Pages

Saturday, June 30, 2012

UGC NET Computer Science Solved Paper -III June2012...

Questions along with Answers Below - Explanations are always welcome

1. Consider the following pseudocode segment :
K:=0
  for i1:= 1 to n
    for i2:= 1 to i1
    : 
    :
    :
        for im:= 1 to im–1
        K:= K+1
The value of K after the execution of this code shall be
(A) C(n + m – 1, m)
(B) C(n – m + 1, m)
(C) C(n + m – 1, n)
(D) C(n – m + 1, n)
Explanation: 

2. In Delta Rule for error minimization
(A) weights are adjusted w.r.to change in the output
(B) weights are adjusted w.r.to difference between desired output and actual output
(C) weights are adjusted w.r.to difference between input and output
(D) none of the above

3. The concept of pipelining is most effective in improving performance if the tasks being performed in different stages :
(A) require different amount of time
(B) require about the same amount of time
(C) require different amount of time with time difference between any two tasks being same
(D) require different amount with time difference between any two tasks being different

4. What is Granularity ?
(A) The size of database
(B) The size of data item
(C) The size of record
(D) The size of file

5. Suppose that a given application is run on a 64-processor machine and that 70 percent of the application can be parallelized. Then the expected performance improvement using Amdahl’s law is
(A) 4.22
(B) 3.22
(C) 3.32
(D) 3.52
Hint: S(N) = 1/(1-P)+P/N  where P = portion of parallel  N= no.of.processor : 1/((1-0.7)+(0.7/64))

6. If two fuzzy sets A and B are given with membership functions
μA(x) = {0.2, 0.4, 0.8, 0.5, 0.1}
μB(x) = {0.1, 0.3, 0.6, 0.3, 0.2}
Then the value of μ  A∩B will be
(A) {0.9, 0.7, 0.4, 0.8, 0.9}
(B) {0.2, 0.4, 0.8, 0.5, 0.2}
(C) {0.1, 0.3, 0.6, 0.3, 0.1}
(D) {0.7, 0.3, 0.4, 0.2, 0.7}
Note: All the above answer given is wrong. Even answer key given in UGC NET portal is wrong
Hint: The answer should be {0.9, 0.7, 0.4, 0.7, 0.9}. i.e A∩B  = 1-(min[μA,μB])

7. Match the following :
(i) OLAP                     (a) Regression
(ii) OLTP                     (b) Data Warehouse
(iii) Decision Tree         (c) RDBMS
(iv) Neural Network    (d) Classification
       (i) (ii) (iii) (iv)
(A) (b) (c) (a) (d)
(B) (b) (c) (d) (a)
(C) (c) (b) (a) (d)
(D) (c) (b) (d) (a)

8. Which level of Abstraction describes what data are stored in the Database ?
(A) Physical level
(B) View level
(C) Abstraction level
(D) Logical level

9. The problem that occurs when one transaction updates a database item and then the transaction fails for some reason is ________.
(A) Temporary Select Problem
(B) Temporary Modify Problem
(C) Dirty Read Problem
(D) None

10. In an image compression system 16384 bits are used to represent 256 × 256 image with 256 gray levels. What is the compression ratio for this system ?
(A) 1
(B) 2
(C) 4
(D) 8

11. X.25 is ________ Network.
(A) Connection Oriented Network
(B) Connection Less Network
(C) Either Connection Oriented or Connection Less
(D) Neither Connection Oriented nor Connection Less

12. Which of the following can be used for clustering of data ?
(A) Single layer perception
(B) Multilayer perception
(C) Self organizing map
(D) Radial basis function

13. Which of the following is scheme to deal with deadlock ?
(A) Time out
(B) Time in
(C) Both (A) & (B)
(D) None of the above

14. If the pixels of an image are shuffled then the parameter that may change is
(A) Histogram
(B) Mean
(C) Entropy
(D) Covariance

15. The common property of functional language and logical programming language :
(A) Both are declarative
(B) Both are based on λ-calculus
(C) Both are procedural
(D) Both are functional

16. Given the following statements :
(i) The power of deterministic finite state machine and nondeterministic finite state machine are same.
(ii) The power of deterministic pushdown automaton and nondeterministic pushdown automaton are same.
Which of the above is the correct statement(s) ?
(A) Both (i) and (ii)
(B) Only (i)
(C) Only (ii)
(D) Neither (i) nor (ii)

17. Let Q(x, y) denote “x + y = 0” and let there be two quantifications given as
(i) ∃y∀xQ(x,y)
(ii)∀x∃yQ(x, y)
where x & y are real numbers. Then which of the following is valid ?
(A) (i) is true & (ii) is false.
(B) (i) is false & (ii) is true.
(C) (i) is false & (ii) is also false.
(D) both (i) & (ii) are true.

18. Consider a schema R(A, B, C, D) and functional dependencies A→B and C→D. Then the decomposition R1(A, B) and R2(C, D) is
(A) Dependency preserving but not lossless join
(B) Dependency preserving and lossless join
(C) Lossless Join but not dependency preserving
(D) Lossless Join
Hint: R1∩R2 gives nullset {} so its lossy join or not lossless join

19. The quantiser in an image-compression system is a
(A) lossy element which exploits the psychovisual redundancy
(B) lossless element which exploits the psychovisual redundancy
(C) lossy element which exploits the statistical redundancy
(D) lossless element which exploits the statistical redundancy

20. Data Warehouse provides
(A) Transaction Responsiveness
(B) Storage, Functionality Responsiveness to queries
(C) Demand and Supply Responsiveness
(D) None of the above

21. A* algorithm uses f ' = g + h' to estimate the cost of getting from the initial state to the goal state, where g is a measure of the cost of getting from initial state to the current node and the function h' is an estimate of the cost of getting from the current node to the goal state. To find a path involving the fewest number of steps, we should set
(A) g = 1
(B) g = 0
(C) h' = 0
(D) h' = 1

22. The transform which possesses the highest ‘energy compaction’ property is
(A) Slant transform
(B) Cosine transform
(C) Fourier transform
(D) Karhunen-Loeve transform

23. Which one of the following prolog programs correctly implement “if G succeeds then execute goal P else
execute goal q ?”
(A) if-else (G, P, q) :- !, call(G), call(P). if-else (G, P, q) :- call(q).
(B) if-else (G, P, q) :- call(G), !, call(P). if-else (G, P, q) :- call(q).
(C) if-else (G, P, q) :- call(G), call(P), !. if-else (G, P, q) :- call(q).
(D) All of the above

24. The _______ memory allocation function modifies the previous allocated space.
(A) calloc( )
(B) free( )
(C) malloc( )
(D) realloc( )

25. Which is not the correct statement(s) ?
(i) Every context sensitive language is recursive.
(ii) There is a recursive language that is not context sensitive.
(A) (i) is true, (ii) is false.
(B) (i) is true and (ii) is true.
(C) (i) is false, (ii) is false.
(D) (i) is false and (ii) is true.

26. The mechanism that binds code and data together and keeps them secure from outside world is known as
(A) Abstraction
(B) Inheritance
(C) Encapsulation
(D) Polymorphism

27. Identify the addressing modes of below instructions and match them :
(a) ADI         (1) Immediate addressing
(b) STA         (2) Direct addressing
(c) CMA       (3) Implied addressing
(d) SUB        (4) Register addressing
(A) a – 1, b – 2, c – 3, d – 4
(B) a – 2, b – 1, c – 4, d – 3
(C) a – 3, b – 2, c – 1, d – 4
(D) a – 4, b – 3, c – 2, d – 1

28. Which one of the following is not a Greibach Normal form grammar ?
(i) S → a | bA | aA | bB
    A → a
    B → b
(ii) S → a | aA | AB
     A → a
     B → b
(iii) S → a | A | aA
     A → a
(A) (i) and (ii)
(B) (i) and (iii)
(C) (ii) and (iii)
(D) (i), (ii) and (iii)

29. Which of the following IP address class is a multicast address ?
(A) Class A
(B) Class B
(C) Class C
(D) Class D

30. While unit testing a module, it is found that for a set of test data, maximum 90% of the code alone were tested with a probability of success 0.9. The reliability of the module is
(A) atleast greater than 0.9
(B) equal to 0.9
(C) atmost 0.81
(D) atleast 1/0.81

31. The upper bound of computing time of m coloring decision problem is
(A) O(nm)
(B) O(nm)
(C) O(nmn)
(D) O(nmmn)

32. The equivalent grammar corresponding to the grammar G : S → aA, A → BB, B → aBb | ∈ is
(A) S → aA, A → BB, B → aBb
(B) S → a|aA, A → BB, B → aBb | ab
(C) S → a | aA, A → BB | B, B → aBb
(D) S → a | aA, A → BB | B, B → aBb | ab

33. Which one of the following statements is incorrect ?
(A) The number of regions corresponds to the cyclomatic complexity.
(B) Cyclometric complexity for a flow graph G is V(G) = N – E + 2, where E is the number of edges and N is the number of nodes in the flow graph.
(C) Cyclometric complexity for a flow graph G is V(G) = E – N + 2, where E is the number of edges & N is the number of nodes in the flow graph.
(D) Cyclometric complexity for a flow graph G is V(G) = P + 1, where P is the number of predicate nodes contained in the flow graph G.

34. Consider a weighted undirected graph with positive edge weights and let (u, v) be an edge in the graph. It is known that the shortest path from source vertex s to u has weight 53 and shortest path from s to v has weight 65. Which statement is always true ?
(A) Weight (u, v) < 12
(B) Weight (u, v) = 12
(C) Weight (u, v) > 12
(D) Weight (u, v) > 12

35. Consider the regular expression (a + b) (a + b) … (a + b) (n-times). The minimum number of states in finite automaton that recognizes the language represented by this regular expression contains
(A) n states
(B) n + 1 states
(C) n + 2 states
(D) 2n states

36. Number of binary trees formed with 5 nodes are
(A) 32
(B) 36
(C) 120
(D) 42

37. Are we building the right product ? This statement refers to
(A) Verification
(B) Validation
(C) Testing
(D) Software quality assurance

38. The following postfix expression is evaluated using a stack 823^/23* + 51* – The top two elements of the stack after first * is evaluated
(A) 6, 1
(B) 5, 7
(C) 3, 2
(D) 1, 5
Explanation: 

39. The following CFG
S → aB | bA, A → a | as | bAA,
B → b | bs | aBB
generates strings of terminals that have
(A) odd number of a’s and odd number of b’s
(B) even number of a’s and even number of b’s
(C) equal number of a’s and b’s
(D) not equal number of a’s and b’s

40. Consider the following pseudo-code :
If (A > B) and (C > D) then
         A = A + 1
         B = B + 1
Endif
The cyclomatic complexity of the pseudo-code is
(A) 2
(B) 3
(C) 4
(D) 5

41. Which layer of OSI reference model uses the ICMP (Internet Control Message Protocol) ?
(A) Transport layer
(B) Data link layer
(C) Network layer
(D) Application layer

42. Which one of the following binary search tree is optimal, if probabilities of successful search and  unsuccessful search are same ?

Answer: (D)

43. The regular expression for the following DFA is

(A) ab*(b + aa*b)*
(B) a*b(b + aa*b)*
(C) a*b(b* + aa*b)
(D) a*b(b * + aa*b)*

44. Which diagram provides a formal graphic notation for modelling objects, classes and their relationships to one another ?
(A) Object diagram
(B) Class diagram
(C) Instance diagram
(D) Analysis diagram

45. A computer system supports 32 bit virtual address as well as 32 bit physical addresses. Since the virtual
address space is of same size as that of physical address space, if we want to get rid of virtual memory, which one of the following is true ?
(A) Efficient implementation of multiuser support is no longer possible.
(B) The processor cache can be made more efficient.
(C) Hardware support for memory management is not needed.
(D) CPU scheduling can be made more efficient.

46. The feasible region represented by the constraints
x1- x2 ≤1, x1 + x2 ≥ 3, x1 ≥ 0, x2 ≥ 0 of the objective function
Max Z = 3x1+ 2x2 is
(A) A polygon
(B) Unbounded feasible region
(C) A point
(D) None of these

47. The colour of an object is largely determined by its diffuse reflection coefficient. If Kd = (0.8, 0.4, 0), then what shall be the colour of the object, if the light used is blue and magenta ?
(A) White and Red
(B) Red and Blue
(C) Black and White
(D) Black and Red

48. If an instruction takes ‘i’ microseconds and a page fault takes an additional ‘j’ microseconds. The effective instruction time, if on the average a page fault occurs every k instructions, is
(A) i + j/k
(B) i + j * k
(C) (i + j)/k
(D) (i + j) * k

49. In any simplex table, if corresponding to any negative Δj, all elements of the column are negative or zero, the solution under the test is
(A) degenerate solution
(B) unbounded solution
(C) alternative solution
(D) non-existing solution

50. How many relations are there on a set with n elements that are symmetric and a set with n elements that are reflexive and symmetric ?
(A) 2n(n+1)/2 and 2n.3n(n–1)/2
(B) 3n(n–1)/2 and 2n(n–1)
(C) 2n(n+1)/2 and 3n(n–1)/2
(D) 2n(n+1)/2 and 2n(n–1)/2

51. The strategy used to reduce the number of tree branches and the number of static evaluations applied in case of a game tree is
(A) Minmax strategy
(B) Alpha-beta pruning strategy
(C) Constraint satisfaction strategy
(D) Static max strategy

52. Match the following :
(i) Regular Grammar                    (a) Pushdown automaton
(ii) Context free Grammar            (b) Linear bounded automaton
(iii) Unrestricted Grammar            (c) Deterministic finite automaton
(iv) Context Sensitive Grammar    (d) Turing machine
      (i)  (ii) (iii) (iv)
(A) (c) (a) (b) (d)
(B) (c) (a) (d) (b)
(C) (c) (b) (a) (d)
(D) (c) (b) (d) (a)

53. Consider the below circuit and find the output function f(x, y, z).

(A) XZ+ XY +YZ
(B) XZ+ XY +Y Z
(C) XZ + XY +Y Z
(D) XZ + XY + YZ
Explanation: 

54. What is the size (in terms of bits) of Header length field in IPV4 header ?
(A) 2
(B) 4
(C) 8
(D) 16

55. Match the following with respect to java.util.* class methods :
(a) Bit Set             (i) Time zone getTimezone( )
(b) Calendar         (ii) int hashcode( )
(c) Time zone        (iii) int nextInt( )
(d) Random          (iv) Void setID(String tzName)
      (a)  (b)  (c) (d)
(A) (ii)  (i)   (iv) (iii)
(B) (iii)  (iv) (i)   (ii)
(C) (iv) (iii)  (ii)  (i)
(D) (ii)   (i)  (iii) (iv)

56. ______ is sometimes said to be object oriented, because the only way to manipulate kernel objects is by
invoking methods on their handles.
(A) Windows NT
(B) Windows XP
(C) Windows VISTA
(D) Windows 95/98

57. A user level process in Unix traps the signal sent on a Ctrl + C input and has a signal handling routine that saves appropriate files before terminating the process. When a Ctrl + C input is given to this process, what is the mode in which the signal handling routine executes ?
(A) User mode
(B) Kernel mode
(C) Superuser mode
(D) Privileged mode

58. A CPU generally handles an interrupt by executing an interrupt service routine
(A) as soon as an interrupt is raised
(B) by checking the interrupt register at the end of fetch cycle
(C) by checking the interrupt register after finishing the executing the current instruction
(D) by checking the interrupt register at fixed time intervals

59. The perspective projection matrix, on the view plane z = d where the centre of projection is the origin (0, 0, 0) shall be








 Answer: (B)

60. Radio signals generally propagate according to the following mechanisms:
(A) Modulation, Amplification, Scattering
(B) Reflection, Diffraction, Scattering
(C) Amplification, Diffraction, Modulation
(D) Reflection, Amplification, Diffraction

61. Identify the devices given below with their IC numbers :
(i) USART                       (a) 8251
(ii) Micro controller          (b) 8051
(iii) Interrupt controller    (c) 8259
(iv) DMA controller         (d) 8257
      (i) (ii) (iii) (iv)
(A) (a) (b) (c) (d)
(B) (b) (a) (d) (c)
(C) (c) (d) (a) (b)
(D) (d) (a) (b) (c)

62. The optimal solution of the following assignment problem using Hungarian method is
  
      (A) (B) (C) (D)
(A) (I) (II) (III) (IV)
(B) (I) (III) (II) (IV)
(C) (I) (III) (IV) (II)
(D) (I) (IV) (II) (III)
Explanation: 

63. If a and b are the end points of a line, then which one of the following is true ?
(A) If both end points are left, right, above or below the window, the line is invisible.
(B) If both end points are left, right, above or below the window, the line is completely visible.
(C) If both end points are left, right, above or below the window, the line is trivially visible.
(D) If both end points are left, right, above or below the window, the line is trivially invisible.

64. Match the following with link quality measurement and handoff initiation :
(a) Networked- Controlled Handoff (NCHO)         (i) MS connect to BS
(b) Mobile- Assisted Handoff (MAHO)                 (ii) Process via channel the target BS
(c) Forward Handoff                                             (iii) First Generation Analog Cellular System
(d) Hard Handoff                                                  (iv) Second Generation Digital Cellular System
      (a) (b) (c) (d)
(A) (iii) (iv) (ii) (i)
(B) (ii) (iii) (i) (iv)
(C) (ii) (i) (iv) (iii)
(D) (iv) (iii) (i) (ii)

65. Consider the methods used by processes P1 and P2 for accessing their critical sections. The initial values of shared Boolean variables S1 and S2 are randomly assigned,
               P1                                 P2                       critical section                    critical section
while (S1 = = S2);           while (S1 = = S2);                S1 = S2;                             S1 = S2;

Which one of the following statements describes the properties achieved ?
(A) Mutual exclusion but not progress
(B) Progress but not mutual exclusion
(C) Neither mutual exclusion nor progress
(D) Both mutual exclusion and progress

66. If the period of a signal is 1000 ms, then what is its frequency in kilohertz ?
(A) 10–3 KHz
(B) 10–2 KHz
(C) 10–1 KHz
(D) 1 KHz
Hint: F=1/T where F frequency, T time

67. Let a * H and b * H be two cosets of H.
(i) Either a * H and b * H are disjoint
(ii) a * H and b * H are identical Then,
(A) only (i) is true
(B) only (ii) is true
(C) (i) or (ii) is true
(D) (i) and (ii) is false

68. HTML is defined using SGML – an _______ standard, information processing-text and office systems
(SGML) for text information processing.
(A) ISO – 8878
(B) ISO – 8879
(C) ISO – 8880
(D) ISO – 8881

69. What is the meaning of ‘Hibernate’ in Windows XP/Windows 7 ?
(A) Restart the computers in safe mode.
(B) Restart the computers in normal mode.
(C) Shutdown the computer terminating all the running applications.
(D) Shutdown the computer without closing the running applications.

70. Assume that we have constructor functions for both base class and derived class. Now consider the
declaration in main( ). Base * P = New Derived; in what sequence will the constructor be called ?
(A) Derived class constructor followed by Base class constructor.
(B) Base class constructor followed by derived class constructor.
(C) Base class constructor will not be called.
(D) Derived class constructor will not be called.

71. Which one of the following options is not a shell in UNIX system ?
(A) Bourne Shell
(B) C Shell
(C) Net Shell
(D) Korn Shell

72. G1 and G2 are two graphs as shown :

(A) Both G1 and G2 are planar graphs.
(B) Both G1 and G2 are not planar graphs.
(C) G1 is planar and G2 is not planar graph.
(D) G1 is not planar and G2 is planar graph.

73. In which file the compiler manage the various objects, which are used in windows programming ?
(A) Control File
(B) Binary File
(C) Text File
(D) Obj File

74. On a disk with 1000 cylinders (0 to 999) find the number of tracks, the disk arm must move to satisfy all
the requests in the disk queue. Assume the last request service was at track 345 and the head is moving toward track 0. The queue in FIFO order contains requests for the following tracks :
123, 874, 692, 475, 105, 376
(Assume SCAN algorithm)
(A) 2013
(B) 1219
(C) 1967
(D) 1507

75. Halftoning is defined as
(A) a technique to obtain increased visual resolution using multiple intensity levels.
(B) a technique for using minimum number of intensity levels to obtain increased visual resolution.
(C) a technique to obtain increased visual resolution using maximum number of intensity levels.
(D) a technique for using appropriate number intensity levels to obtain increased visual resolution.

UGC NET Computer Science Solved Paper -II June2012....

Questions along with Answers Below - Explanations are always welcome

1. The postfix expression AB + CD – * can be evaluated using a
(A) stack
(B) tree
(C) queue
(D) linked list


2. The post order traversal of a binary tree is DEBFCA. Find out the preorder traversal.
(A) ABFCDE
(B) ADBFEC
(C) ABDECF
(D) None of the above


3. The branch logic that provides making capabilities in the control unit is known as
(A) Controlled transfer
(B) Conditional transfer
(C) Unconditional transfer
(D) None of the above


4. The number of colours required to properly colour the vertices of every planer graph is
(A) 2
(B) 3
(C) 4
(D) 5

Note: 2 colour may not be apply for every planer graph

5. Networks that use different technologies can be connected by using
(A) Packets
(B) Switches
(C) Bridges
(D) Routers


6. Both hosts and routers are TCP/IP protocol software. However, routers do not use protocol from all layers. The layer for which protocol software is not needed by a router is
(A) Layer – 5 (Application)
(B) Layer – 1 (Physical)
(C) Layer – 3 (Internet)
(D) Layer – 2 (Network Interface)


7. In multiuser database if two users wish to update the same record at the same time, they are prevented from doing so by
(A) Jamming
(B) Password
(C) Documentation
(D) Record lock


8. A binary search tree is a binary tree :
(A) All items in the left subtree are less than root
(B) All items in the right subtree are greater than or equal to the root
(C) Each subtree is itself a binary search tree
(D) All of the above


9. What deletes the entire file except the file structure ?
(A) ERASE
(B) DELETE
(C) ZAP
(D) PACK

10. Which command is the fastest among the following ?
(A) COPY TO <NEW FILE>
(B) COPY STRUCTURE TO <NEW FILE>
(C) COPY FILE <FILE 1> <FILE 2>
(D) COPY TO MFILE-DAT DELIMITED

11. B+ tree are preferred to binary tree in Database because
(A) Disk capacity are greater than memory capacities
(B) Disk access is much slower than memory access
(C) Disk data transfer rates are much less than memory data transfer rate
(D) Disks are more reliable than memory

12. A Transaction Manager is which of the following ?
(A) Maintains a log of transactions
(B) Maintains before and after database images
(C) Maintains appropriate concurrency control
(D) All of the above

13. Leaves of which of the following trees are at the same level ?
(A) Binary tree
(B) B-tree
(C) AVL-tree
(D) Expression tree

14. Which of the following TCP/IP Internet protocol is diskless machine uses to obtain its IP address from a
server ?
(A) RAP
(B) RIP
(C) ARP
(D) X.25

15. Decryption and encryption of data are the responsibility of which of the following layer ?
(A) Physical layer
(B) Data Link layer
(C) Presentation layer
(D) Session layer

16. In which circuit switching, delivery of data is delayed because data must be stored and retrieved from RAM ?
(A) Space division
(B) Time division
(C) Virtual
(D) Packet

17. In which Routing Method do all the routers have a common database ?
(A) Distance vector
(B) Link state
(C) Link vector
(D) Dijkestra method

18. Page Shift Keying (PSK) Method is used to modulate digital signal at 9600 bps using 16 level. Find the line signals and speed (i.e. modulation rate).
(A) 2400 bauds
(B) 1200 bauds
(C) 4800 bauds
(D) 9600 bauds
Hint:  D = R/b or  D = R/log2 L
where D= modulation rate in baud ; R data rate in bps; L number of di erent signal elements; 
b number of bits per signal element

19. The station to hub distance in which it is 2000 metres.
(A) 100 Base-Tx
(B) 100 Base-Fx
(C) 100 Base-T4
(D) 100 Base-T1

20. Main aim of software engineering is to produce
(A) program
(B) software
(C) within budget
(D) software within budget in the given schedule

21. Key process areas of CMM level 4 are also classified by a process which is
(A) CMM level 2
(B) CMM level 3
(C) CMM level 5
(D) All of the above

22. Validation means
(A) are we building the product right
(B) are we building the right product
(C) verification of fields
(D) None of the above

23. If a process is under statistical control, then it is
(A) Maintainable
(B) Measurable
(C) Predictable
(D) Verifiable

24. In a function oriented design, we
(A) minimize cohesion and maximize coupling
(B) maximize cohesion and minimize coupling
(C) maximize cohesion and maximize coupling
(D) minimize cohesion and minimize coupling

25. Which of the following metric does not depend on the programming language used ?
(A) Line of code
(B) Function count
(C) Member of token
(D) All of the above

26. A / B+ tree index is to be built on the name attribute of the relation STUDENT. Assume that all students
names are of length 8 bytes, disk block are of size 512 bytes and index pointers are of size 4 bytes. Given this scenario what would be the best choice of the degree (i.e. the number of pointers per node) of the B+ tree ?
(A) 16
(B) 42
(C) 43
(D) 44
Hint: 512/4 = 128 128/8 = 16

27. The Inorder traversal of the tree will yield a sorted listing of elements of tree in
(A) Binary tree
(B) Binary search tree
(C) Heaps
(D) None of the above

28. Mobile IP provides two basic functions.
(A) Route discovery and registration
(B) Agent discovery and registration
(C) IP binding and registration
(D) None of the above

29. Pre-emptive scheduling is the strategy of temporarily suspending a running process
(A) before the CPU time slice expires
(B) to allow starving processes to run
(C) when it requests I/O
(D) to avoid collision

30. In round robin CPU scheduling as time quantum is increased the average turn around time
(A) increases
(B) decreases
(C) remains constant
(D) varies irregularly

31. Resources are allocated to the process on non-sharable basis is
(A) mutual exclusion
(B) hold and wait
(C) no pre-emption
(D) circular wait

32. Cached and interleaved memories are ways of speeding up memory access between CPU’s and slower RAM. Which memory models are best suited (i.e. improves the performance most) for which programs ?
(i) Cached memory is best suited for small loops.
(ii) Interleaved memory is best suited for small loops
(iii) Interleaved memory is best suited for large sequential code.
(iv) Cached memory is best suited for large sequential code.
(A) (i) and (ii) are true.
(B) (i) and (iii) are true.
(C) (iv) and (ii) are true.
(D) (iv) and (iii) are true.

33. Consider the following page trace:
 4,3, 2, 1, 4, 3, 5, 4, 3, 2, 1, 5
Percentage of page fault that would occur if FIFO page replacement algorithm is used with number of frames for the JOB m = 4 will be
(A) 8
(B) 9
(C) 10
(D) 12
Hint: 4,3,2,1,5,4,3,2,1,5 Page faults

34. Check sum used along with each packet computes the sum of the data, where data is treated as a sequence of
(A) Integer
(B) Character
(C) Real numbers
(D) Bits
Note: The Key given By UGC NET is wrong

35. If an integer needs two bytes of storage, then the maximum value of a signed integer is
(A) 216 – 1
(B) 215 – 1
(C) 216
(D) 215

36. Which of the following logic families is well suited for high-speed operations ?
(A) TTL
(B) ECL
(C) MOS
(D) CMOS

37. Interrupts which are initiated by an instruction are
(A) Internal
(B) External
(C) Hardware
(D) Software

38. printf(“%c”, 100);
(A) prints 100
(B) prints ASCII equivalent of 100
(C) prints garbage
(D) none of the above

39. For the transmission of the signal, Bluetooth wireless technology uses
(A) time division multiplexing
(B) frequency division multiplexing
(C) time division duplex
(D) frequency division duplex

40. Consider the following statements :
I. Recursive languages are closed under complementation.
II. Recursively enumerable languages are closed under union.
III. Recursively enumerable languages are closed under complementation.
Which of the above statements are true ?
(A) I only
(B) I and II
(C) I and III
(D) II and III

41. What is the routing algorithm used by RIP and IGRP ?
(A) OSPF
(B) Link-state
(C) Dynamic
(D) Dijkestra vector

42. Identify the incorrect statement :
(A) The overall strategy drives the E-Commerce data warehousing strategy.
(B) Data warehousing in an E-Commerce environment should be done in a classical manner.
(C) E-Commerce opens up an entirely new world of web server.
(D) E-Commerce security threats can be grouped into three major categories.

43. Reliability of software is directly dependent on
(A) quality of the design
(B) number of errors present
(C) software engineers experience
(D) user requirement

44. ______ is not an E-Commerce application.
(A) House banking
(B) Buying stocks
(C) Conducting an auction
(D) Evaluating an employee

45. ______ is a satellite based tracking system that enables the determination of person’s position.
(A) Bluetooth
(B) WAP
(C) Short Message Service
(D) Global Positioning System

46. A complete microcomputer system consists of
(A) Microprocessor
(B) Memory
(C) Peripheral equipment
(D) All of the above

47. Where does a computer add and compare data ?
(A) Hard disk
(B) Floppy disk
(C) CPU chip
(D) Memory chip

48. Pipelining strategy is called implement
(A) instruction execution
(B) instruction prefetch
(C) instruction decoding
(D) instruction manipulation

49. Which of the following data structure is linear type ?
(A) Strings
(B) Lists
(C) Queues
(D) All of the above

50. To represent hierarchical relationship between elements, which data structure is suitable ?
(A) Dequeue
(B) Priority
(C) Tree
(D) All of the above

UGC NET Solved Paper I June2012


Questions along with Answers Below - Explanations are always welcome

1. Video-Conferencing can be classified as one of the following types of communication :
(A) Visual one way
(B) Audio-Visual one way
(C) Audio-Visual two way
(D) Visual two way

2. MC National University of Journalism and Communication is located at
(A) Lucknow (B) Bhopal  (C) Chennai (D) Mumbai

3. All India Radio (A.I.R.) for broadcasting was named in the year
(A) 1926 (B) 1936 (C) 1946 (D) 1956

4. In India for broadcasting TV programmes which system is followed ?
(A) NTCS (B) PAL (C) NTSE (D) SECAM

5. The term ‘DAVP’ stands for
(A) Directorate of Advertising & Vocal Publicity
(B) Division of Audio-Visual Publicity
(C) Department of Audio-Visual Publicity
(D) Directorate of Advertising & Visual Publicity

6. The term “TRP” is associated with TV shows stands for
(A) Total Rating Points
(B) Time Rating Points
(C) Thematic Rating Points
(D) Television Rating Points

7. Which is the number that comes next in the following sequence ?
2, 6, 12, 20, 30, 42, 56, _____
(A) 60 (B) 64 (C) 72 (D) 70

8. Find the next letter for the series YVSP ………
(A) N (B) M (C) O (D) L

9. Given that in a code language,
‘645’ means ‘day is warm’; ‘42’ means ‘warm spring’ and ‘634’ means ‘spring is sunny’;
which digit represents ‘sunny’ ?
(A) 3 (B) 2 (C) 4 (D) 5

10. The basis of the following classification is :
‘first President of India’ ‘author of Godan’ ‘books in my library’, ‘blue things’ and ‘students who work hard’
(A) Common names
(B) Proper names
(C) Descriptive phrases
(D) Indefinite description

11. In the expression ‘Nothing is larger than itself’ the relation ‘is larger than’ is
(A) antisymmetric
(B) asymmetrical
(C) intransitive
(D) irreflexive

12. Assertion (A) : There are more laws on the books today than ever before, and more crimes being committed than ever before.
Reason (R) : Because to reduce crime we must eliminate the laws.
Choose the correct answer from below :
(A) (A) is true, (R) is doubtful and (R) is not the correct explanation of (A).
(B) (A) is false, (R) is true and (R) is the correct explanation of (A).
(C) (A) is doubtful, (R) is doubtful and (R) is not the correct explanation of (A).
(D) (A) is doubtful, (R) is true and (R) is not the correct explanation of (A).

13. If the proposition “All men are not mortal” is true then which of the following inferences is correct ? Choose from the code given below :
1. “All men are mortal” is true.
2. “Some men are mortal” is false.
3. “No men are mortal” is doubtful.
4. “All men are mortal” is false.
Code :
(A) 1, 2 and 3
(B) 2, 3 and 4
(C) 1, 3 and 4
(D) 1 and 3

14. Determine the nature of the following
definition : “Abortion” means the ruthless murdering of innocent beings.
(A) Lexical (B) Persuasive (C) Stipulative (D) Theoretical

15. Which one of the following is not an argument ?
(A) Devadutt does not eat in the day so he must be eating at night.
(B) If Devadutt is growing fat and if he does not eat during the day, he will be eating at night.
(C) Devadutt eats in the night so he does not eat during the day.
(D) Since Devadutt does not eat in the day, he must be eating in the night.

16. Venn diagram is a kind of diagram to
(A) represent and assess the validity of elementary inferences of syllogistic form.
(B) represent but not assess the validity of elementary inferences of syllogistic form.
(C) represent and assess the truth of elementary inferences of syllogistic form.
(D) assess but not represent the truth of elementary inferences of syllogistic form.

17. Reasoning by analogy leads to
(A) certainty
(B) definite conclusion
(C) predictive conjecture
(D) surety

18. Which of the following statements are false ? Choose from the code given below :
1. Inductive arguments always proceed from the particular to the general.
2. A cogent argument must be inductively strong.
3. A valid argument may have a false premise and a false conclusion.
4. An argument may legitimately be spoken of as ‘true’ or ‘false’.
Code :
(A) 2, 3 and 4
(B) 1 and 3
(C) 2 and 4
(D) 1 and 2

19. Six persons A, B, C, D, E and F are standing in a circle. B is between F and C, A is between E and D, F is to the left of D. Who is between A and F ?
(A) B
(B) C
(C) D
(D) E

20. The price of petrol increases by 25%. By what percentage must a customer reduce the consumption so that the earlier bill on the petrol does not alter ?
(A) 20% (B) 25% (C) 30% (D) 33.33%

21. If Ram knows that y is an integer greater than 2 and less than 7 and Hari knows that y is an integer greater than 5 and less than 10, then they may correctly conclude that
(A) y can be exactly determined
(B) y may be either of two values
(C) y may be any of three values
(D) there is no value of y satisfying these conditions

22. Four pipes can fill a reservoir in 15, 20, 30 and 60 hours respectively. The first one was opened at 6 AM, second at 7 AM, third at 8 AM and the fourth at 9 AM. When will the reservoir be filled ?
(A) 11 AM (B) 12 Noon (C) 1 PM (D) 1:30 PM

The total electricity generation in a country is 97 GW. The contribution of various energy sources is indicated in percentage terms in the Pie Chart given below ;

23. What is the contribution of wind and solar power in absolute terms in the electricity generation ?
(A) 6.79 GW (B) 19.4 GW (C) 9.7 GW (D) 29.1 GW

24. What is the contribution of renewable energy sources in absolute terms in the electricity generation ?
(A) 29.1 GW (B) 26.19 GW (C) 67.9 GW (D) 97 GW

25. TCP/IP is necessary if one is to connect to the
(A) Phone lines
(B) LAN
(C) Internet
(D) a Server

26. Each character on the keyboard of computer has an ASCII value which stands for
(A) American Stock Code for Information Interchange
(B) American Standard Code for Information Interchange
(C) African Standard Code for Information Interchange
(D) Adaptable Standard Code for Information Change

27. Which of the following is not a programming language ?
(A) Pascal
(B) Microsoft Office
(C) Java
(D) C++

28. Minimum number of bits required to store any 3 digit decimal number is equal to
(A) 3
(B) 5
(C) 8
(D) 10

29. Internet explorer is a type of
(A) Operating System
(B) Compiler
(C) Browser
(D) IP address

30. POP3 and IMAP are e-mail accounts in which
(A) One automatically gets one’s mail everyday
(B) One has to be connected to the server to read or write one’s mail
(C) One only has to be connected to the server to send and receive email
(D) One does not need any telephone lines

31. Irritation in eyes is caused by the pollutant
(A) Sulphur di-oxide
(B) Ozone
(C) PAN
(D) Nitrous oxide

32. Which is the source of chlorofluorocarbons ?
(A) Thermal power plants
(B) Automobiles
(C) Refrigeration and Airconditioning
(D) Fertilizers

33. Which of the following is not a renewable natural resource ?
(A) Clean air (B) Fertile soil (C) Fresh water (D) Salt

34. Which of the following parameters is not used as a pollution indicator in water ?
(A) Total dissolved solids
(B) Coliform count
(C) Dissolved oxygen
(D) Density

35. S and P waves are associated with
(A) floods
(B) wind energy
(C) earthquakes
(D) tidal energy

36. Match Lists I and II and select the correct answer from the codes given below :
List – I                                                        List – II
(i) Ozone hole                                            (a) Tsunami
(ii) Greenhouse effect                                 (b) UV radiations
(iii) Natural hazards                                    (c) Methane
(iv) Sustainable development                      (d) Eco-centrism
Codes :
      (i)  (ii) (iii) (iv)
(A) (b) (c) (a) (d)
(B) (c) (b) (a) (d)
(C) (d) (c) (a) (b)
(D) (d) (b) (c) (a)

37. Indian Institute of Advanced Study is located at
(A) Dharmshala
(B) Shimla
(C) Solan
(D) Chandigarh

38. Indicate the number of Regional Offices of National Council of Teacher Education.
(A) 04
(B) 05
(C) 06
(D) 08

39. Which of the following rights was considered
the “Heart and Soul” of  the Indian Constitution by  Dr. B.R. Ambedkar ?
(A) Freedom of Speech
(B) Right to Equality
(C) Right to Freedom of Religion
(D) Right to Constitutional Remedies

40. Who among the following created the office of the District Collector in India ?
(A) Lord Cornwallis
(B) Warren Hastings
(C) The Royal Commission on Decentralisation
(D) Sir Charles Metcalfe

41. The Fundamental Duties of a citizen include
1. Respect for the Constitution, the National Flag and the National Anthem
2. To develop the scientific temper.
3. Respect for the Government.
4. To protect Wildlife.
Choose the correct answer from the codes given below : Codes :
(A) 1, 2 and 3
(B) 1, 2 and 4
(C) 2, 3 and 4
(D) 1, 3, 4 and 2

42. The President of India takes oath
(A) to uphold the sovereignty and integrity of India.
(B) to bear true faith and allegiance to the Constitution of India.
(C) to uphold the Constitution and Laws of the country.
(D) to preserve, protect and defend the Constitution and the law of the country.

43. If you get an opportunity to teach a visually challenged student along with normal students, what type of treatment would you like to give him in the class ?
(A) Not giving extra attention because majority may suffer.
(B) Take care of him sympathetically in the class- room.
(C) You will think that blindness is his destiny and hence you cannot do anything.
(D) Arrange a seat in the front row and try to teach at a pace convenient to him.

44. Which of the following is not a characteristic of a good achievement test ?
(A) Reliability (B) Objectivity (C) Ambiguity (D) Validity

45. Which of the following does not belong to a projected aid ?
(A) Overhead projector
(B) Blackboard
(C) Epidiascope
(D) Slide projector

46. For a teacher, which of the following methods would be correct for writing on the blackboard ?
(A) Writing fast and as clearly as possible.
(B) Writing the matter first and then asking students to read it.
(C) Asking a question to students and then writing the answer as stated by them.
(D) Writing the important points as clearly as possible.

47. A teacher can be successful if he/she
(A) helps students in becoming better citizens
(B) imparts subject knowledge to students
(C) prepares students to pass the examination
(D) presents the subject matter in a well organized manner

48. Dynamic approach to teaching means
(A) Teaching should be forceful and effective
(B) Teachers should be energetic and dynamic
(C) The topics of teaching should not be static, but dynamic
(D) The students should be required to learn through activities

49. The research that aims at immediate application is
(A) Action Research
(B) Empirical Research
(C) Conceptual Research
(D) Fundamental Research

50. When two or more successive footnotes refer to the same work which one of the following expressions is used ?
(A) ibid (B) et.al (C) op.cit : (D) loc.cit.

51. Nine year olds are taller than seven year olds. This is an example of a reference drawn from
(A) Vertical study
(B) Cross-sectional study
(C) Time series study
(D) Experimental study

52. Conferences are meant for
(A) Multiple target groups
(B) Group discussions
(C) Show-casing new Research
(D) All the above

53. Ex Post Facto research means
(A) The research is carried out after the incident
(B) The research is carried out prior to the incident
(C) The research is carried out along with the happening of an incident.
(D) The research is carried out keeping in mind the possibilities of an incident.

54. Research ethics do not include
(A) Honesty (B) Subjectivity (C) Integrity (D) Objectivity


Read the following passage carefully and answer the questions 55 to 60 :
James Madison said, “A people who mean to be their own governors must arm themselves with power that knowledge gives.” In India, the Official Secrets Act, 1923 was a convenient smokescreen to deny members of the public access to information. Public functioning has traditionally been shrouded in secrecy. But in a democracy in which people govern themselves, it is necessary to have more openness. In the maturing of our democracy, right to information is a major step forward; it enables citizens to participate fully in the decision-making process that affects their lives so profoundly. It is in this context that the address of the Prime Minister in the Lok Sabha is significant. He said, “I would only like to see that everyone, particularly our civil
servants, should see the Bill in a positive spirit; not as a draconian law for paralyzing Government, but as an instrument for improving Government-Citizen interface resulting in a friendly, caring and effective Government functioning for the good of our People.” He further said, “This is an innovative Bill, where there will be scope to review its functioning as we gain experience. Therefore, this is a piece of legislation, whose working will be kept under constant reviews.”
The Commission, in its Report, has dealt with the application of the Right to Information in Executive, Legislature and Judiciary. The judiciary could be a pioneer in implementing the Act in letter and spirit because much of the work that the Judiciary does is open to public scrutiny, Government of India has sanctioned an e-governance project in the Judiciary for about ` 700 crores which would bring about systematic classification, standardization and categorization of records. This would help the judiciary to fulfil its mandate under the Act. Similar capacity building would be required in all other public authorities. The transformation from nontransparency to transparency and public accountability is the responsibility of all three organs of State.

55. A person gets power
(A) by acquiring knowledge
(B) from the Official Secrets Act, 1923
(C) through openings
(D) by denying public information

56. Right to Information is a major step forward to
(A) enable citizens to participate fully in the decision making process
(B) to make the people aware of the Act
(C) to gain knowledge of administration
(D) to make the people Government friendly

57. The Prime Minister considered the Bill
(A) to provide power to the civil servants
(B) as an instrument for improving Government-citizen interface resulting in a friendly, caring and effective Government
(C) a draconian law against the officials
(D) to check the harassment of the people

58. The Commission made the Bill effective by
(A) extending power to the executive authorities
(B) combining the executive and legislative power
(C) recognizing Judiciary a pioneer in implementing the act in letter and spirit
(D) educating the people before its implementation

59. The Prime Minister considered the Bill innovative and hoped that
(A) It could be reviewed based on the experience gained on its functioning.
(B) The civil servants would see the Bill in a positive spirit.
(C) It would not be considered as a draconian law for paralyzing Government
(D) All the above

60. The transparency and public accountability is the responsibility of three organs of the State.
These three organs are
(A) Lok Sabha, Rajya Sabha and Judiciary
(B) Lok Sabha, Rajya Sabha and Executive
(C) Judiciary, Legislature and the Commission
(D) Legislature, Executive and Judiciary