COMPUTER SCIENCE AND APPLICATIONS
Paper – II
1. Infrared signals can be used for short
range communication in a closed
area using _______ propagation.
(A) ground (B) sky
(C) line of sight (D) space
Answer:(C)
2. A bridge has access to _______
address in the same network.
(A) Physical (B) Network
(C) Datalink (D) Application
Answer:(A)
3. The minimum frame length for
10 Mbps Ethernet is _______ bytes
and maximum is _______ bytes.
(A) 64 & 128 (B) 128 & 1518
(C) 1518 & 3036 (D) 64 & 1518
Answer:(D)
4. The bit rate of a signal is 3000 bps. If
each signal unit carries 6 bits, the baud
rate of the signal is _______.
(A) 500 baud/sec
(B) 1000 baud/sec
(C) 3000 baud/sec
(D) 18000 baud/sec.
Answer:(A)
5. Match the following :
List – I List – II
a. Physical i. Allow resources to
layer network access
b. Datalink ii. Move packets from
layer one destination to other
c. Network iii. Process to process
layer message delivery
d. Transport iv. Transmission of
layer bit stream
e. Application v. Formation of
Layer frames
Codes :
a b c d e
(A) iv v ii iii i
(B) v iv i ii iii
(C) i iii ii v iv
(D) i ii iv iii v
Answer:(A)
Answer:(D)
7. Which of the following suffices to convert
an arbitrary CFG to an LL(1) grammar ?
(A) Removing left recursion alone
(B) Removing the grammar alone
(C) Removing left recursion and
factoring the grammar
(D) None of the above
Answer:(D)
8. A shift reduce parser suffers from
(A) shift reduce conflict only
(B) reduce reduce conflict only
(C) both shift reduce conflict and
reduce reduce conflict
(D) shift handle and reduce handle
conflicts
Answer:(C)
Answer:(D)

Answer:(C)
11. KPA in CMM stands for
(A) Key Process Area
(B) Key Product Area
(C) Key Principal Area
(D) Key Performance Area
Answer:(A)
12. Which one of the following is not a
risk management technique for
managing the risk due to unrealistic
schedules and budgets ?
(A) Detailed multi source cost and
schedule estimation.
(B) Design cost
(C) Incremental development
(D) Information hiding
Answer:(D)
13. _______ of a system is the structure or
structures of the system which
comprise software elements, the
externally visible properties of these
elements and the relationship amongst
them.
(A) Software construction
(B) Software evolution
(C) Software architecture
(D) Software reuse
Answer:(C)
14. In function point analysis, the number
of complexity adjustment factors is
(A) 10 (B) 12
(C) 14 (D) 20
Answer:(C)
15. Regression testing is primarily related to
(A) Functional testing
(B) Development testing
(C) Data flow testing
(D) Maintenance testing
Answer:(D)
16. How many different truth tables of the
compound propositions are there that
involve the propositions p & q ?
(A) 2 (B) 4
(C) 8 (D) 16
Answer:(D)
Answer:(D)

Answer:(C)

Answer:(A)

Answer:(D)

Answer:(C)

Answer:(A)
23. Consider a complete bipartite graph
km,n. For which values of m and n does
this, complete graph have a Hamilton
circuit
(A) m = 3, n = 2 (B) m = 2, n = 3
(C) m = n > 2 (D) m = n > 3
Answer:(C)
24. Big-O estimates for the factorial
function and the logarithm of the
factorial function i.e. n! and log n! is
given by
Answer:(B)
25. How many cards must be chosen from
a deck to guarantee that atleast
i. two aces of two kinds are chosen.
ii. two aces are chosen.
iii. two cards of the same kind are
chosen.
iv. two cards of two different kinds
are chosen.
(A) 50, 50, 14, 5 (B) 51, 51, 15, 7
(C) 52, 52, 14, 5 (D) 51, 51, 14, 5
Answer:(A)
26. Match the following with respect to the
mobile computing technologies :
List – I List – II
a. GPRS i. An integrated digital
radio standard
b. GSM ii. 3G wireless/Mobile
technology
c. UMTS iii. Nine different
schemes for
modulation and error
correction
d. EDGE iv. An emerging wireless
service that offers a
mobile data
Codes :
a b c d
(A) iii iv ii i
(B) iv i ii iii
(C) ii iii iv i
(D) ii i iv iii
Answer:(B)
27. Object Request Broker (ORB) is
I. A software program that runs on
the client as well as on the
application server.
II. A software program that runs on
the client side only.
III. A software program that runs on
the application server, where
most of the components reside.
(A) I, II & III (B) I & II
(C) II & III (D) I only
Answer:(D)
28. A software agent is defined as
I. A software developed for
accomplishing a given task.
II. A computer program which is
capable of acting on behalf of the
user in order to accomplish a
given computational task.
III. An open source software for
accomplishing a given task.
(A) I
(B) II
(C) III
(D) All of the above
Answer:(B)
29. Match the following :
List – I List – II
a. Classification i. Principal
component
analysis
b. Clustering ii. Branch and Bound
c. Feature iii. K-nearest
Extraction neighbour
d. Feature iv. K-means
Selection
Codes :
a b c d
(A) iii iv ii i
(B) iv iii i ii
(C) iii iv i ii
(D) iv iii ii i
Answer:(C)
30. SET, an open encryption and security
specification model that is designed for
protecting credit card transactions on
the internet, stands for
(A) Secure Electronic Transaction
(B) Secular Enterprise for Transaction
(C) Security Electronic Transmission
(D) Secured Electronic Termination
Answer:(A)
31. In a paged memory management
algorithm, the hit ratio is 70%. If it takes
30 nanoseconds to search Translation
Look-aside Buffer (TLB) and 100
nanoseconds (ns) to access memory, the
effective memory access time is
(A) 91 ns (B) 69 ns
(C) 200 ns (D) 160 ns
Answer:(D)
32. Match the following :
List – I List – II
a. Multilevel i. Time-slicing
feedback queue
b. FCFS ii. Criteria to
move processes
between queues
c. Shortest iii. Batch
process next processing
d. Round robin iv. Exponential
scheduling
smoothening
Codes :
a b c d
(A) i iii ii iv
(B) iv iii ii i
(C) iii i iv i
(D) ii iii iv i
Answer:(D)

Answer:(B)
34. Match the following :
List – I List – II
a. Contiguous i. This scheme
allocation supports very
large file sizes.
b. Linked ii. This allocation
allocation technique
supports only
sequential files.
c. Indexed iii. Number of
allocation disks required
to access file is
minimal.
d. Multi-level iv. This technique
indexed suffers from
maximum
wastage of
space in storing
pointers.
Codes :
a b c d
(A) iii iv ii i
(B) iii ii iv i
(C) i ii iv iii
(D) i iv ii iii
Answer:(B)
35. Which of the following commands will
output “onetwothree” ?
(A) for val; do echo-n $val; done <
one two three
(B) for one two three; do echo-n-;
done
(C) for n in one two three; do echo-n
$n; done
(D) for n in one two three {echo –n $ n}
Answer:(C)
36. Mergesort makes two recursive calls.
Which statement is true after these two
recursive calls finish, but before the
merge step ?
(A) The array elements form a heap.
(B) Elements in each half of the array
are sorted amongst themselves.
(C) Elements in the first half of the
array are less than or equal to
elements in second half of the array.
(D) All of the above
Answer:(B)
37. A text is made up of the characters α,
β, γ, δ and σ with the probability 0.12,
0.40, 0.15, 0.08 and 0.25 respectively.
The optimal coding technique will
have the average length of
(A) 1.7 (B) 2.15
(C) 3.4 (D) 3.8
Answer:(B)
38. Searching for an element in the hash
table requires O(1) time for the
________ time, whereas for direct
addressing it holds for the ________
time.
(A) worst-case, average
(B) worst-case, worst-case
(C) average, worst-case
(D) best, average
Answer:(C)
39. An algorithm is made up of 2 modules
(A) min (h(n), g(n))
(B) max (h(n), g(n))
(C) h(n) + g(n)
(D) h(n) * g(n)
Answer:(B)
40. What is the maximum number of
parenthesis that will appear on the
stack at any one time for parenthesis
expression given by
( ( ) ( ( ) ) ( ( ) ) )
(A) 2 (B) 3
(C) 4 (D) 5
Answer:(B)
41. Match the following :
List – I List – II
a. Automatic i. Scope of the
storage class variable is global.
b. Register ii. Value of the
storage class variable persists
between different
function calls.
c. Static iii. Value stored in
storage class memory and
local to the block
in which the variable is
defined.
d. External iv. Value stored in
storage class CPU registers.
Codes :
a b c d
(A) iii iv i ii
(B) iii iv ii i
(C) iv iii ii i
(D) iv iii i ii
Answer:(B)
42. When we pass an array as an argument
to a function, what actually gets passed ?
(A) Address of the array
(B) Values of the elements of the
array
(C) Base address of the array
(D) Number of elements of the array
Answer:(C)
43. While (87) printf(“computer”);
The above C statement will
(A) print “computer” 87 times
(B) print “computer” 0 times
(C) print “computer” 1 times
(D) print “computer” infinite times
Answer:(D)
44. A friend function can be used to
(A) avoid arguments between classes.
(B) allow access to classes whose
source code is unavailable.
(C) allow one class to access an
unrelated class.
(D) None of the above
Answer:(C)
45. Which of the following is the correct
value returned to the operating system
upon the successful completion of a
program ?
(A) 0
(B) 1
(C) – 1
(D) Program do not return a value.
Answer:(A)
46. Manager’s salary details are hidden
from the employee. This is called as
(A) Conceptual level data hiding
(B) Physical level data hiding
(C) External level data hiding
(D) Local level data hiding
Answer:(C)
47. Which of the following statements is
false ?
(A) Any relation with two attributes
is in BCNF.
(B) A relation in which every key
has only one attribute is in 2NF.
(C) A prime attribute can be
transitively dependent on a key
in 3NF relation.
(D) A prime attribute can be
transitively dependent on a key
in BCNF relation.
Answer:(D)
48. A clustering index is created when
_______.
(A) primary key is declared and
ordered
(B) no key ordered
(C) foreign key ordered
(D) there is no key and no order
Answer:(A)
49. Let R ={A, B, C, D, E, F} be a relation
schema with the following dependencies
C → F, E → A, EC → D, A → B
Which of the following is a key for R ?
(A) CD (B) EC
(C) AE (D) AC
Answer:(B)
50. Match the following :
List – I List – II
a. DDL i. LOCK TABLE
b. DML ii. COMMIT
c. TCL iii. Natural Difference
d. BINARY iv. REVOKE
Operation
Codes :
a b c d
(A) ii i iii iv
(B) i ii iv iii
(C) iii ii i iv
(D) iv i ii iii
Answer:(D)
Paper – II
1. Infrared signals can be used for short
range communication in a closed
area using _______ propagation.
(A) ground (B) sky
(C) line of sight (D) space
Answer:(C)
2. A bridge has access to _______
address in the same network.
(A) Physical (B) Network
(C) Datalink (D) Application
Answer:(A)
3. The minimum frame length for
10 Mbps Ethernet is _______ bytes
and maximum is _______ bytes.
(A) 64 & 128 (B) 128 & 1518
(C) 1518 & 3036 (D) 64 & 1518
Answer:(D)
4. The bit rate of a signal is 3000 bps. If
each signal unit carries 6 bits, the baud
rate of the signal is _______.
(A) 500 baud/sec
(B) 1000 baud/sec
(C) 3000 baud/sec
(D) 18000 baud/sec.
Answer:(A)
5. Match the following :
List – I List – II
a. Physical i. Allow resources to
layer network access
b. Datalink ii. Move packets from
layer one destination to other
c. Network iii. Process to process
layer message delivery
d. Transport iv. Transmission of
layer bit stream
e. Application v. Formation of
Layer frames
Codes :
a b c d e
(A) iv v ii iii i
(B) v iv i ii iii
(C) i iii ii v iv
(D) i ii iv iii v
Answer:(A)
Answer:(D)
7. Which of the following suffices to convert
an arbitrary CFG to an LL(1) grammar ?
(A) Removing left recursion alone
(B) Removing the grammar alone
(C) Removing left recursion and
factoring the grammar
(D) None of the above
Answer:(D)
8. A shift reduce parser suffers from
(A) shift reduce conflict only
(B) reduce reduce conflict only
(C) both shift reduce conflict and
reduce reduce conflict
(D) shift handle and reduce handle
conflicts
Answer:(C)
Answer:(D)
Answer:(C)
11. KPA in CMM stands for
(A) Key Process Area
(B) Key Product Area
(C) Key Principal Area
(D) Key Performance Area
Answer:(A)
12. Which one of the following is not a
risk management technique for
managing the risk due to unrealistic
schedules and budgets ?
(A) Detailed multi source cost and
schedule estimation.
(B) Design cost
(C) Incremental development
(D) Information hiding
Answer:(D)
13. _______ of a system is the structure or
structures of the system which
comprise software elements, the
externally visible properties of these
elements and the relationship amongst
them.
(A) Software construction
(B) Software evolution
(C) Software architecture
(D) Software reuse
Answer:(C)
14. In function point analysis, the number
of complexity adjustment factors is
(A) 10 (B) 12
(C) 14 (D) 20
Answer:(C)
15. Regression testing is primarily related to
(A) Functional testing
(B) Development testing
(C) Data flow testing
(D) Maintenance testing
Answer:(D)
16. How many different truth tables of the
compound propositions are there that
involve the propositions p & q ?
(A) 2 (B) 4
(C) 8 (D) 16
Answer:(D)
Answer:(D)
Answer:(C)
Answer:(A)
Answer:(D)
Answer:(C)
Answer:(A)
23. Consider a complete bipartite graph
km,n. For which values of m and n does
this, complete graph have a Hamilton
circuit
(A) m = 3, n = 2 (B) m = 2, n = 3
(C) m = n > 2 (D) m = n > 3
Answer:(C)
24. Big-O estimates for the factorial
function and the logarithm of the
factorial function i.e. n! and log n! is
given by
Answer:(B)
25. How many cards must be chosen from
a deck to guarantee that atleast
i. two aces of two kinds are chosen.
ii. two aces are chosen.
iii. two cards of the same kind are
chosen.
iv. two cards of two different kinds
are chosen.
(A) 50, 50, 14, 5 (B) 51, 51, 15, 7
(C) 52, 52, 14, 5 (D) 51, 51, 14, 5
Answer:(A)
26. Match the following with respect to the
mobile computing technologies :
List – I List – II
a. GPRS i. An integrated digital
radio standard
b. GSM ii. 3G wireless/Mobile
technology
c. UMTS iii. Nine different
schemes for
modulation and error
correction
d. EDGE iv. An emerging wireless
service that offers a
mobile data
Codes :
a b c d
(A) iii iv ii i
(B) iv i ii iii
(C) ii iii iv i
(D) ii i iv iii
Answer:(B)
27. Object Request Broker (ORB) is
I. A software program that runs on
the client as well as on the
application server.
II. A software program that runs on
the client side only.
III. A software program that runs on
the application server, where
most of the components reside.
(A) I, II & III (B) I & II
(C) II & III (D) I only
Answer:(D)
28. A software agent is defined as
I. A software developed for
accomplishing a given task.
II. A computer program which is
capable of acting on behalf of the
user in order to accomplish a
given computational task.
III. An open source software for
accomplishing a given task.
(A) I
(B) II
(C) III
(D) All of the above
Answer:(B)
29. Match the following :
List – I List – II
a. Classification i. Principal
component
analysis
b. Clustering ii. Branch and Bound
c. Feature iii. K-nearest
Extraction neighbour
d. Feature iv. K-means
Selection
Codes :
a b c d
(A) iii iv ii i
(B) iv iii i ii
(C) iii iv i ii
(D) iv iii ii i
Answer:(C)
30. SET, an open encryption and security
specification model that is designed for
protecting credit card transactions on
the internet, stands for
(A) Secure Electronic Transaction
(B) Secular Enterprise for Transaction
(C) Security Electronic Transmission
(D) Secured Electronic Termination
Answer:(A)
31. In a paged memory management
algorithm, the hit ratio is 70%. If it takes
30 nanoseconds to search Translation
Look-aside Buffer (TLB) and 100
nanoseconds (ns) to access memory, the
effective memory access time is
(A) 91 ns (B) 69 ns
(C) 200 ns (D) 160 ns
Answer:(D)
32. Match the following :
List – I List – II
a. Multilevel i. Time-slicing
feedback queue
b. FCFS ii. Criteria to
move processes
between queues
c. Shortest iii. Batch
process next processing
d. Round robin iv. Exponential
scheduling
smoothening
Codes :
a b c d
(A) i iii ii iv
(B) iv iii ii i
(C) iii i iv i
(D) ii iii iv i
Answer:(D)
Answer:(B)
34. Match the following :
List – I List – II
a. Contiguous i. This scheme
allocation supports very
large file sizes.
b. Linked ii. This allocation
allocation technique
supports only
sequential files.
c. Indexed iii. Number of
allocation disks required
to access file is
minimal.
d. Multi-level iv. This technique
indexed suffers from
maximum
wastage of
space in storing
pointers.
Codes :
a b c d
(A) iii iv ii i
(B) iii ii iv i
(C) i ii iv iii
(D) i iv ii iii
Answer:(B)
35. Which of the following commands will
output “onetwothree” ?
(A) for val; do echo-n $val; done <
one two three
(B) for one two three; do echo-n-;
done
(C) for n in one two three; do echo-n
$n; done
(D) for n in one two three {echo –n $ n}
Answer:(C)
36. Mergesort makes two recursive calls.
Which statement is true after these two
recursive calls finish, but before the
merge step ?
(A) The array elements form a heap.
(B) Elements in each half of the array
are sorted amongst themselves.
(C) Elements in the first half of the
array are less than or equal to
elements in second half of the array.
(D) All of the above
Answer:(B)
37. A text is made up of the characters α,
β, γ, δ and σ with the probability 0.12,
0.40, 0.15, 0.08 and 0.25 respectively.
The optimal coding technique will
have the average length of
(A) 1.7 (B) 2.15
(C) 3.4 (D) 3.8
Answer:(B)
38. Searching for an element in the hash
table requires O(1) time for the
________ time, whereas for direct
addressing it holds for the ________
time.
(A) worst-case, average
(B) worst-case, worst-case
(C) average, worst-case
(D) best, average
Answer:(C)
39. An algorithm is made up of 2 modules
(A) min (h(n), g(n))
(B) max (h(n), g(n))
(C) h(n) + g(n)
(D) h(n) * g(n)
Answer:(B)
40. What is the maximum number of
parenthesis that will appear on the
stack at any one time for parenthesis
expression given by
( ( ) ( ( ) ) ( ( ) ) )
(A) 2 (B) 3
(C) 4 (D) 5
Answer:(B)
41. Match the following :
List – I List – II
a. Automatic i. Scope of the
storage class variable is global.
b. Register ii. Value of the
storage class variable persists
between different
function calls.
c. Static iii. Value stored in
storage class memory and
local to the block
in which the variable is
defined.
d. External iv. Value stored in
storage class CPU registers.
Codes :
a b c d
(A) iii iv i ii
(B) iii iv ii i
(C) iv iii ii i
(D) iv iii i ii
Answer:(B)
42. When we pass an array as an argument
to a function, what actually gets passed ?
(A) Address of the array
(B) Values of the elements of the
array
(C) Base address of the array
(D) Number of elements of the array
Answer:(C)
43. While (87) printf(“computer”);
The above C statement will
(A) print “computer” 87 times
(B) print “computer” 0 times
(C) print “computer” 1 times
(D) print “computer” infinite times
Answer:(D)
44. A friend function can be used to
(A) avoid arguments between classes.
(B) allow access to classes whose
source code is unavailable.
(C) allow one class to access an
unrelated class.
(D) None of the above
Answer:(C)
45. Which of the following is the correct
value returned to the operating system
upon the successful completion of a
program ?
(A) 0
(B) 1
(C) – 1
(D) Program do not return a value.
Answer:(A)
46. Manager’s salary details are hidden
from the employee. This is called as
(A) Conceptual level data hiding
(B) Physical level data hiding
(C) External level data hiding
(D) Local level data hiding
Answer:(C)
47. Which of the following statements is
false ?
(A) Any relation with two attributes
is in BCNF.
(B) A relation in which every key
has only one attribute is in 2NF.
(C) A prime attribute can be
transitively dependent on a key
in 3NF relation.
(D) A prime attribute can be
transitively dependent on a key
in BCNF relation.
Answer:(D)
48. A clustering index is created when
_______.
(A) primary key is declared and
ordered
(B) no key ordered
(C) foreign key ordered
(D) there is no key and no order
Answer:(A)
49. Let R ={A, B, C, D, E, F} be a relation
schema with the following dependencies
C → F, E → A, EC → D, A → B
Which of the following is a key for R ?
(A) CD (B) EC
(C) AE (D) AC
Answer:(B)
50. Match the following :
List – I List – II
a. DDL i. LOCK TABLE
b. DML ii. COMMIT
c. TCL iii. Natural Difference
d. BINARY iv. REVOKE
Operation
Codes :
a b c d
(A) ii i iii iv
(B) i ii iv iii
(C) iii ii i iv
(D) iv i ii iii
Answer:(D)
Computer Science 2014 June UGC Net Paper II
Reviewed by Australian Stock Exchange Inc
on
03:24:00
Rating:
No comments: