recent posts

banner image

Computer Science 2013 September UGC Net Paper III

COMPUTER SCIENCE AND APPLICATIONS
Paper – III














Answer:(A)


2. α – β cutoffs are applied to ______
 (A) Depth first search
 (B) Best first search
 (C) Minimax search
 (D) Breadth first search

Answer:(C)

3. Assume that each alphabet can have a
value between 0 to 9 in a CROSS
cryptoarithmetic problem +ROADS
                     - - - - - - - - DANGER - - - - - - - -                          
Which of the following statement is
true ?
 (i) No two alphabets can have the
same numeric value.
 (ii) Any two alphabets may have the
same numeric value.
 (iii) D = 0
 (iv) D = 1
 (A) (i) and (iii) (B) (i) and (iv)
 (C) (ii) and (iii) (D) (ii) and (iv)

Answer:(B)


4. Which of the following is not a part
of an expert system shell ?
 (A) Knowledge Base
 (B) Inference Engine
 (C) Explanation Facility
 (D) None of the above

Answer:(A)

5. The Blocks World Problem in
Artificial Intelligence is normally
discussed to explain a _______
 (A) Search technique
 (B) Planning system
 (C) Constraint satisfaction system
 (D) Knowledge base system

Answer:(B)

6. Means-Ends Analysis process centres
around the detection of difference
between the current state and the goal
state. Once such a difference is
found, then to reduce the difference
one applies ______
 (A) a forward search that can
reduce the difference.
 (B) a backward search that can
reduce the difference.
 (C) a bidirectional search that can
reduce the difference.
 (D) an operator that can reduce the
difference.
Answer:(D)

7. Suppose a file of 10,000 characters is
to be sent over a line at 2400 bps.
Assume that the data is sent in
frames. Each frame consists of 1000
characters and an overhead of 48 bits
per frame. Using synchronous
transmission, the total overhead time
is ______.
 (A) 0.05 second (B) 0.1 second
 (C) 0.2 second (D) 2.0 second
Answer:(C)

8. Which of the following is the size of
Network bits and Host bits of Class
A of IP address ?
 (A) Network bits 7, Host bits 24
 (B) Network bits 14, Host bits 16
 (C) Network bits 15, Host bits 16
 (D) Network bits 16, Host bits 16

Answer:(A)

9. Which of the following field of the
TCP header tells how many bytes
may be sent starting at the byte
acknowledged ?
 (A) TCP header length
 (B) Window size
 (C) Acknowledgement number
 (D) Urgent pointer
Answer:(B)

10. Which of the following is a bit rate of
an 8-PSK signal having 2500 Hz
bandwidth ?
 (A) 2500 bps (B) 5000 bps
 (C) 7500 bps (D) 20000 bps
Answer:(C)

11. Match the following :
(a) UDP (i) Message Transfer
Protocol
(b) OSPF (ii) Bit-oriented Protocol
(c) SMTP (iii) Interior Gateway
Routing Protocol
(d) HDLC (iv) Connectionless
Transport Protocol
Codes :
 (a) (b) (c) (d)
 (A) (iii) (iv) (ii) (i)
 (B) (iv) (iii) (ii) (i)
 (C) (iv) (iii) (i) (ii)
 (D) (iii) (iv) (i) (ii)

Answer:(C)


12. Given the IP address 201.14.78.65
and the subnet mask
255.255.255.224. What is the subnet
address ?
 (A) 201.14.78.32 (B) 201.14.78.64
 (C) 201.14.78.65 (D) 201.14.78.224

Answer:(B)


13. If an artificial variable is present in
the ‘basic variable’ of optimal
simplex table then the solution is
______
 (A) Alternative solution
 (B) Infeasible solution
 (C) Unbounded solution
 (D) Degenerate solution

Answer:(B)

14. An optimal assignment requires that
the minimum number of horizontal
and vertical lines that can be drawn
to cover all zeros be equal to the
number of
 (A) rows or columns
 (B) rows + columns
 (C) rows + columns – 1
 (D) rows + columns + 1

Answer:(A)

15. Which of the following is the
minimum cost for an assignment
problem given below ?









Answer:(C)





















Answer:(B)





Answer:(D)



18. Given the following productions of a
grammar :
 S→ aA| aBB;
 A→aaA |λ ;
 B→ bB| bbC;
 C→ B
 Which of the following is true ?
 (A) The language corresponding to
the given grammar is a set of
even number of a’s.
 (B) The language corresponding to
the given grammar is a set of
odd number of a’s.
 (C) The language corresponding to
the given grammar is a set of
even number of a’s followed by
odd number of b’s.
 (D) The language corresponding to
the given grammar is a set of
odd number of a’s followed by
even number of b’s.

Answer:(B)






Answer:(B)













Answer:(A)
























Answer:(B)

































Answer:(B)


23. Match the following :
(a) Dangling    (i) Buffer
pointer             replacement policy

(b) Page fault  (ii) Variable length records

(c) List             (iii) Object identifier
representation

(d) Toss- (iv) Pointer-swizzling
immediate

Codes :
 (a) (b) (c) (d)
 (A) (iii) (iv) (ii) (i)
 (B) (iv) (iii) (ii) (i)
 (C) (iv) (iii) (i) (ii)
 (D) (iii) (iv) (i) (ii)

Answer:(A)


24. _______ constraints ensure that a
value that appears in one relation for
a given set of attributes also appears
for a certain set of attributes in
another relation.
 (A) Logical Integrity
 (B) Referential Integrity
 (C) Domain Integrity
 (D) Data Integrity

Answer:(B)

25. The SQL expression
 Select distinct T, branch_name from
branch T, branch S
 where T.assets>S.assets and
S.branch_city=”Mumbai” finds the
names of
 (A) All branches that have greater
assets than some branch
located in Mumbai.
 (B) All branches that have greater
assets than all branches in
Mumbai.
 (C) The branch that has greatest
asset in Mumbai.
 (D) Any branch that has greater
assets than any branch in
Mumbai.

Answer:(A)







Answer:(A)


















Answer:(D)


28. In a single perceptron, the updation
rule of weight vector is given by
 (A) w(n + 1)=w(n)+η[d(n)-y(n)]
 (B) w(n + 1)=w(n)–η[d(n)-y(n)]
 (C) w(n + 1)=w(n)+η[d(n)-y(n)]* x (n)
 (D) w(n + 1)=w(n)–η[d(n)-y(n)]* x (n)

Answer:(C)


29. ______ refers to the discrepancy
among a computed, observed or
measured value and the true specified
or theoretically correct values.

Answer:(D)

30. Which logic family dissipates the
minimum power ?
 (A) DTL (B) TTL
 (C) ECL (D) CMOS

Answer:(D)


31. Which of the following electronic
component is not found in IC’s ?
 (A) Diode (B) Resistor
 (C) Transistor (D) Inductor
 (A) Fault (B) Failure
 (C) Defect (D) Error

Answer:(D)











Answer:(B)


33. The instruction: MOV CL, [BX] [DI]
+ 8 represents the _____ addressing
mode.
 (A) Based Relative
 (B) Based Indexed
 (C) Indexed Relative
 (D) Register Indexed
Answer:(B)













Answer:(D)



















Answer:(X)

36. A binary ripple counter is required to
count up to 16383. How many flip-
flops are required ?
 (A) 16382 (B) 8191
 (C) 512 (D) 14


Answer:(D)









Answer:(C)

38. How many people must there be in a
room before there is a 50% chance
that two of them were born on the
same day of the year ?
 (A) At least 23 (B) At least 183
 (C) At least 366 (D) At least 730

Answer:(A)












Answer:(C)












Answer:(B)
















Answer:(C)



















Answer:(C)

43. Equivalence class partitioning
approach is used to divide the input
domain into a set of equivalence
classes, so that if a program works
correctly for a value, then it will
work correctly for all the other values
in that class. This is used _____.
 (A) to partition the program in the
form of classes.
 (B) to reduce the number of test
cases required.
 (C) for designing test cases in
white box testing.
 (D) all of the above.

Answer:(B)




















Answer:(C)

45. Improving processing efficiency or
performance or restructuring of software
to improve changeability is known as
 (A) Corrective maintenance
 (B) Perfective maintenance
 (C) Adaptive maintenance
 (D) Code maintenance

Answer:(B)

46. In ____,modules A and B make use
of a common data type, but perhaps
perform different operations on it.
 (A) Data coupling
 (B) Stamp coupling
 (C) Control coupling
 (D) Content coupling

Answer:(B)

47. Consider the following schemas :
 Branch_Schema = (branch_name, assets,
city)
 Customer_Schema = (cutstomer_name,
street, city)
 Deposit_Schema = (branch_name,
account_number, customer_name,
balance)
 Borrow_Schema = (branch_name,
loan_number, customer_name, amount)
 Which of the following tuple
relational calculus finds all customers
who have loan amount more than
INR 12,000 ?
 (A) {t(customer_name) | t∈borrow[?]
t[amount]>12000}
 (B) {t |t(customer_name) |
t∈borrow[?] t[amount]>12000}
 (C) {t |[?] ∈ borrow
(t(customer_name=s(customer_
name))[?] [amount]>12000}
 (D) {t |[?] ∈ borrow
(t(customer_name)[?] s[amount]
>12000}

Answer:(C)

48. Match the following :
(a) Create (i) The E-R Model
(b) Select (ii) Relationship Model
(c) Rectangle (iii) DDL
(d) Record (iv) DML
Codes :
 (a) (b) (c) (d)
 (A) (iii) (iv) (i) (ii)
 (B) (iv) (iii) (ii) (i)
 (C) (iv) (iii) (i) (ii)
 (D) (iii) (iv) (ii) (i)


Answer:(A)





















Answer:(C)


50. Sixty (60) reusable components were
available for an application. If only
70% of these components can be used,
rest 30% would have to be developed
from scratch. If average component is
100 LOC and cost of each LOC is
INR 14, what will be the risk exposure if
risk probability is 80% ?
 (A) INR 25,200 (B) INR 20,160
 (C) INR 25,160 (D) INR 20,400

Answer:(B)


51. Consider the following two function
declarations :
 (i) int *f( ) (ii) int (*f)( )
 Which of the following is true ?
 (A) Both are identical.
 (B) The first is a correct declaration
and the second is wrong.
 (C) Both are different ways of
declaring pointer to a function.
 (D) The first declaration is a
function returning a pointer to
an integer and the second is a
pointer to function returning
integer.

Answer:(D)

52. Assume that we have constructor
function for both Base and Derived
classes. Now consider the declaration :
 main ( )
 Base *p = new Derived;
 In what sequence, the constructor
will be executed ?
 (A) Derived class constructor is
followed by Base class
constructor.
 (B) Base class constructor is
followed by Derived class
constructor.
 (C) Base class constructor is never
called.
 (D) Derived class constructor is
never called.

Answer:(B)

53. What is the output of the following
program ?
 #include<stdio.h>
 main( )
 {
 int a, b = 0;
 static int c[10] =
 {1, 2, 3, 4, 5, 6, 7, 8, 9, 0};
 for (a=0; a<10;++a);
 if ((c[a]%2)= =0) b+=c[a];
 printf(“%d”,b);
 }
(A) 15 (B) 25
 (C) 45 (D) 20

Answer:(D)

54. A Program contains the following
declarations and initial assignments
 int i = 8, j = 5;
 double x = 0.005, y = –0.01;
 char c=’c’, d=’d’;
 Determine the value of the following
expressions which involve the use of
library functions:
 abs(i-2*j) ; log(exp(x)) ;
toupper(d)
 (A) 2; 0.005; D (B) 1; 0.005; D
 (C) 2; 0.005; E (D) 1; 0.005; e

Answer:(A)

55. MPEG involves both spatial
compression and temporal
compression. The spatial
compression is similar to JPEG and
temporal compression removes
______ frames.
 (A) Temporal (B) Voice
 (C) Spatial (D) Redundant

Answer:(D)

56. If the data unit is 111111 and the
divisor is 1010. In CRC method,
what is the dividend at the
transmission before division ?
 (A) 1111110000 (B) 1111111010
(C) 111111000 (D) 111111

Answer:(C)

57. If user A wants to send an encrypted
message to user B. The plain text of A is
encrypted with the _______.
 (A) Public Key of user A
 (B) Public Key of user B
 (C) Private Key of user A
 (D) Private Key of user B

Answer:(B)


58. A _____ can forward or block
packets based on the information in
the network layer and transport layer
header.
 (A) Proxy firewall
 (B) Firewall
 (C) Packet filter firewall
(D) Message digest firewall


Answer:(A)

59. Which of the following graphics
devices are known as active graphics
devices ?
 (i) Alphanumeric devices
 (ii) Thumb wheels
 (iii) Digitizers
 (iv) Joystics
 (A) (i) and (ii)
 (B) (iii) and (iv)
 (C) (i), (ii) and (iii)
(D) (i), (ii), (iii) and (iv)

Answer:(D)


60. A diametric projection is said to be
trimetric projection when
 (i) two of the three foreshortening
factors are equal and third is
arbitrary.
 (ii) all of the three foreshortening
factors are equal.
 (iii) all of the three foreshortening
factors are arbitrary.
 Which of the above is true ?
 (A) (i) and (ii) (B) (ii) and (iii)
 (C) (i) only (D) (iii) only

Answer:(C)


61. Which of the following is/are
fundamental method(s) of
antialiasing ?
 (i) Increase of sample rate.
 (ii) Treating a pixel as a finite area
rather than as a point.
 (iii) Decrease of sample rate.
 (A) (i) and (ii) (B) (ii) and (iii)
 (C) (i) only (D) (ii) only

Answer:(A)

62. The two color systems – the HSV
and HLS are
 (A) Hue, Saturation, Value and
Hue, Lightness, Saturation.
 (B) High, Standard, Value and
High, Lightness, Saturation.
 (C) Highly, Saturated, Value and
Highly, Lightened, Saturation.
 (D) Highly, Standard, Value and
Hue, Lightness, Saturation.

Answer:(A)















Answer:(C)

















Answer:(C)























Answer:(B)

66. The programming languages C and
C++ are not strongly typed languages
because :
 (A) Both C and C++ allow
functions for which parameters
are not type checked.
 (B) Both C and C++ allow
functions for which parameters
are type checked.
 (C) Both C and C++ allow
functions for which parameters
are not type checked and also
the union types in these
languages are not type checked.
 (D) Union types in these (C and
C++) languages are not type
checked.

Answer:(C)

67. The tracing model in Prolog
describes program execution in terms
of certain events. These events are
 (A) call and exit
 (B) call and fail
 (C) call, exit and redo
(D) call, exit, redo and fail

Answer:(D)

68. Which of the following statements is
not correct with reference to
distributed systems ?
 (A) Distributed system represents a
global view of the network and
considers it as a virtual uni-
processor system by controlling
and managing resources across
the network on all the sites.
 (B) Distributed system is built on
bare machine, not an add-on to
the existing software.
 (C) In a distributed system, kernel
provides smallest possible set
of services on which other
services are built. This kernel is
called microkernel. Open
servers provide other services
and access to shared resources.
 (D) In a distributed system, if a
user wants to run the program
on other nodes or share the
resources on remote sites due
to their beneficial aspects, user
has to log on to that site.

Answer:(D)

69.A system contains 10 units of
resource of same type. The resource
requirement and current allocation of
these resources for three processes P,
Q and R are as follows :







Now, consider the following resource
requests :
 (i) P makes a request for 2 resource units.
 (ii) Q makes request for 2 resources units.
 (iii) R makes a request of 2 resource units.
 For a safe state, which of the
following options must be satisfied ?
 (A) Only request (i)
 (B) Only request (ii)
 (C) Only request (iii)
 (D) Request (i) and (ii)

Answer:(C)

70.Consider the following set of
processes with the length of CPU
burst time in milliseconds (ms) :







Assume that processes are stored in
ready queue in following order :
 A – B – C – D – E
 Using round robin scheduling with
time slice of 1 ms, the average turn
around time is
 (A) 8.4 ms (B) 12.4 ms
 (C) 9.2 ms (D) 9.4 ms

Answer:(A)

71. Consider a main memory with 3 page
frames for the following page
reference string :
 5, 4, 3, 2, 1, 4, 3, 5, 4, 3, 4, 1, 4
 Assuming that the execution of
process is initiated after loading page
5 in memory, the number of page
faults in FIFO and second chance
replacement respectively are
 (A) 8 and 9 (B) 10 and 11
(C) 7 and 9 (D) 9 and 8

Answer:(D)

72. Which of the following shell scripts will
produce the output “my first script” ?
 (A) for i in my first script { echo –i $i}
 (B) for my first script; do echo –n; done
 (C) for i in my first script; do echo –i $i; done
 (D) for n in my first script; do echo –i $i; done

Answer:(C)

73. The portion of Windows 2000 operating
system which is not portable is
 (A) processor management
 (B) user interface
 (C) device management
(D) virtual memory management

Answer:(D)

74. Match the following for Windows
Operating System :
(a) Hard-ware              (i) Starting all processes,
abstration-Layer            emulation of different
                                    operating systems,
                                     security functions,
                                    transform character
                                    based applications to
                                    graphical

                                       (ii) Export a virtual
  (b) Kernel                     memory interface,
                                     support for symmetric
                                      multiprocessing,
                                      administration, details
                                     of mapping memory,
                                    configuring I/O buses,

(c) Executive                  (iii) Thread scheduling,
                                         interrupt and exception
                                         handling, recovery
                                          after power failure.

(d) Win32 Sub-                 (iv) Object manager, Virtual
 System                              Memory manager,Process manager
                                           Plug and Play and Power Manager



Answer:(C)

75. Which of the following statements is
not true for UNIX Operating System ?
 (A) Major strength of UNIX
Operating System is its open
standards which enabled large
number of organizations
ranging from academicia to
industries to participate in its
development.
 (B) UNIX kernel uses modules
with well specified interfaces
and provides advantages like
simplified testing and
maintenance of kernel. It has
better extensibility as the
kernel is not monolithic.
 (C) UNIX is kernel based operating
system with two main
components viz. process
management subsystem and
file management subsystem.
 (D) All devices are represented as
files which simplify the
management of I/O devices and
files. The directories structure
used is directed acyclic graph.

Answer:(B)
Computer Science 2013 September UGC Net Paper III Computer Science 2013 September UGC Net Paper III Reviewed by Australian Stock Exchange Inc on 08:11:00 Rating: 5

No comments:

Total Pageviews

Author:

Prashant Davanageri UGC NET Karnataka
Rajput Gali Betgeri-582102, Karnataka India.
Powered by Blogger.