20.3 B 6.20.4 A
6.20.5 B 6.20.6 C 6.21.1 Q-Q 6.22.1 D 6.23.1 Q-Q
6.23.2 Q-Q 6.23.3 D 6.24.1 B 6.25.1 Q-Q 6.25.2 Q-Q
6.25.3 C 6.25.4 C 6.25.5 C 6.25.6 B 6.26.1 D
6.27.1 D
7 Discrete Mathematics: Combinatory (17)
The number of distinct bracelets of five beads made up of red, blue and green beads (two bracelets are
indistinguishable if the rotation of one yield another) is,
A. 243 B. 81 C. 51 D. 47
ugcnetcse-dec2012-paper3
Answer key☟
How many cards must be chosen from a deck to guarantee that at least
A. B.
C. D.
ugcnetcse-june2014-paper2 combinatory
Answer key☟
The number of ways to distribute n distinguishable objects into k distinguishable boxes, so that objects
are placed into box , equals which of the following?
A. B.
C. D.
ugcnetcse-dec2012-paper3 discrete-mathematics combinatory
Answer key☟
lamps are to be connected to a single electric outlet by using an extension board each of which has four
outlets. The number of extension boards needed to connect all the light is
A. B. C. D.
ugcnetcse-dec2012-paper3 combinatory
Answer key☟
A. B.
C. D.
ugcnetcse-dec2013-paper2 discrete-mathematics combinatory
Answer key☟
How many committees of five people can be chosen from 20 men and 12 women such that each committee
contains at least three women
A. 75240 B. 52492 C. 41800 D. 9900
combinatory ugcnetcse-dec2015-paper2
Answer key☟
How many ways are there to pack six copies of the same book into four identical boxes, where a box can
contain as many as six books?
A. B. C. D.
ugcnetcse-oct2020-paper2 discrete-mathematics combinatory
Answer key☟
How many ways are there to place indistinguishable balls into four distinguishable bins?
A. B. C. D.
ugcnetcse-june2019-paper2 combinatory
Answer key☟
7.1.1 Binary Tree: UGC NET CSE | June 2016 | Part 3 | Question: 31 top☝
A. 6 B. 42 C. 132 D. 256
ugcnetcse-june2016-paper3 combinatory binary-tree
Answer key☟
7.2.1 Counting: UGC NET CSE | December 2018 | Part 2 | Question: 33 top☝
is
A. B. C. D.
Answer key☟
7.2.2 Counting: UGC NET CSE | Junet 2015 | Part 2 | Question: 1 top☝
How many strings of digits have the property that the sum of their digits is ?
A. B. C. D.
ugcnetcse-june2015-paper2 discrete-mathematics counting
Answer key☟
7.2.3 Counting: UGC NET CSE | Junet 2015 | Part 2 | Question: 3 top☝
In how many ways can indistinguishable fish be placed into different ponds, so that each pond contains
at least one fish?
A. B. C. D.
ugcnetcse-june2015-paper2 combinatory counting
Answer key☟
7.3.1 Euler Phi Function: UGC NET CSE | June 2019 | Part 2 | Question: 63 top☝
where runs over all the primes dividing . What is the value of ?
A. B. C. D.
ugcnetcse-june2019-paper2 euler-phi-function
Answer key☟
7.4.1 Inclusion Exclusion: UGC NET CSE | June 2019 | Part 2 | Question: 3 top☝
How many bit strings of length ten either start with a bit or end with two bits ?
A. B. C. D.
ugcnetcse-june2019-paper2 combinatory inclusion-exclusion
Answer key☟
7.5.1 Parenthesization: UGC NET CSE | June 2016 | Part 2 | Question: 25 top☝
In how many ways can the string be fully paranthesized to yield an infix expression?
A. 15 B. 14 C. 13 D. 12
ugcnetcse-june2016-paper2 parenthesization combinatory
Answer key☟
7.6.1 Pigeonhole Principle: UGC NET CSE | June 2019 | Part 2 | Question: 7 top☝
How many cards must be selected from a standard deck of cards to guarantee that at least three hearts
are present among them?
A. B. C. D.
ugcnetcse-june2019-paper2 combinatory pigeonhole-principle
Answer key☟
7.7.1 Recurrence Relation: UGC NET CSE | December 2012 | Part 2 | Question: 10 top☝
The number of bit strings of length eight that will either start with a 1 bit and end with two bits 00 shall be
A. 32 B. 64 C. 128 D. 160
ugcnetcse-dec2012-paper2 combinatory recurrence-relation
Answer key☟
Answer Keys
7.0.1 C 7.0.2 A 7.0.3 C 7.0.4 D 7.0.5 A
7.0.6 B 7.0.7 D 7.0.8 B 7.1.1 C 7.2.1 D
7.2.2 B 7.2.3 A 7.3.1 D 7.4.1 C 7.5.1 B
7.6.1 D 7.7.1 D
8 Discrete Mathematics: Graph Theory (46)
A. B. C. D.
ugcnetcse-dec2007-paper2
Answer key☟
Weighted graph :
Answer key☟
a. A connected multigraph
b. A
has
connected
an Euler multigraph
Circuit ifc.and
A
has
complete
only
an ifEuler
each
graph
Path
of its(K
but
vertices
d.not
has
A an
cycle
ahas
Hamilton
Euler
over
even
Circuit
six
degree.
Circuit
vertices
if and Codes
whenever
only :hasa3.
(C 6) ifisitnnot exactly
bipartitetwo
graph
vertices
but aofco
n)
Answer key☟
Consider a Hamiltonian Graph(G) with no loops and parallel edges. Which of the following is true with
respect to this graph (G)?
a. for each
b. vertex of c. edges for every and not connected by an edge
Answer key☟
A ____ complete subgraph and a _____ subset of vertices of a graph G=(V,E) are a clique and a vertex
cover respectively
Answer key☟
Answer key☟
The two distinct set of vertices, which make the graph bipartite are
A.
B.
C.
D.
ugcnetcse-dec2015-paper2 graph-theory
Answer key☟
When a mobile telephone physically moves from one to another cell, the base station transfers ownership to
the cell getting strongest signal. This process is known as
Answer key☟
Answer key☟
Answer key☟
1. Which of the following connected graph has exactly one spanning tree?
Answer key☟
Which one of the following is decimal value of a signed binary number 1101010, if it is in 2’s complement
form?
Answer key☟
A. edges B. edges
C. edges D. edges
ugcnetcse-dec2008-paper2 graph-theory
Answer key☟
A. B. C. D.
ugcnetcse-dec2006-paper2
Answer key☟
The following lists are the degrees of all the vertices of a graph :
i.
ii.
iii.
iv.
A. (i) and (ii) B. (iii) and (iv) C. (iii) and (ii) D. (ii) and (iv)
ugcnetcse-dec2004-paper2
Answer key☟
How many edges must be removed to produce the spanning forest of a graph with N vertices, M edges and
C connected components?
Answer key☟
For which values of and does the complete bipartite graph have a Hamiltonian circuit ?
A. B.
C. D.
ugcnetcse-june2019-paper2 graph-theory
Answer key☟
E is the number of edges in the graph and f is maximum flow in the graph. When the capacities are integers,
the runtime of Ford-Fulberson algorithm is bounded by
A. B. C. D.
ugcnetcse-july2018-paper2 graph-theory
Answer key☟
(A) No vertices
(C) ∞ vertices
ugcnetcse-dec2009-paper2 graph-theory
Answer key☟
(A) n
(D) (n^2)/2
ugcnetcse-dec2009-paper2 graph-theory
Answer key☟
8.0.22 UGC NET CSE | June 2008 | Part 2 | Question: 4 top☝
The set of positive integers under the operation of ordinary multiplication is:
(A) not a monoid (B) not a group
(C) a group (D) an Abelian group
ugcnetcse-june2008-paper2
Answer key☟
A.
B.
C.
D.
ugcnetcse-june2009-paper2
Answer key☟
8.1.1 Binary Tree: UGC NET CSE | November 2017 | Part 3 | Question: 31 top☝
Consider a full binary tree with internal nodes, internal path length , and external path length . the
internal length of a full binary tree is the sum, taken over all nodes of the tree, of the depth of each node.
Similarly, the external path length is the sum, taken over all leaves of the tree, of the depth of each leaf.
Which of the following is correct for the full binary tree?
A. B. C. D.
ugcnetcse-nov2017-paper3 data-structures binary-tree
Answer key☟
8.2.1 Euler Graph: UGC NET CSE | August 2016 | Part 2 | Question: 5 top☝
Answer key☟
8.2.2 Euler Graph: UGC NET CSE | December 2010 | Part 2 | Question: 2 top☝
An undirected graph possesses an eulerian circuit if and only if it is connected and its vertices are
A. All of even degree B. All of odd degree
C. Of any degree D. Even in number
ugcnetcse-dec2010-paper2 graph-theory euler-graph
Answer key☟
8.3.1 Flow Network: UGC NET CSE | June 2019 | Part 2 | Question: 69 top☝
Consider the following properties with respect to a flow network in which a flow is a real-valued
function :
: For all
: for all
Answer key☟
8.4.1 Graph Coloring: UGC NET CSE | January 2017 | Part 2 | Question: 5 top☝
Consider a Hamiltonian Graph with no loops or parallel edges and with . The which of
the following is true?
B.
Answer key☟
8.4.2 Graph Coloring: UGC NET CSE | June 2010 | Part 2 | Question: 4 top☝
A. B. C. D. None of these
ugcnetcse-june2010-paper2 graph-coloring
Answer key☟
8.4.3 Graph Coloring: UGC NET CSE | June 2012 | Part 2 | Question: 4 top☝
The number of colours required to properly colour the vertices of every planer graph is
A. 2 B. 3 C. 4 D. 5
ugcnetcse-june2012-paper2 graph-theory graph-coloring
Answer key☟
8.5.1 Graph Connectivity: UGC NET CSE | August 2016 | Part 2 | Question: 22 top☝
Consider an undirected graph where self-loops are not allowed. The vertex set of is
. There is an edge between and if or . The
number of edges in this graph is
A. B. C. D.
ugcnetcse-aug2016-paper2 graph-theory graph-connectivity
Answer key☟
8.5.2 Graph Connectivity: UGC NET CSE | December 2010 | Part 2 | Question: 4 top☝
A. B. C. D.
ugcnetcse-dec2010-paper2 graph-theory graph-connectivity
Answer key☟
8.5.3 Graph Connectivity: UGC NET CSE | December 2011 | Part 2 | Question: 15 top☝
McCabe’s cyclomatic metric of a graph with vertices, edges and connected component is
A. B. C. D.
ugcnetcse-dec2011-paper2 graph-theory graph-connectivity
Answer key☟
8.5.4 Graph Connectivity: UGC NET CSE | December 2011 | Part 2 | Question: 5 top☝
A. B.
C. D.
ugcnetcse-dec2011-paper2 graph-theory graph-connectivity
Answer key☟
8.5.5 Graph Connectivity: UGC NET CSE | June 2013 | Part 3 | Question: 15 top☝
Answer key☟
8.5.6 Graph Connectivity: UGC NET CSE | September 2013 | Part 2 | Question: 22 top☝
Answer key☟
8.5.7 Graph Connectivity: UGC NET CSE | September 2013 | Part 2 | Question: 8 top☝
Consider an undirected graph G with 100 nodes. The maximum number of edges to be included in G so that
the graph is not connected is
Answer key☟
8.6.1 Graph Isomorphism: UGC NET CSE | June 2014 | Part 2 | Question: 21 top☝
C. D.
A. B.
ugcnetcse-june2014-paper2 graph-theory non-gate graph-isomorphism
Answer key☟
8.7.1 Graph Planarity: UGC NET CSE | December 2012 | Part 3 | Question: 46 top☝
Two graphs A and B are shown below: Which one of the following statements is true?
Answer key☟
8.7.2 Graph Planarity: UGC NET CSE | June 2012 | Part 3 | Question: 72 top☝
and are two graphs as shown:
A. Both and are planar graphs B. Both and are not planar graphs
C. is planar and is not planar D. is not planar and is planar
ugcnetcse-june2012-paper3 graph-theory graph-planarity
Answer key☟
8.8.1 Hamiltonian Graph: UGC NET CSE | June 2014 | Part 2 | Question: 23 top☝
Consider a complete bipartite graph . For which values of and does this, complete graph have a
Hamilton circuit
A. B.
C. D.
ugcnetcse-june2014-paper2 graph-theory hamiltonian-graph
Answer key☟
8.9.1 Handshaking Theorem: UGC NET CSE | June 2019 | Part 2 | Question: 4 top☝
Suppose that a connected planar graph has six vertices, each of degree four. Into how many regions is the
plane divided by a planar representation of this graph?
A. B. C. D.
ugcnetcse-june2019-paper2 graph-planarity handshaking-theorem
Answer key☟
8.10.1 Minimum Spanning Tree: UGC NET CSE | Junet 2015 | Part 2 | Question: 21 top☝
A.
B. C. D.
ugcnetcse-june2015-paper2 graph-theory minimum-spanning-tree
Answer key☟
8.11.1 Non Planar: UGC NET CSE | December 2013 | Part 2 | Question: 39 top☝
A. B.
C. D.
ugcnetcse-dec2013-paper2 graph-theory non-planar
Answer key☟
8.12.1 Tree: UGC NET CSE | December 2012 | Part 2 | Question: 33 top☝
Using the property of eccentricity of a vertex, find every vertex that is the centre of the given tree:
Answer key☟
8.12.2 Tree: UGC NET CSE | December 2013 | Part 2 | Question: 36 top☝
How many edges are there in a forest of t-trees containing a total of n vertices ?
A. n + t B. n – t C. n ∗ t D. nt
ugcnetcse-dec2013-paper2 data-structures tree
Answer key☟
Answer Keys
8.0.1 Q-Q 8.0.2 Q-Q 8.0.3 D 8.0.4 D 8.0.5 C
8.0.6 C 8.0.7 C 8.0.8 A 8.0.9 B 8.0.10 B
8.0.11 D 8.0.12 B 8.0.13 Q-Q 8.0.14 Q-Q 8.0.15 Q-Q
8.0.16 C 8.0.17 Q-Q 8.0.18 C 8.0.19 Q-Q 8.0.20 Q-Q
8.0.21 Q-Q 8.0.22 Q-Q 8.0.23 Q-Q 8.1.1 B 8.2.1 Q-Q
8.2.2 Q-Q 8.3.1 A 8.4.1 D 8.4.2 Q-Q 8.4.3 C
8.5.1 Q-Q 8.5.2 Q-Q 8.5.3 D 8.5.4 D 8.5.5 C
8.5.6 B 8.5.7 C 8.6.1 C 8.7.1 A 8.7.2 D
8.8.1 C 8.9.1 B 8.10.1 B 8.11.1 C 8.12.1 D
8.12.2 B
9 Discrete Mathematics: Mathematical Logic (30)
Which of the following shall be a compound proposition involving the propositions p, q and r, that is true
when exactly two of the p, q and r are true and is false otherwise?
A.
B.
C.
D.
ugcnetcse-june2013-paper2
Answer key☟
A.
B.
C.
D.
ugcnetcse-june2015-paper3 mathematical-logic
Answer key☟
A. True and False B. False and True C. False and False D. True and True
ugcnetcse-june2013-paper2
Answer key☟
Codes:
ugcnetjan2017ii mathematical-logic
Answer key☟
The tracing model in Prolog describes program execution in terms of certain events. These events are
________ predicate calculus allows quantified variables to refer to objects in the domain of discourse and
not to predicates or functions.
A. Zero-order B. First-order
C. Second-order D. High-order
ugcnetjune2014iii discrete-mathematics mathematical-logic
Answer key☟
Answer key☟
Match List-I with List-II and choose the correct answer from the code given below :
Answer key☟
"If my computations are correct and I pay the electric bill, then I will run out of money. If I don't pay the
electric bill, the power will be turned off. Therefore, If I don't run out of money and the power is still on then
my computations are incorrect."
Convert this argument into logical notations using the variables for propositions of computations, electric
bills, out of money and the power respectively. (Where means NOT).
A.
B.
C.
D.
ugcnetcse-june2015-paper2 mathematical-logic
Answer key☟
A. B.
C. D.
ugcnetcse-nov2017-paper2 discrete-mathematics mathematical-logic
Answer key☟
A. ˄˅x2˅x1¬x1¬x1 B. (x2˅¬x2)˄(x1˅x2)
C. (¬x1˅x2)˄(¬x1˅x2) D. None
ugcnetcse-june2009-paper2
Answer key☟
is
A. B.
C. D.
ugcnetcse-dec2014-paper3 mathematical-logic
Answer key☟
Answer key☟
A. B.
C. D.
ugcnetcse-dec2014-paper3 mathematical-logic
Answer key☟
The first order logic (FOL) statement is equivalent to which of the following?
A.
B.
C.
D.
Answer key☟
9.1.2 First Order Logic: UGC NET CSE | June 2014 | Part 2 | Question: 19 top☝
The notation denotes the proposition “there exists a unique such that is true”. Give the
truth values of the following statements :
I.
II.
Answer key☟
9.1.3 First Order Logic: UGC NET CSE | September 2013 | Part 3 | Question: 1 top☝
Which of the following is a correct predicate logic statement for “Every Natural number has one successor”?
A.
B.
C.
D.
first-order-logic ugcnetcse-sep2013-paper3
Answer key☟
9.2.1 Functions: UGC NET CSE | July 2018 | Part 2 | Question: 87 top☝
A. B.
C. D.
ugcnetcse-july2018-paper2 discrete-mathematics functions
Answer key☟
9.3.1 Prolog: UGC NET CSE | December 2015 | Part 3 | Question: 7 top☝
How many atoms are matched to the variable 'X' before the query father(X, Jane) reports a Result?
A. B. C. D.
ugcnetcse-dec2015-paper3 mathematical-logic prolog non-gate
Answer key☟
9.4.1 Propositional Logic: UGC NET CSE | December 2006 | Part 2 | Question: 2 top☝
A. B. C. D.
Answer key☟
9.4.2 Propositional Logic: UGC NET CSE | December 2013 | Part 2 | Question: 34 top☝
Let P(m,n) be the statement "m divides n" where the universe of discourse for both the variable is the set of
positive integers. Determine the truth values of each of the following propositions:
I. ,
II.
A. Both I and II are true B. Both I and II are false
C. I-false & II-true D. I-true& II-false
ugcnetcse-dec2013-paper2 discrete-mathematics propositional-logic
Answer key☟
9.4.3 Propositional Logic: UGC NET CSE | December 2015 | Part 3 | Question: 44 top☝
A. B.
C. D.
ugcnetcse-dec2015-paper3 propositional-logic mathematical-logic
Answer key☟
9.4.4 Propositional Logic: UGC NET CSE | January 2017 | Part 2 | Question: 6 top☝
is the premise :
A. B. C. D.
ugcnetjan2017ii discrete-mathematics propositional-logic
Answer key☟
9.4.5 Propositional Logic: UGC NET CSE | January 2017 | Part 3 | Question: 59 top☝
Answer key☟
9.4.6 Propositional Logic: UGC NET CSE | June 2014 | Part 2 | Question: 20 top☝
Give a compound proposition involving propositions and that is true when exactly two of and
are true and is false otherwise
A.
B.
C.
D.
Answer key☟
9.4.7 Propositional Logic: UGC NET CSE | June 2019 | Part 2 | Question: 6 top☝
A. B.
C. D.
ugcnetcse-june2019-paper2 propositional-logic
Answer key☟
9.4.8 Propositional Logic: UGC NET CSE | June 2019 | Part 2 | Question: 8 top☝
ugcnetcse-june2019-paper2 propositional-logic
Answer key☟
9.4.9 Propositional Logic: UGC NET CSE | Junet 2015 | Part 2 | Question: 10 top☝
Answer key☟
9.4.10 Propositional Logic: UGC NET CSE | Junet 2015 | Part 2 | Question: 9 top☝
A. B.
C. D.
ugcnetcse-june2015-paper2 mathematical-logic propositional-logic
Answer key☟
9.4.11 Propositional Logic: UGC NET CSE | September 2013 | Part 2 | Question: 24 top☝
The quantification denotes the proposition “There exists a unique x such that P(x) is true”, express
he quantification using universal and existential quantifications and logical operators?
A.
B.
C.
D.
Answer key☟
Answer Keys
9.0.1 C 9.0.2 A 9.0.3 D 9.0.4 A 9.0.5 D
9.0.6 B 9.0.7 A 9.0.8 D 9.0.9 A 9.0.10 A;B
9.0.11 Q-Q 9.0.12 C 9.0.13 X 9.0.14 B 9.1.1 B
9.1.2 A 9.1.3 A 9.2.1 Q-Q 9.3.1 A 9.4.1 Q-Q
9.4.2 C 9.4.3 B 9.4.4 D 9.4.5 B 9.4.6 D
9.4.7 A 9.4.8 D 9.4.9 C 9.4.10 A 9.4.11 C
10 Discrete Mathematics: Set Theory & Algebra (19)
Find the zero-one matrix of the transitive closure of the relation given by the matrix :
A.
B.
C.
D.
ugcnetcse-june2019-paper2 set-theory&algebra
Answer key☟
If then is :
A. B. C. D. None of these
ugcnetcse-dec2004-paper2
Answer key☟
How many difference equivalence relations with exactly three different equivalence classes are there on a
set with five elements?
A. 10 B. 15 C. 25 D. 30
ugcnetcse-june2016-paper2 discrete-mathematics set-theory&algebra
Answer key☟
10.1.1 Boolean: UGC NET CSE | June 2019 | Part 2 | Question: 13 top☝
A. B. C. D.
ugcnetcse-june2019-paper2 boolean function
Answer key☟
Given
A. B.
C. D.
ugcnetjune2014iii fuzzy-set complement-in-fuzzy-set
Answer key☟
10.3.1 Euler Phi Function: UGC NET CSE | June 2019 | Part 2 | Question: 70 top☝
Answer key☟
10.4.1 Factors: UGC NET CSE | January 2017 | Part 2 | Question: 4 top☝
How many multiples of are there between the following pairs of numbers?
Answer key☟
10.5.1 Function Composition: UGC NET CSE | December 2013 | Part 2 | Question: 37 top☝
Let f and g be the functions from the set of integers defined by and . Then
the composition of f and g and g and f is given as
Answer key☟
10.6.1 Functions: UGC NET CSE | December 2014 | Part 2 | Question: 05 top☝
A. and B. and
C. and D. and
ugcnetcse-dec2014-paper2 discrete-mathematics functions
Answer key☟
10.6.2 Functions: UGC NET CSE | January 2017 | Part 2 | Question: 3 top☝
A. and
B. and
C. and
D. and
Answer key☟
10.6.3 Functions: UGC NET CSE | September 2013 | Part 2 | Question: 25 top☝
If F and G are Boolean functions of degree n. Then, which of the following is true?
A. F F + G and F G F B. G F + G and F G G
C. F F + G and F G F D. G F + G and F G F
functions ugcnetsep2013ii
Answer key☟
10.7.1 Inclusion Exclusion: UGC NET CSE | October 2020 | Part 2 | Question: 1 top☝
The number of positive integers not exceeding that are either odd or the square of an integer is
_______
A. B. C. D.
ugcnetcse-oct2020-paper2 discrete-mathematics inclusion-exclusion
Answer key☟
10.8.1 Poset: UGC NET CSE | June 2019 | Part 2 | Question: 1 top☝
Answer key☟
A. B.
C. D.
ugcnetcse-dec2012-paper2 set-theory&algebra set-theory power-set
Answer key☟
10.10.1 Relational Algebra: UGC NET CSE | December 2008 | Part 2 | Question: 12 top☝
1. reflexive
2. symmetric
3. transitive
4. not reflexive, not symmetric and not transitive
Answer key☟
10.11.1 Relations: UGC NET CSE | December 2009 | Part 2 | Question: 01 top☝
If she is my friend and you are her friend, then we are friends. Given this, the friend relationship in this
context is ____________.
(B) (iii)
Answer key☟
10.11.2 Relations: UGC NET CSE | June 2010 | Part 2 | Question: 1 top☝
" is a clone of " means is identical to in terms of the physical attributes namely, height, weight and
complexion. Given, height, weight and complexion only form a complete set of attributes for an entity,
cloning is an equivalence relation. What is your impression about this statement ?
Answer key☟
10.11.3 Relations: UGC NET CSE | June 2013 | Part 2 | Question: 34 top☝
Answer key☟
10.11.4 Relations: UGC NET CSE | June 2016 | Part 2 | Question: 3 top☝
Suppose that and are reflecive relations on a set A. Which of the following statements is correct?
Answer key☟
Answer Keys
10.0.1 A 10.0.2 Q-Q 10.0.3 C 10.1.1 A 10.2.1 C
10.3.1 A 10.4.1 C 10.5.1 A 10.6.1 D 10.6.2 D
10.6.3 A 10.7.1 C 10.8.1 D 10.9.1 B 10.10.1 Q-Q
10.11.1 Q-Q 10.11.2 Q-Q 10.11.3 B 10.11.4 C
11 Engineering Mathematics: Discrete Mathematics (45)
A. aB.and
bC.and
c a,b,
D.c aand
andc b
ugcnetcse-dec2015-paper2 discrete-mathematics mathematical-logic
Answer key☟
Answer key☟
How many solutions are there for the equation subject to the constraints that
?
Answer key☟
Let P(m,n) be the statement "m divides n" where the universe of discourse for both the variable is the set of
positive integers. Determine the truth values of each of the following propositions:
a. , b.
c.
A. a-True, b-True, c-False B. a-True, b-False, c-False
C. a-False, b-False, c-FalseD. a-True, b-True, c-True
ugcnetcse-dec2015-paper2 discrete-mathematics mathematical-logic
Answer key☟
Answer key☟
11.0.6 UGC NET CSE | December 2013 | Part 3 | Question: 24 top☝
The objective of ____ procedure is to discover at least one ____ that causes two literals to match.
Answer key☟
where
A. B. C. D.
ugcnetcse-dec2012-paper3 discrete-mathematics combinatory
Answer key☟
How many relations are there on a set with n elements that are symmetric and a set with n elements that are
reflexive and symmetric?
A. B.
C. D.
ugcnetcse-june2012-paper3 discrete-mathematics set-theory&algebra
Answer key☟
Consider a set .
How many members of A shall be divisible by or by or by both and ?
Answer key☟
I.
II.
where and are real numbers. Then which of the following is valid?
Answer key☟
Let be a directed graph whose vertex set is the set of numbers from to . There is an edge from a
vertex to a vertex if and only if either or . The minimum number of edges in a path in
from vertex to vertex is ______
A. B. C. D.
ugcnetcse-oct2020-paper2 discrete-mathematics graph-theory
Answer key☟
If is my friend, and is perfect, then correct logical translation of the statement “some of
my friends are not perfect” is ______
A. B.
C. D.
ugcnetcse-oct2020-paper2 discrete-mathematics mathematical-logic
Answer key☟
Answer key☟
A. and
B. and
C. and
D. and
Answer key☟
If then is
A. Z B. Q C. R D. C
ugcnetcse-july2018-paper2 discrete-mathematics
Answer key☟
Let be a simple undirected graph, be a DFS tree on , and be the BFS tree on . Consider the
following statements.
Statement : No edge of is a cross with respect to
Statement : For every edge of , if is at depth and is at depth in then
In the light of the above statements, choose the correct answer from the options given below
A. B. C. D.
ugcnetcse-aug2016-paper2 discrete-mathematics boolean-function
Answer key☟
11.2.1 Equivalence Class: UGC NET CSE | July 2018 | Part 2 | Question: 89 top☝
Which of the following is an equivalence relation on the set of all functions from Z to Z?
A.
B.
C.
D.
Answer key☟
11.3.1 First Order Logic: UGC NET CSE | December 2012 | Part 3 | Question: 58 top☝
Answer key☟
11.3.2 First Order Logic: UGC NET CSE | July 2018 | Part 2 | Question: 77 top☝
A. It is syntactically valid but does not express the meaning of the English sentence
B. It is syntactically valid and expresses the meaning of the English sentence also
C. It is syntactically invalid but expresses the meaning of the English sentence
D. It is syntactically invalid and does not express the meaning of the English sentence
Answer key☟
11.3.3 First Order Logic: UGC NET CSE | June 2013 | Part 3 | Question: 69 top☝
If we convert to
. This process is known as
Answer key☟
11.3.4 First Order Logic: UGC NET CSE | October 2020 | Part 2 | Question: 40 top☝
Answer key☟
11.4.1 Functions: UGC NET CSE | December 2011 | Part 2 | Question: 4 top☝
A. B.
C. D.
ugcnetcse-dec2011-paper2 discrete-mathematics functions
Answer key☟
11.4.2 Functions: UGC NET CSE | December 2012 | Part 3 | Question: 19 top☝
Answer key☟
11.5.1 Group Theory: UGC NET CSE | December 2015 | Part 2 | Question: 10 top☝
Which of the following property/ies a Group G must hold, in order to be an Abelian group?
A. aB.and
bC.and
b aD.only
c b only
ugcnetcse-dec2015-paper2 discrete-mathematics set-theory&algebra group-theory
Answer key☟
11.5.2 Group Theory: UGC NET CSE | June 2012 | Part 3 | Question: 67 top☝
Answer key☟
11.6.1 Linear Programming: UGC NET CSE | June 2016 | Part 3 | Question: 70 top☝
Answer key☟
11.7.1 Number Representation: UGC NET CSE | December 2011 | Part 2 | Question: 34 top☝
Answer key☟
11.8.1 Partial Order: UGC NET CSE | December 2010 | Part 2 | Question: 3 top☝
A partially ordered set is said to be a lattice if every two elements in the set have
Answer key☟
11.8.2 Partial Order: UGC NET CSE | July 2018 | Part 2 | Question: 90 top☝
Answer key☟
11.9.1 Propositional Logic: UGC NET CSE | August 2016 | Part 2 | Question: 2 top☝
Let us assume that you construct ordered tree to represent the compound proposition
.
Then, the prefix expression and post-fix expression determined using this ordered tree are given as _____ and
______ respectively.
A.
B.
C.
D.
Answer key☟
11.9.2 Propositional Logic: UGC NET CSE | August 2016 | Part 3 | Question: 70 top☝
Let mean is a vegetarian, for is meat, and for eats . Based on these, consider the
following sentences :
I.
II.
III.
One can determine that
A. Only and are equivalent sentences B. Only and are equivalent sentences.
C. Only and are equivalent sentence . D. and are equivalent sentences.
ugcnetcse-aug2016-paper3 discrete-mathematics propositional-logic
Answer key☟
11.9.3 Propositional Logic: UGC NET CSE | August 2016 | Part 3 | Question: 74 top☝
Answer key☟
11.9.4 Propositional Logic: UGC NET CSE | December 2011 | Part 2 | Question: 43 top☝
A. p q B. q p
C. p q D. p q
ugcnetcse-dec2011-paper2 discrete-mathematics propositional-logic
Answer key☟
11.9.5 Propositional Logic: UGC NET CSE | December 2012 | Part 3 | Question: 75 top☝
Let be the statement “x+y=z” and let there be two quantification given as
I.
II.
where x, y, z are real numbers, then which one of the following is correct?
Answer key☟
11.9.6 Propositional Logic: UGC NET CSE | December 2015 | Part 2 | Question: 8 top☝
A. B.
C. D.
ugcnetcse-dec2015-paper2 discrete-mathematics propositional-logic
Answer key☟
11.9.7 Propositional Logic: UGC NET CSE | July 2018 | Part 2 | Question: 76 top☝
a. False True
b. If
Answer key☟
11.9.8 Propositional Logic: UGC NET CSE | Junet 2015 | Part 3 | Question: 57 top☝
A. B.
C. D.
ugcnetcse-june2015-paper3 discrete-mathematics propositional-logic
Answer key☟
11.9.9 Propositional Logic: UGC NET CSE | October 2020 | Part 2 | Question: 61 top☝
Answer key☟
11.10.1 Quantifiers: UGC NET CSE | July 2018 | Part 2 | Question: 85 top☝
The equivalence of is
A.
B.
C.
D.
Answer key☟
11.11.1 Relations: UGC NET CSE | July 2018 | Part 2 | Question: 88 top☝
Answer key☟
11.11.2 Relations: UGC NET CSE | October 2020 | Part 2 | Question: 39 top☝
Answer key☟
11.12.1 Set Theory: UGC NET CSE | August 2016 | Part 2 | Question: 3 top☝
Let and be sets in a finite universal set . Given the following : and
Which of the following is in order of increasing size ?
A.
B.
C.
D.
Answer key☟
11.12.2 Set Theory: UGC NET CSE | December 2012 | Part 3 | Question: 34 top☝
A. 256 B. 64 C. 16 D. 4
ugcnetcse-dec2012-paper3 engineering-mathematics discrete-mathematics set-theory
Answer key☟
11.12.3 Set Theory: UGC NET CSE | December 2015 | Part 2 | Question: 3 top☝
A. aB.and
bC.and
c bD.only
d d only
ugcnetcse-dec2015-paper2 discrete-mathematics set-theory
Answer key☟
Answer Keys
11.0.1 B 11.0.2 C 11.0.3 B 11.0.4 A 11.0.5 B
11.0.6 B 11.0.7 D 11.0.8 D 11.0.9 C 11.0.10 B
11.0.11 D 11.0.12 B 11.0.13 A 11.0.14 D 11.0.15 Q-Q
11.0.16 C 11.1.1 Q-Q 11.2.1 Q-Q 11.3.1 C 11.3.2 Q-Q
11.3.3 C 11.3.4 B 11.4.1 Q-Q 11.4.2 C 11.5.1 D
11.5.2 C 11.6.1 A 11.7.1 Q-Q 11.8.1 Q-Q 11.8.2 Q-Q
11.9.1 Q-Q 11.9.2 Q-Q 11.9.3 Q-Q 11.9.4 Q-Q 11.9.5 B
11.9.6 A 11.9.7 Q-Q 11.9.8 B 11.9.9 D 11.10.1 Q-Q
11.11.1 Q-Q 11.11.2 D 11.12.1 Q-Q 11.12.2 B 11.12.3 D
12 Engineering Mathematics: Linear Algebra (2)
is called :
Answer key☟
Answer Keys
12.0.1 Q-Q 12.1.1 Q-Q
13 Engineering Mathematics: Probability (13)
How many people must there be in a room before there is a 50% chance that two of them were born on the
same day of the year?
Answer key☟
Considering an experiment of tossing two fair dice, one black and one red. What is the probability that the
number on the black die divides the number on red die?
A. B. C. D.
ugcnetcse-june2015-paper2 probability
Answer key☟
There are three cards in a box. Both sides of one card are black, both sides of one card are red and the third
card has one black side and one red side. We pick a card at random and observe only one side. What is the
probability that the opposite side is the same colour as the one side we observed?
Answer key☟
What is the probability of choosing correctly an unknown integer between and with chances ?
A. B. C. D.
ugcnetcse-dec2011-paper2 probability
Answer key☟
What is the probability that a randomly selected bit string of length 10 is a palindrome ?
A. B. C. D.
ugcnetcse-aug2016-paper2 probability
Answer key☟
An experimental file server is up % of the time and down for % of the time due to bugs. How many
times does this file server have to be replicated to give an availability of at least % ?
A. B. C. D.
ugcnetcse-aug2016-paper3 probability
Answer key☟
13.0.7 UGC NET CSE | July 2018 | Part 2 | Question: 84 top☝
Digital data received from a sensor can fill up 0 to 32 buffers. Let the sample space be
where the sample denote that of the buffers are full and . Let
A denote the event that the even number of buffers are full. Then is
Answer key☟
Consider the set of all possible five-card poker hands dealt fairly from a standard deck of fifty-two cards.
How many atomic events are there in the joint probability distribution?
Answer key☟
A box contains six red balls and four green balls. Four balls are selected at random from the box. What is
the probability that two of the selected balls will be red and two will be in green?
A. B. C. D.
ugcnetcse-dec2018-paper2 probability
Answer key☟
A box contains six red balls and four green balls. Four balls are selected at random from the box. What is
the probability that two of the selected balls are red and two are green ?
A. B. C. D.
ugcnetcse-dec2007-paper2
Answer key☟
13.1.1 Binary Tree: UGC NET CSE | July 2018 | Part 2 | Question: 25 top☝
A text is made up of the characters A, B, C, D, E each occurring with the probability 0.08, 0.40, 0.25, 0.15
and 0.12 respectively. The optimal coding will have the average length of
Answer key☟
13.2.1 Joint Distribution: UGC NET CSE | December 2018 | Part 2 | Question: 100 top☝
A full joint distribution for the Toothache, Cavity and Catch is given in the table below.
Toothache Toothache
Catch Catch Catch Catch
Cavity
Cavity
What is the probability of Cavity, given evidence of Toothache?
A. B.
C. D.
ugcnetcse-dec2018-paper2 joint-distribution probability non-gate
Answer key☟
13.3.1 Poisson Distribution: UGC NET CSE | December 2011 | Part 2 | Question: 27 top☝
The multiuser operating system, requests are made to use a particular resource per hour, on an average
the probability that no request are made in minutes is
A. B. C. D.
ugcnetcse-dec2011-paper2 probability poisson-distribution
Answer key☟
Answer Keys
13.0.1 A 13.0.2 C 13.0.3 B 13.0.4 Q-Q 13.0.5 Q-Q
13.0.6 Q-Q 13.0.7 Q-Q 13.0.8 Q-Q 13.0.9 Q-Q 13.0.10 Q-Q
13.1.1 Q-Q 13.2.1 Q-Q 13.3.1 A
14 General Aptitude: Quantitative Aptitude (25)
14.0.1 UGC NET Paper-1 DEC 14 (average annual growth rate) top☝
For a country CO2 emissions (million metric tons) from various sectors are given in the following table.
Sector
Year Power Industry Commercial Agriculture Domestic
2005 500 200 150 80 100
2006 600 300 200 90 110
2007 650 320 250 100 120
2008 700 400 300 150 150
2009 800 450 320 200 180
What is the average annual growth rate of CO2 emissions in power sector ?
(A) ~12.57% (B) ~16.87%
(C) ~30.81% (D) ~50.25%
The world population growth rate at a certain reference year was 3.5%. Assuming exponential growth of
population, after how many years, the population of the world would have increased by a factor 16 ?
(A) ~ 80 years (B) ~ 40 years
(C) ~ 160 years (D) ~ 320 years
Answer: A
could you please explain the step?
Answer key☟
If the time is now O' clock, what will be the time hours from now?
Answer key☟
14.1.1 Data Interpretation: UGC NET CSE | October 2020 | Part 1 | Question: 1 top☝
The following table shows total number of students in the Department of the Institute along with percentage
of Females and Male students. Answer the question based on the data given below:
What is the respective ratio of the number of females in Mechanical Department to the number of females in
Electronics Department?
A. B. C. D.
ugcnetcse-oct2020-paper1 general-aptitude quantitative-aptitude data-interpretation
Answer key☟
14.1.2 Data Interpretation: UGC NET CSE | October 2020 | Part 1 | Question: 2 top☝
The following table shows total number of students in the Department of the Institute along with percentage
of Females and Male students. Answer the question based on the data given below:
A. B. C. D.
ugcnetcse-oct2020-paper1 general-aptitude quantitative-aptitude data-interpretation
Answer key☟
14.1.3 Data Interpretation: UGC NET CSE | October 2020 | Part 1 | Question: 3 top☝
The following table shows total number of students in the Department of the Institute along with percentage
of Females and Male students. Answer the question based on the data given below:
What is the total number of male students in Computer and Mining Department together?
A. B. C. D.
ugcnetcse-oct2020-paper1 general-aptitude quantitative-aptitude data-interpretation
Answer key☟
14.1.4 Data Interpretation: UGC NET CSE | October 2020 | Part 1 | Question: 4 top☝
The following table shows total number of students in the Department of the Institute along with percentage
of Females and Male students. Answer the question based on the data given below:
What is the ratio of the number of females in Civil and Electrical departments together to the number of males in the
same departments together?
A. B. C. D.
ugcnetcse-oct2020-paper1 general-aptitude quantitative-aptitude data-interpretation
Answer key☟
14.1.5 Data Interpretation: UGC NET CSE | October 2020 | Part 1 | Question: 5 top☝
The following table shows total number of students in the Department of the Institute along with percentage
of Females and Male students. Answer the question based on the data given below:
A. B. C. D.
ugcnetcse-oct2020-paper1 general-aptitude quantitative-aptitude data-interpretation
Answer key☟
14.2.1 Number System: UGC NET CSE | June 2011 | Part 2 | Question: 1 top☝
A. B. C. D.
ugcnetcse-dec2011-paper2 quantitative-aptitude number-system
Answer key☟
14.3.1 Percentage: UGC NET CSE | December 2015 | Part 2 | Question: 32 top☝
Suppose that from given statistics, it is known that meningitis causes stiff neck 50% of the time, that the
proportion of persons having meningitis is , and that the proportion od people having stiff neck is .
Then the percentage of people who had meningtis and complain about stiff neck is:
14.4.1 Quadratic Equations: UGC NET CSE | October 2020 | Part 2 | Question: 8 top☝
What is the radix of the numbers if the solution to the quadratic equation is and
?
A. B. C. D.
ugcnetcse-oct2020-paper2 quadratic-equations
Answer key☟
14.5.1 Quantitative Aptitude: UGC NET CSE | December 2010 | Part 2 | Question: 1 top☝
A. B. C. D.
ugcnetcse-dec2010-paper2 quantitative-aptitude
Answer key☟
14.5.2 Quantitative Aptitude: UGC NET CSE | December 2010 | Part 2 | Question: 5 top☝
Consider the problem of connecting lamps to a single electric outlet by using extension cords each of
which has four outlets. The number of extension cords required is
A. B. C. D.
ugcnetcse-dec2010-paper2 quantitative-aptitude
Answer key☟
14.5.3 Quantitative Aptitude: UGC NET CSE | December 2014 | Part 2 | Question: 04 top☝
A computer program selects an integer in the set at random and prints out the
result. This process is repeated 1 million times. What is the probability that the value k = 1 appears in the
printout atleast once ?
A. B. C. D.
ugcnetcse-dec2014-paper2 quantitative-aptitude
Answer key☟
14.5.4 Quantitative Aptitude: UGC NET CSE | July 2018 | Part 2 | Question: 75 top☝
Consider a vocabulary with only four propositions A, B, C and D. How many models are there for the
following sentence?
A. 10 B. 12 C. 15 D. 16
ugcnetcse-july2018-paper2 quantitative-aptitude
Answer key☟
14.5.5 Quantitative Aptitude: UGC NET CSE | June 2019 | Part 1 | Question: 22 top☝
A. B. C. D.
ugcnetcse-june2019-paper1 general-aptitude quantitative-aptitude
Answer key☟
14.5.6 Quantitative Aptitude: UGC NET CSE | June 2019 | Part 1 | Question: 23 top☝
If is divided into four parts proportional to , , and , then the smallest part is
A. B. C. D.
ugcnetcse-june2019-paper1 general-aptitude quantitative-aptitude
Answer key☟
14.5.7 Quantitative Aptitude: UGC NET CSE | June 2019 | Part 1 | Question: 24 top☝
In a new budget, the price of petrol rose by . By how much percent must a person reduce his
consumption so that his expenditure on it does not increase?
A. B. C. D.
ugcnetcse-june2019-paper1 general-aptitude quantitative-aptitude
Answer key☟
14.5.8 Quantitative Aptitude: UGC NET CSE | June 2019 | Part 1 | Question: 25 top☝
A sum of money doubles at compound interest in 6 years. In how many years it will become times?
Answer key☟
14.5.9 Quantitative Aptitude: UGC NET CSE | June 2019 | Part 1 | Question: 27 top☝
Given below are two premises with four conclusions drawn from them. Which of the following conclusions
could be validly drawn from the premises?
Premises:
i. No paper is pen
ii. Some paper are handmade
Conclusions:
Answer key☟
14.5.10 Quantitative Aptitude: UGC NET CSE | June 2019 | Part 1 | Question: 31 top☝
Consider the following table that shows the number (in lakhs) of different sizes of LED television sets sold by
a company over the last seven years from to . Answer the question based on the data contained
in the table:
Sale of LED Television sets (in lakhs) of different sizes (in inches)
What was the approximate percentage increase/decrease in the sales of -inch LED Television sets in
compared to that in ?
A. B. C. D.
ugcnetcse-june2019-paper1 general-aptitude quantitative-aptitude
Answer key☟
14.5.11 Quantitative Aptitude: UGC NET CSE | June 2019 | Part 1 | Question: 32 top☝
Consider the following table that shows the number (in lakhs) of different sizes of LED television sets sold by
a company over the last seven years from to . Answer the question based on the data contained
in the table:
Sale of LED Television sets (in lakhs) of different sizes (in inches)
For which size LED Television sets in the total sales of all seven years the maximum?
Answer key☟
14.5.12 Quantitative Aptitude: UGC NET CSE | June 2019 | Part 1 | Question: 33 top☝
Consider the following table that shows the number (in lakhs) of different sizes of LED television sets sold by
a company over the last seven years from to . Answer the question based on the data contained
in the table:
Sale of LED Television sets (in lakhs) of different sizes (in inches)
What is the difference in the number of -inch Television sets sold in and
A. B. C. D.
ugcnetcse-june2019-paper1 general-aptitude quantitative-aptitude
Answer key☟
14.5.13 Quantitative Aptitude: UGC NET CSE | June 2019 | Part 1 | Question: 34 top☝
Consider the following table that shows the number (in lakhs) of different sizes of LED television sets sold by
a company over the last seven years from to . Answer the question based on the data contained
in the table:
Sale of LED Television sets (in lakhs) of different sizes (in inches)
What is the total sale of Television sets of size -inches (in lakhs) over all the seven years?
A. B. C. D.
ugcnetcse-june2019-paper1 general-aptitude quantitative-aptitude
Answer key☟
14.5.14 Quantitative Aptitude: UGC NET CSE | June 2019 | Part 1 | Question: 35 top☝
Consider the following table that shows the number (in lakhs) of different sizes of LED television sets sold by
a company over the last seven years from to . Answer the question based on the data contained
in the table:
Sale of LED Television sets (in lakhs) of different sizes (in inches)
For which LED Television set is the total sales of all the seven years the minimum?
Answer key☟
Answer Keys
14.0.1 Q-Q 14.0.2 Q-Q 14.0.3 A 14.1.1 B 14.1.2 D
14.1.3 C 14.1.4 D 14.1.5 A 14.2.1 Q-Q 14.3.1 B
14.4.1 D 14.5.1 B 14.5.2 Q-Q 14.5.3 C 14.5.4 Q-Q
14.5.5 B 14.5.6 D 14.5.7 C 14.5.8 B 14.5.9 C
14.5.10 B 14.5.11 C 14.5.12 A 14.5.13 D 14.5.14 D
15 General Aptitude: Verbal Aptitude (8)
A knowledge base contains just one sentence, . Consider the following two
sentences obtained after applying existential instantiation.
ugcnetcse-july2018-paper2 verbal-aptitude
Answer key☟
‘All republics are grateful’ and ‘Some republics are not grateful’ cannot both be true, and they cannot both be
false. This is called as
Answer key☟
If the proposition ‘Houses are not bricks’ is taken to be False then which of the following propositions can be
True?
A. All houses are bricksB. No house is brick C. Some houses are bricks Select
D. Some houses are not bricks the correct
answer from the
options given below:
Answer key☟
Answer key☟
15.1.1 Logical Reasoning: UGC NET CSE | June 2019 | Part 1 | Question: 29 top☝
Answer key☟
15.1.2 Logical Reasoning: UGC NET CSE | June 2019 | Part 1 | Question: 30 top☝
The proposition ‘No historians are non-mathematician’ is equivalent to which of the following proposition?
Answer key☟
15.2.1 Quantitative Aptitude: UGC NET CSE | June 2013 | Part 3 | Question: 70 top☝
Given two jugs of capacities 5 litres and 3 litres with no measuring marks on them. Then the minimum
number of states to measure 4 litres of water will be
A. 3 B. 4 C. 5 D. 7
ugcnetcse-june2013-paper3 quantitative-aptitude general-aptitude
Answer key☟
15.2.2 Quantitative Aptitude: UGC NET CSE | October 2020 | Part 2 | Question: 80 top☝
Answer key☟
Answer Keys
15.0.1 Q-Q 15.0.2 B 15.0.3 D 15.0.4 C 15.1.1 B
15.1.2 A 15.2.1 D 15.2.2 A
16 Non GATE: Artificial Intelligence (45)
A software program that infers and manipulates existing knowledge in order to generate new knowledge is
known as:
Answer key☟
A perceptron has input weights and with threshold value What output
does it give for the input and
A. B. C. D.
ugcnetcse-june2016-paper3
Answer key☟
16.1.1 Artificial Intelligence: UGC NET CSE | December 2013 | Part 3 | Question: 26 top☝
The mean-end analysis process centers around the detection of differences between the current state and
goal state. Once such a difference is isolated, an operator that can reduce the difference must be found. But
perhaps that operator cannot be applied to the current state. So a sub-problem of getting to a state in which it can
be applied is set up. The kind of backward chaining in which operators are selected and then sub goals are set up
to establish the precondition of operators is called
Answer key☟
16.1.2 Artificial Intelligence: UGC NET CSE | December 2015 | Part 3 | Question: 46 top☝
Answer key☟
16.1.3 Artificial Intelligence: UGC NET CSE | December 2015 | Part 3 | Question: 64 top☝
Consider the two class classification task that consists of the following points:
Class
Class
The decision boundary between the two classes and using single perception is given by:
A. B.
C. D.
ugcnetcse-dec2015-paper3 artificial-intelligence
Answer key☟
16.1.4 Artificial Intelligence: UGC NET CSE | January 2017 | Part 3 | Question: 55 top☝
Consider following two rules and in logical reasoning in Artificial Intelligence (AI):
From is known as Modulus Tollens (MT)
From is known as Modus Ponens(MP)
Answer key☟
16.1.5 Artificial Intelligence: UGC NET CSE | July 2018 | Part 2 | Question: 71 top☝
ugcnetcse-july2018-paper2 artificial-intelligence
Answer key☟
16.1.6 Artificial Intelligence: UGC NET CSE | July 2018 | Part 2 | Question: 72 top☝
In artificial Intelligence (AI), a simple reflex agent selects actions on the basis of ___
ugcnetcse-july2018-paper2 artificial-intelligence
Answer key☟
16.1.7 Artificial Intelligence: UGC NET CSE | July 2018 | Part 2 | Question: 73 top☝
A. B.
C. D.
ugcnetcse-july2018-paper2 artificial-intelligence
Answer key☟
16.1.8 Artificial Intelligence: UGC NET CSE | July 2018 | Part 2 | Question: 74 top☝
Consider following sentences regarding , an informed search strategy in Artificial Intelligence (AI).
Here, is the cost of the optimal solution path. Which of the following is correct with respect to the above
statements?
ugcnetcse-july2018-paper2 artificial-intelligence
Answer key☟
16.1.9 Artificial Intelligence: UGC NET CSE | June 2012 | Part 3 | Question: 21 top☝
algorithm uses to estimate the cost of getting from the initial state to the goal state, where
is a measure of cost getting from initial state to the current node and the function is an estimate of the
cost of getting from the current node to the goal state. To find a path involving the fewest number of steps, we
should test,
A. B. C. D.
ugcnetcse-june2012-paper3 artificial-intelligence
Answer key☟
16.1.10 Artificial Intelligence: UGC NET CSE | June 2014 | Part 3 | Question: 28 top☝
A. B.
C. D.
ugcnetjune2014iii artificial-intelligence
Answer key☟
16.1.11 Artificial Intelligence: UGC NET CSE | June 2014 | Part 3 | Question: 30 top☝
Answer key☟
16.1.12 Artificial Intelligence: UGC NET CSE | Junet 2015 | Part 3 | Question: 23 top☝
ugcnetcse-june2015-paper3 artificial-intelligence
Answer key☟
16.1.13 Artificial Intelligence: UGC NET CSE | Junet 2015 | Part 3 | Question: 56 top☝
Answer key☟
16.1.14 Artificial Intelligence: UGC NET CSE | Junet 2015 | Part 3 | Question: 59 top☝
A. B.
C. D.
ugcnetcse-june2015-paper3 artificial-intelligence
Answer key☟
16.1.15 Artificial Intelligence: UGC NET CSE | October 2020 | Part 2 | Question: 36 top☝
16.2.1 Artificial Neural Network: UGC NET CSE | December 2013 | Part 3 | Question: 30 top☝
A. B.
C. D.
ugcnetcse-dec2013-paper3 machine-learning artificial-neural-network
Answer key☟
16.3 Back Propagation (1) top☝
16.3.1 Back Propagation: UGC NET CSE | December 2012 | Part 2 | Question: 46 top☝
Back propagation is a learning technique that adjusts weights in the neutral network by propagating weight
changes.
Answer key☟
16.4.1 Blocks World Problem: UGC NET CSE | September 2013 | Part 3 | Question: 5 top☝
Answer key☟
16.5.1 Chaining: UGC NET CSE | December 2015 | Part 3 | Question: 8 top☝
Forward chaining systems are ____ where as backward chaining systems are ____
Answer key☟
16.6.1 Expert System: UGC NET CSE | December 2012 | Part 3 | Question: 67 top☝
Answer key☟
16.6.2 Expert System: UGC NET CSE | December 2015 | Part 3 | Question: 45 top☝
Answer key☟
16.7.1 Fuzzy Logic: UGC NET CSE | June 2019 | Part 2 | Question: 94 top☝
A fuzzy conjunction operator denoted as and a fuzzy disjunction operator denoted as form a
dual pair if they satisfy the condition:
A. B.
C. D.
ugcnetcse-june2019-paper2 artificial-intelligence fuzzy-logic
Answer key☟
16.8.1 Genetic Algorithms: UGC NET CSE | June 2019 | Part 2 | Question: 97 top☝
Answer key☟
16.9.1 Heuristic Search: UGC NET CSE | December 2013 | Part 3 | Question: 25 top☝
If h* represents an estimate from the cost of getting from the current node N to the goal node and h
represents actual cost of getting from the current node to the goal node, then A* algorithm gives an optimal
solution if
A. h* is equal to h B. h* overestimates h
C. h* underestimates h D. none of these
ugcnetcse-dec2013-paper3 artificial-intelligence heuristic-search
Answer key☟
16.10.1 Intelligence: Required Artificial Intelligence resources for UGC NET top☝
Hi
I need some useful resources of AI for upcoming UGC NET exam.
Currently, I am reading from Rich and Knight, Is it enough?
Please let me know about any good quality books or video lectures.
Answer key☟
16.11.1 Linear Programming: UGC NET CSE | September 2013 | Part 3 | Question: 13 top☝
If an artificial variable is present in the ‘basic variable’ of optimal simplex table then the solution is
Answer key☟
16.12.1 Machine Learning: UGC NET CSE | December 2012 | Part 3 | Question: 73 top☝
b.
2. Manual labels of inputs
Unsupervised
are not used
learning
c. Re-
3. Manual labels of inputs
inforcement
are used
learning
d. Inductive
4. System learns by example
learning
a b c d
A 1 2 3 4
B 2 3 1 4
C 3 2 4 1
D 3 2 1 4
ugcnetcse-dec2012-paper3 machine-learning
Answer key☟
16.12.2 Machine Learning: UGC NET CSE | December 2014 | Part 3 | Question: 72 top☝
Match the following learning modes . characteristics of available information for learning :
a. Supervised i. Instructive information on desired responses, explicitly specified by a teacher.
b. Recording ii. A priori design information for memory storing
c. iii. Partial information about desired responses, or only “right” or “wrong” evaluative
Reinforcement information
d.
iv. No information about desired responses
Unsupervised
Codes :
a b c d
A. i ii iii iv
B. i iii ii iv
C. ii iv iii i
D. ii iii iv i
Answer key☟
16.12.3 Machine Learning: UGC NET CSE | June 2012 | Part 3 | Question: 2 top☝
Answer key☟
16.12.4 Machine Learning: UGC NET CSE | June 2014 | Part 3 | Question: 09 top☝
Perceptron learning, Delta learning and learning are learning methods which falls under the category
of
ugcnetjune2014iii machine-learning
Answer key☟
16.13.1 Map Coloring: UGC NET CSE | June 2013 | Part 3 | Question: 71 top☝
The map colouring problem can be solved using which of the following technique?
Answer key☟
16.14.1 Means End: UGC NET CSE | September 2013 | Part 3 | Question: 6 top☝
Means-Ends Analysis process centres around the detection of difference between the current state and the
goal state. Once such a difference is found, then to reduce the difference one applies
Answer key☟
16.15.1 Minimax Procedure: UGC NET CSE | June 2019 | Part 2 | Question: 91 top☝
Here and represents MIN and MAX nodes respectively. The value of the root node of the game tree is
A. B. C. D.
ugcnetcse-june2019-paper2 artificial-intelligence minimax-procedure
Answer key☟
16.16 Neural Network (3) top☝
16.16.1 Neural Network: UGC NET CSE | December 2012 | Part 3 | Question: 9 top☝
You are given an OR problem and XOR problem to solve. Then, which one of the following statements is
true?
A. Both OR and XOR problems can be solved using single layer perception
B. OR can be solved using single layer perception and XOR problem can be solved using self organizing maps
C. OR problem can be solved using radial basis function and XOR problem can be solved using single layer
perception
D. OR can be solved using single layer perception and XOR problem can be solved using radial basis function
Answer key☟
16.16.2 Neural Network: UGC NET CSE | June 2019 | Part 2 | Question: 98 top☝
Answer key☟
16.16.3 Neural Network: UGC NET CSE | September 2013 | Part 3 | Question: 28 top☝
A. B.
C. D.
ugcnetcse-sep2013-paper3 neural-network machine-learning
Answer key☟
16.17.1 Planning: UGC NET CSE | July 2018 | Part 2 | Question: 78 top☝
a. The planning graph data structure can be used to give a better heuristic for a planning problem
b. Dropping negative effects from every action schema in a planning problem results in a relaxed problem
ugcnetcse-july2018-paper2 planning
Answer key☟
16.18.1 Prolog: UGC NET CSE | June 2013 | Part 3 | Question: 67 top☝
Which one of the following is the correct implementation of the meta-predicate “not” in PROLOG (Here G
represents a goal)?
Answer key☟
16.19.1 Reinforcement Learning: UGC NET CSE | June 2019 | Part 2 | Question: 100 top☝
Reinforcement learning can be formalized in terms of ____ in which the agent initially only knows the set of
possible _____ and the set of possible actions.
Answer key☟
16.20.1 Searches: UGC NET CSE | June 2019 | Part 2 | Question: 92 top☝
Answer key☟
16.21.1 Sigmoid Function: UGC NET CSE | June 2019 | Part 2 | Question: 99 top☝
A. B. C. D.
ugcnetcse-june2019-paper2 artificial-intelligence sigmoid-function
Answer key☟
A. a feature-centric representation
B. an action-centric representation
C. a combination of feature-centric and action-centric representations
D. a hierarchical feature-centric representation
Answer key☟
Answer Keys
16.0.1 C 16.0.2 C 16.1.1 C 16.1.2 C 16.1.3 B
16.1.4 D 16.1.5 B 16.1.6 Q-Q 16.1.7 Q-Q 16.1.8 Q-Q
16.1.9 A 16.1.10 D 16.1.11 B 16.1.12 B 16.1.13 A
16.1.14 B 16.1.15 D 16.2.1 D 16.3.1 B 16.4.1 B
16.5.1 D 16.6.1 A 16.6.2 B 16.7.1 C 16.8.1 C
16.9.1 C 16.10.1 Q-Q 16.11.1 B 16.12.1 D 16.12.2 A
16.12.3 B 16.12.4 A 16.13.1 B 16.14.1 D 16.15.1 B
16.16.1 D 16.16.2 D 16.16.3 C 16.17.1 Q-Q 16.18.1 B
16.18.2 C 16.19.1 C 16.20.1 D 16.21.1 B 16.22.1 B
17 Non GATE: Big Data Systems (1)
17.1.1 Big Data Systems: UGC NET CSE | October 2020 | Part 2 | Question: 13 top☝
A. Worker Node and Master Node respectively B. Master Node and Worker Node respectively
C. Both Worker Nodes D. Both Master Nodes
ugcnetcse-oct2020-paper2 non-gate big-data-systems
Answer key☟
Answer Keys
17.1.1 A
18 Non GATE: Cloud Computing (2)
18.1.1 Cloud Computing: UGC NET CSE | December 2018 | Part 2 | Question: 64 top☝
Suppose a cloud contains software stack such as Operating systems, Application softwares, etc. This model
is referred as ____ model
A. B. C. D.
ugcnetcse-dec2018-paper2 cloud-computing
Answer key☟
18.1.2 Cloud Computing: UGC NET CSE | October 2020 | Part 2 | Question: 58 top☝
Which of the following cloud concept/s is/are related to pooling and sharing of resources?
a. Virtual Memory b. Service c. Virtualization Choose the correct answer from the options
given below:
Answer key☟
Answer Keys
18.1.1 Q-Q 18.1.2 A
19 Non GATE: Computer Graphics (80)
19.1.1 2d Geometry: UGC NET CSE | July 2018 | Part 2 | Question: 10 top☝
homogeneous coordinates. Which of the following statements about the matrix M is True?
Answer key☟
19.2.1 2d Transformation: UGC NET CSE | June 2019 | Part 2 | Question: 28 top☝
A matrix which mirrors any point about the -axis, is a rotation matrix.
What can you say about the statements and ?
Answer key☟
19.3.1 3d Graphics: UGC NET CSE | July 2018 | Part 2 | Question: 9 top☝
Which of the following statements is/are True regarding the solution of the visibility problem in 3D graphics?
S1: The painter's algorithm sorts polygons by depth and then paints (scan - converts) each Polygon on to
the screen starting with the most nearest polygon
S2: Backface Culling refers to eliminating geometry with backfacing normals
Answer key☟
19.3.2 3d Graphics: UGC NET CSE | June 2019 | Part 2 | Question: 29 top☝
In the context of 3D computer graphics, which of the following statements is/are true?
P : Orthographic transformations keep parallel lines parallel.
Q : Orthographic transformations are affine transformations.
Select the correct answer from the options given below:
19.4.1 3d Rotation: UGC NET CSE | September 2013 | Part 3 | Question: 64 top☝
Answer key☟
19.5.1 Animation: UGC NET CSE | December 2014 | Part 3 | Question: 13 top☝
Answer key☟
19.6.1 Anti Aliasing: UGC NET CSE | September 2013 | Part 3 | Question: 61 top☝
Answer key☟
19.7.1 Breshenmans Algorithm: UGC NET CSE | June 2016 | Part 3 | Question: 13 top☝
Consider the Breshenman's circle generation algorithm for plotting a circle with centre (0,0) and radius 'r' unit
in first quadrant. If the current point is and decision parameter is then what will be the next point
and updates decision parameter for ?
A.
B.
C.
D.
Answer key☟
Answer key☟
19.9.1 Computer Graphics: UGC NET CSE | December 2012 | Part 3 | Question: 12 top☝
Let and , then the angle between and and a vector perpendicular
to both and shall be
A. B.
C. D.
ugcnetcse-dec2012-paper3 computer-graphics
Answer key☟
19.9.2 Computer Graphics: UGC NET CSE | December 2012 | Part 3 | Question: 33 top☝
The Z-buffer algorithm is used for Hidden surface removal of objects. The maximum number of objects that
can be handled by this algorithm shall
Answer key☟
19.9.3 Computer Graphics: UGC NET CSE | December 2012 | Part 3 | Question: 6 top☝
ugcnetcse-dec2012-paper3 computer-graphics
Answer key☟
19.9.4 Computer Graphics: UGC NET CSE | December 2013 | Part 3 | Question: 62 top☝
Answer key☟
19.9.5 Computer Graphics: UGC NET CSE | December 2013 | Part 3 | Question: 63 top☝
Answer key☟
19.9.6 Computer Graphics: UGC NET CSE | December 2013 | Part 3 | Question: 64 top☝
Which of the following points lies on the same side as the origin, with reference to the line 3x+7y=2?
Answer key☟
19.9.7 Computer Graphics: UGC NET CSE | December 2013 | Part 3 | Question: 65 top☝
The transformation required for conversion of CMY colour model to RGB colour model is given as:
A.
B.
C.
D.
Answer key☟
19.9.8 Computer Graphics: UGC NET CSE | December 2013 | Part 3 | Question: 66 top☝
What steps shall be required to rotate an object from point (as shown in fig. 1) and its placement such
that what was at is now reduced and is at (as shown in fig. 2)?
I. Translate to origin
II. Scale as required
III. Rotate
IV. Translate to the final position
A. I, II and III B. II, III and IV C. I, III and IV D. All of the above
ugcnetcse-dec2013-paper3 computer-graphics non-gate
Answer key☟
19.9.9 Computer Graphics: UGC NET CSE | December 2014 | Part 3 | Question: 15 top☝
A technique used to approximate halftones without reducing spatial resolution is known as________.
A. Halftoning B. Dithering
C. Error diffusion D. None of the above
ugcnetcse-dec2014-paper3 computer-graphics non-gate
Answer key☟
19.9.10 Computer Graphics: UGC NET CSE | December 2015 | Part 3 | Question: 33 top☝
Which of the following graphic primitives are considered as the basic building blocks of computer graphics?
A. aB.only
a,
C.b,aD.
and
and
a cand
b c
ugcnetcse-dec2015-paper3 computer-graphics
Answer key☟
19.9.11 Computer Graphics: UGC NET CSE | December 2015 | Part 3 | Question: 50 top☝
Answer key☟
19.9.12 Computer Graphics: UGC NET CSE | December 2015 | Part 3 | Question: 67 top☝
A. aB.and
cC.only
b dD.only
All of the above
ugcnetcse-dec2015-paper3 computer-graphics
Answer key☟
19.9.13 Computer Graphics: UGC NET CSE | December 2015 | Part 3 | Question: 69 top☝
Which raster locations would be chosen by Bresenham's algorithm when scan converting a line from
to ?
A.
B.
C.
D.
ugcnetcse-dec2015-paper3 computer-graphics
Answer key☟
19.9.14 Computer Graphics: UGC NET CSE | December 2015 | Part 3 | Question: 70 top☝
Consider a unit square centered at origin. The coordinates at the square are translated by a factor
and rotated by an angle of . What shall be the coordinates of the new square?
A.
B.
C.
D.
ugcnetcse-dec2015-paper3 computer-graphics
Answer key☟
19.9.15 Computer Graphics: UGC NET CSE | January 2017 | Part 3 | Question: 16 top☝
Below are the few steps given for scan-converting a circle using Bresenham’s Algorithm. Which of the given
steps is not correct?
Answer key☟
19.9.16 Computer Graphics: UGC NET CSE | January 2017 | Part 3 | Question: 17 top☝
Answer key☟
19.9.17 Computer Graphics: UGC NET CSE | January 2017 | Part 3 | Question: 18 top☝
Consider a line with and . Apply a simple algorithm and compute the first
four plots on this line.
A. B.
C. D.
ugcnetcse-jan2017-paper3 non-gate computer-graphics
Answer key☟
19.9.18 Computer Graphics: UGC NET CSE | July 2018 | Part 2 | Question: 8 top☝
A graphic display system has a frame buffer that is 640 pixels high , 480 pixels high and 1 bit of color depth.
If the access time for each pixel on the average is 200 nanoseconds, then the refresh rate of this frame
buffer is approximately:
Answer key☟
19.9.19 Computer Graphics: UGC NET CSE | June 2012 | Part 3 | Question: 14 top☝
If the pixels of an image are shuffled then the parameter that may change is
Answer key☟
19.9.20 Computer Graphics: UGC NET CSE | June 2012 | Part 3 | Question: 63 top☝
If a and b are the end points of a line, then which of the following is true?
A. If both end points are left, right, above or below the window, the line is invisible.
B. If both end points are left, right, above or below the window, the line is completely visible.
C. If both end points are left, right, above or below the window, the line is trivially visible
D. If both end points are left, right, above or below the window, the line is trivially invisible
Answer key☟
19.9.21 Computer Graphics: UGC NET CSE | June 2014 | Part 3 | Question: 01 top☝
Beam-penetration and shadow-mask are the two basic techniques for producing color displays with a CRT.
Which of the following is not true ?
I. The beam-penetration is used with random scan monitors.
II. Shadow-mask is used in rasterscan systems.
III. Beam-penetration method is better than shadow-mask method.
IV. Shadow-mask method is better than beam-penetration method.
Answer key☟
19.9.22 Computer Graphics: UGC NET CSE | June 2014 | Part 3 | Question: 02 top☝
Line caps are used for adjusting the shape of the line ends to give them a better appearance. Various kinds
of line caps used are
A. Butt cap and sharp cap B. Butt cap and round cap
C. Butt cap, sharp cap and round cap D. Butt cap, round cap and projecting square cap
ugcnetjune2014iii non-gate computer-graphics
Answer key☟
19.9.23 Computer Graphics: UGC NET CSE | June 2014 | Part 3 | Question: 03 top☝
Given below are certain output primitives and their associated attributes. Match each primitive with its
corresponding attributes
A. B.
C. D.
ugcnetjune2014iii non-gate computer-graphics
Answer key☟
19.9.24 Computer Graphics: UGC NET CSE | June 2014 | Part 3 | Question: 04 top☝
Consider a window bounded by the lines : and . The line segment joining
and , if clipped against this window will connect the points
A. and B. and
C. and D. and
ugcnetjune2014iii non-gate geometry computer-graphics
Answer key☟
19.9.25 Computer Graphics: UGC NET CSE | June 2014 | Part 3 | Question: 05 top☝
Which of the following color models are defined with three primary colors ?
A. RGB and HSV color models B. CMY and HSV color models
C. HSV and HLS color models D. RGB and CMY color models
ugcnetjune2014iii non-gate computer-graphics
Answer key☟
19.9.26 Computer Graphics: UGC NET CSE | June 2016 | Part 3 | Question: 15 top☝
Let R be the rectangular window against which the lines are to be clipped using 2D Sutherland-Cohen line
clipping algorithm. The rectangular window has lower rectangular corner at (-5, 1) and upper right-hand
corner at (3, 7). Consider the following three lines for clipping with the given end-point coordinates?
Line AB:A(-6,2) and B(-1,8)
Line CD: C(-1,5) and D(4,8)
Line EF: E(-2,3) and F(1,2)
Which of the following lines is/are candidate for clipping?
A. AB B. DC C. EF D. AB and CD
ugcnetcse-june2016-paper3 computer-graphics
Answer key☟
19.9.27 Computer Graphics: UGC NET CSE | June 2016 | Part 3 | Question: 17 top☝
Let us consider that the original point is (x,y) and new transformed point is (x’,y’). Further Sh and Sh are
shearing factors in x and y directions. If we perform the y direction shear relative to x=s then the
transformed point is given by
A. B.
C. D.
ugcnetcse-june2016-paper3 computer-graphics
Answer key☟
19.9.28 Computer Graphics: UGC NET CSE | June 2016 | Part 3 | Question: 18 top☝
Which of the following statements is/are correct with reference to curve generation?
Answer key☟
19.9.29 Computer Graphics: UGC NET CSE | Junet 2015 | Part 3 | Question: 16 top☝
Which of the following is not a basic primitive of the Graphics Kernel System (GKS)?
Answer key☟
19.9.30 Computer Graphics: UGC NET CSE | Junet 2015 | Part 3 | Question: 17 top☝
A. aB.only
aC.and
cD.only
b d only
ugcnetcse-june2015-paper3 computer-graphics
Answer key☟
19.9.31 Computer Graphics: UGC NET CSE | Junet 2015 | Part 3 | Question: 18 top☝
A.
B.
C.
D.
ugcnetcse-june2015-paper3 computer-graphics
Answer key☟
19.9.32 Computer Graphics: UGC NET CSE | November 2017 | Part 3 | Question: 13 top☝
Answer key☟
19.9.33 Computer Graphics: UGC NET CSE | October 2020 | Part 2 | Question: 46 top☝
In the context of Computer graphics, which of the following statements is/are correct?
Answer key☟
19.9.34 Computer Graphics: UGC NET CSE | October 2020 | Part 2 | Question: 47 top☝
Concerning phong shading and Gouraud shading in a scene, which of the following statements are true?
19.9.35 Computer Graphics: UGC NET CSE | October 2020 | Part 2 | Question: 66 top☝
Match with . gives matrices representing transformations and shows the
corresponding transformation diagrams.
A. B.
C. D.
ugcnetcse-oct2020-paper2 non-gate computer-graphics
Answer key☟
19.9.36 Computer Graphics: UGC NET CSE | October 2020 | Part 2 | Question: 76 top☝
Given below are different properties of projections from . Identify the correct order on the basis of
property true of a perspective projection only, an orthographic projection only, both orthographic and
projective transformations and neither orthographic nor projective transformation, respectively.
Answer key☟
19.9.37 Computer Graphics: UGC NET CSE | October 2020 | Part 2 | Question: 82 top☝
Answer key☟
19.9.38 Computer Graphics: UGC NET CSE | September 2013 | Part 3 | Question: 59 top☝
Which of the following graphics devices are known as active graphics devices?
I. Alphanumeric devices
II. Thumb wheels
III. Digitizers
IV. Joystics
A. I and II B. III and IV C. I, II and III D. I, II, III and IV
ugcnetcse-sep2013-paper3 computer-graphics
Answer key☟
19.10.1 Crt: UGC NET CSE | December 2015 | Part 3 | Question: 71 top☝
A. aB.and
a,
C.db a,
and
D.b,a,
dc cand
andd d
ugcnetcse-dec2015-paper3 computer-graphics crt
Answer key☟
19.10.2 Crt: UGC NET CSE | November 2017 | Part 3 | Question: 15 top☝
A. The path an electron beam takes when returning to the left side of the CRT
B. The path an electron beam takes when returning to the right side of the CRT
C. The technique of turning, the electron beam off while retracing
D. The technique of turning, the electron beam on/ off while retracing
Answer key☟
19.11.1 Digital Image Processing: UGC NET CSE | June 2013 | Part 3 | Question: 19 top☝
An image is 1024 800 pixels with 3 bytes/pixel. Assume the image is uncompressed. How long does it
make to transmit it over a 10 Mbps Ethernet?
Answer key☟
19.11.2 Digital Image Processing: UGC NET CSE | June 2013 | Part 3 | Question: 31 top☝
Images tend to be very large collection of data. The size of memory required for a 1024 by 1024 image in
which the color of each pixel is represented by a n-bit number, (in an 8-bit machines) is
A. n 8 MB B. n/8 MB
C. (1024 1024)/8 MB D. 1024 MB
ugcnetcse-june2013-paper3 computer-graphics digital-image-processing
Answer key☟
19.11.3 Digital Image Processing: UGC NET CSE | June 2013 | Part 3 | Question: 56 top☝
The number of distinct binary images which can be generated from a given binary image of right M N are
A. M+N B. M N C. 2 D. 2
ugcnetcse-june2013-paper3 computer-graphics digital-image-processing
Answer key☟
19.11.4 Digital Image Processing: UGC NET CSE | June 2013 | Part 3 | Question: 57 top☝
A. Finite B. Infinite
C. Neither finite nor infinite D. None of the above
ugcnetcse-june2013-paper3 computer-graphics digital-image-processing
Answer key☟
19.11.5 Digital Image Processing: UGC NET CSE | November 2017 | Part 3 | Question: 18 top☝
Answer key☟
19.12.1 Display Devices: UGC NET CSE | June 2013 | Part 3 | Question: 28 top☝
The refresh rate above which a picture stops flickering and fuses into a steady image is called ____
Answer key☟
19.13.1 Frame Buffer: UGC NET CSE | August 2016 | Part 3 | Question: 14 top☝
Consider a -bit plane frame buffer with -bit wide lookup table with . How many intensity levels
are available at a time ?
A. B. C. D.
ugcnetcse-aug2016-paper3 computer-graphics frame-buffer
19.14.1 Halftoning: UGC NET CSE | June 2012 | Part 3 | Question: 75 top☝
Halftoning is defined as
Answer key☟
19.15.1 Image Compression: UGC NET CSE | September 2013 | Part 3 | Question: 55 top☝
MPEG involves both spatial compression and temporal compression. The spatial compression is similar to
JPEG and temporal compression removes _____ frames.
Answer key☟
19.16 Image Entropy (1) top☝
19.16.1 Image Entropy: UGC NET CSE | December 2012 | Part 3 | Question: 71 top☝
A. B. C. D.
ugcnetcse-dec2012-paper3 computer-graphics image-entropy
Answer key☟
19.17.1 Line Clipping: UGC NET CSE | December 2014 | Part 3 | Question: 17 top☝
In Cyrus-Beck algorithm for line clipping the value of parameter is computed by the relation:
(Here and are the two end points of the line, is a point on the boundary, is inner normal).
A. B.
C. D.
ugcnetcse-dec2014-paper3 non-gate computer-graphics line-clipping
Answer key☟
19.18.1 Line Drawing Algorithm: UGC NET CSE | August 2016 | Part 3 | Question: 15 top☝
Consider the Breshenham’s line generation algorithm for a line with gradient greater than one, current point
and decision parameter, . The next point to be plotted and updated decision
parameter, , for are given as _______.
A.
B.
C.
D.
Answer key☟
19.18.2 Line Drawing Algorithm: UGC NET CSE | August 2016 | Part 3 | Question: 18 top☝
The Liang-Barsky line clipping algorithm uses the parametric equation of a line from to
along with its infinite extension which is given as :
A. B. C. D.
ugcnetcse-aug2016-paper3 computer-graphics line-drawing-algorithm
Answer key☟
19.18.3 Line Drawing Algorithm: UGC NET CSE | June 2013 | Part 3 | Question: 27 top☝
Answer key☟
19.19.1 Parametric Line Equation: UGC NET CSE | September 2013 | Part 3 | Question: 63 top☝
The parametric representation of the line segment between the position vectors and is
given as
A.
B.
C.
D.
Answer key☟
19.20.1 Phong Color Model: UGC NET CSE | June 2019 | Part 2 | Question: 30 top☝
Using the phong reflectance model, the strength of the specular highlight is determined by the angle
between
A. the view vector and the normal vector B. the light vector and the normal vector
C. the light vector and the reflected vector D. the reflected vector and the view vector
ugcnetcse-june2019-paper2 phong-color-model
Answer key☟
19.21.1 Projection: UGC NET CSE | August 2016 | Part 3 | Question: 16 top☝
A point is rotated about a pivot point by 60°. What is the new transformed point ?
A. B. C. D.
ugcnetcse-aug2016-paper3 computer-graphics projection
Answer key☟
19.21.2 Projection: UGC NET CSE | August 2016 | Part 3 | Question: 17 top☝
In perspective projection (from 3D to 2D), objects behind the centre of projection are projected upside down
and backward onto the view-plane. This is known as _____.
Answer key☟
19.21.3 Projection: UGC NET CSE | December 2014 | Part 3 | Question: 18 top☝
Answer key☟
19.21.4 Projection: UGC NET CSE | June 2012 | Part 3 | Question: 59 top☝
The perspective projection matrix, on the view plan z=d where the centre of projection is the origin (0, 0, 0)
shall be
A.
B.
C.
D.
Answer key☟
19.21.5 Projection: UGC NET CSE | June 2013 | Part 3 | Question: 29 top☝
Answer key☟
19.21.6 Projection: UGC NET CSE | June 2016 | Part 3 | Question: 16 top☝
In perspective projection, if a line segment joining a point which lies in front of the viewer to a point in back of
the viewer is projected to a broken line of infinte extent. This is known as ____
Answer key☟
19.21.7 Projection: UGC NET CSE | November 2017 | Part 3 | Question: 14 top☝
Answer key☟
19.21.8 Projection: UGC NET CSE | September 2013 | Part 3 | Question: 60 top☝
I. two of the three foreshortening factors are equal and third is arbitrary
II. all of the three foreshortening factors are equal
III. all of the three foreshortening factors are arbitrary
Answer key☟
19.22.1 Raster Graphics: UGC NET CSE | August 2016 | Part 3 | Question: 13 top☝
Consider a raster grid having -axes in positive -direction and positive upward -direction with
, , , and . What is the address of memory pixel with location
in raster grid assuming base address (one) ?
A. B. C. D.
ugcnetcse-aug2016-paper3 computer-graphics raster-graphics
Answer key☟
19.22.2 Raster Graphics: UGC NET CSE | June 2019 | Part 2 | Question: 27 top☝
Consider a raster system with resolution by . What size is frame buffer (in bytes) for this system to
store bits per pixel?
A. kilobytes B. kilobytes
C. kilobytes D. kilobytes
ugcnetcse-june2019-paper2 raster-graphics
Answer key☟
If 40 black lines interleaved with 40 white lines can be distinguished across one inch, the resolution is
Answer key☟
19.24.1 Rotation: UGC NET CSE | June 2016 | Part 3 | Question: 14 top☝
A point P(5,1) is rotated by 90 about a pivot point (2,2). What is the coordinate of new transformed point
P'?
Answer key☟
19.24.2 Rotation: UGC NET CSE | Junet 2015 | Part 3 | Question: 14 top☝
Consider a triangle A(0,0), B(1, 1) and C(5, 2). The triangle has to be rotated by an angle of 45 about the
point P(-1, -1). What shall be the coordinates of new triangle?
A.
B.
C.
D.
Answer key☟
19.25.1 Transformation: UGC NET CSE | December 2012 | Part 3 | Question: 16 top☝
The Mandelbrot set used for the construction of beautiful images is based on the following transformation.
. Here,
A. Both and are real numbers B. Both and are complex numbers
C. is real and is complex D. is complex and is real
ugcnetcse-dec2012-paper3 computer-graphics transformation
Answer key☟
19.25.2 Transformation: UGC NET CSE | Junet 2015 | Part 3 | Question: 13 top☝
Give the number of principal vanishing point(s) along with their direction for the standard prospective
transformation:
Answer key☟
Answer Keys
19.1.1 Q-Q 19.2.1 B 19.3.1 Q-Q 19.3.2 A 19.4.1 C
19.5.1 D 19.6.1 A 19.7.1 B 19.8.1 A 19.9.1 X
19.9.2 B 19.9.3 A 19.9.4 D 19.9.5 C 19.9.6 D
19.9.7 C 19.9.8 X 19.9.9 B 19.9.10 D 19.9.11 X
19.9.12 B 19.9.13 C 19.9.14 D 19.9.15 D 19.9.16 D
19.9.17 A 19.9.18 Q-Q 19.9.19 D 19.9.20 D 19.9.21 C
19.9.22 D 19.9.23 C 19.9.24 A 19.9.25 D 19.9.26 D
19.9.27 C 19.9.28 D 19.9.29 B 19.9.30 D 19.9.31 A
19.9.32 D 19.9.33 A 19.9.34 C 19.9.35 D 19.9.36 C
19.9.37 D 19.9.38 D 19.10.1 C 19.10.2 A 19.11.1 C
19.11.2 B 19.11.3 D 19.11.4 A 19.11.5 C 19.12.1 C
19.13.1 Q-Q 19.14.1 B 19.15.1 D 19.16.1 C 19.17.1 B
19.18.1 Q-Q 19.18.2 Q-Q 19.18.3 B 19.19.1 C 19.20.1 D
19.21.1 Q-Q 19.21.2 Q-Q 19.21.3 D 19.21.4 B 19.21.5 D
19.21.6 C 19.21.7 D 19.21.8 C 19.22.1 Q-Q 19.22.2 A
19.23.1 A 19.24.1 A 19.24.2 C 19.25.1 B 19.25.2 A
20 Non GATE: Computer Peripherals (3)
20.1.1 Computer Peripherals: UGC NET CSE | December 2013 | Part 3 | Question: 61 top☝
Which of the following is not true with respect to to a trackball and/or spaceball?
I. A trackball is a two dimensional positioning device while as a spaceball provides six degrees of freedom
II. Unlike the trackball a spaceball does not actually move
III. A trackball is a three dimensional positioning device while as a spaceball provides six degrees of freedom
A. I and II B. II and III C. II only D. III only
ugcnetcse-dec2013-paper3 non-gate computer-peripherals
Answer key☟
20.2.1 Io Devices: UGC NET CSE | December 2014 | Part 3 | Question: 14 top☝
A. B.
C. D.
ugcnetcse-dec2014-paper3 non-gate computer-peripherals io-devices
Answer key☟
20.3.1 Matrix Printer: UGC NET CSE | December 2014 | Part 3 | Question: 03 top☝
In a dot matrix printer the time to print a character is m.sec., time to space in between characters is
m.sec., and the number of characters in a line are . The printing speed of the dot matrix printer in
characters per second and the time to print a character line are given by which of the following options ?
Answer key☟
Answer Keys
20.1.1 D 20.2.1 C 20.3.1 X
21 Non GATE: Data Mining and Warehousing (17)
A. A B. B C. C D. B and C
ugcnetcse-jan2017-paper3 non-gate
Answer key☟
Answer key☟
21.1.1 Data Cube: UGC NET CSE | December 2015 | Part 2 | Question: 31 top☝
A data cube has dimensions, and each dimensions has exactly distinct values in the base cuboid.
Assume that there are no concept hierarchies associated with the dimensions. What is the maximum
number of cells possible in the data cube,
A. B. C. D.
ugcnetcse-dec2015-paper2 data-cube data-modelling
Answer key☟
21.2.1 Data Mining: UGC NET CSE | October 2020 | Part 2 | Question: 35 top☝
The process of removing details from a given state representation is called _____
Answer key☟
21.3.1 Data Mining And Warehousing: UGC NET CSE | December 2015 | Part 2 | Question: 34 top☝
____ allows selection of the relevant information necessary for the data warehouse:
Answer key☟
Answer key☟
21.5.1 Expert System: UGC NET CSE | December 2014 | Part 3 | Question: 59 top☝
A. B.
C. D.
ugcnetcse-dec2014-paper3 artificial-intelligence expert-system
Answer key☟
21.6.1 Fuzzy Set: UGC NET CSE | June 2012 | Part 3 | Question: 6 top☝
A. B.
C. D.
ugcnetcse-june2012-paper3 fuzzy-set
Answer key☟
21.7.1 Group Decision Support System: UGC NET CSE | August 2016 | Part 3 | Question: 73 top☝
Answer key☟
Statement I: If and have correlation of the cluster centroid will be in straight line
Statement II: If and have correlation of the cluster centroid will be in straight line
In the light of the above statements, choose the correct answer from the options given below
ugcnetcse-oct2020-paper2 k-means-clustering
Answer key☟
21.9.1 Knowledge Representation: UGC NET CSE | December 2013 | Part 3 | Question: 23 top☝
High level knowledge which relates to the use of sentences in different contexts and how the context affect
the meaning of the sentences?
Answer key☟
21.9.2 Knowledge Representation: UGC NET CSE | December 2014 | Part 3 | Question: 58 top☝
A. B.
C. D.
ugcnetcse-dec2014-paper3 artificial-intelligence knowledge-representation
21.9.3 Knowledge Representation: UGC NET CSE | June 2010 | Part 2 | Question: 2 top☝
' is a robot of ’ means can perform some of the tasks that otherwise would do and is unable to
do anything else.Which of the following is the most appropriate representation to model this situation?
D. None of these
A. B. C.
ugcnetcse-june2010-paper2 knowledge-representation non-gate
21.9.4 Knowledge Representation: UGC NET CSE | June 2013 | Part 3 | Question: 72 top☝
Which of the following is a knowledge representation technique used to represent knowledge about
stereotype situation?
Answer key☟
21.9.5 Knowledge Representation: UGC NET CSE | June 2014 | Part 3 | Question: 08 top☝
A.
B.
C.
D.
Answer key☟
21.10.1 Olap: UGC NET CSE | December 2015 | Part 2 | Question: 33 top☝
____ system is market oriented and is used for data analysis by knowledge workers including Managers,
Executives adn Analysts.
Answer key☟
21.11.1 Perceptron: UGC NET CSE | December 2014 | Part 3 | Question: 70 top☝
Answer key☟
Answer Keys
21.0.1 A 21.0.2 Q-Q 21.1.1 D 21.2.1 D 21.3.1 A
21.4.1 A 21.5.1 B 21.6.1 X 21.7.1 Q-Q 21.8.1 C
21.9.1 D 21.9.2 B 21.9.3 Q-Q 21.9.4 C 21.9.5 D
21.10.1 B 21.11.1 D
22 Non GATE: Digital Image Processing (8)
22.1.1 Discovolution: UGC NET CSE | December 2015 | Part 3 | Question: 51 top☝
A. Combination of blur identification and image restoration B. Combination of segmentation and classification
C. Combination of blur and non-blur image D. None of the above
ugcnetcse-dec2015-paper3 digital-image-processing discovolution
Answer key☟
22.2.1 Entropy: UGC NET CSE | December 2014 | Part 3 | Question: 65 top☝
Given a simple image of size whose histogram models the symbol probabilities and is given by
a b c d
The first order estimate of image entropy is maximum when
A. B.
C. D.
ugcnetcse-dec2014-paper3 digital-image-processing entropy
Answer key☟
22.2.2 Entropy: UGC NET CSE | December 2015 | Part 3 | Question: 49 top☝
Consider the conditional entropy and mutual information for the binary symmetric channel. The input source
A. B.
C. D.
ugcnetcse-dec2015-paper3 digital-image-processing entropy
Answer key☟
22.3.1 Fourier Transform: UGC NET CSE | December 2012 | Part 3 | Question: 64 top☝
If the Fourier transform of the function f(x,y) is F(m,n), then the Fourier transform of the function f(2x,2y) is
A. B. C. D.
ugcnetcse-dec2012-paper3 fourier-transform digital-image-processing
22.4.1 Image Compression: UGC NET CSE | June 2012 | Part 3 | Question: 10 top☝
In an image compression system 16384 bits are used to represent 256 256 image with 256 gray levels.
What is the compression ratio for this system?
A. 1 B. 2 C. 4 D. 8
ugcnetcse-june2012-paper3 image-compression
Answer key☟
22.4.2 Image Compression: UGC NET CSE | June 2012 | Part 3 | Question: 19 top☝
ugcnetcse-june2012-paper3 image-compression
Answer key☟
22.4.3 Image Compression: UGC NET CSE | June 2014 | Part 3 | Question: 55 top☝
Given an image of size pixels in which intensity of each pixel is an -bit quality. It requires
_______ of storage space if the image is not compressed.
Answer key☟
22.4.4 Image Compression: UGC NET CSE | June 2016 | Part 3 | Question: 60 top☝
Which of the following is used for the boundary representation of an image object?
Answer key☟
Answer Keys
22.1.1 D 22.2.1 D 22.2.2 D 22.3.1 A 22.4.1 X
22.4.2 A 22.4.3 B 22.4.4 D
23 Non GATE: Digital Signal Processing (5)
Answer key☟
23.1.1 Butterworth Lowpass Filter: UGC NET CSE | December 2014 | Part 3 | Question: 66 top☝
A Butterworth lowpass filter of order , with a cutoff frequency at distance from the origin, has the
transfer function given by
A. B.
C. D.
Answer key☟
23.2.1 Digital Signal Processing: UGC NET CSE | June 2012 | Part 2 | Question: 18 top☝
Page Shift Keying (PSK) Method is used to modulate digital signal at 9600 bps using 16 level. Find the line
signals and speed (i.e., modulation rate)
Answer key☟
23.3.1 Discrete Memoryless Channel: UGC NET CSE | June 2016 | Part 3 | Question: 58 top☝
Consider a discrete memoryless channel and assume that H(x) is the amount of information per symbol at
the input of the channel; H(y) is the amount of information per symbol at the output of the channel. H(x y) is
the amount of uncertainty remaining on x knowing y; and I(x;y)is the information transmission. Which of the
following does not define the channel capacity of a descrete memoryless channel?
Answer key☟
23.4.1 Spatial Mask: UGC NET CSE | December 2014 | Part 3 | Question: 64 top☝
A. only B. only
C. Both and D. None of these
ugcnetcse-dec2014-paper3 digital-image-processing spatial-mask
Answer key☟
Answer Keys
23.0.1 C 23.1.1 A 23.2.1 A 23.3.1 D 23.4.1 B
24 Non GATE: Distributed Computing (11)
24.1.1 Computing Models: UGC NET CSE | December 2014 | Part 3 | Question: 75 top☝
Which of the following computing models is not an example of distributed computing environment ?
Answer key☟
24.2.1 Distributed Computing: UGC NET CSE | December 2014 | Part 3 | Question: 11 top☝
A. B.
C. Both are correct D. None of the statements are correct.
ugcnetcse-dec2014-paper3 distributed-computing non-gate
Answer key☟
24.2.2 Distributed Computing: UGC NET CSE | December 2014 | Part 3 | Question: 54 top☝
ugcnetcse-dec2014-paper3 distributed-computing
Answer key☟
24.2.3 Distributed Computing: UGC NET CSE | June 2014 | Part 2 | Question: 27 top☝
A. , & B. &
C. & D. only
ugcnetcse-june2014-paper2 non-gate distributed-computing
Answer key☟
24.3.1 Distributed Database: UGC NET CSE | December 2014 | Part 3 | Question: 07 top☝
Answer key☟
24.3.2 Distributed Database: UGC NET CSE | June 2016 | Part 3 | Question: 12 top☝
Semi-join strategies are techniques for query processing in distributed database system. Which of the
following is semi-joined technique?
A. Only the joining attributes are sent from one site to another and then all of the rows are returned
B. All of the attributes are sent from one site to another and then only the required rows are returned
C. Only the joining attributes are sent from one site to another and then only the required rows are returned
D. All of the attributes are sent from one site to another and then only the required rows are returned
Answer key☟
24.4.1 Distributed System: UGC NET CSE | December 2015 | Part 3 | Question: 62 top☝
The distributed system is a collection of _____(P)_____ and communication is achieved in disributed system
by ____(Q)____, where (P) and (Q) are:
A. Loosely coupled hardware on tightly coupled software and disk sharing, repspectively
B. Tightly coupled hardware on loosely coupled software and shared memory, repspectively
C. Tightly coupled software on loosely coupled hardware and message passing, repspectively
D. Loosely coupled software on tightly coupled hardware and file sharing, repspectively
ugcnetcse-dec2015-paper3 distributed-system
Answer key☟
24.4.2 Distributed System: UGC NET CSE | September 2013 | Part 3 | Question: 68 top☝
Which of the following statements is not correct with respect to the distributed systems?
A. Distributed system represents a global view of the network and considers it as a virtual uniprocessor system by
controlling and managing resources across the network on all the sites.
B. Distributed system is built on bare machine, not an add-on to the existing software
C. In a distributed system, kernel provides smallest possible set of services on which other services are built. This
kernel is called microkernel. Open servers provide other services and access to shared resources.
D. In a distributed system, if a user wants to run the program on other nodes or share the resources on remote
sites due to their beneficial aspects, user has to log on to that site.
ugcnetcse-sep2013-paper3 distributed-system
Answer key☟
24.5.1 Message Passing: UGC NET CSE | Junet 2015 | Part 2 | Question: 50 top☝
Which of the following is not valid with reference to Message Passing Interface(MPI)?
Answer key☟
24.6 Parallel Virtual Machine (1) top☝
24.6.1 Parallel Virtual Machine: UGC NET CSE | Junet 2015 | Part 2 | Question: 47 top☝
Which of the following statements is incorrect for Parallel Virtual Machine (PVM)?
A. The PVM communication model provides asynchronous blocking send, asynchronous blocking receive, amd
non-blocking receive function
B. Message buffers are allocated dynamically
C. The PVM communication model assumes that any task can send a message to any order PVM task and that
there is no limit to the size or number of such messages
D. In PVM model, the message order is not preserved
Answer key☟
24.7.1 Rpc: UGC NET CSE | June 2016 | Part 3 | Question: 54 top☝
Suppose that the time to do a null remote procedure call (RPC) (i.e., 0 data bytes) is 1.0 msec with an
additional 1.5 msec for every 1K of data. How long does it take to read 32 K from the file server as 32 1K
RPCs?
Answer key☟
Answer Keys
24.1.1 B 24.2.1 D 24.2.2 B 24.2.3 D 24.3.1 A
24.3.2 C 24.4.1 B 24.4.2 D 24.5.1 C 24.6.1 D
24.7.1 B
25 Non GATE: Geometry (2)
25.1.1 Geometry: UGC NET CSE | December 2014 | Part 3 | Question: 16 top☝
A.
B.
C.
D.
Answer key☟
25.2.1 Lines Curves: UGC NET CSE | December 2015 | Part 3 | Question: 32 top☝
The end points of a given line are and . Compute each value of y as x steps from to , by
using equation of straight line:
A. For
B. For
C. For
D. For
Answer key☟
Answer Keys
25.1.1 A 25.2.1 C
26 Non GATE: Integrated Circuits (1)
26.1.1 Integrated Circuits: UGC NET CSE | June 2012 | Part 2 | Question: 36 top☝
Which of the following logic families is well suited for high-speed operations?
Answer key☟
Answer Keys
26.1.1 B
27 Non GATE: IS&Software Engineering (204)
ugcnetcse-dec2006-paper2
Answer key☟
Answer key☟
A legacy software system has modules. The latest release required that of these modules be
changed. In addition, new modules were added and old modules were removed. Compute the
software maturity index for the system.
A. B. C. D.
ugcnetcse-dec2018-paper2
Answer key☟
ugcnetcse-dec2004-paper2
Answer key☟
Answer key☟
ugcnetcse-dec2004-paper2
Answer key☟
ugcnetcse-dec2007-paper2
Answer key☟
Answer key☟
In software development, value adjustment factors include the following among others:
(A) the criticality of the performance and reusability of the code.
(B) number of lines of code in the software.
(C) number of technical manpower and hardware costs.
(D) time period available and the level of user friendliness.
ugcnetcse-june2008-paper2
Answer key☟
A. Size measurement
B. Cost measurement
C. Design recovery
D. All of the above
ugcnetcse-june2009-paper2
27.0.11 UGC NET CSE | December 2007 | Part 2 | Question: 45 top☝
Answer key☟
A. Programs
B. Data
C. Documentation
D. All of the above
ugcnetcse-june2009-paper2
Answer key☟
Answer key☟
A. risk magnitude and risk impact. B. risk probability and risk impact.
C. risk maintenance and risk impact. D. risk development and risk impact.
ugcnetcse-dec2006-paper2
Answer key☟
ugcnetcse-dec2006-paper2
Answer key☟
ugcnetcse-dec2006-paper2
Answer key☟
A. Product
B. Process
C. Product and Process
D. None of the above
ugcnetcse-june2009-paper2
ugcnetcse-dec2007-paper2
Answer key☟
ugcnetcse-dec2006-paper2
Which of the following tools is not required during system analysis phase of system development life cycle ?
Answer key☟
Which possibility among the following is invalid in case of a Data Flow Diagram ?
A. A process having in-bound data flows more than out-bound data flows
B. A data flow between two processes
C. A data flow between two data stores
D. A data store having more than one in-bound data flows
ugcnetcse-dec2006-paper2
Answer key☟
Answer key☟
27.1.1 Adaptive Maintenance: UGC NET CSE | June 2019 | Part 2 | Question: 58 top☝
Software products need adaptive maintenance for which of the following reasons?
ugcnetcse-june2019-paper2 adaptive-maintenance
Answer key☟
27.2.1 Artificial Intelligence: UGC NET CSE | December 2012 | Part 3 | Question: 74 top☝
A. h’ is always 0 B. g is always 1
C. h’ never overestimates h D. h’ never underestimates h
ugcnetcse-dec2012-paper3 artificial-intelligence
Answer key☟
27.2.2 Artificial Intelligence: UGC NET CSE | June 2012 | Part 3 | Question: 23 top☝
Which of the following prolog programs correctly implement “if G succeeds then execute goal P else execute
goal ”?
ugcnetcse-june2012-paper3 artificial-intelligence
Answer key☟
27.3.1 Assignment Problem: UGC NET CSE | June 2012 | Part 3 | Question: 62 top☝
The optimal solution of the following assignment problem using Hungarian method is
A. B.
C. D.
ugcnetcse-june2012-paper3 optimization assignment-problem
Answer key☟
27.4.1 Cmm Model: UGC NET CSE | December 2014 | Part 2 | Question: 42 top☝
Requirement Development, Organizational Process Focus, Organizational Training, Risk Management and
Integrated Supplier Management are process areas required to achieve maturity level
Answer key☟
27.4.2 Cmm Model: UGC NET CSE | June 2014 | Part 3 | Question: 21 top☝
Which one of the following is not a key process area in CMM level ?
Answer key☟
27.4.3 Cmm Model: UGC NET CSE | June 2016 | Part 3 | Question: 47 top☝
Which of the following sets represent five stages defined by Capability Maturity Model (CMM) in increasing
order of maturity?
Answer key☟
27.5.1 Cmmi: UGC NET CSE | July 2018 | Part 2 | Question: 15 top☝
A.
B.
C.
D.
Answer key☟
27.6.1 Cocomo Model: UGC NET CSE | December 2008 | Part 2 | Question: 45 top☝
Answer key☟
27.6.2 Cocomo Model: UGC NET CSE | December 2010 | Part 2 | Question: 44 top☝
The COCOMO model was introduced in the book title “Software Engineering Economics” authored by
Answer key☟
27.6.3 Cocomo Model: UGC NET CSE | January 2017 | Part 3 | Question: 48 top☝
A software company needs to develop a project that is estimated as function points and is planning to
use JAVA as the programming language whose approximate lines of code per function point is accepted as
. Considering as multiplicative factor, as exponention factor for the basic COCOMO effort
equation and as multiplicative factor, as exponention factor for the basic COCOMO duration
equation, approximately how long does project take to complete?
A. months B. months
C. months D. months
ugcnetcse-jan2017-paper3 is&software-engineering cocomo-model
Answer key☟
27.7.1 Coding And Testing: UGC NET CSE | June 2016 | Part 3 | Question: 46 top☝
Answer key☟
Answer key☟
27.8.2 Cohesion: UGC NET CSE | Junet 2015 | Part 2 | Question: 44 top☝
Answer key☟
27.9.1 Cost Estimation Model: UGC NET CSE | December 2009 | Part 2 | Question: 43 top☝
Codes :
(A) (i) (ii) (iv)
(B) (ii) (iii) (iv)
(C) (i) (ii) (iii)
(D) (i) (ii) (iii) (iv)
Answer key☟
27.9.2 Cost Estimation Model: UGC NET CSE | December 2013 | Part 3 | Question: 5 top☝
Answer key☟
27.10.1 Coupling: UGC NET CSE | December 2013 | Part 3 | Question: 6 top☝
Answer key☟
27.10.2 Coupling: UGC NET CSE | July 2018 | Part 2 | Question: 16 top☝
Coupling is a measure of the strength of the interconnections between software modules. Which of the
following are correct statements with respect to module coupling?
P: Common coupling occurs when one module controls the flow of another module by passing it information on
what to do
Q: In data coupling, the complete data structure is passed from one module to another through parameters.
R: Stamp coupling occurs when modules share a composite data structure and use only parts of it.
Code:
Answer key☟
27.10.3 Coupling: UGC NET CSE | September 2013 | Part 3 | Question: 46 top☝
In _____, modules A and B make use of a common data type, but perhaps perform different operations on
it.
Answer key☟
27.11.1 Coupling Cohesion: UGC NET CSE | June 2019 | Part 2 | Question: 51 top☝
Answer key☟
27.12.1 Crc Polynomial: UGC NET CSE | December 2015 | Part 3 | Question: 31 top☝
A. aB.and
a,
C.cb,a,
D.
c c,
and
a,and
b,
d and
d d
ugcnetcse-dec2015-paper3 is&software-engineering crc-polynomial
Answer key☟
27.13.1 Cyclomatic Complexity: UGC NET CSE | December 2014 | Part 2 | Question: 45 top☝
Answer key☟
27.13.2 Cyclomatic Complexity: UGC NET CSE | June 2016 | Part 2 | Question: 44 top☝
ugcnetcse-june2016-paper2 cyclomatic-complexity
Answer key☟
27.14.1 Data Mining: UGC NET CSE | December 2012 | Part 3 | Question: 5 top☝
______ is process of extracting previously non known valid and actionable information from large data to
make crucial business and strategic decisions.
Answer key☟
27.14.2 Data Mining: UGC NET CSE | June 2012 | Part 3 | Question: 12 top☝
Answer key☟
27.15.1 Digital Marketing: UGC NET CSE | December 2012 | Part 3 | Question: 1 top☝
Answer key☟
27.16.1 Fan In: UGC NET CSE | December 2014 | Part 3 | Question: 47 top☝
of a component is defined as
A. Count of the number of components that can call, or pass control, to a component
B. Number of components related to component
C. Number of components dependent on component
D. None of the above
ugcnetcse-dec2014-paper3 is&software-engineering fan-in
Answer key☟
27.17.1 Flow Chart: UGC NET CSE | December 2010 | Part 2 | Question: 45 top☝
Answer key☟
27.18.1 Function Point Metric: UGC NET CSE | December 2014 | Part 3 | Question: 44 top☝
A. B. C. D.
ugcnetcse-dec2014-paper3 is&software-engineering function-point-metric
Answer key☟
27.18.2 Function Point Metric: UGC NET CSE | June 2014 | Part 2 | Question: 14 top☝
A. B. C. D.
ugcnetcse-june2014-paper2 is&software-engineering function-point-metric
Answer key☟
27.19.1 Git: UGC NET CSE | June 2019 | Part 2 | Question: 55 top☝
Answer key☟
27.20.1 Information System: UGC NET CSE | December 2014 | Part 3 | Question: 60 top☝
Answer key☟
27.21 Is&software Engineering (59) top☝
27.21.1 Is&software Engineering: UGC NET CSE | August 2016 | Part 3 | Question: 47 top☝
ugcnetcse-aug2016-paper3 is&software-engineering
Answer key☟
27.21.2 Is&software Engineering: UGC NET CSE | August 2016 | Part 3 | Question: 48 top☝
Which of the following is/are CORRECT statement(s) about version and release ?
I. A version is an instance of a system, which is functionally identical but nonfunctionally distinct from other
instances of a system.
II. A version is an instance of a system, which is functionally distinct in some way from other system instances.
III. A release is an instance of a system, which is distributed to users outside of the development team.
IV. A release is an instance of a system, which is functionally identical but nonfunctionally distinct from other
instances of a system.
Answer key☟
27.21.3 Is&software Engineering: UGC NET CSE | December 2011 | Part 2 | Question: 14 top☝
An SRS
A. Establishes the basis for agreement between client and the supplier.
B. Provides a reference for validation of the final product.
C. Is a prerequisite to high quality software.
D. All of the above.
ugcnetcse-dec2011-paper2 is&software-engineering
Answer key☟
27.21.4 Is&software Engineering: UGC NET CSE | December 2011 | Part 2 | Question: 17 top☝
Answer key☟
27.21.5 Is&software Engineering: UGC NET CSE | December 2012 | Part 2 | Question: 19 top☝
Answer key☟
27.21.6 Is&software Engineering: UGC NET CSE | December 2012 | Part 2 | Question: 6 top☝
Answer key☟
27.21.7 Is&software Engineering: UGC NET CSE | December 2013 | Part 2 | Question: 10 top☝
Answer key☟
27.21.8 Is&software Engineering: UGC NET CSE | December 2013 | Part 2 | Question: 7 top☝
Answer key☟
27.21.9 Is&software Engineering: UGC NET CSE | December 2013 | Part 2 | Question: 8 top☝
A. the changes due to the evolution of work products as the project proceeds
B. the changes due to defects (bugs) being found and then fixed
C. the changes due to requirement changes
D. all of the above
ugcnetcse-dec2013-paper2 is&software-engineering
Answer key☟
27.21.10 Is&software Engineering: UGC NET CSE | December 2013 | Part 2 | Question: 9 top☝
Answer key☟
27.21.11 Is&software Engineering: UGC NET CSE | December 2013 | Part 3 | Question: 9 top☝
A. Once we write the program and get it to work, our job is done
B. Projects requirements continually change, but change can be easily accommodated because software is flexible
C. If we get behind schedule, we can add more programmers and catch up
D. If an organization does not understand how to control software projects internally, it will invariably struggle when
it outsources software projects.
ugcnetcse-dec2013-paper3 is&software-engineering
Answer key☟
27.21.12 Is&software Engineering: UGC NET CSE | December 2015 | Part 3 | Question: 25 top☝
Which of the following non-functional quality attributes is not highly affected by the architecture of the
software?
Answer key☟
27.21.13 Is&software Engineering: UGC NET CSE | December 2015 | Part 3 | Question: 72 top☝
A. Pareto analysis is a statistical method used for analyzing causes, and is one of the primary tools for quality
management.
B. Reliability of a software specifies the probability of failure-free operation of that software for a given time
duration.
C. The reliability of a system can also be specified as the Mean Time To Failure (MTTF).
D. In white-box testing, the test cases are decided from the specifications or the requirements.
ugcnetcse-dec2015-paper3 is&software-engineering
Answer key☟
27.21.14 Is&software Engineering: UGC NET CSE | December 2015 | Part 3 | Question: 74 top☝
Which one of the following statements, related to the requirements phase in Software Engineering, is
incorrect?
ugcnetcse-dec2015-paper3 is&software-engineering
Answer key☟
27.21.15 Is&software Engineering: UGC NET CSE | January 2017 | Part 2 | Question: 41 top☝
ugcnetjan2017ii is&software-engineering
Answer key☟
27.21.16 Is&software Engineering: UGC NET CSE | January 2017 | Part 2 | Question: 42 top☝
Which of the following is not one of three software product aspects addressed by McCall's software quality
factors ?
Answer key☟
27.21.17 Is&software Engineering: UGC NET CSE | January 2017 | Part 2 | Question: 43 top☝
Which of the following statement(s) is/are true with respect to software architecture?
: Coupling is a measure of how well the things grouped together in a module belong together logically.
: Cohesion is a measure of the degree of interaction between software modules.
: If coupling is low and cohesion is high then it is easier to change one module without affecting others.
Answer key☟
27.21.18 Is&software Engineering: UGC NET CSE | January 2017 | Part 2 | Question: 44 top☝
ugcnetjan2017ii is&software-engineering
Answer key☟
27.21.19 Is&software Engineering: UGC NET CSE | January 2017 | Part 3 | Question: 45 top☝
Match the terms related to Software Configuration Management (SCM) in List-Ⅰ with the descriptions in List-
II.
A. B.
C. D.
ugcnetcse-jan2017-paper3 is&software-engineering
Answer key☟
27.21.20 Is&software Engineering: UGC NET CSE | January 2017 | Part 3 | Question: 46 top☝
A software project was estimated at Function Points . A four person team will be assigned to this
project consisting of an architect, two programmers, and a tester The salary of the architect is ₹ per
month, the programmer ₹ per month and the tester ₹ per month. The average productivity for the
team is per person month. Which of the following represents the projected cost of the project?
A. ₹ B. ₹
C. ₹ D. ₹
ugcnetcse-jan2017-paper3 is&software-engineering
Answer key☟
27.21.21 Is&software Engineering: UGC NET CSE | January 2017 | Part 3 | Question: 47 top☝
Complete each of the following sentences in List-I on the left hand side by filling in the word or phrase from
the List –II on the right hand side that best completes the sentence :
A. B.
C. D.
ugcnetcse-jan2017-paper3 is&software-engineering
Answer key☟
27.21.22 Is&software Engineering: UGC NET CSE | July 2018 | Part 2 | Question: 12 top☝
A. B.
C. D.
ugcnetcse-july2018-paper2 is&software-engineering
Answer key☟
27.21.23 Is&software Engineering: UGC NET CSE | July 2018 | Part 2 | Question: 13 top☝
Which one of the following is not typically provided by Source Code Management Software?
Answer key☟
27.21.24 Is&software Engineering: UGC NET CSE | July 2018 | Part 2 | Question: 14 top☝
A software system crashed 20 times in the year 2017 and for each crash, it took 2 minutes to restart.
Approximately, what was the software availability in that year?
Answer key☟
27.21.25 Is&software Engineering: UGC NET CSE | July 2018 | Part 2 | Question: 18 top☝
Answer key☟
27.21.26 Is&software Engineering: UGC NET CSE | July 2018 | Part 2 | Question: 19 top☝
Which of the following is not a key strategy followed by the clean room approach to software development?
Answer key☟
27.21.27 Is&software Engineering: UGC NET CSE | July 2018 | Part 2 | Question: 20 top☝
Answer key☟
27.21.28 Is&software Engineering: UGC NET CSE | June 2010 | Part 2 | Question: 41 top☝
Answer key☟
27.21.29 Is&software Engineering: UGC NET CSE | June 2012 | Part 2 | Question: 20 top☝
A. program B. software
C. within budget D. software within budget in the given schedule
ugcnetcse-june2012-paper2 non-gate is&software-engineering
Answer key☟
27.21.30 Is&software Engineering: UGC NET CSE | June 2012 | Part 2 | Question: 21 top☝
Key process areas of CMM level 4 are also classified by a process which is
Answer key☟
27.21.31 Is&software Engineering: UGC NET CSE | June 2012 | Part 2 | Question: 22 top☝
Validation means
A. are we building the product right B. are we building the right product
C. verification of fields D. None of the above
ugcnetcse-june2012-paper2 is&software-engineering non-gate
Answer key☟
27.21.32 Is&software Engineering: UGC NET CSE | June 2012 | Part 2 | Question: 23 top☝
Answer key☟
27.21.33 Is&software Engineering: UGC NET CSE | June 2012 | Part 2 | Question: 24 top☝
A. minimize cohesion and maximize coupling B. maximize cohesion and minimize coupling
C. maximize cohesion and maximize coupling D. minimize cohesion and minimize coupling
ugcnetcse-june2012-paper2 non-gate is&software-engineering
Answer key☟
27.21.34 Is&software Engineering: UGC NET CSE | June 2012 | Part 2 | Question: 25 top☝
Which of the following metric does not depend on the programming language used?
Answer key☟
27.21.35 Is&software Engineering: UGC NET CSE | June 2012 | Part 2 | Question: 43 top☝
Answer key☟
27.21.36 Is&software Engineering: UGC NET CSE | June 2012 | Part 3 | Question: 37 top☝
A. Verification B. Validation
C. Testing D. Software quality assurance
ugcnetcse-june2012-paper3 is&software-engineering
Answer key☟
27.21.37 Is&software Engineering: UGC NET CSE | June 2013 | Part 2 | Question: 3 top☝
While estimating the cost of software, Lines Of Code (LOC) and Function Points (FP) are used to measure
which one of the following?
Answer key☟
27.21.38 Is&software Engineering: UGC NET CSE | June 2014 | Part 2 | Question: 11 top☝
in stands for
Answer key☟
27.21.39 Is&software Engineering: UGC NET CSE | June 2014 | Part 2 | Question: 13 top☝
_________ of a system is the structure or structures of the system which comprise software elements, the
externally visible properties of these elements and the relationship amongst them.
Answer key☟
27.21.40 Is&software Engineering: UGC NET CSE | June 2014 | Part 2 | Question: 28 top☝
A. B.
C. D. All of the above
ugcnetcse-june2014-paper2 is&software-engineering
Answer key☟
27.21.41 Is&software Engineering: UGC NET CSE | June 2014 | Part 3 | Question: 19 top☝
A. B.
C. D.
ugcnetjune2014iii is&software-engineering
Answer key☟
27.21.42 Is&software Engineering: UGC NET CSE | June 2014 | Part 3 | Question: 20 top☝
A. It refers to the discrepancy between a computed, observed or measured value and the true, specified or
theoretically correct value.
B. It refers to the actual output of a software and the correct output.
C. It refers to a condition that causes a system to fail.
D. It refers to human action that results in software containing a defect or fault.
ugcnetjune2014iii is&software-engineering
Answer key☟
27.21.43 Is&software Engineering: UGC NET CSE | June 2016 | Part 2 | Question: 41 top☝
If is total number of modules defined in the program architecture, is the number of modules whose
correct function depends on prior processing then the number of modules not dependent on prior processing
is:
A. B. C. D.
ugcnetcse-june2016-paper2 is&software-engineering
Answer key☟
27.21.44 Is&software Engineering: UGC NET CSE | June 2016 | Part 3 | Question: 44 top☝
A. B.
C. D.
ugcnetcse-june2016-paper3 is&software-engineering
Answer key☟
27.21.45 Is&software Engineering: UGC NET CSE | Junet 2015 | Part 3 | Question: 44 top☝
Which design matric is used to measure the compactness of the program in terms of lines of code?
Answer key☟
27.21.46 Is&software Engineering: UGC NET CSE | Junet 2015 | Part 3 | Question: 45 top☝
Answer key☟
27.21.47 Is&software Engineering: UGC NET CSE | Junet 2015 | Part 3 | Question: 60 top☝
Answer key☟
27.21.48 Is&software Engineering: UGC NET CSE | October 2020 | Part 2 | Question: 19 top☝
Answer key☟
27.21.49 Is&software Engineering: UGC NET CSE | October 2020 | Part 2 | Question: 20 top☝
Answer key☟
27.21.50 Is&software Engineering: UGC NET CSE | October 2020 | Part 2 | Question: 21 top☝
A company has a choice of two languages and to develop a software for their client. Number of LOC
required to develop an application in is thrice the LOC in language . Also, software has to be
maintained for next years. Various parameters for two languages are given below to decide which language
should be preferred for development.
Total cost of project include cost of development and maintenance. What is the for for which cost of
developing the software with both languages must be same?
A. B. C. D.
ugcnetcse-oct2020-paper2 non-gate is&software-engineering
Answer key☟
27.21.51 Is&software Engineering: UGC NET CSE | October 2020 | Part 2 | Question: 22 top☝
A Software project was estimated at Function Points. A six person team will be assigned to project
consisting of a requirement gathering person, one designer, two programmers and two testers. The salary of
the designer is per month, requirement gatherer is per month, programmer is
per month and a tester is per month. Average productivity for the team is FP per
person month. Which of the following represents the projected cost of the project
A. B.
C. D.
ugcnetcse-oct2020-paper2 non-gate is&software-engineering
Answer key☟
27.21.52 Is&software Engineering: UGC NET CSE | October 2020 | Part 2 | Question: 45 top☝
27.21.53 Is&software Engineering: UGC NET CSE | October 2020 | Part 2 | Question: 49 top☝
a. Execution Time b. Calender Time c. Clock Time Choose the correct answer from the options
given below:
Answer key☟
27.21.54 Is&software Engineering: UGC NET CSE | October 2020 | Part 2 | Question: 50 top☝
a. Evaluates all use-cases b. Builds state transition diagram for the system
c. Reviews the object behaviour model to verify accuracy and
d. Identifies events that do not derive the interaction sequence
consistency Choose the correct answer from the options given
below:
27.21.55 Is&software Engineering: UGC NET CSE | October 2020 | Part 2 | Question: 51 top☝
Answer key☟
27.21.56 Is&software Engineering: UGC NET CSE | October 2020 | Part 2 | Question: 68 top☝
Match with
With reference to CMM developed by Software Engineering Institute (SEI)
A. B.
C. D.
ugcnetcse-oct2020-paper2 non-gate is&software-engineering
Answer key☟
27.21.57 Is&software Engineering: UGC NET CSE | October 2020 | Part 2 | Question: 77 top☝
Arrange the following types of Cohesion from the best to worst type.
a. Logical Cohesion
b. Sequential Cohesion
c. Communication Cohesion
d. Temporal Cohesion
e. Procedural Cohesion
A.
B.
C.
D.
Answer key☟
27.21.58 Is&software Engineering: UGC NET CSE | October 2020 | Part 2 | Question: 85 top☝
Statement : Quality control involves the series of inspections, reviews and tests used throughout the
software process, to ensure each work product meets the requirements placed upon it.
Statement : Quality assurance consists of auditing and reporting functions of management
In the light of the above statements, choose the correct answer from the options given below
Answer key☟
27.21.59 Is&software Engineering: UGC NET CSE | September 2013 | Part 2 | Question: 28 top☝
The _____ of a program or computing system is the structure or structures of the system, which comprise
software components, the externally visible properties of these components and the relationship among
them.
Answer key☟
27.22.1 Life Cycle Model: UGC NET CSE | Junet 2015 | Part 2 | Question: 43 top☝
Answer key☟
27.23.1 Mis: UGC NET CSE | June 2016 | Part 3 | Question: 71 top☝
A. Provides guidance in identifying problems, finding and evaluating alternative solutions, and selecting or
comparing alternatives
B. Draws on diverse yet predictable data resources to aggregate and summarize data
C. High volume, data capture focus
D. Has as its goal the efficiency of data movement and processing and interfacing different TPS
Answer key☟
27.24.1 Model View Controller: UGC NET CSE | June 2019 | Part 2 | Question: 52 top☝
A. user interface
B. security of the system
C. business logic and domain objects
D. translating between user interface actions/events and operations on the domain objects
ugcnetcse-june2019-paper2 model-view-controller
Answer key☟
27.25.1 Object Oriented Modelling: UGC NET CSE | December 2014 | Part 3 | Question: 41 top☝
Answer key☟
27.26.1 Optimization: UGC NET CSE | June 2012 | Part 3 | Question: 49 top☝
In any simplex table, if corresponding to any negative j, all elements of the column are negative or zero,
the solution under the test is
Answer key☟
27.27.1 Project Planning: UGC NET CSE | Junet 2015 | Part 2 | Question: 45 top☝
Which one from the following is highly associated activity of project planning?
Answer key☟
27.28.1 Project Tracking: UGC NET CSE | June 2019 | Part 2 | Question: 59 top☝
Which of the following are the primary objectives of risk monitoring in software project tracking?
P: To assess whether predicted risks do, in fact, occur
Q: To ensure that risk aversion steps defined for the risk are being properly applied
R: To collect information that can be used for future risk analysis
Answer key☟
27.29.1 Risk Management: UGC NET CSE | December 2014 | Part 3 | Question: 45 top☝
Assume that the software team defines a project risk with % probability of occurrence of risk in the
following manner: Only percent of the software components scheduled for reuse will be integrated into
the application and the remaining functionality will have to be custom developed. If reusable components were
planned with average component size as LOC and software engineering cost for each LOC as $14, then the
risk exposure would be
Answer key☟
27.29.2 Risk Management: UGC NET CSE | June 2014 | Part 2 | Question: 12 top☝
Which one of the following is not a risk management technique for managing the risk due to unrealistic
schedules and budgets ?
A. Detailed multi source cost and schedule estimation. B. Design cost
C. Incremental development D. Information hiding
ugcnetcse-june2014-paper2 is&software-engineering risk-management
Answer key☟
27.29.3 Risk Management: UGC NET CSE | September 2013 | Part 3 | Question: 50 top☝
Sixty reusable components were available for an application. If only 70% of these components can be used,
rest 30% would have to be developed from scratch. If average component is 100 LOC and cost of each LOC
is Rs. 14, what will be risk of exposure if risk probability is 80%?
A. Rs. 25, 200 B. Rs. 20, 160 C. Rs. 25, 160 D. Rs. 20, 400
ugcnetcse-sep2013-paper3 is&software-engineering risk-management
Answer key☟
27.30.1 Size Metrices: UGC NET CSE | Junet 2015 | Part 2 | Question: 41 top☝
A. B.
C. D.
ugcnetcse-june2015-paper2 size-metrices is&software-engineering
Answer key☟
27.31.1 Software: UGC NET CSE | January 2017 | Part 2 | Question: 45 top☝
A software design pattern used to enhance the functionality of an object at run-time is:
Answer key☟
27.32.1 Software Configuration: UGC NET CSE | December 2013 | Part 3 | Question: 7 top☝
A process which defines a series of tasks that have the following four primary objectives is known as
27.33.1 Software Cost Estimation: UGC NET CSE | June 2014 | Part 3 | Question: 18 top☝
Answer key☟
27.34.1 Software Design: UGC NET CSE | August 2016 | Part 2 | Question: 43 top☝
The quick design of a software that is visible to end users leads to _____.
Answer key☟
27.34.2 Software Design: UGC NET CSE | December 2011 | Part 2 | Question: 41 top☝
A. Risk magnitude and risk impact B. Risk probability and risk impact
C. Risk maintenance and risk impact D. Risk development and risk impact
ugcnetcse-dec2011-paper2 is&software-engineering software-design
Answer key☟
27.34.3 Software Design: UGC NET CSE | December 2014 | Part 2 | Question: 43 top☝
The software _______ of a program or a computing system is the structure or structures of the system,
which comprise software components, the externally visible properties of those components, and the
relationships among them.
A. Design B. Architecture
C. Process D. Requirement
ugcnetcse-dec2014-paper2 is&software-engineering software-design
Answer key☟
27.34.4 Software Design: UGC NET CSE | July 2018 | Part 2 | Question: 17 top☝
Answer key☟
27.34.5 Software Design: UGC NET CSE | June 2010 | Part 2 | Question: 42 top☝
Answer key☟
27.34.6 Software Design: UGC NET CSE | June 2010 | Part 2 | Question: 44 top☝
Answer key☟
27.34.7 Software Design: UGC NET CSE | June 2013 | Part 3 | Question: 1 top☝
Answer key☟
27.34.8 Software Design: UGC NET CSE | June 2013 | Part 3 | Question: 10 top☝
A. B.
C. D.
ugcnetcse-june2013-paper3 is&software-engineering software-design
Answer key☟
27.34.9 Software Design: UGC NET CSE | June 2013 | Part 3 | Question: 3 top☝
______ is a process model that removes defects before they can precipitate serious hazards.
Answer key☟
27.34.10 Software Design: UGC NET CSE | June 2013 | Part 3 | Question: 5 top☝
are of
Answer key☟
27.34.11 Software Design: UGC NET CSE | June 2016 | Part 3 | Question: 45 top☝
A. B.
C. D.
ugcnetcse-june2016-paper3 is&software-engineering software-design
Answer key☟
27.34.12 Software Design: UGC NET CSE | Junet 2015 | Part 3 | Question: 42 top☝
Modulo design is used to maximize cohesion and minimize coupling. Which of the following is the key to
implement this rule?
Answer key☟
27.34.13 Software Design: UGC NET CSE | Junet 2015 | Part 3 | Question: 47 top☝
Answer key☟
27.34.14 Software Design: UGC NET CSE | Junet 2015 | Part 3 | Question: 48 top☝
Answer key☟
Software Engineering is a discipline that integrates _________ for the development of computer software.
(A) Process
(B) Methods
(C) Tools
(D) All
Answer key☟
27.35.2 Software Development: UGC NET CSE | July 2018 | Part 2 | Question: 11 top☝
If E, D and C are the estimated development effort (in person-month), estimated development time (in months), and
estimated development cost (in INR Lac) respectively, then (E, D, C) = ______
Answer key☟
27.35.3 Software Development: UGC NET CSE | September 2013 | Part 2 | Question: 27 top☝
Answer key☟
27.36.1 Software Development Life Cycle Models: UGC NET CSE | August 2016 | Part 3 | Question: 44 top☝
Answer key☟
27.36.2 Software Development Life Cycle Models: UGC NET CSE | December 2008 | Part 2 | Question: 44 top☝
A. level B. level
C. level D. level
ugcnetcse-dec2008-paper2 is&software-engineering software-development-life-cycle-models
Answer key☟
27.36.3 Software Development Life Cycle Models: UGC NET CSE | December 2010 | Part 2 | Question: 42 top☝
Answer key☟
27.36.4 Software Development Life Cycle Models: UGC NET CSE | December 2010 | Part 2 | Question: 43 top☝
The system specification is the first deliverable in the computer system engineering process which does not
include
Answer key☟
27.36.5 Software Development Life Cycle Models: UGC NET CSE | December 2011 | Part 2 | Question: 13 top☝
For a data entry project for office staff who have never used computers before (user interface and user
friendliness are extremely important), one will use
Answer key☟
27.36.6 Software Development Life Cycle Models: UGC NET CSE | December 2012 | Part 2 | Question: 24 top☝
Answer key☟
27.36.7 Software Development Life Cycle Models: UGC NET CSE | December 2012 | Part 2 | Question: 48 top☝
_____ is an “umbrella” activity that is applied throughout the software engineering process.
A. Debugging B. Testing
C. Designing D. Software quality assurance
ugcnetcse-dec2012-paper2 is&software-engineering software-development-life-cycle-models
Answer key☟
27.36.8 Software Development Life Cycle Models: UGC NET CSE | December 2015 | Part 2 | Question: 47 top☝
Answer key☟
27.36.9 Software Development Life Cycle Models: UGC NET CSE | June 2016 | Part 2 | Question: 42 top☝
The ____ model is preferred for software development when the requirements are not clear.
Answer key☟
27.36.10 Software Development Life Cycle Models: UGC NET CSE | June 2019 | Part 2 | Question: 57 top☝
Answer key☟
27.36.11 Software Development Life Cycle Models: UGC NET CSE | September 2013 | Part 2 | Question: 29 top☝
27.37.1 Software Development Models: UGC NET CSE | June 2010 | Part 2 | Question: 43 top☝
Answer key☟
27.38.1 Software Intergrity: UGC NET CSE | June 2019 | Part 2 | Question: 56 top☝
A Web application and its support environment has not been fully fortified against attack. Web engineers
estimate that the likelihood of repelling an attack is only percent. The application does not contain
sensitive or controversial information, so the threat probability is percent. What is the integrity of the web
application?
A. B. C. D.
ugcnetcse-june2019-paper2 software-intergrity
Answer key☟
27.39.1 Software Maintenance: UGC NET CSE | Junet 2015 | Part 3 | Question: 46 top☝
Answer key☟
27.39.2 Software Maintenance: UGC NET CSE | September 2013 | Part 3 | Question: 45 top☝
Answer key☟
27.40.1 Software Metrics: UGC NET CSE | December 2014 | Part 2 | Question: 44 top☝
Which one of the following set of attributes should not be encompassed by effective software metrics ?
Answer key☟
27.40.2 Software Metrics: UGC NET CSE | June 2012 | Part 3 | Question: 33 top☝
Answer key☟
27.40.3 Software Metrics: UGC NET CSE | June 2016 | Part 3 | Question: 48 top☝
The number of function points of a proposed system is calculated as 500. Suppose that the system is
planned to be developed in Java and the LOC/FP ratio of Jave is 50. Estimate teh effort (E) required to
complete the project using the effort formula of basic COCOMO given: E=a(KLOC)
Assume that the values of a and b are 2.5 and 1.0 respectively
Answer key☟
27.41.1 Software Process: UGC NET CSE | December 2014 | Part 2 | Question: 41 top☝
Answer key☟
27.42.1 Software Quality Assurance: UGC NET CSE | August 2016 | Part 3 | Question: 46 top☝
Answer key☟
27.42.2 Software Quality Assurance: UGC NET CSE | December 2012 | Part 3 | Question: 55 top☝
A. correctness, reliability
B. efficiency, usability, maintainability
C. testability, portability, accuracy, error tolerances, expandability, access control, audit
D. All of the above
Answer key☟
Answer key☟
27.44.1 Software Reliability: UGC NET CSE | August 2016 | Part 2 | Question: 45 top☝
The extent to which a software performs its intended functions without failures, is termed as
Answer key☟
27.44.2 Software Reliability: UGC NET CSE | December 2011 | Part 2 | Question: 16 top☝
Answer key☟
27.44.3 Software Reliability: UGC NET CSE | December 2014 | Part 3 | Question: 46 top☝
A. B. C. D.
ugcnetcse-dec2014-paper3 is&software-engineering software-reliability
Answer key☟
27.44.4 Software Reliability: UGC NET CSE | June 2013 | Part 3 | Question: 2 top☝
A. B.
C. D.
ugcnetcse-june2013-paper3 is&software-engineering software-reliability non-gate
Answer key☟
27.44.5 Software Reliability: UGC NET CSE | June 2013 | Part 3 | Question: 6 top☝
Software safety is a ______ activity that focuses on the identification and assessment of potential hazards
that may affect software negatively and cause an entire system to fail.
Answer key☟
27.44.6 Software Reliability: UGC NET CSE | June 2014 | Part 3 | Question: 17 top☝
Assume that a program will experience 200 failures in infinite time. It has now experienced 100 failures. The
initial failure intensity was 20 failures/CPU hr. Then the current failure intensity will be
A. 5 failured/CPU hr B. 10 failured/CPU hr
C. 20 failured/CPU hr D. 40 failured/CPU hr
ugcnetjune2014iii is&software-engineering software-reliability
Answer key☟
27.44.7 Software Reliability: UGC NET CSE | June 2016 | Part 3 | Question: 43 top☝
A server crashes on the average once in 30 days, that is, the Mean Time Between Failures (MTBF) is 30
days. When it happens it takes 12 hours to reboot it, that is, Mean Time To Repair (MTTR) is 12 hours. The
availability of server with these reliability data values is approximately.
Answer key☟
27.44.8 Software Reliability: UGC NET CSE | September 2013 | Part 3 | Question: 44 top☝
The failure intensity for a basic model as a function of failures experienced is given as
where is the initial failure intensity at the start of the execution, is the
average or expected number of failures at a given point in time, the quantity is the total number of failures that
would occur in infinite time.
Assume that a program will experience 100 failures in infinite time, the initial failure intensity was 10 failures/CPU
hr. Then the decrement of failures intensity per failure will be
Answer key☟
27.45.1 Software Requirement Specification: UGC NET CSE | September 2013 | Part 2 | Question: 31 top☝
A. I, II and III B. I, III and IV C. II, III and IV D. I, II, III and IV
ugcnetsep2013ii is&software-engineering software-requirement-specification
Answer key☟
27.46.1 Software Requirement Specifications: UGC NET CSE | August 2016 | Part 2 | Question: 41 top☝
A. B. C. D. Where is the
number of
requirements for which all reviewers have identical interpretations, is number of requirements in a specification.
27.47.1 Software Reuse: UGC NET CSE | June 2019 | Part 2 | Question: 54 top☝
Software reuse is
A. the process of analysing software with the objective of recovering its design and specification
B. the process of using existing software artifacts and knowledge to build new software
C. concerned with reimplementing legacy system to make them more maintainable
D. the process of analysing software to create a representation of a higher level of abstraction and breaking
software down into its parts to see how it works
ugcnetcse-june2019-paper2 software-reuse
Answer key☟
27.48.1 Software Testing: UGC NET CSE | August 2016 | Part 2 | Question: 44 top☝
For a program of variables, boundary value analysis yields ______ test cases.
A. B. C. D.
ugcnetcse-aug2016-paper2 is&software-engineering software-testing
Answer key☟
27.48.2 Software Testing: UGC NET CSE | December 2008 | Part 2 | Question: 43 top☝
A. verification
B. validation
C. both verification and validation
D. none of the above
Answer key☟
27.48.3 Software Testing: UGC NET CSE | December 2009 | Part 2 | Question: 42 top☝
Any error whose cause cannot be identified anywhere within the software system is called ________
Answer key☟
27.48.4 Software Testing: UGC NET CSE | December 2009 | Part 2 | Question: 47 top☝
(A) to show that s/w is operational at its interfaces i.e. input and output.
(B) to examine internal details of code.
(C) at client side.
(D) none of above.
ugcnetcse-dec2009-paper2 is&software-engineering software-testing
Answer key☟
27.48.5 Software Testing: UGC NET CSE | December 2010 | Part 2 | Question: 15 top☝
Answer key☟
27.48.6 Software Testing: UGC NET CSE | December 2010 | Part 2 | Question: 41 top☝
Prototyping is used to
Answer key☟
27.48.7 Software Testing: UGC NET CSE | December 2011 | Part 2 | Question: 18 top☝
Following is used to demonstrate that the new release of software still performs the old one did by rerunning
the old tests :
Answer key☟
27.48.8 Software Testing: UGC NET CSE | December 2012 | Part 2 | Question: 31 top☝
Answer key☟
27.48.9 Software Testing: UGC NET CSE | December 2013 | Part 3 | Question: 8 top☝
A. they are not effective B. they do not explore combinations of input circumstances
C. they explore combinations of input circumstances D. none of the above
ugcnetcse-dec2013-paper3 is&software-engineering software-testing
Answer key☟
27.48.10 Software Testing: UGC NET CSE | December 2015 | Part 2 | Question: 46 top☝
In software testing, how the error, fault and failure are related to each other?
A. Error leads to failure but fault is not related to error and failure
B. Fault leads to failure but error is not related to fault and failure
C. Error leads to fault and fault leads to failure
D. Fault leads to error and error leads to failure
Answer key☟
27.48.11 Software Testing: UGC NET CSE | January 2017 | Part 3 | Question: 43 top☝
Which of the following statement(s) is/are TRUE with regard to software testing?
I. Regression testing technique ensures that the software product runs correctly after the changes during
maintenance.
II. Equivalence partitioning is a white-box testing technique that divides the input domain of a program into classes
of data from which test cases can be derived.
A. only I B. only II
C. both I and II D. neither I nor II
ugcnetcse-jan2017-paper3 is&software-engineering software-testing
Answer key☟
27.48.12 Software Testing: UGC NET CSE | January 2017 | Part 3 | Question: 44 top☝
Which of the following are facts about a top-down software testing approach?
Answer key☟
27.48.13 Software Testing: UGC NET CSE | June 2012 | Part 3 | Question: 30 top☝
While unit testing a module, it is found that for a set of test data, maximum 90% of the code alone were
tested with a probability of success 0.9. The reliability of the module is
Answer key☟
27.48.14 Software Testing: UGC NET CSE | June 2013 | Part 3 | Question: 4 top☝
Equivalence partitioning is a ______ method that divides the input domain of a program into classes of data
from which test cases can be derived
Answer key☟
27.48.15 Software Testing: UGC NET CSE | June 2014 | Part 2 | Question: 15 top☝
Answer key☟
27.48.16 Software Testing: UGC NET CSE | June 2014 | Part 3 | Question: 16 top☝
Software testing is
Answer key☟
27.48.17 Software Testing: UGC NET CSE | Junet 2015 | Part 2 | Question: 42 top☝
Which of the testing strategy requirements established during requirements analysis are validated against
developed software?
Answer key☟
27.48.18 Software Testing: UGC NET CSE | September 2013 | Part 2 | Question: 30 top☝
Equivalence partitioning is a _____ testing method that divides the input domain of a program into classes of
data from which test cases can be derived.
Answer key☟
27.48.19 Software Testing: UGC NET CSE | September 2013 | Part 3 | Question: 29 top☝
____ refers to the discrepancy among a computed, observed or measured value and the true specified or
theoretically correct values?
Answer key☟
27.48.20 Software Testing: UGC NET CSE | September 2013 | Part 3 | Question: 43 top☝
Equivalence class partitioning approach is used to divide the input domain into a set of equivalence classes,
so that if a program works correctly for all the other values in that class. This is used _____
Answer key☟
27.49.1 Software Validation: UGC NET CSE | December 2012 | Part 3 | Question: 65 top☝
_____ establishes information about when,why and by whom changes are made in a Software.
Answer key☟
27.50.1 Source Code Metric: UGC NET CSE | December 2014 | Part 3 | Question: 43 top☝
Answer key☟
27.51.1 Uml: UGC NET CSE | June 2013 | Part 3 | Question: 26 top☝
An actor in an animation is a small program invoked _____ per frame to determine the characteristics of
some object in the animation.
Answer key☟
27.52.1 Validation: UGC NET CSE | June 2019 | Part 2 | Question: 60 top☝
A. use cases and user requirements B. implementation and system design blueprints
C. detailed specifications and user requirements D. functional specifications and use cases
ugcnetcse-june2019-paper2 validation
Answer key☟
27.53.1 Waterfall Model: UGC NET CSE | August 2016 | Part 2 | Question: 42 top☝
Answer key☟
27.53.2 Waterfall Model: UGC NET CSE | June 2016 | Part 2 | Question: 43 top☝
Answer key☟
27.54.1 White Box Testing: UGC NET CSE | June 2019 | Part 2 | Question: 53 top☝
In the context of software testing, which of the following statements is/are NOT correct?
P: A minimal test set that achieves path coverage will also achieve statement coverage.
Q: A minimal test set that achieves path coverage will generally detect more faults than one that achieves
statement coverage.
R: A minimal test set that achieves statement coverage will generally detect more faults than one that
achieves branch coverage.
Answer key☟
Answer Keys
27.0.1 Q-Q 27.0.2 Q-Q 27.0.3 Q-Q 27.0.4 Q-Q 27.0.5 Q-Q
27.0.6 Q-Q 27.0.7 Q-Q 27.0.8 Q-Q 27.0.9 Q-Q 27.0.10 Q-Q
27.0.11 Q-Q 27.0.12 Q-Q 27.0.13 Q-Q 27.0.14 Q-Q 27.0.15 Q-Q
27.0.16 Q-Q 27.0.17 Q-Q 27.0.18 Q-Q 27.0.19 Q-Q 27.0.20 Q-Q
27.0.21 Q-Q 27.0.22 Q-Q 27.1.1 B 27.2.1 C 27.2.2 B
27.3.1 B 27.4.1 C 27.4.2 C 27.4.3 B 27.5.1 Q-Q
27.6.1 Q-Q 27.6.2 Q-Q 27.6.3 B 27.7.1 B 27.8.1 D
27.8.2 C 27.9.1 Q-Q 27.9.2 A 27.10.1 B 27.10.2 Q-Q
27.10.3 B 27.11.1 B 27.12.1 C 27.13.1 D 27.13.2 A
27.14.1 C 27.14.2 C 27.15.1 B 27.16.1 A 27.17.1 Q-Q
27.18.1 B 27.18.2 C 27.19.1 C 27.20.1 B 27.21.1 Q-Q
27.21.2 Q-Q 27.21.3 Q-Q 27.21.4 Q-Q 27.21.5 A 27.21.6 C
27.21.7 B 27.21.8 C 27.21.9 D 27.21.10 C 27.21.11 D
27.21.12 D 27.21.13 A 27.21.14 A 27.21.15 C 27.21.16 D
27.21.17 B 27.21.18 B 27.21.19 B 27.21.20 D 27.21.21 D
27.21.22 Q-Q 27.21.23 Q-Q 27.21.24 Q-Q 27.21.25 Q-Q 27.21.26 Q-Q
27.21.27 Q-Q 27.21.28 Q-Q 27.21.29 D 27.21.30 C 27.21.31 B
27.21.32 C 27.21.33 B 27.21.34 B 27.21.35 B 27.21.36 B
27.21.37 B 27.21.38 A 27.21.39 C 27.21.40 B 27.21.41 A
27.21.42 C 27.21.43 B 27.21.44 B 27.21.45 B 27.21.46 B
27.21.47 B 27.21.48 B 27.21.49 C 27.21.50 C 27.21.51 B
27.21.52 C 27.21.53 C 27.21.54 A 27.21.55 B 27.21.56 C
27.21.57 D 27.21.58 A 27.21.59 C 27.22.1 A 27.23.1 B
27.24.1 C 27.25.1 A 27.26.1 B 27.27.1 C 27.28.1 D
27.29.1 B 27.29.2 D 27.29.3 B 27.30.1 D 27.31.1 B
27.32.1 B 27.33.1 D 27.34.1 Q-Q 27.34.2 Q-Q 27.34.3 B
27.34.4 Q-Q 27.34.5 Q-Q 27.34.6 Q-Q 27.34.7 A 27.34.8 X
27.34.9 C 27.34.10 B 27.34.11 C 27.34.12 C 27.34.13 D
27.34.14 A 27.35.1 Q-Q 27.35.2 Q-Q 27.35.3 C 27.36.1 Q-Q
27.36.2 Q-Q 27.36.3 Q-Q 27.36.4 Q-Q 27.36.5 Q-Q 27.36.6 C
27.36.7 D 27.36.8 D 27.36.9 C 27.36.10 D 27.36.11 A
27.37.1 Q-Q 27.38.1 D 27.39.1 B 27.39.2 B 27.40.1 D
27.40.2 B 27.40.3 C 27.41.1 B 27.42.1 Q-Q 27.42.2 D
27.43.1 D 27.44.1 Q-Q 27.44.2 Q-Q 27.44.3 C 27.44.4 D
27.44.5 B 27.44.6 B 27.44.7 C 27.44.8 C 27.45.1 D
27.46.1 Q-Q 27.47.1 B 27.48.1 Q-Q 27.48.2 Q-Q 27.48.3 B
27.48.4 Q-Q 27.48.5 Q-Q 27.48.6 Q-Q 27.48.7 Q-Q 27.48.8 B
27.48.9 B 27.48.10 C 27.48.11 A 27.48.12 A 27.48.13 C
27.48.14 B 27.48.15 D 27.48.16 D 27.48.17 A 27.48.18 B
27.48.19 D 27.48.20 B 27.49.1 D 27.50.1 B 27.51.1 A
27.52.1 C 27.53.1 Q-Q 27.53.2 B 27.54.1 A
28 Non GATE: Java (10)
28.1.1 Abstract Method: UGC NET CSE | August 2016 | Part 3 | Question: 40 top☝
Answer key☟
28.2.1 Applet: UGC NET CSE | December 2014 | Part 3 | Question: 42 top☝
Answer key☟
28.3.1 Java: UGC NET CSE | August 2016 | Part 3 | Question: 42 top☝
Answer key☟
28.3.2 Java: UGC NET CSE | July 2018 | Part 2 | Question: 3 top☝
28.3.3 Java: UGC NET CSE | June 2019 | Part 2 | Question: 23 top☝
Answer key☟
28.4.1 Method Overriding: UGC NET CSE | August 2016 | Part 3 | Question: 38 top☝
Answer key☟
28.5.1 Multi Threaded Programming: UGC NET CSE | December 2014 | Part 3 | Question: 37 top☝
Which methods are utilized to control the access to an object in multi-threaded programming ?
Answer key☟
28.6.1 Oops: UGC NET CSE | June 2016 | Part 3 | Question: 40 top☝
Answer key☟
A. B.
C. D.
ugcnetjune2014iii java servlet
Answer key☟
28.8.1 Wrapper Class Object: UGC NET CSE | December 2014 | Part 3 | Question: 39 top☝
Converting a primitive type data into its corresponding wrapper class object instance is called
Answer key☟
Answer Keys
28.1.1 Q-Q 28.2.1 C 28.3.1 Q-Q 28.3.2 Q-Q 28.3.3 X
28.4.1 Q-Q 28.5.1 B 28.6.1 B;C 28.7.1 D 28.8.1 D
29 Non GATE: Numerical Methods (3)
29.1.1 Hungarian Method: UGC NET CSE | December 2014 | Part 3 | Question: 69 top☝
Five men are available to do five different jobs. From past records, the time (in hours) that each man takes
to do each job is known and is given in the following table :
Find out the minimum time required to complete all the jobs.
A. B. C. D.
ugcnetcse-dec2014-paper3 assignment-problem hungarian-method
Answer key☟
29.2.1 Operation Research Pert Cpm: UGC NET CSE | December 2018 | Part 2 | Question: 8 top☝
Answer key☟
29.3.1 Simplex Method: UGC NET CSE | June 2019 | Part 2 | Question: 10 top☝
What shall be the solution of the LLP after applying first iteration of the Simplex Method?
A. B.
C. D.
ugcnetcse-june2019-paper2 simplex-method
Answer key☟
Answer Keys
29.1.1 C 29.2.1 Q-Q 29.3.1 B
30 Non GATE: Object Oriented Programming (58)
ugcnetcse-dec2007-paper2
Answer key☟
A. “Private” elements of a base class are not accessible by members of its derived class.
B. “Protected” elements of base class are not accessible by members of its derived class.
C. When base class access specified is “Public”, public elements of the base class become public members of its
derived class.
D. When base class access specified is “Public”, protected elements of a base class become protected members
of its derived class.
ugcnetcse-dec2007-paper2
Answer key☟
Polymorphism means :
Answer key☟
30.1.1 Abstract Class: UGC NET CSE | December 2015 | Part 3 | Question: 29 top☝
Answer key☟
30.1.2 Abstract Class: UGC NET CSE | December 2015 | Part 3 | Question: 36 top☝
Which of the following is/are correct with reference to Abstract class and interface?
a. A class can inherit only one Abstract class but may inherit
b. An abstract class can provide complete and default code but
several interfaces an interface has no code
A. a is true B. b is true
C. Both a and b are true D. Neitehr a nor b are true
ugcnetcse-dec2015-paper3 object-oriented-programming abstract-class
Answer key☟
30.2.1 C++: UGC NET CSE | August 2016 | Part 2 | Question: 15 top☝
A. B. C. D.
ugcnetcse-aug2016-paper2 object-oriented-programming c++ function
Answer key☟
30.2.2 C++: UGC NET CSE | December 2014 | Part 2 | Question: 13 top☝
Answer key☟
30.3.1 Composition: UGC NET CSE | August 2016 | Part 3 | Question: 39 top☝
A. Composition is a strong type of association between two classes with full ownership.
B. Composition is a strong type of association between two classes with partial ownership.
C. Composition is a weak type of association between two classes with partial ownership.
D. Composition is a weak type of association between two classes with strong ownership.
Answer key☟
30.4.1 Constructor: UGC NET CSE | August 2016 | Part 3 | Question: 37 top☝
Answer key☟
30.4.2 Constructor: UGC NET CSE | December 2008 | Part 2 | Question: 27 top☝
Answer key☟
30.4.3 Constructor: UGC NET CSE | December 2008 | Part 2 | Question: 29 top☝
A. zero
B. 1
C. 2
D. any number
Answer key☟
30.5.1 Cpp: UGC NET CSE | June 2008 | Part 2 | Question: 15 top☝
Answer key☟
30.6.1 Final: UGC NET CSE | July 2018 | Part 2 | Question: 6 top☝
Answer key☟
30.7.1 Friend Class: UGC NET CSE | June 2016 | Part 2 | Question: 13 top☝
Which one of the following is correct, when a class grants friend status to another class?
A. The member functions of the class generating friendship can access teh members of the friend class
B. All member functions of the class granted friendship have unrestricted access to the members of the class
granting the friendship
C. Class friendship is reciprocal to each other
D. There is no such concept
Answer key☟
Answer key☟
30.8.2 Friend Function: UGC NET CSE | June 2014 | Part 2 | Question: 44 top☝
Answer key☟
30.9.1 Inheritance: UGC NET CSE | December 2013 | Part 2 | Question: 19 top☝
_____ allows to create classes which are derived from other classes, so that they automatically include
some of its "parent's" members, plus its own members.
Answer key☟
30.9.2 Inheritance: UGC NET CSE | Junet 2015 | Part 2 | Question: 12 top☝
Which of the following, in C++, is inherited in a derived class from base class?
Answer key☟
30.9.3 Inheritance: UGC NET CSE | Junet 2015 | Part 2 | Question: 15 top☝
When the inheritance is private, the private methods in base class are _____ in the derived class (in C++)
Answer key☟
30.10.1 Java: UGC NET CSE | December 2012 | Part 3 | Question: 69 top☝
Which is the method used to retrieve the current state of a check box?
30.10.2 Java: UGC NET CSE | January 2017 | Part 3 | Question: 38 top☝
Answer key☟
30.10.3 Java: UGC NET CSE | January 2017 | Part 3 | Question: 39 top☝
A. B.
C. D.
ugcnetcse-jan2017-paper3 object-oriented-programming java
Answer key☟
30.10.4 Java: UGC NET CSE | January 2017 | Part 3 | Question: 40 top☝
Which of the following statement(s) with regard to an abstract class in JAVA is /are TRUE ?
A. Only I B. only II
C. Neither I nor II D. Both I and II
ugcnetcse-jan2017-paper3 object-oriented-programming java
Answer key☟
30.10.5 Java: UGC NET CSE | June 2012 | Part 3 | Question: 70, UGCNET-Sep2013-III: 52 top☝
Assume that we have constructor functions for both base class and derived class. Now consider the
declaration in
main()
Base *P=New Derived;
In what sequence will the constructor be called?
Answer key☟
30.10.6 Java: UGC NET CSE | June 2016 | Part 3 | Question: 38 top☝
It is possible to define a class within a class termed as nested class. There are __ types of nested classes
A. 2 B. 3 C. 4 D. 5
ugcnetcse-june2016-paper3 object-oriented-programming java
Answer key☟
30.10.7 Java: UGC NET CSE | June 2016 | Part 3 | Question: 42 top☝
When one object reference variable is assigned to another object reference variable then
Answer key☟
30.10.8 Java: UGC NET CSE | Junet 2015 | Part 3 | Question: 37 top☝
Answer key☟
30.10.9 Java: UGC NET CSE | Junet 2015 | Part 3 | Question: 38 top☝
The Servlet Response interface enables a servlet to formulate a response for a client using the method
Answer key☟
30.10.10 Java: UGC NET CSE | Junet 2015 | Part 3 | Question: 39 top☝
Answer key☟
30.11.1 Object Oriented Programming: UGC NET CSE | December 2008 | Part 2 | Question: 28 top☝
When a language has the capability to produce new data types, it is said to be :
A. extensible
B. encapsulated
C. overloaded
D. none of the above
ugcnetcse-dec2008-paper2 object-oriented-programming
30.11.2 Object Oriented Programming: UGC NET CSE | December 2012 | Part 3 | Question: 48 top☝
Answer key☟
30.11.3 Object Oriented Programming: UGC NET CSE | December 2013 | Part 3 | Question: 10 top☝
A. B.
C. D.
ugcnetcse-dec2013-paper3 object-oriented-programming
Answer key☟
30.11.4 Object Oriented Programming: UGC NET CSE | December 2013 | Part 3 | Question: 11 top☝
A. B.
C. D.
ugcnetcse-dec2013-paper3 object-oriented-programming
Answer key☟
30.11.5 Object Oriented Programming: UGC NET CSE | December 2013 | Part 3 | Question: 18 top☝
A. One defined by C++ and the other not defined by C B. One defined by C and one specific to C++
C. Both are specific to C++ D. Both of them are improvements of C
ugcnetcse-dec2013-paper3 object-oriented-programming
Answer key☟
30.11.6 Object Oriented Programming: UGC NET CSE | December 2013 | Part 3 | Question: 19 top☝
Answer key☟
30.11.7 Object Oriented Programming: UGC NET CSE | December 2014 | Part 2 | Question: 15 top☝
Which of the following differentiates between overloaded functions and overridden functions ?
A. Overloading is a dynamic or runtime binding and overridden is a static or compile time binding.
B. Overloading is a static or compile time binding and overriding is dynamic or runtime binding.
C. Redefining a function in a friend class is called overloading, while redefining a function in a derived class is
called as overridden function.
D. Redefining a function in a derived class is called function overloading, while redefining a function in a friend
class is called function overriding.
ugcnetcse-dec2014-paper2 object-oriented-programming
Answer key☟
30.11.8 Object Oriented Programming: UGC NET CSE | December 2015 | Part 2 | Question: 12 top☝
a. A publicly derived class is a subtype of its base class b. Inheritance provides for code resuse
Which of the following statements is correct?
A. Both statements a and b are correct B. Neither of the statements a and b are correct
C. Statement a is correct and b is incorrect D. Statement a is incorrect and b is correct
ugcnetcse-dec2015-paper2 object-oriented-programming
Answer key☟
30.11.9 Object Oriented Programming: UGC NET CSE | December 2015 | Part 3 | Question: 30 top☝
A. B.
C. D.
ugcnetcse-dec2015-paper3 object-oriented-programming
Answer key☟
30.11.10 Object Oriented Programming: UGC NET CSE | January 2017 | Part 2 | Question: 11 top☝
Answer key☟
30.11.11 Object Oriented Programming: UGC NET CSE | January 2017 | Part 2 | Question: 12 top☝
Answer key☟
30.11.12 Object Oriented Programming: UGC NET CSE | January 2017 | Part 2 | Question: 14 top☝
Answer key☟
30.11.13 Object Oriented Programming: UGC NET CSE | January 2017 | Part 3 | Question: 37 top☝
Abstraction and encapsulation are fundamental principles that underlie the object oriented approach to
software development. What can you say about the following two statements?
I. Abstraction allows us to focus on what something does without considering the complexities of how it works.
II. Encapsulation allows us to consider complex ideas while ignoring irrelevant detail that would confuse us.
Answer key☟
30.11.14 Object Oriented Programming: UGC NET CSE | July 2018 | Part 2 | Question: 5 top☝
Which of these would actually swap the contents of the two integer variables and ?
Answer key☟
30.11.15 Object Oriented Programming: UGC NET CSE | June 2010 | Part 2 | Question: 13 top☝
Member of a class specified as ______ are accessible only to method of the class.
Answer key☟
30.11.16 Object Oriented Programming: UGC NET CSE | June 2010 | Part 2 | Question: 14 top☝
A.
B.
C.
D.
ugcnetcse-june2010-paper2 object-oriented-programming
Answer key☟
30.11.17 Object Oriented Programming: UGC NET CSE | June 2014 | Part 3 | Question: 12 top☝
ugcnetjune2014iii object-oriented-programming
Answer key☟
30.11.18 Object Oriented Programming: UGC NET CSE | June 2014 | Part 3 | Question: 13 top☝
Match the following with respect to I/O classes in object oriented programming
A. B.
C. D.
ugcnetjune2014iii object-oriented-programming programming-in-c
Answer key☟
30.11.19 Object Oriented Programming: UGC NET CSE | June 2014 | Part 3 | Question: 49 top☝
A. collection of continuous objects that incorporates both data structure and behaviour.
B. collection of discrete objects that incorporates both discrete structure and behaviour.
C. collection of discrete objects that incorporates both data structure and behaviour.
D. collection of objects that incorporates both discrete data structure and behaviour.
ugcnetjune2014iii object-oriented-programming
Answer key☟
30.11.20 Object Oriented Programming: UGC NET CSE | June 2014 | Part 3 | Question: 50 top☝
The "part-whole”or "a-part-of", relationship in which objects representing the components of something
associated with an object representing the entire assembly is called as
A. Association B. Aggregation
C. Encapsulation D. Generalisation
ugcnetjune2014iii object-oriented-programming
30.11.21 Object Oriented Programming: UGC NET CSE | June 2014 | Part 3 | Question: 51 top☝
The pure object oriented programming language with extensive metadata available and modifiable at run
time is
Answer key☟
30.11.22 Object Oriented Programming: UGC NET CSE | June 2016 | Part 2 | Question: 14 top☝
When a method in subclass has the same name and type signatures as a method in the superclass, then
the method in the subclass ____ the method in the superclass.
Answer key☟
30.11.23 Object Oriented Programming: UGC NET CSE | June 2016 | Part 3 | Question: 37 top☝
Answer key☟
30.11.24 Object Oriented Programming: UGC NET CSE | October 2020 | Part 2 | Question: 12 top☝
Consider the following recursive Java function that takes two long arguments and returns a float value:
public static float f (long m, long n) {
float result = (float)m / (float)n;
if (m < 0 || n<0) return 0.0f;
else result -=f(m*2, n*3);
return result;
}
A. B. C. D.
ugcnetcse-oct2020-paper2 non-gate object-oriented-programming
30.12 Operator Overloading (1) top☝
30.12.1 Operator Overloading: UGC NET CSE | December 2013 | Part 2 | Question: 18 top☝
A. * B. += C. == D. : :
ugcnetcse-dec2013-paper2 programming-in-c operator-overloading
Answer key☟
30.13.1 Programming In C: UGC NET CSE | June 2019 | Part 2 | Question: 24 top☝
The function f() returns the int that represents the ____P____ in the binary representation of positive integer n,
where P is
Answer key☟
30.14.1 Software Design: UGC NET CSE | December 2012 | Part 3 | Question: 54 top☝
The Object Modelling Technique (OMT) uses the following three kinds of model to describe a system
Answer key☟
30.15.1 Template Vs Macro: UGC NET CSE | Junet 2015 | Part 2 | Question: 14 top☝
A. when we write overloaded function we must code the function for each usage
B. when we write function template we code the function only once
C. it is difficult to debug macros
D. templates are more efficient than macros
Answer key☟
Answer key☟
Answer Keys
30.0.1 Q-Q 30.0.2 Q-Q 30.0.3 X 30.1.1 B 30.1.2 C
30.2.1 Q-Q 30.2.2 B 30.3.1 Q-Q 30.4.1 Q-Q 30.4.2 Q-Q
30.4.3 Q-Q 30.5.1 Q-Q 30.6.1 Q-Q 30.7.1 Q-Q 30.8.1 Q-Q
30.8.2 C 30.9.1 B 30.9.2 C 30.9.3 A 30.10.1 A
30.10.2 C 30.10.3 B 30.10.4 D 30.10.5 B 30.10.6 A
30.10.7 B 30.10.8 C 30.10.9 X 30.10.10 D 30.11.1 Q-Q
30.11.2 C 30.11.3 A 30.11.4 A 30.11.5 B 30.11.6 D
30.11.7 B 30.11.8 A 30.11.9 A 30.11.10 D 30.11.11 A
30.11.12 D 30.11.13 A 30.11.14 Q-Q 30.11.15 Q-Q 30.11.16 Q-Q
30.11.17 C 30.11.18 A 30.11.19 C 30.11.20 B 30.11.21 A
30.11.22 D 30.11.23 B 30.11.24 A 30.12.1 D 30.13.1 D
30.14.1 B 30.15.1 X 30.16.1 C
31 Non GATE: Optimization (18)
31.1.1 Assignment Problem: UGC NET CSE | June 2014 | Part 3 | Question: 59 top☝
The given maximization assignment problem can be converted into a minimization problem by
A. Subtracting each entry in a column from the maximum value in that column.
B. Subtracting each entry in the table from the maximum value in that table.
C. Adding each entry in a column from the maximum value in that column.
D. Adding maximum value of the table to each entry in the table.
Answer key☟
31.1.2 Assignment Problem: UGC NET CSE | Junet 2015 | Part 3 | Question: 67 top☝
In the Hungarian method for solving assignment problem, an optimal assignment requires that the maximum
number of lines that can be drawn through squares with zero opportunity cost be equal to the number of
Answer key☟
31.2.1 Dual Linear Programming: UGC NET CSE | December 2012 | Part 3 | Question: 24 top☝
Answer key☟
31.3.1 Linear Programming: UGC NET CSE | October 2020 | Part 2 | Question: 4 top☝
A. B. C. D.
ugcnetcse-oct2020-paper2 non-gate linear-programming
Answer key☟
31.4.1 Linear Programming Problem: UGC NET CSE | December 2013 | Part 3 | Question: 1 top☝
If the primal Linear Programming problem has unbounded solution, then it's dual problem will have
Answer key☟
31.5.1 Optimization: UGC NET CSE | December 2012 | Part 3 | Question: 18 top☝
In a Linear Programming Problem, suppose there are three basic variables and 2 non-basic variables, then
the possible number of basic solutions are
A. 6 B. 8 C. 10 D. 12
ugcnetcse-dec2012-paper3 optimization linear-programming
Answer key☟
31.5.2 Optimization: UGC NET CSE | December 2013 | Part 3 | Question: 2 top☝
A.
B.
C.
D. All of these
Answer key☟
31.5.3 Optimization: UGC NET CSE | December 2013 | Part 3 | Question: 3 top☝
Subject to
Answer key☟
31.5.4 Optimization: UGC NET CSE | December 2015 | Part 3 | Question: 47 top☝
ugcnetcse-dec2015-paper3 optimization
Answer key☟
31.5.5 Optimization: UGC NET CSE | December 2015 | Part 3 | Question: 52 top☝
A basic feasible solution of a linear programming problem is said to be ______ if at least one of the basic
variable is zero
Answer key☟
31.5.6 Optimization: UGC NET CSE | June 2012 | Part 3 | Question: 46 top☝
Answer key☟
31.5.7 Optimization: UGC NET CSE | June 2014 | Part 3 | Question: 58 top☝
Which of the following special cases does not require reformulation of the problem in order to obtain a
solution ?
Answer key☟
31.5.8 Optimization: UGC NET CSE | Junet 2015 | Part 3 | Question: 69 top☝
Answer key☟
31.6.1 Transportation Problem: UGC NET CSE | December 2012 | Part 3 | Question: 28 top☝
The initial basic feasible solution to the following transportation problem using Vogel’s approximation method
is
A. , Total cost
B. , Total cost
C. , Total cost
D. None of the above
Answer key☟
31.6.2 Transportation Problem: UGC NET CSE | December 2015 | Part 3 | Question: 53 top☝
Answer key☟
31.6.3 Transportation Problem: UGC NET CSE | December 2015 | Part 3 | Question: 54 top☝
The transportation cost in the initial basic feasible solution of the above transportation problem using Vogel's
Approximation method is
A. B. C. D.
ugcnetcse-dec2015-paper3 optimization transportation-problem
Answer key☟
31.6.4 Transportation Problem: UGC NET CSE | June 2014 | Part 3 | Question: 60 top☝
is given as
5
8
7
2 2 10
then the minimum cost is
A. 76 B. 78 C. 80 D. 82
ugcnetjune2014iii optimization transportation-problem
Answer key☟
31.6.5 Transportation Problem: UGC NET CSE | Junet 2015 | Part 3 | Question: 68 top☝
The initial basic feasible solution of the above transportation problem using Vogel's Approximation method (VAM) is
given below:
The solution of the above problem:
Answer key☟
Answer Keys
31.1.1 B 31.1.2 A 31.2.1 A 31.3.1 D 31.4.1 C
31.5.1 C 31.5.2 D 31.5.3 B 31.5.4 A 31.5.5 A
31.5.6 B 31.5.7 A 31.5.8 D 31.6.1 D 31.6.2 A
31.6.3 B 31.6.4 A 31.6.5 B
32 Non GATE: Others (154)
:
List A List B
ugcnetcse-oct2022-paper1
Answer key☟
A magnetic tape drive has transport speed of inches per second and a recording density of bytes per
inch. The time required to write bytes of data grouped in characters record with a blocking factor is
A. B.
C. D.
ugcnetcse-oct2022-paper1
A. aaaa* B. aaaaa*
C. aaaaa * D. aaaa*
ugcnetcse-oct2022-paper1
A. B.
C. D.
ugcnetcse-oct2022-paper1
: Micro-operation fields
: Condition for branching
: Branch field
: Address field
ugcnetcse-oct2022-paper1
ugcnetcse-oct2022-paper1
A. Only and are not decidable B. Only and are not decidable
C. Only and are not decidable, D. All , and are not decidable
ugcnetcse-oct2022-paper1
Consider a memory system having address spaced at a distance of Bank cycle time and number of
banks, then the average data access time per word access in synchronous organization is
1.
2.
3.
4.
ugcnetcse-oct2022-paper1
The total storage capacity of a floppy disk having tracks and storing bytes/sector is bytes. How
many sectors does this disk have?
1.
2.
3.
4.
ugcnetcse-oct2022-paper1
32.0.14 UGC NET CSE | October 2022 | Part 1 | Question:: 104 top☝
ugcnetcse-oct2022-paper1
Answer key☟
A. || B. num
C. D.
ugcnetcse-oct2022-paper1
Consider an error-free satellite channel used to send byte data frames in one direction with very short
acknowledgements coming back the other way. What is the maximum throughput for window size of ?
A. B.
C. D. ,
ugcnetcse-oct2022-paper1
A. , B. C. D.
ugcnetcse-oct2022-paper1
Answer key☟
A. B.
C. D.
ugcnetcse-oct2022-paper1
A. B.
C. D.
ugcnetcse-oct2022-paper1
1. Network layer
2. Transport layer
3. Data link layer
4. Physical layer
ugcnetcse-oct2022-paper1
Consider a B-tree of height h. minimum degree that contains any -key, where . Which of the following
is correct?
A. B.
C. D.
ugcnetcse-oct2022-paper1
ugcnetcse-dec2007-paper2
ugcnetcse-oct2022-paper1
Answer key☟
Table : Reserves
Table : Boats
Which of the following relational algebra query/queries computes/compute the name of sailors who have reserved
boat ?
sname (( = Boats) Sailors)
sname = ( = (Reserves Sailors))
sname = (( = Reserves) Sailors)
Answer key☟
List I List II
(A) Localization (I) Encapsulationlation
(B) Packaging or
binding of a (II) Abstraction
collection of items
(C) Mechanism that (III) Characteristic of
enables designer software that indicates
to focus on the manner in which
essential details of information is
a program concentrated in
component. program
(IV) Suppressing the
(D) Information
operational details of
hiding
a program component
A. B.
C. D.
ugcnetcse-oct2022-paper1
ugcnetcse-oct2022-paper1
Table : Reserves
Table : Boats
Which of the following relational algebra query/queries computes/compute the sid’s of sailors with age over who
have not reserved red boat?
ugcnetcse-oct2022-paper1
For the following page reference string , the number of page faults that occur in Least
Recently Used page replacement algorithm with frame size is
A. B. C. D.
ugcnetcse-oct2022-paper1
A. , and
B. and
C. and
D. and
ugcnetcse-oct2022-paper1
A. B. C. D.
ugcnetcse-oct2022-paper1
Table : Boats
Which of the following relational algebra query computes the names of sailors who have reserved a red and a
green boat?
ugcnetcse-oct2022-paper1
32.0.39 UGC NET CSE | October 2022 | Part 1 | Question:: 90 top☝
Modules and operate on the same input and output, then the cohesion is
ugcnetcse-dec2007-paper2
The process to gather the software requirements from client, analyze and document is known as -
Table : Reserves
Table : Boats
Which of the following relational algebra query/queries computes/compute the name of sailors who have reserved
red boat?
sname (( = Boats) Reserves Sailors)
sname ( (( = ) Reserves) Sailors)
sname (( = Reserves) Boats Sailors)
1. Both and
2. Both and
3. Only
4. Only
ugcnetcse-oct2022-paper1
Table : Boats
Which of the following relational algebra query computes the names of sailor who have reserved all boats?
ugcnetcse-oct2022-paper1
ugcnetcse-dec2004-paper2
Answer key☟
Which of the following changes permission to deny write permission to group and others ?
ugcnetcse-june2009-paper2
A. B. C. D.
ugcnetcse-dec2006-paper2
32.0.49 UGC NET CSE | October 2022 | Part 1 | Question:: 100 top☝
ugcnetcse-oct2022-paper1
Answer key☟
ugcnetcse-dec2006-paper2
A. B. C. D.
ugcnetcse-oct2022-paper1
1. White-Box Testing,
2. Black-Box Testing
3. Acceptance Testing
4. System Testing
ugcnetcse-oct2022-paper1
For the graph; the following sequences of depth first search (DFS) are given
(A)
(B)
(C)
(D)
Which of the following is correct?
A. only B.
C. , only D. only
ugcnetcse-oct2022-paper1
Given below are two statements : one is labelled as Assertion and the other is labelled as Reason :
Assertion :
Reason
In the light of the above statements, choose the correct answer from the options given below :
ugcnetcse-oct2022-paper1
ugcnetcse-oct2022-paper1
Answer key☟
Consider
Which of the following string is in ?
A. B. C. D.
ugcnetcse-oct2022-paper1
A. B.
C. D.
ugcnetcse-oct2022-paper1
ugcnetcse-oct2022-paper1
A. B. C. D.
ugcnetcse-oct2022-paper1
A. B.
C. D.
ugcnetcse-oct2022-paper1
A trigger is
ugcnetcse-oct2022-paper1
Which one is a connectionless transport - layer protocol that belongs to the Internet protocol family?
Hidden surface removal problem with minimal pipeline can be solved with
Answer key☟
A. B.
C. D.
ugcnetcse-oct2022-paper1
Answer key☟
A. B.
C. D.
ugcnetcse-oct2022-paper1
A. Statement only
B. Statement and Statement only
C. Statement , Statement and Statement only
D. Statement , Statement and Statement only
ugcnetcse-oct2022-paper1
32.0.68 UGC NET CSE | October 2022 | Part 1 | Question:: 47 top☝
A.
B.
C.
D.
ugcnetcse-oct2022-paper1
32.0.70 UGC NET CSE | October 2022 | Part 1 | Question:: 102 top☝
A. B. C. D.
ugcnetcse-oct2022-paper1
If an operating system does not allow a child process to exist when the parent process has been terminated, this
phenomenon is called as.
Consider a logic gate circuit, with 8 input lines and 3 output lines specified by
following operations
ugcnetcse-oct2022-paper1
In a cache memory, if address has bits in Tag field and bits in index field, the size of main memory and cache
memory would be respectively
A. B. ,
C. D.
ugcnetcse-oct2022-paper1
32.0.75 UGC NET CSE | October 2022 | Part 1 | Question:: 101 top☝
Based on the following passage, answer the Questions:
A long trunk operates at and is used to transmit 64 bytes frames and uses sliding window
protocol. The propagation speed is .
If only 6 bits are reserved for sequence number field, then the efficiency of the system is
A. B. C. D.
ugcnetcse-oct2022-paper1
Given below are two statements : one is labelled as Assertion and the other is labelled as Reason :
Assertion : A load-and-go assembler avoids the overhead of writing the object program out and reading it back
in.
Reason : This can be done with either one-pass or two pass assembler.
In the light of the above statements, choose the correct answer from the options given below :
ugcnetcse-oct2022-paper1
A. B.
C. D.
ugcnetcse-oct2022-paper1
Consider as logical variables. Identify which of the following represents correct logical equivalence :
(A)
(B)
(C)
(D)
Choose the correct answer from the options given below :
A. (A) and (D) only B. (B) and (C) only, C. (A) and (C) only D. (B) and (D) only
ugcnetcse-oct2022-paper1
32.0.79 UGC NET CSE | October 2022 | Part 1 | Question:: 41 top☝
How many rotations are required during the construction of an tree if the following elements are to be added
in the given sequence?
There are three boxes. First box has white, black and red balls. Second box has white, black and red
balls. Third box has white, black and red balls. A box is chosen at random and balls are drawn out of which
is white, and 1 is red. What is the probability that the balls came from first box?
A. B. C. D.
ugcnetcse-oct2022-paper1
A.
B.
C.
D.
ugcnetcse-oct2022-paper1
Assume that and are asymptotically positive. Which of the following is correct?
A. and
B. and
C. and
D. and
ugcnetcse-oct2022-paper1
A. B.
C. D.
ugcnetcse-oct2022-paper1
32.0.89 UGC NET CSE | October 2022 | Part 1 | Question:: 103 top☝
Based on the following passage, answer the Questions :
A long trunk operates at and is used to transmit 64 bytes frames and uses sliding window
protocol. The propagation speed is .
The transmission and propagation delays are respectively
A.
B.
C.
D.
ugcnetcse-oct2022-paper1
Answer key☟
Consider the hash table of size that uses open addressing with linear probing. Let be the
hash function. A sequence of records with keys is inserted into an initially empty
hash table, the bins of which are indexed from to . What is the index of the bin into which the last record is
inserted?
A. B. C. D.
ugcnetcse-oct2022-paper1
ugcnetcse-oct2022-paper1
A. B. C. D.
ugcnetcse-oct2022-paper1
A. B.
C. D.
ugcnetcse-oct2022-paper1
A. B.
C. D.
ugcnetcse-oct2022-paper1
A. B.
C. D.
ugcnetcse-oct2022-paper1
ugcnetcse-oct2022-paper1
ugcnetcse-oct2022-paper1
32.1.1 3 Puzzle: UGC NET CSE | June 2016 | Part 3 | Question: 74 top☝
Consider a 3-puzzle where, like in the usual 8-puzzle game, a tile can only move to an adjacent empty
space. Given the initial state
12
3
which of the following state cannot be reached?
31
A
2
3
B
21
13
C
2
2
D
13
Answer key☟
32.2 Algorithm Design (1) top☝
32.2.1 Algorithm Design: UGC NET CSE | October 2022 | Part 1 | Question:: 74 top☝
Which of the following algorithm design approach is used in Quick sort algorithm?
32.3.1 Alpha Beta Pruning: UGC NET CSE | June 2016 | Part 3 | Question: 73 top☝
Consider the following game tree in which root is a maximizing node and children are visited left to right.
What nodes will be pruned by the alpha-beta pruning?
A. B. C. D.
ugcnetcse-june2016-paper3 artificial-intelligence alpha-beta-pruning
Answer key☟
32.4.1 Alpha Cut: UGC NET CSE | June 2019 | Part 2 | Question: 95 top☝
A. B.
C. D.
ugcnetcse-june2019-paper2 fuzzy-set alpha-cut
Answer key☟
32.5.1 Application Software: UGC NET CSE | June 2010 | Part 2 | Question: 45 top☝
Applications-software
A. Is used to control the operating system B. Includes programs designed to help programmers
C. Performs a specific task for computer users D. All of the above
ugcnetcse-june2010-paper2 application-software
Answer key☟
32.6.1 Bigdata Hadoop: UGC NET CSE | June 2019 | Part 2 | Question: 38 top☝
Hadoop (a big data tool) works with number of related tools. Choose from the following, the common tools
included into Hadoop:
A. MySQL, Google API and Map reduce B. Map reduce, Scala and Hummer
C. Map reduce, H Base and Hive D. Map reduce, Hummer and Heron
ugcnetcse-june2019-paper2 bigdata-hadoop
Answer key☟
32.7.1 Convex Optimization: UGC NET CSE | July 2018 | Part 2 | Question: 82 top☝
ugcnetcse-july2018-paper2 convex-optimization
Answer key☟
32.8.1 Data Mining: UGC NET CSE | June 2010 | Part 2 | Question: 50 top☝
Data Mining uses _______, _______ and _______ to build effective predictive model.
and
and
and
and
ugcnetcse-june2010-paper2 data-mining
32.8.2 Data Mining: UGC NET CSE | June 2016 | Part 2 | Question: 50 top☝
Answer key☟
Answer key☟
32.9.2 Data Warehousing: UGC NET CSE | June 2012 | Part 3 | Question: 7 top☝
A. B.
C. D.
ugcnetcse-june2012-paper3 data-mining data-warehousing
Answer key☟
32.9.3 Data Warehousing: UGC NET CSE | June 2016 | Part 2 | Question: 47 top☝
I. Business intelligence and Data warehousing is used for forecasting and Data mining
II. Business intelligence and Data warehousing is used for analysis of large volumes of sales data
Answer key☟
32.9.4 Data Warehousing: UGC NET CSE | June 2016 | Part 2 | Question: 49 top☝
I. Data scrubling is a process to upgrade the quality of data, before it is moved into Data warehouse
II. Data scrubling is a process of rejecting data from data warehouse to create indexes
Answer key☟
32.10.1 Debugger: UGC NET CSE | December 2014 | Part 2 | Question: 34 top☝
ugcnetcse-dec2014-paper2 debugger
Answer key☟
32.11.1 Defuzzification: UGC NET CSE | June 2019 | Part 2 | Question: 96 top☝
Answer key☟
32.12.1 Encryption Decryption: UGC NET CSE | July 2018 | Part 2 | Question: 48 top☝
Decrypt the message "WTAAD" using the Caesar Cipher with key =15
Answer key☟
32.13.1 Fuzzy Relation: UGC NET CSE | June 2016 | Part 3 | Question: 64 top☝
R=
and
S=
Then, the resulting relation T, which related elements of universe xto elements of universe z using max-min
composition is given by
A. T=
B. T=
C. T=
D. T=
Answer key☟
32.14 Fuzzy Set (5) top☝
32.14.1 Fuzzy Set: UGC NET CSE | December 2012 | Part 3 | Question: 13 top☝
Consider a fuzzy set A defined on the interval X=[0, 10]of integers by the membership Junction
. Then the cut corresponding to $\alpha =0.5 will be
A. B.
C. D.
ugcnetcse-dec2012-paper3 fuzzy-set
Answer key☟
32.14.2 Fuzzy Set: UGC NET CSE | December 2014 | Part 3 | Question: 71 top☝
Answer key☟
32.14.3 Fuzzy Set: UGC NET CSE | December 2015 | Part 3 | Question: 65 top☝
A.
B.
C.
D.
ugcnetcse-dec2015-paper3 fuzzy-set
Answer key☟
32.14.4 Fuzzy Set: UGC NET CSE | December 2015 | Part 3 | Question: 66 top☝
A. B.
C.
D.
ugcnetcse-dec2015-paper3 fuzzy-set
Answer key☟
32.14.5 Fuzzy Set: UGC NET CSE | June 2016 | Part 3 | Question: 65 top☝
A. {(0.5, 12), (0.6, 13), (1, 14), (0.7, 15), (0.7, 16), (1, 17), (1, 18)}
B. {(0.5, 12), (0.6, 13), (1, 14), (1, 15), (1, 16), (1, 17), (1, 18)}
C. {(0.3, 12), (0.5, 13), (0.5, 14), (1, 15), (0.7, 16), (0.5, 17), (0.2, 18)}
D. {(0.3, 12), (0.5, 13), (0.6, 14), (1, 15), (0.7, 16), (0.5, 17), (0.2, 18)}
ugcnetcse-june2016-paper3 fuzzy-set
Answer key☟
32.15.1 Geographical Information System: UGC NET CSE | December 2011 | Part 2 | Question: 46 top☝
A. Both maps must be in digital form B. Both maps must be at the same equivalent scale.
C. Both maps must be on the same coordinate system D. All of the above
ugcnetcse-dec2011-paper2 geographical-information-system
Answer key☟
32.16.1 Hamming Code: UGC NET CSE | October 2022 | Part 1 | Question:: 55 top☝
The representation of bit code into bit, even parity Hamming code is
A. B. C. D.
ugcnetcse-oct2022-paper1 hamming-code
Answer key☟
32.17.1 Hill Climbing Search: UGC NET CSE | June 2016 | Part 3 | Question: 72 top☝
How does randomized Hill climbing choose the next move each time?
Answer key☟
32.18.1 Inventory: UGC NET CSE | December 2014 | Part 2 | Question: 49 top☝
________ model is designed to bring prices down by increasing the number of customers who buy a
particular product at once.
Answer key☟
32.19.1 K Mean Clustering: UGC NET CSE | June 2019 | Part 2 | Question: 40 top☝
K-mean clustering algorithm has clustered the given observations into clusters after st iteration as
follows:
What will be the Manhattan distance for observation from cluster centroid in the second iteration?
A. B. C. D.
ugcnetcse-june2019-paper2 k-mean-clustering data-mining
Answer key☟
32.20.1 Llp: UGC NET CSE | July 2018 | Part 2 | Question: 83 top☝
Subject to
has
Answer key☟
32.21.1 Machine Learning: UGC NET CSE | June 2014 | Part 2 | Question: 29 top☝
A. B.
C. D.
ugcnetcse-june2014-paper2 machine-learning
Answer key☟
Can someone please tell what's the use of giving UGC NET in computer science after doing MTech and
have given GATE in CSE?
What benefits will NET give when applying for Phd or as an assistant professor?
What is the requirement of NET? I am currently in 1st year MTech, AFAIK we are eligible only if we are in final year
MTECH(ie 2nd year) is this right?
32.23.1 Operational Research: UGC NET CSE | December 2014 | Part 3 | Question: 68 top☝
A. Total supply equals total demand B. Total supply does not equal total demand
C. The solution so obtained is not feasible D. None of these
ugcnetcse-dec2014-paper3 operational-research transportation-problem
Answer key☟
32.23.2 Operational Research: UGC NET CSE | September 2013 | Part 3 | Question: 14 top☝
An optimal assignment requires that the minimum number of horizontal and vertical lines that can be drawn
to cover all zeros be equal to the number of
Answer key☟
32.24.1 Optimization: UGC NET CSE | June 2016 | Part 3 | Question: 61 top☝
The region of feasible solution of a linear programminig problem has a ____ property in geometry, provided
the feasible solution of the problem exists
Answer key☟
32.25.1 Process Scheduling: UGC NET CSE | October 2022 | Part 1 | Question:: 60 top☝
A. Is like a depth-first search where most promising child is selected for expansion
B. Generates all successor nodes and computes an estimate of distance (cost) from start node to a goal node
through each of the successors. It then chooses the successor with shortest cost.
C. Saves all path lengths (costs) from start node to all generated nodes and chooses shortest path for further
expansion.
D. None of the above
Answer key☟
32.27.1 Shell: UGC NET CSE | June 2012 | Part 3 | Question: 71 top☝
Answer key☟
32.28.1 Shell Script: UGC NET CSE | June 2014 | Part 2 | Question: 35 top☝
Answer key☟
32.28.2 Shell Script: UGC NET CSE | June 2014 | Part 3 | Question: 39 top☝
A. B.
C. D.
ugcnetjune2014iii unix shell-script
Answer key☟
32.29.1 Simplex: UGC NET CSE | October 2022 | Part 1 | Question:: 13 top☝
A. unrestricted B.
C. is unrestricted, D. is unrestricted. restricted
ugcnetcse-oct2022-paper1 simplex
32.30.1 Simplex Method: UGC NET CSE | December 2014 | Part 3 | Question: 67 top☝
If an artificial variable is present in the ‘basic variable’ column of optimal simplex table, then the solution is
A. Optimum B. Infeasible
C. Unbounded D. Degenerate
ugcnetcse-dec2014-paper3 linear-programming simplex-method
Answer key☟
32.30.2 Simplex Method: UGC NET CSE | June 2016 | Part 3 | Question: 62 top☝
Answer key☟
32.31.1 System Software& Compilers: UGC NET CSE | June 2016 | Part 2 | Question: 32 top☝
The content of the accumulator after the execution of the following 8085 assembly language program, is:
MVI A,
42H
MVI B,
05h
UGC: ADD B
DCR B
JNZ UGC
ADI 25H
HLT
A. 82 H B. 78 H C. 76 H D. 47 H
ugcnetcse-june2016-paper2 system-software&-compilers
Answer key☟
32.32.1 Time Complexity: UGC NET CSE | October 2022 | Part 1 | Question:: 87 top☝
A.
B.
C.
D.
Answer key☟
32.33.1 Transportation Problem: UGC NET CSE | June 2016 | Part 3 | Question: 63 top☝
Has a solution
The above solution of a given transportation problem is
Answer key☟
32.34.1 Unified Modeling Language: UGC NET CSE | June 2012 | Part 3 | Question: 44 top☝
Which diagram provides a formal graphic notation for modelling objects, classes and their relationships to
one another?
Answer key☟
32.35.1 Unix: UGC NET CSE | June 2008 | Part 2 | Question: 24 top☝
Files that are related to input/output and are used to model serial I/O devices such as terminals,
printers and networks are called :
(A) regular files (B) character special files
(C) directories (D) block special files
ugcnetcse-june2008-paper2 unix
Answer key☟
32.35.2 Unix: UGC NET CSE | June 2010 | Part 2 | Question: 49 top☝
At any given time Parallel Virtual Machine (PVM) has _______ send buffer and ________ receive buffer.
Answer key☟
32.35.3 Unix: UGC NET CSE | June 2016 | Part 2 | Question: 39 top☝
In UNIX, ____ creates three subdirectories; 'PIS' and two subdirectories 'progs' and 'data' from just created
subdirectory 'PIS'
Answer key☟
32.35.4 Unix: UGC NET CSE | June 2016 | Part 3 | Question: 52 top☝
Which of the following option with reference to UNIX operating system is not correct?
A. INT signal is sent by the terminal driver when one types <Control-C> and it is a request to terminate the current
operation
B. TERM is a request to terminate execution completely. The receiving process will clean up its state and exit
C. QUIT is similat to TERM, except that it defaults to producing a core dump if not caught.
D. KILL is a blockable signal
ugcnetcse-june2016-paper3 unix
Answer key☟
32.35.5 Unix: UGC NET CSE | June 2016 | Part 3 | Question: 67 top☝
A. It runs the word count program to count the number of lines in its input, a, writing the result to b, as a foreground
process
B. It runs the word count program to count the number of lines in its input, a, writing the result to b, but does it in
the background
C. It counts the error during the execution of the process, a, and puts the result in process b
D. It copies the 'l' numbers of lines of program file, a, and stores in file b
ugcnetcse-june2016-paper3 unix
Answer key☟
32.36.1 Vertex Cover: UGC NET CSE | October 2022 | Part 1 | Question:: 56 top☝
32.37.1 Windows: UGC NET CSE | June 2012 | Part 3 | Question: 69 top☝
ugcnetcse-june2012-paper3 windows
Answer key☟
Answer Keys
32.0.1 Q-Q 32.0.2 Q-Q 32.0.3 Q-Q 32.0.4 Q-Q 32.0.5 Q-Q
32.0.6 Q-Q 32.0.7 Q-Q 32.0.8 Q-Q 32.0.9 Q-Q 32.0.10 Q-Q
32.0.11 Q-Q 32.0.12 Q-Q 32.0.13 Q-Q 32.0.14 Q-Q 32.0.15 Q-Q
32.0.16 Q-Q 32.0.17 Q-Q 32.0.18 Q-Q 32.0.19 Q-Q 32.0.20 Q-Q
32.0.21 Q-Q 32.0.22 Q-Q 32.0.23 Q-Q 32.0.24 Q-Q 32.0.25 Q-Q
32.0.26 Q-Q 32.0.27 Q-Q 32.0.28 Q-Q 32.0.29 Q-Q 32.0.30 Q-Q
32.0.31 Q-Q 32.0.32 Q-Q 32.0.33 Q-Q 32.0.34 Q-Q 32.0.35 Q-Q
32.0.36 Q-Q 32.0.37 Q-Q 32.0.38 Q-Q 32.0.39 Q-Q 32.0.40 Q-Q
32.0.41 Q-Q 32.0.42 Q-Q 32.0.43 Q-Q 32.0.44 Q-Q 32.0.45 Q-Q
32.0.46 Q-Q 32.0.47 Q-Q 32.0.48 Q-Q 32.0.49 Q-Q 32.0.50 Q-Q
32.0.51 Q-Q 32.0.52 Q-Q 32.0.53 Q-Q 32.0.54 Q-Q 32.0.55 Q-Q
32.0.56 Q-Q 32.0.57 Q-Q 32.0.58 Q-Q 32.0.59 Q-Q 32.0.60 Q-Q
32.0.61 Q-Q 32.0.62 Q-Q 32.0.63 Q-Q 32.0.64 Q-Q 32.0.65 Q-Q
32.0.66 Q-Q 32.0.67 Q-Q 32.0.68 Q-Q 32.0.69 Q-Q 32.0.70 Q-Q
32.0.71 Q-Q 32.0.72 Q-Q 32.0.73 Q-Q 32.0.74 Q-Q 32.0.75 Q-Q
32.0.76 Q-Q 32.0.77 Q-Q 32.0.78 Q-Q 32.0.79 Q-Q 32.0.80 Q-Q
32.0.81 Q-Q 32.0.82 Q-Q 32.0.83 Q-Q 32.0.84 Q-Q 32.0.85 Q-Q
32.0.86 Q-Q 32.0.87 Q-Q 32.0.88 Q-Q 32.0.89 Q-Q 32.0.90 Q-Q
32.0.91 Q-Q 32.0.92 Q-Q 32.0.93 Q-Q 32.0.94 Q-Q 32.0.95 Q-Q
32.0.96 Q-Q 32.0.97 Q-Q 32.0.98 Q-Q 32.0.99 Q-Q 32.0.100 Q-Q
32.0.101 Q-Q 32.0.102 Q-Q 32.1.1 C 32.2.1 Q-Q 32.3.1 B
32.4.1 A 32.5.1 Q-Q 32.6.1 C 32.7.1 Q-Q 32.8.1 Q-Q
32.8.2 B 32.9.1 B 32.9.2 B 32.9.3 B 32.9.4 A
32.10.1 C 32.11.1 D 32.12.1 Q-Q 32.13.1 C 32.14.1 C
32.14.2 C 32.14.3 D 32.14.4 A 32.14.5 D 32.15.1 Q-Q
32.16.1 Q-Q 32.17.1 C 32.18.1 D 32.19.1 A 32.20.1 Q-Q
32.21.1 C 32.22.1 Q-Q 32.23.1 C 32.23.2 A 32.24.1 B
32.25.1 Q-Q 32.26.1 B 32.27.1 C 32.28.1 C 32.28.2 C
32.29.1 Q-Q 32.30.1 B 32.30.2 D 32.31.1 C 32.32.1 Q-Q
32.33.1 B 32.34.1 A 32.35.1 Q-Q 32.35.2 Q-Q 32.35.3 C
32.35.4 D 32.35.5 B 32.36.1 Q-Q 32.37.1 D
33 Non GATE: Web Technologies (32)
Answer key☟
33.1.1 Activex: UGC NET CSE | December 2013 | Part 2 | Question: 41 top☝
Answer key☟
33.2.1 Client Server Application: UGC NET CSE | June 2014 | Part 3 | Question: 26 top☝
Answer key☟
33.3.1 Data Warehousing: UGC NET CSE | December 2014 | Part 2 | Question: 47 top☝
Answer key☟
33.4.1 E Commerce: UGC NET CSE | December 2014 | Part 2 | Question: 48 top☝
Which e-business model allows consumers to name their own price for products and services ?
A. B. C. D.
ugcnetcse-dec2014-paper2 e-commerce
Answer key☟
33.5.1 Edi Layer: UGC NET CSE | December 2013 | Part 2 | Question: 44 top☝
The document standards for EDI were first developed by large business house during the 1970s and are
now under the control of the following standard organization.
33.5.2 Edi Layer: UGC NET CSE | December 2013 | Part 2 | Question: 45 top☝
Answer key☟
33.6.1 Html: UGC NET CSE | August 2016 | Part 3 | Question: 41 top☝
Which of the following tag in HTML is used to surround information, such as signature of the person who
created the page?
A. <body></body> B. <address></address>
C. <strong></strong> D. <em></em>
ugcnetcse-aug2016-paper3 web-technologies html
Answer key☟
33.6.2 Html: UGC NET CSE | December 2012 | Part 3 | Question: 66 top☝
A. B.
C. D.
ugcnetcse-dec2012-paper3 web-technologies html
Answer key☟
33.6.3 Html: UGC NET CSE | January 2017 | Part 3 | Question: 41 top☝
Which of the following HTML code will affect the vertical alignment of the table content?
Answer key☟
33.6.4 Html: UGC NET CSE | June 2012 | Part 3 | Question: 68 top☝
HTML is defined using SGML – an _____ standard, information processing-text and office systems (SGML)
for text information processing.
Answer key☟
33.6.5 Html: UGC NET CSE | June 2016 | Part 3 | Question: 41 top☝
Answer key☟
33.7.1 Javascript: UGC NET CSE | December 2015 | Part 3 | Question: 34 top☝
a. Jabascripts syntax is b.
loosely
Javascript
basedison
stripped
Java's c.
down
syntax
Java
version
and Javascript
of Java are originated from island of Java
A. aB.only
a,
C.b,aD.
and
and
a cand
b c
ugcnetcse-dec2015-paper3 web-technologies javascript
Answer key☟
33.7.2 Javascript: UGC NET CSE | July 2018 | Part 2 | Question: 1 top☝
If is the number of alert dialog boxes generated by this JavaScript code and D1, D2, , represents the
content displayed in the each of the dialog boxes, then:
Answer key☟
33.8.1 Transmission Media: UGC NET CSE | December 2012 | Part 2 | Question: 28 top☝
Identify the Risk factors which are associated with Electronic payment system
A. Fraudulent use of credit card B. Sending credit card details over internet
C. Remote storage of credit card details D. All of the above
ugcnetcse-dec2012-paper2 computer-networks transmission-media
Answer key☟
A Trojan horse is
A. A program that performs a legitimate function that is known to an operating system or its user and also has a
hidden component that can be used for nefarious purposes like attacks on message security or impersonation.
B. A piece of code that can attach itself to other programs in the system and spread to other systems when
programs are copied or transferred.
C. A program that spreads to other computer systems by exploiting security holes like weaknesses in facilities for
creation of remote processes
D. All of the above
ugcnetcse-dec2014-paper3 trojan-horse
Answer key☟
33.10.1 Web Technologies: UGC NET CSE | December 2013 | Part 3 | Question: 13 top☝
The document that is used by XSLT to indicate, how to transform the elements of the XML document to
another format is
Answer key☟
33.10.2 Web Technologies: UGC NET CSE | December 2015 | Part 3 | Question: 75 top☝
__________ tag is an extension to HTML that can enclose any number of Javascript statements.
A. <SCRIPT> B. <BODY>
C. <HEAD> D. <TITLE>
ugcnetcse-dec2015-paper3 web-technologies
Answer key☟
33.10.3 Web Technologies: UGC NET CSE | January 2017 | Part 3 | Question: 42 top☝
Answer key☟
33.10.4 Web Technologies: UGC NET CSE | June 2012 | Part 2 | Question: 42 top☝
Answer key☟
33.10.5 Web Technologies: UGC NET CSE | June 2012 | Part 2 | Question: 44 top☝
Answer key☟
33.10.6 Web Technologies: UGC NET CSE | June 2014 | Part 3 | Question: 54 top☝
Linking to another place in the same or another webpage require two A (Anchor) tags, the first with the
_______ attribute and the second with the _______ attribute.
Answer key☟
33.10.7 Web Technologies: UGC NET CSE | June 2019 | Part 2 | Question: 25 top☝
Answer key☟
33.10.8 Web Technologies: UGC NET CSE | October 2020 | Part 2 | Question: 10 top☝
A. defining a path between two nodes in an image B. defining clickable region in an image
C. highlighting an area in an image D. defining the site-map of a web-site
ugcnetcse-oct2020-paper2 non-gate web-technologies
Answer key☟
33.11.1 Xml: UGC NET CSE | December 2014 | Part 3 | Question: 40 top☝
Answer key☟
33.11.2 Xml: UGC NET CSE | December 2015 | Part 3 | Question: 35 top☝
Which of the following statements are true with reference to the way of describing XML data?
A. aB.only
bC.only
aD.and
a and
b c
ugcnetcse-dec2015-paper3 web-technologies xml
Answer key☟
33.11.3 Xml: UGC NET CSE | July 2018 | Part 2 | Question: 2 top☝
The definitions in an XML document are said to be ______ when the tagging system ans definitions in the
DTD are all in compliance
Answer key☟
33.11.4 Xml: UGC NET CSE | June 2019 | Part 2 | Question: 26 top☝
Answer key☟
33.11.5 Xml: UGC NET CSE | Junet 2015 | Part 3 | Question: 40 top☝
Answer key☟
33.11.6 Xml: UGC NET CSE | Junet 2015 | Part 3 | Question: 41 top☝
Answer key☟
33.11.7 Xml: UGC NET CSE | September 2013 | Part 2 | Question: 38 top☝
The _____ language was originally designed as the Transformation Language for Style Sheet Facility
Answer key☟
33.12.1 Xsl: UGC NET CSE | December 2012 | Part 3 | Question: 61 top☝
Answer key☟
Answer Keys
33.0.1 C 33.1.1 D 33.2.1 B 33.3.1 B 33.4.1 D
33.5.1 B 33.5.2 B 33.6.1 Q-Q 33.6.2 A 33.6.3 A
33.6.4 B 33.6.5 D 33.7.1 C 33.7.2 Q-Q 33.8.1 D
33.9.1 A 33.10.1 C 33.10.2 B 33.10.3 X 33.10.4 D
33.10.5 D 33.10.6 C 33.10.7 A 33.10.8 B 33.11.1 D
33.11.2 B 33.11.3 Q-Q 33.11.4 A 33.11.5 C 33.11.6 A
33.11.7 A 33.12.1 D
34 Operating System (223)
A. B.
C. D.
ugcnetcse-oct2022-paper1 operating-system
Answer key☟
An operating system is :
Answer key☟
In a multi-user operating system, 30 requests are made to use a particular resource per hour, on an
average. The probability that no requests are made in 40 minutes, when arrival pattern is a poisson
distribution, is ______
A. B. C. D.
ugcnetcse-july2018-paper2 operating-system
Answer key☟
34.0.4 UGC NET CSE | January 2017 | Part 2 | Question: 40 top☝
ugcnetjan2017ii operating-system
Answer key☟
Suppose and are co-operating processes satisfying Mutual Exclusion condition. Then, if the process
is executing in its critical section then
ugcnetcse-dec2018-paper2 operating-system
Answer key☟
The performance of a file system depends upon the cache hit rate. If it takes msec to satisfy a request
from the cache but msec to satisfy a request if a disk read is needed, then the mean time (ms) required
for a hit rate is given by :
A. B. C. D.
ugcnetcse-dec2007-paper2
Answer key☟
A program has five virtual pages, numbered from to . If the pages are referenced in the order
, with three page frames, the total number of page faults with FIFO will be equal to :
A. B. C. D.
ugcnetcse-dec2007-paper2
Answer key☟
Average process size = bytes. Each page entry requires bytes. The optimum page size is given by :
A. B. C. D.
ugcnetcse-dec2007-paper2
Answer key☟
The aging algorithm with a = is used to predict run times. The previous four runs from oldest to most
recent are and msec. The prediction for the next time will be :
Optical storage is a
ugcnetcse-dec2010-paper2 operating-system
Answer key☟
Answer key☟
A. Shortest-Job-first B. Round-robin
C. Priority based D. Shortest-Job-next
ugcnetcse-dec2006-paper2
Answer key☟
Answer key☟
A. B.
C. D.
ugcnetcse-june2010-paper2 operating-system
Answer key☟
A. Synchronise critical resources to prevent deadlock B. Synchronise critical resources to prevent contention
C. Do I/o D. Facilitate memory management
ugcnetcse-dec2004-paper2
Answer key☟
Remote Computing Service involves the use of time sharing and _______.
Multi-processing
Interactive processing
Batch processing
Real-time processing
ugcnetcse-june2010-paper2 operating-system
Answer key☟
In which of the following storage replacement strategies, is a program placed in the largest available hole in
the memory ?
Answer key☟
Answer key☟
A. B.
C. D.
ugcnetcse-dec2004-paper2
Answer key☟
A. No B. Yes,
C. Yes, D. Yes,
ugcnetcse-june2016-paper2 operating-system
Answer key☟
A. (a) only B. (a) and (b)only C. (b) and (c) only D. (a),(b) and (c)
ugcnetcse-jan2017-paper3 operating-system
Answer key☟
A. B.
C. D.
ugcnetcse-dec2012-paper3 operating-system
Answer key☟
____ is sometimes said to be object oriented, because the only way to manipulate kernel objects is by
invoking methods on their handles.
A. Windows NT B. Windows XP
C. Windows VISTA D. Windows 95/98
ugcnetcse-june2012-paper3 operating-system
Answer key☟
Answer key☟
34.0.25 UGC NET CSE | December 2015 | Part 3 | Question: 39 top☝
Consider a system with twelve magnetic tape drives and three processes and . process
requires maximum ten tape drives, process may need as many as four tape drives and may need
upto nine tape drives. Suppose that at time , process is holding five tape drives, process is holding two
tape drives and process is holding three tape drives, At time , system is in:
Answer key☟
A system has 4 processes and 5 allocatable resources. The current allocation and maximum needs are as
follows:
Allocated Maximum Available
Process A 1 0 2 1 1 1 1 2 1 3 0 0 x 1 1
Process B 2 0 1 1 0 2 2 2 1 0
Process C 1 1 0 1 0 2 1 3 1 0
Process D 1 1 1 1 0 1 1 2 2 1
The smallest value of x for which the above system in safe state is
A. 1 B. 3 C. 2 D. 0
ugcnetcse-dec2015-paper2 operating-system
Answer key☟
Answer key☟
Assume segments in memory and a page size of bytes. The wastage on account of internal
fragmentation is :
1. bytes
2. bytes
3. bytes
4. bytes
ugcnetcse-june2009-paper2
Answer key☟
Match the following for operating system techniques with the most appropriate advantage :
A. B.
C. D.
ugcnetcse-june2015-paper3 operating-system
Answer key☟
A. B.
C. D.
ugcnetjune2014iii operating-system
Answer key☟
A. B. C. D.
ugcnetcse-dec2007-paper2
Answer key☟
Which of the following operating system is better for implementing client-server network?
Answer key☟
Answer key☟
Which of the following is the correct value returned to the operating system upon the successful completion
of a program ?
A. 0 B. 1
C. -1 D. Program do not return a value.
ugcnetcse-june2014-paper2 operating-system
Answer key☟
34.1.1 Applications In Windows: UGC NET CSE | December 2012 | Part 3 | Question: 35 top☝
Answer key☟
34.2.1 Bankers Algorithm: UGC NET CSE | June 2013 | Part 3 | Question: 61 top☝
An operating system using banker’s algorithm for deadlock avoidance has ten dedicated devices (of same
type) and has three processes P1, P2 and P3 with maximum resource requirements of 4, 5 and 8
respectively. There are two states of allocation of devices as follows:
State 1 Processes P1 P2 P3
Devices allocated 2 3 4
State 2 Processes P1 P2 P3
Devices allocated 0 2 4
Which of the following is correct?
A. State 1 is unsafe and State 2 is safe B. State 1 is safe and State 2 is unsafe
C. Both State 1 and State 2 are safe D. Both State 1 and State 2 are unsafe
ugcnetcse-june2013-paper3 operating-system bankers-algorithm deadlock-prevention-avoidance-detection
Answer key☟
34.3.1 Binary Semaphore: UGC NET CSE | June 2010 | Part 2 | Question: 39 top☝
In order to allow only one process to enter its critical section, binary semaphore are initialized to
A. B. C. D.
ugcnetcse-june2010-paper2 operating-system binary-semaphore
Answer key☟
34.4 Counting Semaphores (1) top☝
34.4.1 Counting Semaphores: UGC NET CSE | June 2019 | Part 2 | Question: 46 top☝
At a particular time of computation, the value of a counting semaphore is . Then (wait) operations and
(signal) operations are completed on this semaphore. What is the resulting value of the semaphore?
A. B. C. D.
ugcnetcse-june2019-paper2 counting-semaphores
Answer key☟
34.5.1 Critical Section: UGC NET CSE | December 2014 | Part 2 | Question: 38 top☝
Which of the following conditions does not hold good for a solution to a critical section problem ?
Answer key☟
34.6.1 Deadlock Prevention Avoidance Detection: UGC NET CSE | August 2016 | Part 2 | Question: 36 top☝
Consider a system with seven processes through and six resources through .
Resource ownership is as follows :
process holds and wants
process holds nothing but wants
process holds nothing but wants
process holds and wants &
process holds and wants
process holds and wants
process holds and wants
Is the system deadlocked ? If yes, _______ processes are deadlocked.
Answer key☟
34.6.2 Deadlock Prevention Avoidance Detection: UGC NET CSE | August 2016 | Part 2 | Question: 38 top☝
Consider a system having ‘m’ resources of the same type. These resources are shared by three processes
and which have peak demands of and resources respectively. For what value of
deadlock will not occur ?
A. B. C. D.
ugcnetcse-aug2016-paper2 operating-system deadlock-prevention-avoidance-detection
Answer key☟
34.6.3 Deadlock Prevention Avoidance Detection: UGC NET CSE | August 2016 | Part 3 | Question: 50 top☝
Consider a system which have number of processes and number of resource types. The time complexity of
the safety algorithm, which checks whether a system is in safe state or not, is of the order of :
A. B. C. D.
ugcnetcse-aug2016-paper3 operating-system deadlock-prevention-avoidance-detection
Answer key☟
34.6.4 Deadlock Prevention Avoidance Detection: UGC NET CSE | December 2010 | Part 2 | Question: 40 top☝
Answer key☟
34.6.5 Deadlock Prevention Avoidance Detection: UGC NET CSE | December 2011 | Part 2 | Question: 26 top☝
Answer key☟
34.6.6 Deadlock Prevention Avoidance Detection: UGC NET CSE | December 2013 | Part 3 | Question: 71 top☝
Answer key☟
34.6.7 Deadlock Prevention Avoidance Detection: UGC NET CSE | December 2014 | Part 3 | Question: 52 top☝
An operating system has tape drives. There are three processes & . Maximum requirement
of is tape drives, is tape drives and is tape drives. Currently, is allocated tape
drives, is allocated tape drives and is allocated tape drives. Which of the following sequences
represent a safe state?
1.
2.
3.
4.
Answer key☟
34.6.8 Deadlock Prevention Avoidance Detection: UGC NET CSE | December 2018 | Part 2 | Question: 70 top☝
Suppose a system has instances of some resource with processes competing for that resource. Each
process may require instances of the resources. The maximum value of for which the system never
enters into deadlock is
A. B. C. D.
ugcnetcse-dec2018-paper2 operating-system deadlock-prevention-avoidance-detection
Answer key☟
34.6.9 Deadlock Prevention Avoidance Detection: UGC NET CSE | June 2019 | Part 2 | Question: 48 top☝
A computer has six tape drives with processes competing for them. Each process may need two drives.
What is the maximum value of for the system to be deadlock free?
A. B. C. D.
ugcnetcse-june2019-paper2 deadlock-prevention-avoidance-detection
Answer key☟
34.7.1 Delay: UGC NET CSE | June 2016 | Part 3 | Question: 53 top☝
A Multicomputer with 256 CPUs is organized as 16 16 grid . What is the worst case delay(in hops) that a
message might have to take
A. 16 B. 15 C. 32 D. 30
ugcnetcse-june2016-paper3 operating-system delay
Answer key☟
34.8.1 Demand Paging: UGC NET CSE | December 2014 | Part 2 | Question: 40 top☝
In a demand paging memory system, page table is held in registers. The time taken to service a page fault is
m.sec. if an empty frame is available or if the replaced page is not modified, and it takes m.secs., if the
replaced page is modified. What is the average access time to service a page fault assuming that the page to be
replaced is modified % of the time ?
A. m.sec. B. m.sec.
C. m.sec. D. m.sec.
ugcnetcse-dec2014-paper2 operating-system demand-paging
Answer key☟
34.9.1 Dijkstras Bankers Algorithm: UGC NET CSE | September 2013 | Part 3 | Question: 69 top☝
A system contains units of resource of same type. The resource requirement and current allocation of
these resources for three processes and are as follows
Answer key☟
The directory can be viewed as _______ that translates filenames into their directory entries.
Answer key☟
34.11.1 Disk: UGC NET CSE | December 2013 | Part 2 | Question: 49 top☝
How much space will be required to store the bit map of a 1.3 GB disk with 512 bytes block size?
A. 332.8 KB
B. 83.6 KB
C. 266.2 KB
D. 256.6 KB
Answer key☟
34.11.2 Disk: UGC NET CSE | December 2015 | Part 2 | Question: 28 top☝
Consider a disk with 16384 bytes per track having a rotation time of 16 msec and average seek time of 40
msec. What is the time in msec to read a block of 1024 bytes from this disk?
Answer key☟
34.11.3 Disk: UGC NET CSE | December 2018 | Part 2 | Question: 18 top☝
Consider a disk pack with surfaces, tracks and sectors per pack. bytes of data are stored in a
bit serial manner in a sector. The number of bits required to specify a particular sector in the disk is
A. B. C. D.
ugcnetcse-dec2018-paper2 operating-system disk
Answer key☟
34.11.4 Disk: UGC NET CSE | June 2013 | Part 3 | Question: 64, UGCNET-Dec2015-II: 49 top☝
A UNIX file system has 1 KB block size and 4-byte disk addresses. What is the maximum file size if the
inode contains ten direct block entries, one single indirect block entry, one double indirect block entry and
one triple indirect block entry?
A. 30 GB B. 64 GB C. 16 GB D. 1 GB
ugcnetcse-june2013-paper3 ugcnetcse-dec2015-paper2 operating-system disk
Answer key☟
34.11.5 Disk: UGC NET CSE | October 2020 | Part 2 | Question: 17 top☝
Suppose you have a Linux file system where the block size is bytes, a disk address is bits, and an
node contains the disk addresses of the first direct blocks of file, a single indirect block and a double
indirect block. Approximately, what is the largest file that can be represented by an node?
Answer key☟
34.11.6 Disk: UGC NET CSE | October 2020 | Part 2 | Question: 91 top☝
The question given below: concern a disk with a sector size of bytes, tracks per surface,
sectors per track, five double-sided platters, and average seek time of milliseconds.
If is the capacity of a track in bytes, and is the capacity of each surface in bytes, then _______
A. B.
C. D.
ugcnetcse-oct2020-paper2 operating-system disk
Answer key☟
34.11.7 Disk: UGC NET CSE | October 2020 | Part 2 | Question: 92 top☝
The question given below: concern a disk with a sector size of bytes, tracks per surface,
sectors per track, five double-sided platters, and average seek time of milliseconds.
What is the capacity of the disk, in bytes?
A. B. C. D.
ugcnetcse-oct2020-paper2 operating-system disk
Answer key☟
34.11.8 Disk: UGC NET CSE | October 2020 | Part 2 | Question: 93 top☝
The question given below: concern a disk with a sector size of bytes, tracks per surface,
sectors per track, five double-sided platters, and average seek time of milliseconds.
Given below are two statements:
Statement : The disk has a total number of cylinders.
Statement : bytes is not a valid block size for the disk.
In the light of the above statements, choose the correct answer from the options given below:
Answer key☟
34.11.9 Disk: UGC NET CSE | October 2020 | Part 2 | Question: 94 top☝
The question given below concern a disk with a sector size of bytes, tracks per surface,
sectors per track, five double-sided platters, and average seek time of milliseconds.
If the disk platters rotate at rpm (revolutions per minute), then approximately what is the maximum rotational
delay?
A. seconds B. seconds
C. seconds D. seconds
ugcnetcse-oct2020-paper2 operating-system disk
Answer key☟
34.11.10 Disk: UGC NET CSE | October 2020 | Part 2 | Question: 95 top☝
The question given below concern a disk with a sector size of bytes, tracks per surface,
sectors per track, five double-sided platters, and average seek time of milliseconds.
If one track of data can be transferred per revolution, then what is the data transfer rate?
A. KBytes/second B. KBytes/second
C. KBytes/second D. KBytes/second
ugcnetcse-oct2020-paper2 operating-system disk
Answer key☟
34.12.1 Disk Cpu Memory Interrupt: UGC NET CSE | June 2019 | Part 2 | Question: 42 top☝
Answer key☟
34.13.1 Disk Scheduling: UGC NET CSE | December 2012 | Part 2 | Question: 5 UGCNET-June2013-II: 47 top☝
If the disk head is located initially at 32, find the number of disk moves required with FCFS if the disk queue
of I/O blocks requests are 98. 37, 14, 124, 65, 67.
Answer key☟
34.13.2 Disk Scheduling: UGC NET CSE | December 2013 | Part 2 | Question: 48 top☝
Consider a disk queue with request for input/output to block cylinders 98, 183, 37, 122, 14, 124, 65, 67 in
that order. Assume that disk head is initially positioned at cylinder 53 and moving towards cylinder number 0.
The total number of head movements using Shortest Seek Time First (SSTF) and SCAN algorithms are
respectively
Answer key☟
34.13.3 Disk Scheduling: UGC NET CSE | December 2014 | Part 3 | Question: 51 top☝
Consider an imaginary disk with cylinders. A request come to read a block on cylinder . While the seek
to cylinder is in progress, new requests come in for cylinders and in that order. The
number of arm motions using shortest seek first algorithm is
A. B. C. D.
ugcnetcse-dec2014-paper3 operating-system disk-scheduling
Answer key☟
34.13.4 Disk Scheduling: UGC NET CSE | January 2017 | Part 3 | Question: 50 top☝
Consider a disk queue with I/O requests on the following cylinders in their arriving order:
. The disk head is assumed to be at cylinder and
moving in the direction of decreasing number of cylinders. Total number of cylinders in the disk is . The disk
head movement using SCAN –scheduling algorithm is:
A. B.
C. D.
ugcnetcse-jan2017-paper3 operating-system disk-scheduling
Answer key☟
34.13.5 Disk Scheduling: UGC NET CSE | June 2012 | Part 3 | Question: 74 top☝
On a disk with 1000 cylinders (0 to 999) find the number of tracks, the disk arm must move to satisfy all the
requests in the disk queue. Assume the last request service was at track 345 and the head is moving toward
track 0. The queue in FIFO order contains requests for the following tracks:
123, 874, 692, 475, 105, 376
(Assume scan algorithm)
Answer key☟
34.13.6 Disk Scheduling: UGC NET CSE | June 2016 | Part 2 | Question: 38 top☝
If the Disk head is located initially at track 32, find the number of disk moves required with FCFS scheduling
criteria if the disk queue of I/O blocks requests are 98, 37, 14, 124, 65, 67
Answer key☟
34.13.7 Disk Scheduling: UGC NET CSE | Junet 2015 | Part 2 | Question: 36 top☝
A disk drive has cylinders, numbered to . Disk requests come to the disk driver for cylinders
and in that order. The driver is currently serving a request at a cylinder . A seek
takes msec per cylinder moved. How much seek time is needed for shortest seek time first (SSTF) algorithm?
Answer key☟
34.13.8 Disk Scheduling: UGC NET CSE | October 2020 | Part 2 | Question: 16 top☝
Consider a disk system having cylinders. Disk requests are received by a disk drive for cylinders
and , in that order. Assuming the disk head is currently at cylinder , what is the time
taken to satisfy all the requests if it takes milliseconds to move from one cylinder to adjacent one and Shortest
Seek Time First (SSTF) algorithm is used?
A. milliseconds B. milliseconds
C. milliseconds D. milliseconds
ugcnetcse-oct2020-paper2 operating-system disk-scheduling
Answer key☟
34.13.9 Disk Scheduling: UGC NET CSE | September 2013 | Part 2 | Question: 46 top☝
Consider the input/output (I/O) request made at different instants of time directed at a hypothetical disk
having tracks as given in the following table
Assume that
Current head position is at track no.
Direction of last movement is towards higher number of tracks.
Current clock time is milliseconds
Head movement time per track is millisecond
is a variant of disk-arm scheduling algorithm. In this algorithm, if no more I/O requests are left in
current direction, the disk head reveres its direction. The seek time in Shortest Seek First (SSF) and disk-
arm scheduling algorithms respectively are :
Answer key☟
34.14.1 Distributed Computing: UGC NET CSE | December 2012 | Part 3 | Question: 2 top☝
The efficiency (E) and speed up (sp) for Multiprocessor with p processors satisfies:
A. B.
C. D.
ugcnetcse-dec2012-paper3 operating-system distributed-computing
Answer key☟
34.15.1 Distributed System: UGC NET CSE | December 2008 | Part 2 | Question: 24 top☝
A. Amoeba B. UNIX
C. MS-DOS D. MULTICS
ugcnetcse-dec2008-paper2 operating-system distributed-system
Answer key☟
34.16.1 Dynamic Linking: UGC NET CSE | June 2016 | Part 2 | Question: 34 top☝
Answer key☟
34.17.1 Effective Memory Access: UGC NET CSE | June 2009 | Part 2 | Question: 19 top☝
Suppose it takes ns to access a page table and ns to access associative memory with a % hit
rate, the average access time equals :
A. B.
C. D.
ugcnetcse-june2009-paper2 operating-system effective-memory-access
Answer key☟
Consider a file currently consisting of blocks. Assume that the file control block and the index block is
already in memory. If a block is added at the end (and the block information to be added is stored in
memory), then how many disk operations are required for indexed (single-level) allocation strategy ?
A. B. C. D.
ugcnetcse-aug2016-paper3 operating-system file-system
Answer key☟
34.18.2 File System: UGC NET CSE | December 2013 | Part 3 | Question: 72 top☝
Answer key☟
34.18.3 File System: UGC NET CSE | December 2014 | Part 3 | Question: 50 top☝
How many disk blocks are required to keep list of free disk blocks in a GB hard disk with kB block size
using linked list of free disk blocks ? Assume that the disk block number is stored in bits.
A. blocks B. blocks
C. blocks D. blocks
ugcnetcse-dec2014-paper3 operating-system file-system
Answer key☟
34.18.4 File System: UGC NET CSE | June 2012 | Part 2 | Question: 10 top☝
Answer key☟
34.18.5 File System: UGC NET CSE | June 2014 | Part 2 | Question: 34 top☝
A. B.
C. D.
ugcnetcse-june2014-paper2 operating-system file-system
Answer key☟
34.18.6 File System: UGC NET CSE | Junet 2015 | Part 3 | Question: 12 top☝
In the indexed scheme of blocks to a file, the maximum possible size of the file depends on:
A. The number of blocks used for index and the size of indexB. Size of Blocks and size of Address
C. Size of index D. Size of block
ugcnetcse-june2015-paper3 operating-system file-system
Answer key☟
34.18.7 File System: UGC NET CSE | Junet 2015 | Part 3 | Question: 53 top☝
In _____ allocation method for disk block allocation in a file system, insertion and deletion of blocks in a file
is easy
Answer key☟
34.19.1 Fragmentation: UGC NET CSE | July 2018 | Part 2 | Question: 56 top☝
a. External Fragmentation
b. exists
Memory when
Fragmentation
there is enough
c. can
Onebe
total
solution
internal
memory
toas
external
space
well asFragmentation
toexternal
satisfy a request
is compaction
but the available space is contiguous.
Answer key☟
34.20.1 Hard Disk Drive: UGC NET CSE | December 2011 | Part 2 | Question: 29 top☝
The maximum amount of information that is available in one portion of the disk access arm for a removal
disk pack (without further movement of the arm with multiple heads)
34.21.1 Hit Ratio: UGC NET CSE | September 2013 | Part 2 | Question: 45 top☝
The hit ratio of a Transaction Look Aside Buffer (TLAB) is 80%. It takes 20 nanoseconds (ns) to search
TLAB and 100 ns to access main memory. The effective memory access time is _____
A. 36 ns B. 140 ns C. 122 ns D. 40 ns
ugcnetsep2013ii operating-system cache-memory hit-ratio
Answer key☟
34.22.1 Input Output: UGC NET CSE | January 2017 | Part 2 | Question: 38 top☝
Answer key☟
34.22.2 Input Output: UGC NET CSE | October 2020 | Part 2 | Question: 65 top☝
Match with
A. B.
C. D.
Match $
Answer key☟
34.23.1 Interrupts: UGC NET CSE | December 2011 | Part 2 | Question: 28 top☝
Answer key☟
34.23.2 Interrupts: UGC NET CSE | December 2014 | Part 3 | Question: 02 top☝
For switching from a CPU user mode to the supervisor mode following type of interrupt is most appropriate
A. Internal interrupts B. External interrupts
C. Software interrupts D. None of the above
ugcnetcse-dec2014-paper3 operating-system interrupts
Answer key☟
34.24.1 Io Handling: UGC NET CSE | July 2018 | Part 2 | Question: 54 top☝
Normally user programs are prevented from handling I/O directly by I/O instructions in them. For CPUs
having explicit I/O instructions, such I/O protection is ensured by having the I/O instructions privileged. In a
CPU with memory mapped I/O, there is no explicit I/O instruction. Which one of the following is true for a CPU with
memory mapped I/O?
Answer key☟
34.25.1 Java: UGC NET CSE | June 2012 | Part 3 | Question: 13 top☝
Answer key☟
34.26.1 Least Recently Used: UGC NET CSE | August 2016 | Part 2 | Question: 37 top☝
Suppose that the virtual Address space has eight pages and physical memory with four page frames. If
page replacement algorithm is used, ______ number of page faults occur with the reference string.
021354637473355311172341
A. B. C. D.
ugcnetcse-aug2016-paper2 operating-system least-recently-used page-replacement
Answer key☟
34.26.2 Least Recently Used: UGC NET CSE | June 2019 | Part 2 | Question: 43 top☝
Consider that a process has been allocated frames and has a sequence of page referencing as
. What shall be the difference in page faults for the above string using the algorithms
of LRU and optimal page replacement for referencing the string?
A. B. C. D.
ugcnetcse-june2019-paper2 page-replacement least-recently-used
Answer key☟
34.27.1 Linux: UGC NET CSE | July 2018 | Part 2 | Question: 55 top☝
Which UNIX/Linux command is used to make all files and sub-directions in the directory "progs" executable
by all users?
A. chmod - R a + x progs B. chmod - R 222 progs
C. chmod - X a + x progs D. chmod - X 222 progs
ugcnetcse-july2018-paper2 unix linux operating-system non-gate
Answer key☟
34.28.1 Memory Management: UGC NET CSE | December 2008 | Part 2 | Question: 40 top☝
A.
B.
C.
D. None of the above
Answer key☟
34.28.2 Memory Management: UGC NET CSE | December 2009 | Part 2 | Question: 39 top☝
(D) buddy
Answer key☟
34.28.3 Memory Management: UGC NET CSE | December 2011 | Part 2 | Question: 30 top☝
Consider a logical address space of pages of words mapped with memory of frames. How many
bits are there in the physical address ?
1. bits
2. bits
3. bits
4. bits
Answer key☟
34.28.4 Memory Management: UGC NET CSE | December 2012 | Part 2 | Question: 14 top☝
Given a memory partitions of 100 K, 500 K, 200 K, 300 K and 600 K (in order) and processes of 212 K, 417
K, 112 K and 426 K (in order), using the first fit algorithm, in which partition would the process requiring 426
K be placed?
Answer key☟
34.28.5 Memory Management: UGC NET CSE | December 2012 | Part 2 | Question: 30 top☝
Which of the following memory allocation scheme suffers from external fragmentation?
A. Segmentation B. Pure demand pagingC. Swapping D. Paging
ugcnetcse-dec2012-paper2 operating-system memory-management
Answer key☟
34.28.6 Memory Management: UGC NET CSE | December 2015 | Part 3 | Question: 37 top☝
A. B.
C. D.
operating-system memory-management ugcnetcse-dec2015-paper3
Answer key☟
34.28.7 Memory Management: UGC NET CSE | January 2017 | Part 3 | Question: 49 top☝
A memory management system has 64 pages with 512 bytes page size. Physical memory consists of 32
page frames. Number of bits required in logical and physical address are respectively:
Answer key☟
34.28.8 Memory Management: UGC NET CSE | Junet 2015 | Part 3 | Question: 51 top☝
Answer key☟
34.29.1 Mmu: UGC NET CSE | December 2015 | Part 3 | Question: 38 top☝
Answer key☟
34.30.1 Monitors: UGC NET CSE | December 2014 | Part 3 | Question: 53 top☝
A. It is higher level synchronization primitive and is a collection of procedures, variables, and data structures
grouped together in a special package.
B. It is a non-negative integer which apart from initialization can be acted upon by wait and signal operations.
C. It uses two primitives, send and receive which are system calls rather than language constructs.
D. It consists of the primitives implemented as system calls to block the process when they are not allowed to
enter critical region to save time.
Answer key☟
34.31.1 Multiprogramming Os: UGC NET CSE | December 2012 | Part 3 | Question: 7 top☝
A. aB.only
aC.and
aD.and
b a,
only
cb,only
and c only
ugcnetcse-dec2012-paper3 operating-system multiprogramming-os
Answer key☟
34.32.1 Mutual Exclusion: UGC NET CSE | June 2012 | Part 3 | Question: 65 top☝
Consider the methods used by processes and for accessing their critical sections. The initial values
of shared Boolean variables and are randomly assigned,
A. Mutual exclusion but not progress B. Progress but not mutual exclusion
C. Neither mutual exclusion nor progress D. Both mutual exclusion and progress
ugcnetcse-june2012-paper3 operating-system mutual-exclusion critical-section
Answer key☟
34.33.1 Page Fault: UGC NET CSE | August 2016 | Part 3 | Question: 52 top☝
Which of the following options, gives the correct number of page faults related to LRU, FIFO, and optimal page
replacement algorithms respectively, assuming page frames and all frames are initially empty ?
A. B. C. D.
ugcnetcse-aug2016-paper3 operating-system page-fault
Answer key☟
34.33.2 Page Fault: UGC NET CSE | December 2009 | Part 2 | Question: 37 top☝
A page fault
34.33.3 Page Fault: UGC NET CSE | December 2015 | Part 2 | Question: 27 top☝
Suppose that the number of instructions executed between page fault is directly proportional to the number
of page frames allocated to a program. If the available memory is doubled, the mean interval between the
page faults is also doubled. Further, consider that a normal instruction takes one microsecond, but if a page fault
occurs, it takes 2001 microseconds. If a program takes 60 sec to run, during which time it gets 15,000 page faults,
how long would it take to run twice as much memory were available?
Answer key☟
34.33.4 Page Fault: UGC NET CSE | December 2018 | Part 2 | Question: 72 top☝
Suppose for a process , reference to pages in order are . Assume that main memory
can accomodate pages and the main memory has already and in the order – first, – second. At this
moment, assume FIFO Page Replacement Algorithm is used then the number of page faults that occur to complete
the execution of process is
A. B. C. D.
ugcnetcse-dec2018-paper2 operating-system page-replacement page-fault
Answer key☟
34.33.5 Page Fault: UGC NET CSE | July 2018 | Part 2 | Question: 58 top☝
Consider a virtual page reference string 1, 2, 3, 2, 4, 2, 5, 2, 3, 4. Suppose LRU page replacement algorithm
is implemented with 3 page frames in main memory. Then the number of page faults are _____
A. 5 B. 7 C. 9 D. 10
ugcnetcse-july2018-paper2 operating-system page-fault paging
Answer key☟
34.33.6 Page Fault: UGC NET CSE | June 2016 | Part 2 | Question: 36 top☝
A. 10, 9 B. 9, 9 C. 10, 10 D. 9, 10
ugcnetcse-june2016-paper2 operating-system page-replacement page-fault
Answer key☟
34.33.7 Page Fault: UGC NET CSE | September 2013 | Part 3 | Question: 23 top☝
A. B.
C. D.
ugcnetcse-sep2013-paper3 operating-system page-fault
Answer key☟
34.34.1 Page Replacement: UGC NET CSE | June 2012 | Part 2 | Question: 33 top☝
A. 8 B. 9 C. 10 D. 12
operating-system page-replacement ugcnetcse-june2012-paper2
Answer key☟
34.34.2 Page Replacement: UGC NET CSE | June 2014 | Part 3 | Question: 35 top☝
Consider a program that consists of pages (from to ) and we have page frames in the physical
memory for the pages. The page reference string is :
The number of page faults in LRU and optimal page replacement algorithms are respectively (without including
initial page faults to fill available page frames with pages) :
Answer key☟
34.34.3 Page Replacement: UGC NET CSE | Junet 2015 | Part 2 | Question: 38 top☝
A LRU page replacement is used with page frames and eight pages. How many page faults will occur with
the reference string if the four frames are initially empty?
A. B. C. D.
ugcnetcse-june2015-paper2 operating-system page-replacement
Answer key☟
34.34.4 Page Replacement: UGC NET CSE | October 2020 | Part 2 | Question: 15 top☝
Consider a hypothetical machine with pages of physical memory, pages of virtual memory, and
as the stream of page reference by an application. If
and are the number of page faults that the application would incur with FIFO and LRU page replacement
algorithms respectively, then _______(Assuming enough space for storing page frames)
A. B. C. D.
ugcnetcse-oct2020-paper2 operating-system page-replacement
Answer key☟
34.34.5 Page Replacement: UGC NET CSE | September 2013 | Part 3 | Question: 71 top☝
Consider a main memory with three page frames for the following page reference string:
5, 4, 3, 2, 1, 4, 3, 5, 4, 3, 4, 1, 4
Assuming that the execution of process is initialized after loading page 5 in memory,, the number of page faults in
FIFO and second chance replacement respectively are
Answer key☟
34.35 Paging (8) top☝
34.35.1 Paging: UGC NET CSE | August 2016 | Part 3 | Question: 51 top☝
An operating system supports a paged virtual memory, using a central processor with a cycle time of one
microsecond. It costs an additional one microsecond to access a page other than the current one. Pages
have words, and the paging device is a drum that rotates at revolutions per minute and transfers one
million words per second. Further, one percent of all instructions executed accessed a page other than the current
page. The instruction that accessed another page, % accessed a page already in memory and when a new page
was required, the replaced page was modified % of the time. What is the effective access time on this system,
assuming that the system is running only one process and the processor is idle during drum transfers ?
A. microseconds B. microseconds
C. microseconds D. microseconds
ugcnetcse-aug2016-paper3 operating-system paging
Answer key☟
34.35.2 Paging: UGC NET CSE | December 2010 | Part 2 | Question: 39 top☝
34.35.3 Paging: UGC NET CSE | December 2014 | Part 2 | Question: 39 top☝
For the implementation of a paging scheme, suppose the average process size be bytes, the page size be
bytes, and each page entry requires bytes. The optimum page size that minimizes the total overhead
due to the page table and the internal fragmentation loss is given by
A. B. C. D.
ugcnetcse-dec2014-paper2 operating-system paging
Answer key☟
34.35.4 Paging: UGC NET CSE | January 2017 | Part 2 | Question: 37 top☝
In a paging system, it takes ns to search translation Look-a-side Buffer (TLB) and ns to access the
main memory. If the TLB hit ratio is , the effective memory access time is :
A. ns B. ns C. ns D. ns
ugcnetjan2017ii operating-system paging
Answer key☟
34.35.5 Paging: UGC NET CSE | July 2018 | Part 2 | Question: 52 top☝
In a paged memory, the page hit ratio is 0.40. The time required to access a page in secondary memory is
equal to 120 ns. The time required to access a page in primary memory is 15 ns. The average time required
to access a page is ____
A. 105 B. 68 C. 75 D. 78
ugcnetcse-july2018-paper2 operating-system paging
Answer key☟
34.35.6 Paging: UGC NET CSE | July 2018 | Part 2 | Question: 57 top☝
Page information memory is also called as Page Table. The essential contents in each entry of a page table
is/are ____
34.35.7 Paging: UGC NET CSE | June 2013 | Part 3 | Question: 59 top☝
A job has four pages A, B, C, D and the main memory has two page frames only. The job needs to process
its pages in following order:
ABACABDBACD
Assuming that the page interrupt occurs when a new page is brought in the main memory, irrespective of whether
the page is swapped out or not. The number of page interrupts in FIFO and LRU page replacement algorithms are
Answer key☟
34.35.8 Paging: UGC NET CSE | June 2019 | Part 2 | Question: 47 top☝
The minimum number of page frames that must be allocated to a running process in a virtual memory
environment is determined by
Answer key☟
34.36.1 Pipelining: UGC NET CSE | September 2013 | Part 2 | Question: 50 top☝
The speed up of a pipeline processing over an equivalent non-pipeline processing is defined by the ration:
where no. of tasks
time of completion of each tasks
no. of segments of pipeline
clock cycle time
speed up ratio
A. B.
C. D.
ugcnetsep2013ii operating-system pipelining
Answer key☟
34.37.1 Process: UGC NET CSE | December 2014 | Part 2 | Question: 37 top☝
A specific editor has of program text, of initial stack, of initialized data, and of
bootstrap code. If five editors are started simultaneously, how much physical memory is needed if shared
text is used?
A. B. C. D.
ugcnetcse-dec2014-paper2 operating-system process
Answer key☟
34.37.2 Process: UGC NET CSE | June 2013 | Part 3 | Question: 63 top☝
34.38.1 Process Model: UGC NET CSE | December 2008 | Part 2 | Question: 21 top☝
N processes are waiting for . A process spends a fraction of its time in wait state. The
utilization is given by :
1. 1-p-N
2. 1-pN
3. pN
4. p-N
Answer key☟
34.38.2 Process Model: UGC NET CSE | December 2008 | Part 2 | Question: 22 top☝
If holes are half as large as processes, the fraction of memory wasted in holes is :
A.
B.
C.
D.
Answer key☟
34.39.1 Process Scheduling: UGC NET CSE | August 2016 | Part 2 | Question: 39 top☝
Five jobs and are waiting in Ready Queue. Their expected runtimes are and
respectively. All jobs entered in Ready queue at time zero. They must run in _____ order to minimize
average response time if .
A. B.
C. D.
ugcnetcse-aug2016-paper2 operating-system process-scheduling
Answer key☟
34.39.2 Process Scheduling: UGC NET CSE | August 2016 | Part 2 | Question: 40 top☝
Consider three CPU intensive processes which require and units of time, arrive at
times and respectively. Suppose operating system is implementing Shortest Remaining Time first
(preemptive scheduling) algorithm, then _____ context switches are required (suppose context switch at the
beginning of Ready queue and at the end of Ready queue are not counted).
A. B. C. D.
ugcnetcse-aug2016-paper2 operating-system process-scheduling
Answer key☟
34.39.3 Process Scheduling: UGC NET CSE | December 2009 | Part 2 | Question: 36 top☝
In the process management Round-robin method is essentially the pre-emptive version of _________
(A) FILO
(B) FIFO
(C) SSF
Answer key☟
34.39.4 Process Scheduling: UGC NET CSE | December 2012 | Part 2 | Question: 20 top☝
The problem of indefinite blockage of low-priority jobs in general priority scheduling algorithm can be solved
using:
Answer key☟
34.39.5 Process Scheduling: UGC NET CSE | December 2013 | Part 2 | Question: 46 top☝
Consider a preemptive priority based scheduling algorithm based on dynamically changing priority. Larger
priority number implies higher priority. When the process is waiting for CPU in the ready queue (but not yet
started execution), its priority changes at a rate a=2. When it starts running, its priority changes at a rate b=1. All
the processes are assigned priority value 0 when they enter ready queue. Assume that the following processes
want to execute:
Process Arrival Service
ID Time Time
P1 0 4
P2 1 1
P3 2 2
P4 3 1
The time quantum q=1. When two processes want to join ready queue simultaneously, the process which has not
executed recently is given priority. The finish time of processes P1, P2, P3 and P4 will respectively be
Answer key☟
34.39.6 Process Scheduling: UGC NET CSE | December 2014 | Part 2 | Question: 36 top☝
Consider the following justifications for commonly using the two-level scheduling:
I. It is used when memory is too small to hold all the ready processes.
II. Because its performance is same as that of the .
III. Because it facilitates putting some set of processes into memory and a choice is made from that.
IV. Because it does not allow to adjust the set of in-core processes.
Which of the following is true ?
Answer key☟
34.39.7 Process Scheduling: UGC NET CSE | January 2017 | Part 3 | Question: 52 top☝
34.39.8 Process Scheduling: UGC NET CSE | July 2018 | Part 2 | Question: 60 top☝
In which of the following scheduling criteria, context switching will never take place?
Answer key☟
34.39.9 Process Scheduling: UGC NET CSE | June 2010 | Part 2 | Question: 38 top☝
A. B. C. D. Priority based
ugcnetcse-june2010-paper2 operating-system process-scheduling
Answer key☟
34.39.10 Process Scheduling: UGC NET CSE | June 2012 | Part 2 | Question: 29 top☝
A. before the CPU time slice expires B. to allow starving processes to run
C. when it requires I/O D. to avoid collision
operating-system process-scheduling ugcnetcse-june2012-paper2
Answer key☟
34.39.11 Process Scheduling: UGC NET CSE | June 2012 | Part 2 | Question: 30 top☝
In round robin CPU scheduling as time quantum is increased the average turn around time
A. increases
B. decreases
C. remains constant
D. varies irregularly
Answer key☟
34.39.12 Process Scheduling: UGC NET CSE | June 2013 | Part 3 | Question: 58 top☝
Consider the following processes with time slice of 4 milliseconds (I/O requests are ignored):
Process A B C D
Arrival
0 1 2 3
time
CPU
8 4 9 5
Cycle
The average turnaround time of these processes will be
Answer key☟
34.39.13 Process Scheduling: UGC NET CSE | June 2014 | Part 2 | Question: 32 top☝
Answer key☟
34.39.14 Process Scheduling: UGC NET CSE | June 2014 | Part 3 | Question: 34 top☝
Consider a uniprocessor system where new processes arrive at an average of five processes per minute
and each process needs an average of seconds of service time. What will be the CPU utilization ?
A. % B. % C. % D. %
ugcnetjune2014iii operating-system process-scheduling
Answer key☟
34.39.15 Process Scheduling: UGC NET CSE | June 2014 | Part 3 | Question: 36 top☝
Which of the following statements is not true about disk-arm scheduling algorithms ?
Answer key☟
34.39.16 Process Scheduling: UGC NET CSE | June 2016 | Part 2 | Question: 40 top☝
A scheduling Algorithm assigns priority proportional to the waiting time of a process. Every process starts
with priority zero (lowest priority). The scheduler reevaluates the process priority for every 'T' time units and
declares next process to be scheduled. If teh process have no I/O operations and all arrive at time zero, then the
schduler implements ___ criteria
Answer key☟
34.39.17 Process Scheduling: UGC NET CSE | June 2019 | Part 2 | Question: 45 top☝
Consider three CPU intensive processes, which require , and units of time and arrive at times ,
and respectively. How many context switches are needed if the operating system implements a shortest
remaining time first scheduling algorithm? Do not count the context switches at time zero and at the end.
A. B. C. D.
ugcnetcse-june2019-paper2 process-scheduling
Answer key☟
34.39.18 Process Scheduling: UGC NET CSE | Junet 2015 | Part 3 | Question: 50 top☝
Which of the following statements is not true for Multi Level Feedback Queue processor scheduling
algorithm?
Answer key☟
34.39.19 Process Scheduling: UGC NET CSE | September 2013 | Part 2 | Question: 44 top☝
A. B.
C. D.
ugcnetsep2013ii operating-system process-scheduling
Answer key☟
34.39.20 Process Scheduling: UGC NET CSE | September 2013 | Part 3 | Question: 70 top☝
Consider the following set of processes with the length of CPU burst time in milliseconds (ms)
Using round robin scheduling with time slice of ms, the average turn around time is
A. ms B. ms C. ms D. ms
ugcnetcse-sep2013-paper3 operating-system process-scheduling
Answer key☟
34.40.1 Process Synchronization: UGC NET CSE | December 2018 | Part 2 | Question: 69 top☝
To overcome difficulties in Readers-Writers problem, which of the following statement/s is/are true?
Answer key☟
34.40.2 Process Synchronization: UGC NET CSE | July 2018 | Part 2 | Question: 51 top☝
At a particular time of computation, the value of a counting semaphore is 10. Then 12 P operations and "x" V
operations were performed on this semaphore. If the final value of semaphore is 7, x will be
A. 8 B. 9 C. 10 D. 11
ugcnetcse-july2018-paper2 operating-system process-synchronization
Answer key☟
34.41.1 Ram: UGC NET CSE | December 2008 | Part 2 | Question: 41 top☝
A. multiprocessing
B. multiprogramming
C. multitasking
D. all of the above
Answer key☟
34.42.1 Resource Allocation: UGC NET CSE | June 2012 | Part 2 | Question: 31 top☝
Answer key☟
34.42.2 Resource Allocation: UGC NET CSE | June 2014 | Part 2 | Question: 33 top☝
Consider a system with five processes through and three resource types , and . Resource
type has instances, has instances and has instances. Suppose that at time , the
following snapshot of the system has been taken :
Allocation
0 1 0
2 0 0
3 0 2
2 1 1
0 2 2
Max
7 5 3
3 2 2
9 0 2
2 2 2
4 3 3
Available
3 3 2
Assume that now the process requests one additional instance of type and two instances of resource type
. The state resulting after this allocation will be
Answer key☟
34.43.1 Round Robin Scheduling: UGC NET CSE | December 2018 | Part 2 | Question: 73 top☝
Consider the following set of processes and the length of CPU burst time given in milliseconds :
Assume that processes being scheduled with Round-Robin Scheduling Algorithm with time quantum ms. Then
the waiting time for is ______ ms
A. B. C. D.
ugcnetcse-dec2018-paper2 operating-system process-scheduling round-robin-scheduling
Answer key☟
34.44.1 Runtime Environment: UGC NET CSE | December 2009 | Part 2 | Question: 31 top☝
(A) re-allocation
(B) allocation
(C) linking
(D) loading
Answer key☟
34.45.1 Scheduling: UGC NET CSE | December 2008 | Part 2 | Question: 23 top☝
Answer key☟
34.45.3 Scheduling: UGC NET CSE | January 2017 | Part 2 | Question: 39 top☝
a. First-come-first-served
b. Round Robin
c. Priority
Answer key☟
34.45.4 Scheduling: UGC NET CSE | July 2018 | Part 2 | Question: 59 top☝
Consider the following three processes with the arrival time and CPU burst time given in miliseconds:
Arrival Burst
Process
Time Time
0 7
1 4
2 8
The Gantt Chart for preemptive SJF scheduling algorithm is _______
A. B. C. D.
ugcnetcse-july2018-paper2 operating-system scheduling process-scheduling
Answer key☟
34.46.1 Seek Latency: UGC NET CSE | June 2019 | Part 2 | Question: 16 top☝
For a magnetic disk with concentric circular tracks, the seek latency is not linearly proportional to the seek
distance due to
ugcnetcse-june2019-paper2 seek-latency
Answer key☟
34.47.1 Semaphore: UGC NET CSE | December 2009 | Part 2 | Question: 38 top☝
A semaphore count of negative n means (s = – n) that the queue contains ________ waiting processes.
(A) n + 1
(B) n
(C) n – 1
(D) 0
Answer key☟
34.47.2 Semaphore: UGC NET CSE | January 2017 | Part 2 | Question: 36 top☝
There are three processes and sharing a semaphore for synchronizing a variable. Initial value of
semaphore is one. Assume that negative value of semaphore tells us how many processes are waiting in
queue. Processes access the semaphore in following order :
a. needs to access
b. needs to access
c. needs to access
A. B. C. D.
ugcnetjan2017ii operating-system semaphore
Answer key☟
34.47.3 Semaphore: UGC NET CSE | June 2013 | Part 3 | Question: 60 top☝
Suppose and are two semaphores initialized to and are two processes which are sharing
resources.
Answer key☟
34.48.1 Shell Script: UGC NET CSE | June 2016 | Part 3 | Question: 68 top☝
Which of the following statements is not correct with reference to cron daemon in UNIX OS?
A. The cron daemon is the standard tool for running commands on a predetermined-schedule
B. It starts when the system boots and runs as long as the system is up
C. Cron reads configuration files that contain list of command lines and the times at which they invoked
D. Crontab for individual users are not stored
Answer key☟
34.48.2 Shell Script: UGC NET CSE | June 2016 | Part 3 | Question: 69 top☝
In Unix, files can be protected by assigning each one a 9-bit mode called rights bits, now, consider the
following two statements:
I. A mode of 641 (octal) means that the owner can read and write the file, other members of the owner's group
can read it, and users can execute only
II. A mode of 100 (octal) allows the owner to execute the file , but prohibits all other access
Answer key☟
34.48.3 Shell Script: UGC NET CSE | June 2019 | Part 2 | Question: 50 top☝
Which of the following UNIX/Linux pipes will count the number of lines in all the files having .c and .h as their
extension in the current working directory?
Answer key☟
34.48.4 Shell Script: UGC NET CSE | Junet 2015 | Part 2 | Question: 39 top☝
A. It will print all of the lines in the file x that match the search string "abc"
B. It will print all of the lines in file x that do not match the search string "abc"
C. It will print the total number of lines in the file x that match the search string "abc"
D. It will print the specific line numbers of the file x in which there is a match for string "abc"
Answer key☟
34.48.5 Shell Script: UGC NET CSE | Junet 2015 | Part 3 | Question: 75 top☝
ugcnetcse-june2015-paper3 shell-script
Answer key☟
34.48.6 Shell Script: UGC NET CSE | September 2013 | Part 3 | Question: 72 top☝
Which of the following shell scripts will produce the output “my first script”?
Answer key☟
34.48.7 Shell Script: UGC NET CSE | September 2013 | Part 3 | Question: 75 top☝
Which of the following statements is not true for UNIX Operating System?
A. Major strength of UNIX Operating System is its open standards which enables large number of organizations
ranging from academicia to industries to participate in its development
B. UNIX kernel uses modules with well specified interfaces and provides advantages like simplified tesing and
maintenance of kernel.
C. UNIX is kernel based operating system with two main components viz. process management subsystem and
file management subsystem.
D. All devices are represented as files which simplify the management of I/O devices and files. The directories
structure used is directed acyclic graph.
Answer key☟
34.49.1 Sjf: UGC NET CSE | December 2008 | Part 2 | Question: 8 top☝
Four jobs J1, J2, J3 and J4 are waiting to be run. Their expected run times are 9, 6, 3 and 5 respectively. In
order to minimize average response time, the jobs should be run in the order:
(A) J1 J2 J3 J4 (B) J4 J3 J2 J1
(C) J3 J4 J1 J2 (D) J3 J4 J2 J1
Answer key☟
34.50.1 Sstf: UGC NET CSE | June 2019 | Part 2 | Question: 41 top☝
Consider a disk system with cylinders. The requests to access the cylinders occur in the following
sequences:
Assuming that the head is currently at cylinder , what is the time taken to satisfy all requests if it takes ms to
move from the cylinder to adjacent one and the shortest seek time first policy is used?
A. ms B. ms C. ms D. ms
ugcnetcse-june2019-paper2 disk-scheduling sstf
Answer key☟
34.51.1 Storage Devices: UGC NET CSE | December 2014 | Part 3 | Question: 49 top☝
Various storage devices used by an operating system can be arranged as follows in increasing order of
accessing speed :
A. Magnetic tapes magnetic disks optical disks electronic disks main memory cache registers
B. Magnetic tapes magnetic disks electronic disks optical disks main memory cache registers
C. Magnetic tapes electronic disks magnetic disks optical disks main memory cache registers
D. Magnetic tapes optical disks magnetic disks electronic disks main memory cache registers
Answer key☟
34.52 System Call (2) top☝
34.52.1 System Call: UGC NET CSE | November 2017 | Part 3 | Question: 75 top☝
Match the following WINDOWS system calls and UNIX system calls with reference to process control and
File manipulation.
A.
B.
C.
D.
Answer key☟
34.52.2 System Call: UGC NET CSE | October 2020 | Part 2 | Question: 84 top☝
Assuming that the system call never fails, consider the following C program and executed on
a UNIX/Linux system:
Answer key☟
34.53.1 System Reliability: UGC NET CSE | August 2016 | Part 3 | Question: 43 top☝
An Operating System crashes on the average once in 30 days, that is, the Mean Time Between
Failures (MTBF) = 30 days. When this happens, it takes 10 minutes to recover the OS, that is, the Mean
Time To Repair (MTTR) = 10 minutes. The availability of the OS with these reliability figures is approximately :
A. 96.97% B. 97.97% C. 99.009% D. 99.97%
ugcnetcse-aug2016-paper3 operating-system system-reliability
Answer key☟
34.54.1 Threads: UGC NET CSE | December 2012 | Part 3 | Question: 32 top☝
Answer key☟
34.54.2 Threads: UGC NET CSE | December 2013 | Part 3 | Question: 75 top☝
Answer key☟
34.54.3 Threads: UGC NET CSE | January 2017 | Part 3 | Question: 53 top☝
One of the disadvantages of user level threads compared to Kernel level thread is
A. If a user level thread of a process executes a system call, all threads in that process are blocked.
B. Scheduling is application dependent.
C. Thread switching doesn’t require kernel mode privileges.
D. The library procedures invoked for thread management in user level threads are local procedures.
Answer key☟
34.54.4 Threads: UGC NET CSE | June 2019 | Part 2 | Question: 44 top☝
Which of the following are NOT shared by the threads of the same process?
Answer key☟
34.55.1 Transaction And Concurrency: UGC NET CSE | Junet 2015 | Part 2 | Question: 37 top☝
Let and two processes, R be the set of variables read from memory, and W be the set of variables
written to memory. For the concurrent execution of two processes and which of the conditions are not
true?
A. B.
C. D.
ugcnetcse-june2015-paper2 transaction-and-concurrency
Answer key☟
34.56.1 Translation Lookaside Buffer: UGC NET CSE | December 2013 | Part 2 | Question: 47 top☝
The virtual address generated by a CPU is 32 bits. The Translation Look-aside Buffer (TLB) can hold total
64 page table entries and a 4-way set associative (i.e. with 4-cache lines in the set). The page size is 4 KB.
The minimum size of TLB tag is
Answer key☟
34.56.2 Translation Lookaside Buffer: UGC NET CSE | October 2020 | Part 2 | Question: 18 top☝
Consider a single-level page table system, with the page table stored in the memory. If the hit rate to TLB is
, and it takes nanoseconds to search the , and nanoseconds to access the main memory,
then what is the effective memory access time, in nanoseconds?
A. B. C. D.
ugcnetcse-oct2020-paper2 operating-system translation-lookaside-buffer
Answer key☟
34.57.1 Unix: UGC NET CSE | August 2016 | Part 3 | Question: 49 top☝
The Unix Operating System Kernel maintains two key data structures related to processes, the process table
and the user structure. Now, consider the following two statements :
I. The process table is resident all the time and contain information needed for all processes, even those that are
not currently in memory.
II. The user structure is swapped or paged out when its associated process is not in memory, in order not to waste
memory on information that is not needed.
Which of the following options is correct with reference to above statements ?
Answer key☟
34.57.2 Unix: UGC NET CSE | December 2009 | Part 2 | Question: 40 top☝
The Unix command used to find out the number of characters in a file is
(A) nc
(B) wc
(C) chcnt
(D) lc
Answer key☟
34.57.3 Unix: UGC NET CSE | December 2012 | Part 2 | Question: 36 top☝
In UNIX, which of the following command is used to set the task priority?
Answer key☟
34.57.4 Unix: UGC NET CSE | December 2012 | Part 3 | Question: 37 top☝
Everything below the system call interface and above the physical hardware is known as
Answer key☟
34.57.5 Unix: UGC NET CSE | December 2013 | Part 2 | Question: 50 top☝
Answer key☟
34.57.6 Unix: UGC NET CSE | December 2013 | Part 3 | Question: 67 top☝
In Unix, how do you check that two given strings a and b are equal?
Answer key☟
34.57.7 Unix: UGC NET CSE | December 2013 | Part 3 | Question: 73 top☝
Which statement is not true about process O in the Unix operating system ?
Answer key☟
34.57.8 Unix: UGC NET CSE | December 2013 | Part 3 | Question: 74 top☝
Answer key☟
34.57.9 Unix: UGC NET CSE | December 2015 | Part 2 | Question: 30 top☝
In Unix, the login prompt can be changed by changing the contents of the file_____
Answer key☟
34.57.10 Unix: UGC NET CSE | December 2015 | Part 3 | Question: 56 top☝
In Unix, the command to enable execution permission for file "mylife" by all is_____
Answer key☟
34.57.11 Unix: UGC NET CSE | December 2015 | Part 3 | Question: 57 top☝
Answer key☟
34.57.12 Unix: UGC NET CSE | January 2017 | Part 3 | Question: 51 top☝
A. B.
C. D.
ugcnetcse-jan2017-paper3 operating-system unix
Answer key☟
34.57.13 Unix: UGC NET CSE | January 2017 | Part 3 | Question: 54 top☝
Answer key☟
34.57.14 Unix: UGC NET CSE | June 2013 | Part 2 | Question: 50 top☝
Answer key☟
34.57.15 Unix: UGC NET CSE | June 2014 | Part 3 | Question: 37 top☝
__________ maintains the list of free disk blocks in the Unix file system.
Answer key☟
34.57.16 Unix: UGC NET CSE | June 2014 | Part 3 | Question: 46 top☝
A. 1 2 10 B. 1 2 3 4 5 6 7 8 9 10
C. 1 3 5 7 9 D. 1 5 10
ugcnetjune2014iii operating-system unix
Answer key☟
34.57.17 Unix: UGC NET CSE | June 2016 | Part 3 | Question: 49 top☝
In UNIX , processes that have finished execution but have not yet had their status collected are known as
_________
Answer key☟
34.57.18 Unix: UGC NET CSE | June 2016 | Part 3 | Question: 50 top☝
In UNIX OS , when a process creates a new process using the fork() system call , which of the following
state is shared between the parent process and child process
A. Heap B. Stack
C. Shared memory segments D. Both heap and Stack
ugcnetcse-june2016-paper3 operating-system unix
Answer key☟
34.57.19 Unix: UGC NET CSE | June 2016 | Part 3 | Question: 51 top☝
Which of the following information about the UNIX file system is not correct?
A. Super block contains the number of i-nodes, the number of disk blocks, and the start of the list of free disk
blocks
B. An i-node contains accounting information as well as enough information to locate all the disk blocks that holds
the file's data
C. Each i-node is 256-bytes long
D. All the files and directories are stored in data blocks
Answer key☟
34.57.20 Unix: UGC NET CSE | Junet 2015 | Part 2 | Question: 40 top☝
The Unix Kernel maintains two key data structures related to processes, the process table and the user
structure. Which of following information is not the part of user structure?
34.57.21 Unix: UGC NET CSE | Junet 2015 | Part 3 | Question: 54 top☝
Answer key☟
34.57.22 Unix: UGC NET CSE | Junet 2015 | Part 3 | Question: 73 top☝
A. B.
C. D.
ugcnetcse-june2015-paper3 operating-system unix
Answer key☟
34.57.23 Unix: UGC NET CSE | September 2013 | Part 2 | Question: 47 top☝
Assume that an implementation of Unix operating system uses i-nodes to keep track of data blocks
allocated to a file. It supports 12 direct block addresses, one in direct block address and one double indirect
block address. The file system has 256 bytes block size and 2 bytes for disk block address. The maximum possible
size of a file in this system is
A. 16 MB B. 16 KB C. 70 KB D. 71 KB
ugcnetsep2013ii operating-system unix
Answer key☟
34.57.24 Unix: UGC NET CSE | September 2013 | Part 3 | Question: 74 top☝
Answer key☟
34.58.1 Virtual Memory: UGC NET CSE | December 2008 | Part 2 | Question: 42 top☝
If the executing program size is greater than the existing of a computer, it is still possible to execute
the program if the supports :
A. multitasking
B. virtual memory
C. paging system
D. none of the above
Answer key☟
34.58.2 Virtual Memory: UGC NET CSE | December 2013 | Part 3 | Question: 70 top☝
Answer key☟
34.58.3 Virtual Memory: UGC NET CSE | December 2015 | Part 2 | Question: 26 top☝
A virtual memory has a page size of words. There are eight pages and four blocks. The associative
memory page table contains the following entries :
Which of the following list of virtual addresses (in decimal) will not cause any page fault if referenced by the CPU?
A. B.
C. D.
ugcnetcse-dec2015-paper2 operating-system virtual-memory
Answer key☟
34.58.4 Virtual Memory: UGC NET CSE | January 2017 | Part 3 | Question: 2 top☝
Answer key☟
34.58.5 Virtual Memory: UGC NET CSE | June 2014 | Part 2 | Question: 31 top☝
In a paged memory management algorithm, the hit ratio is %. If it takes nanoseconds to search
Translation Look-aside Buffer (TLB) and nanoseconds (ns) to access memory, the effective memory
access time is
A. ns B. ns C. ns D. ns
ugcnetcse-june2014-paper2 operating-system virtual-memory
Answer key☟
34.59.1 Vsam: UGC NET CSE | December 2010 | Part 2 | Question: 36 top☝
Answer key☟
34.60.1 Windows: UGC NET CSE | December 2013 | Part 3 | Question: 68 top☝
In windows 2000 operating system all the processor-dependent code is isolated in a dynamic link library
called
Answer key☟
34.60.2 Windows: UGC NET CSE | December 2014 | Part 3 | Question: 73 top☝
Which of the following versions of Windows O.S. contain built-in partition manager which allows us to shrink
and expand pre-defined drives ?
Answer key☟
34.60.3 Windows: UGC NET CSE | December 2015 | Part 3 | Question: 55 top☝
Answer key☟
34.60.4 Windows: UGC NET CSE | June 2013 | Part 3 | Question: 66 top☝
The versions of windows operating system like Windows XP and Window Vista uses following file system:
A. FAT-16 B. FAT-32
C. NTFS (NT File System) D. All of the above
ugcnetcse-june2013-paper3 operating-system windows
Answer key☟
34.60.5 Windows: UGC NET CSE | September 2013 | Part 3 | Question: 73 top☝
Answer key☟
Answer Keys
34.0.1 Q-Q 34.0.2 Q-Q 34.0.3 Q-Q 34.0.4 C 34.0.5 B
34.0.6 Q-Q 34.0.7 Q-Q 34.0.8 Q-Q 34.0.9 Q-Q 34.0.10 Q-Q
34.0.11 C 34.0.12 Q-Q 34.0.13 Q-Q 34.0.14 Q-Q 34.0.15 Q-Q
34.0.16 Q-Q 34.0.17 Q-Q 34.0.18 Q-Q 34.0.19 Q-Q 34.0.20 C
34.0.21 X 34.0.22 A 34.0.23 A 34.0.24 D 34.0.25 D
34.0.26 X 34.0.27 B 34.0.28 Q-Q 34.0.29 B 34.0.30 A
34.0.31 Q-Q 34.0.32 Q-Q 34.0.33 C 34.0.34 A 34.0.35 A
34.1.1 C 34.2.1 A 34.3.1 B 34.4.1 C 34.5.1 C
34.6.1 Q-Q 34.6.2 Q-Q 34.6.3 B 34.6.4 Q-Q 34.6.5 Q-Q
34.6.6 D 34.6.7 A 34.6.8 Q-Q 34.6.9 A 34.7.1 D
34.8.1 B 34.9.1 C 34.10.1 A 34.11.1 A 34.11.2 B
34.11.3 C 34.11.4 C 34.11.5 B 34.11.6 C 34.11.7 B
34.11.8 A 34.11.9 A 34.11.10 D 34.12.1 B 34.13.1 C
34.13.2 X 34.13.3 D 34.13.4 B 34.13.5 B 34.13.6 C
34.13.7 D 34.13.8 C 34.13.9 B 34.14.1 B 34.15.1 Q-Q
34.16.1 B 34.17.1 Q-Q 34.18.1 Q-Q 34.18.2 C 34.18.3 X
34.18.4 B 34.18.5 B 34.18.6 A 34.18.7 B 34.19.1 Q-Q
34.20.1 Q-Q 34.21.1 B 34.22.1 A 34.22.2 C 34.23.1 Q-Q
34.23.2 C 34.24.1 Q-Q 34.25.1 A 34.26.1 Q-Q 34.26.2 A
34.27.1 Q-Q 34.28.1 Q-Q 34.28.2 Q-Q 34.28.3 Q-Q 34.28.4 X
34.28.5 A 34.28.6 B 34.28.7 C 34.28.8 C 34.29.1 A
34.30.1 A 34.31.1 D 34.32.1 C 34.33.1 Q-Q 34.33.2 Q-Q
34.33.3 C 34.33.4 Q-Q 34.33.5 Q-Q 34.33.6 D 34.33.7 A
34.34.1 C 34.34.2 B 34.34.3 B 34.34.4 D 34.34.5 D
34.35.1 B 34.35.2 Q-Q 34.35.3 C 34.35.4 B 34.35.5 Q-Q
34.35.6 Q-Q 34.35.7 C 34.35.8 C 34.36.1 A 34.37.1 B
34.37.2 B 34.38.1 Q-Q 34.38.2 Q-Q 34.39.1 Q-Q 34.39.2 Q-Q
34.39.3 Q-Q 34.39.4 B 34.39.5 B 34.39.6 D 34.39.7 C
34.39.8 Q-Q 34.39.9 Q-Q 34.39.10 A 34.39.11 D 34.39.12 B
34.39.13 D 34.39.14 B 34.39.15 B 34.39.16 B 34.39.17 B
34.39.18 C 34.39.19 A 34.39.20 A 34.40.1 Q-Q 34.40.2 Q-Q
34.41.1 Q-Q 34.42.1 A 34.42.2 B 34.43.1 Q-Q 34.44.1 Q-Q
34.45.1 Q-Q 34.45.2 Q-Q 34.45.3 B 34.45.4 Q-Q 34.46.1 B
34.47.1 Q-Q 34.47.2 A 34.47.3 D 34.48.1 D 34.48.2 C
34.48.3 D 34.48.4 B 34.48.5 B 34.48.6 C 34.48.7 B
34.49.1 Q-Q 34.50.1 D 34.51.1 D 34.52.1 A 34.52.2 C
34.53.1 D 34.54.1 B 34.54.2 B 34.54.3 A 34.54.4 C
34.55.1 C 34.56.1 C 34.56.2 B 34.57.1 3 34.57.2 Q-Q
34.57.3 B 34.57.4 A 34.57.5 B 34.57.6 C 34.57.7 A
34.57.8 D 34.57.9 C 34.57.10 B 34.57.11 B 34.57.12 B
34.57.13 C 34.57.14 C 34.57.15 C 34.57.16 C 34.57.17 C
34.57.18 C 34.57.19 C 34.57.20 C 34.57.21 D 34.57.22 A
34.57.23 X 34.57.24 C 34.58.1 Q-Q 34.58.2 D 34.58.3 C
34.58.4 B 34.58.5 D 34.59.1 Q-Q 34.60.1 B 34.60.2 A
34.60.3 C 34.60.4 D 34.60.5 D
35 Others: Others (579)
Which of the following permanent database that has an entry for each terminal symbol ?
Answer key☟
The circumference of the two concentric disks are divided into sections each. For the outer disk, of
the sections are painted red and of the sections are painted blue. For the inner disk, the sections are
painted red and blue in an arbitrary manner. It is possible to align the two disks so that
ugcnetcse-june2011-paper2
Answer key☟
A. Authorization B. Authentication
C. Access Control D. None of these
ugcnetcse-june2011-paper2 databases
Answer key☟
Answer key☟
A. 01001101.0100 B. 01001101.0010
C. 10110010.1011 D. 10110010.1101
ugcnetcse-june2011-paper2
Answer key☟
A. Accepts one input and gives several output B. Accepts many inputs and gives many output
C. Accepts many inputs and gives one output D. Accepts one input and gives one output
ugcnetcse-june2011-paper2
Answer key☟
Answer key☟
is equivalent to
A. B.
C. D.
ugcnetcse-june2011-paper2
Answer key☟
A. B. C. D.
ugcnetcse-june2011-paper2
Answer key☟
A. B. C. D.
ugcnetcse-june2011-paper2
Answer key☟
From the point of view of the programmer, what are the major advantages of using a high-level language
rather than internal machine code or assembly language?
Answer key☟
A smart modem can dial, hangup and answer incoming calls automatically. Can you tell who provides the
appropriate instructions to the modem for this purpose ?
Answer key☟
ugcnetcse-aug2016-paper2
Answer key☟
Answer key☟
The program used to determine the round – trip delay between a workstation and a destination adress is :
A flow graph with entry node and exit node is shown below:
A. B. C. D.
ugcnetcse-dec2019-paper2
A flow graph with entry node and exit node is shown below:
How many predicate nodes are there and what are their names?
A. Three: B. Three:
C. Four: D. Four:
ugcnetcse-dec2019-paper2
Answer key☟
An organization needs to maintain database having five attributes . These attributes are
functionally dependent on each other for which functionality dependency set is given as:
. Consider a universal relation with
functional dependency set . Also all attributes are simple and take atomic values only.
MInimal cover of functional dependency set is
A.
B.
C.
D.
ugcnetcse-dec2019-paper2
An organization needs to maintain database having five attributes . These attributes are
functionally dependent on each other for which functionality dependency set is given as:
. Consider a universal relation with
functional dependency set . Also all attributes are simple and take atomic values only.
Identify primary key of table with functional dependency set
A. B. C. D.
ugcnetcse-dec2019-paper2
Answer key☟
An organization needs to maintain database having five attributes . These attributes are
functionally dependent on each other for which functionality dependency set is given as:
. Consider a universal relation with
functional dependency set . Also all attributes are simple and take atomic values only.
Identify the normal form in which relation belong to
A. B. C. D.
ugcnetcse-dec2019-paper2
Answer key☟
35.0.23 UGC NET CSE | December 2019 | Part 2 | Question: 99 top☝
An organization needs to maintain database having five attributes . These attributes are
functionally dependent on each other for which functionality dependency set is given as:
. Consider a universal relation with
functional dependency set . Also all attributes are simple and take atomic values only.
Identify the redundant functional dependency in
A. B.
C. D.
ugcnetcse-dec2019-paper2
35.0.24 UGC NET CSE | December 2019 | Part 2 | Question: 100 top☝
An organization needs to maintain database having five attributes . These attributes are
functionally dependent on each other for which functionality dependency set is given as:
. Consider a universal relation with
functional dependency set . Also all attributes are simple and take atomic values only.
Assume that given table is decomposed in two tables
with functional dependency set and
with set
Which of the following option is true w.r.t. given decomposition?
A flow graph with entry node and exit node is shown below:
A. B. C. D.
ugcnetcse-dec2019-paper2
Answer key☟
Which of the following statements is/are True regarding some advantages that an objectoriented DBMS
(OODBMS) offers over a relational database ?
I. An OODBMS avoids the “impedance mismatch” problem.
II. An OODBMS avoids the “phantom” problem.
III. An OODBMS provides higher performance concurrency control than most relational databases.
IV. An OODBMS provides faster access to individual data objects once they have been read from disk.
Answer key☟
35.0.27 UGC NET CSE | June 2011 | Part 2 | Question: 3 top☝
A. B.
C. D.
ugcnetcse-june2011-paper2
Answer key☟
Which of the following are classroom related factors that influence effectiveness of teaching?
a. Prior task related behavior of students b. Adherence to linear pattern of communication by the teacher
c. Socio-economic status of the family to which learners
d. Inappropriate use of technological resources by the teacher
belong Choose your answer from the following options:
e. Cultural background of students
A. (a), (b) and (c) B. (b), (c) and (d)
C. (a), (b) and (d) D. (c) , (d) and (e)
ugcnetcse-dec2019-paper1
A test contains 100 true/false questions. How many different ways can a student answer the question on the
test, if the answer may be left blank also.
A. B. C. D.
ugcnetcse-june2013-paper2
Answer key☟
When the following code is executed what will be the value of x and y?
int x=1, y=0;
y=x++;
A. 2, 1 B. 2, 2 C. 1, 1 D. 1, 2
ugcnetcse-june2013-paper2
Answer key☟
ugcnetcse-june2013-paper2
Answer key☟
Answer key☟
Answer key☟
Answer key☟
The colour of an object is largely determined by its diffuse reflection coefficient. If , then
what shall be the colour of the object, of the light used is blue and magenta?
A. White and Red B. Red and Blue C. Black and White D. Black and Red
ugcnetcse-june2012-paper3
Answer key☟
Which of the following binary tree is optimal, if probabilities of successful search and unsuccessful search
are same?
D.
B. C.
A.
ugcnetcse-june2012-paper3
Answer key☟
A virtual memory based memory management algorithm partially swaps out a process. This is an example of
Manager’s salary details are to be hidden from Employee table. This Technique is called as
Answer key☟
Answer key☟
Answer key☟
Answer key☟
Answer key☟
Repository of information gathered from multiple sources, storing under unified scheme at a single site is
called
Answer key☟
35.0.44 UGC NET CSE | June 2013 | Part 2 | Question: 29 top☝
A. 17 B. 131 C. 64 D. 52
ugcnetcse-june2013-paper2
Answer key☟
For a B-tree of height h and degree t, the total CPU time used to insert a node is
Answer key☟
A Network Schema
Answer key☟
Given an open address hash table with load factor , the expected number of probes in a successful
search is
A. Atmost In B. Atmost In
C. Atleast In D. Atleast In
ugcnetcse-june2013-paper2
Answer key☟
A. B. C. D.
ugcnetcse-june2013-paper2
Answer key☟
In IPv4 header, the ____ field is needed to allow the destination host to determine which datagram a newly
arrived fragments belongs to
Answer key☟
In hierarchical routing with 4800 routers, what region and cluster sizes should be chosen to minimize the
size of the routing table for the three-layer hierarchy?
In _____ substitution, a character in the plaintext is always changed to the same character in ciphertext,
regardless of its position in the text.
A. polyalphabetic B. monoalphabetic
C. transpositional D. multialphabetic
ugcnetcse-june2013-paper2
Answer key☟
Which of the following addresses is used to deliver a message to the correct application program running on
a host?
Answer key☟
If are domains in a relational model, then the relation is a table, which is a subset of
A. B.
C. D.
ugcnetcse-june2013-paper2
Answer key☟
Which of the learning outcomes are intended in teaching organized at understanding level?
ugcnetcse-dec2019-paper1
In which of the following types of learning materials, the presentations are highly structured and
individualised?
ugcnetcse-dec2019-paper1
A. 1 B. 2 C. 3 D. 0
ugcnetcse-june2013-paper2
Answer key☟
35.0.57 UGC NET CSE | December 2019 | Part 1 | Question: 38 top☝
A. a, b, c, e and f B. b, c , e and f
C. b, c , d, e and f D. a, b, c and f
ugcnetcse-dec2019-paper1
stands for
Answer key☟
The national agency for responding to computer security incidents as and when they occur, is
A. B. C. D.
ugcnetcse-dec2019-paper1
Identify from the options given below, the co-benefit of Montreal Protocol
ugcnetcse-dec2019-paper1
The following table gives the percentage of marks obtained by students in different subjects in an
examination. The numbers in the parenthesis give the maximum marks in each subject. Answer the given
questions based on the table:
In which subject the performance of the students is worst in terms of percentage of marks?
Under Green India Mission, how many hectares of degraded forest land is to be brought under
afforestation?
The most important pollutants that cause degradation of water quality in rivers and streams are
a. Bacteria b. Nutrients
c. Metals d. Total dissolved solids
e. Algae Choose the most appropriate answer from the options
given below:
A. a, b and c B. a, b and d
C. a, b, d and e D. a, b, c, d and e
ugcnetcse-dec2019-paper1
A. a, b and c B. b, c and e
C. c, d and f D. d, e and f
ugcnetcse-dec2019-paper1
According to (General Agreement on Trade and Services), higher education should be a commodity
in the
ugcnetcse-dec2019-paper1
When there is an animated discussion between a teacher and his or her students in the classroom, it can be
classified as
A. petabytes B. megabytes
C. kilobytes D. bytes
ugcnetcse-dec2019-paper1
Answer key☟
The following table gives the percentage of marks obtained by students in different subjects in an
examination. The numbers in the parenthesis give the maximum marks in each subject. Answer the given
questions based on the table:
How many students obtained and above marks in all the subjects?
Answer key☟
The following table gives the percentage of marks obtained by students in different subjects in an
examination. The numbers in the parenthesis give the maximum marks in each subject. Answer the given
questions based on the table:
What was the aggregate of marks obtained by Sanya in all the five subjects?
A. B. C. D.
ugcnetcse-dec2019-paper1
Answer key☟
Which of the following modes of communication can be employed in a classroom for effective teaching?
a. Top-down b. Iconic
c. Associational d. Dissociational
e. Symbolic f. Abstract
Choose the most appropriate option from the following:
Given below are two Statements – One is labelled as Assertion and other is labelled as Reason :
Assertion : Use of slang in formal teaching makes communication lively and interesting.
Reasons : Academic decency demands the avoidance of slang in the classroom environment.
In the light of the above statements, choose the correct option:
ugcnetcse-dec2019-paper1
A. B. C. D.
ugcnetcse-dec2019-paper1
Answer key☟
If of of
and of of ,
then what percentage of is ?
A. B. C. D.
ugcnetcse-dec2019-paper1
35.0.78 UGC NET CSE | December 2019 | Part 1 | Question: 18 top☝
The sum of a number and its inverse is . The sum of their cubes is:
A. B. C. D.
ugcnetcse-dec2019-paper1
Answer key☟
The following table gives the percentage of marks obtained by students in different subjects in an
examination. The numbers in the parenthesis give the maximum marks in each subject. Answer the given
questions based on the table:
What is the average marks obtained by all the six students in Chemistry?
A. B. C. D.
ugcnetcse-dec2019-paper1
Answer key☟
A certain principal invested at compound interest payable yearly amounts to Rs. in years and
Rs. in years. What is the rate of interest?
A. B. C. D.
ugcnetcse-dec2019-paper1
Which one of the following hetwabhasa (fallacy) is involved in the argument, “Sound is element because it is
caused”?
ugcnetcse-dec2019-paper1
_________ is a wireless technology built in electronic gadgets for transferring data over short distance
Answer key☟
35.0.83 UGC NET CSE | December 2019 | Part 1 | Question: 31 top☝
Which one of the following tasks is associated with changing appearance of a document in word
processing?
Which of the following types of assessment is conducted periodically with an eye on standards?
A university teacher plans to improve the study habits of students in his/her class. Which type of research
paradigm will be helpful in this regard?
A researcher intends to make use of in his/her research. What considerations should weigh most in
such a decision?
Which of the following sampling procedures will be appropriate for conducting researches with empirico-
inductive research paradigm?
a. Teaching is a social act while learning is a personal act b. Teaching implies learning
c. Teaching is like selling while learning is like buying d. Teaching can occur without learning taking place
e. In teaching, influence is directed towards learning and
learner, while in learning it is usually towards oneself Choose the correct answer from the following options:
In which of the following formats ‘Chapter Scheme’ of the document has to be formally approved by a
research degree committee in the university?
A flow graph with entry node and exit node is shown below:
A. B. C. D.
ugcnetcse-dec2019-paper2
Answer key☟
The Data Encryption Standard has a function consists of four steps. Which of the following is correct
order of these four steps?
ugcnetcse-dec2019-paper2
A. Only (b) and (a) B. Only (b) C. Only (b) and (c) D. Only (b) and (d)
ugcnetcse-dec2019-paper2
Answer key☟
a. Windows Azure is a cloud-based operating system. b. Google App Engine is an integrated set of online services for
consumers to communicate and share with others.
c. Amazon Cloud Front is a web service for content delivery. Which of the following statements is (are) correct?
Answer key☟
A flow graph with entry node and exit node is shown below:
Answer key☟
Match and :
A.
B.
C.
D.
ugcnetcse-dec2019-paper2
Match the Agile Process models with the task performed during the model:
A.
B.
C.
D.
ugcnetcse-dec2019-paper2
Match with :
Choose the correct option from those given below:
A. B.
C. D.
ugcnetcse-dec2019-paper2
An instruction is stored at location with its address field at location . The address field has the value
. A processor register contains the number . Match the addressing mode given below
with effective address for the given instruction:
A. B.
C. D.
ugcnetcse-dec2019-paper2
Match and :
A. B.
C. D.
ugcnetcse-dec2019-paper2
Answer key☟
35.0.105 UGC NET CSE | December 2019 | Part 2 | Question: 88 top☝
Match with :
A. B.
C. D.
ugcnetcse-dec2019-paper2
Answer key☟
The sequence diagram given in Figure for the Weather Information System takes place when an external system
requests the summarized data from the weather station. The increasing order of lifeline for the objects in the
system are:
ugcnetcse-dec2019-paper2
According to the Standard Quality Model, match the attributes given in with their
definitions in :
Choose the correct options from the ones given below:
A.
B.
C.
D.
ugcnetcse-dec2019-paper2
A. or B. or
C. or D. or
ugcnetcse-dec2019-paper2
Answer key☟
A research scholar while submitting his/her thesis, did not acknowledge in the preface the help and support
of the respondents of questionnaires. This will be called an instance of
A. m B. m C. m(m+1) D. m(m+2)
ugcnetcse-june2013-paper2
Answer key☟
35.0.111 UGC NET CSE | June 2013 | Part 2 | Question: 9 top☝
How many times the word ‘print’ shall be printed by the following program segment?
for (i=1, i 2, i++)
for (j=1, j 2, j++)
for (k=1, k 2, k++)
printf(“print\n”)
A. 1 B. 3 C. 6 D. 8
ugcnetcse-june2013-paper2
Answer key☟
A.
B.
C.
D.
ugcnetcse-june2005-paper2
Answer key☟
A. B. C. D.
ugcnetcse-dec2005-paper2
Answer key☟
35.0.115 UGC NET CSE | December 2005 | Part 2 | Question: 24 top☝
The initial configuration of quaue is . is at the front. To get the configuration how many
deletions and additions required:
Answer key☟
Which traversal techniques lists the nodes of a binary search tree in ascending order?
Answer key☟
Answer key☟
A. B. Veronica C. D.
ugcnetcse-dec2005-paper2
A hash function defined as , with linear probing it is used to insert the key
into a table index from to . What will be the locations of :
A. B. C. D.
ugcnetcse-dec2005-paper2
__________ provide a method to recover data that has been delivered but not get used :
A. Segmentation B. Concatenation
C. Transalation D. Synchronization
ugcnetcse-dec2005-paper2
Answer key☟
ugcnetcse-june2005-paper2
Answer key☟
A. B.
C. D.
ugcnetcse-june2005-paper2
Answer key☟
Consider the relation on the set of non-negative integers defined by if and only if:
A. B.
C. D. None of the above
ugcnetcse-june2005-paper2
Answer key☟
A. B. C. D.
ugcnetcse-june2005-paper2
Answer key☟
Minimum number of individual shoes to be picked up from a dark room ( containing pair of shoes) if we
have to get atleast one proper pair :
A. B. C. D. None of these
ugcnetcse-june2005-paper2
Answer key☟
, then is equal to :
A. B. C. D.
ugcnetcse-june2005-paper2
Answer key☟
Encryption and decryption are the functions of the _________ layer of model :
Answer key☟
35.0.129 UGC NET CSE | June 2005 | Part 2 | Question: 7 top☝
A. B. C. D.
ugcnetcse-june2005-paper2
Answer key☟
In what tree, for every node the height of its left subtree and right subtree differ at least by one:
A. B. C. D.
ugcnetcse-dec2005-paper2
Answer key☟
A. { } B. { } C. { } D. None of these
ugcnetcse-dec2005-paper2
Answer key☟
A. B. C. D.
ugcnetcse-dec2005-paper2
Answer key☟
Answer key☟
Answer key☟
Answer key☟
A. accessed by only one user B. modified by users with the correct password
C. is used to hide sensitive information D. both and
ugcnetcse-dec2005-paper2
A. B. C. D.
ugcnetcse-dec2004-paper2
Answer key☟
Unix command to change the case of first three lines of file “shortlist” from lower to upper
A. ¦
B. ¦
C.
D.
ugcnetcse-jan2017-paper3 non-gate
Answer key☟
Answer key☟
A. B.
C. D.
ugcnetjan2017ii non-gate
Answer key☟
A. B.
C. D.
ugcnetjan2017ii
Answer key☟
Which of the following statements is/are true w.r.t. Enterprise Resource Planning (ERP)?
A. Multilayer perception
B. Self organizing feature map
C. Hopfield network
A. (A) only
B. (B) only
C. (A) and (B) only
D. (A) and (C) only
ugcnetcse-jan2017-paper3 non-gate
Answer key☟
At which of the following stage(s), the degeneracy do not occur in transportation problem?
( represents number of sources and destinations respectively)
A. (a), (b) and (c) B. (a),(c) and (d) C. (a) and (d) D. (a),(b),(c) and (d)
ugcnetcse-jan2017-paper3
Answer key☟
Another name of is :
If denotes the set of integers modulo , then the following are fields with respect to the operations of
addition modulo and multiplication modulo :
i.
ii.
iii.
iv.
A. B. C. D.
ugcnetcse-dec2004-paper2
Answer key☟
Answer key☟
ugcnetcse-dec2004-paper2
Answer key☟
A. Kerning B. x-height
C. intercap D. serif
ugcnetcse-june2009-paper2
Answer key☟
ugcnetcse-jan2017-paper3 non-gate
Answer key☟
A. B.
C. D.
ugcnetcse-jan2017-paper3 non-gate
Answer key☟
35.0.156 UGC NET CSE | January 2017 | Part 3 | Question: 57 top☝
Answer key☟
Answer key☟
which one of the following is not a word in the dictionary created by LZ-coding (the initial words are a,b)?
A. B. C. D.
ugcnetcse-jan2017-paper3
Answer key☟
With respect to a loop in the transportation table, which one of following is not correct?
ugcnetcse-jan2017-paper3
Answer key☟
A segment is any object described by GKS commands and data that start with CREATE SEGMENT and
Terminates with CLOSE SEGMENT command. What functions can be performed on these segments?
Answer key☟
A. B. C. D.
ugcnetcse-june2005-paper2
The present form of Inter University Board that was previously established for promoting cooperation and
coordination among Universities is
A. UGC B. AIU C. NUEPA D. ICSSR
ugcnetcse-june2019-paper1
Answer key☟
ugcnetcse-june2009-paper2
A neuron with inputs has the weight vector and a bias . If the input vector is
. Then the total input to the neuron is:
A. B. C. D.
ugcnetcse-jan2017-paper3
Answer key☟
Answer key☟
When an inventor is placed between both inputs of an flip flop, the resulting flip flop is :
Answer key☟
A. B.
C. D.
ugcnetcse-june2013-paper2
Answer key☟
35.0.168 UGC NET CSE | June 2005 | Part 2 | Question: 26 top☝
1. Ethernet
2.
3. Frame Relay
4. -base
5. Token ring
A. B. C. D.
ugcnetcse-june2005-paper2
Answer key☟
Answer key☟
Which of the following tools is not required during system analysis phase of system development Life cycle ?
Answer key☟
A black hole in a is a :
A. A data store with no in bound flows B. A data store with only in bound flows
C. A data store with more than one in bound flow D. None of these
ugcnetcse-june2005-paper2
A. B. C. D.
ugcnetcse-june2005-paper2
Answer key☟
Which protocol is used to encapsulate a data pocket created of a higher model layer ?
A. B. C. D.
ugcnetcse-june2005-paper2
35.0.175 UGC NET CSE | June 2005 | Part 2 | Question: 20 top☝
Answer key☟
In the balanced binary tree given below, how many nodes will become unbalanced when a node is inserted
as a child of the node “ ” ?
A. B. C. D.
ugcnetcse-june2005-paper2
Answer key☟
A. B.
C. D.
ugcnetcse-june2005-paper2
Answer key☟
The algorithm that will efficiently sort an array that is nearly sorted except for the interchange of some
adjacent pairs of numbers like is :
Answer key☟
Which type of Bridge would be used to connect an Ethernet Segment with a token ring Segment ?
Answer key☟
Which type of links are used for a connection between two devices ?
A. B. Frame Relay C. D. Modem
ugcnetcse-june2005-paper2
What is the time required to insert an element in a stack with linked implementation?
A. B. C. D.
ugcnetcse-june2005-paper2
Answer key☟
A.
B.
C.
D.
ugcnetcse-dec2005-paper2
Answer key☟
A. Diagnolization B. Communitivity
C. Mathematical Induction D. Matrix Manipulation
ugcnetcse-dec2013-paper2
Answer key☟
Find the number of ways to paint 12 offices so that 3 of them will be green, 2 of them pink, 2 of them yellow
and the rest ones white.
Answer key☟
Which is the protocol for performing RPCs between applications in a language and system independent
way?
ugcnetcse-dec2013-paper3
Answer key☟
35.0.188 UGC NET CSE | December 2014 | Part 3 | Question: 21 top☝
ugcnetcse-dec2014-paper3
Answer key☟
Answer key☟
A. B.
C. D.
ugcnetcse-dec2013-paper3
Answer key☟
In alpha-beta pruning, _____ is used to cut off the search at maximizing level only and ____ is used to cut
off the search at maximizing level only.
Answer key☟
A. Sort, taking the input from “temp”, prints 20 lines from temp and delete the file temp
B. Sort eh file “temp”, removes 30 lines from temp and delete the file temp
C. Sort, taking the input from “in” and writing the output to “temp”, then prints 30 lines from temp on terminal.
Finally “temp” is removed
D. Sort, taking the input from “temp”, and then prints 30 lines from “temp” on terminal. Finally “temp” is removed.
ugcnetcse-june2013-paper2
Answer key☟
Answer key☟
What is the correct subnet mask to use for a class- address to support Networks and also have the
most hosts possible ?
A. B.
C. D.
ugcnetcse-june2005-paper2
Answer key☟
Answer key☟
A. B. C. D.
ugcnetcse-dec2005-paper2
Answer key☟
A schema describes :
A. B.
C. Stuctured Programing D. None of the above
ugcnetcse-dec2005-paper2
Answer key☟
A. B. C. D.
ugcnetcse-dec2005-paper2
Answer key☟
The frequency reuse plan is divided into cell grouping using how many cells, where the number of cells
equals ?
A. B. C. D.
ugcnetcse-june2005-paper2
A. B. C. D.
ugcnetcse-june2005-paper2
A. Exclusive- B. C. Exclusive- D.
ugcnetcse-june2005-paper2
Answer key☟
Which activity is not included in the first pass of two pass assemblers?
A. B. C. D.
ugcnetcse-june2005-paper2
Answer key☟
Answer key☟
Answer key☟
A. Lexical analysis is breaking the input into tokens B. Syntax analysis is for parsing the phrase
C. Syntax analysis is for analyzing the semantic D. None of these
ugcnetcse-june2005-paper2
Answer key☟
Answer key☟
A. Whoami B. wc C. Is D. put
ugcnetcse-june2005-paper2
Answer key☟
Correct matching is :
ugcnetcse-june2005-paper2
I. Requirement analysis
II. Coding
III. Design
IV. Testing
Answer key☟
A. B. C. D.
ugcnetcse-dec2019-paper1
Which one of the following fallacious hetu (middle term) is not uniformly concomitant with the major term?
A. Asatpratipaksa B. Auyatireki
C. Anyonya-Asiddha D. Suy bhic ra
ugcnetcse-dec2019-paper1
A. B. C. D.
ugcnetcse-dec2005-paper2
Answer key☟
A. Category B. Classification
C. Combination D. Partial participation
ugcnetcse-june2006-paper2
In the balanced binary tree given below, how many nodes will become unbalanced when a node is inserted
as a child of the node .
A. B. C. D.
ugcnetcse-june2006-paper2
A. * B. * C. * D. *
ugcnetcse-june2006-paper2
Answer key☟
Answer key☟
How much bandwidth is required to send voice- grade channels by on an international satellite
system?
A. B. C. D.
ugcnetcse-june2006-paper2
What is the difference between the Ethernet frame preamble field and the preamble and start
of frame Delimiter fields?
Answer key☟
35.0.234 UGC NET CSE | June 2006 | Part 2 | Question: 29 top☝
Answer key☟
Answer key☟
define max is a macro definition, which can find the maximum of two numbers
and if:
A. and are both integers only B. and are both declared as float only
C. and are both declared as double only D. and are both integers, float or double
ugcnetcse-june2006-paper2
ugcnetcse-june2006-paper2
A. B. C. D.
ugcnetcse-dec2005-paper2
Answer key☟
Answer key☟
The mechanism with which several uses can share a medium without interference is :
Answer key☟
A. B. C. D.
ugcnetcse-june2006-paper2
Answer key☟
For a complete graph with vertices, the total number of spanning trees is given by:
A. B. C. D.
ugcnetcse-june2006-paper2
Answer key☟
while(num>=0)
ugcnetcse-june2006-paper2
A. B.
C. D.
ugcnetcse-june2006-paper2
35.0.247 UGC NET CSE | June 2006 | Part 2 | Question: 6 top☝
A. B. C. D.
ugcnetcse-june2006-paper2
Which of the following expression removes static hazard from a two level gate implementation of
A. B. C. D.
ugcnetcse-june2006-paper2
A. B. C. D.
ugcnetcse-june2006-paper2
A. B. C. D.
ugcnetcse-june2006-paper2
Answer key☟
A. B. C. D.
ugcnetcse-june2006-paper2
Answer key☟
A. B. C. D.
ugcnetcse-june2006-paper2
A. injective B. surjective
C. both injective and surjective D. neither injective nor surjective
ugcnetcse-june2006-paper2
Answer key☟
Which data management language component enabled the DBA to define the schema components?
A. Database reads more than writes B. Writes are more than reads
C. It does not matter as it is good in both the situations D. There are only writes
ugcnetcse-june2006-paper2
ugcnetcse-dec2006-paper2
The action of passing the source program into the proper syntactic class is known as:
Answer key☟
35.0.259 UGC NET CSE | December 2005 | Part 2 | Question: 34 top☝
Answer key☟
Which activities is not included in the first pass of two pass assembler?
Answer key☟
If you want to execute more than one program at a time, the systems software that are used must be
capable of :
Answer key☟
Which of the following checks cannot be carried out on the input data to a system?
Answer key☟
Answer key☟
Answer key☟
35.0.266 UGC NET CSE | December 2005 | Part 2 | Question: 41 top☝
Answer key☟
Answer key☟
Answer key☟
Answer key☟
A. B. C. D.
ugcnetcse-june2006-paper2
Answer key☟
Answer key☟
A. B. C. D. None of these
ugcnetcse-june2006-paper2
Answer key☟
According to classical Indian school of logic, what is the correct sequence of steps involved in Anum na
(influence)?
ugcnetcse-dec2019-paper1
A. Check the validity of a source string B. Determine the syntactic structure of a source string
C. Both A and B D. None of these
ugcnetcse-june2006-paper2
A. Segmentation B. Swapping
C. Demand paging D. Multiple contiguous fixed partitions
ugcnetcse-june2006-paper2
Answer key☟
(Multimedia Messaging Service) uses ______ types of messages to perform messaging transactions.
A. B. C. D.
ugcnetcse-june2006-paper2
Answer key☟
Answer key☟
A. B. C. D.
ugcnetcse-june2006-paper2
A. B. C. D. n*
ugcnetcse-june2006-paper2
Answer key☟
Downflow is the process associated with _____ and back up of data in a warehouse.
A page fault_____.
ugcnetcse-june2006-paper2
Answer key☟
In processor management, round robin method essentially uses the preemptive version of_____.
Answer key☟
ugcnetcse-june2006-paper2
Answer key☟
A. B. C. D.
ugcnetcse-june2007-paper2
Answer key☟
Which algorithm has some average, worst case and best case time:
Which technical concept sets cellular apart from all preceding mobile/ratio systems?
A. -Transmission B. Duplex Functionality
C. Frequency Reuse D. Technology
ugcnetcse-june2007-paper2
A. Localities B. C. D.
ugcnetcse-june2007-paper2
Answer key☟
A. B. C. D.
ugcnetcse-june2007-paper2
Answer key☟
A. B. C. D.
ugcnetcse-june2007-paper2
A. B.
C. D.
ugcnetcse-dec2006-paper2
35.0.302 UGC NET CSE | December 2006 | Part 2 | Question: 8 top☝
ugcnetcse-dec2006-paper2
A. B. C. D.
ugcnetcse-dec2006-paper2
ugcnetcse-dec2006-paper2
A. B. C. D.
ugcnetcse-dec2006-paper2
A. B. A−B=A ∩ ~ B C. D.
ugcnetcse-dec2006-paper2
Answer key☟
Answer key☟
1. Windowing
2. Routing
3.
4. Buffering
A. B. C. D.
ugcnetcse-june2007-paper2
Answer key☟
is _____.
1. Quality of service
2. Routing
3. Addressing
4. Connection-oriented delivery
5. Framming bits
A. B. C. D.
ugcnetcse-june2007-paper2
Answer key☟
A. B. Spanning tree
C. D. Fragment free switching
ugcnetcse-june2007-paper2
Answer key☟
Which of the following combination is preferred with respect to cohesion and coupling:
A. low and low B. low and high C. high and low D. high and high
ugcnetcse-june2007-paper2
Answer key☟
Answer key☟
Answer key☟
Part of a program where the shared memory is accessed and which should be executed indivisibly, is called:
A. Semaphores B. Directory
C. Critical section D. Mutual exclusion
ugcnetcse-june2007-paper2
Answer key☟
35.0.322 UGC NET CSE | June 2007 | Part 2 | Question: 38 top☝
Answer key☟
A. B. C. D.
ugcnetcse-june2007-paper2
Answer key☟
Answer key☟
A. B. C. D. None of these
ugcnetcse-june2007-paper2
A. B. C. D.
ugcnetcse-june2007-paper2
Answer key☟
A. { } B. { }
C. { } D. { }
ugcnetcse-june2007-paper2
Answer key☟
If then:
A. B.
C. D.
ugcnetcse-june2007-paper2
Answer key☟
What is the maximum counting speed of a -bit binary counter which is composed of Flip-Flop with a
propagation delay of ?
A. B. C. D.
ugcnetcse-june2007-paper2
Answer key☟
Answer key☟
In case of right shift bitwise operator in language, after shifting bits, the leftmost bits:
A. are always filled with zeros B. are always filled with ones
C. are filled with zeros or ones and is machine dependent D. none of the above
ugcnetcse-june2007-paper2
Answer key☟
’s complement of is:
A. B. C. D.
ugcnetcse-june2007-paper2
Answer key☟
Answer key☟
ugcnetcse-june2007-paper2
Answer key☟
35.0.335 UGC NET CSE | June 2007 | Part 2 | Question: 17 top☝
Answer key☟
A. Category B. Classification
C. Combination D. Partial Participation
ugcnetcse-june2007-paper2
Answer key☟
A. B. C. D. None of these
ugcnetcse-june2007-paper2
Answer key☟
ugcnetcse-june2007-paper2
The time required to find the shortest path in a graph with vertices and edges is:
A. B. C. D.
ugcnetcse-june2007-paper2
Answer key☟
ugcnetcse-june2007-paper2
Answer key☟
ugcnetcse-dec2006-paper2
A. always the error code B. the list of mistakes done by the user displayed
C. a non-judgmental approach D. the past records of the occurrence of the same mistake
ugcnetcse-dec2007-paper2
A. B. C. D.
ugcnetcse-dec2007-paper2
Answer key☟
A. B.
C. D. None of the above
ugcnetcse-june2007-paper2
Consider a typical mobile communication system. If frequencies are available, how many can be used
in a given cell ?
A. B. C. D.
ugcnetcse-dec2007-paper2
With reference to implementation of different association mining algorithms, identify the correct statement :
A. The FP growth method was usually better than the best implementation of the apriori algorithm
B. Apriori algorithm is usually better than CHARM
C. Apriori algorithm is good when the support required is low
D. At very low support the number of frequent items becomes less
ugcnetcse-dec2007-paper2
Given a parallel algorithm with computation time , if parallel algorithm performs computational
operation, then processors can execute algorithm in time given by :
A. B. C. D.
ugcnetcse-dec2007-paper2
ugcnetcse-dec2007-paper2
ugcnetcse-june2007-paper2
Answer key☟
ugcnetcse-dec2007-paper2
Amongst the logic families and , the family with the least power dissipation is :
A. B. C. D.
ugcnetcse-dec2007-paper2
Answer key☟
A. B. C. D.
ugcnetcse-dec2007-paper2
Answer key☟
A. B. ~ C. ~ ~ D. ~
ugcnetcse-dec2007-paper2
Answer key☟
Answer key☟
Answer key☟
The time complexity to multiply two polynomials of degree using Fast Fourier transform method is:
A. B. C. D.
ugcnetcse-dec2019-paper2
Answer key☟
A. B.
C. D.
Where denotes Belief of event .
ugcnetcse-dec2019-paper2
Answer key☟
A. B. C. D.
ugcnetcse-dec2019-paper2
Answer key☟
ugcnetcse-dec2019-paper2
Answer key☟
Let represents weight between node at layer and node at layer of a given multilayer
perceptron. The weight updation using gradient descent method is given by
A.
B.
C.
D.
Where and represents learning rate and Error in the output respectively.
ugcnetcse-dec2019-paper2
A fuzzy conjuction operators, , and a fuzzy disjunction operator, , form a pair if they satisfy:
.
If then is given by
A. B. C. D.
ugcnetcse-dec2019-paper2
Answer key☟
Here and represent MIN and MAX nodes respectively, The value of the root node of the game tree is:
A. B. C. D.
ugcnetcse-dec2019-paper2
Answer key☟
In a B-Tree, each node represents a disk block. Suppose one block holds bytes. Each key uses
bytes. In a B-tree of order there are keys. Since each branch is on another disk block, we
assume a branch is of bytes. The total memory requirement for a non-leaf node is
A. B.
C. D.
ugcnetcse-dec2019-paper2
Answer key☟
A. (a) and (b) B. (b) and (c) C. (a) and (d) D. (c) and (d)
ugcnetcse-dec2019-paper2
Answer key☟
A. If then and
B. If then or
C. Each pair of vertices in is connected by an edge
D. All pairs of vertices in are not connected by an edge
ugcnetcse-dec2019-paper2
Two concurrent executing transactions and are allowed to update same stock item say in an
uncontrolled manner. In such scenario, following problems may occur:
A. B. C. D.
ugcnetcse-dec2019-paper2
Answer key☟
A. B. C. D.
ugcnetcse-dec2019-paper2
Answer key☟
The following program is stored in the memory unit of the basic computer. Give the content of accumulator
register in hexadecimal after the execution of the program.
A. B. C. D.
ugcnetcse-dec2019-paper2
A. B. C. D.
ugcnetcse-dec2019-paper2
Answer key☟
A micro instruction format has microoperation field which is divided into sunbfields and , each
having distinct microoperations, condition field for four status bits, branch field having four
options used in conjunction with address field . The address space is of memory words. The size of micro
instruction is:
A. B. C. D.
ugcnetcse-dec2019-paper2
Answer key☟
A computer uses a memory unit of words of bits each. A binary instruction code is stored in one
word of the memory. The instruction has four parts: an addressing mode field to specify one of the two-
addressing mode (direct and indirect), an operation code, a register code part to specify one of the registers
and an address part. How many bits are there in addressing mode part, opcode part, register code part and the
address part?
A. B. C. D.
ugcnetcse-dec2019-paper2
Answer key☟
Answer key☟
35.0.383 UGC NET CSE | December 2019 | Part 2 | Question: 67 top☝
A. Only (a) and (b) B. Only (a) and (c) C. only (b) and (c) D. (a), (b) and (c)
ugcnetcse-dec2019-paper2
Which of the following binary codes for decimal digits are self complementing?
A. code B. code C. excess- code D. excess- gray code Choose the correct
option:
A. (a) and (b) B. (b) and (c) C. (c) and (d) D. (d) and (a)
ugcnetcse-dec2019-paper2
Answer key☟
Let be the set of all people. Let be a binary relation on such that is in if is a brother of . Is
symmetric transitive, an equivalence relation, a partial order relation?
A. B.
C. D.
ugcnetcse-dec2019-paper2
Answer key☟
A network with bandwidth of can pass only an average of frames per minute with each
frame carrying an average of bits. What is the throughput of this network?
A. B.
C. D.
ugcnetcse-dec2019-paper2
Answer key☟
A.
B.
C.
D.
ugcnetcse-dec2019-paper2
Answer key☟
Answer key☟
A. B.
C. D.
ugcnetcse-dec2019-paper2
Answer key☟
Answer key☟
When using Dijkstra’s algorithm to find shortest path in a graph, which of the following statement is not true?
A. It can find shortest path within the same graph data structure
B. Every time a new node is visited, we choose the node with smallest known distance/ cost (weight) to visit first
C. Shortest path always passes through least number of vertices
D. The graph needs to have a non-negative weight on every edge
ugcnetcse-dec2019-paper2
Answer key☟
Consider a weighted directed graph. The current shortest distance from source to node is represented
by . Let , , . What is the updated value of based on current
information?
A. B. C. D.
ugcnetcse-dec2019-paper2
Answer key☟
35.0.393 UGC NET CSE | December 2019 | Part 2 | Question: 49 top☝
Let be any context-free grammar without any -productions or unit productions. Let be
the maximum number of symbols on the right of any production in . The maximum number of production
rules for any equivalent grammar in Chomsky normal form is given by:
A. B.
C. D.
Where denotes the cardinality of the set.
ugcnetcse-dec2019-paper2
Answer key☟
Give asymptotic upper and lower bound for given below. Assume is constant for .
A.
B.
C.
D.
ugcnetcse-dec2019-paper2
Answer key☟
Consider a subnet with routers. If a three-level hierarchy is chosen, with eight clusters, each containing
regions of routers, then total number of entries in hierarchical table of each router is
A. B. C. D.
ugcnetcse-dec2019-paper2
Answer key☟
What is the worst case running time of Insert and Extract-min, in an implementation of a priority queue using
an unsorted array? Assume that all the insertions can be accomodated.
A. B.
C. D.
ugcnetcse-dec2019-paper2
Answer key☟
Consider the following statements with respect to approaches to fill area on raster systems:
: To determine the overlap intervals for scan lines that cross the area
: To start from a given interior position and pain outward from this point until we encounter the specified boundary
conditions.
Select the correct answer from the options given below:
A.
B.
C.
D.
ugcnetcse-dec2019-paper2
Answer key☟
Answer key☟
Answer key☟
Answer key☟
A. B.
C. D.
ugcnetcse-dec2019-paper2
Answer key☟
A. is a tree
B. contains no cycles
C. Every pairs of vertices in is connected by exactly one path
D. All of these
ugcnetcse-dec2005-paper2
Answer key☟
Let the population of chromosomes in genetic algorithm is represented in terms of binary number. The
strength of fitness of a chromosome in decimal form, , is given by
where
A. B. C. D.
ugcnetcse-dec2019-paper2
a. Overloading gives the capability to an existing operatorb.to Inheritance in object oriented programming provides support
operate on other data types to reusability
c. When object of a derived class is defined, first the d. Overloading is a type of polymorphism
constructor of derived class is excecuted then constructor of Choose the correct option from those given below:
a base class is executed
A. (a) and (b) only B. (a), (b) and (c) only
C. (a), (b) and (d) only D. (b), (c) and (d) only
ugcnetcse-dec2019-paper2
Answer key☟
Which tag is used to enclose any number of javascript statements in HTML document?
A. <code> B. <script>
C. <title> D. <body>
ugcnetcse-dec2019-paper2
Answer key☟
A tree has vertices of degree , vertices of degree , vertices of degree . Determine the number of
vertices and edges in tree.
A. B. C. D.
ugcnetcse-dec2019-paper2
Answer key☟
What are the greatest lower bound and the least upper bound of the sets
and if they exist in poset ?
A.
B.
C.
D.
ugcnetcse-dec2019-paper2
Answer key☟
35.0.411 UGC NET CSE | December 2019 | Part 2 | Question: 24 top☝
A counting semaphore is initialized to . wait ( ) operations and signal ( ) operations are applied. Find
the current value of semaphore variable.
A. B. C. D.
ugcnetcse-dec2019-paper2
Answer key☟
Which of the following methods are used to pass any number of parameters to the operating system through
system calls?
Answer key☟
Find average turnaround time and average waiting time using round robin scheduling?
A. B. C. D.
ugcnetcse-dec2019-paper2
Answer key☟
Which of the following interprocess communication model is used to exchange messages among co-
operative processes?
Answer key☟
The Register or main memory location which contains the effective address of the operand is known as:
Answer key☟
Answer key☟
Given two tables and with and number of tuples respectively. Find maximum
number of tuples in the output of natural join between tables and i.e. ? ( - Natural Join)
A. B. C. D.
ugcnetcse-dec2019-paper2
Answer key☟
In a system for a restaurant, the main scenario for placing order is given below:
f. Bill is prepared for this Customer is given theh.billCustomer pays the bill A sequence diagram for the scenario will
g.order
have at least how many objects among
whom the messages will be exchanged
A. B. C. D.
ugcnetcse-dec2019-paper2
Answer key☟
Which of the component module of does rearrangement and possible ordering of operations,
eliminate redundancy in query and use efficient algorithms and indexes during the execution of a query?
Answer key☟
If we want to resize a pixels image to one that is pixels wide with the same aspect ratio,
what would be the height of the resized image?
Answer key☟
35.0.423 UGC NET CSE | December 2019 | Part 2 | Question: 72 top☝
A. (a) and (b) B. (b) and (c) C. (b) and (d) D. (a) and (d)
ugcnetcse-dec2019-paper2
Answer key☟
a. A process switches from Running state to Ready state b. A process switches from Waiting state to Ready state
c. A process completes its execution d. A process switches from Ready to Waiting state
Choose the correct option:
Answer key☟
Rashtriya Uchhatar Shiksha Abhiyan aims to achieve the following in Higher Education System:
a. Equity b. Access
c. d. Excellence
Choose the correct option from those given below:
A. a, b and c B. a, c and d
C. a, b and d D. b, c and d
ugcnetcse-dec2019-paper1
What is the exact equivalent discount of three successive discounts of , and by sale of an
article?
A. B. C. D.
ugcnetcse-dec2019-paper1
The following table gives the percentage of marks obtained by students in different subjects in an
examination. The numbers in the parenthesis give the maximum marks in each subject. Answer the given
questions based on the table:
A. B. C. D.
ugcnetcse-dec2019-paper1
Answer key☟
Java Virtual Machine is used to execute architectural neutral byte code. Which of the following is
needed by the for execution of Java Code?
Answer key☟
Consider a paging system where translation look aside buffer ( ) a special type of associative memory is
used with hit ratio of .
Assume that memory reference takes nanoseconds and reference time to is nanoseconds. What will
be the effective memory access time given hit ratio?
A. nanoseconds B. nanoseconds
C. nanoseconds D. nanoseconds
ugcnetcse-dec2019-paper2
Answer key☟
An _______ chart is a project schedule representation that presents project plan as a directed graph. The
critical path is the __________ sequence of ________ tasks and it defines project ________.
Answer key☟
A. B. C. D.
ugcnetcse-dec2019-paper2
Answer key☟
A. B.
C. D.
ugcnetcse-dec2019-paper2
Answer key☟
35.0.433 UGC NET CSE | December 2019 | Part 2 | Question: 1 top☝
A. , independent B. , independent
C. , appropriate D. , independent
ugcnetcse-dec2019-paper2
Answer key☟
Let be the base class in and be the derived class from with protected inheritance. Which of the
following statement is false for class ?
ugcnetcse-dec2019-paper2
Answer key☟
A rectangle is bound by the lines and . The line segment joining and
, if clipped against this window will connect the points __________.
Answer key☟
Piconet is a basic unit of a bluetooth system consisting of __________ master node and up to _________
active slave nodes.
Answer key☟
Suppose a system has magnetic tape drives and at time , three processes are allotted tape drives out
of their need as given below:
At time , the system is in safe state. Which of the following is safe sequence so that deadlock is avoided?
A.
B.
C.
D.
ugcnetcse-dec2019-paper2
35.0.438 UGC NET CSE | December 2004 | Part 2 | Question: 48 top☝
Answer key☟
35.1.1 Acid Properties: UGC NET CSE | December 2009 | Part 2 | Question: 45 top☝
The name of the transaction file shall be provided by the operator and the file that contains the edited
transactions ready for execution shall be called
(D) Edit.Exe
35.2.1 Artificial Intelligence: UGC NET CSE | August 2016 | Part 3 | Question: 71 top☝
Match each Artificial Intelligence term in List-I that best describes a given situation in List-II :
A. B.
C. D.
ugcnetcse-aug2016-paper3 artificial-intelligence
Answer key☟
35.3.1 Assembly: UGC NET CSE | June 2011 | Part 2 | Question: 34 top☝
Answer key☟
A. B. C. D.
ugcnetcse-jan2017-paper3 binary-codes
Answer key☟
35.5.1 Binary Tree: UGC NET CSE | June 2011 | Part 2 | Question: 22 top☝
Given a binary tree whose inorder and preorder traversal are given by
Inorder : EICFBGDJHK
Preorder : BCEIFDGHJK
The post order traversal of the above binary tree is
A. I E F C G J K H D B B. I E F C J G K H D B
C. I E F C G K J H D B D. I E F C G J K D B H
ugcnetcse-june2011-paper2 algorithms binary-tree
Answer key☟
35.6.1 Boolean Algebra: UGC NET CSE | December 2019 | Part 2 | Question: 3 top☝
A. B. C. D. and
ugcnetcse-dec2019-paper2 digital-logic boolean-algebra
Answer key☟
35.7.1 Compilation Phases: UGC NET CSE | December 2010 | Part 2 | Question: 33 top☝
Answer key☟
35.8.1 Crypt Arithmetic: UGC NET CSE | September 2013 | Part 3 | Question: 3 top☝
Assume that each alphabet can have a value between 0 to 9 in a cryptoarithmetic problem
Answer key☟
35.9.1 Data Compression: UGC NET CSE | Junet 2015 | Part 3 | Question: 65 top☝
Answer key☟
35.10.1 Data Flow Diagram: UGC NET CSE | June 2011 | Part 2 | Question: 43 top☝
35.11.1 Data Mart: UGC NET CSE | December 2010 | Part 2 | Question: 46 top☝
Answer key☟
35.12.1 Data Mining: UGC NET CSE | August 2016 | Part 2 | Question: 48 top☝
Answer key☟
35.12.2 Data Mining: UGC NET CSE | August 2016 | Part 2 | Question: 50 top☝
Answer key☟
35.12.3 Data Mining: UGC NET CSE | December 2010 | Part 2 | Question: 47 top☝
Data mining is
A. The process of extracting valid, previously unknown, comprehensible and actionable information from large
databases and using it to make crucial business decisions.
B. A tool that allows end users direct access and manipulation of data from within datawarehousing environment
without the intervention of customised programming activity.
C. A tool that helps end users extract useful business information from large database.
D. All of the above
Answer key☟
35.12.4 Data Mining: UGC NET CSE | December 2011 | Part 2 | Question: 47 top☝
Answer key☟
35.13.1 Data Warehousing: UGC NET CSE | August 2016 | Part 2 | Question: 47 top☝
_______ is subject oriented, integrated, time variant, nonvolatile collection of data in support of management
decisions.
Answer key☟
35.13.2 Data Warehousing: UGC NET CSE | June 2011 | Part 2 | Question: 46 top☝
Answer key☟
35.14.1 Decomposition: UGC NET CSE | June 2011 | Part 2 | Question: 20 top☝
A. Redundancy B. Inconsistencies
C. Anomalies D. All of the above
ugcnetcse-june2011-paper2 databases decomposition
Answer key☟
35.15.1 Digital Image Processing: UGC NET CSE | August 2016 | Part 3 | Question: 60 top☝
If the histogram of an image is clustered towards origin on X-axis of a histogram plot then it indicates that the
image is ______.
Answer key☟
35.15.2 Digital Image Processing: UGC NET CSE | December 2013 | Part 3 | Question: 31 top☝
Answer key☟
35.15.3 Digital Image Processing: UGC NET CSE | June 2012 | Part 3 | Question: 22 top☝
Answer key☟
35.16.1 Disk: UGC NET CSE | June 2011 | Part 2 | Question: 36 top☝
Answer key☟
35.17.1 Disk Scheduling: UGC NET CSE | June 2011 | Part 2 | Question: 23 top☝
A. B. C. D. None of these
ugcnetcse-june2011-paper2 operating-system disk-scheduling
Answer key☟
35.18.1 Duality: UGC NET CSE | August 2016 | Part 3 | Question: 62 top☝
A. (a) and (b) only B. (a) and (c) only C. (b) and (c) only D. (a), (b) and (c)
ugcnetcse-aug2016-paper3 linear-programming duality
Answer key☟
35.19.1 E Commerce: UGC NET CSE | August 2016 | Part 2 | Question: 49 top☝
Answer key☟
35.19.2 E Commerce: UGC NET CSE | June 2011 | Part 2 | Question: 50 top☝
Which is the most valuable electronic commerce to the individual customer in long run ?
Answer key☟
35.20.1 E Payment: UGC NET CSE | June 2011 | Part 2 | Question: 49 top☝
Answer key☟
35.21.1 E Technologies: UGC NET CSE | December 2010 | Part 2 | Question: 48 top☝
E-Choupal refers to
ugcnetcse-dec2010-paper2 e-technologies
Answer key☟
35.21.2 E Technologies: UGC NET CSE | December 2011 | Part 2 | Question: 7 top☝
Answer key☟
35.21.3 E Technologies: UGC NET CSE | June 2011 | Part 2 | Question: 48 top☝
"M-Commerce" refers to
ugcnetcse-june2011-paper2 e-technologies
Answer key☟
35.22.1 Encryption Decryption: UGC NET CSE | September 2013 | Part 2 | Question: 3 top☝
Which of the following substitution technique have the relationship between a character in the plaintext and a
character in the ciphertext as one-to-many?
A. Monoalphabetic B. Polyalphabetic
C. Transpositional D. None of the above
ugcnetsep2013ii cryptography encryption-decryption
Answer key☟
35.22.2 Encryption Decryption: UGC NET CSE | September 2013 | Part 3 | Question: 57 top☝
If user A wants to send an encrypted message to user B, the plain text of A is encrypted with the
Answer key☟
35.23.1 Enterprise Resource Planning: UGC NET CSE | December 2011 | Part 2 | Question: 44 top☝
Answer key☟
35.23.2 Enterprise Resource Planning: UGC NET CSE | December 2011 | Part 2 | Question: 45 top☝
Answer key☟
35.24.1 File System: UGC NET CSE | June 2011 | Part 2 | Question: 37 top☝
Answer key☟
35.25.1 Fuzzy Logic: UGC NET CSE | August 2016 | Part 3 | Question: 64 top☝
What are the following sequence of steps taken in designing a fuzzy logic machine ?
35.25.2 Fuzzy Logic: UGC NET CSE | September 2013 | Part 3 | Question: 26 top☝
Let A be a set of comfortable houses given as and be the set of affordable houses
Then the set of comfortable and affordable houses is
A.
B.
C.
D.
Answer key☟
35.26.1 Fuzzy Relations: UGC NET CSE | August 2016 | Part 3 | Question: 66 top☝
and
Then, the resulting relation, , which relates elements of universe of to elements of universe of using max-
product composition is given by
A. B. C. D.
Answer key☟
35.27.1 Fuzzy Set: UGC NET CSE | December 2013 | Part 3 | Question: 28 top☝
A. B.
C. D.
ugcnetcse-dec2013-paper3 fuzzy-set
Answer key☟
35.27.2 Fuzzy Set: UGC NET CSE | December 2013 | Part 3 | Question: 29 top☝
Answer key☟
35.28.1 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 1 top☝
To organize discussion method in teaching effectively, which of the following conditions should be met?
Answer key☟
35.28.2 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 10 top☝
A. http://go.turnitin.com B. http://www.researchgate.com
C. http://www.editorial.elsevier.com D. http://www.grammarly.com
ugcnetcse-june2019-paper1 general-awareness
Answer key☟
35.28.3 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 11 top☝
Michaelangelo is famous for having successfully interpreted the human body. His great achievement is that
of the painting of David whose hands reach out as a sign of human capability and potential. It is assumed
that the time he lived was ripe for exchange of knowledge, development in science and matured enough to
advance the horizon of investigation in all fields. Renaissance humanism stressed on a serious rethink on the
nature of art that focussed on accurate details. In painting and sculpture, artists focussed on not so casual but
verifiable and minute details. Michaelangelo’s paintings are no exception to it. In a study published in the journal of
the Royal Society of medicine, a group of surgeons are of the opinion that the great master was “afflicted by an
illness involving his joints”. They have used his portraits as evidence to argue their view. During his life, he
complained of what he felt to be ‘gout’. Later he complained of his sore and stiff hands which the doctors would find
to be natural for someone who was engaged in handmade art. The doctors found corroboration of those claims in
portraits of the artist that show a hanging left hand with both degenerative and non-degenerative changes. They
attribute the pain not just to arthritis, but to the stress of hammering and chiselling and note that though the master
was seen hammering days before his death at an old age, he did not write or sign his own letters before his death.
In recent times there have been attempts to diagnose famous artists with diseases that were not known during their
time. This practice has raised many questions, especially on the issue of ethics in research. It is also inferred from
authentic analysis that Michaelangelo persisted in his work until his last days. This theory would emphasize that his
artistic subject defined his physical infirmities.
Michaelangelo lived during a time that lets us know that
35.28.4 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 12 top☝
Michaelangelo is famous for having successfully interpreted the human body. His great achievement is that
of the painting of David whose hands reach out as a sign of human capability and potential. It is assumed
that the time he lived was ripe for exchange of knowledge, development in science and matured enough to
advance the horizon of investigation in all fields. Renaissance humanism stressed on a serious rethink on the
nature of art that focussed on a accurate details. In painting and sculpture, artists focussed on not so casual but
verifiable and minute details. Michaelangelo’s paintings are no exception to it. In a study published in the journal of
the Royal Society of medicine, a group of surgeons are of the opinion that the great master was “afflicted by an
illness involving his joints”. They have used his portraits as evidence to argue their view. During his life, he
complained of what he felt to be ‘gout’. Later he complained of his sore and stiff hands which the doctors would find
to be natural for someone who was engaged in handmade art. The doctors found corroboration of those claims in
portraits of the artist that show a hanging left hand with both degenerative and non-degenerative changes. They
attribute the pain not just to arthritis, but to the stress of hammering and chiselling and note that though the master
was seen hammering days before his death at an old age, he did not write or sign his own letters before his death.
In recent times there have been attempts to diagnose famous artists with diseases that were not known during their
time. This practice has raised many questions, especially on the issue of ethics in research. It is also inferred from
authentic analysis that Michaelangelo persisted in his work until his last days. This theory would emphasize that his
artistic subject defined his physical infirmities.
Renaissance painting in Europe was sceptical of
A. The obsessive medieval method of accuracy B. The classical simplicity and lack of control
C. The case and decorative excess of earlier art D. Expressionist technique
ugcnetcse-june2019-paper1 general-awareness passage-reading
35.28.5 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 13 top☝
Michaelangelo is famous for having successfully interpreted the human body. His great achievement is that
of the painting of David whose hands reach out as a sign of human capability and potential. It is assumed
that the time he lived was ripe for exchange of knowledge, development in science and matured enough to
advance the horizon of investigation in all fields. Renaissance humanism stressed on a serious rethink on the
nature of art that focussed on a accurate details. In painting and sculpture, artists focussed on not so casual but
verifiable and minute details. Michaelangelo’s paintings are no exception to it. In a study published in the journal of
the Royal Society of medicine, a group of surgeons are of the opinion that the great master was “afflicted by an
illness involving his joints”. They have used his portraits as evidence to argue their view. During his life, he
complained of what he felt to be ‘gout’. Later he complained of his sore and stiff hands which the doctors would find
to be natural for someone who was engaged in handmade art. The doctors found corroboration of those claims in
portraits of the artist that show a hanging left hand with both degenerative and non-degenerative changes. They
attribute the pain not just to arthritis, but to the stress of hammering and chiselling and note that though the master
was seen hammering days before his death at an old age, he did not write or sign his own letters before his death.
In recent times there have been attempts to diagnose famous artists with diseases that were not known during their
time. This practice has raised many questions, especially on the issue of ethics in research. It is also inferred from
authentic analysis that Michaelangelo persisted in his work until his last days. This theory would emphasize that his
artistic subject defined his physical infirmities.
The controversy that the passage above refers to is whether
35.28.6 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 14 top☝
Michaelangelo is famous for having successfully interpreted the human body. His great achievement is that
of the painting of David whose hands reach out as a sign of human capability and potential. It is assumed
that the time he lived was ripe for exchange of knowledge, development in science and matured enough to
advance the horizon of investigation in all fields. Renaissance humanism stressed on a serious rethink on the
nature of art that focussed on a accurate details. In painting and sculpture, artists focussed on not so casual but
verifiable and minute details. Michaelangelo’s paintings are no exception to it. In a study published in the journal of
the Royal Society of medicine, a group of surgeons are of the opinion that the great master was “afflicted by an
illness involving his joints”. They have used his portraits as evidence to argue their view. During his life, he
complained of what he felt to be ‘gout’. Later he complained of his sore and stiff hands which the doctors would find
to be natural for someone who was engaged in handmade art. The doctors found corroboration of those claims in
portraits of the artist that show a hanging left hand with both degenerative and non-degenerative changes. They
attribute the pain not just to arthritis, but to the stress of hammering and chiselling and note that though the master
was seen hammering days before his death at an old age, he did not write or sign his own letters before his death.
In recent times there have been attempts to diagnose famous artists with diseases that were not known during their
time. This practice has raised many questions, especially on the issue of ethics in research. It is also inferred from
authentic analysis that Michaelangelo persisted in his work until his last days. This theory would emphasize that his
artistic subject defined his physical infirmities.
What generalisations do people subscribe to?
35.28.7 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 15 top☝
Michaelangelo is famous for having successfully interpreted the human body. His great achievement is that
of the painting of David whose hands reach out as a sign of human capability and potential. It is assumed
that the time he lived was ripe for exchange of knowledge, development in science and matured enough to
advance the horizon of investigation in all fields. Renaissance humanism stressed on a serious rethink on the
nature of art that focussed on a accurate details. In painting and sculpture, artists focussed on not so casual but
verifiable and minute details. Michaelangelo’s paintings are no exception to it. In a study published in the journal of
the Royal Society of medicine, a group of surgeons are of the opinion that the great master was “afflicted by an
illness involving his joints”. They have used his portraits as evidence to argue their view. During his life, he
complained of what he felt to be ‘gout’. Later he complained of his sore and stiff hands which the doctors would find
to be natural for someone who was engaged in handmade art. The doctors found corroboration of those claims in
portraits of the artist that show a hanging left hand with both degenerative and non-degenerative changes. They
attribute the pain not just to arthritis, but to the stress of hammering and chiselling and note that though the master
was seen hammering days before his death at an old age, he did not write or sign his own letters before his death.
In recent times there have been attempts to diagnose famous artists with diseases that were not known during their
time. This practice has raised many questions, especially on the issue of ethics in research. It is also inferred from
authentic analysis that Michaelangelo persisted in his work until his last days. This theory would emphasize that his
artistic subject defined his physical infirmities.
What actually may be concluded from the above passage?
35.28.8 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 16 top☝
The dance of the honeybee conveying to other bees where nector will be found is an example of
35.28.9 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 17 top☝
Choose the correct sequence of communication from the options given below:
ugcnetcse-june2019-paper1 general-awareness
35.28.10 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 18 top☝
ugcnetcse-june2019-paper1 general-awareness
35.28.11 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 19 top☝
In a classroom situation, a teacher organises group discussion to help arrive at a solution of a problem. In
terms of a model communication used, it will be called
35.28.12 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 2 top☝
Answer key☟
35.28.13 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 3 top☝
From the list of the effective teaching behaviours, identify those which are called key behaviours.
35.28.14 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 36 top☝
Which of the following is a type of malware intentionally inserted into a software system that will setoff a
malicious function when specified conditions are met?
Answer key☟
35.28.15 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 37 top☝
A. An OS controls peripherals, allocates memory and organises data into fields and records
B. An OS provides protection against viruses and controls peripherals
C. An OS controls peripheral, and allocates memory and processor time
D. An OS controls the procesor and peripherals and allows user to connect to the Internet
ugcnetcse-june2019-paper1 general-awareness
Answer key☟
35.28.16 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 38 top☝
Select the option that shows the storage devices in order of capacity from lowest to highest
Answer key☟
35.28.17 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 39 top☝
Answer key☟
35.28.18 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 4 top☝
ugcnetcse-june2019-paper1 general-awareness
Answer key☟
35.28.19 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 40 top☝
A. Giga Byte :
B. : Cathode Ray Tube
C. : Rapid Online Memory
D. : Central Processing Unit
ugcnetcse-june2019-paper1 general-awareness
Answer key☟
35.28.20 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 41 top☝
In the last few years, India has been affected by which of the following tropical cyclones?
35.28.21 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 42 top☝
Which of the following are priority areas in relation to the Sustainable Development Goals?
A. a, b, c B. a, c, d C. b, c, d D. a, b, d
ugcnetcse-june2019-paper1 general-awareness
35.28.22 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 43 top☝
Assertion (A) : Methemoglobinemia is a condition in which blood is not able to carry and deliver enough
oxygen to the body.
Reason (R) : Consuming drinking water with high nitrate levels may cause methemoglobinemia.
Choose the correct answer from the options given below :
A. Both (A) and (R) are true and (R) is the correct explanation of (A)
B. Both (A) and (R) are true but (R) is not the correct explanation of (A)
C. (A) is true but (R) is false
D. (A) is false but (R) is true
ugcnetcse-june2019-paper1 general-awareness
35.28.23 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 44 top☝
A. Both (A) and (R) are true and (R) is the correct explanation of (A)
B. Both (A) and (R) are true but (R) is not the correct explanation of (A)
C. (A) is true but (R) is false
D. (A) is false but (R) is true
ugcnetcse-june2019-paper1 general-awareness
35.28.24 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 45 top☝
Answer key☟
35.28.25 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 46 top☝
In post independence India, which one of the following committee/commission’s report deals with all levels of
education in India?
35.28.26 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 47 top☝
The Education Commission of India that first took serious note of the problem of Brain Drain was
35.28.27 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 49 top☝
Which one of the following instructional designs is not a part of SWAYAM launched by Government of India?
A. E-tutorial B. E-Content
C. Physical interaction D. Discussion Forum
ugcnetcse-june2019-paper1 general-awareness
Answer key☟
35.28.28 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 5 top☝
Which among the following best describes the Emotional Intelligence of learners?
Answer key☟
35.28.29 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 50 top☝
A. Only i and ii B. Only ii and iii C. Only iii D. Only i and iii
ugcnetcse-june2019-paper1 general-awareness
Answer key☟
35.28.30 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 6 top☝
A. Helps those interested in further research B. Shows the vast knowledge of the researcher
C. Makes the report authentic D. Is an optional part of the report
ugcnetcse-june2019-paper1 general-awareness
35.28.31 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 7 top☝
The research design is specifically related to which of the following features in research?
i. Sample selection
ii. Formulation of a plan
iii. Deciding about the tool for data collection
iv. Hypothesis making
v. Choice of a field of inquiry
35.28.32 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 8 top☝
Through which research method, the manipulation of an independent variable and its effect on dependent
variable is examined with reference to a hypothesis under controlled conditions?
35.28.33 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 9 top☝
In which of the following research studies interpretation and meaning get more attention than formulation of
generalisations?
i. Historical studies
ii. Survey studies
iii. Philosophical studies
iv. Ethnographic studies
v. Hypothetico – deductive studies
vi. Ex-post facto studies
35.29.1 Hashing: UGC NET CSE | December 2010 | Part 2 | Question: 24 top☝
Answer key☟
35.29.2 Hashing: UGC NET CSE | June 2011 | Part 2 | Question: 24 top☝
A. 46 B. 47 C. 41 D. 43
ugcnetcse-june2011-paper2 data-structures hashing
Answer key☟
35.30.1 Image Compression: UGC NET CSE | August 2016 | Part 3 | Question: 58 top☝
Answer key☟
35.31.1 Information System: UGC NET CSE | December 2015 | Part 3 | Question: 48 top☝
As compared to rental and leasing methods to acquire computer systems for a Management Information
System (MIS), purchase method has following advantage:
Answer key☟
35.32.1 Interpreter: UGC NET CSE | June 2011 | Part 2 | Question: 14 top☝
Answer key☟
35.33.1 Is&software Engineering: UGC NET CSE | June 2011 | Part 2 | Question: 41 top☝
Which one of the items listed below is not one of the software engineering layers ?
Answer key☟
35.34.1 Java: UGC NET CSE | June 2011 | Part 2 | Question: 15 top☝
Answer key☟
35.35.1 Job: UGC NET CSE | June 2011 | Part 2 | Question: 32 top☝
Answer key☟
35.36.1 Linear Programming: UGC NET CSE | August 2016 | Part 3 | Question: 61 top☝
and
The total maximum profit for the above problem is :
A. B. C. D.
ugcnetcse-aug2016-paper3 linear-programming
Answer key☟
35.36.2 Linear Programming: UGC NET CSE | January 2017 | Part 3 | Question: 70 top☝
A.
B.
C.
D.
ugcnetcse-jan2017-paper3 linear-programming
Answer key☟
35.36.3 Linear Programming: UGC NET CSE | June 2013 | Part 3 | Question: 23 top☝
Answer key☟
35.37.1 Linker: UGC NET CSE | June 2011 | Part 2 | Question: 31 top☝
Object modules generated by assembler that contains unresolved external references are resolved for two
or more object module by a/an
Answer key☟
35.37.2 Linker: UGC NET CSE | June 2011 | Part 2 | Question: 35 top☝
Answer key☟
35.38.1 Linux: UGC NET CSE | June 2011 | Part 2 | Question: 40 top☝
35.39.1 Management Information System: UGC NET CSE | June 2011 | Part 2 | Question: 45 top☝
Answer key☟
35.39.2 Management Information System: UGC NET CSE | Junet 2015 | Part 3 | Question: 55 top☝
A. B.
C. D.
ugcnetcse-june2015-paper3 management-information-system
Answer key☟
35.40.1 Microprocessors: UGC NET CSE | June 2014 | Part 3 | Question: 45 top☝
ugcnetjune2014iii microprocessors
Answer key☟
35.41.1 Minimum Spanning Tree: UGC NET CSE | December 2019 | Part 2 | Question: 6 top☝
The weight of minimum spanning tree in graph , calculated using Kruskal’s algorithm is:
A. B. C. D.
ugcnetcse-dec2019-paper2 algorithms minimum-spanning-tree
Answer key☟
35.42.1 Mis: UGC NET CSE | December 2010 | Part 2 | Question: 49 top☝
A. Responsibility B. Accountability
C. Liability D. All of the above
ugcnetcse-dec2010-paper2 mis
Answer key☟
35.43.1 Mobile Communication: UGC NET CSE | January 2017 | Part 2 | Question: 48 top☝
Answer key☟
35.43.2 Mobile Communication: UGC NET CSE | January 2017 | Part 2 | Question: 49 top☝
Answer key☟
35.44.1 Multiple Document Interface: UGC NET CSE | August 2016 | Part 3 | Question: 68 top☝
Which of the following statements is incorrect for a Windows Multiple Document Interface (MDI) ?
A. Each document in an MDI application is displayed in a separate child window within the client area of the
application’s main window.
B. An MDI application has three kinds of windows namely a frame window, an MDI client window and number of
child windows.
C. An MDI application can support more than one kind of document.
D. An MDI application displays output in the client area of the frame window.
ugcnetcse-aug2016-paper3 windows-programming multiple-document-interface
35.45.1 Natural Join: UGC NET CSE | August 2016 | Part 3 | Question: 9 top☝
A. respectively B. respectively
C. respectively D. respectively
ugcnetcse-aug2016-paper3 databases natural-join
Answer key☟
35.46.1 Natural Language Processing: UGC NET CSE | June 2014 | Part 3 | Question: 29 top☝
STRIPS addresses the problem of efficiently representing and implementation of a planner. It is not related
to which one of the following?
Answer key☟
35.47.1 Network Switching: UGC NET CSE | June 2011 | Part 2 | Question: 30 top☝
Which of the following switching techniques is most suitable for interactive traffic ?
Answer key☟
35.48.1 Neural Network: UGC NET CSE | June 2013 | Part 3 | Question: 73 top☝
A. Support
B. - cut
C. Convex
D. Concave
Answer key☟
35.48.2 Neural Network: UGC NET CSE | June 2013 | Part 3 | Question: 74 top☝
A. B.
C. D.
ugcnetcse-june2013-paper3 neural-network fuzzy-set
Answer key☟
35.48.3 Neural Network: UGC NET CSE | Junet 2015 | Part 3 | Question: 70 top☝
Consider the two class classification task that consists of the following points:
Class : [1 1.5] [1 -1.5]
Class : [-2 2.5] [-2 -2.5]
The decision boundary between the two classes using single perceptron is given by:
A. B. C. D.
ugcnetcse-june2015-paper3 fuzzy-set neural-network
Answer key☟
35.48.4 Neural Network: UGC NET CSE | Junet 2015 | Part 3 | Question: 71 top☝
is _____ . [Note: ]
Answer key☟
35.48.5 Neural Network: UGC NET CSE | Junet 2015 | Part 3 | Question: 72 top☝
Suppose the function y and a fuzzy integer number around - 4 for x are given as . Around
- 4 ={(2, 0.3), (3, 0.6), (4, 1), (5, 0.6), (6, 0.3)} respectively. Then f(Around-4) is given by
A. {(2, 0.6), (3, 0.3), (6, 1), (11, 0.3)} B. {(2, 0.6), (3, 1), (6, 1), (11, 0.3)}
C. {(2, 0.6), (3, 1), (6, 0.6), (11, 0.3)} D. {(2, 0.6), (3, 0.3), (6, 0.6), (11, 0.3)}
ugcnetcse-june2015-paper3 fuzzy-set neural-network
Answer key☟
35.48.6 Neural Network: UGC NET CSE | September 2013 | Part 3 | Question: 27 top☝
A.
B.
C.
D.
ugcnetcse-sep2013-paper3 neural-network fuzzy-set
Answer key☟
35.49.1 Oops Concept: UGC NET CSE | August 2016 | Part 2 | Question: 14 top☝
Answer key☟
35.50.1 Operator Overloading: UGC NET CSE | June 2011 | Part 2 | Question: 13 top☝
Answer key☟
35.51.1 Pipelining: UGC NET CSE | December 2019 | Part 2 | Question: 9 top☝
A non-pipelined system takes to process a task. The same task can be processed in a four-segment
pipeline with a clock cycle of . Determine the speed up of the pipeline for tasks.
A. B. C. D.
ugcnetcse-dec2019-paper2 co-and-architecture pipelining
Answer key☟
35.52.1 Process Scheduling: UGC NET CSE | June 2011 | Part 2 | Question: 38 top☝
A relationship between processes such that each has some part (critical section) which must not be
executed while the critical section of another is being executed, is known as
Answer key☟
35.52.2 Process Scheduling: UGC NET CSE | June 2011 | Part 2 | Question: 39 top☝
A. B. C. D.
ugcnetcse-june2011-paper2 operating-system process-scheduling
Answer key☟
35.53.1 Prolog: UGC NET CSE | August 2016 | Part 3 | Question: 75 top☝
Answer key☟
35.54.1 Quadratic Equations: UGC NET CSE | June 2013 | Part 3 | Question: 11 top☝
The golden ratio and its conjugate both satisfy the equation
A. B. C. D.
ugcnetcse-june2013-paper3 quadratic-equations
Answer key☟
35.55.1 Queue: UGC NET CSE | June 2011 | Part 2 | Question: 25 top☝
When the priority queue is represented by max heap, the insertion and deletion of an element can be
performed in (queue containing elements)
Answer key☟
35.56.1 Rdbms: UGC NET CSE | August 2016 | Part 2 | Question: 16 top☝
Answer key☟
35.56.2 Rdbms: UGC NET CSE | August 2016 | Part 2 | Question: 18 top☝
A. (a) and (b) are true. B. (a) and (c) are true.
C. (b) and (c) are true. D. (a), (b) and (c) are true.
ugcnetcse-aug2016-paper2 databases rdbms
Answer key☟
35.57.1 Relations: UGC NET CSE | January 2017 | Part 3 | Question: 71 top☝
A.
B.
C.
D.
Answer key☟
35.58.1 Semantic Nets: UGC NET CSE | August 2016 | Part 3 | Question: 72 top☝
A. Is a graph-based method of knowledge representation where nodes represent concepts and arcs represent
relations between concepts.
B. Is a graph-based method of knowledge representation where nodes represent relations between concepts and
arcs represent concepts.
C. Represents an entity as a set of slots and associated rules.
D. Is a subset of first-order logic.
Answer key☟
35.59.1 Shell: UGC NET CSE | September 2013 | Part 3 | Question: 4 top☝
Answer key☟
and is defined as
Answer key☟
35.61.1 Software Development Life Cycle Models: UGC NET CSE | June 2011 | Part 2 | Question: 42 top☝
Answer key☟
35.62.1 Software Engineering Framework: UGC NET CSE | June 2011 | Part 2 | Question: 44 top☝
Answer key☟
35.63.1 Software Testing: UGC NET CSE | Junet 2015 | Part 3 | Question: 43 top☝
Verification:
A. refers to the set of activities that ensure that software correctly implements a specific function
B. Gives answer to the question - Are we building the right product
C. requires execution of software
D. both A and B
Answer key☟
35.64.1 System Software Compilers: UGC NET CSE | August 2016 | Part 3 | Question: 45 top☝
Answer key☟
35.65.1 Transaction And Concurrency: UGC NET CSE | June 2011 | Part 2 | Question: 16 top☝
Answer key☟
35.65.2 Transaction And Concurrency: UGC NET CSE | June 2011 | Part 2 | Question: 18 top☝
Answer key☟
35.65.3 Transaction And Concurrency: UGC NET CSE | June 2011 | Part 2 | Question: 19 top☝
Answer key☟
35.66.1 Transportation Problem: UGC NET CSE | August 2016 | Part 3 | Question: 63 top☝
A. (a) and (b) only B. (a) and (c) only C. (b) and (c) only D. (a), (b) and (c)
ugcnetcse-aug2016-paper3 linear-programming transportation-problem
Answer key☟
35.66.2 Transportation Problem: UGC NET CSE | June 2013 | Part 3 | Question: 24 top☝
A basic feasible solution to a m-origin, n-destination transportation problem is said to be ______ if the
number of positive allocations are less than m+n-1.
Answer key☟
35.66.3 Transportation Problem: UGC NET CSE | June 2013 | Part 3 | Question: 25 top☝
The total transportation cost in an initial basic feasible solution to the following transportation problem using
Vogel’s Approximation method is
A. B. C. D.
ugcnetcse-june2013-paper3 linear-programming transportation-problem
Answer key☟
35.67.1 Tree: UGC NET CSE | June 2011 | Part 2 | Question: 21 top☝
Answer key☟
35.68.1 Unix: UGC NET CSE | August 2016 | Part 3 | Question: 67 top☝
Consider the following operations to be performed in Unix : "The pipe sorts all files in the current directory
modified in the month of "June" by order of size and prints them to the terminal screen. The sort option skips
ten fields then sorts the lines in numeric order." Which of the following Unix command will perform above set of
operations ?
ugcnetcse-aug2016-paper3 unix
Answer key☟
35.68.2 Unix: UGC NET CSE | August 2016 | Part 3 | Question: 69 top☝
Which of the following statement(s) is/are True regarding ‘nice’ command of UNIX ?
I. It is used to set or change the priority of a process.
II. A process’s nice value can be set at the time of creation.
III. ‘nice’ takes a command line as an argument.
A. only B. only C. D. only
ugcnetcse-aug2016-paper3 unix
Answer key☟
35.68.3 Unix: UGC NET CSE | December 2010 | Part 2 | Question: 37 top☝
A. B. C. D.
ugcnetcse-dec2010-paper2 unix
35.68.4 Unix: UGC NET CSE | September 2013 | Part 2 | Question: 48 top☝
Which of the following set of Unix commands will always display “WELCOME”?
ugcnetsep2013ii unix
Answer key☟
35.69.1 Virtual Memory: UGC NET CSE | June 2011 | Part 2 | Question: 47 top☝
Virtual memory is
Answer key☟
35.70.1 Windows: UGC NET CSE | December 2008 | Part 2 | Question: 50 top☝
(I) Each object in the active directory of windows 2000 has an access control list.
(II) The scheme is a blueprint of all objects in the domain of windows 2000.
Which of the following is true?
A. only (I)
B. only (II)
C. both (I) and (II)
D. None of the above
ugcnetcse-dec2008-paper2 windows
Answer key☟
35.70.2 Windows: UGC NET CSE | June 2007 | Part 2 | Question: 37 top☝
Answer key☟
35.70.3 Windows: UGC NET CSE | June 2014 | Part 3 | Question: 38 top☝
Answer key☟
35.70.4 Windows: UGC NET CSE | June 2014 | Part 3 | Question: 47 top☝
All the classes necessary for windows programming are available in the module :
Answer key☟
35.70.5 Windows: UGC NET CSE | June 2014 | Part 3 | Question: 48 top☝
Answer key☟
35.71.1 Windows Programming: UGC NET CSE | June 2009 | Part 2 | Question: 50 top☝
A. Recycle
B. My Computer
C. Internet explorer
D. None of the above
ugcnetcse-june2009-paper2 windows-programming
35.71.2 Windows Programming: UGC NET CSE | Junet 2015 | Part 3 | Question: 74 top☝
WOW32 is a
ugcnetcse-june2015-paper3 windows-programming
Answer key☟
Answer Keys
35.0.1 Q-Q 35.0.2 Q-Q 35.0.3 Q-Q 35.0.4 Q-Q 35.0.5 D
35.0.6 Q-Q 35.0.7 Q-Q 35.0.8 Q-Q 35.0.9 Q-Q 35.0.10 Q-Q
35.0.11 Q-Q 35.0.12 Q-Q 35.0.13 Q-Q 35.0.14 Q-Q 35.0.15 Q-Q
35.0.16 Q-Q 35.0.17 Q-Q 35.0.18 Q-Q 35.0.19 Q-Q 35.0.20 Q-Q
35.0.21 Q-Q 35.0.22 Q-Q 35.0.23 Q-Q 35.0.24 Q-Q 35.0.25 Q-Q
35.0.26 Q-Q 35.0.27 Q-Q 35.0.28 Q-Q 35.0.29 D 35.0.30 A
35.0.31 C 35.0.32 A 35.0.33 D 35.0.34 B 35.0.35 D
35.0.36 D 35.0.37 C 35.0.38 C 35.0.39 B 35.0.40 B
35.0.41 B 35.0.42 B 35.0.43 C 35.0.44 D 35.0.45 D
35.0.46 B 35.0.47 B 35.0.48 D 35.0.49 A 35.0.50 D
35.0.51 B 35.0.52 A 35.0.53 B 35.0.54 Q-Q 35.0.55 Q-Q
35.0.56 D 35.0.57 Q-Q 35.0.58 Q-Q 35.0.59 Q-Q 35.0.60 Q-Q
35.0.61 Q-Q 35.0.62 Q-Q 35.0.63 Q-Q 35.0.64 Q-Q 35.0.65 Q-Q
35.0.66 Q-Q 35.0.67 Q-Q 35.0.68 Q-Q 35.0.69 Q-Q 35.0.70 B
35.0.71 Q-Q 35.0.72 Q-Q 35.0.73 Q-Q 35.0.74 Q-Q 35.0.75 Q-Q
35.0.76 Q-Q 35.0.77 Q-Q 35.0.78 Q-Q 35.0.79 Q-Q 35.0.80 Q-Q
35.0.81 Q-Q 35.0.82 Q-Q 35.0.83 Q-Q 35.0.84 Q-Q 35.0.85 Q-Q
35.0.86 Q-Q 35.0.87 Q-Q 35.0.88 Q-Q 35.0.89 Q-Q 35.0.90 Q-Q
35.0.91 Q-Q 35.0.92 Q-Q 35.0.93 Q-Q 35.0.94 Q-Q 35.0.95 Q-Q
35.0.96 Q-Q 35.0.97 Q-Q 35.0.98 Q-Q 35.0.99 Q-Q 35.0.100 Q-Q
35.0.101 Q-Q 35.0.102 Q-Q 35.0.103 Q-Q 35.0.104 Q-Q 35.0.105 Q-Q
35.0.106 Q-Q 35.0.107 Q-Q 35.0.108 Q-Q 35.0.109 Q-Q 35.0.110 D
35.0.111 D 35.0.112 Q-Q 35.0.113 Q-Q 35.0.114 Q-Q 35.0.115 Q-Q
35.0.116 Q-Q 35.0.117 Q-Q 35.0.118 Q-Q 35.0.119 D 35.0.120 Q-Q
35.0.121 Q-Q 35.0.122 Q-Q 35.0.123 Q-Q 35.0.124 Q-Q 35.0.125 Q-Q
35.0.126 Q-Q 35.0.127 Q-Q 35.0.128 Q-Q 35.0.129 Q-Q 35.0.130 Q-Q
35.0.131 Q-Q 35.0.132 Q-Q 35.0.133 Q-Q 35.0.134 Q-Q 35.0.135 Q-Q
35.0.136 Q-Q 35.0.137 Q-Q 35.0.138 C 35.0.139 Q-Q 35.0.140 Q-Q
35.0.141 B 35.0.142 D 35.0.143 A 35.0.144 A 35.0.145 C
35.0.146 A 35.0.147 C 35.0.148 Q-Q 35.0.149 Q-Q 35.0.150 Q-Q
35.0.151 Q-Q 35.0.152 Q-Q 35.0.153 Q-Q 35.0.154 D 35.0.155 A
35.0.156 A 35.0.157 C 35.0.158 D 35.0.159 A 35.0.160 D
35.0.161 Q-Q 35.0.162 B 35.0.163 Q-Q 35.0.164 C 35.0.165 Q-Q
35.0.166 Q-Q 35.0.167 A 35.0.168 Q-Q 35.0.169 Q-Q 35.0.170 Q-Q
35.0.171 Q-Q 35.0.172 Q-Q 35.0.173 Q-Q 35.0.174 Q-Q 35.0.175 Q-Q
35.0.176 Q-Q 35.0.177 Q-Q 35.0.178 Q-Q 35.0.179 Q-Q 35.0.180 Q-Q
35.0.181 Q-Q 35.0.182 Q-Q 35.0.183 Q-Q 35.0.184 C 35.0.185 Q-Q
35.0.186 B 35.0.187 C 35.0.188 C 35.0.189 D 35.0.190 A
35.0.191 B 35.0.192 C 35.0.193 Q-Q 35.0.194 Q-Q 35.0.195 Q-Q
35.0.196 Q-Q 35.0.197 Q-Q 35.0.198 Q-Q 35.0.199 Q-Q 35.0.200 Q-Q
35.0.201 Q-Q 35.0.202 Q-Q 35.0.203 Q-Q 35.0.204 Q-Q 35.0.205 C
35.0.206 Q-Q 35.0.207 Q-Q 35.0.208 Q-Q 35.0.209 Q-Q 35.0.210 Q-Q
35.0.211 Q-Q 35.0.212 Q-Q 35.0.213 Q-Q 35.0.214 Q-Q 35.0.215 Q-Q
35.0.216 Q-Q 35.0.217 Q-Q 35.0.218 Q-Q 35.0.219 Q-Q 35.0.220 Q-Q
35.0.221 Q-Q 35.0.222 Q-Q 35.0.223 Q-Q 35.0.224 Q-Q 35.0.225 Q-Q
35.0.226 Q-Q 35.0.227 Q-Q 35.0.228 Q-Q 35.0.229 Q-Q 35.0.230 Q-Q
35.0.231 Q-Q 35.0.232 Q-Q 35.0.233 Q-Q 35.0.234 Q-Q 35.0.235 Q-Q
35.0.236 Q-Q 35.0.237 Q-Q 35.0.238 Q-Q 35.0.239 Q-Q 35.0.240 Q-Q
35.0.241 Q-Q 35.0.242 Q-Q 35.0.243 Q-Q 35.0.244 Q-Q 35.0.245 Q-Q
35.0.246 Q-Q 35.0.247 Q-Q 35.0.248 Q-Q 35.0.249 Q-Q 35.0.250 Q-Q
35.0.251 Q-Q 35.0.252 Q-Q 35.0.253 Q-Q 35.0.254 Q-Q 35.0.255 Q-Q
35.0.256 Q-Q 35.0.257 Q-Q 35.0.258 Q-Q 35.0.259 Q-Q 35.0.260 Q-Q
35.0.261 Q-Q 35.0.262 Q-Q 35.0.263 Q-Q 35.0.264 Q-Q 35.0.265 Q-Q
35.0.266 Q-Q 35.0.267 Q-Q 35.0.268 Q-Q 35.0.269 Q-Q 35.0.270 Q-Q
35.0.271 Q-Q 35.0.272 Q-Q 35.0.273 Q-Q 35.0.274 Q-Q 35.0.275 Q-Q
35.0.276 Q-Q 35.0.277 Q-Q 35.0.278 Q-Q 35.0.279 Q-Q 35.0.280 Q-Q
35.0.281 Q-Q 35.0.282 Q-Q 35.0.283 Q-Q 35.0.284 Q-Q 35.0.285 Q-Q
35.0.286 Q-Q 35.0.287 Q-Q 35.0.288 Q-Q 35.0.289 Q-Q 35.0.290 Q-Q
35.0.291 Q-Q 35.0.292 Q-Q 35.0.293 Q-Q 35.0.294 Q-Q 35.0.295 Q-Q
35.0.296 Q-Q 35.0.297 Q-Q 35.0.298 Q-Q 35.0.299 Q-Q 35.0.300 Q-Q
35.0.301 Q-Q 35.0.302 Q-Q 35.0.303 Q-Q 35.0.304 Q-Q 35.0.305 Q-Q
35.0.306 Q-Q 35.0.307 Q-Q 35.0.308 Q-Q 35.0.309 Q-Q 35.0.310 Q-Q
35.0.311 Q-Q 35.0.312 Q-Q 35.0.313 Q-Q 35.0.314 Q-Q 35.0.315 Q-Q
35.0.316 Q-Q 35.0.317 Q-Q 35.0.318 Q-Q 35.0.319 Q-Q 35.0.320 Q-Q
35.0.321 Q-Q 35.0.322 Q-Q 35.0.323 Q-Q 35.0.324 Q-Q 35.0.325 Q-Q
35.0.326 Q-Q 35.0.327 Q-Q 35.0.328 Q-Q 35.0.329 Q-Q 35.0.330 Q-Q
35.0.331 Q-Q 35.0.332 Q-Q 35.0.333 Q-Q 35.0.334 Q-Q 35.0.335 Q-Q
35.0.336 Q-Q 35.0.337 Q-Q 35.0.338 Q-Q 35.0.339 Q-Q 35.0.340 Q-Q
35.0.341 Q-Q 35.0.342 Q-Q 35.0.343 Q-Q 35.0.344 Q-Q 35.0.345 Q-Q
35.0.346 Q-Q 35.0.347 Q-Q 35.0.348 Q-Q 35.0.349 Q-Q 35.0.350 Q-Q
35.0.351 Q-Q 35.0.352 Q-Q 35.0.353 Q-Q 35.0.354 Q-Q 35.0.355 Q-Q
35.0.356 Q-Q 35.0.357 Q-Q 35.0.358 Q-Q 35.0.359 Q-Q 35.0.360 Q-Q
35.0.361 Q-Q 35.0.362 Q-Q 35.0.363 Q-Q 35.0.364 Q-Q 35.0.365 Q-Q
35.0.366 Q-Q 35.0.367 Q-Q 35.0.368 Q-Q 35.0.369 Q-Q 35.0.370 Q-Q
35.0.371 Q-Q 35.0.372 Q-Q 35.0.373 Q-Q 35.0.374 Q-Q 35.0.375 Q-Q
35.0.376 Q-Q 35.0.377 Q-Q 35.0.378 Q-Q 35.0.379 Q-Q 35.0.380 Q-Q
35.0.381 Q-Q 35.0.382 Q-Q 35.0.383 Q-Q 35.0.384 Q-Q 35.0.385 Q-Q
35.0.386 Q-Q 35.0.387 Q-Q 35.0.388 Q-Q 35.0.389 Q-Q 35.0.390 Q-Q
35.0.391 Q-Q 35.0.392 Q-Q 35.0.393 Q-Q 35.0.394 Q-Q 35.0.395 Q-Q
35.0.396 Q-Q 35.0.397 Q-Q 35.0.398 Q-Q 35.0.399 Q-Q 35.0.400 Q-Q
35.0.401 Q-Q 35.0.402 Q-Q 35.0.403 Q-Q 35.0.404 Q-Q 35.0.405 Q-Q
35.0.406 Q-Q 35.0.407 Q-Q 35.0.408 Q-Q 35.0.409 Q-Q 35.0.410 Q-Q
35.0.411 Q-Q 35.0.412 Q-Q 35.0.413 Q-Q 35.0.414 Q-Q 35.0.415 Q-Q
35.0.416 Q-Q 35.0.417 Q-Q 35.0.418 Q-Q 35.0.419 Q-Q 35.0.420 Q-Q
35.0.421 Q-Q 35.0.422 Q-Q 35.0.423 Q-Q 35.0.424 Q-Q 35.0.425 Q-Q
35.0.426 Q-Q 35.0.427 Q-Q 35.0.428 Q-Q 35.0.429 Q-Q 35.0.430 Q-Q
35.0.431 Q-Q 35.0.432 Q-Q 35.0.433 Q-Q 35.0.434 Q-Q 35.0.435 Q-Q
35.0.436 Q-Q 35.0.437 Q-Q 35.0.438 Q-Q 35.1.1 Q-Q 35.2.1 Q-Q
35.3.1 Q-Q 35.4.1 A 35.5.1 Q-Q 35.6.1 Q-Q 35.7.1 C
35.8.1 B 35.9.1 B 35.10.1 Q-Q 35.11.1 Q-Q 35.12.1 Q-Q
35.12.2 Q-Q 35.12.3 Q-Q 35.12.4 Q-Q 35.13.1 Q-Q 35.13.2 Q-Q
35.14.1 Q-Q 35.15.1 Q-Q 35.15.2 B 35.15.3 D 35.16.1 Q-Q
35.17.1 Q-Q 35.18.1 Q-Q 35.19.1 Q-Q 35.19.2 Q-Q 35.20.1 Q-Q
35.21.1 Q-Q 35.21.2 Q-Q 35.21.3 Q-Q 35.22.1 B 35.22.2 B
35.23.1 Q-Q 35.23.2 Q-Q 35.24.1 Q-Q 35.25.1 Q-Q 35.25.2 A
35.26.1 Q-Q 35.27.1 D 35.27.2 C 35.28.1 A 35.28.2 A;D
35.28.3 A 35.28.4 C 35.28.5 B 35.28.6 D 35.28.7 B
35.28.8 B 35.28.9 C 35.28.10 A 35.28.11 A 35.28.12 D
35.28.13 A 35.28.14 D 35.28.15 C 35.28.16 A 35.28.17 A
35.28.18 D 35.28.19 C 35.28.20 C 35.28.21 D 35.28.22 A
35.28.23 D 35.28.24 C 35.28.25 C 35.28.26 A 35.28.27 C
35.28.28 A 35.28.29 C 35.28.30 A 35.28.31 B 35.28.32 D
35.28.33 D 35.29.1 Q-Q 35.29.2 Q-Q 35.30.1 Q-Q 35.31.1 D
35.32.1 Q-Q 35.33.1 Q-Q 35.34.1 Q-Q 35.35.1 Q-Q 35.36.1 Q-Q
35.36.2 A 35.36.3 C 35.37.1 Q-Q 35.37.2 Q-Q 35.38.1 Q-Q
35.39.1 Q-Q 35.39.2 2 35.40.1 C 35.41.1 Q-Q 35.42.1 Q-Q
35.43.1 B 35.43.2 D 35.44.1 Q-Q 35.45.1 Q-Q 35.46.1 C
35.47.1 C 35.48.1 C 35.48.2 C 35.48.3 C 35.48.4 D
35.48.5 C 35.48.6 D 35.49.1 Q-Q 35.50.1 Q-Q 35.51.1 Q-Q
35.52.1 Q-Q 35.52.2 Q-Q 35.53.1 Q-Q 35.54.1 C 35.55.1 D
35.56.1 Q-Q 35.56.2 Q-Q 35.57.1 C 35.58.1 Q-Q 35.59.1 A
35.60.1 B 35.61.1 Q-Q 35.62.1 Q-Q 35.63.1 D 35.64.1 Q-Q
35.65.1 Q-Q 35.65.2 Q-Q 35.65.3 Q-Q 35.66.1 Q-Q 35.66.2 A
35.66.3 B 35.67.1 Q-Q 35.68.1 Q-Q 35.68.2 Q-Q 35.68.3 Q-Q
35.68.4 C 35.69.1 Q-Q 35.70.1 Q-Q 35.70.2 Q-Q 35.70.3 B
35.70.4 A 35.70.5 D 35.71.1 Q-Q 35.71.2 D
36 Programming and DS (27)
36.1.1 Array: UGC NET CSE | December 2014 | Part 2 | Question: 14 top☝
When an array is passed as parameter to a function, which of the following statements is correct ?
Answer key☟
36.1.2 Array: UGC NET CSE | June 2013 | Part 3 | Question: 32 top☝
A. n-subscripts B. two-subscripts
C. only one subscript D. three subscripts only
ugcnetcse-june2013-paper3 programming-in-c array
Answer key☟
36.2.1 Array Of Pointers: UGC NET CSE | August 2016 | Part 2 | Question: 12 top☝
int * f[]()
declares :
Answer key☟
36.3.1 Dangling Pointers: UGC NET CSE | September 2013 | Part 3 | Question: 65 top☝
If an integer needs two bytes of storage, then the maximum value of unsigned integer is
A. B. C. D.
ugcnetcse-dec2011-paper2 programming-in-c data-types
Answer key☟
36.5.1 Input Output Statement: UGC NET CSE | December 2009 | Part 2 | Question: 12 top☝
What would be the output of the following program, if run from the command line as “myprog 1 2 3” ?
{ int i ;
(A) 123
(B) 6
(C) Error
(D) “123”
Answer key☟
36.6.1 Operator Precedence: UGC NET CSE | December 2010 | Part 2 | Question: 12 top☝
A. B. C. D.
ugcnetcse-dec2010-paper2 programming-in-c operator-precedence
Answer key☟
36.6.2 Operator Precedence: UGC NET CSE | December 2011 | Part 2 | Question: 36 top☝
means
A. B.
C. D.
ugcnetcse-dec2011-paper2 programming-in-c operator-precedence
Answer key☟
36.7.1 Operators: UGC NET CSE | December 2012 | Part 2 | Question: 45 top☝
A. 1 B. 3 C. 2 D. 0
ugcnetcse-dec2012-paper2 programming-in-c operators
Answer key☟
36.7.2 Operators: UGC NET CSE | June 2010 | Part 2 | Question: 11 top☝
A. B. C. D.
ugcnetcse-june2010-paper2 programming-in-c operators
Answer key☟
36.8.1 Parameter Passing: UGC NET CSE | December 2012 | Part 3 | Question: 44 top☝
Answer key☟
36.9.1 Pointer Declaration: UGC NET CSE | September 2013 | Part 3 | Question: 51 top☝
Answer key☟
36.10.1 Programming In C: UGC NET CSE | August 2016 | Part 2 | Question: 11 top☝
Given
What is the output of given expression?
x * 3 & & 3 || j | k
A. B. C. D.
ugcnetcse-aug2016-paper2 programming-in-c
Answer key☟
36.10.2 Programming In C: UGC NET CSE | December 2010 | Part 2 | Question: 11 top☝
Answer key☟
36.10.3 Programming In C: UGC NET CSE | December 2010 | Part 2 | Question: 13 top☝
Which one of the following will set the value of to if has the value , but not otherwise ?
A. If B. If
C. If D. If
ugcnetcse-dec2010-paper2 programming-in-c
Answer key☟
36.10.4 Programming In C: UGC NET CSE | December 2015 | Part 2 | Question: 11 top☝
A. B.
C. D.
ugcnetcse-dec2015-paper2 programming-in-c
Answer key☟
36.10.5 Programming In C: UGC NET CSE | December 2015 | Part 3 | Question: 43 top☝
A horn clause is
programming-in-c ugcnetcse-dec2015-paper3
Answer key☟
36.10.6 Programming In C: UGC NET CSE | June 2007 | Part 2 | Question: 14 top☝
A. B. C. D.
ugcnetcse-june2007-paper2 programming-in-c
Answer key☟
36.10.7 Programming In C: UGC NET CSE | June 2013 | Part 3 | Question: 33 top☝
Answer key☟
36.10.8 Programming In C: UGC NET CSE | June 2013 | Part 3 | Question: 51 top☝
Answer key☟
36.10.9 Programming In C: UGC NET CSE | October 2020 | Part 2 | Question: 9 top☝
Consider the following pseudo-code fragment, where and are integer variables that have been initialized:
/* Pre-conditions : */
/* Assume that overflow never occurs */
int ; int ;
while
;
;
When the while loop terminates, what will be the value of in terms of and ?
A.
B.
C. /* means floor */
D. /* means ceil */
ugcnetcse-oct2020-paper2 programming-in-c
Answer key☟
36.10.10 Programming In C: UGC NET CSE | September 2013 | Part 2 | Question: 33 top☝
What is the size of the following union? Assume that the size of int=2, size of float =4, size of char=1
union tag {
int a;
float b;
char c;
};
A. 2 B. 4 C. 1 D. 7
ugcnetsep2013ii programming-in-c
Answer key☟
36.10.11 Programming In C: UGC NET CSE | September 2013 | Part 2 | Question: 34 top☝
A. 10 B. 16 C. 15 D. 14
ugcnetsep2013ii programming-in-c
Answer key☟
36.10.12 Programming In C: UGC NET CSE | September 2013 | Part 2 | Question: 36 top☝
Answer key☟
36.10.13 Programming In C: UGC NET CSE | September 2013 | Part 3 | Question: 53 top☝
A. 15 B. 25 C. 45 D. 20
ugcnetcse-sep2013-paper3 programming-in-c
Answer key☟
36.11.1 Storage Classes In C: UGC NET CSE | January 2017 | Part 2 | Question: 13 top☝
Answer key☟
36.12 Three Dimensional Array (1) top☝
36.12.1 Three Dimensional Array: UGC NET CSE | December 2015 | Part 2 | Question: 16 top☝
A three dimensional array in 'C' is declared as int A[x][y][z]. Here, the address of an item at the location A[p]
[q][r] can be computed as follows: (where w is the word length of an integer)
A. &A[0][0][0]+w(y*z*q+z*p+r) B. &A[0][0][0]+w(y*z*p+z*q+r)
C. &A[0][0][0]+w(x*y*p+z*q+r) D. &A[0][0][0]+w(x*y*q+z*p+r)
ugcnetcse-dec2015-paper2 programming-in-c three-dimensional-array
Answer key☟
Answer Keys
36.1.1 A 36.1.2 C 36.2.1 Q-Q 36.3.1 B 36.4.1 A
36.5.1 Q-Q 36.6.1 Q-Q 36.6.2 D 36.7.1 D 36.7.2 Q-Q
36.8.1 A 36.9.1 D 36.10.1 Q-Q 36.10.2 Q-Q 36.10.3 Q-Q
36.10.4 B 36.10.5 B 36.10.6 Q-Q 36.10.7 D 36.10.8 C
36.10.9 X 36.10.10 B 36.10.11 C 36.10.12 C 36.10.13 D
36.11.1 B 36.12.1 B
37 Programming and DS: DS (100)
Answer key☟
Answer key☟
What item is at the root after the following sequence of insertions into an empty splay tree :
A. B. C. D.
ugcnetcse-dec2004-paper2
Answer key☟
A. are initialized during each execution of the function B. are retained from the last execution
C. are maintained in a stack D. are ignored
ugcnetcse-dec2006-paper2
Answer key☟
Which of the following data structures is most efficient in terms of both space and time to reverse a
string of characters?
(A) Linked list (B) Stack
(C) Array (D) Tree
ugcnetcse-june2008-paper2
Answer key☟
A. B.
C. D.
ugcnetcse-dec2007-paper2
Answer key☟
37.0.7 UGC NET CSE | December 2007 | Part 2 | Question: 22 top☝
ugcnetcse-dec2007-paper2
Answer key☟
Consider a rooted tree in which every node has at least three children. What is the minimum number of
nodes at level i (i > ) of the tree ? Assume that the root is at level :
A. B. C. D.
ugcnetcse-dec2007-paper2
Answer key☟
Which of the following piece of code will insert the node pointed to by at the end of the list ?
A.
B.
C.
D.
ugcnetcse-dec2007-paper2
Answer key☟
A. 1/(⌈m/2⌉−1) B. ⌈m/2⌉−1
C. 1/(m/2) D. None
ugcnetcse-june2009-paper2
Answer key☟
A binary tree is said to have heap property if the elements along any path :
Answer key☟
Suppose we are implementing quadratic probing with a Hash function, Hash mode . If an
element with key is inserted and the first three locations attempted are already occupied, then the next
cell that will be tried is :
A. B. C. D.
ugcnetcse-dec2004-paper2
Answer key☟
1.
2.
3.
4. None of these
ugcnetcse-dec2006-paper2
Answer key☟
What operation is supported in constant time by the doubly linked list, but not by the singly linked list ?
ugcnetcse-dec2004-paper2
Answer key☟
37.1.1 Avl Tree: UGC NET CSE | December 2012 | Part 2 | Question: 2 top☝
The worst case time complexity of AVL is tree is better in comparison to binary search tree for
Answer key☟
37.2.1 B And Bplus Trees: UGC NET CSE | June 2010 | Part 2 | Question: 25 top☝
In a tree of order , the following keys are inserted as follows : and How many
elements are present in the root of the tree ?
A. B. C. D.
ugcnetcse-june2010-paper2 data-structures b-and-bplus-trees
Answer key☟
A. B. C. D.
ugcnetcse-dec2012-paper2 b-tree databases
Answer key☟
37.4.1 Binary Heap: UGC NET CSE | October 2020 | Part 2 | Question: 24 top☝
In a binary max heap containing numbers, the smallest element can be found in ______
A. B. C. D.
ugcnetcse-oct2020-paper2 data-structures binary-heap
Answer key☟
37.5.1 Binary Search Tree: UGC NET CSE | August 2016 | Part 2 | Question: 23 top☝
The runtime for traversing all the nodes of a binary search tree with nodes and printing them in an order is
A. B. C. D.
ugcnetcse-aug2016-paper2 data-structures binary-search-tree
Answer key☟
37.5.2 Binary Search Tree: UGC NET CSE | July 2018 | Part 2 | Question: 26 top☝
A binary search tree in which every non-leaf node has non-empty left and right subtrees is called a strictly
binary tree. Such a tree with 19 leaves:
Answer key☟
37.5.3 Binary Search Tree: UGC NET CSE | June 2016 | Part 2 | Question: 21 top☝
If we remove the root node which of the node from the left subtree will be the new root?
A. 11 B. 12 C. 13 D. 16
data-structures binary-tree binary-search-tree ugcnetcse-june2016-paper2
Answer key☟
37.5.4 Binary Search Tree: UGC NET CSE | June 2016 | Part 3 | Question: 35 top☝
Suppose that we have numbers between 1 and 1,000 in a binary search tree and want to search for the
number 364. Which of the following sequences could not be the sequence of nodes examined?
A. 925, 221, 912, 245, 899, 259, 363, 364 B. 3, 400, 388, 220, 267, 383, 382, 279, 364
C. 926, 203, 912, 241, 913, 246, 364 D. 3, 253, 402, 399, 331, 345, 398, 364
ugcnetcse-june2016-paper3 data-structures binary-search-tree
Answer key☟
37.5.5 Binary Search Tree: UGC NET CSE | September 2013 | Part 3 | Question: 41 top☝
Given a binary search trees for a set of keys with the following probabilities
A. B. C. D.
ugcnetcse-sep2013-paper3 data-structures binary-search-tree
Answer key☟
37.6.1 Binary Tree: UGC NET CSE | December 2009 | Part 2 | Question: 21 top☝
If the number of leaves in a strictly binary tree is an odd number, then what can you say with full conviction
about total number of nodes in the tree ?
(A) It is an odd number.
(B) It is an even number.
(C) It cannot be equal to the number of leaves.
(D) It is always greater than twice the number of leaves.
Answer key☟
37.6.2 Binary Tree: UGC NET CSE | June 2009 | Part 2 | Question: 27 top☝
A. 2k-1
B. 2k-1
C. 2k
D. 2k+1
Answer key☟
37.6.3 Binary Tree: UGC NET CSE | June 2012 | Part 2 | Question: 27 top☝
The Inorder traversal of the tree will yield a sorted listing of elements of tree in
Answer key☟
37.6.4 Binary Tree: UGC NET CSE | June 2012 | Part 2 | Question: 8 top☝
Answer key☟
37.6.5 Binary Tree: UGC NET CSE | October 2020 | Part 2 | Question: 23 top☝
A complete -ary tree is a tree in which each node has children or no children. Let be the number of
internal nodes and be the number of leaves in a complete -ary tree. If , and , what is the
value of ?
A. B. C. D.
ugcnetcse-oct2020-paper2 data-structures binary-tree
Answer key☟
37.6.6 Binary Tree: UGC NET CSE | September 2013 | Part 2 | Question: 11 top☝
A. B. C. D.
binary-tree data-structures ugcnetsep2013ii
Answer key☟
37.6.7 Binary Tree: UGC NET CSE | September 2013 | Part 2 | Question: 21 top☝
A. a b f e j k n o p c d g l m h i B. a b c d e f j k n o p g l m h i
C. a b e j k n o p f c d g l m h i D. j e n o p k f b c l m g h I d a
ugcnetsep2013ii data-structures binary-tree
Answer key☟
37.7.1 Breadth First Search: UGC NET CSE | October 2020 | Part 2 | Question: 63 top☝
Answer key☟
37.8.1 Cryptography: UGC NET CSE | January 2017 | Part 2 | Question: 24 top☝
If is chosen from a universal collection of hash functions and is used to hash keys into a table of size ,
where , the expected number of collisions involving a particular key is less than __________.
A. B. C. D.
ugcnetjan2017ii cryptography hashing data-structures
Answer key☟
Answer key☟
37.9.2 Data Structures: UGC NET CSE | June 2012 | Part 2 | Question: 49 top☝
Answer key☟
37.9.3 Data Structures: UGC NET CSE | June 2012 | Part 2 | Question: 50 top☝
Answer key☟
37.9.4 Data Structures: UGC NET CSE | June 2013 | Part 3 | Question: 49 top☝
Suppose you want to delete the name that occurs before ‘Vivek’ in an alphabetical listing. Which one of the
following data structures shall be most efficient for this operation?
Answer key☟
37.9.5 Data Structures: UGC NET CSE | June 2016 | Part 2 | Question: 2 top☝
The number of different spanning trees in complete graph, and bipartite graph, have ____ and ___
respectively.
Answer key☟
37.9.6 Data Structures: UGC NET CSE | June 2016 | Part 2 | Question: 5 top☝
A clique in a simple undirected graph is a complete subgraph that is not contained in any larger complete
subgraph. How many cliques are there in a graph shown below?
A. 2 B. 4 C. 5 D. 6
ugcnetcse-june2016-paper2 data-structures graph-theory
Answer key☟
37.9.7 Data Structures: UGC NET CSE | September 2013 | Part 3 | Question: 15 top☝
Which of the following is the minimum cost for an assignment problem given below?
A. B. C. D.
ugcnetcse-sep2013-paper3 data-structures
Answer key☟
37.10.1 Graph Algorithms: UGC NET CSE | July 2018 | Part 2 | Question: 24 top☝
Answer key☟
37.11.1 Graph Connectivity: UGC NET CSE | September 2013 | Part 2 | Question: 20 top☝
I. A graph in which there is a unique path between every pair of vertices is a tree.
II. A connected graph with e=v-1 is a tree
III. A connected graph with e=v-1 that has no circuit is a tree
Answer key☟
37.12.1 Hashing: UGC NET CSE | August 2016 | Part 3 | Question: 32 top☝
A. B. C. D.
ugcnetcse-aug2016-paper3 data-structures hashing
Answer key☟
37.12.2 Hashing: UGC NET CSE | December 2009 | Part 2 | Question: 25 top☝
A hash function f defined as f(key) = key mod 7, with linear probing used to resolve collisions. Insert the keys
37, 38, 72, 48, 98 and 11 into the table indexed from 0 to 6.
(B) 4
(C) 5
(D) 6
Answer key☟
37.12.3 Hashing: UGC NET CSE | December 2011 | Part 2 | Question: 6 top☝
A hash table has space for records, then the probability of collision before the table is % full.
A. B. C. D.
ugcnetcse-dec2011-paper2 data-structures hashing
Answer key☟
37.12.4 Hashing: UGC NET CSE | December 2012 | Part 2 | Question: 26 top☝
A hash function defined as , with linear probing is used to insert keys 55, 58, 68,
91, 27, 145. What will be the location of 79?
A. 1 B. 2 C. 3 D. 4
ugcnetcse-dec2012-paper2 data-structures hashing
Answer key☟
37.12.5 Hashing: UGC NET CSE | December 2015 | Part 2 | Question: 35 top☝
A. B.
C. D.
ugcnetcse-dec2015-paper2 data-structures hashing
Answer key☟
37.12.6 Hashing: UGC NET CSE | July 2018 | Part 2 | Question: 23 top☝
A hash function h defined h(key)=key mod 7, with linear probing, is used to insert the keys 44, 45, 79, 55,
91, 18, 63 into a table indexed from 0 to 6. What will be the location of key 18?
A. 3 B. 4 C. 5 D. 6
ugcnetcse-july2018-paper2 data-structures hashing
Answer key☟
37.12.7 Hashing: UGC NET CSE | July 2018 | Part 2 | Question: 70 top☝
Consider a hash table of sze seven, with starting index zero, and a hash function (7x+3) mod 4. Assuming
that the hash table is initially empty, which of the following is the contents of the table when the sequence 1,
3, 8, 10 is inserted into the table using closed hashing? Here "____" denotes an empty location in the table.
Answer key☟
37.12.8 Hashing: UGC NET CSE | June 2010 | Part 2 | Question: 24 top☝
A chained hash table has an array size of . What is the maximum number of entries that can be placed
in the table ?
A. B.
C. D. There is no upper limit
ugcnetcse-june2010-paper2 data-structures hashing
Answer key☟
37.12.9 Hashing: UGC NET CSE | June 2014 | Part 2 | Question: 38 top☝
Searching for an element in the hash table requires time for the _________time, whereas for direct
addressing it holds for the _______ time.
Answer key☟
37.12.10 Hashing: UGC NET CSE | June 2014 | Part 3 | Question: 64 top☝
If is chosen from a universal collection of hash functions and is used to hash keys into a table of size ,
where , the expected number of collisions involving a particular key is
Answer key☟
37.12.11 Hashing: UGC NET CSE | Junet 2015 | Part 3 | Question: 34 top☝
Consider a hash table of size m=100 and the hash function h(k)=floor (m(kA mod 1)) for
. Compute the location to which the key k=123456 is placed in hash table
A. 77 B. 82 C. 88 D. 89
ugcnetcse-june2015-paper3 data-structures hashing
Answer key☟
37.13.1 Heap: UGC NET CSE | December 2008 | Part 2 | Question: 33 top☝
A. maximum
B. minimum
C. sum
D. product
Answer key☟
37.13.2 Heap: UGC NET CSE | January 2017 | Part 2 | Question: 23 top☝
a. b. d.
c.
A. B. C. D.
ugcnetjan2017ii data-structures heap
Answer key☟
37.13.3 Heap: UGC NET CSE | July 2018 | Part 2 | Question: 22 top☝
Consider the array A=<4, 1, 3, 2, 16, 9, 10, 14, 8, 7>. After building heap from the array A, the depth of the
heap and the right child of max-heap are ______ and _____ respectively (Root is at level 0).
A. 3, 14 B. 3, 10 C. 4, 14 D. 4, 10
ugcnetcse-july2018-paper2 data-structures heap
Answer key☟
37.13.4 Heap: UGC NET CSE | June 2013 | Part 3 | Question: 13 top☝
Answer key☟
37.13.5 Heap: UGC NET CSE | Junet 2015 | Part 3 | Question: 36 top☝
A. B.
C. ceil D. ceil
Answer key☟
37.13.6 Heap: UGC NET CSE | November 2017 | Part 3 | Question: 20 top☝
Answer key☟
37.14.1 Heap Sort: UGC NET CSE | June 2013 | Part 2 | Question: 28 top☝
Answer key☟
37.15.1 Infix Prefix: UGC NET CSE | August 2016 | Part 2 | Question: 25 top☝
A. B. C. D.
ugcnetcse-aug2016-paper2 data-structures infix-prefix
Answer key☟
37.16.1 Linked List: UGC NET CSE | August 2016 | Part 2 | Question: 21 top☝
Consider an implementation of unsorted single linked list. Suppose it has its representation with a head and
a tail pointer (i.e. pointers to the first and last nodes of the linked list). Given the representation, which of the
following operation can not be implemented in time ?
Answer key☟
37.16.2 Linked List: UGC NET CSE | December 2009 | Part 2 | Question: 24 top☝
(A) An algorithm to search for an element in a singly linked list requires 0(n)
operations in the worst case.
(B) An algorithm for deleting the first element in a singly linked list requires 0(n)
operations in the worst case.
(C) An algorithm for finding the maximum value in a circular linked list requires 0(n)
operations.
(D) An algorithm for deleting the middle node of a circular linked list requires 0(n)
operations.
Answer key☟
37.17.1 Max Heap: UGC NET CSE | June 2016 | Part 3 | Question: 33 top☝
A. [26, 13, 17, 14, 11, 9, 15] B. [26, 15, 14, 17, 11, 9, 13]
C. [26, 15, 17, 14, 11, 9, 13] D. [26, 15, 13, 14, 11, 9, 17]
ugcnetcse-june2016-paper3 data-structures max-heap
Answer key☟
37.18.1 Priority: UGC NET CSE | June 2013 | Part 2 | Question: 30 top☝
Answer key☟
A priority queue is implemented as a max-heap. Initially, it has five elements. The levelorder traversal of the
heap is as follows :
20, 18, 15, 13, 12
Two new elements ‘10’ and ‘17’ are inserted in the heap in that order. The level-order traversal of the heap after the
insertion of the element is :
A. 20, 18, 17, 15, 13, 12, 10 B. 20, 18, 17, 12, 13, 10, 15
C. 20, 18, 17, 10, 12, 13, 15 D. 20, 18, 17, 13, 12, 10, 15
ugcnetcse-aug2016-paper3 data-structures priority-queue
Answer key☟
37.19.2 Priority Queue: UGC NET CSE | June 2010 | Part 2 | Question: 22 top☝
Answer key☟
37.20.1 Queue: UGC NET CSE | August 2016 | Part 2 | Question: 24 top☝
Answer key☟
37.20.2 Queue: UGC NET CSE | December 2009 | Part 2 | Question: 23 top☝
At a hill station, the parking lot is one long drive way snaking up a hill side. Cars drive in and park right
behind the car in front of them, one behind another. A car can’t leave until all the cars in front of it have left.
Is the parking lot more like
(A) An array
(B) A stack
(C) A queue
Answer key☟
37.20.3 Queue: UGC NET CSE | June 2009 | Part 2 | Question: 26 top☝
A. B.
C. D.
ugcnetcse-june2009-paper2 data-structures queue
Answer key☟
37.20.4 Queue: UGC NET CSE | September 2013 | Part 2 | Question: 12 top☝
Answer key☟
37.21.1 Quick Sort: UGC NET CSE | September 2013 | Part 2 | Question: 10 top☝
Suppose that the splits at every level of Quicksort are in proportion , where is a
constant. The number of elements in an array is n. The maximum depth is approximately
Answer key☟
37.22.1 Radix Sort: UGC NET CSE | August 2016 | Part 3 | Question: 35 top☝
If there are integers to sort, each integer has d digits, and each digit is in the set , radix sort
can sort the numbers in :
A. B.
C. D.
ugcnetcse-aug2016-paper3 data-structures radix-sort
Answer key☟
37.22.2 Radix Sort: UGC NET CSE | July 2018 | Part 2 | Question: 28 top☝
The maximum number of comparisons needed to sort 9 items using radix sort is (assume each item is 5
digit octal number):
A. 45 B. 72 C. 360 D. 450
ugcnetcse-july2018-paper2 data-structures radix-sort
Answer key☟
37.23.1 Recursion: UGC NET CSE | January 2017 | Part 3 | Question: 24 top☝
A. B. C. D.
ugcnetcse-jan2017-paper3 data-structures recursion
Answer key☟
Match with
Let and
A. B.
C. D.
ugcnetcse-oct2020-paper2 data-structures relational-algebra
Answer key☟
37.25.1 Spanning Tree: UGC NET CSE | August 2016 | Part 3 | Question: 33 top☝
Consider a weighted complete graph on the vertex set such that the weight of the edge
is . The weight of minimum cost spanning tree of is :
A. B. C. D.
ugcnetcse-aug2016-paper3 data-structures spanning-tree
Answer key☟
37.25.2 Spanning Tree: UGC NET CSE | December 2008 | Part 2 | Question: 3 top☝
The total number of spanning trees that can be drawn using five labeled vertices is:
1. 125
2. 64
3. 36
4. 16
Answer key☟
37.26.1 Stack: UGC NET CSE | December 2006 | Part 2 | Question: 23 top☝
What is the time required to insert an element in a stack with linked implementation ?
A. B. C. D.
ugcnetcse-dec2006-paper2 stack
Answer key☟
37.26.2 Stack: UGC NET CSE | December 2012 | Part 2 | Question: 40 top☝
Given an empty stack, after performing push(1), push(2), pop, push(3), push(4), pop, pop, push(5), pop,
what is the value of the top of the stack?
A. 4 B. 3 C. 2 D. 1
ugcnetcse-dec2012-paper2 data-structures stack
Answer key☟
37.26.3 Stack: UGC NET CSE | December 2012 | Part 3 | Question: 17 top☝
Which of the following permutations can be obtained in the output using a stack of size 3 elements assuming
that input, sequence is 1, 2, 3, 4, 5?
A. 3, 2, 1, 5, 4 B. 5, 4, 3, 2, 1
C. 3, 4, 5, 2, 1 D. 3, 4, 5, 1, 2
ugcnetcse-dec2012-paper3 data-structures stack
Answer key☟
37.26.4 Stack: UGC NET CSE | December 2014 | Part 2 | Question: 08 top☝
How many PUSH and POP operations will be needed to evaluate the following expression by reverse polish
notation in a stack machine ?
Answer key☟
37.26.5 Stack: UGC NET CSE | December 2014 | Part 2 | Question: 21 top☝
Convert the following infix expression into its equivalent post fix expression ^
A. ^ B. ^
C. ^ D. ^
ugcnetcse-dec2014-paper2 data-structures stack
Answer key☟
37.26.6 Stack: UGC NET CSE | January 2017 | Part 2 | Question: 22 top☝
The seven elements and are pushed onto a stack in reverse order, i.e., starting from
. The stack is popped five times and each element is inserted into a queue. Two elements are deleted
from the queue and pushed back onto the stack. Now, one element is popped from the stack. The popped item is
___________.
A. B. C. D.
ugcnetjan2017ii data-structures stack
Answer key☟
37.26.7 Stack: UGC NET CSE | June 2010 | Part 2 | Question: 21 top☝
If we have six stack operationspushing and popping each of and -such that push must occur
before push which must occur before push , then is a possible order for the pop
operations, since this could be our sequence : push , pop , push , push , pop , pop . Which
one of the following orders could not be the order the pop operations are run, if we are to satisfy the requirements
described above?
A. B. C. D.
ugcnetcse-june2010-paper2 data-structures stack
Answer key☟
37.26.8 Stack: UGC NET CSE | June 2012 | Part 3 | Question: 38 top☝
The following postfix expression is evaluated using a stack. 823^/23*+51*- . The top two elements of the
stack after first * is evaluated
A. 6,1 B. 5, 7 C. 3,2 D. 1, 5
ugcnetcse-june2012-paper3 data-structures stack
Answer key☟
37.26.9 Stack: UGC NET CSE | June 2014 | Part 2 | Question: 40 top☝
What is the maximum number of parenthesis that will appear on the stack at any one time for parenthesis
expression given by
A.
B.
C.
D.
Answer key☟
37.26.10 Stack: UGC NET CSE | June 2014 | Part 3 | Question: 41 top☝
A. B.
C. D.
ugcnetjune2014iii data-structures stack
Answer key☟
37.26.11 Stack: UGC NET CSE | June 2016 | Part 2 | Question: 22 top☝
Answer key☟
37.26.12 Stack: UGC NET CSE | June 2016 | Part 2 | Question: 24 top☝
Answer key☟
37.27.1 Tree: UGC NET CSE | December 2012 | Part 2 | Question: 16 top☝
In which tree, for every node the height of its left subtree and right subtree differ almost by 1?
Answer key☟
37.27.2 Tree: UGC NET CSE | December 2012 | Part 2 | Question: 25 top☝
Suppose that someone starts with a chain letter. Each person who receives the letter is asked to send it on
to other people. Some people do this, while some do not send any letter. How many people have seen the
letter, including the first person, if none receives more than one letter and if the chain letter ends after there have
been 100 people who read it but did not send it out? Also find out how many people sent out the letter?
A. & B. & C. & D. &
ugcnetcse-dec2012-paper2 tree
Answer key☟
37.27.3 Tree: UGC NET CSE | December 2014 | Part 2 | Question: 02 top☝
A certain tree has two vertices of degree , one vertex of degree and one vertex of degree . If the other
vertices have degree , how many vertices are there in the graph ?
A. B. C. D.
ugcnetcse-dec2014-paper2 data-structures tree
Answer key☟
37.27.4 Tree: UGC NET CSE | December 2015 | Part 2 | Question: 5 top☝
A tree with n vertices is called graceful, if its vertices can be labelled with integers 1, , ..., n such that the
absolute value of the difference of the labels of adjacent vertices are all different. Which of the following trees
are graceful?
a.
c.
b.
Answer key☟
37.27.5 Tree: UGC NET CSE | July 2018 | Part 2 | Question: 29 top☝
A 5-ary tree in which every internal node has exactly 5 children. The number of left nodes in such a tree with
8 internal nodes will be:
A. 30 B. 33 C. 45 D. 125
ugcnetcse-july2018-paper2 data-structures tree
Answer key☟
37.27.6 Tree: UGC NET CSE | June 2010 | Part 2 | Question: 23 top☝
In a complete binary tree of n nodes, how far are the two most distant nodes ? Assume each edge in the
path counts as !
A. About B. About
C. About D. About
ugcnetcse-june2010-paper2 data-structures tree
Answer key☟
37.27.7 Tree: UGC NET CSE | June 2010 | Part 2 | Question: 32 top☝
A. B. C. D.
ugcnetcse-june2010-paper2 data-structures tree
Answer key☟
37.27.8 Tree: UGC NET CSE | June 2012 | Part 2 | Question: 13 top☝
A. Binary tree
B. B-tree
C. AVL-tree
D. Expression tree
Answer key☟
37.27.9 Tree: UGC NET CSE | June 2012 | Part 3 | Question: 36 top☝
A. 32 B. 36 C. 120 D. 42
ugcnetcse-june2012-paper3 data-structures tree
Answer key☟
37.27.10 Tree: UGC NET CSE | June 2016 | Part 2 | Question: 23 top☝
Suppose you are given a binary tree with n nodes, such that each node has exactly eiter zero or two
children. The maximum height of the tree will be
A. B. C. D.
ugcnetcse-june2016-paper2 data-structures tree
Answer key☟
37.28.1 Tree Traversal: UGC NET CSE | December 2015 | Part 2 | Question: 38 top☝
A.
B.
C.
D.
Answer key☟
Answer Keys
37.0.1 Q-Q 37.0.2 Q-Q 37.0.3 Q-Q 37.0.4 Q-Q 37.0.5 Q-Q
37.0.6 Q-Q 37.0.7 Q-Q 37.0.8 Q-Q 37.0.9 Q-Q 37.0.10 Q-Q
37.0.11 Q-Q 37.0.12 Q-Q 37.0.13 Q-Q 37.0.14 Q-Q 37.1.1 D
37.2.1 Q-Q 37.3.1 X 37.4.1 A 37.5.1 Q-Q 37.5.2 Q-Q
37.5.3 D 37.5.4 C 37.5.5 C 37.6.1 Q-Q 37.6.2 Q-Q
37.6.3 B 37.6.4 D 37.6.5 C 37.6.6 C 37.6.7 C
37.7.1 C 37.8.1 A 37.9.1 Q-Q 37.9.2 D 37.9.3 C
37.9.4 B 37.9.5 C 37.9.6 C 37.9.7 C 37.10.1 Q-Q
37.11.1 D 37.12.1 Q-Q 37.12.2 Q-Q 37.12.3 Q-Q 37.12.4 X
37.12.5 C 37.12.6 Q-Q 37.12.7 Q-Q 37.12.8 Q-Q 37.12.9 C
37.12.10 A 37.12.11 C 37.13.1 Q-Q 37.13.2 B 37.13.3 Q-Q
37.13.4 D 37.13.5 X 37.13.6 B 37.14.1 B 37.15.1 Q-Q
37.16.1 Q-Q 37.16.2 Q-Q 37.17.1 C 37.18.1 D 37.19.1 Q-Q
37.19.2 Q-Q 37.20.1 Q-Q 37.20.2 Q-Q 37.20.3 Q-Q 37.20.4 C
37.21.1 D 37.22.1 Q-Q 37.22.2 Q-Q 37.23.1 C 37.24.1 D
37.25.1 Q-Q 37.25.2 Q-Q 37.26.1 Q-Q 37.26.2 D 37.26.3 A;C
37.26.4 B 37.26.5 A 37.26.6 B 37.26.7 Q-Q 37.26.8 A
37.26.9 B 37.26.10 A 37.26.11 B 37.26.12 C 37.27.1 B
37.27.2 C 37.27.3 D 37.27.4 D 37.27.5 Q-Q 37.27.6 Q-Q
37.27.7 Q-Q 37.27.8 B 37.27.9 D 37.27.10 C 37.28.1 D
38 Programming and DS: Programming (86)
When a programming language has the capacity to produce new datatype, it is called as,
Answer key☟
Answer key☟
Answer key☟
A. B. C. D.
ugcnetcse-dec2004-paper2
Answer key☟
ugcnetcse-june2008-paper2
Answer key☟
A function object :
ugcnetcse-dec2004-paper2
Answer key☟
Answer key☟
ugcnetcse-june2008-paper2
Answer key☟
The ____ transfers the executable image of a C++ program from hard disk to main memory
Answer key☟
A. B. C. D.
ugcnetcse-june2012-paper3 programming algorithms
Answer key☟
38.0.11 UGC NET CSE | December 2012 | Part 2 | Question: 41 top☝
Enumeration is a process of
Answer key☟
A. x='A' ;
switch(x)
{case 'A'= printf ( "%d\n" , x);
....
case 'C'= printf ( "%d\n" , x);
}
B. x='A';
switch(x)
{case 'A' <= x <= 'C' : printf ( "%d\n" , x);}
C. x='A' ;
switch(x)
{
case 'A' : printf ( "%d\n" , x);
break;
case 'B' : printf ( "%d\n" , x);
break;
case 'C' : printf ( "%d\n" , x);
break;
}
D. x='A' ;
switch(x)
{
case 'A' =printf ( "%d\n" , x);
case 'B' =printf ( "%d\n" , x);
case 'C' =printf ( "%d\n" , x);
}
ugcnetcse-dec2007-paper2
Answer key☟
Code blocks allow many algorithms to be implemented with the following parameters :
Answer key☟
______ comparisons are necessary in the worst case to find both the maximum and minimum of n numbers.
A. 2n – 2 B. n + floor (lg n) – 2
C. floor ( )–2 D. 2 lg n – 2
ugcnetcse-dec2013-paper3 programming
Answer key☟
Answer key☟
In C++, which system - provided function is called when no handler is provided to deal with an exception?
Answer key☟
A. B.
C. D.
ugcnetcse-dec2013-paper3 programming
Answer key☟
Answer key☟
Which of the following concepts means adding new concepts to a program as it runs?
Answer key☟
The programming languages C and C++ are not strongly typed languages because
A. Both C and C++ allow functions for which parameters are not type checked
B. Both C and C++ allow functions for which parameters are type checked
C. Both C and C++ allow functions for which parameters are not type checked and also the union types in these
languages are not type checked.
D. Union types in these (C and C++) languages are not type checked
ugcnetcse-sep2013-paper3 programming
Answer key☟
Answer key☟
A. B. C. D.
ugcnetcse-dec2006-paper2
Answer key☟
What cannot replace ‘?’ in the following C-code to print all odd numbers less than ?
for (i=1; ? ; i=i+2)
printf("%d\n", i);
1.
2.
3.
4.
ugcnetcse-dec2007-paper2
Answer key☟
38.0.25 UGC NET CSE | June 2016 | Part 3 | Question: 20 top☝
Match the following types of variables with the corresponding programming languages :
A. B.
C. D.
ugcnetcse-june2016-paper3 programming
Answer key☟
A. B.
C. D.
ugcnetcse-dec2015-paper3 programming non-gate
Answer key☟
ugcnetcse-june2009-paper2
Answer key☟
P : “Program is a step by step execution of the instructions”. Given P, which of the following is true ?
ugcnetcse-dec2009-paper2 programming
Answer key☟
Answer key☟
There exists a construct which returns a value ‘true’ if the argument subquery is :
A. empty
B. non-empty
C. in error
D. none of the above
ugcnetcse-june2009-paper2
Answer key☟
What is the value returned by the function f given below when n=100?
let f(int n)
{ if (n==0) then return n;
else
return n+f(n-2);
}
Answer key☟
Which of the following is false regarding the evaluation of computer programming language:
Answer key☟
38.1.1 Abstract Data Type: UGC NET CSE | June 2016 | Part 3 | Question: 19 top☝
a. To implement Abstract Data Type, a programming language b. To implement ADT, a programming language requires some
require a syntactic unit to encapsulate type definition primitive operations that are built in the language processor
c. C++, Ada, Java 5.0, C#2005 provide support forWhich one of the following options is correct?
parameterised ADT
A. a, b and c are false B. a, b are true, c is false
C. a is true, b and c are false D. a, b and c are true
ugcnetcse-june2016-paper3 programming abstract-data-type
Answer key☟
38.2 Aliasing (1) top☝
38.2.1 Aliasing: UGC NET CSE | August 2016 | Part 3 | Question: 20 top☝
Answer key☟
38.3.1 Array: UGC NET CSE | June 2013 | Part 3 | Question: 48 top☝
When an array is passed as a parameter to a function which of the following statements is correct?
A. The function can values in the original array B. The function cannot values in the original array
C. Results in compilation error D. Results in run-time error
ugcnetcse-june2013-paper3 programming-in-c array
Answer key☟
38.3.2 Array: UGC NET CSE | Junet 2015 | Part 2 | Question: 11 top☝
What is the output of the following program: (Assume that the appropriate preprocessor directives are
included and there is not syntax error)
main( )
{ char S[]="ABCDEFGH";
printf("%C", *(&S[3]));
printf("%s", S+4);
printf("%u", S);
/*Base address of S is 1000 */
}
A. B. C. D.
ugcnetcse-june2015-paper2 programming-in-c array
Answer key☟
38.3.3 Array: UGC NET CSE | October 2020 | Part 2 | Question: 11 top☝
Suppose you are compiling on a machine with -byte chars, -byte shorts, -byte ints, and -byte doubles,
and with alignment rules that require the address of every primitive data element to be an integer multiple of
the element’s size. Suppose further that the compiler is not permitted to reorder fields; padding is used to ensure
alignment. How much space will be consumed by the following array?
struct {
short s;
char c;
short t;
char d;
double r;
int i;
} A[10]; /*10 element array of structs */
Answer key☟
Suppose that we have numbers between and in a binary search tree and we want to search for the
number . Which of the following sequences could not be the sequence of nodes examined ?
A.
B.
C.
D.
Answer key☟
38.5.1 Bitwise Operation: UGC NET CSE | December 2004 | Part 2 | Question: 11 top☝
Suppose and are two Integer Variables having values and respectively. The result
(in hex) of applying bitwise operator and to and will be :
1.
2.
3.
4.
Answer key☟
38.6.1 Data Types: UGC NET CSE | December 2005 | Part 2 | Question: 11 top☝
A. 4 4 4 B. 4 8 10 C. 8 4 8 D. 8 8 8
ugcnetcse-dec2005-paper2 programming-in-c data-types
Answer key☟
38.6.2 Data Types: UGC NET CSE | June 2010 | Part 2 | Question: 15 top☝
A. Class B. Structure
C. Abstract data type D. User defined data type
ugcnetcse-june2010-paper2 programming data-types
Answer key☟
38.7.1 Dynamic Memory Allocation: UGC NET CSE | June 2012 | Part 3 | Question: 24 top☝
The ____________ memory allocation function modifies the previous allocated space.
38.8.1 Evaluation Postfix: UGC NET CSE | December 2013 | Part 2 | Question: 21 top☝
What is the value of the postfix expression a b c d + - * (where a=8, b=4, c=2 and d=5)
A. B. C. 24 D. -24
ugcnetcse-dec2013-paper2 evaluation-postfix
Answer key☟
38.9.1 Exception Handling: UGC NET CSE | December 2012 | Part 2 | Question: 29 top☝
Which of the following are two special functions that are meant for handling exception, that occur during
exception handling itself?
Answer key☟
38.10.1 Expression Evaluation: UGC NET CSE | December 2004 | Part 2 | Question: 13 top☝
A. B. C. D. None of these
ugcnetcse-dec2004-paper2 programming-in-c expression-evaluation operator-precedence
Answer key☟
38.11.1 File Handling: UGC NET CSE | December 2012 | Part 2 | Question: 42 top☝
Which of the following mode declaration used in C++ to open a file for input?
Answer key☟
38.12.1 Graph Coloring: UGC NET CSE | June 2012 | Part 3 | Question: 31 top☝
A. B. C. D.
ugcnetcse-june2012-paper3 graph-theory graph-coloring
Answer key☟
is :
A. x=1
B. compilation error
C. x=20
D. none of the above
Answer key☟
38.14.1 Java: UGC NET CSE | December 2012 | Part 2 | Question: 21 top☝
Answer key☟
38.14.2 Java: UGC NET CSE | July 2018 | Part 2 | Question: 7 top☝
Answer key☟
38.14.3 Java: UGC NET CSE | June 2012 | Part 3 | Question: 26 top☝
The mechanism that binds code and data together and keeps them secure form outside world is known as
Answer key☟
38.14.4 Java: UGC NET CSE | June 2012 | Part 3 | Question: 55 top☝
Answer key☟
38.15.1 Linked List: UGC NET CSE | December 2013 | Part 2 | Question: 22 top☝
If the queue is implemented with a linked list, keeping track of a front pointer, which of these pointers will
change during an insertion into an non-empty queue?
Answer key☟
38.16.1 Loop: UGC NET CSE | December 2010 | Part 2 | Question: 14 top☝
Answer key☟
38.17.1 Object Oriented Programming: UGC NET CSE | December 2009 | Part 2 | Question: 14 top☝
Encapsulation is
Answer key☟
38.17.2 Object Oriented Programming: UGC NET CSE | December 2009 | Part 2 | Question: 14 top☝
(B) Destructor
(C) Constructor
(D) Structure
Answer key☟
38.17.3 Object Oriented Programming: UGC NET CSE | December 2009 | Part 2 | Question: 15 top☝
(D) I, II, IV
ugcnetcse-dec2009-paper2 object-oriented-programming
Answer key☟
38.18.1 Operator Precedence: UGC NET CSE | June 2010 | Part 2 | Question: 33 top☝
A. B. C. D.
ugcnetcse-june2010-paper2 programming operator-precedence
38.19.1 Pointers: UGC NET CSE | December 2014 | Part 2 | Question: 12 top☝
Answer key☟
38.19.2 Pointers: UGC NET CSE | June 2010 | Part 2 | Question: 12 top☝
void main ()
{
char *p= "ayqm";
char c;
c=++*p;
printf ("%c" , c);
}
A. B. C. D.
ugcnetcse-june2010-paper2 programming-in-c pointers
Answer key☟
38.20.1 Programming In C: Modified UGC NET 2012 Memory allocation scheme top☝
Which among the following is (are) able to modify previously allocated space
B. I , II and III
C. III only
D. II only
programming-in-c
Answer key☟
38.20.2 Programming In C: UGC NET CSE | December 2013 | Part 2 | Question: 16 top☝
Answer key☟
38.20.3 Programming In C: UGC NET CSE | December 2013 | Part 2 | Question: 17 top☝
Answer key☟
38.20.4 Programming In C: UGC NET CSE | December 2014 | Part 2 | Question: 11 top☝
main ()
{ int x = 128;
printf ("\n%d", 1+x++);
}
A. B. C. D.
ugcnetcse-dec2014-paper2 programming-in-c
Answer key☟
38.20.5 Programming In C: UGC NET CSE | June 2012 | Part 2 | Question: 38 top☝
printf(“%c”, 100);
38.20.6 Programming In C: UGC NET CSE | June 2013 | Part 3 | Question: 52 top☝
A. B.
C. D.
ugcnetcse-june2013-paper3 programming-in-c
Answer key☟
38.20.7 Programming In C: UGC NET CSE | June 2014 | Part 2 | Question: 42 top☝
Answer key☟
38.20.8 Programming In C: UGC NET CSE | June 2014 | Part 2 | Question: 43 top☝
Answer key☟
38.20.9 Programming In C: UGC NET CSE | June 2014 | Part 3 | Question: 11 top☝
A. B.
C. D.
ugcnetjune2014iii programming programming-in-c
Answer key☟
38.20.10 Programming In C: UGC NET CSE | June 2016 | Part 2 | Question: 11 top☝
Given i=0, j=1, k=-1, x=0.5, y=0.0, what is the output of the following expression in C language?
x*y<i+j k
A. -1 B. 0 C. 1 D. 2
ugcnetcse-june2016-paper2 programming-in-c
Answer key☟
38.20.11 Programming In C: UGC NET CSE | June 2016 | Part 2 | Question: 12 top☝
ugcnetcse-june2016-paper2 programming-in-c
Answer key☟
38.20.12 Programming In C: UGC NET CSE | June 2019 | Part 2 | Question: 22 top☝
S B[10];
S*p=&B[4];
S*q=&B[5];
p → U.b=0x1234;
/* structure S takes 32-bits */
A. B. C. D.
ugcnetcse-june2019-paper2 programming-in-c
Answer key☟
38.20.13 Programming In C: UGC NET CSE | Junet 2015 | Part 2 | Question: 13 top☝
A. B. C. D.
ugcnetcse-june2015-paper2 programming-in-c
Answer key☟
38.20.14 Programming In C: UGC NET CSE | September 2013 | Part 2 | Question: 35 top☝
Assume that and are non-zero positive integers. What does the following program segment perform?
while (x!=0)
{
if(x>y)
x=x-y;
else y=y-x;
printf(“%d”, x)
}
Answer key☟
38.20.15 Programming In C: UGC NET CSE | September 2013 | Part 3 | Question: 54 top☝
Answer key☟
38.21.1 Pseudocode: UGC NET CSE | June 2019 | Part 2 | Question: 21 top☝
Consider the following pseudo-code fragment in which an invariant for the loop is “ and ”
(here, and are integer variable that have been initialized):
/* Pre-conditions : */
/* Assume that overflow never occurs */
int ; int ; int ;
while {
if (k is odd) then ;
;
; /* floor */
}
Which of the following must be true ar the end of the while loop?
A. B. C. D.
ugcnetcse-june2019-paper2 pseudocode
Answer key☟
38.22.1 Row Major Address Calculation: UGC NET CSE | December 2014 | Part 2 | Question: 24 top☝
Consider an array , assume words per memory cell and the base address of array is .
What is the address of ? Assume row major storage.
A. B. C. D.
ugcnetcse-dec2014-paper2 array row-major-address-calculation
Answer key☟
38.23.1 Storage Classes In C: UGC NET CSE | June 2009 | Part 2 | Question: 16 top☝
Which of the following does not represent a valid storage class in ’c’?
A. automatic B. static
C. union D. extern
ugcnetcse-june2009-paper2 programming-in-c storage-classes-in-c
Answer key☟
38.23.2 Storage Classes In C: UGC NET CSE | June 2014 | Part 2 | Question: 41 top☝
Answer key☟
38.24.1 Tree Traversal: UGC NET CSE | Junet 2015 | Part 2 | Question: 23 top☝
Level order Traversal of a rooted Tree can be done by starting from root and performing:
Answer key☟
38.25.1 Undefined Behaviour: UGC NET CSE | June 2009 | Part 2 | Question: 15 top☝
What is the value of after the execution of the following code statements :
A.
B.
C.
D. None
Answer key☟
38.26.1 Union: UGC NET CSE | July 2018 | Part 2 | Question: 4 top☝
What is the output of the following ‘C’ program? (Assuming little – endian representation of multi-byte data in
which Least Significant Byte (LSB) is stored at the lowest memory address.)
#include<stdio.h>
#include<stdlib.h>
/* Assume short int occupies two bytes of storage */
int main ()
{
union saving
{
short int one;
char two[2];
};
union saving m;
m.two [0] =5;
m.two [1] =2;
printf(“%d, %d, %d\n”, m.two[0], m.two[1], m.one);
}/* end of main */
A. 5, 2, 1282 B. 5, 2, 52 C. 5, 2, 25 D. 5, 2, 517
ugcnetcse-july2018-paper2 programming-in-c union
Answer key☟
38.27.1 Variable Scope: UGC NET CSE | December 2008 | Part 2 | Question: 25 top☝
A. It cannot be initialized
B. It is initialized once at the commencement of execution and cannot be changed at run time
C. It retains its value during the life of the program
D. None of the above
Answer key☟
38.27.2 Variable Scope: UGC NET CSE | June 2005 | Part 2 | Question: 11 top☝
After calls of the function bug ( ) below, the values of and will be :
int j = 1;
bug ()
{
static int i = 0; int j = 0;
i++; j++;
return (i);
}
A. B. C. D.
ugcnetcse-june2005-paper2 programming-in-c variable-scope
Answer key☟
38.27.3 Variable Scope: UGC NET CSE | June 2005 | Part 2 | Question: 12 top☝
A. B. C. D.
ugcnetcse-june2005-paper2 programming-in-c variable-scope
Answer key☟
38.27.4 Variable Scope: UGC NET CSE | June 2005 | Part 2 | Question: 15 top☝
Main()
{ char *str="abcde";
printf("%c",*str);
printf("%c",*str++);
printf("%c",*(str++));
printf("%s",str);
}
The output of the above code will be :
A. B.
C. D. None of these
ugcnetcse-june2005-paper2 programming-in-c variable-scope
Answer key☟
Answer Keys
38.0.1 B 38.0.2 B 38.0.3 Q-Q 38.0.4 Q-Q 38.0.5 Q-Q
38.0.6 A 38.0.7 Q-Q 38.0.8 Q-Q 38.0.9 D 38.0.10 A
38.0.11 C 38.0.12 Q-Q 38.0.13 B 38.0.14 C 38.0.15 A
38.0.16 A 38.0.17 A 38.0.18 C 38.0.19 B 38.0.20 C
38.0.21 X 38.0.22 Q-Q 38.0.23 A 38.0.24 Q-Q 38.0.25 C
38.0.26 B 38.0.27 C 38.0.28 Q-Q 38.0.29 Q-Q 38.0.30 Q-Q
38.0.31 A 38.0.32 D 38.1.1 D 38.2.1 Q-Q 38.3.1 A
38.3.2 D 38.3.3 C 38.4.1 C 38.5.1 B 38.6.1 Q-Q
38.6.2 Q-Q 38.7.1 D 38.8.1 D 38.9.1 A 38.10.1 Q-Q
38.11.1 D 38.12.1 C 38.13.1 Q-Q 38.14.1 B 38.14.2 Q-Q
38.14.3 C 38.14.4 A 38.15.1 C 38.16.1 Q-Q 38.17.1 Q-Q
38.17.2 Q-Q 38.17.3 Q-Q 38.18.1 Q-Q 38.19.1 X 38.19.2 Q-Q
38.20.1 Q-Q 38.20.2 B 38.20.3 D 38.20.4 B 38.20.5 B
38.20.6 A 38.20.7 C 38.20.8 D 38.20.9 A 38.20.10 C
38.20.11 A 38.20.12 C 38.20.13 A 38.20.14 B 38.20.15 A
38.21.1 B 38.22.1 A 38.23.1 Q-Q 38.23.2 B 38.24.1 A
38.25.1 Q-Q 38.26.1 Q-Q 38.27.1 Q-Q 38.27.2 Q-Q 38.27.3 Q-Q
38.27.4 Q-Q
39 Theory of Computation (141)
A.
B.
C.
D.
ugcnetcse-dec2012-paper3 theory-of-computation
Answer key☟
39.0.2 UGC NET CSE | June 2012 | Part 3 | Question: 25, UGCNET-Dec2013-III: 42 top☝
Answer key☟
A. B.
C. D.
ugcnetcse-dec2013-paper3 theory-of-computation
Answer key☟
A. B.
C. D.
ugcnetcse-dec2015-paper3 theory-of-computation
Answer key☟
39.0.5 UGC NET CSE | December 2015 | Part 2 | Question: 15 top☝
A. Both time and space complexities are better in recursive than in non-recursive program
B. Both time and space complexities are better in non-recursive than in recursive program
C. Time complexity is better in recursive version but space complexity is better in non-recursive version of a
program
D. Space complexity is better in recursive version but time complexity is better in non-recursive version of a
program
ugcnetcse-dec2015-paper2 theory-of-computation
Answer key☟
i. Intersection
ii. Union
iii. Complementation
iv. Kleene Star
A. (i) and (iv) B. (i) and (iii) C. (ii) and (iv) D. (ii) and (iii)
ugcnetcse-dec2004-paper2
Answer key☟
A. B. C. D.
ugcnetcse-dec2006-paper2
Answer key☟
Then , the language accepted by the machine M, is the set of all strings having :
Answer key☟
A.
B.
C.
D.
ugcnetcse-june2013-paper3 theory-of-computation
Answer key☟
Answer key☟
Answer key☟
Answer key☟
Answer key☟
Answer key☟
Answer key☟
There are exactly ____ different finite automata with three states , and over the alphabet where
is always the start state
A. B. C. D.
ugcnetcse-dec2015-paper3 theory-of-computation
Answer key☟
A. B.
C. D.
ugcnetcse-june2012-paper3 theory-of-computation
Answer key☟
Given a Non-deterministic Finite Automaton (NFA) with states and as initial and final states respectively
and transition table as given below
The minimum number of states required in Deterministic Finite Automaton (DFA) equivalent to NFA is
A. B. C. D.
ugcnetcse-june2013-paper2 theory-of-computation
Answer key☟
Answer key☟
Answer key☟
A. B. C. D.
ugcnetcse-dec2015-paper3 theory-of-computation
Answer key☟
ugcnetcse-dec2014-paper3 theory-of-computation
Answer key☟
Any syntactic construct that can be described by a regular expression can also be described by a :
Codes:
A. B.
C. D.
ugcnetcse-june2013-paper3 theory-of-computation
Answer key☟
Answer key☟
39.1.1 Closure Property: UGC NET CSE | December 2012 | Part 3 | Question: 38 top☝
Answer key☟
39.1.2 Closure Property: UGC NET CSE | June 2012 | Part 2 | Question: 40 top☝
Answer key☟
A.
B.
C.
D.
Answer key☟
39.3.1 Conjunctive Normal Form: UGC NET CSE | July 2018 | Part 2 | Question: 35 top☝
To obtain a string of n Terminals from a given Chomsky normal from grammar, the number of productions to
be used is
A. B. C. D.
ugcnetcse-july2018-paper2 theory-of-computation conjunctive-normal-form
Answer key☟
39.4.1 Context Free Grammar: UGC NET CSE | August 2016 | Part 3 | Question: 57 top☝
Let be a context-free grammar such that every one of its productions is of the form
, with . The derivation tree for any string has a height such that
A. B.
C. D.
ugcnetcse-aug2016-paper3 theory-of-computation context-free-grammar
39.4.2 Context Free Grammar: UGC NET CSE | December 2009 | Part 2 | Question: 34 top☝
Answer key☟
39.4.3 Context Free Grammar: UGC NET CSE | December 2013 | Part 2 | Question: 27 top☝
A.
B.
C.
D.
Answer key☟
39.4.4 Context Free Grammar: UGC NET CSE | December 2014 | Part 2 | Question: 35 top☝
will generate
A. Odd numbers of and odd numbers of B. Even numbers of and even numbers of
C. Equal numbers of and D. Different numbers of and
ugcnetcse-dec2014-paper2 theory-of-computation context-free-grammar
Answer key☟
39.4.5 Context Free Grammar: UGC NET CSE | January 2017 | Part 3 | Question: 22 top☝
Let be a context-free grammer such that every one of its productions is of the form
, with . The derivation tree for any has a height such that
A.
B.
C.
D.
Answer key☟
39.4.6 Context Free Grammar: UGC NET CSE | June 2012 | Part 3 | Question: 28 top☝
(i)
(ii)
(iii)
A. (i) and (ii) B. (i) and (iii) C. (ii) and (iii) D. (i), (ii) and (iii)
ugcnetcse-june2012-paper3 theory-of-computation context-free-grammar
Answer key☟
39.4.7 Context Free Grammar: UGC NET CSE | June 2013 | Part 3 | Question: 38 top☝
For every context free grammar (G) there exists an algorithm that passes any in number of steps
proportional to
A. B.
C. D.
ugcnetcse-june2013-paper3 theory-of-computation context-free-grammar
Answer key☟
39.4.8 Context Free Grammar: UGC NET CSE | Junet 2015 | Part 3 | Question: 61 top☝
A.
B.
C.
D.
Answer key☟
39.5.1 Context Free Language: UGC NET CSE | December 2011 | Part 2 | Question: 38 top☝
Answer key☟
39.5.2 Context Free Language: UGC NET CSE | December 2018 | Part 2 | Question: 36 top☝
Consider to be any regular language and , be any two context-free languages. Which of the
following is correct?
Answer key☟
39.5.3 Context Free Language: UGC NET CSE | January 2017 | Part 3 | Question: 23 top☝
Answer key☟
39.5.4 Context Free Language: UGC NET CSE | June 2012 | Part 3 | Question: 39 top☝
A. odd number of a’s and odd number of b’s B. even number of a’s and even number of b’s
C. equal number of a’s and b’s D. not equal number of a’s and b’s
ugcnetcse-june2012-paper3 theory-of-computation context-free-language
Answer key☟
39.5.5 Context Free Language: UGC NET CSE | June 2014 | Part 2 | Question: 09 top☝
A.
B.
C.
D.
Answer key☟
39.5.6 Context Free Language: UGC NET CSE | June 2016 | Part 3 | Question: 56 top☝
ugcnetcse-june2016-paper3 context-free-language
Answer key☟
39.5.7 Context Free Language: UGC NET CSE | June 2019 | Part 2 | Question: 77 top☝
How can the decision algorithm be constructed for deciding whether context-free language is finite?
a. By constructing redundant
b. ByCFG
constructing
G in CNF non-redundant
generating
c. By constructing
language Which CFG
CFG G innon-redundant of language
CNF generating theGfollowing is correct?
in CNF generating language
Answer key☟
39.5.8 Context Free Language: UGC NET CSE | October 2020 | Part 2 | Question: 29 top☝
Answer key☟
39.6.1 Context Sensitive: UGC NET CSE | December 2015 | Part 3 | Question: 22 top☝
The family of context sensitive languages is _____ under union and ____ under reversal
39.6.2 Context Sensitive: UGC NET CSE | July 2018 | Part 2 | Question: 37 top☝
Answer key☟
39.7.1 Decidability: UGC NET CSE | December 2018 | Part 2 | Question: 37 top☝
Answer key☟
39.7.2 Decidability: UGC NET CSE | June 2019 | Part 2 | Question: 79 top☝
Which of the following problems is/are decidable problem(s) (recursively enumerable) on turing machine ?
Answer key☟
39.7.3 Decidability: UGC NET CSE | November 2017 | Part 3 | Question: 22 top☝
Answer key☟
39.7.4 Decidability: UGC NET CSE | October 2020 | Part 2 | Question: 55 top☝
Let and be arbitrary context free languages and an arbitrary regular language. Consider the
following problems:
Answer key☟
39.7.5 Decidability: UGC NET CSE | October 2020 | Part 2 | Question: 87 top☝
Answer key☟
39.8.1 Expression: UGC NET CSE | December 2015 | Part 3 | Question: 26 top☝
A. B.
C. D.
theory-of-computation regular-expression finite-automata expression ugcnetcse-dec2015-paper3
Answer key☟
39.9.1 Finite Automata: UGC NET CSE | December 2012 | Part 2 | Question: 44 top☝
Let L be set accepted by a non-deterministic finite automaton. The number of states in non-deterministic
finite automaton is . The maximum number of states in equivalent finite automaton that accepts L is
A. B.
C. D.
ugcnetcse-dec2012-paper2 theory-of-computation finite-automata
Answer key☟
39.9.2 Finite Automata: UGC NET CSE | December 2012 | Part 3 | Question: 47 top☝
The minimum number of states of the non-deterministic finite automaton which accepts the language
is
A. 3 B. 4 C. 5 D. 6
ugcnetcse-dec2012-paper3 theory-of-computation finite-automata
Answer key☟
39.9.3 Finite Automata: UGC NET CSE | December 2018 | Part 2 | Question: 32 top☝
A. B. C. D.
ugcnetcse-dec2018-paper2 theory-of-computation finite-automata
Answer key☟
39.9.4 Finite Automata: UGC NET CSE | July 2018 | Part 2 | Question: 31 top☝
A. Have the same number of edges B. Have the same number of states
C. Recognize the same set of tokens D. Have the same number of states and edges
ugcnetcse-july2018-paper2 theory-of-computation finite-automata
Answer key☟
39.9.5 Finite Automata: UGC NET CSE | July 2018 | Part 2 | Question: 32 top☝
Answer key☟
39.9.6 Finite Automata: UGC NET CSE | June 2012 | Part 3 | Question: 16 top☝
I. The power of deterministic finite state machine and non- deterministic finite state machine are same.
II. The power of deterministic pushdown automaton and non- deterministic pushdown automaton are same.
Answer key☟
39.9.7 Finite Automata: UGC NET CSE | Junet 2015 | Part 3 | Question: 19 top☝
Answer key☟
39.9.8 Finite Automata: UGC NET CSE | Junet 2015 | Part 3 | Question: 21 top☝
Answer key☟
39.9.9 Finite Automata: UGC NET CSE | November 2017 | Part 3 | Question: 23 top☝
Answer key☟
39.9.10 Finite Automata: UGC NET CSE | September 2013 | Part 2 | Question: 13 top☝
The number of states in a minimal deterministic finite automaton corresponding to the language
is
A. 3 B. 4 C. 5 D. 6
ugcnetsep2013ii theory-of-computation finite-automata
Answer key☟
39.10.1 Grammar: UGC NET CSE | August 2016 | Part 2 | Question: 35 top☝
A. The grammar , where is the only non-terminal symbol, and is the null string, is
ambiguous.
B. An unambiguous grammar has same left most and right most derivation.
C. An ambiguous grammar can never be for any .
D. Recursive descent parser is a top-down parser.
Answer key☟
39.10.2 Grammar: UGC NET CSE | December 2012 | Part 3 | Question: 42 top☝
Answer key☟
39.10.3 Grammar: UGC NET CSE | December 2014 | Part 3 | Question: 62 top☝
Answer key☟
39.10.4 Grammar: UGC NET CSE | July 2018 | Part 2 | Question: 36 top☝
Answer key☟
39.10.5 Grammar: UGC NET CSE | July 2018 | Part 2 | Question: 38 top☝
Answer key☟
39.10.6 Grammar: UGC NET CSE | June 2012 | Part 3 | Question: 32 top☝
A.
B.
C.
D.
Answer key☟
39.10.7 Grammar: UGC NET CSE | June 2013 | Part 3 | Question: 35 top☝
Which of the following is/are the fundamental semantic model(s) of parameter passing?
Answer key☟
39.10.8 Grammar: UGC NET CSE | June 2014 | Part 3 | Question: 73 top☝
Answer key☟
39.10.9 Grammar: UGC NET CSE | June 2014 | Part 3 | Question: 74 top☝
A. B.
C. D.
ugcnetjune2014iii theory-of-computation grammar
Answer key☟
39.10.10 Grammar: UGC NET CSE | Junet 2015 | Part 2 | Question: 33 top☝
If all the production rules have single non-terminal symbol on the left side, the grammar defined is:
Answer key☟
39.10.11 Grammar: UGC NET CSE | November 2017 | Part 2 | Question: 34 top☝
Answer key☟
39.10.12 Grammar: UGC NET CSE | October 2020 | Part 2 | Question: 57 top☝
Answer key☟
39.10.13 Grammar: UGC NET CSE | September 2013 | Part 2 | Question: 16 top☝
A.
B.
C.
D.
Answer key☟
39.10.14 Grammar: UGC NET CSE | September 2013 | Part 2 | Question: 17 top☝
Answer key☟
39.10.15 Grammar: UGC NET CSE | September 2013 | Part 3 | Question: 18 top☝
A. The language corresponding to the given grammar is a set of even number of a’s
B. The language corresponding to the given grammar is a set of odd number of a’s
C. The language corresponding to the given grammar is a set of even number of a’s followed by odd number of b’s
D. The language corresponding to the given grammar is a set of odd number of a’s followed by even number of b’s
Answer key☟
Answer key☟
39.11.2 Identify Class Language: UGC NET CSE | December 2019 | Part 2 | Question: 48 top☝
Answer key☟
39.11.3 Identify Class Language: UGC NET CSE | January 2017 | Part 3 | Question: 61 top☝
A. Both (A) and (B) are false. B. Both (A) and (B) are true.
C. (A) is true, (B) is false. D. (A) is false, (B) is true.
ugcnetcse-jan2017-paper3 identify-class-language
Answer key☟
39.11.4 Identify Class Language: UGC NET CSE | June 2014 | Part 3 | Question: 75 top☝
Answer key☟
39.11.5 Identify Class Language: UGC NET CSE | October 2020 | Part 2 | Question: 71 top☝
Match with
Regular language, : Context free language
Recursive langauge, : Recursively enumerable language.
A. B.
C. D.
ugcnetcse-oct2020-paper2 theory-of-computation identify-class-language
Answer key☟
39.11.6 Identify Class Language: UGC NET CSE | September 2013 | Part 3 | Question: 19 top☝
is
A. B. C. D.
ugcnetcse-sep2013-paper3 theory-of-computation identify-class-language
Answer key☟
39.11.7 Identify Class Language: UGC NET CSE | September 2013 | Part 3 | Question: 20 top☝
The language is
Answer key☟
39.11.8 Identify Class Language: UGC NET CSE | September 2013 | Part 3 | Question: 21 top☝
Answer key☟
39.12.1 Language: UGC NET CSE | November 2017 | Part 3 | Question: 24 top☝
A. regular language
B. Not a deterministic context free language but a context free language
C. Recursive and is a deterministic context free language
D. Not recursive
Answer key☟
39.13.1 Languages Classification: UGC NET CSE | June 2019 | Part 2 | Question: 76 top☝
Match with :
where Regular language
Context-free language
Recursive language
Recursively enumerable language
A. B.
C. D.
ugcnetcse-june2019-paper2 languages-classification cfl-recusive-re
Answer key☟
39.14.1 Languages Relationships: UGC NET CSE | December 2014 | Part 3 | Question: 61 top☝
Given the recursively enumerable language , the context sensitive language , the recursive
language , the context free language and deterministic context free language . The
relationship between these families is given by
A.
B.
C.
D.
ugcnetcse-dec2014-paper3 languages-relationships
Answer key☟
39.15.1 Minimal State Automata: UGC NET CSE | June 2019 | Part 2 | Question: 75 top☝
How many states are there in a minimum state automata equivalent to regular expression given below?
Regular expression is
A. B. C. D.
ugcnetcse-june2019-paper2 finite-automata minimal-state-automata
Answer key☟
Answer key☟
39.17.1 Pumping Lemma: UGC NET CSE | December 2013 | Part 3 | Question: 40 top☝
A. B.
C. D.
ugcnetcse-dec2013-paper3 theory-of-computation context-free-language pumping-lemma
Answer key☟
39.17.2 Pumping Lemma: UGC NET CSE | November 2017 | Part 3 | Question: 19 top☝
A. Iteration B. Recursion
C. The divide and conquer principle D. The pigeon – hole principle
ugcnetcse-nov2017-paper3 theory-of-computation pumping-lemma
Answer key☟
39.17.3 Pumping Lemma: UGC NET CSE | November 2017 | Part 3 | Question: 21 top☝
A. Whether two given regular expressions are equivalent B. A given grammar is ambiguous
C. A given grammar is regular D. A given grammar is not regular
ugcnetcse-nov2017-paper3 theory-of-computation pumping-lemma
Answer key☟
39.18.1 Pushdown Automata: UGC NET CSE | December 2014 | Part 3 | Question: 22 top☝
A. B.
C. D.
ugcnetcse-dec2014-paper3 theory-of-computation pushdown-automata
Answer key☟
39.18.2 Pushdown Automata: UGC NET CSE | July 2018 | Part 2 | Question: 33 top☝
A pushdown automata behaves like a Turing machine when the number of auxiliary memory is
A. 0 B. 1 C. 1 or more D. 2 or more
ugcnetcse-july2018-paper2 theory-of-computation pushdown-automata
Answer key☟
39.18.3 Pushdown Automata: UGC NET CSE | July 2018 | Part 2 | Question: 34 top☝
Answer key☟
39.18.4 Pushdown Automata: UGC NET CSE | June 2013 | Part 3 | Question: 37 top☝
Answer key☟
39.18.5 Pushdown Automata: UGC NET CSE | September 2013 | Part 3 | Question: 22 top☝
Non-deterministic pushdown automaton that accepts the language generated by the grammar:
is
A.
B.
C.
D.
39.19.1 Recursive And Recursively Enumerable Languages: UGC NET CSE | January 2017 | Part 3 | Question:
63 top☝
Answer key☟
39.19.2 Recursive And Recursively Enumerable Languages: UGC NET CSE | Junet 2015 | Part 3 | Question:
62 top☝
Answer key☟
39.19.3 Recursive And Recursively Enumerable Languages: UGC NET CSE | October 2020 | Part 2 | Question:
27 top☝
Consider where
Answer key☟
39.20.1 Regular Expression: UGC NET CSE | August 2016 | Part 2 | Question: 31 top☝
The number of strings of length 4 that are generated by the regular expression , where |
is an alternation character and are quantification characters, is :
A. B. C. D.
ugcnetcse-aug2016-paper2 theory-of-computation regular-expression
Answer key☟
39.20.2 Regular Expression: UGC NET CSE | August 2016 | Part 3 | Question: 24 top☝
A. (a) and (b) only B. (b) and (c) only C. (c) and (a) only D. (a), (b) and (c)
ugcnetcse-aug2016-paper3 theory-of-computation regular-expression
Answer key☟
39.20.3 Regular Expression: UGC NET CSE | December 2014 | Part 3 | Question: 24 top☝
A. B.
C. D. None of the above
ugcnetcse-dec2014-paper3 theory-of-computation regular-expression regular-language
Answer key☟
39.20.4 Regular Expression: UGC NET CSE | January 2017 | Part 2 | Question: 31 top☝
I.
II.
III.
IV.
V.
VI.
Answer key☟
39.20.5 Regular Expression: UGC NET CSE | June 2010 | Part 2 | Question: 3 top☝
Answer key☟
39.20.6 Regular Expression: UGC NET CSE | June 2012 | Part 3 | Question: 35 top☝
Consider the regular expression (a+b)(a+b) ..... (a+b) (n-times). The minimum number of states in finite
automaton that recognizes the language represented by this regular expression contains
Answer key☟
39.20.7 Regular Expression: UGC NET CSE | June 2012 | Part 3 | Question: 43 top☝
Answer key☟
39.20.8 Regular Expression: UGC NET CSE | June 2016 | Part 2 | Question: 31 top☝
The number of strings of length 4 that are generated by the regular expression
, where is an alternation character, are quantification characters, and is the null string, is:
A. 08 B. 10 C. 11 D. 12
ugcnetcse-june2016-paper2 theory-of-computation regular-expression
Answer key☟
39.20.9 Regular Expression: UGC NET CSE | June 2016 | Part 3 | Question: 23 top☝
A.
B.
C.
D.
Answer key☟
39.20.10 Regular Expression: UGC NET CSE | June 2016 | Part 3 | Question: 24 top☝
is any subset of 0*
Which of the following is correct?
Answer key☟
39.20.11 Regular Expression: UGC NET CSE | June 2016 | Part 3 | Question: 55 top☝
Let L be the language generated by regular expression 0*10* and accepted by the deterministic finite
automata M. Consider the relation defined by M as all states that are reachable from the start state.
has ___ equivalence classes.
A. 2 B. 4 C. 5 D. 6
ugcnetcse-june2016-paper3 theory-of-computation regular-expression regular-language
Answer key☟
39.20.12 Regular Expression: UGC NET CSE | Junet 2015 | Part 3 | Question: 20 top☝
Answer key☟
39.20.13 Regular Expression: UGC NET CSE | November 2017 | Part 2 | Question: 33 top☝
Which of the following regular expressions, each describing a language of binary numbers (MSB to LSB)
that represents non-negative decimal values, does not include even values?
A. B. C. D. Where are
quantification
characters.
Answer key☟
39.20.14 Regular Expression: UGC NET CSE | October 2020 | Part 2 | Question: 28 top☝
A. B.
C. D.
ugcnetcse-oct2020-paper2 theory-of-computation regular-expression
Answer key☟
39.20.15 Regular Expression: UGC NET CSE | October 2020 | Part 2 | Question: 79 top☝
a. b.
c. Choose the correct answer from the options given
below based on the relation between the languages generated by the regular expressions above:
A. B.
C. D.
ugcnetcse-oct2020-paper2 theory-of-computation regular-expression
Answer key☟
39.20.16 Regular Expression: UGC NET CSE | September 2013 | Part 2 | Question: 14 top☝
A. B.
C. D.
ugcnetsep2013ii theory-of-computation regular-expression
Answer key☟
39.20.17 Regular Expression: UGC NET CSE | September 2013 | Part 2 | Question: 15 top☝
Answer key☟
https://gateoverflow.in/13365/ugcnet-dec2014-iii-24
i’ve a small doubt in the solution of this question
how is (a+b)*ba(a+b)* complement of the given language?
regular-language regular-grammar
Answer key☟
39.21.2 Regular Grammar: UGC NET CSE | August 2016 | Part 3 | Question: 22 top☝
(1)
(2)
(3)
(4)
Answer key☟
39.21.3 Regular Grammar: UGC NET CSE | June 2014 | Part 2 | Question: 10 top☝
The regular grammar for the language L= { (w) and are both even, * } is given by :
(Assume, and are states)
Answer key☟
39.21.4 Regular Grammar: UGC NET CSE | September 2013 | Part 3 | Question: 17 top☝
A.
B.
C.
D.
Answer key☟
39.22.1 Regular Language: UGC NET CSE | August 2016 | Part 3 | Question: 55 top☝
Answer key☟
39.22.2 Regular Language: UGC NET CSE | December 2013 | Part 2 | Question: 28 top☝
Answer key☟
39.22.3 Regular Language: UGC NET CSE | December 2014 | Part 3 | Question: 23 top☝
Answer key☟
39.22.4 Regular Language: UGC NET CSE | January 2017 | Part 3 | Question: 19 top☝
a. Strings of even number of a’s b. Strings of a’s , whose length is a prime number.
c. Set of all palindromes made up of a’s and b’s. d. Strings of a’s whose length is a perfect square.
A. (a) and (b) only B. (a), (b) and (c) only
C. (b),(c) and (d) only D. (b) and (d) only
ugcnetcse-jan2017-paper3 theory-of-computation regular-language
Answer key☟
39.22.5 Regular Language: UGC NET CSE | January 2017 | Part 3 | Question: 20 top☝
A. B. C. D.
ugcnetcse-jan2017-paper3 theory-of-computation regular-language
Answer key☟
39.22.6 Regular Language: UGC NET CSE | January 2017 | Part 3 | Question: 21 top☝
a. A class of languages that is closed under union and b. A class of languages that is closed under union and
complementation has to be closed under intersection intersection has to be closed under complementation
Which of the following options is correct?
A. Both (a) and (b) are false B. Both (a) and (b) are true
C. (a) is true, (b) is false D. (a) is false, (b) is true
ugcnetcse-jan2017-paper3 theory-of-computation regular-language
Answer key☟
39.22.7 Regular Language: UGC NET CSE | June 2014 | Part 3 | Question: 15 top☝
Let be any language. Define as the strings obtained by extracting from the letters in the
even-numbered positions and We define another language
by removing the two leftmost symbols of every string in given by with If
is regular language then
Answer key☟
39.22.8 Regular Language: UGC NET CSE | June 2016 | Part 3 | Question: 22 top☝
A. The family of regular languages is closed under symmetric difference but not closed under nor
B. The family of regular languages is closed under nor but not closed under symmetric difference
C. The family of regular languages are closed under both symmetric difference and nor
D. The family of regular languages are not closed under both symmetric difference and nor
Answer key☟
39.22.9 Regular Language: UGC NET CSE | October 2020 | Part 2 | Question: 56 top☝
Answer key☟
39.22.10 Regular Language: UGC NET CSE | September 2013 | Part 3 | Question: 16 top☝
Answer key☟
39.23.1 Right Quotient: UGC NET CSE | June 2013 | Part 2 | Question: 20 top☝
Given L1=L(a*baa*) L2=L(ab*). The regular expression corresponding to language L3=L1/L2 (right quotient)
is given by
Answer key☟
39.24.1 Strings: UGC NET CSE | June 2019 | Part 2 | Question: 78 top☝
Which of the following statements is/are true about the above grammar?
Answer key☟
39.25.1 Turing Machine: UGC NET CSE | August 2016 | Part 3 | Question: 56 top☝
A. B. C. D.
ugcnetcse-aug2016-paper3 theory-of-computation turing-machine
Answer key☟
39.25.2 Turing Machine: UGC NET CSE | January 2017 | Part 3 | Question: 62 top☝
Answer key☟
39.25.3 Turing Machine: UGC NET CSE | July 2018 | Part 2 | Question: 40 top☝
Answer key☟
39.25.4 Turing Machine: UGC NET CSE | June 2016 | Part 3 | Question: 57 top☝
Answer key☟
39.25.5 Turing Machine: UGC NET CSE | June 2019 | Part 2 | Question: 80 top☝
For a statement
A language is recursive if there exists some turing machine . Which of the following conditions is
satisfied for any string ?
A. If , then accepts and will not halt
B. If , then accepts and will halt by reaching at final state
C. If , then halts without reaching to acceptable state
D. If , then halts without reaching to an acceptable state
ugcnetcse-june2019-paper2 turing-machine
Answer key☟
Answer Keys
39.0.1 B 39.0.2 B 39.0.3 C 39.0.4 D 39.0.5 B
39.0.6 Q-Q 39.0.7 Q-Q 39.0.8 Q-Q 39.0.9 A 39.0.10 B
39.0.11 C 39.0.12 A 39.0.13 Q-Q 39.0.14 A 39.0.15 C
39.0.16 B 39.0.17 B 39.0.18 B 39.0.19 C 39.0.20 A
39.0.21 Q-Q 39.0.22 A 39.0.23 B 39.0.24 Q-Q 39.0.25 C
39.0.26 B 39.1.1 B 39.1.2 B 39.2.1 Q-Q 39.3.1 Q-Q
39.4.1 Q-Q 39.4.2 Q-Q 39.4.3 D 39.4.4 X 39.4.5 D
39.4.6 C 39.4.7 D 39.4.8 C 39.5.1 Q-Q 39.5.2 Q-Q
39.5.3 C 39.5.4 C 39.5.5 D 39.5.6 C 39.5.7 C
39.5.8 A 39.6.1 B 39.6.2 Q-Q 39.7.1 Q-Q 39.7.2 C
39.7.3 D 39.7.4 D 39.7.5 A 39.8.1 B 39.9.1 D
39.9.2 C 39.9.3 Q-Q 39.9.4 Q-Q 39.9.5 Q-Q 39.9.6 B
39.9.7 D 39.9.8 D 39.9.9 C 39.9.10 C 39.10.1 Q-Q
39.10.2 B 39.10.3 B 39.10.4 Q-Q 39.10.5 Q-Q 39.10.6 D
39.10.7 D 39.10.8 D 39.10.9 C 39.10.10 A 39.10.11 D
39.10.12 D 39.10.13 C 39.10.14 A 39.10.15 B 39.11.1 X
39.11.2 Q-Q 39.11.3 B 39.11.4 D 39.11.5 C 39.11.6 B
39.11.7 A 39.11.8 B 39.12.1 C 39.13.1 B 39.14.1 D
39.15.1 C 39.16.1 B 39.17.1 B 39.17.2 D 39.17.3 D
39.18.1 B 39.18.2 Q-Q 39.18.3 Q-Q 39.18.4 C 39.18.5 B
39.19.1 B 39.19.2 D 39.19.3 C 39.20.1 Q-Q 39.20.2 Q-Q
39.20.3 D 39.20.4 D 39.20.5 Q-Q 39.20.6 B 39.20.7 D
39.20.8 D 39.20.9 D 39.20.10 B 39.20.11 D 39.20.12 C
39.20.13 C 39.20.14 C 39.20.15 B 39.20.16 D 39.20.17 A
39.21.1 Q-Q 39.21.2 Q-Q 39.21.3 C 39.21.4 D 39.22.1 Q-Q
39.22.2 C 39.22.3 D 39.22.4 C 39.22.5 D 39.22.6 C
39.22.7 B 39.22.8 C 39.22.9 X 39.22.10 B 39.23.1 C
39.24.1 D 39.25.1 Q-Q 39.25.2 C 39.25.3 Q-Q 39.25.4 C
39.25.5 C
40 Unknown Category (201)
a. A sentence entails b.
another
Forward
sentence
chaining ifandc.
isbackward
true
Sound
in few
inference
chaining
worldsalgorithms
are
where
d.
very
Propositional
natural
isderive
true reasoning
all sentences
logic does Choose
algorithms
not
thatscale the
areforentailed
to correct
knowledge
environments
basesofinunbou
Horn
answer from the
options given below:
Answer key☟
A. Class templates and function templates are instantiated in the same way
B. Class templates differ from function templates in the way they are initiated
C. Class template is initiated by defining an object using the template argument
D. Class templates are generally used for storage classes
ugcnetcse-nov2017-paper2
Answer key☟
A. B.
C. D.
ugcnetcse-nov2017-paper2
Answer key☟
is
A. B.
C. D.
ugcnetcse-nov2017-paper2
A. B.
C. D. Depends on compiler
ugcnetcse-nov2017-paper2
Answer key☟
Answer key☟
The value of is
A. B.
C. D.
ugcnetcse-nov2017-paper2
Answer key☟
ugcnetcse-nov2017-paper2
Answer key☟
_________ do not take their decisions on measurements or estimates of the current traffic and topology.
Answer key☟
Answer key☟
Consider an array representation of an element binary heap where the elements are stored from index
to index of the array. For the element stored at index of the array , the index of the parent is
A. B.
C. D.
ugcnetcse-nov2017-paper2
Answer key☟
How many distinguishable permutations of the letters in the word of BANANA are there?
A. B. C. D.
ugcnetcse-nov2017-paper2
Answer key☟
In RDBMS, different classes of relations are created using ________ technique to prevent modification
anomolies.
Answer key☟
Answer key☟
A. B.
C. D.
ugcnetcse-nov2017-paper2 databases
Answer key☟
The following numbers are inserted into an empty binary search tree in the given order:
. What is the height of the binary search tree?
A. B. C. D.
ugcnetcse-nov2017-paper2
Answer key☟
Post-order traversal of a given binary search tree produces following sequence of keys:
. Which one of the following sequences of keys can be the result of an in-
order traversal of the tree ?
A. B.
C. D.
ugcnetcse-nov2017-paper2
Answer key☟
Which of the following devices takes data sent from one network device and forwards it to the destination
node based on MAC address?
Answer key☟
A. B. C. D.
ugcnetcse-nov2017-paper3
Answer key☟
A. B. C. D.
ugcnetcse-nov2017-paper3
Answer key☟
Read
Write
Execute permission
permission
permission
for owner
for group
for others
A. Only (a) B. Only (b) C. Both (a) and (b) D. Neither (a) nor (b)
ugcnetcse-nov2017-paper3
Answer key☟
A.
B.
C.
D.
ugcnetcse-nov2017-paper2
A. B. C. D.
ugcnetcse-nov2017-paper2
Answer key☟
Entropy of a discrete random variable with possible values and probability density
function is
Suppose there are six files with corresponding sizes KB, KB, KB
KB, KB and KB respectively. The files are to be stored on a sequential device in such a way that
optimizes access time. In what order should the files be stored?
A. B.
C. D.
ugcnetcse-nov2017-paper2
Answer key☟
Answer key☟
Answer key☟
Answer key☟
i.
ii.
Answer key☟
In Distributed system, the capacity of a system to adapt the increased service load is called
Answer key☟
Which module gives control of the CPU to the process selected by the short-term schedular?
Answer key☟
Software does not wear-out in the traditional sense of the term, but software does tend to deteriorate as it
evolves, because
ugcnetcse-nov2017-paper2
Answer key☟
Answer key☟
A. Re-constructing the original source code from the existing machine (low-level) code program and modifying it ti
make it more user-friendly
B. Scrapping the source code of a software and re-writing it entirely from scratch
C. Re-organising and modifying existing software systems to make them more maintainable
D. Translating source code of an existing software to a new machine (low-level) language
ugcnetcse-nov2017-paper2
Answer key☟
Which of the following is not a key issue stressed by an agile philosophy of software engineering?
A. The importance of self-organizing teams as well as communication and collaboration between team members
and customers
B. Recognition that change represents opportunity
C. Emphasis on rapid delivery of software that satisfies the customer
D. Having a separate testing phase after a build phase
ugcnetcse-nov2017-paper2
Answer key☟
A member function can always access the data in, (in C++)
Answer key☟
A list of n strings, each of length n, is sorted into lexicographic order using merge - sort algorithm. The worst
case running time of this computation is:
A. B. C. D.
ugcnetcse-nov2017-paper2
40.0.38 UGC NET CSE | November 2017 | Part 2 | Question: 44 top☝
What is the normal order of activities in which traditional software testing is organized?
Answer key☟
Which of the given wireless technologies used in IoT, consumes the least amount of power?
Answer key☟
Find the equation of the circle in terms of coordinates, assuming that the coordinate
system results from a scaling of units in the direction and units in the direction.
A.
B.
C.
D.
ugcnetcse-nov2017-paper3
Answer key☟
Find the normalization transformation that maps a window whose lower left corner is at and upper
right corner is at onto a viewpoint that is the entire normalized device screen
A.
B.
C.
D.
ugcnetcse-nov2017-paper3
Answer key☟
You are given a sequence of elements to sort. The input sequence consists of subsequences, each
containing elements. The elements in a given subsequence are all smaller than the elements in the succeeding
subsequence and larger than the elements in the preceding subsequence. Thus, all that is needed to sort the whole
sequence of length is to sort the elements in each of the subsequences.
The lower bound on the number of comparisons needed to solve this variant of the sorting problem is
A.
B.
C.
D.
ugcnetcse-nov2017-paper3
Answer key☟
A. B. C. D.
ugcnetcse-nov2017-paper3
Answer key☟
Let be an undirected connected graph with distinct edge weight. Let be the edge with maximum
weight and the edge with minimum weight. Which of the following statements is false?
ugcnetcse-nov2017-paper2
Answer key☟
Answer key☟
ugcnetcse-nov2017-paper3
where is
A. B. C. D.
ugcnetcse-nov2017-paper3
Match with
A. B.
C. D.
ugcnetcse-oct2020-paper1
Answer key☟
ugcnetcse-nov2017-paper3
Answer key☟
40.0.50 UGC NET CSE | November 2017 | Part 3 | Question: 39 top☝
A. B. C. D.
ugcnetcse-nov2017-paper3
A simple stand – alone software utility is to be developed in ‘C’ programming by a team of software experts
for a computer running Linux and the overall size of this software is estimated to be lines of code.
Considering as multiplicative and exponention factor for the basic COCOMO effort estimation
equation and as multiplicative and exponention factor for the basic COCOMO development
time estimation equation, approximately how long does the software project take to complete?
Answer key☟
ugcnetcse-nov2017-paper3
Answer key☟
40.0.54 UGC NET CSE | November 2017 | Part 3 | Question: 46 top☝
If
Number of tests to exhaustively test mcq();
Minimum number of tests to achieve full statement coverage for mcq (); and
Minimum number of tests to achieve full branch coverage for mcq ( );
then ______________
A. B. C. D.
ugcnetcse-nov2017-paper3
Answer key☟
Which of the following statements is/are FALSE with respect to software testing?
: White-box tests are based on specifications; better at telling whether program meets specification,
better at finding errors of ommission.
: Black-box tests are based on code; better for finding crashes, out of bounds errors, file not closed errors.
: Alpha testing is conducted at the developer’s site by a team of highly skilled testers for software that is
developed as a product to be used by many customers.
A signal processor software is expected to operate for days after repair, and the mean software repair
time is expected to be minutes. Then, the availability of the software is
A. B. C. D.
ugcnetcse-nov2017-paper3
User level threads are threads that are visible to the programmer and are unknown to the kernel. The
operating system kernel supports and manages kernel level threads. Three different types of models relate
user and kernel level threads.
Which of the following statements is/are true?
a. b.
i. The Many – to – one model maps many user threads to i. Many – to – one model maps many kernel threads to
one kernel thread one user thread
ii. The one – to – one model maps one user thread to one ii. One – to – one model maps one kernel thread to one
kernel thread user thread
iii. The many – to – many model maps many user threads iii. Many – to – many model maps many kernel threads to
to smaller or equal kernel threads smaller or equal user threads
A. (a) is true; (b) is false B. (a) is false; (b) is true
C. Both (a) and (b) are true D. Both (a) and (b) are false
ugcnetcse-nov2017-paper3
Answer key☟
Consider the following four processes with the arrival time and length of CPU burst given in milliseconds:
The average waiting time for preemptive SJF scheduling algorithm is ____________
A. ms B. ms C. ms D. ms
ugcnetcse-nov2017-paper3
Answer key☟
Consider a system with five processes through and three resource types and . Resource type
has seven instances, resource type has two instances and resource type has six instances suppose
at time we have the following allocation.
Answer key☟
If is the branching factor and is the maximum depth of the search tree, what is the space complexity of
greedy search?
A. B. C. D.
ugcnetcse-nov2017-paper3
Answer key☟
A. B. C. D.
ugcnetcse-nov2017-paper3
ugcnetcse-nov2017-paper3
Let and be Propositions. Assume that the equivalences and hold. Then
the truth value of the formula is always
A. True B. False
C. Same as truth table of D. Same as truth table of
ugcnetcse-nov2017-paper3
Answer key☟
“If , then unless ” is represented by which of the following formulae in propositional logic?
A. B.
C. D.
ugcnetcse-nov2017-paper3
Answer key☟
Answer key☟
40.0.69 UGC NET CSE | November 2017 | Part 3 | Question: 42 top☝
Answer key☟
Answer key☟
A. and B. and
C. and D. and
ugcnetcse-nov2017-paper3
Answer key☟
A. B. C. D.
ugcnetcse-dec2018-paper2
Answer key☟
Which of the following is a valid reason for causing degeneracy in a transportation problem? Here is
number of rows and is number of columns in transportation table.
ugcnetcse-nov2017-paper3
Answer key☟
A. and B. and
C. and D. and
ugcnetcse-nov2017-paper3
Answer key☟
A.
B.
C.
D.
ugcnetcse-nov2017-paper3
Answer key☟
Consider a single perceptron with sign activation function. The perceptron is represented by weight vector
and a bias . If the input vector to the perceptron is then
the output of the perceptron is
A. B. C. D.
ugcnetcse-nov2017-paper3
Answer key☟
B.
A.
C. D.
ugcnetcse-nov2017-paper3
Answer key☟
Which of the following routing technique / techniques is/are used in distributed systems?
A. (a) only B. (a) and (b) only C. (c) only D. All (a), (b), (c)
ugcnetcse-nov2017-paper3
Answer key☟
A. B. C. D.
ugcnetcse-nov2017-paper3
Answer key☟
40.0.80 UGC NET CSE | December 2018 | Part 2 | Question: 99 top☝
A.
B.
C.
D.
ugcnetcse-dec2018-paper2
Answer key☟
Consider a vocabulary with only four propositions A, B, C and D. How many models are there for the
following sentence?
A. B. C. D.
ugcnetcse-dec2018-paper2
Answer key☟
A.
B.
C.
D.
ugcnetcse-dec2018-paper2
Answer key☟
In Software Configuration Management (SCM), which of the following is a use-case supported by standard
version control systems?
a. Managing several versions or release of a software b. Filing bug reports and tracking their progress
c. Allowing team members to work in parallel d. Identifying when and where a regression occurred
A. Only (a), (c), and (d) B. Only (a), (b), and (c)
C. Only (a), (b), and (d) D. Only (b), (c), and (d)
ugcnetcse-nov2017-paper3
Answer key☟
40.0.84 UGC NET CSE | December 2018 | Part 2 | Question: 95 top☝
ugcnetcse-dec2018-paper2
Answer key☟
Match List I with List II and choose the correct answer from the code given below.
List I List II
Selects a node for
Greedy Best- expansion if optimal
(a) (i)
First Search path to that node
has been found
Avoids substantial
overhead
(b) A* Search (ii) associated with
keeping the sorted
queue of nodes
Suffers from
Recursive Best-
(c) (iii) excessive node
First Search
generation
Iterative- Time complexity
(d) deepening A* (iv) depends on the
Search quality of heuristic
Code:
ugcnetcse-dec2018-paper2
Consider the following terminology and match List I with List II and choose the correct answer from the code
given below.
b= branching factor
d = depth of the shallowest solution
m= maximum depth of the search tree
l=depth limit
Code:
ugcnetcse-dec2018-paper2
Answer key☟
ugcnetcse-dec2018-paper2
Answer key☟
Answer key☟
Answer key☟
40.0.91 UGC NET CSE | November 2017 | Part 3 | Question: 61 top☝
ugcnetcse-nov2017-paper3
An XML document that adheres to syntax rules specified by XML specification in that it must satisfy both
physical and logical structured, is called
Answer key☟
Performance
Roll-No Course Marks
18CS101 DBMS 60
18CS101 Compiler Design 65
18CS102 DBMS 80
18CS103 DBMS 85
18CS102 Compiler Design 75
18CS103 Operating System 70
Primary keys in the tables are shown using underline. Now, consider the following query:
SELECT S.Name, Sum (P.Marks) FROM Students, Performance P WHERE S.Roll-No=P.Roll-No GROUP BY S.Name
A. B. C. D.
ugcnetcse-dec2018-paper2 databases
Answer key☟
Which of the International Agreements/Convention/Protocols are legally binding on the member countries
(parties)?
a. Convention on Biological
b. Kyoto
Diversity
Protocol c. Montreal Protocol d. Paris Agreement Choose the most
appropriate answer
from the options given below:
If is the minimum number of tests to achieve full statement coverage for , and is the minimum number of
tests to achieve full branch coverage for , then =
A. B. C. D.
ugcnetcse-dec2018-paper2
Answer key☟
Answer key☟
In Linux operating system environment ____ command is used to print a file.
Answer key☟
A. B. C. D. Broadband
ugcnetcse-dec2018-paper2
ugcnetcse-dec2018-paper2
Answer key☟
A. B.
C. D.
The four byte IP address consists of
Answer key☟
Match the following Secret Key Algorithms (list I) with Corresponding Key Lengths (List II) and choose the
correct answer from the code given below:
Code:
ugcnetcse-dec2018-paper2
Answer key☟
Software coupling involves dependencies among pieces of software called modules. Which of the following
are correct statements with respect to module coupling ?
P : Common coupling occurs when two modules share the same global data
Q : Control coupling occurs when modules share a composite data structure and use only parts of it
R : Content coupling occurs when one module modifies or relies on the internal working of another module
Choose the correct answer from the code given below :
A. P and Q only B. P and R only C. Q and R only D. All of P, Q and R
ugcnetcse-dec2018-paper2
Which of the following is not one of the principles of agile software development method?
Answer key☟
Answer key☟
Software products need perfective maintenance for which of the following reasons?
ugcnetcse-dec2018-paper2
Answer key☟
The Software Requirement Specification is said to be _____ if and only if no subset of individual
requirements described in it conflict with each other.
Answer key☟
A computer uses a memory unit with K words of bits each. A binary instruction code is stored in one
word of memory. The instruction has four parts: an indirect bit, an operation code and a register code part to
specify one of registers and an address part. How many bits are there in the operation code, the register code
part and the address part?
A. B. C. D.
ugcnetcse-dec2018-paper2
Answer key☟
A. only B. only
C. only D. only
ugcnetcse-oct2020-paper1
Which one of the following schools has not accepted anumana (inference) as a valid source of knowledge?
Answer key☟
Given below are two statements: One is labelled as Assertion and the other is labelled as Reason
In the light of the above statements, choose the correct answer from the options given below:
ugcnetcse-oct2020-paper1
Answer key☟
Answer key☟
A process residing in Main Memory and Ready and Waiting for execution, is kept on
Answer key☟
An attribute of datatype varchar( ) has the value , and the attribute of datatype char( ) has the
value , then the attribute has _____ spaces and attribute has ____ spaces.
A. B. C. D.
ugcnetcse-dec2018-paper2
Answer key☟
In a park, and are sitting. is the brother of ’s husband and son of . is the
daughter of and sister of .
Answer key☟
What does the following Java function perform? (Assume int occupies four bytes of storage)
public static int f(int a)
{ // Pre-conditions : a > 0 and no oveflow/underflow occurs
int b=0;
for (int i=0; i<32; i++)
{
b = b<<1;
b=b | ( a & 1);
a=a >>>1; // This is a logical shift
}
return b;
}
ugcnetcse-dec2018-paper2
Answer key☟
Consider the following two programs and and two statements and about these
programs:
void f(int a, int *b, int double a=1, b=2;
&c) double &f(double
{ &d)
a=1; {
*b=2; d=4;
c=3; return b;
} }
int main() int main()
{ {
int i=0; f(a)=5;
f(i, &i, i); count < < a< < “:” <
count <<i; < b;
} }
: prints out
: prints out
What can you say about the statements and ?
Answer key☟
Consider the following pseudo-code fragment, where is a non-negative integer that has been initialized:
while
end while
Which of the following is a loop invariant for the while statement?
(Note: a loop invariant for a while statement is an assertion that is true each time the guard is evaluated during the
execution of the while statement).
A. and B. and
C. and D. and
ugcnetcse-dec2018-paper2
Answer key☟
In Graphics, which of the following statements about perspective and parallel projection is/are true?
P : In a perspective projection, the farthest an object is from the center of projection, the smaller it appears
Q : Parallel projection is equivalent to a perspective projection where the viewer is standing infinitely far away
R : Perspective projections do not preserve straight lines.
Choose the correct answer from the code given below:
Answer key☟
Consider the midpoint (or Bresenham) algorithm for rasterizing lines given below:
1. Input and
2.
3. //f is the implicit form of a line
4. for to
5. do
6. plot
7. if
8. then
9.
10.
11. else
12.
13. end
14. end
Which homogeneous matrix transforms the figure (a) on the left side to figure (b) on the right?
A.
B.
C.
D.
ugcnetcse-dec2018-paper2
Answer key☟
If the frame buffer has -bits per pixel and -bits are allocated for each of the , and components,
then what would be the size of the color lookup table (LUT)?
A. bytes B. bytes
C. bytes D. bytes
ugcnetcse-dec2018-paper2
Answer key☟
The grammar is not suitable for predictive parsing because the grammar is
Answer key☟
A. Is ? B. Is , where is a string ?
C. Is ? D. Is , where is a given regular set ?
ugcnetcse-dec2018-paper2
Answer key☟
A. is bipartite B. is -colorable
C. has cycles of odd length D. has no cycles of odd length
ugcnetcse-dec2018-paper2
Data warehouse contains _____ data that is never found in operational environment.
Answer key☟
In a ternary tree, the number of internal nodes of degree and is , and respectively. The number
of leaf nodes in the ternary tree is
A. B. C. D.
ugcnetcse-dec2018-paper2
Answer key☟
If a graph (G) has no loops or parallel edges, and if the number of vertices (n) the graph is , then
graph G is Hamiltonian if
A. (i) and (iii) only B. (ii) only C. (ii) and (iii) only D. (iii) only
ugcnetcse-dec2018-paper2
Answer key☟
Consider a system with level cache. Access times of Level cache, Level cache and main memory are
ns, ns and ns respectively. The hit rates of Level and Level caches are and
respectively. What is the average access time of the system ignoring the search time within the cache?
A. ns B. ns C. ns D. ns
ugcnetcse-dec2018-paper2
Answer key☟
Consider the following recursive Java function that takes two long arguments and returns a float value :
public static float f(long m, long n)
{
float result = (float) m / (float) n;
if (m<0 || n <0)
return 0.0f;
else
result +=f(m*2, n*3);
return result;
}
A. B. C. D.
ugcnetcse-dec2018-paper2
Which of the following HTML5 codes will affect the horizontal as well as vertical alignment of the table
content ?
Answer key☟
A. (i) and (ii) only B. (ii) and (iii) only C. (iii) only D. (ii) only
ugcnetcse-dec2018-paper2
Answer key☟
Data scrubbing is
A. A process to reject data from the data warehouse and to create the necessary indexes.
B. A process to load the data in the data warehouse and to create the necessary indexes.
C. A process to upgrade the quality of data after it is moved into a data warehouse
D. A process to upgrade the quality of data before it is moved into a data warehouse
ugcnetcse-dec2018-paper2
Answer key☟
Answer key☟
40.0.141 UGC NET CSE | December 2018 | Part 2 | Question: 79 top☝
Answer key☟
The ratio of ages of two persons and is and that of ages and is . If the average of all
three is years, what is ’s age?
Answer key☟
Three pipes fill a tank in hours. If two of them take and hours each to fill the tank, how many hours
will the third pipe take to fill the tank?
Answer key☟
Match with
A. B.
C. D.
ugcnetcse-oct2020-paper1
Answer key☟
A. effect improvement through a joint review of achievement of performance goals within a given timeframe
B. integrate external and internal controls by managers
C. provide managers scope to review the accepted output variables
D. agree upon different performance goals for managers and employees
ugcnetcse-oct2020-paper1
Answer key☟
Match with
A. B.
C. D.
ugcnetcse-oct2020-paper1
A. B.
C. D.
ugcnetcse-dec2018-paper2
a. Values are beliefs tied inextricably to human emotion and b. Values refer to desirable goals people strive to attain
behaviour Choose the correct answer from the options given
c. Values are conflict-free d. Values are ordered by importance relative to one another
e. Values are utilized primarily to effect change in knowledge ofbelow:
a person
A. only B. only
C. only D. only
ugcnetcse-oct2020-paper1
i. If and , then
ii. If and , then
iii. If and , then
iv. If and , then
Answer key☟
A survey has been conducted on methods of commuter travel. Each respondent was asked to check Bus,
Train and Automobile as a major method of travelling to work. More than one answer was permitted. The
results reported were as follows :
Bus people; Train people; Automobile people; Bus and Train people; Bus and Automobile people;
Train and Automobile people; and all the three methods people. How many people completed the survey
form?
A. B. C. D.
ugcnetcse-dec2018-paper2
Answer key☟
a. Action b. Internalisation
c. Selection d. Understanding
e. Perception Choose the correct answer from the options given
below
A. B.
C. D.
ugcnetcse-oct2020-paper1
ugcnetcse-oct2020-paper1
Answer key☟
Identify the teaching strategies which are employed during indirect instruction:
ugcnetcse-oct2020-paper1
Answer key☟
Answer key☟
Answer key☟
What are the advantages of Choice Based Credit System (CBCS) introduces by the UGC for higher
education institutions?
a. Focuses on student centric education b. Allows students to choose inter-disciplinary and intra-
disciplinary courses
c. Makes education at par with global standards d. Makes it easy to estimate the performance levels of students
in terms of marks
e. Offers flexibility for students to undertake studies at differentChoose the correct answer from the options given
times and at different institutions below:
A. only B. only
C. only D. only
ugcnetcse-oct2020-paper1
Answer key☟
In the light of the above statements, choose the correct answer from the options given below:
ugcnetcse-oct2020-paper1
Answer key☟
Match with : consists of the Vedangas and contains subjects dealt in them.
A. B.
C. D.
ugcnetcse-oct2020-paper1
Which of the following teacher competency belongs to the domain of personality and attitude?
Answer key☟
Given below are two statements: One is labelled as Assertion and the other is labelled as Reason
Assertion : Substance is always the subject of all predicates
Reason : Substance is self-existent and self-conceived
In the light of the above statements, choose the correct answer from the options given below:
ugcnetcse-oct2020-paper1
Answer key☟
In which level of teaching, the teacher’s role is more active rather than being interactive?
In the light of the above statements, choose the correct answer from the options given below:
ugcnetcse-oct2020-paper1
Answer key☟
Wind energy is very sensitive to the wind velocity because wind power is directly proportional to the
A. Story-telling B. Sloganeering
C. Use of high pitch of voice D. Monologues
ugcnetcse-oct2020-paper1
Answer key☟
Answer key☟
ugcnetcse-oct2020-paper1
Answer key☟
During physical treatment process of waste water, what is the correct order of following operations to be
followed?
a. Flocculation b. Filtration
c. Screening d. Sedimentation
Choose the correct answer from the options given below:
A. B.
C. D.
ugcnetcse-oct2020-paper1
Given below are two statements: One is labelled as Assertion and the other is labelled as Reason
In the light of the above statements, choose the most appropriate answer from the options given below:
ugcnetcse-oct2020-paper1
Answer key☟
Given below are two statements: One is labelled as Assertion (A) and the other is labelled as Reason (R)
In the light of the above statements, choose the most appropriate answer from the options given below:
ugcnetcse-oct2020-paper1
Answer key☟
1. Cluster sampling
2. Judgemental sampling
3. Systematic sampling
4. Snowball sampling
5. Quota sampling
Answer key☟
In conducting an empirical study, a researcher employs a non-parametric test for data analysis and finds
that the ‘statistics’ arrived at is ‘significant’ at level. What decisions will be warranted thereafter?
In which of the following, there is a greater flexibility in both the methods and process of research?
In the light of the above statements, choose the correct answer from the options given below:
ugcnetcse-oct2020-paper1
40.0.176 UGC NET CSE | October 2020 | Part 1 | Question: 9 top☝
Match with :
A. B.
C. D.
ugcnetcse-oct2020-paper1
Which of the following come under the mandate of the University Grants Commission (UGC)?
a. Promotion and coordination of University education b. Determining and monitoring standards of teaching,
examination and research in Universities
c. Organising continuous professional development
d. Framing regulations on minimum standards of education
programmes for college and University teachers Choose the correct answer from the options given
e. Disbursing and regulating grants to the universities andbelow:
colleges
A. only B. only
C. only D. only
ugcnetcse-oct2020-paper1
40.1.1 Binary Search Tree: UGC NET CSE | December 2018 | Part 2 | Question: 25 top☝
A. B. C. D.
ugcnetcse-dec2018-paper2 data-structures binary-search-tree
Answer key☟
40.2.1 Clustering: UGC NET CSE | November 2017 | Part 2 | Question: 48 top☝
Answer key☟
40.3.1 Co And Architecture: UGC NET CSE | November 2017 | Part 2 | Question: 46 top☝
Answer key☟
40.3.2 Co And Architecture: UGC NET CSE | November 2017 | Part 2 | Question: 50 top☝
Which speed up could be achieved according to Amdahl's Law for infinte number of processes if of a
program is sequential and the remaining part is ideally parallel?
A. Infinite B. C. D.
ugcnetcse-nov2017-paper2 co-and-architecture
Answer key☟
40.4.1 Database Normalization: UGC NET CSE | December 2018 | Part 2 | Question: 82 top☝
Answer key☟
40.5.1 Disk Scheduling: UGC NET CSE | November 2017 | Part 2 | Question: 37 top☝
In ________ disk scheduling algorithm, the disk head moves from one end to other end of the disk, serving
the requests along the way. When the head reaches the other end, it immediately returns to the beginning of
the disk without serving any requests on the return trip.
Answer key☟
40.6.1 Dynamic Programming: UGC NET CSE | December 2018 | Part 2 | Question: 23 top☝
A. B. C. D.
ugcnetcse-dec2018-paper2 algorithms dynamic-programming
Answer key☟
40.7.1 E Technologies: UGC NET CSE | November 2017 | Part 2 | Question: 47 top☝
ugcnetcse-nov2017-paper2 e-technologies
Answer key☟
40.8.1 Ethernet: UGC NET CSE | November 2017 | Part 2 | Question: 28 top☝
Answer key☟
40.9.1 Graph Algorithms: UGC NET CSE | December 2018 | Part 2 | Question: 27 top☝
Match with and choose the correct answer from the code given below.
where and are the number of vertices and edged in graph respectively.
A. B.
C. D.
ugcnetcse-dec2018-paper2 algorithms graph-algorithms time-complexity
Answer key☟
40.10.1 Heap: UGC NET CSE | December 2018 | Part 2 | Question: 22 top☝
The elements are inserted one by one in the given order into a max-heap. The
resultant max-heap is sorted in an array implementation as
A. B.
C. D.
ugcnetcse-dec2018-paper2 data-structures heap
Answer key☟
40.11.1 Indexing: UGC NET CSE | December 2018 | Part 2 | Question: 85 top☝
Answer key☟
40.12.1 Ip Addressing: UGC NET CSE | November 2017 | Part 2 | Question: 30 top☝
The IP address _________ is used by hosts when they are being booted.
A. B. C. D.
ugcnetcse-nov2017-paper2 computer-networks ip-addressing
Answer key☟
40.13.1 Linked List: UGC NET CSE | December 2018 | Part 2 | Question: 29 top☝
Consider a singly linked list. What is the worst case time complexity of the best-known algorithm to delete
the node , pointer to this node is , from the list?
A. B. C. D.
ugcnetcse-dec2018-paper2 data-structures linked-list time-complexity
Answer key☟
40.14.1 Microprocessors: UGC NET CSE | December 2015 | Part 3 | Question: 3 top☝
Which of the following microprocessor hardware interrupt has the lowest priority?
Answer key☟
40.15.1 Minimum Spanning Tree: UGC NET CSE | December 2018 | Part 2 | Question: 12 top☝
Use Kruskal’s algorithm to find the minimum spanning tree of the graph. The weight of this minimum spanning tree
is
A. B. C. D.
ugcnetcse-dec2018-paper2 algorithms minimum-spanning-tree
Answer key☟
A comparison of frequency division and time division multiplexing system shows that
Answer key☟
40.17.1 Osi Model: UGC NET CSE | November 2017 | Part 2 | Question: 29 top☝
Which of the following layer of OSI Reference model is also called end-to-end layer ?
Answer key☟
40.18.1 Physical Layer: UGC NET CSE | June 2011 | Part 2 | Question: 27 top☝
If carrier modulated by a digital bit stream, has one one of the possible phase of and
degrees, then modulation called
Answer key☟
40.19.1 Software Testing: UGC NET CSE | November 2017 | Part 2 | Question: 45 top☝
Which of the following testing techniques ensures that the software products runs correctly after the changes
in maintenance?
Answer key☟
40.20.1 Sorting: UGC NET CSE | December 2018 | Part 2 | Question: 30 top☝
The second smallest of elements can be found with ____ comparisons in the worst case.
A. B. C. D.
ugcnetcse-dec2018-paper2 algorithms sorting
40.21.1 Sql: UGC NET CSE | November 2017 | Part 2 | Question: 17 top☝
Answer key☟
40.22.1 Stack: UGC NET CSE | December 2018 | Part 2 | Question: 24 top☝
The top two elements of the stack after the second is evaluated, are :
A. B. C. D.
ugcnetcse-dec2018-paper2 data-structures stack
Answer key☟
40.23.1 Transaction And Concurrency: UGC NET CSE | December 2018 | Part 2 | Question: 83 top☝
Consider the following sequence of two transactions on a bank account with initial balance that
transfers to another account and then apply interest.
i. T1 start
ii. T1 A old= new
iii. T1 B old = new =
iv. T1 commit
v. T2 start
vi. T2 A old = new =
vii. T2 commit
Suppose the database system crashes just before log record (vii) is written. When the system is restarted, which
one statement is true of the recovery process?
Answer key☟
Answer Keys
40.0.1 D 40.0.2 B;C;D 40.0.3 B 40.0.4 A 40.0.5 A
40.0.6 C 40.0.7 B 40.0.8 B 40.0.9 C 40.0.10 B
40.0.11 C 40.0.12 C 40.0.13 D 40.0.14 C 40.0.15 B
40.0.16 A 40.0.17 D 40.0.18 C 40.0.19 C 40.0.20 B
40.0.21 C 40.0.22 A 40.0.23 D 40.0.24 X 40.0.25 B
40.0.26 D 40.0.27 D 40.0.28 D 40.0.29 A 40.0.30 B
40.0.31 A 40.0.32 C 40.0.33 D 40.0.34 C 40.0.35 D
40.0.36 A 40.0.37 B 40.0.38 B 40.0.39 B 40.0.40 B
40.0.41 A 40.0.42 C 40.0.43 D 40.0.44 C 40.0.45 B
40.0.46 D 40.0.47 D 40.0.48 D 40.0.49 A 40.0.50 C
40.0.51 D 40.0.52 B 40.0.53 C 40.0.54 A 40.0.55 A