Pages

Tuesday, December 27, 2011

UGC NET Solved Paper I Dec2011

Questions along with Answers Below - Explanations are always welcome

1. Photo bleeding means
(A) Photo cropping
(B) Photo placement
(C) Photo cutting
(D) Photo colour adjustment

2. While designing communication strategy feed-forward studies are conducted by
(A) Audience
(B) Communicator
(C) Satellite
(D) Media

3. In which language the newspapers have highest circulation ?
(A) English (B) Hindi (C) Bengali  (D) Tamil

4. Aspect ratio of TV Screen is
(A) 4 : 3 (B) 3 : 4 (C) 2 : 3  (D) 2 : 4

5. Communication with oneself is known as
(A) Organisational Communication
(B) Grapewine Communication
(C) Interpersonal Communication
(D) Intrapersonal Communication

6. The term ‘SITE’ stands for
(A) Satellite Indian Television Experiment
(B) Satellite International Television Experiment
(C) Satellite Instructional Television Experiment
(D) Satellite Instructional Teachers Education

7. What is the number that comes next in the sequence ?
2, 5, 9, 19, 37, ___
(A) 76 (B) 74 (C) 75 (D) 50

8. Find the next letter for the series MPSV..…
(A) X (B) Y (C) Z (D) A

9. If ‘367’ means ‘I am happy’; ‘748’ means ‘you are sad’ and ‘469’ means ‘happy and sad’ in a given code, then which of the following represents ‘and’ in that code ?
(A) 3 (B) 6 (C) 9 (D) 4

10. The basis of the following classification is ‘animal’, ‘man’, ‘house’, ‘book’, and ‘student’ :
(A) Definite descriptions
(B) Proper names
(C) Descriptive phrases
(D) Common names

11. Assertion (A) : The coin when flipped next time will come up tails.
         Reason (R) : Because the coin was flipped five times in a row, and each time it came up heads.
Choose the correct answer from below :
(A) Both (A) and (R) are true, and (R) is the correct explanationof (A).
(B) Both (A) and (R) are false, and (R) is the correct explanation of (A).
(C) (A) is doubtful, (R) is true, and (R) is not the correct explanation of (A).
(D) (A) is doubtful, (R) is false, and (R) is the correct explanation of (A).

12. The relation ‘is a sister of ’ is
(A) non-symmetrical
(B) symmetrical
(C) asymmetrical
(D) transitive
Ref:: "Discrete Structures Essentials" By Research & Education Association  PgNo. 30

13. If the proposition “Vegetarians are not meat eaters” is false, then which of the following inferences is
correct ? Choose from the codes given below :
1. “Some vegetarians are meat eaters” is true.
2. “All vegetarians are meat eaters” is doubtful.
3. “Some vegetarians are not meat eaters” is true.
4. “Some vegetarians are not meat eaters” is doubtful.
Codes :
(A) 1, 2 and 3
(B) 2, 3 and 4
(C) 1, 3 and 4
(D) 1, 2 and 4

14. Determine the nature of the following definition :
‘Poor’ means having an annual income of ` 10,000.
(A) persuasive (B) precising (C) lexical (D) stipulative

15. Which one of the following is not an argument ?
(A) If today is Tuesday, tomorrow will be Wednesday.
(B) Since today is Tuesday, tomorrow will be Wednesday.
(C) Ram insulted me so I punched him in the nose.
(D) Ram is not at home, so he must have gone to town.

16. Venn diagram is a kind of diagram to
(A) represent and assess the truth of elementary inferences with the help of Boolean Algebra of classes.
(B) represent and assess the validity of elementary inferences with the help of Boolean Algebra of classes.
(C) represent but not assess the validity of elementary inferences with the help of Boolean Algebra of classes.
(D) assess but not represent the validity of elementary inferences with the help of Boolean Algebra of classes.

17. Inductive logic studies the way in which a premise may
(A) support and entail a conclusion
(B) not support but entail a conclusion
(C) neither support nor entail a conclusion
(D) support a conclusion without entailing it

18. Which of the following statements are true ? Choose from the codes given below.
1. Some arguments, while not completely valid, are almost valid.
2. A sound argument may be invalid.
3. A cogent argument may have a probably false conclusion.
4. A statement may be true or false.
Codes :
(A) 1 and 2 (B) 1, 3 and 4 (C) 4 alone (D) 3 and 4

19. If the side of the square increases by 40%, then the area of the square increases by
(A) 60 % (B) 40 % (C) 196 % (D) 96 %

20. There are 10 lamps in a hall. Each one of them can be switched on independently. The number of ways
in which hall can be illuminated is
(A) 102 (B) 1023 (C) 210 (D) 10 !

21. How many numbers between 100 and 300 begin or end with 2 ?
(A) 100 (B) 110 (C) 120 (D) 180

22. In a college having 300 students, every student reads 5 newspapers and every newspaper is read by 60
students. The number of newspapers required is
(A) at least 30 (B) at most 20 (C) exactly 25 (D) exactly 5

The total CO2 emissions from various sectors are 5 mmt. In the Pie Chart given below, the percentage
contribution to CO2 emissions from various sectors is indicated.
23. What is the absolute CO2 emission from domestic sector ?
(A) 1.5 mmt (B) 2.5 mmt (C) 1.75 mmt (D) 0.75 mmt

24. What is the absolute CO2 emission for combined thermal power and transport sectors ?
(A) 3.25 mmt (B) 1.5 mmt (C) 2.5 mmt (D) 4 mmt

25. Which of the following operating system is used on mobile phones ?
(A) Windows Vista
(B) Android
(C) Windows XP
(D) All of the above

26. If (y)x represents a number y in base x, then which of the following numbers is smallest of all ?
(A) (1111)2 (B) (1111)8 (C) (1111)10 (D) (1111)16

27. High level programming language can be converted to machine language using which of the following ?
(A) Oracle (B) Compiler (C) Mat lab (D) Assembler

28. HTML is used to create
(A) machine language program
(B) high level program
(C) web page
(D) web server

29. The term DNS stands for
(A) Domain Name System
(B) Defense Nuclear System
(C) Downloadable New Software
(D) Dependent Name Server

30. IPv4 and IPv6 are addresses used to identify computers on the internet.
Find the correct statement out of the following :
(A) Number of bits required for IPv4 address is more than number of bits required for IPv6 address.
(B) Number of bits required for IPv4 address is same as number of bits required for IPv6 address.
(C) Number of bits required for IPv4 address is less than number of bits required for IPv6 address.
(D) Number of bits required for IPv4 address is 64.

31. Which of the following pollutants affects the respiratory tract in humans ?
(A) Carbon monoxide
(B) Nitric oxide
(C) Sulphur di-oxide
(D) Aerosols

32. Which of the following pollutants is not emitted from the transport sector ?
(A) Oxides of nitrogen
(B) Chlorofluorocarbons
(C) Carbon monoxide
(D) Poly aromatic hydrocarbons

33. Which of the following sources of energy has the maximum potential in India ?
(A) Solar energy
(B) Wind energy
(C) Ocean thermal energy
(D) Tidal energy

34. Which of the following is not a source of pollution in soil ?
(A) Transport sector
(B) Agriculture sector
(C) Thermal power plants
(D) Hydropower plants

35. Which of the following is not a natural hazard ?
(A) Earthquake
(B) Tsunami
(C) Flash floods
(D) Nuclear accident

36. Ecological footprint represents
(A) area of productive land and water to meet the resources requirement
(B) energy consumption
(C) CO2 emissions per person
(D) forest cover

37. The aim of value education to inculcate in students is
(A) the moral values
(B) the social values
(C) the political values
(D) the economic values

38. Indicate the number of Regional Offices of University Grants Commission of India.
(A) 10 (B) 07 (C) 08 (D) 09

39. One-rupee currency note in India bears the signature of
(A) The President of India
(B) Finance Minister of India
(C) Governor, Reserve Bank of India
(D) Finance Secretary of Government of India

40. Match the List – I with the List – II and select the correct answer from the codes given below :
               List – I                                                                                     List – II
(Commissions and Committees)                                                                (Year)
(a) First Administrative Reforms Commission                                          (i) 2005
(b) Paul H. Appleby Committee I                                                           (ii) 1962
(c) K. Santhanam Committee                                                                (iii) 1966
(d) Second Administrative Reforms Commission                                   (iv) 1953
Codes :
      (a) (b) (c) (d)
(A) (i) (iii) (ii) (iv)
(B) (iii) (iv) (ii) (i)
(C) (iv) (ii) (iii) (i)
(D) (ii) (i) (iv) (iii)

41. Constitutionally the registration and recognition of political parties is the function performed by
(A) The State Election Commission of respective States
(B) The Law Ministry of Government of India
(C) The Election Commission of India
(D) Election Department of the State Governments

42. The members of Gram Sabha are
(A) Sarpanch, Upsarpanch and all elected Panchas
(B) Sarpanch, Upsarpanch and Village level worker
(C) Sarpanch, Gram Sevak and elected Panchas
(D) Registered voters of Village Panchayat

43. By which of the following methods the true evaluation of the students is possible ?
(A) Evaluation at the end of the course.
(B) Evaluation twice in a year.
(C) Continuous evaluation.
(D) Formative evaluation.

44. Suppose a student wants to share his problems with his teacher and he visits the teacher’s house for the
purpose, the teacher should
(A) contact the student’s parents and solve his problem.
(B) suggest him that he should never visit his house.
(C) suggest him to meet the principal and solve the problem.
(D) extend reasonable help and boost his morale.

45. When some students are deliberately attempting to disturb the discipline of the class by making mischief,
what will be your role as a teacher ?
(A) Expelling those students.
(B) Isolate those students.
(C) Reform the group with your authority.
(D) Giving them an opportunity for introspection and improve their behaviour.

46. Which of the following belongs to a projected aid ?
(A) Blackboard (B) Diorama (C) Epidiascope (D) Globe

47. A teacher is said to be fluent in asking questions, if he can ask
(A) meaningful questions
(B) as many questions as possible
(C) maximum number of questions in a fixed time
(D) many meaningful questions in a fixed time

48. Which of the following qualities is most essential for a teacher ?
(A) He should be a learned person.
(B) He should be a well dressed person.
(C) He should have patience.
(D) He should be an expert in his subject.

49. A hypothesis is a
(A) law (B) canon (C) postulate (D) supposition

50. Suppose you want to investigate the working efficiency of nationalised bank in India, which one of the following would you follow ?
(A) Area Sampling
(B) Multi-stage Sampling
(C) Sequential Sampling
(D) Quota Sampling

51. Controlled group condition is applied in
(A) Survey Research
(B) Historical Research
(C) Experimental Research
(D) Descriptive Research

52. Workshops are meant for
(A) giving lectures
(B) multiple target groups
(C) showcase new theories
(D) hands on training/experience

53. Which one of the following is a research tool ?
(A) Graph (B) Illustration (C) Questionnaire (D) Diagram

54. Research is not considered ethical if it
(A) tries to prove a particular point.
(B) does not ensure privacy and anonymity of the respondent.
(C) does not investigate the data scientifically.
(D) is not of a very high standard.

Read the following passage carefully and answer the questions (Qn. Nos. 55 to 60) :

The catalytic fact of the twentieth century is uncontrollable development, consumerist society, political materialism, and spiritual devaluation. This inordinate development has led to the transcendental ‘second reality’ of sacred perception that biologically transcendence is a part of human life. As the century closes, it dawns with imperative vigour that the ‘first reality’ of enlightened rationalism and the ‘second reality’ of the Beyond have to be harmonised in a worthy state of man. The de facto values describe what we are, they portray the ‘is’ of our ethic, they are est values (Latin est means is). The ideal values tell us what we ought to be, they are esto values (Latin esto ‘ought to be’). Both have to be in the ebb and flow of consciousness. The ever new science and technology and the ever-perennial faith are two modes of one certainty, that is the wholeness of man, his courage to be, his share in Being. The materialistic foundations of science have crumbled down. Science itself has proved that matter is energy, processes are as valid as facts, and affirmed the non-materiality of the universe. The encounter of the ‘two cultures’, the scientific and the humane, will restore the normal vision, and will be the bedrock of a ‘science of understanding’ in the new century. It will give new meaning to the ancient perception that quantity (measure) and quality (value) coexist at the root of nature. Human endeavours cannot afford to be humanistically irresponsible.

55. The problem raised in the passage reflects overall on
(A) Consumerism (B) Materialism  (C) Spiritual devaluation (D) Inordinate development

56. The ‘de facto’ values in the passage means
(A) What is (B) What ought to be (C) What can be (D) Where it is

57. According to the passage, the ‘first reality’ constitutes
(A) Economic prosperity (B) Political development (C) Sacred perception of life (D) Enlightened rationalism

58. Encounter of the ‘two cultures’, the scientific and the human implies
(A) Restoration of normal vision
(B) Universe is both material and non-material
(C) Man is superior to nature
(D) Co-existence of quantity and quality in nature

59. The contents of the passage are
(A) Descriptive (B) Prescriptive (C) Axiomatic (D) Optional

60. The passage indicates that science has proved that
(A) universe is material (B) matter is energy (C) nature has abundance (D) humans are irresponsible

UGC NET Computer Science Solved Paper -II Dec2011.

Questions along with Answers Below - Explanations are always welcome

1. Which of the following data structure is Non-linear type ?
(A) Strings
(B) Lists
(C) Stacks
(D) None of the above

2. The total number of comparisons in a bubble sort is
(A) 0(log n)
(B) 0(n log n)
(C) 0(n)
(D) None of the above

3. Which of the following is a bad example of recursion ?
(A) Factorial
(B) Fibonacci numbers
(C) Tower of Hanai
(D) Tree traversal

4. Domain and Range of the function
Y = –  –2x + 3 is 

(A)x3/2, y0
(B)x>3/2, y≤0
(C)x3/2, y≤0
(D)x≤3/2, y≤0


5. Maximum number of edges in a n- Node undirected graph without self loop is
(A) n2
(B) n(n – 1)
(C) n(n + 1)
(D)n(n – 1)/2

6. A hash table has space for 75 records, then the probability of collision before the table is 6% full.
(A) .25  (B) .20  (C) .35   (D) .30

7. BCC in the internet refers to
(A) Black carbon copy
(B) Blind carbon copy
(C) Blank carbon copy
(D) Beautiful carbon copy

8. Hub is a term used with
(A) A Star Networks
(B) A Ring Networks
(C) A Router
(D) A Bridge

9. The amount of uncertainty in a system of symbol is called
(A) Bandwidth  (B) Entropy  (C) Loss  (D) Quantum

10. Which of the following network access standard disassembler is used for connection station to a packet
switched network ?
(A) X.3 (B) X.21 (C) X.25 (D) X.75

11. A station in a network in a network forward incoming packets by placing them on its shortest output queue. What routing algorithm is being used ?
(A) Hot potato routing
(B) Flooding
(C) Static routing
(D) Delta routing

12. Start and stop bits are used in serial communications for
(A) Error detection
(B) Error correction
(C) Synchronization
(D) Slowing down the communication

13. For a data entry project for office staff who have never used computers before (user interface and userfriendliness are extremely important), one will use
(A) Spiral model
(B) Component based model
(C) Prototyping
(D) Waterfall model

14. An SRS
(A) establishes the basis for agreement between client and the supplier.
(B) provides a reference for validation of the final product.
(C) is a prerequisite to high quality software.
(D) all of the above.

15. McCabe’s cyclomatic metric V(G) of a graph G with n vertices, e edges and p connected component is
(A) e
(B) n
(C) e – n + p
(D) e – n + 2p

16. Emergency fixes known as patches are result of
(A) adaptive maintenance
(B) perfective maintenance
(C) corrective maintenance
(D) none of the above

17. Design recovery from source code is done during
(A) reverse engineering
(B) re-engineering
(C) reuse
(D) all of the above

18. Following is used to demonstrate that the new release of software still performs the old one did by
rerunning the old tests :
(A) Functional testing
(B) Path testing
(C) Stress testing
(D) Regression testing

19. The post order traversal of a binary tree is DEBFCA. Find out the preorder traversal.
(A) ABFCDE (B) ADBFEC (C) ABDECF (D) ABDCEF

20. B + tree are preferred to binary tree in database because
(A) Disk capacities are greater than memory capacities
(B) Disk access much slower than memory access
(C) Disk data transfer rates are much less than memory data transfer rate
(D) Disk are more reliable than memory

21. What deletes the entire file except the file structure ?
(A) ERASE
(B) DELETE
(C) ZAP
(D) PACK

22. Which command classes closes text file, which has been created using “SET ALTERNATIVE” <FILE NAME> “Command” ?
(A) SET ALTERNATE OFF
(B) CLOSE DATABASE
(C) CLOSE ALTERNATE
(D) CLEAR ALL

23. Data security threats include
(A) privacy invasion
(B) hardware failure
(C) fraudulent manipulation of data
(D) encryption and decryption

24. Which of the following statements is true, when structure of database file with 20 records is modified ?
(A) ? EOF ( ) Prints. T
(B) ? BOF ( ) Prints F
(C) ? BOF ( ) Prints T
(D) ? EOF ( ) Prints F

25. The SQL Expression Select distinct T. branch name from branch T, branch S where T. assets > S. assets and S. branch-city = DELHI, finds the name of
(A) all branches that have greater asset than any branch located in DELHI.
(B) all branches that have greater assets than allocated in DELHI.
(C) the branch that has the greatest asset in DELHI.
(D) any branch that has greater asset than any branch located in DELHI.

26. Dijkestra banking algorithm in an operating system, solves the problem of
(A) deadlock avoidance
(B) deadlock recovery
(C) mutual exclusion
(D) context switching

27. The multiuser operating system, 20 requests are made to use a particular resource per hour, on an average the probability that no request are made in 45 minutes is
(A) e–15   (B)e–5   (C) 1 – e–5   (D) 1 – e–10

28. On receiving an interrupt from an I/O device, the CPU
(A) halts for predetermined time.
(B) branches off to the interrupt service routine after completion of the current instruction.
(C) branches off to the interrupt service routine immediately.
(D) hands over control of address bus and data bus to the interrupting device.

29. The maximum amount of information that is available in one portion of the disk access arm for a removal disk pack (without further movement of the arm with multiple heads)
(A) a plate of data
(B) a cylinder of data
(C) a track of data
(D) a block of data

30. Consider a logical address space of 8 pages of 1024 words mapped with memory of 32 frames. How many bits are there in the physical address ?
(A) 9 bits (B) 11 bits (C) 13 bits (D) 15 bits

31. CPU does not perform the operation
(A) data transfer
(B) logic operation
(C) arithmetic operation
(D) all of the above

32. A chip having 150 gates will be classified as
(A) SSI (B) MSI (C) LSI (D) VLSI

33. If an integer needs two bytes of storage, then the maximum value of unsigned integer is
(A) 216  – 1
(B) 215  – 1
(C) 216 
(D) 215

34. Negative numbers cannot be represented in
(A) signed magnitude form
(B) 1’s complement form
(C) 2’s complement form
(D) none of the above

35. The cellular frequency reuse factor for the cluster size N is
(A) N
(B) N2
(C)1/N
(D)1/N2

36. X – = Y + 1 means
(A) X = X – Y + 1
(B) X = –X – Y – 1
(C) X = –X + Y + 1
(D) = X – Y – 1

37. Handoff is the mechanism that
(A) transfer an ongoing call from one base station to another
(B) initiating a new call
(C) dropping an ongoing call
(D) none of above

38. Which one of the following statement is false ?
(A) Context-free languages are closed under union.
(B) Context-free languages are closed under concatenation.
(C) Context-free languages are closed under intersection.
(D) Context-free languages are closed under Kleene closure.

39. All of the following are examples of real security and privacy risks except
(A) Hackers
(B) Spam
(C) Viruses
(D) Identify theft

40. Identify the incorrect statement :
(A) The ATM adoption layer is not service dependent.
(B) Logical connections in ATM are referred to as virtual channel connections.
(C) ATM is streamlined protocol with minimal error and flow control capabilities
(D) ATM is also known as cell delays.

41. Software risk estimation involves following two tasks :
(A) Risk magnitude and risk impact
(B) Risk probability and risk impact
(C) Risk maintenance and risk impact
(D) Risk development and risk impact

42. The number of bits required for an IPV 6 address is
(A) 16 (B) 32 (C) 64 (D) 128

43. The proposition ~ qvp is equivalent to
(A) p ® q
(B) q ® p
(C) p « q
(D) p Ú q

44. Enterprise Resource Planning (ERP)
(A) has existed for over a decade.
(B) does not integrate well with the functional areas other than operations.
(C) is inexpensive to implement.
(D) automate and integrates the majority of business processes.

45. Which of the following is false concerning Enterprise Resource Planning (ERP) ?
(A) It attempts to automate and integrate the majority of business processes.
(B) It shares common data and practices across the enterprise.
(C) It is inexpensive to implement.
(D) It provides and access information in a real-time environment.

46. To compare, overlay or cross analyze to maps in GIS
(A) both maps must be in digital form
(B) both maps must be at the same equivalent scale.
(C) both maps must be on the same coordinate system
(D) All of the above

47. Web Mining is not used in which of the following areas ?
(A) Information filtering
(B) Crime fighting on the internet
(C) Online transaction processing
(D) Click stream analysis.

48. A telephone conference call is an example of which type of communications ?
(A) same time / same place
(B) same time / different place
(C) different time / different place
(D) different time / same place

49. What is the probability of choosing correctly an unknown integer between 0 and 9 with 3 chances ?
(A)963/1000
(B)973/1000
(C)983/1000
(D)953/1000

50. The number of nodes in a complete binary tree of height h (with roots at level 0) is equal to
(A) 20+21 +…….2h
(B) 20+21 +…….2h-1
(C) 20+21 +…….2h+1
(D) 21 +…….2h+1