ugcnet
ugcnet
Table of Contents 1
Contributors 15
1 Algorithms (100) 16
1.1 Activity Selection Problem (1) 17
1.2 Algorithm Design Technique (1) 17
1.3 Algorithm Efficiency (1) 18
1.4 Algorithms Sorting (1) 18
1.5 Array (2) 18
1.6 Artificial Intelligence (2) 18
1.7 Asymptotic Notation (8) 19
1.8 B Tree (2) 20
1.9 Bellman Ford (1) 20
1.10 Binary Heap (1) 21
1.11 Binary Search Tree (1) 21
1.12 Binary Tree (4) 21
1.13 Decision Tree (1) 22
1.14 Depth First Search (3) 22
1.15 Dijkstras Algorithm (1) 23
1.16 Double Hashing (1) 23
1.17 Dynamic Programming (2) 23
1.18 Graph Algorithms (2) 24
1.19 Graph Search (1) 24
1.20 Greedy Algorithms (1) 24
1.21 Huffman Code (2) 25
1.22 In Place Algo (1) 25
1.23 Knapsack Problem (2) 25
1.24 Linear Search (1) 26
1.25 Longest Common Subsequence (1) 26
1.26 Matrix Chain Ordering (4) 26
1.27 Merge Sort (2) 27
1.28 Minimum Spanning Tree (1) 27
1.29 Non Gatecse (1) 28
1.30 Optimal Search Tree (1) 28
1.31 Optimal Solution (1) 29
1.32 P NP NPC NPH (3) 29
1.33 Prims Algorithm (1) 30
1.34 Quick Sort (1) 30
1.35 Recurrence Relation (7) 30
1.36 Recursion (2) 32
1.37 Red Black Tree (1) 32
1.38 Shortest Path (2) 32
1.39 Sorting (4) 33
1.40 Space Complexity (2) 33
1.41 Time Complexity (10) 34
1.42 Topological Sort (1) 36
1.43 Tree (2) 37
1.44 Tree Search Algorithm (2) 37
1.45 Tree Traversal (1) 37
Answer Keys 38
2 Artificial Intelligence (45) 39
2.1 Artificial Intelligence (17) 39
2.2 Artificial Neural Network (1) 43
2.3 Back Propagation (1) 43
2.4 Blocks World Problem (1) 43
2.5 Chaining (1) 44
2.6 Expert System (2) 44
2.7 Fuzzy Logic (1) 44
2.8 Genetic Algorithms (1) 44
2.9 Heuristic Search (1) 45
2.10 Linear Programming (1) 45
2.11 Machine Learning (2) 45
2.12 Map Coloring (1) 46
2.13 Means End (1) 46
2.14 Minimax Procedure (1) 46
2.15 Neural Network (3) 47
2.16 Planning (1) 47
2.17 Prolog (2) 47
2.18 Reinforcement Learning (1) 48
2.19 Searches (1) 48
2.20 Sigmoid Function (1) 48
2.21 Strips (1) 49
2.22 User Query (1) 49
Answer Keys 49
3 CO and Architecture (100) 50
3.1 8085 Microprocessor (6) 50
3.2 Accumulator (1) 51
3.3 Addressing Modes (11) 52
3.4 Amdahls Law (1) 54
3.5 Assembly (15) 54
3.6 Byte Addressable (1) 57
3.7 CO and Architecture (12) 57
3.8 Cache Memory (5) 60
3.9 Cmos (1) 61
3.10 Compilation Phases (1) 61
3.11 Cpu (1) 61
3.12 DMA (1) 61
3.13 Data Transfer (1) 61
3.14 Dynamic Ram (1) 62
3.15 Flags (1) 62
3.16 Hardware Interrupt (1) 62
3.17 Instruction Format (1) 62
3.18 Integrated Circuits (1) 62
3.19 Interrupts (3) 63
3.20 Language (1) 63
3.21 Machine Instruction (2) 63
3.22 Memory (4) 64
3.23 Memory Data Transfer (1) 65
3.24 Microprocessors (12) 65
3.25 Microprogram Control Unit (1) 67
3.26 Parallel Computing (1) 67
3.27 Parallel Processing (1) 67
3.28 Pipelining (6) 68
3.29 Priority Encoder (1) 69
3.30 Processor Address Bus (1) 69
3.31 Register (1) 69
3.32 Speedup (2) 69
Answer Keys 70
4 Compiler Design (74) 71
4.1 Assembler (2) 75
4.2 Chomsky Normal Form (1) 75
4.3 Code Optimization (2) 76
4.4 Compilation Phases (2) 76
4.5 Compiler Optimization (2) 76
4.6 Constant Folding (1) 77
4.7 Context Sensitive (1) 77
4.8 Control Flow Graph (1) 77
4.9 Grammar (6) 77
4.10 Intermediate Code (1) 79
4.11 LR Parser (2) 79
4.12 Lexical Analysis (3) 79
4.13 Linker (1) 80
4.14 Machine Instruction (1) 80
4.15 Parameter Passing (2) 80
4.16 Parsing (13) 81
4.17 Quadruple Representation (1) 84
4.18 Runtime Environment (1) 84
4.19 Shift Reduce Parser (2) 84
4.20 Symbol Table (3) 85
4.21 System Software& Compilers (1) 85
4.22 Translator (1) 85
4.23 Two Pass Assembler (1) 86
Answer Keys 86
5 Computer Networks (294) 87
5.1 Analog & Digital Transmission (1) 98
5.2 Analog Signals (1) 98
5.3 Application Layer (1) 98
5.4 Asymmetric Key Cryptography (1) 98
5.5 Asymptotic Notation (1) 98
5.6 Binary Search Tree (1) 99
5.7 Binary Symmetric Channel (1) 99
5.8 Bit Oriented Protocol (1) 99
5.9 Bit Rate (1) 99
5.10 Bridges (1) 99
5.11 CRC Polynomial (2) 100
5.12 Cache Memory (1) 100
5.13 Checksum (1) 100
5.14 Classful Addressing (2) 100
5.15 Classless Addressing (1) 101
5.16 Communication (9) 101
5.17 Computer Neworks (1) 102
5.18 Cryptography (7) 103
5.19 Data Communication (7) 104
5.20 Data Link Layer (7) 106
5.21 Data Mining Algorithm (1) 107
5.22 Data Transmission (1) 107
5.23 Distance Vector Routing (2) 107
5.24 Edi Layer (1) 108
5.25 Electronic Payment Systems (1) 108
5.26 Encoding (2) 108
5.27 Encryption Decryption (2) 108
5.28 Entropy (1) 109
5.29 Error Correction (5) 109
5.30 Error Detection Correction (1) 110
5.31 Ethernet (5) 110
5.32 Firewall (1) 111
5.33 Hamming Distance (1) 111
5.34 Huffman Code (1) 111
5.35 IP Addressing (13) 111
5.36 IP Packet (2) 114
5.37 Internal Memory (1) 114
5.38 Internet Security (1) 114
5.39 Internet Stack Layers (1) 114
5.40 Ipv6 (1) 114
5.41 LAN Technologies (2) 115
5.42 Link State Routing (1) 115
5.43 Loopback Address (1) 115
5.44 Mesh topology (3) 116
5.45 Mobile Communication (7) 116
5.46 Modulation (2) 118
5.47 Multimedia Protocol (1) 118
5.48 Multiple Access Protocol (1) 118
5.49 Multiplexing (2) 118
5.50 Network Addressing (2) 119
5.51 Network Layer (1) 119
5.52 Network Layering (5) 119
5.53 Network Protocols (10) 120
5.54 Network Security (18) 122
5.55 Network Switching (5) 126
5.56 Network topologies (4) 127
5.57 Osi Model (11) 127
5.58 Osi Protocol (5) 130
5.59 Physical Layer (4) 131
5.60 Port Numbers (1) 131
5.61 Propagation Delay (1) 132
5.62 Propagation Time (1) 132
5.63 Protocol (1) 132
5.64 Rarp Protocol (1) 132
5.65 Routers Bridge Hubs Switches (2) 133
5.66 Routing (4) 133
5.67 Routing Algorithm (3) 134
5.68 Rsa (1) 134
5.69 Rsa Public Key (1) 134
5.70 Rsa Security Networks (2) 134
5.71 Session Layer (1) 135
5.72 Signalling (1) 135
5.73 Signals (1) 135
5.74 Sliding Window (4) 136
5.75 Slotted Aloha (1) 136
5.76 Subnetting (2) 137
5.77 TCP (4) 137
5.78 TCP Header (1) 138
5.79 TCP IP Model (1) 138
5.80 TCP IP Suit Protocols (1) 138
5.81 Tele Communication (1) 138
5.82 Token Bucket (1) 138
5.83 Transmission Media (9) 139
5.84 Unguided Media (1) 140
5.85 Wifi (1) 140
5.86 Wireless Communication (1) 141
5.87 Wireless Lan (4) 141
5.88 Wireless Networks (1) 142
5.89 Wireless Protocol (1) 142
5.90 Wireless Transmission (1) 142
Answer Keys 142
6 Data Mining and Warehousing (17) 145
6.1 Data Cube (1) 145
6.2 Data Mining (1) 145
6.3 Data Mining and Warehousing (1) 145
6.4 Decision Tree (1) 145
6.5 Expert System (1) 145
6.6 Fuzzy Set (1) 146
6.7 Group Decision Support System (1) 146
6.8 K Means Clustering (1) 146
6.9 Knowledge Representation (5) 147
6.10 Non Gatecse (1) 148
6.11 Olap (1) 148
6.12 Perceptron (1) 148
Answer Keys 149
7 Databases (180) 150
7.1 Aggregation (2) 156
7.2 B Tree (2) 156
7.3 B+tree (1) 157
7.4 Bcnf Decomposition (1) 157
7.5 Candidate Key (4) 157
7.6 Cardinality Ratio (1) 158
7.7 Circular Queue (1) 158
7.8 Concurrency Control Protocols (1) 159
7.9 Conflict Serializable (1) 159
7.10 Crosstabquery (1) 159
7.11 Data Dependency (2) 160
7.12 Data Integrity (1) 160
7.13 Data Mining (2) 160
7.14 Data Model (2) 161
7.15 Database Constraints (1) 161
7.16 Database Design (2) 161
7.17 Database Normalization (23) 162
7.18 Decomposition (3) 166
7.19 Dependency Preserving (1) 167
7.20 Distributed Database (2) 167
7.21 ER Diagram (18) 168
7.22 Enhanced ER Model (1) 172
7.23 File System (1) 173
7.24 Functional Dependency (1) 173
7.25 Generalization (1) 173
7.26 Granularity (1) 173
7.27 Hierarchical Database (1) 173
7.28 Indexing (1) 174
7.29 Java (1) 174
7.30 Joins (2) 174
7.31 Object Oriented Database (2) 175
7.32 Protocol (1) 175
7.33 Question Fixed (1) 176
7.34 Rdbms (8) 176
7.35 Recovery From Failure (1) 178
7.36 Referential Integrity (3) 178
7.37 Relation (1) 179
7.38 Relational Algebra (3) 179
7.39 Relational Calculus (2) 180
7.40 Relational Model (2) 180
7.41 Relational Schema (1) 181
7.42 SQL (33) 181
7.43 Transaction and Concurrency (8) 192
7.44 Transactions and Concurrency Control (2) 194
7.45 Weak Entity (1) 194
Answer Keys 194
8 Digital Logic (114) 196
8.1 Adder (4) 199
8.2 Boolean Algebra (10) 200
8.3 Circuit Output (5) 202
8.4 Combinational Circuit (3) 203
8.5 Digital Circuits (10) 204
8.6 Digital Counter (2) 206
8.7 Encoding (1) 206
8.8 Excess 3 (1) 206
8.9 Flip Flop (10) 206
8.10 Floating Point Representation (2) 208
8.11 Full Adder (1) 209
8.12 IEEE Representation (2) 209
8.13 K Map (6) 209
8.14 Memory (1) 211
8.15 Multiplexer (4) 211
8.16 Number Representation (11) 212
8.17 Number System (10) 214
8.18 Number Theory (1) 216
8.19 Priority Encoder (1) 216
8.20 ROM (1) 216
8.21 Ripple Counter Operation (3) 216
8.22 Sequential Circuit (6) 217
8.23 Sum of Product (1) 218
8.24 Unix (1) 218
Answer Keys 218
9 Discrete Mathematics: Combinatory (18) 220
9.1 Binary Tree (1) 220
9.2 Combinatory (7) 220
9.3 Counting (3) 221
9.4 Euler Phi Function (1) 222
9.5 Inclusion Exclusion (1) 222
9.6 Parenthesization (1) 222
9.7 Permutation and Combination (1) 222
9.8 Pigeonhole Principle (1) 223
9.9 Recurrence Relation (1) 223
Answer Keys 223
10 Discrete Mathematics: Graph Theory (45) 224
10.1 Binary Tree (1) 228
10.2 Euler Graph (2) 229
10.3 Flow Network (1) 229
10.4 Graph Coloring (3) 230
10.5 Graph Connectivity (7) 230
10.6 Graph Isomorphism (1) 231
10.7 Graph Planarity (2) 232
10.8 Hamiltonian Graph (1) 233
10.9 Handshaking Theorem (1) 233
10.10 Minimum Spanning Tree (1) 233
10.11 Non Planar (1) 234
10.12 Tree (2) 234
Answer Keys 235
11 Discrete Mathematics: Mathematical Logic (44) 236
11.1 Countable Uncountable Set (1) 240
11.2 First Order Logic (5) 240
11.3 Functions (1) 241
11.4 Group Theory (1) 242
11.5 Prolog (1) 242
11.6 Propositional Logic (15) 242
11.7 Relations (1) 246
Answer Keys 246
12 Discrete Mathematics: Set Theory & Algebra (20) 247
12.1 Boolean (1) 247
12.2 Complement In Fuzzy Set (1) 247
12.3 Euler Phi Function (1) 248
12.4 Factors (1) 248
12.5 Function Composition (1) 248
12.6 Functions (3) 248
12.7 Inclusion Exclusion (1) 249
12.8 Poset (1) 249
12.9 Power Set (1) 250
12.10 Relational Algebra (1) 250
12.11 Relations (5) 250
Answer Keys 251
13 Engineering Mathematics: Discrete Mathematics (36) 252
13.1 Boolean Function (1) 254
13.2 Combinatory (2) 254
13.3 Equivalence Class (1) 254
13.4 First Order Logic (2) 254
13.5 Functions (2) 255
13.6 Group Theory (1) 255
13.7 Linear Programming (1) 256
13.8 Number Representation (1) 256
13.9 Partial Order (2) 256
13.10 Propositional Logic (8) 256
13.11 Quantifiers (1) 259
13.12 Relations (1) 259
13.13 Set Theory (2) 259
Answer Keys 259
14 Engineering Mathematics: Linear Algebra (3) 261
14.1 Eigen Value (1) 261
Answer Keys 262
15 Engineering Mathematics: Probability (13) 263
15.1 Binary Tree (1) 263
15.2 Joint Distribution (1) 263
15.3 Poisson Distribution (1) 263
15.4 Probability (9) 263
Answer Keys 265
16 General Aptitude: Analytical Aptitude (1) 266
16.1 Number Series (1) 266
Answer Keys 266
17 General Aptitude: Quantitative Aptitude (27) 267
17.1 Data Interpretation (5) 272
17.2 Number System (1) 274
17.3 Percentage (1) 274
17.4 Quadratic Equations (1) 275
17.5 Work Time (1) 275
Answer Keys 275
18 General Aptitude: Verbal Aptitude (8) 276
18.1 Logical Reasoning (2) 277
Answer Keys 277
19 Non GATE CSE: Big Data Systems (1) 278
19.1 Big Data Systems (1) 278
Answer Keys 278
20 Non GATE CSE: Cloud Computing (2) 279
20.1 Cloud Computing (2) 279
Answer Keys 279
21 Non GATE CSE: Computer Graphics (83) 280
21.1 2d Geometry (1) 280
21.2 2d Transformation (1) 280
21.3 3d Graphics (2) 280
21.4 3d Rotation (1) 281
21.5 Animation (1) 281
21.6 Anti Aliasing (1) 281
21.7 Breshenmans Algorithm (1) 281
21.8 Color Models (1) 282
21.9 Computer Graphics (41) 282
21.10 Crt (2) 292
21.11 Digital Image Processing (5) 293
21.12 Display Devices (1) 294
21.13 Frame Buffer (1) 294
21.14 Halftoning (1) 294
21.15 Image Compression (1) 294
21.16 Image Entropy (1) 295
21.17 Image Rotation (2) 295
21.18 Line Clipping (1) 295
21.19 Line Drawing Algorithm (3) 295
21.20 Parametric Line Equation (1) 296
21.21 Phong Color Model (1) 296
21.22 Projection (8) 296
21.23 Raster Graphics (2) 298
21.24 Resolution (1) 299
21.25 Transformation (2) 299
Answer Keys 299
22 Non GATE CSE: Computer Peripherals (3) 301
22.1 Computer Peripherals (1) 301
22.2 IO Devices (1) 301
22.3 Matrix Printer (1) 301
Answer Keys 301
23 Non GATE CSE: Digital Image Processing (8) 302
23.1 Discovolution (1) 302
23.2 Entropy (2) 302
23.3 Fourier Transform (1) 302
23.4 Image Compression (4) 302
Answer Keys 303
24 Non GATE CSE: Digital Signal Processing (5) 304
24.1 Butterworth Lowpass Filter (1) 304
24.2 Digital Signal Processing (1) 304
24.3 Discrete Memoryless Channel (1) 304
24.4 Spatial Mask (1) 304
Answer Keys 305
25 Non GATE CSE: Distributed Computing (11) 306
25.1 Computing Models (1) 306
25.2 Distributed Computing (3) 306
25.3 Distributed Database (2) 306
25.4 Distributed System (2) 307
25.5 Message Passing (1) 307
25.6 Parallel Virtual Machine (1) 308
25.7 Rpc (1) 308
Answer Keys 308
26 Non GATE CSE: Geometry (2) 309
26.1 Geometry (1) 309
26.2 Lines Curves (1) 309
Answer Keys 309
27 Non GATE CSE: Integrated Circuits (1) 310
27.1 Integrated Circuits (1) 310
Answer Keys 310
28 Non GATE CSE: IS&Software Engineering (215) 311
28.1 Adaptive Maintenance (1) 314
28.2 Artificial Intelligence (2) 315
28.3 Assignment Problem (1) 315
28.4 CRC Polynomial (1) 315
28.5 Cmm Model (3) 316
28.6 Cmmi (1) 316
28.7 Cocomo Model (3) 317
28.8 Coding and Testing (1) 317
28.9 Cohesion (2) 318
28.10 Cost Estimation Model (2) 318
28.11 Coupling (3) 319
28.12 Coupling Cohesion (1) 319
28.13 Cyclomatic Complexity (2) 320
28.14 Data Mining (2) 320
28.15 Digital Marketing (1) 320
28.16 Fan In (1) 320
28.17 Flow Chart (1) 321
28.18 Function Point Metric (2) 321
28.19 Git (1) 321
28.20 Information System (1) 321
28.21 Is&software Engineering (62) 322
28.22 Life Cycle Model (1) 335
28.23 Mis (1) 335
28.24 Model View Controller (1) 335
28.25 Object Oriented Modelling (1) 336
28.26 Optimization (1) 336
28.27 Project Planning (1) 336
28.28 Project Tracking (1) 336
28.29 Risk Management (3) 337
28.30 Size Metrices (1) 337
28.31 Software (1) 337
28.32 Software Configuration (1) 338
28.33 Software Cost Estimation (1) 338
28.34 Software Design (18) 338
28.35 Software Development (3) 342
28.36 Software Development Life Cycle Models (11) 343
28.37 Software Development Models (1) 345
28.38 Software Intergrity (1) 345
28.39 Software Maintenance (2) 346
28.40 Software Metrics (3) 346
28.41 Software Process (1) 347
28.42 Software Quality Assurance (2) 347
28.43 Software Quality Characteristics (1) 347
28.44 Software Reliability (11) 347
28.45 Software Requirement Specification (1) 350
28.46 Software Requirement Specifications (1) 350
28.47 Software Reuse (1) 350
28.48 Software Testing (22) 351
28.49 Software Validation (1) 355
28.50 Source Code Metric (1) 355
28.51 Uml (1) 355
28.52 Validation (1) 355
28.53 Waterfall Model (2) 355
28.54 White Box Testing (1) 356
Answer Keys 356
29 Non GATE CSE: Java (10) 358
29.1 Abstract Method (1) 358
29.2 Applet (1) 358
29.3 Java (3) 358
29.4 Method Overriding (1) 359
29.5 Multi Threaded Programming (1) 359
29.6 Oops (1) 359
29.7 Servlet (1) 360
29.8 Wrapper Class Object (1) 360
Answer Keys 360
30 Non GATE CSE: Numerical Methods (3) 361
30.1 Hungarian Method (1) 361
30.2 Operation Research Pert Cpm (1) 361
30.3 Simplex Method (1) 361
Answer Keys 361
31 Non GATE CSE: Object Oriented Programming (59) 362
31.1 Abstract Class (2) 362
31.2 C++ (2) 363
31.3 Composition (1) 363
31.4 Constructor (3) 363
31.5 Final (1) 364
31.6 Friend Class (1) 364
31.7 Friend Function (2) 365
31.8 Inheritance (3) 365
31.9 Java (10) 366
31.10 Object Oriented Programming (25) 368
31.11 Operator Overloading (1) 373
31.12 Programming In C (1) 373
31.13 Software Design (1) 374
31.14 Template Vs Macro (1) 374
31.15 Windows (1) 374
Answer Keys 374
32 Non GATE CSE: Optimization (18) 376
32.1 Assignment Problem (2) 376
32.2 Dual Linear Programming (1) 376
32.3 Linear Programming (1) 376
32.4 Linear Programming Problem (1) 376
32.5 Optimization (8) 377
32.6 Transportation Problem (5) 378
Answer Keys 380
33 Non GATE CSE: Others (150) 381
33.1 3 Puzzle (1) 406
33.2 Algorithm Design (1) 407
33.3 Alpha Beta Pruning (1) 407
33.4 Alpha Cut (1) 407
33.5 Application Software (1) 407
33.6 Bigdata Hadoop (1) 408
33.7 Convex Optimization (1) 408
33.8 Data Mining (2) 408
33.9 Data Warehousing (4) 409
33.10 Debugger (1) 410
33.11 Defuzzification (1) 410
33.12 Encryption Decryption (1) 410
33.13 Fuzzy Relation (1) 410
33.14 Fuzzy Set (5) 411
33.15 Geographical Information System (1) 412
33.16 Hill Climbing Search (1) 412
33.17 Inventory (1) 412
33.18 K Mean Clustering (1) 413
33.19 Llp (1) 413
33.20 Machine Learning (1) 413
33.21 Net Exam (1) 413
33.22 Operational Research (2) 414
33.23 Optimization (1) 414
33.24 Process Scheduling (1) 414
33.25 Searching (1) 414
33.26 Shell (1) 415
33.27 Shell Script (2) 415
33.28 Simplex (1) 415
33.29 Simplex Method (2) 416
33.30 System Software& Compilers (1) 416
33.31 Transportation Problem (1) 417
33.32 Unified Modeling Language (1) 417
33.33 Unix (4) 417
33.34 Vertex Cover (1) 418
33.35 Windows (1) 418
Answer Keys 419
34 Non GATE CSE: Web Technologies (32) 420
34.1 Activex (1) 420
34.2 Client Server Application (1) 420
34.3 Data Warehousing (1) 420
34.4 E Commerce (1) 420
34.5 Edi Layer (2) 420
34.6 Html (5) 421
34.7 Javascript (2) 422
34.8 Non Gatecse (1) 422
34.9 Transmission Media (1) 422
34.10 Trojan Horse (1) 423
34.11 Web Technologies (8) 423
34.12 Xml (7) 424
34.13 Xsl (1) 426
Answer Keys 426
35 Operating System (232) 427
35.1 Applications In Windows (1) 437
35.2 Bankers Algorithm (3) 437
35.3 Binary Semaphore (1) 437
35.4 Counting Semaphores (1) 438
35.5 Critical Section (1) 438
35.6 Deadlock Prevention Avoidance Detection (9) 438
35.7 Delay (1) 440
35.8 Dijkstras Bankers Algorithm (1) 440
35.9 Directory Structure (1) 440
35.10 Disk (10) 441
35.11 Disk Cpu Memory Interrupt (1) 443
35.12 Disk Scheduling (9) 443
35.13 Distributed Computing (1) 445
35.14 Distributed System (1) 445
35.15 Dynamic Linking (1) 445
35.16 Effective Memory Access (1) 445
35.17 File System (7) 446
35.18 Fragmentation (1) 447
35.19 Hard Disk Drive (1) 447
35.20 Hit Ratio (1) 448
35.21 IO Handling (1) 448
35.22 Input Output (2) 448
35.23 Interrupts (2) 449
35.24 Java (1) 449
35.25 Linux (1) 449
35.26 Memory Management (8) 450
35.27 Mmu (1) 451
35.28 Monitors (1) 452
35.29 Multiprogramming Os (1) 452
35.30 Mutual Exclusion (1) 452
35.31 Non Gatecse (3) 452
35.32 Page Replacement (9) 453
35.33 Pipelining (1) 455
35.34 Process (2) 455
35.35 Process Model (2) 455
35.36 Process Scheduling (25) 456
35.37 Process Synchronization (2) 461
35.38 Ram (1) 462
35.39 Resource Allocation (2) 462
35.40 Runtime Environment (1) 463
35.41 Scheduling (4) 463
35.42 Seek Latency (1) 464
35.43 Semaphore (3) 464
35.44 Shell Script (7) 465
35.45 Sjf (1) 467
35.46 Sstf (1) 467
35.47 Storage Devices (1) 467
35.48 System Call (2) 467
35.49 System Reliability (1) 468
35.50 Threads (4) 469
35.51 Transaction and Concurrency (1) 469
35.52 Unix (24) 470
35.53 Virtual Memory (7) 475
35.54 Vsam (1) 476
35.55 Windows (5) 476
Answer Keys 477
36 Others: Others (687) 479
36.1 Abelian Group (1) 586
36.2 Acid Properties (1) 586
36.3 Array (1) 586
36.4 Artificial Intelligence (1) 586
36.5 Assembly (1) 587
36.6 Binary Heap (1) 587
36.7 Binary Tree (1) 587
36.8 Boolean Algebra (1) 588
36.9 Combinatory (1) 588
36.10 Compilation Phases (1) 588
36.11 Crypt Arithmetic (1) 588
36.12 Data Compression (1) 588
36.13 Data Flow Diagram (1) 589
36.14 Data Mart (1) 589
36.15 Data Mining (4) 589
36.16 Data Warehousing (2) 590
36.17 Deadlock Prevention Avoidance Detection (1) 590
36.18 Decomposition (1) 590
36.19 Digital Image Processing (3) 590
36.20 Disk (1) 591
36.21 Disk Scheduling (1) 591
36.22 Duality (1) 591
36.23 E Commerce (2) 592
36.24 E Payment (1) 592
36.25 E Technologies (3) 592
36.26 Encryption Decryption (2) 593
36.27 Enterprise Resource Planning (2) 593
36.28 Error Correction (1) 594
36.29 File System (1) 594
36.30 Fuzzy Logic (2) 594
36.31 Fuzzy Relations (1) 594
36.32 Fuzzy Set (2) 595
36.33 General Awareness (33) 595
36.34 Hashing (2) 603
36.35 Image Compression (1) 603
36.36 Information System (1) 603
36.37 Interpreter (1) 604
36.38 Is&software Engineering (1) 604
36.39 Java (1) 604
36.40 Job (1) 604
36.41 Kruskals Algorithm (1) 604
36.42 Linear Programming (3) 605
36.43 Linker (2) 606
36.44 Linux (1) 606
36.45 Management Information System (2) 606
36.46 Microprocessors (1) 607
36.47 Minimum Spanning Tree (1) 607
36.48 Mis (1) 608
36.49 Mobile Communication (2) 608
36.50 Multiple Document Interface (1) 608
36.51 Natural Join (1) 608
36.52 Natural Language Processing (1) 609
36.53 Network Switching (1) 609
36.54 Neural Network (6) 609
36.55 Non Gatecse (9) 610
36.56 Number System (1) 613
36.57 Oops Concept (1) 613
36.58 Operator Overloading (1) 613
36.59 Parsing (1) 613
36.60 Pipelining (1) 613
36.61 Process Scheduling (2) 613
36.62 Prolog (1) 614
36.63 Quadratic Equations (1) 614
36.64 Queue (1) 614
36.65 Rdbms (2) 614
36.66 Relations (1) 615
36.67 Semantic Nets (1) 615
36.68 Shell (1) 616
36.69 Single Layer Perceptron (1) 616
36.70 Software Development Life Cycle Models (1) 616
36.71 Software Engineering Framework (1) 616
36.72 Software Testing (1) 617
36.73 System Software Compilers (1) 617
36.74 Transaction and Concurrency (3) 617
36.75 Transportation Problem (3) 618
36.76 Tree (2) 618
36.77 Unix (4) 619
36.78 Virtual Memory (1) 620
36.79 Windows (5) 620
36.80 Windows Programming (2) 621
Answer Keys 621
37 Programming and DS (26) 626
37.1 Array (2) 626
37.2 Array of Pointers (1) 626
37.3 Dangling Pointers (1) 626
37.4 Data Types (1) 626
37.5 Input Output Statement (1) 627
37.6 Operator Precedence (2) 627
37.7 Operators (2) 627
37.8 Parameter Passing (1) 628
37.9 Pointer Declaration (1) 628
37.10 Programming In C (12) 628
37.11 Storage Classes In C (1) 631
37.12 Three Dimensional Array (1) 632
Answer Keys 632
38 Programming and DS: DS (107) 633
38.1 AVL Tree (2) 635
38.2 B Tree (1) 636
38.3 B and Bplus Trees (1) 636
38.4 Binary Heap (7) 636
38.5 Binary Search Tree (6) 638
38.6 Binary Tree (7) 639
38.7 Cryptography (1) 640
38.8 Data Structures (7) 640
38.9 Graph Algorithms (1) 642
38.10 Graph Connectivity (1) 642
38.11 Hashing (13) 642
38.12 Infix Prefix (2) 645
38.13 Linear Probing (1) 645
38.14 Linked List (2) 645
38.15 Max Heap (1) 646
38.16 Minimum Spanning Tree (2) 646
38.17 Priority (1) 646
38.18 Priority Queue (2) 646
38.19 Queue (5) 647
38.20 Quick Sort (1) 648
38.21 Radix Sort (2) 648
38.22 Recursion (1) 648
38.23 Relational Algebra (1) 649
38.24 Stack (13) 649
38.25 Tree (11) 651
38.26 Tree Traversal (1) 653
Answer Keys 654
39 Programming: Programming in C (84) 655
39.1 Aliasing (1) 660
39.2 Array (3) 660
39.3 Binary Search Tree (1) 661
39.4 Bitwise Operation (1) 661
39.5 Data Types (2) 662
39.6 Dynamic Memory Allocation (1) 662
39.7 Evaluation Postfix (1) 662
39.8 Exception Handling (1) 662
39.9 Expression Evaluation (1) 663
39.10 File Handling (1) 663
39.11 Graph Coloring (1) 663
39.12 IO Statement (1) 663
39.13 Java (4) 664
39.14 Linked List (1) 664
39.15 Loop (1) 665
39.16 Non Gatecse (4) 665
39.17 Object Oriented Programming (3) 666
39.18 Operator Precedence (1) 667
39.19 Operators (1) 667
39.20 Pointers (2) 667
39.21 Programming In C (15) 668
39.22 Pseudocode (1) 671
39.23 Row Major Address Calculation (1) 671
39.24 Storage Classes In C (2) 671
39.25 Tree Traversal (1) 672
39.26 Undefined Behaviour (1) 672
39.27 Union (1) 672
39.28 Variable Scope (4) 673
Answer Keys 674
40 Theory of Computation (143) 675
40.1 Closure Property (3) 680
40.2 Complement (1) 681
40.3 Context Free Grammar (9) 681
40.4 Context Free Language (8) 683
40.5 Context Sensitive (2) 685
40.6 Decidability (5) 685
40.7 Expression (1) 687
40.8 Finite Automata (10) 687
40.9 Grammar (15) 689
40.10 Identify Class Language (8) 693
40.11 Language (1) 695
40.12 Languages Classification (1) 695
40.13 Languages Relationships (1) 695
40.14 Minimal State Automata (1) 695
40.15 Parsing (1) 696
40.16 Pumping Lemma (3) 696
40.17 Pushdown Automata (5) 696
40.18 Recursive and Recursively Enumerable Languages (3) 697
40.19 Regular Expression (18) 698
40.20 Regular Grammar (4) 702
40.21 Regular Language (9) 703
40.22 Right Quotient (1) 705
40.23 Strings (1) 706
40.24 Turing Machine (5) 706
Answer Keys 707
41 Unknown Category (197) 709
41.1 Binary Heap (1) 750
41.2 Binary Search Tree (1) 750
41.3 CO and Architecture (2) 751
41.4 Clustering (1) 751
41.5 Database Normalization (1) 751
41.6 Disk Scheduling (1) 751
41.7 Dynamic Programming (1) 752
41.8 E Technologies (1) 752
41.9 Ethernet (1) 752
41.10 Graph Algorithms (1) 752
41.11 IP Addressing (1) 753
41.12 Indexing (1) 753
41.13 Linked List (1) 753
41.14 Microprocessors (1) 753
41.15 Minimum Spanning Tree (1) 753
41.16 Multiplexing (1) 754
41.17 Osi Model (1) 754
41.18 Physical Layer (1) 754
41.19 SQL (1) 754
41.20 Software Testing (1) 755
41.21 Sorting (1) 755
41.22 Stack (1) 755
41.23 Transaction and Concurrency (1) 755
Answer Keys 756
Contributors
User , Answers User Added User Done
sanjay 1151, 560 GO 1388 soujanyareddy13 576
shekhar 676, 171 Editor Pooja Khatri 503
chauhan Misbah Ghaya 548 Arjun 458
Leen Sharma 369, 114 Arjun 335 Suresh
VIPIN NARAYAN 342, 177 Suresh sanjay 284
Prashant 216, 87 soujanyareddy13 134 Misbah Ghaya 258
Singh RISHABH 126 Lakshman Patel 214
papesh 92, 28 KUMAR GO 136
Muktinath Vishwakarma 90, 15 admin 108 Editor
Debasmita 80, 49 Pooja Khatri 99 Don't defeat anybody but yourself. 133
Bhoumik sanjay 57 Hira 106
Satbir 63, 19 Rajesh Prajapati 14 Sankaranarayanan P.N 85
Singh RISHABH 68
Hira 54, 51 KUMAR
RISHABH 47, 101 Krithiga2101 64
KUMAR Leen Sharma 52
Dhananjay Kumar Sharma 46, 12 Prashant 47
Arjun 45, 13 Singh
Suresh VIPIN NARAYAN 46
srestha 39, 16 Debasmita 37
Jeet 39, 16 Bhoumik
Praveen Saini 37, 4 srestha 32
Rajesh Pradhan 36, 26 gatecse 28
kunal chalotra 35, 20 sourav. 25
Shaik Masthan 35, 20 Manoj Kumar 24
asutosh kumar Biswal 32, 16 Sujith 22
Kapil Phulwani 31, 7 Shiva Sagar Rao 22
Deepak Poonia 30, 13 Sabiha 20
Sayan Bose 30, 15 banu
Sankaranarayanan P.N 26, 13 Cristine 19
Ashwani Kumar 25, 16 shekhar 18
Prasanjeet Ghosh 25, 22 chauhan
Resmi 13
Arjun
Deepak Poonia 13
papesh 12
Jeet 12
Dhananjay Kumar Sharma 11
SuShrut2311 11
Kapil Phulwani 10
Satbir 10
Singh
asutosh kumar Biswal 10
Desert_Warrior 9
deepthi 9
Bikram 9
Krishanveer Gangwar 9
Shubham Sharma 8
shivani Sharma 8
shahidhope 7
Meenakshi Sharma 6
im.raj 6
Rajesh Pradhan 6
Prajwal Bhat 6
Rajesh Prajapati 6
1 Algorithms (100)
The post order traversal of a binary tree is DEBFCA. Find out the pre-order traversal
Answer key ☟
where is the set of nodes and is the set of edges in the graph.
A.
B.
C.
D.
ugcnetcse-aug2016-paper3 algorithms
Answer key ☟
Consider a Boolean function of 'n' variables. The order of an algorithm that determines whether the Boolean
function produces a output 1 is
Answer key ☟
A. B.
C. D.
ugcnetcse-july2018-paper2 algorithms
Answer key ☟
1.0.5 UGC NET CSE | January 2017 | Part 3 | Question: 36
A. B.
C. D.
ugcnetcse-jan2017-paper3 algorithms easy match-the-following
Answer key ☟
A. B. C. D.
algorithms heap-sort ugcnetcse-dec2004-paper2
Answer key ☟
algorithms ugcnetcse-oct2020-paper2
Answer key ☟
1.1.1 Activity Selection Problem: UGC NET CSE | December 2015 | Part 3 | Question: 16
In Activity-Selection problem, each activity has a start time and a finish time where . Activities
and are compatible if
A. B.
C. or D. and
ugcnetcse-dec2015-paper3 algorithms activity-selection-problem
Answer key ☟
1.2.1 Algorithm Design Technique: UGC NET CSE | December 2006 | Part 2 | Question: 22
Answer key ☟
1.3.1 Algorithm Efficiency: UGC NET CSE | Junet 2015 | Part 2 | Question: 25
Answer key ☟
1.4.1 Algorithms Sorting: UGC NET CSE | Junet 2015 | Part 2 | Question: 48
Which of the following algorithms sort integers, having the range to , in ascending order in
time?
Answer key ☟
Which of the following is true for computation time in insertion, deletion and finding maximum and minimum
element in a sorted array ?
Answer key ☟
A. B. C. D.
ugcnetcse-july2016-paper3 algorithms array
Answer key ☟
1.6.1 Artificial Intelligence: UGC NET CSE | June 2014 | Part 3 | Question: 31
Consider Where function is a measure of the cost of getting from the start node to the
current node. and is an estimate of the additional cost of getting from the current node to the goal node.
Then is used in which one of the following algorithms?
A. algorithm B. algorithm
C. Greedy best first search algorithm D. Iterative algorithm
ugcnetjune2014iii artificial-intelligence algorithms
Answer key ☟
1.6.2 Artificial Intelligence: UGC NET CSE | June 2014 | Part 3 | Question: 33
________ is used in game trees to reduce the number of branches of the search tree to be traversed without
affecting the solution.
A. Best first search B. Goal stack planning
C. Alpha-beta pruning procedure D. Min-max search
ugcnetjune2014iii artificial-intelligence algorithms
Answer key ☟
1.7.1 Asymptotic Notation: UGC NET CSE | December 2013 | Part 2 | Question: 35
A. B. C. D.
ugcnetcse-dec2013-paper2 algorithms easy asymptotic-notation
Answer key ☟
1.7.2 Asymptotic Notation: UGC NET CSE | December 2013 | Part 3 | Question: 35
Let and be two matrices. The efficient algorithm to multiply the two matrices has the time
complexity
A. B. C. D.
ugcnetcse-dec2013-paper3 algorithms asymptotic-notation
Answer key ☟
1.7.3 Asymptotic Notation: UGC NET CSE | December 2013 | Part 3 | Question: 36
A. O(n ) B. O(n )
C. O(n D. O(n lg n)
ugcnetcse-dec2013-paper3 algorithms asymptotic-notation recurrence-relation
Answer key ☟
1.7.4 Asymptotic Notation: UGC NET CSE | January 2017 | Part 3 | Question: 31
A. B.
C. D.
ugcnetcse-jan2017-paper3 algorithms asymptotic-notation recurrence-relation
Answer key ☟
1.7.5 Asymptotic Notation: UGC NET CSE | June 2014 | Part 2 | Question: 24
Big- estimates for the factorial function and the logarithm of the factorial function i.e. and is given by
A. and B. and
C. and D. and
ugcnetcse-june2014-paper2 algorithms time-complexity asymptotic-notation
Answer key ☟
1.7.6 Asymptotic Notation: UGC NET CSE | June 2014 | Part 2 | Question: 39
An algorithm is made up of modules and . If time complexity of modules and are and
respectively, the time complexity of the algorithm is
A. B.
C. D.
ugcnetcse-june2014-paper2 algorithms time-complexity asymptotic-notation
Answer key ☟
1.7.7 Asymptotic Notation: UGC NET CSE | June 2014 | Part 3 | Question: 61
asymptotic-notation ugcnetjune2014iii
Answer key ☟
1.7.8 Asymptotic Notation: UGC NET CSE | Junet 2015 | Part 3 | Question: 35
A. B.
C. D.
asymptotic-notation algorithms ugcnetcse-june2015-paper3
Answer key ☟
What is the maximum number of nodes in a B-tree of order of depth (root at depth ) ?
Answer key ☟
For any B-tree of minimum degree t 2, every node other than the root must have at least ____ keys and every
node can have at most ____ keys.
Answer key ☟
1.9.1 Bellman Ford: UGC NET CSE | October 2020 | Part 2 | Question: 70
Match with
Choose the correct answer from the options given below:
A. B.
C. D.
Answer key ☟
1.10.1 Binary Heap: UGC NET CSE | December 2012 | Part 3 | Question: 51
Suppose there are sorted lists of element each. The time complexity of producing a sorted list of all
these elements is (use heap data structure)
A. B.
C. D.
ugcnetcse-dec2012-paper3 algorithms time-complexity binary-heap
Answer key ☟
1.11.1 Binary Search Tree: UGC NET CSE | January 2017 | Part 2 | Question: 25
A. Optimal binary search tree construction can be performed efficiently using dynamic programming.
B. Breadth-first search cannot be used to find connected components of a graph.
C. Given the prefix and postfix walks of a binary tree, the tree cannot be reconstructed uniquely.
D. Depth-first-search can be used to find the connected components of a graph.
Answer key ☟
1.12.1 Binary Tree: UGC NET CSE | December 2010 | Part 2 | Question: 22
Answer key ☟
1.12.2 Binary Tree: UGC NET CSE | December 2011 | Part 2 | Question: 19
The post order traversal of a binary tree is DEBFCA. Find out the preorder traversal.
A. ABFCDE B. ADBFEC C. ABDECF D. ABDCEF
ugcnetcse-dec2011-paper2 algorithms binary-tree
Answer key ☟
1.12.3 Binary Tree: UGC NET CSE | December 2011 | Part 2 | Question: 50
The number of nodes in a complete binary tree of height (with roots at level ) is equal to
A. B.
C. D.
ugcnetcse-dec2011-paper2 algorithms binary-tree
Answer key ☟
1.12.4 Binary Tree: UGC NET CSE | December 2014 | Part 2 | Question: 25
A. nodes B. nodes
C. nodes D. nodes
ugcnetcse-dec2014-paper2 algorithms binary-tree
Answer key ☟
1.13.1 Decision Tree: UGC NET CSE | December 2014 | Part 3 | Question: 31
A. B. C. D.
ugcnetcse-dec2014-paper3 algorithms decision-tree
Answer key ☟
1.14.1 Depth First Search: UGC NET CSE | December 2015 | Part 2 | Question: 36
In the following graph, discovery time stamps and finishing time stamps of Depth First Search (DFS) are shown
as , where is discovery time stamp and is finishing time stamp.
Answer key ☟
1.14.2 Depth First Search: UGC NET CSE | June 2013 | Part 3 | Question: 68
Answer key ☟
1.14.3 Depth First Search: UGC NET CSE | June 2019 | Part 2 | Question: 65
ugcnetcse-june2019-paper2 depth-first-search
Answer key ☟
1.15.1 Dijkstras Algorithm: UGC NET CSE | January 2017 | Part 3 | Question: 35
Answer key ☟
1.16.1 Double Hashing: UGC NET CSE | June 2019 | Part 2 | Question: 66
A. B. C. D.
ugcnetcse-june2019-paper2 double-hashing
Answer key ☟
1.17.1 Dynamic Programming: UGC NET CSE | December 2013 | Part 3 | Question: 37
A. B. C. D.
ugcnetcse-dec2013-paper3 algorithms dynamic-programming
Answer key ☟
1.17.2 Dynamic Programming: UGC NET CSE | July 2016 | Part 3 | Question: 36
A triangulation of a polygon is a set of chords that divide the polygon into disjoint triangles. Every
triangulation of vertex convex polygon has ____ chords and divides the polygon into ____ triangles
A. B. C. D.
ugcnetcse-july2016-paper3 algorithms dynamic-programming
Answer key ☟
1.18.1 Graph Algorithms: UGC NET CSE | December 2015 | Part 3 | Question: 20
Floyd-Warshall algorithm utilizes _____ to solve the all-pairs shortest paths problem on a directed graph in
____ time
Answer key ☟
1.18.2 Graph Algorithms: UGC NET CSE | June 2019 | Part 2 | Question: 61
ugcnetcse-june2019-paper2 graph-algorithms
Answer key ☟
1.19.1 Graph Search: UGC NET CSE | June 2012 | Part 3 | Question: 51
The strategy used to reduce the number of tree branches and the number of static evaluations applied in case of a
game tree is
Answer key ☟
1.20.1 Greedy Algorithms: UGC NET CSE | Junet 2015 | Part 3 | Question: 64
A. B. C. D.
ugcnetcse-june2015-paper3 algorithms greedy-algorithms huffman-code
Answer key ☟
1.21.1 Huffman Code: UGC NET CSE | July 2016 | Part 3 | Question: 34
A. B.
C. D.
ugcnetcse-july2016-paper3 algorithms huffman-code
Answer key ☟
1.21.2 Huffman Code: UGC NET CSE | July 2016 | Part 3 | Question: 59
Answer key ☟
1.22.1 In Place Algo: UGC NET CSE | June 2019 | Part 2 | Question: 62
There are many sorting algorithms based on comparison. The running time of heapsort algorithm is .
Like , but unlike , heapsort sorts in place where is equal to
Answer key ☟
1.23.1 Knapsack Problem: UGC NET CSE | June 2014 | Part 3 | Question: 62
A. B. C. D.
ugcnetjune2014iii algorithms greedy-algorithm knapsack-problem
Answer key ☟
1.23.2 Knapsack Problem: UGC NET CSE | September 2013 | Part 3 | Question: 42
Given 0-1 knapsack problem and fractional knapsack problem and the following statements:
: 0-1 knapsack is efficiently solved using Greedy algorithm.
: Fractional knapsack is efficiently solved using Dynamic programming.
Which of the following is true?
Answer key ☟
1.24.1 Linear Search: UGC NET CSE | Junet 2015 | Part 2 | Question: 24
Answer key ☟
1.25.1 Longest Common Subsequence: UGC NET CSE | December 2015 | Part 3 | Question: 17
Answer key ☟
1.26.1 Matrix Chain Ordering: UGC NET CSE | August 2016 | Part 3 | Question: 31
Consider the problem of a chain < > of four matrices. Suppose that the dimensions of the matrices
and are and respectively. The minimum number of scalar
multiplications needed to compute the product is ____.
A. B. C. D.
ugcnetcse-aug2016-paper3 algorithms dynamic-programming numerical-answers matrix-chain-ordering
Answer key ☟
1.26.2 Matrix Chain Ordering: UGC NET CSE | December 2014 | Part 3 | Question: 35
Consider the problem of a chain of three matrices. Suppose that the dimensions of the matrices are
, and respectively. There are two different ways of parenthesization : (i)
and (ii) . Computing the product according to the first parenthesization is ______ times faster in
comparison to the second parenthesization.
A. B. C. D.
ugcnetcse-dec2014-paper3 algorithms matrix-chain-ordering
Answer key ☟
1.26.3 Matrix Chain Ordering: UGC NET CSE | January 2017 | Part 3 | Question: 34
The minimum number of scalar multiplication required, for parenthesization of a matrix-chain product whose
sequence of dimensions for four matrices is is
A. B. C. D.
ugcnetcse-jan2017-paper3 algorithms matrix-chain-ordering
Answer key ☟
1.26.4 Matrix Chain Ordering: UGC NET CSE | September 2013 | Part 3 | Question: 39
Answer key ☟
1.27.1 Merge Sort: UGC NET CSE | December 2013 | Part 2 | Question: 25
Given two sorted list of size 'm' and 'n' respectively. The number of comparisons needed in the worst case by
the merge sort algorithm will be
Answer key ☟
1.27.2 Merge Sort: UGC NET CSE | June 2014 | Part 2 | Question: 36
Mergesort makes two recursive calls. Which statement is true after these two recursive calls finish, but before
the merge step ?
Answer key ☟
1.28.1 Minimum Spanning Tree: UGC NET CSE | November 2017 | Part 2 | Question: 5
Use Kruskal’s algorithm to find a minimal spanning tree for the graph. The List of the edges of the tree in the order in
which they are chosen is
A. AD, AE, AG, GC, GB, BF B. GC, GB, BF, GA, AD, AE
C. GC, AD, GB, GA, BF, AE D. AD, AG, GC, AE, GB, BF
ugcnetcse-nov2017-paper2 graph-algorithms minimum-spanning-tree
Answer key ☟
1.29.1 Non Gatecse: UGC NET CSE | October 2020 | Part 2 | Question: 69
Match with
With reference to CMM developed by Software Engineering Institute (SEI)
Answer key ☟
1.30.1 Optimal Search Tree: UGC NET CSE | December 2015 | Part 3 | Question: 21
where and denotes the probability with which we search and the identifier
being searched satisfy respectively. The optimal search tree is given by:
1.
1.
1.
1.
Answer key ☟
1.31.1 Optimal Solution: UGC NET CSE | June 2019 | Part 2 | Question: 68
Answer key ☟
1.32.1 P NP NPC NPH: UGC NET CSE | December 2014 | Part 3 | Question: 33
Answer key ☟
1.32.2 P NP NPC NPH: UGC NET CSE | June 2019 | Part 2 | Question: 67
Consider the complexity class as the set of languages such that , and the following two
statements:
Answer key ☟
1.32.3 P NP NPC NPH: UGC NET CSE | Junet 2015 | Part 3 | Question: 32
Answer key ☟
1.33.1 Prims Algorithm: UGC NET CSE | October 2020 | Part 2 | Question: 78
Using Prim’s algorithm to construct a minimum spanning tree starting with node , which one of the following
sequences of edges represents a possible order in which the edges would be added to construct the minimum spanning
tree?
A.
B.
C.
D.
Answer key ☟
1.34.1 Quick Sort: UGC NET CSE | June 2014 | Part 3 | Question: 66
Suppose that the splits at every level of quicksort are in the proportion to , where is a
constant. The minimum depth of a leaf in the recursion tree is approximately given by
A. B.
C. D.
ugcnetjune2014iii data-structures sorting algorithms quick-sort
Answer key ☟
Answer key ☟
1.35.2 Recurrence Relation: UGC NET CSE | December 2015 | Part 3 | Question: 19
is
Answer key ☟
1.35.3 Recurrence Relation: UGC NET CSE | December 2018 | Part 2 | Question: 21
A. B.
C. D.
ugcnetcse-dec2018-paper2 recurrence-relation
Answer key ☟
1.35.4 Recurrence Relation: UGC NET CSE | July 2018 | Part 2 | Question: 21
A. B.
C. D.
ugcnetcse-july2018-paper2 algorithms time-complexity recurrence-relation
Answer key ☟
1.35.5 Recurrence Relation: UGC NET CSE | June 2013 | Part 3 | Question: 12
Answer key ☟
1.35.6 Recurrence Relation: UGC NET CSE | June 2014 | Part 3 | Question: 63
A. B. C. D.
ugcnetjune2014iii algorithms recurrence-relation
Answer key ☟
1.35.7 Recurrence Relation: UGC NET CSE | September 2013 | Part 3 | Question: 37
Answer key ☟
Answer key ☟
Answer key ☟
1.37.1 Red Black Tree: UGC NET CSE | January 2017 | Part 3 | Question: 33
Red-black trees are one of many search tree schemes that are “balanced” in order to guarantee that basic
dynamic-set operations take _____ time in the worst case.
A. B. C. D.
ugcnetcse-jan2017-paper3 algorithms red-black-tree
Answer key ☟
1.38.1 Shortest Path: UGC NET CSE | December 2014 | Part 3 | Question: 34
Dijkstra algorithm, which solves the single-source shortest--paths problem, is a _______, and the Floyd-
Warshall algorithm, which finds shortest paths between all pairs of vertices, is a ________.
Answer key ☟
1.38.2 Shortest Path: UGC NET CSE | Junet 2015 | Part 3 | Question: 31
Answer key ☟
Assuming there are n keys and each key is in the range [0, m-1]. The run time of bucket sort is
Answer key ☟
You have to sort a list , consisting of a sorted list followed by a few ‘random’ elements. Which of the
following sorting method would be most suitable for such a task ?
Answer key ☟
If there are n integers to sort, each integer had d digits and each digit is in the set , radix sort can
sort the numbers in
A. B. C. D.
ugcnetcse-dec2015-paper3 algorithms sorting
Answer key ☟
Which of the following is best running time to sort integers in the range to ?
A. B. C. D.
ugcnetcse-june2019-paper2 sorting
Answer key ☟
1.40.1 Space Complexity: UGC NET CSE | December 2015 | Part 2 | Question: 39
Answer key ☟
1.40.2 Space Complexity: UGC NET CSE | October 2020 | Part 2 | Question: 73
Match with
Answer key ☟
1.41.1 Time Complexity: UGC NET CSE | December 2006 | Part 2 | Question: 21
Which algorithm has same average, worst case and best case time ?
A. Binary search B. Maximum of n number
C. Quick sort D. Fibonacci search
algorithms time-complexity ugcnetcse-dec2006-paper2
Answer key ☟
1.41.2 Time Complexity: UGC NET CSE | December 2010 | Part 2 | Question: 23
A. B. C. D.
ugcnetcse-dec2010-paper2 algorithms time-complexity
Answer key ☟
1.41.3 Time Complexity: UGC NET CSE | December 2012 | Part 3 | Question: 11
The time complexities of some standard graph algorithms are given. Match each algorithm with its time
complexity ? ( and are no. of nodes and edges respectively)
A. B.
C. D.
ugcnetcse-dec2012-paper3 algorithms time-complexity
Answer key ☟
1.41.4 Time Complexity: UGC NET CSE | December 2014 | Part 3 | Question: 32
A. B.
C. D.
ugcnetcse-dec2014-paper3 algorithms time-complexity
Answer key ☟
1.41.5 Time Complexity: UGC NET CSE | Junet 2015 | Part 3 | Question: 33
Answer key ☟
1.41.6 Time Complexity: UGC NET CSE | October 2020 | Part 2 | Question: 25
If algorithm and another algorithm take and microseconds, respectively, to solve a problem,
then the largest size of a problem these algorithms can solve, respectively, in one second are ______ and
______.
Answer key ☟
1.41.7 Time Complexity: UGC NET CSE | October 2020 | Part 2 | Question: 52
Answer key ☟
1.41.8 Time Complexity: UGC NET CSE | October 2022 | Part 1 | Question: 87
A.
B.
C.
D.
Answer key ☟
1.41.9 Time Complexity: UGC NET CSE | September 2013 | Part 2 | Question: 9
The amortized time complexity to perform ____ operation(s) in Splay trees is O(Ig n)
Answer key ☟
1.41.10 Time Complexity: UGC NET CSE | September 2013 | Part 3 | Question: 40
The time complexity of an efficient algorithm to find the longest monotonically increasing subsequence of n
numbers is
Answer key ☟
1.42.1 Topological Sort: UGC NET CSE | December 2005 | Part 2 | Question: 23
A. B. C. D.
ugcnetcse-dec2005-paper2 algorithms topological-sort
Answer key ☟
1.43 Tree (2)
The number of disk pages access in B-tree search, where h is height, n is the number of keys and t is the
minimum degree, is
A. B.
C. D.
ugcnetcse-dec2015-paper2 algorithms tree
Answer key ☟
A. B.
C. D.
ugcnetcse-jan2017-paper3 algorithms tree
Answer key ☟
1.44.1 Tree Search Algorithm: UGC NET CSE | Junet 2015 | Part 3 | Question: 58
Answer key ☟
1.44.2 Tree Search Algorithm: UGC NET CSE | September 2013 | Part 3 | Question: 2
Answer key ☟
1.45.1 Tree Traversal: UGC NET CSE | Junet 2015 | Part 2 | Question: 4
A. B.
C. D.
ugcnetcse-june2015-paper2 tree tree-traversal
Answer key ☟
Answer Keys
1.0.1 C 1.0.2 Q-Q 1.0.3 Q-Q 1.0.4 Q-Q 1.0.5 D
1.0.6 A 1.0.7 A 1.1.1 C 1.2.1 Q-Q 1.3.1 B
1.4.1 C 1.5.1 C 1.5.2 D 1.6.1 C 1.6.2 C
1.7.1 B 1.7.2 B 1.7.3 X 1.7.4 C 1.7.5 B
1.7.6 B 1.7.7 B 1.7.8 D 1.8.1 Q-Q 1.8.2 C
1.9.1 X 1.10.1 A 1.11.1 B 1.12.1 Q-Q 1.12.2 Q-Q
1.12.3 Q-Q 1.12.4 C 1.13.1 C 1.14.1 A 1.14.2 D
1.14.3 C 1.15.1 C 1.16.1 C 1.17.1 C 1.17.2 B
1.18.1 A 1.18.2 B 1.19.1 B 1.20.1 C 1.21.1 C
1.21.2 B 1.22.1 D 1.23.1 B 1.23.2 C 1.24.1 A
1.25.1 B 1.26.1 Q-Q 1.26.2 B 1.26.3 D 1.26.4 C
1.27.1 D 1.27.2 B 1.28.1 C 1.29.1 A 1.30.1 C
1.31.1 A 1.32.1 D 1.32.2 C 1.32.3 C 1.33.1 A;C
1.34.1 C 1.35.1 C 1.35.2 C 1.35.3 D 1.35.4 Q-Q
1.35.5 D 1.35.6 C 1.35.7 C 1.36.1 Q-Q 1.36.2 B
1.37.1 B 1.38.1 C 1.38.2 D 1.39.1 D 1.39.2 D
1.39.3 D 1.39.4 B 1.40.1 C 1.40.2 A 1.41.1 Q-Q
1.41.2 Q-Q 1.41.3 A 1.41.4 C 1.41.5 A 1.41.6 B
1.41.7 X 1.41.8 N/A 1.41.9 D 1.41.10 B 1.42.1 Q-Q
1.43.1 D 1.43.2 C 1.44.1 C 1.44.2 C 1.45.1 D
2 Artificial Intelligence (45)
A software program that infers and manipulates existing knowledge in order to generate new knowledge is
known as:
Answer key ☟
A perceptron has input weights and with threshold value What output does it
give for the input and
A. B. C. D.
ugcnetcse-july2016-paper3
Answer key ☟
2.1.1 Artificial Intelligence: UGC NET CSE | December 2013 | Part 3 | Question: 26
The mean-end analysis process centers around the detection of differences between the current state and goal
state. Once such a difference is isolated, an operator that can reduce the difference must be found. But perhaps
that operator cannot be applied to the current state. So a sub-problem of getting to a state in which it can be applied is
set up. The kind of backward chaining in which operators are selected and then sub goals are set up to establish the
precondition of operators is called
Answer key ☟
2.1.2 Artificial Intelligence: UGC NET CSE | December 2014 | Part 3 | Question: 72
Match the following learning modes . characteristics of available information for learning :
a. Supervised i. Instructive information on desired responses, explicitly specified by a teacher.
b. Recording ii. A priori design information for memory storing
c. iii. Partial information about desired responses, or only “right” or “wrong” evaluative
Reinforcement information
d.
iv. No information about desired responses
Unsupervised
Codes :
a b c d
A. i ii iii iv
B. i iii ii iv
C. ii iv iii i
D. ii iii iv i
Answer key ☟
2.1.3 Artificial Intelligence: UGC NET CSE | December 2015 | Part 3 | Question: 46
Answer key ☟
2.1.4 Artificial Intelligence: UGC NET CSE | December 2015 | Part 3 | Question: 64
Consider the two class classification task that consists of the following points:
Class
Class
The decision boundary between the two classes and using single perception is given by:
A. B.
C. D.
ugcnetcse-dec2015-paper3 artificial-intelligence
Answer key ☟
2.1.5 Artificial Intelligence: UGC NET CSE | January 2017 | Part 3 | Question: 55
Consider following two rules and in logical reasoning in Artificial Intelligence (AI):
From is known as Modulus Tollens (MT)
Answer key ☟
2.1.6 Artificial Intelligence: UGC NET CSE | July 2018 | Part 2 | Question: 71
ugcnetcse-july2018-paper2 artificial-intelligence
Answer key ☟
2.1.7 Artificial Intelligence: UGC NET CSE | July 2018 | Part 2 | Question: 72
In artificial Intelligence (AI), a simple reflex agent selects actions on the basis of ___
ugcnetcse-july2018-paper2 artificial-intelligence
Answer key ☟
2.1.8 Artificial Intelligence: UGC NET CSE | July 2018 | Part 2 | Question: 73
A. B.
C. D.
ugcnetcse-july2018-paper2 artificial-intelligence
Answer key ☟
2.1.9 Artificial Intelligence: UGC NET CSE | July 2018 | Part 2 | Question: 74
Consider following sentences regarding , an informed search strategy in Artificial Intelligence (AI).
Here, is the cost of the optimal solution path. Which of the following is correct with respect to the above statements?
ugcnetcse-july2018-paper2 artificial-intelligence
Answer key ☟
2.1.10 Artificial Intelligence: UGC NET CSE | June 2012 | Part 3 | Question: 2
Answer key ☟
2.1.11 Artificial Intelligence: UGC NET CSE | June 2012 | Part 3 | Question: 21
algorithm uses to estimate the cost of getting from the initial state to the goal state, where is a
measure of cost getting from initial state to the current node and the function is an estimate of the cost of
getting from the current node to the goal state. To find a path involving the fewest number of steps, we should test,
A. B. C. D.
ugcnetcse-june2012-paper3 artificial-intelligence
Answer key ☟
2.1.12 Artificial Intelligence: UGC NET CSE | June 2014 | Part 3 | Question: 28
Answer key ☟
2.1.13 Artificial Intelligence: UGC NET CSE | June 2014 | Part 3 | Question: 30
Answer key ☟
2.1.14 Artificial Intelligence: UGC NET CSE | Junet 2015 | Part 3 | Question: 23
ugcnetcse-june2015-paper3 artificial-intelligence
Answer key ☟
2.1.15 Artificial Intelligence: UGC NET CSE | Junet 2015 | Part 3 | Question: 56
A. B.
C. D.
ugcnetcse-june2015-paper3 artificial-intelligence
Answer key ☟
2.1.16 Artificial Intelligence: UGC NET CSE | Junet 2015 | Part 3 | Question: 59
Answer key ☟
2.1.17 Artificial Intelligence: UGC NET CSE | October 2020 | Part 2 | Question: 36
Answer key ☟
2.2.1 Artificial Neural Network: UGC NET CSE | December 2013 | Part 3 | Question: 30
An artificial neuron receives n inputs with weights attached to the input links.
The weighted sum ____ is computed to be passed on to a non-linear filter called activation function to release
the output.
A. B.
C. D.
ugcnetcse-dec2013-paper3 machine-learning artificial-neural-network
Answer key ☟
2.3.1 Back Propagation: UGC NET CSE | December 2012 | Part 2 | Question: 46
Back propagation is a learning technique that adjusts weights in the neutral network by propagating weight
changes.
A. Forward from source to sink B. Backward from sink to source
C. Forward from source to hidden nodes D. Backward from sink to hidden nodes
ugcnetcse-dec2012-paper2 machine-learning data-mining back-propagation
Answer key ☟
2.4.1 Blocks World Problem: UGC NET CSE | September 2013 | Part 3 | Question: 5
Forward chaining systems are ____ where as backward chaining systems are ____
Answer key ☟
2.6.1 Expert System: UGC NET CSE | December 2012 | Part 3 | Question: 67
Answer key ☟
2.6.2 Expert System: UGC NET CSE | December 2015 | Part 3 | Question: 45
Answer key ☟
2.7.1 Fuzzy Logic: UGC NET CSE | June 2019 | Part 2 | Question: 94
A fuzzy conjunction operator denoted as and a fuzzy disjunction operator denoted as form a dual
pair if they satisfy the condition:
A. B.
C. D.
ugcnetcse-june2019-paper2 artificial-intelligence fuzzy-logic
Answer key ☟
2.8.1 Genetic Algorithms: UGC NET CSE | June 2019 | Part 2 | Question: 97
i. Evolution
ii. Selection
iii. Reproduction
iv. Mutation
Answer key ☟
2.9.1 Heuristic Search: UGC NET CSE | December 2013 | Part 3 | Question: 25
If h* represents an estimate from the cost of getting from the current node N to the goal node and h represents
actual cost of getting from the current node to the goal node, then A* algorithm gives an optimal solution if
A. h* is equal to h B. h* overestimates h
C. h* underestimates h D. none of these
ugcnetcse-dec2013-paper3 artificial-intelligence heuristic-search
Answer key ☟
2.10.1 Linear Programming: UGC NET CSE | September 2013 | Part 3 | Question: 13
If an artificial variable is present in the ‘basic variable’ of optimal simplex table then the solution is
A. Alternative solution B. Infeasible solution
C. Unbounded solution D. Degenerate solution
ugcnetcse-sep2013-paper3 artificial-intelligence linear-programming
Answer key ☟
2.11.1 Machine Learning: UGC NET CSE | December 2012 | Part 3 | Question: 73
ugcnetcse-dec2012-paper3 machine-learning
Answer key ☟
2.11.2 Machine Learning: UGC NET CSE | June 2014 | Part 3 | Question: 09
Perceptron learning, Delta learning and learning are learning methods which falls under the category of
ugcnetjune2014iii machine-learning
Answer key ☟
2.12.1 Map Coloring: UGC NET CSE | June 2013 | Part 3 | Question: 71
The map colouring problem can be solved using which of the following technique?
A. Means-end analysis B. Constraint satisfaction
C. AO* search D. Breadth first search
ugcnetcse-june2013-paper3 artificial-intelligence map-coloring
Answer key ☟
2.13.1 Means End: UGC NET CSE | September 2013 | Part 3 | Question: 6
Means-Ends Analysis process centres around the detection of difference between the current state and the goal
state. Once such a difference is found, then to reduce the difference one applies
Answer key ☟
2.14.1 Minimax Procedure: UGC NET CSE | June 2019 | Part 2 | Question: 91
Here and represents MIN and MAX nodes respectively. The value of the root node of the game tree is
A. B. C. D.
ugcnetcse-june2019-paper2 artificial-intelligence minimax-procedure
Answer key ☟
2.15 Neural Network (3)
2.15.1 Neural Network: UGC NET CSE | December 2012 | Part 3 | Question: 9
You are given an OR problem and XOR problem to solve. Then, which one of the following statements is true?
A. Both OR and XOR problems can be solved using single layer perception
B. OR can be solved using single layer perception and XOR problem can be solved using self organizing maps
C. OR problem can be solved using radial basis function and XOR problem can be solved using single layer perception
D. OR can be solved using single layer perception and XOR problem can be solved using radial basis function
Answer key ☟
2.15.2 Neural Network: UGC NET CSE | June 2019 | Part 2 | Question: 98
Answer key ☟
2.15.3 Neural Network: UGC NET CSE | September 2013 | Part 3 | Question: 28
A. B.
C. D.
ugcnetcse-sep2013-paper3 neural-network machine-learning
Answer key ☟
a. The planning graph data structure can be used to give a better heuristic for a planning problem
b. Dropping negative effects from every action schema in a planning problem results in a relaxed problem
ugcnetcse-july2018-paper2 planning
Answer key ☟
Which one of the following is the correct implementation of the meta-predicate “not” in PROLOG (Here G
represents a goal)?
Answer key ☟
2.18.1 Reinforcement Learning: UGC NET CSE | June 2019 | Part 2 | Question: 100
Reinforcement learning can be formalized in terms of ____ in which the agent initially only knows the set of
possible _____ and the set of possible actions.
Answer key ☟
Answer key ☟
2.20.1 Sigmoid Function: UGC NET CSE | June 2019 | Part 2 | Question: 99
A. B. C. D.
ugcnetcse-june2019-paper2 artificial-intelligence sigmoid-function
Answer key ☟
2.21 Strips (1)
A. a feature-centric representation
B. an action-centric representation
C. a combination of feature-centric and action-centric representations
D. a hierarchical feature-centric representation
Answer key ☟
2.22.1 User Query: Required Artificial Intelligence resources for UGC NET
Hi
I need some useful resources of AI for upcoming UGC NET exam.
Currently, I am reading from Rich and Knight, Is it enough?
Please let me know about any good quality books or video lectures.
user-query
Answer key ☟
Answer Keys
2.0.1 C 2.0.2 C 2.1.1 C 2.1.2 A 2.1.3 C
2.1.4 B 2.1.5 D 2.1.6 B 2.1.7 Q-Q 2.1.8 Q-Q
2.1.9 Q-Q 2.1.10 B 2.1.11 A 2.1.12 D 2.1.13 B
2.1.14 B 2.1.15 A 2.1.16 B 2.1.17 D 2.2.1 D
2.3.1 B 2.4.1 B 2.5.1 D 2.6.1 A 2.6.2 B
2.7.1 C 2.8.1 C 2.9.1 C 2.10.1 B 2.11.1 D
2.11.2 A 2.12.1 B 2.13.1 D 2.14.1 B 2.15.1 D
2.15.2 D 2.15.3 C 2.16.1 Q-Q 2.17.1 B 2.17.2 C
2.18.1 C 2.19.1 D 2.20.1 B 2.21.1 B 2.22.1 Q-Q
3 CO and Architecture (100)
With four programs in memory and with % average wait, the utilization is ?
A. % B. %
C. % D. %
ugcnetcse-june2009-paper2
Answer key ☟
3.1.1 8085 Microprocessor: UGC NET CSE | December 2014 | Part 3 | Question: 04
A. B.
C. D.
ugcnetcse-dec2014-paper3 8085-microprocessor non-gatecse
Answer key ☟
3.1.2 8085 Microprocessor: UGC NET CSE | December 2014 | Part 3 | Question: 05
A. B. C. D.
ugcnetcse-dec2014-paper3 8085-microprocessor non-gatecse
Answer key ☟
3.1.3 8085 Microprocessor: UGC NET CSE | December 2014 | Part 3 | Question: 06
Specify the contents of the accumulator and the status of the and flags when microprocessor
performs addition of and .
A. B. C. D.
ugcnetcse-dec2014-paper3 8085-microprocessor non-gatecse
Answer key ☟
3.1.4 8085 Microprocessor: UGC NET CSE | July 2016 | Part 3 | Question: 3
Answer key ☟
3.1.5 8085 Microprocessor: UGC NET CSE | November 2017 | Part 2 | Question: 31
What is the value of and registers after the completion of the doloop ?
A. and B. and
C. and D. and
ugcnetcse-nov2017-paper2 co-and-architecture 8085-microprocessor
Answer key ☟
3.1.6 8085 Microprocessor: UGC NET CSE | November 2017 | Part 2 | Question: 32
The contents of the destination register (in hexadecimal ) and the status of Carry Flag (CF) after the execution of
above instructions, are:
A. B.
C. D.
ugcnetcse-nov2017-paper2 8085-microprocessor non-gatecse
Answer key ☟
The following program is stored in memory unit of the basic computer. What is the content of the accumulator
after the execution of program? (All location numbers listed below are in hexadecimal).
A. B. C. D.
ugcnetcse-oct2020-paper2 accumulator assembly-language co-and-architecture
Answer key ☟
3.3.1 Addressing Modes: UGC NET CSE | August 2016 | Part 3 | Question: 5
In _____ addressing mode, the operands are stored in the memory. The address of the corresponding memory
location is given in a register which is specified in the instruction.
A. Register direct B. Register indirect
C. Base indexed D. Displacement
ugcnetcse-aug2016-paper3 co-and-architecture addressing-modes
Answer key ☟
3.3.2 Addressing Modes: UGC NET CSE | December 2008 | Part 2 | Question: 38
In which addressing mode, the effective address of the operand is generated by adding a constant value to the
contents of register ?
Answer key ☟
3.3.3 Addressing Modes: UGC NET CSE | December 2010 | Part 2 | Question: 34
The register or main memory location which contains the effective address of the operand is known as
A. Pointer B. Special location
C. Indexed register D. None of the above
ugcnetcse-dec2010-paper2 co-and-architecture addressing-modes
Answer key ☟
3.3.4 Addressing Modes: UGC NET CSE | December 2013 | Part 3 | Question: 49
Codes:
A. B.
C. D.
ugcnetcse-dec2013-paper3 co-and-architecture addressing-modes
Answer key ☟
3.3.5 Addressing Modes: UGC NET CSE | January 2017 | Part 3 | Question: 4
Answer key ☟
3.3.6 Addressing Modes: UGC NET CSE | July 2016 | Part 3 | Question: 5
The ____ addressing mode is similar to register indirect addressing mode, except that an offset is added to the
contents of the register. The offset and register are specified in the instruction.
Answer key ☟
3.3.7 Addressing Modes: UGC NET CSE | June 2009 | Part 2 | Question: 33
In which addressing mode the operand is given explicitly in the instruction itself ?
A. Absolute mode B. Immediate mode
C. Indirect mode D. Index mode
ugcnetcse-june2009-paper2 co-and-architecture addressing-modes easy
Answer key ☟
3.3.8 Addressing Modes: UGC NET CSE | June 2012 | Part 3 | Question: 27
Identify the addressing modes of the below instructions and match them :
A. B.
C. D.
ugcnetcse-june2012-paper3 co-and-architecture addressing-modes
Answer key ☟
3.3.9 Addressing Modes: UGC NET CSE | June 2014 | Part 3 | Question: 40
The advantage of _______ is that it can reference memory without paying the price of having a full memory
address in the instruction.
A. Direct addressing B. Indexed addressing
C. Register addressing D. Register Indirect addressing
ugcnetjune2014iii co-and-architecture addressing-modes
Answer key ☟
3.3.10 Addressing Modes: UGC NET CSE | June 2019 | Part 2 | Question: 11
Which type of addressing mode, less number of memory references are required?
Answer key ☟
3.3.11 Addressing Modes: UGC NET CSE | November 2017 | Part 3 | Question: 4
Which of the following addressing mode is best suited to access elements of an array of contiguous memory
locations?
Answer key ☟
3.4.1 Amdahls Law: UGC NET CSE | June 2008 | Part 2 | Question: 46
Amdahl's law states that the maximum speedup achievable by a parallel computer with ' ' processors is given
by :
A.
B.
C.
D.
Answer key ☟
The content of the accumulator after the execution of the following 8085 assembly language program, is
MVI A, 35H
MOV B, A
STC
CMC
RAR
XRA B
A. B. C. D.
ugcnetcse-aug2016-paper2 co-and-architecture assembly 8085-microprocessor
Answer key ☟
Answer key ☟
Answer key ☟
Answer key ☟
Answer key ☟
A. B. C. D.
ugcnetcse-dec2015-paper3 8086 assembly co-and-architecture non-gatecse
Answer key ☟
The contents of the destination register (in -bit binary notation), th status of Carry Flag and Sign Flag
after the execution of above instructions, are
A. B.
C. D.
ugcnetcse-dec2018-paper2 co-and-architecture assembly non-gatecse
Answer key ☟
Status register
ugcnetcse-july2016-paper3 co-and-architecture assembly
Answer key ☟
A. B.
C. D.
ugcnetcse-july2018-paper2 co-and-architecture assembly interrupts
Answer key ☟
Answer key ☟
Answer key ☟
3.5.12 Assembly: UGC NET CSE | June 2013 | Part 3 | Question: 43
Answer key ☟
Answer key ☟
A. B.
C. D.
ugcnetcse-june2015-paper2 assembly
Answer key ☟
The instruction : MOV CL, [BX] [DI] + 8 represents the ____ addressing mode
Answer key ☟
3.6.1 Byte Addressable: UGC NET CSE | June 2014 | Part 3 | Question: 43
A byte addressable computer has a memory capacity of Kbytes and can perform operations. An
instruction involving operands and one operator needs a maximum of
A. bits B. bits
C. bits D. bits
ugcnetjune2014iii co-and-architecture byte-addressable
Answer key ☟
3.7.1 CO and Architecture: UGC NET CSE | December 2008 | Part 2 | Question: 39
ugcnetcse-dec2008-paper2 co-and-architecture
Answer key ☟
3.7.2 CO and Architecture: UGC NET CSE | December 2010 | Part 2 | Question: 50
Answer key ☟
3.7.3 CO and Architecture: UGC NET CSE | December 2012 | Part 3 | Question: 27
In an enhancement of a CPU design, the speed of a floating point unit has been increased by 20% and the speed
of a fixed point unit has been increased by 10%. What is the overall speed achieved if the ratio of the number of
floating point operations to the number of fixed point operations is 2:3 and the floating point operation used to take
twice the time taken by the fixed point operation in original design?
Answer key ☟
3.7.4 CO and Architecture: UGC NET CSE | December 2013 | Part 3 | Question: 52
Answer key ☟
3.7.5 CO and Architecture: UGC NET CSE | January 2017 | Part 3 | Question: 3
Answer key ☟
3.7.6 CO and Architecture: UGC NET CSE | June 2012 | Part 2 | Question: 3
The branch logic that provides decision making capabilities in the control unit is known as
3.7.7 CO and Architecture: UGC NET CSE | June 2012 | Part 2 | Question: 46
A. Microprocessor B. Memory
C. Peripheral equipment D. All of the above
co-and-architecture ugcnetcse-june2012-paper2
Answer key ☟
3.7.8 CO and Architecture: UGC NET CSE | June 2012 | Part 2 | Question: 47
Answer key ☟
3.7.9 CO and Architecture: UGC NET CSE | June 2012 | Part 3 | Question: 61
A. B.
C. D.
ugcnetcse-june2012-paper3 co-and-architecture
Answer key ☟
3.7.10 CO and Architecture: UGC NET CSE | October 2020 | Part 2 | Question: 44
Which of the following statements with respect to multiprocessor system are true?
3.7.11 CO and Architecture: UGC NET CSE | October 2020 | Part 2 | Question: 81
Answer key ☟
3.7.12 CO and Architecture: UGC NET CSE | September 2013 | Part 3 | Question: 31
Answer key ☟
3.8.1 Cache Memory: UGC NET CSE | December 2014 | Part 3 | Question: 01
A hierarchical memory system that uses cache memory has cache access time of nano seconds, main memory
access time of nano seconds, % of memory requests are for read, hit ratio of for read access and the
write-through scheme is used. What will be the average access time of the system both for read and write requests ?
A. n.sec. B. n.sec.
C. n.sec. D. n.sec.
ugcnetcse-dec2014-paper3 co-and-architecture cache-memory
Answer key ☟
3.8.2 Cache Memory: UGC NET CSE | July 2016 | Part 3 | Question: 6
In ___ method, the word is written to the block in both the cache and main memory, in parallel
A. Write through B. Write back
C. Write protected D. Direct mapping
ugcnetcse-july2016-paper3 co-and-architecture cache-memory
Answer key ☟
3.8.3 Cache Memory: UGC NET CSE | July 2018 | Part 2 | Question: 98
Which of the following mapping is not used for mapping process in cache memory
A. Associative mapping B. Direct mapping
C. Set-Associative mapping D. Segmented - page mapping
ugcnetcse-july2018-paper2 co-and-architecture cache-memory
Answer key ☟
3.8.4 Cache Memory: UGC NET CSE | June 2012 | Part 2 | Question: 32
Cached and interleaved memories are ways of speeding up memory access between CPU’s and slower RAM.
Which memory models are best suited (i.e. improves the performance most) for which programs ?
Answer key ☟
3.8.5 Cache Memory: UGC NET CSE | October 2020 | Part 2 | Question: 5
Consider a machine with a byte addressable main memory of bytes block size of bytes. Assume that a
direct mapped cache consisting of lines used with this machine. How many bits will be there in Tag, line and
word field of format of main memory addresses?
A. B. C. D.
ugcnetcse-oct2020-paper2 co-and-architecture cache-memory
Answer key ☟
Answer key ☟
3.10.1 Compilation Phases: UGC NET CSE | June 2009 | Part 2 | Question: 34
A compiler that runs on one machine and produces code for a different machine is called :
A. Cross compilation
B. One pass compilation
C. Two pass compilation
D. None of the above
Answer key ☟
Answer key ☟
A DMA controller transfers 32-bit words to memory using cycle Stealing. The words are assembled from a
device that transmits characters at a rate of 4800 characters per second. The CPU is fetching and executing
instructions at an average rate of one million instructions per second. By how much will the CPU be slowed down
because of the DMA transfer?
Answer key ☟
Consider a 32-bit microprocessor, with a 16-bit external data bus, driven by an 8 MHz input clock. Assume that
this microprocessor has a bus cycle whose minimum duration equals four input clock cycles. What is the
maximum data transfer rate for this microprocessor?
A. bytes/sec B. bytes/sec
C. bytes/sec D. bytes/sec
ugcnetcse-june2015-paper3 co-and-architecture data-transfer
Answer key ☟
3.14.1 Dynamic Ram: UGC NET CSE | December 2015 | Part 3 | Question: 4
A dynamic RAM has refresh cycle of times per msec. Each refresh operation requires msec and a memory
cycle requires msec. What percentage of memory's total operating time is required for refreshes?
A. B. C. D.
ugcnetcse-dec2015-paper3 co-and-architecture dynamic-ram
Answer key ☟
Which of the following flags are set when ‘JMP’ instruction is executed?
Answer key ☟
3.16.1 Hardware Interrupt: UGC NET CSE | July 2016 | Part 3 | Question: 2
A. 2 B. 3 C. 4 D. 5
ugcnetcse-july2016-paper3 co-and-architecture hardware-interrupt
Answer key ☟
3.17.1 Instruction Format: UGC NET CSE | December 2013 | Part 3 | Question: 50
Answer key ☟
Answer key ☟
Answer key ☟
Which of the following is an interrupt according to temporal relationship with system clock?
A. Maskable interrupt B. Periodic interrupt
C. Division by zero D. Synchronous interrupt
ugcnetcse-jan2017-paper3 interrupts co-and-architecture
Answer key ☟
Answer key ☟
Answer key ☟
3.21.1 Machine Instruction: UGC NET CSE | January 2017 | Part 2 | Question: 32
A. B. C. D.
ugcnetjan2017ii co-and-architecture machine-instruction
Answer key ☟
3.21.2 Machine Instruction: UGC NET CSE | October 2020 | Part 2 | Question: 75
i. SISD
ii. MIMD
iii. SIMD
A. B. C. D.
ugcnetcse-oct2020-paper2 co-and-architecture machine-instruction
Answer key ☟
Suppose that the register and the register have the bit configuration. Only the three leftmost bits of are
compared with memory words because has ’s in these positions. Because of its organization, this type of
memory is uniquely suited to parallel searches by data association. This type of memory is known as
A. RAM B. ROM
C. content addressable memory D. secondary memory
ugcnetcse-june2019-paper2 co-and-architecture memory
Answer key ☟
How many address lines and data lines are required to provide a memory capacity of ?
A. B. C. D.
ugcnetcse-june2019-paper2 co-and-architecture memory
Answer key ☟
Answer key ☟
A given memory chip has 14 address and 8 data pins. It has the following number of locations.
A. B. C. D.
ugcnetcse-sep2013-paper3 co-and-architecture memory
Answer key ☟
3.23.1 Memory Data Transfer: UGC NET CSE | Junet 2015 | Part 3 | Question: 5
The CPU of a system having 1 MIPS execution rate needs 4 machine cycles on an average for executing an
instruction. The fifty percent of the cycles use memory bus. A memory read/write employs one machine cycle.
For execution of the programs, the system utilizes 90% of the CPU time. For block data transfer, an IO device is
attached to the system while CPU executes the background programs continuously. What is the maximum IO data
transfer rate if programmed IO data transfer technique is used?
A. 500 Kbytes/sec B. 2.2 Mbytes/sec
C. 125 Kbytes/sec D. 250 Kbytes/sec
ugcnetcse-june2015-paper3 co-and-architecture memory-data-transfer
Answer key ☟
A. B. C. D.
ugcnetcse-aug2016-paper3 co-and-architecture microprocessors 8085-microprocessor
Answer key ☟
A. traps are asynchronous and interrupts are synchronous with the program.
B. traps are synchronous and interrupts are asynchronous with the program.
C. traps are synchronous and interrupts are asynchronous with the I/O devices.
D. None of these
ugcnetcse-dec2013-paper3 microprocessors
Answer key ☟
The contents of Register and Register of microprocessor are and respectively. The
contents of , the status of carry flag and sign flag after executing assembly
language instruction, are
A. B.
C. D.
ugcnetjan2017ii microprocessors 8085-microprocessor machine-instruction co-and-architecture
Answer key ☟
3.24.5 Microprocessors: UGC NET CSE | January 2017 | Part 3 | Question: 5
Answer key ☟
Answer key ☟
3.24.7 Microprocessors: UGC NET CSE | July 2018 | Part 2 | Question: 100
Answer key ☟
Answer key ☟
A. B. C. D.
ugcnetcse-nov2017-paper3 microprocessors 8085-microprocessor co-and-architecture
Answer key ☟
A. In memory – mapped I/O, the CPU can manipulate I/O data residing in interface registers that are not used to
manipulate memory words.
B. The isolated I/O method isolates memory and I/O addresses so that memory address range is not affected by
interface address assignment.
C. In asynchronous serial transfer of data the two units share a common clock.
D. In synchronous serial transmission of data the two units have different clocks.
Answer key ☟
A micro-instruction format has micro-ops field which is divided into three subfields , , each having
seven distinct micro-operations, conditions field for four status bits, branch field having four options
used in conjunction with address field . The address space is of memory locations. The size of micro-
instruction is
Answer key ☟
3.25.1 Microprogram Control Unit: UGC NET CSE | June 2019 | Part 2 | Question: 14
The fault can be easily diagnosed in the micro-program control unit using diagnostic tools by maintaining the
contents of
Answer key ☟
3.26.1 Parallel Computing: UGC NET CSE | June 2012 | Part 3 | Question: 5
Suppose that the given application is run on a 64-processor machine and that 70 percent of the application can
be parallelized. Then the expected performance improvement using Amdahl’s law is
Answer key ☟
3.27.1 Parallel Processing: UGC NET CSE | Junet 2015 | Part 2 | Question: 46
In the case of parallelization, Amdahl's law states that if is the proportion of a program that can be made
parallel and is the proportion that cannot be parallelized, then the maximum speed-up that can be
achieved by using processors is:
A. B. C. D.
Answer key ☟
Answer key ☟
Answer key ☟
Answer key ☟
The concept of pipelining is a most effective in improving performance in the tasks being performed in different
stages:
Answer key ☟
Which of the following statements with respect to -segment pipelining are true?
Answer key ☟
A non-pipeline system takes ns to process a task. The same task can be processed in six-segment pipeline with
a clockcycle of ns. Determine approximately the speedup ratio of the pipeline for tasks.
A. B. C. D.
ugcnetcse-oct2020-paper2 co-and-architecture pipelining
Answer key ☟
3.29.1 Priority Encoder: UGC NET CSE | December 2015 | Part 3 | Question: 1
The three outputs from the priority encoder are used to provide a vector address of the form
. what is the second highest priority vector address in hexadecimal if the vector addresses are
starting from the one with the highest priority?
A. B. C. D.
ugcnetcse-dec2015-paper3 co-and-architecture priority-encoder
Answer key ☟
3.30.1 Processor Address Bus: UGC NET CSE | June 2019 | Part 2 | Question: 49
A processor can support a maximum memory of GB where memory is word addressable and a word is bytes.
What will be the size of the address bus of the processor?
Answer key ☟
The register that stores the bits required to mask the interrupts is ______.
A. Status register B. Interrupt service register
C. Interrupt mask register D. Interrupt request register
ugcnetcse-aug2016-paper3 co-and-architecture register interrupts
Answer key ☟
Let be the fraction of the computation (in terms of time) that is parallelizabl . the number of processors in
the system, and the speed up achievable in comparison with sequential execution – then the can be
calculated using the relation:
A. B. C. D.
ugcnetcse-dec2012-paper3 co-and-architecture speedup
Answer key ☟
Suppose that a computer program takes seconds of execution time on a computer with multiplication
operation responsible for seconds of this time. How much do you have to improve the speed of the
multiplication operation if you are asked to execute this program four times faster?
A. times faster B. times faster
C. times faster D. times faster
ugcnetcse-june2019-paper2 co-and-architecture speedup
Answer key ☟
Answer Keys
3.0.1 Q-Q 3.1.1 D 3.1.2 B 3.1.3 D 3.1.4 A
3.1.5 B 3.1.6 A 3.2.1 D 3.3.1 Q-Q 3.3.2 D
3.3.3 Q-Q 3.3.4 C 3.3.5 A 3.3.6 D 3.3.7 Q-Q
3.3.8 A 3.3.9 D 3.3.10 X 3.3.11 A 3.4.1 Q-Q
3.5.1 Q-Q 3.5.2 Q-Q 3.5.3 Q-Q 3.5.4 Q-Q 3.5.5 Q-Q
3.5.6 C 3.5.7 Q-Q 3.5.8 C 3.5.9 Q-Q 3.5.10 C
3.5.11 D 3.5.12 C 3.5.13 B 3.5.14 D 3.5.15 B
3.6.1 D 3.7.1 Q-Q 3.7.2 Q-Q 3.7.3 X 3.7.4 D
3.7.5 B 3.7.6 A 3.7.7 D 3.7.8 C 3.7.9 A
3.7.10 C 3.7.11 A 3.7.12 D 3.8.1 A 3.8.2 A
3.8.3 Q-Q 3.8.4 B 3.8.5 A 3.9.1 Q-Q 3.10.1 Q-Q
3.11.1 Q-Q 3.12.1 B 3.13.1 B 3.14.1 D 3.15.1 D
3.16.1 D 3.17.1 D 3.18.1 Q-Q 3.19.1 A 3.19.2 D
3.19.3 D 3.20.1 C 3.21.1 A 3.21.2 C 3.22.1 C
3.22.2 C 3.22.3 D 3.22.4 B 3.23.1 D 3.24.1 Q-Q
3.24.2 Q-Q 3.24.3 B 3.24.4 C 3.24.5 B 3.24.6 C
3.24.7 Q-Q 3.24.8 D 3.24.9 C 3.24.10 B 3.24.11 B
3.24.12 B 3.25.1 D 3.26.1 B 3.27.1 C 3.28.1 Q-Q
3.28.2 C 3.28.3 X 3.28.4 B 3.28.5 A 3.28.6 B
3.29.1 A 3.30.1 C 3.31.1 Q-Q 3.32.1 C 3.32.2 C
4 Compiler Design (74)
In which file the compiler manage various objects, which are used in windows programming?
Answer key ☟
Answer key ☟
A.
B. ,
C.
D.
ugcnetcse-june2013-paper2 compiler-design
Answer key ☟
The process of assigning load addresses to the various parts of the program and adjusting the code and data in
the program to reflect the assigned address is called
Answer key ☟
The compiler converts all operands upto the type of the largest operand is called
A. Type Promotion B. Type Evaluation
C. Type Conversion D. Type Declaration
ugcnetcse-dec2013-paper3 compiler-design
Answer key ☟
4.0.6 UGC NET CSE | Junet 2015 | Part 2 | Question: 35
Answer key ☟
The linker :
A. is similar to interpreter
B. uses source code as its input
C. is required to create a load module
D. none of the above
ugcnetcse-june2009-paper2
Answer key ☟
4.0.8 Which activity is not included in the first pass of two pass assemblers (UGC NET Dec 04)
Q1. Which activity is not included in the first pass of two pass
assemblers?
(A) Build the symbol table
(B) Construct the intermediate code
(C) Separate mnemonic opcode and operand fields
(D) None of the above
Match the description of several parts of a classic optimizing compiler in , with the names of those parts in
:
A.
B.
C.
D.
ugcnetcse-nov2017-paper2 compiler-design
Answer key ☟
Answer key ☟
Which activity is not included in the first pass of two pass assemblers ?
Answer key ☟
Answer key ☟
Answer key ☟
Answer key ☟
A compiler for a high level language that runs on one machine and produces code for a different machine is
called :
A. Optimizing B. One pass compiler
C. Cross compiler D. Multipass compiler
ugcnetcse-dec2006-paper2
Answer key ☟
Answer key ☟
ugcnetcse-dec2007-paper2
Answer key ☟
ugcnetcse-dec2007-paper2
Answer key ☟
Answer key ☟
Answer key ☟
4.0.22 UGC NET CSE | December 2007 | Part 2 | Question: 31
A. user defined address symbols are correlated with their binary equivalent
B. the syntax of the statement is checked and mistakes, if any, are listed
C. object program is generated
D. semantic of the source program is elucidated
ugcnetcse-dec2007-paper2
Answer key ☟
Find the lexicographic ordering of the bit strings given below based on the ordering .
a.
b.
c.
d.
e.
A.
B.
C.
D.
ugcnetcse-oct2020-paper2 compiler-design
Answer key ☟
Which activities is not included in the first pass of two pass assembler?
Answer key ☟
Which activity is not included in the first pass of two pass assemblers?
A. Build the symbol table B. Construct the machine code
C. Separate mnemonic opcode and operand fields. D. None of these
ugcnetcse-june2005-paper2 compiler-design assembler
Answer key ☟
4.2.1 Chomsky Normal Form: UGC NET CSE | December 2012 | Part 3 | Question: 53
If the parse tree of a word w generated by a Chomsky form grammar has no path of length greater than i, then
the word w is of length
A. no greater than B. no greater than
C. no greater than D. no greater than
chomsky-normal-form ugcnetcse-dec2012-paper3 parsing
Answer key ☟
4.3.1 Code Optimization: UGC NET CSE | December 2006 | Part 2 | Question: 35
Answer key ☟
4.3.2 Code Optimization: UGC NET CSE | December 2012 | Part 2 | Question: 11
A. reducing the range of values of input variables B. code optimization using cheaper machine instructions
C. reducing efficiency of program D. none of the above
code-optimization ugcnetcse-dec2012-paper2 compiler-design
Answer key ☟
4.4.1 Compilation Phases: UGC NET CSE | August 2016 | Part 2 | Question: 33
In compiler optimization, operator strength reduction uses mathematical identities to replace slow math
operations with faster operations. Which of the following code replacements is an illustration of operator
strength reduction ?
A. Replace by or Replace by .
B. Replace by
C. Replace by
D. Replace by
Answer key ☟
4.4.2 Compilation Phases: UGC NET CSE | June 2005 | Part 2 | Question: 31
A. Lexical analysis is breaking the input into tokens B. Syntax analysis is for parsing the phrase
C. Syntax analysis is for analyzing the semantic D. None of these
ugcnetcse-june2005-paper2 compiler-design compilation-phases
Answer key ☟
4.5.1 Compiler Optimization: UGC NET CSE | December 2015 | Part 2 | Question: 41
Answer key ☟
4.5.2 Compiler Optimization: UGC NET CSE | July 2016 | Part 2 | Question: 33
In ____, the bodies of the two loops are merged together to form a single loop provided that they do not make
any references to each other.
A. Loop unrolling B. Strength reductions
C. Loop concatenation D. Loop jamming
ugcnetcse-july2016-paper2 compiler-design compiler-optimization
Answer key ☟
4.6.1 Constant Folding: UGC NET CSE | June 2019 | Part 2 | Question: 73
Answer key ☟
4.7.1 Context Sensitive: UGC NET CSE | June 2005 | Part 2 | Question: 32
Answer key ☟
4.8.1 Control Flow Graph: UGC NET CSE | December 2013 | Part 3 | Question: 4
Given a flow graph with 10 nodes, 13 edges and one connected components, the number of regions and the
number of predicate (decision) nodes in the flow graph will be
A. 4, 5 B. 5, 4 C. 3, 1 D. 13, 8
ugcnetcse-dec2013-paper3 compiler-design control-flow-graph
Answer key ☟
(A) LL grammar
(C) LR grammar
Answer key ☟
The language of all non-null strings of a's can be defined by a context free grammar as follow :
Answer key ☟
Answer key ☟
A grammar is if and only if the following conditions hold for two distinct productions
I. First First where is some terminal symbol of the grammar.
II. First First
III. First Follow if First
Answer key ☟
4.10.1 Intermediate Code: UGC NET CSE | October 2020 | Part 2 | Question: 30
Answer key ☟
A. B. C. D. None of these
ugcnetcse-dec2006-paper2 lr-parser compiler-design
Answer key ☟
Answer key ☟
4.12.1 Lexical Analysis: UGC NET CSE | December 2014 | Part 3 | Question: 20
How many tokens will be generated by the scanner for the following statement ?
;
A. B. C. D.
ugcnetcse-dec2014-paper3 compiler-design lexical-analysis
Answer key ☟
4.12.2 Lexical Analysis: UGC NET CSE | January 2017 | Part 2 | Question: 33
II. Syntax Analysis is specified by regular expressions and implemented by finite-state machine.
4.12.3 Lexical Analysis: UGC NET CSE | June 2010 | Part 2 | Question: 35
Which of the following is used for grouping of characters into tokens (in a computer) ?
Answer key ☟
Answer key ☟
4.14.1 Machine Instruction: UGC NET CSE | December 2015 | Part 2 | Question: 42
What will be the hexadecimal value in the register (32-bit) after executing the following instructions?
mov al, 15
mov ah, 15
xor al, al
mov cl, 3
shr ax, cl
Answer key ☟
4.15.1 Parameter Passing: UGC NET CSE | August 2016 | Part 3 | Question: 21
Assume that the program is implementing parameter passing with ‘call by reference’. What will be printed
by following print statements in ?
Program P
{
x=10;
y=3;
funb(y,x,x)
print x;
print y;
}
funb (x,y,z)
{
y=y+4;
z=x+y+z;
}
A. 10, 7 B. 31, 3 C. 10, 3 D. 31, 7
ugcnetcse-aug2016-paper3 parameter-passing
Answer key ☟
4.15.2 Parameter Passing: UGC NET CSE | December 2014 | Part 3 | Question: 19
Answer key ☟
Answer key ☟
A shift-reduce parser carries out the actions specified within braces immediately after reducing with the
corresponding rule of the grammar.
(B) 1 1 2 3 3
(C) 2 3 1 3 1
(D) 2 3 3 2 1
ugcnetcse-dec2009-paper2 compiler-design parsing
A. has the higher precedence than + B. - has the higher precedence than
C. + and – have same precedence D. + has the higher precedence than
ugcnetcse-dec2012-paper2 compiler-design parsing
Answer key ☟
Answer key ☟
Answer key ☟
A. Top-down parsers are LL parsers where first L stands for left-to-right scan and second L stands for a leftmost
derivation
B. (000)* is a regular expression that matches only strings containing an odd number of zeroes, including the empty
string
C. Bottom-up parsers are in the LR family, where L stands for left-to-right scan and R stands for rightmost derivation
D. The class of context-free languages is closed under reversal. That is, if L is any context-free language, then the
language is context-free
Answer key ☟
Answer key ☟
A. The grammar , where is the only non-terminal symbol and is the null string, is
ambiguous
B. SLR is powerful than LALR
C. An LL(1) parser is a top-down parser
D. YACC tool is an LALR(1) parser generator
Answer key ☟
Answer key ☟
Answer key ☟
Answer key ☟
Answer key ☟
Answer key ☟
4.17.1 Quadruple Representation: UGC NET CSE | June 2019 | Part 2 | Question: 72
On translating the expression given below into quadruple representation, how many operations are required?
A. B. C. D.
ugcnetcse-june2019-paper2 intermediate-code quadruple-representation
Answer key ☟
4.18.1 Runtime Environment: UGC NET CSE | January 2017 | Part 2 | Question: 35
I. A function of a linker is to combine several object modules into a single load module.
II. A function of a linker is to replace absolute references in an object module by symbolic references to locations
in other modules.
A. Only I B. Only II
C. Both I and II D. Neither I nor II
ugcnetjan2017ii runtime-environment compiler-design
Answer key ☟
4.19.1 Shift Reduce Parser: UGC NET CSE | December 2014 | Part 2 | Question: 31
A. Shift step that advances in the input stream by symbols and Reduce step that applies a completed
grammar rule to some recent parse trees, joining them together as one tree with a new root symbol.
B. Shift step that advances in the input stream by one symbol and Reduce step that applies a completed grammar rule
to some recent parse trees, joining them together as one tree with a new root symbol.
C. Shift step that advances in the input stream by symbols and Reduce step that applies a completed
grammar rule to form a single tree.
D. Shift step that does not advance in the input stream and Reduce step that applies a completed grammar rule to form a
single tree.
Answer key ☟
4.19.2 Shift Reduce Parser: UGC NET CSE | June 2019 | Part 2 | Question: 74
i. input buffer
ii. stack
iii. parse table
Answer key ☟
4.20.1 Symbol Table: UGC NET CSE | June 2005 | Part 2 | Question: 35
Answer key ☟
4.20.2 Symbol Table: UGC NET CSE | June 2019 | Part 2 | Question: 71
Which data structure is used by the compiler for managing variables and their attributes?
Answer key ☟
4.20.3 Symbol Table: UGC NET CSE | October 2020 | Part 2 | Question: 41
i. Storage allocation
ii. Checking type compatibility
iii. Suppressing duplicate error messages
Answer key ☟
4.21.1 System Software& Compilers: UGC NET CSE | June 2010 | Part 2 | Question: 31
Answer key ☟
Answer key ☟
4.23.1 Two Pass Assembler: UGC NET CSE | December 2014 | Part 2 | Question: 33
Answer key ☟
Answer Keys
4.0.1 D 4.0.2 B 4.0.3 D 4.0.4 D 4.0.5 A
4.0.6 B 4.0.7 Q-Q 4.0.8 Q-Q 4.0.9 A 4.0.10 Q-Q
4.0.11 Q-Q 4.0.12 Q-Q 4.0.13 Q-Q 4.0.14 Q-Q 4.0.15 Q-Q
4.0.16 C 4.0.17 Q-Q 4.0.18 Q-Q 4.0.19 Q-Q 4.0.20 Q-Q
4.0.21 Q-Q 4.0.22 Q-Q 4.0.23 B 4.1.1 Q-Q 4.1.2 Q-Q
4.2.1 C 4.3.1 Q-Q 4.3.2 B 4.4.1 Q-Q 4.4.2 Q-Q
4.5.1 A 4.5.2 D 4.6.1 A 4.7.1 Q-Q 4.8.1 B
4.9.1 Q-Q 4.9.2 Q-Q 4.9.3 D 4.9.4 Q-Q 4.9.5 D
4.9.6 Q-Q 4.10.1 X 4.11.1 Q-Q 4.11.2 C 4.12.1 A
4.12.2 D 4.12.3 Q-Q 4.13.1 Q-Q 4.14.1 C 4.15.1 Q-Q
4.15.2 C 4.16.1 A 4.16.2 Q-Q 4.16.3 B 4.16.4 C
4.16.5 D 4.16.6 B 4.16.7 D 4.16.8 B 4.16.9 Q-Q
4.16.10 D 4.16.11 C 4.16.12 Q-Q 4.16.13 B 4.17.1 B
4.18.1 A 4.19.1 B 4.19.2 D 4.20.1 Q-Q 4.20.2 C
4.20.3 D 4.21.1 Q-Q 4.22.1 C 4.23.1 A
5 Computer Networks (294)
Which of the following is widely used inside the telephone system for long-haul data traffic?
A. ISDN
B. ATM
C. Frame Relay
D. ISTN
ugcnetcse-dec2013-paper2 computer-networks
Answer key ☟
A network with bandwidth of Mbps can pass only an average of frames per minute with each
frame carrying an average of bits. What is the throughput of this network ?
Answer key ☟
The bit rate of a signal is bps. If each signal unit carries bits, the baud rate of the signal is _________.
A. baud/sec B. baud/sec
C. baud/sec D. baud/sec.
ugcnetcse-june2014-paper2 computer-networks serial-communication
Answer key ☟
Answer key ☟
Which of the following TCP/IP Internet protocol does diskless machine uses to obtain its IP address from a
server?
Answer key ☟
Checksum used along with each packet computes the sum of the data, where data is treated as a sequence of
Answer key ☟
5.0.7 UGC NET CSE | June 2012 | Part 3 | Question: 54
What is the size (in terms of bits) of Header length field in IPV4 header?
A. 2 B. 4 C. 8 D. 16
ugcnetcse-june2012-paper3 computer-networks
Answer key ☟
If link transmits 4000 frames per scond and each slot has 8 bits , the transmission rate of circuits of this TDM is
_____
Answer key ☟
Ten signals, each requiring Hz, are multiplexed on to a single channel using FDM. How much minimum
bandwidth is required for the multiplexed channel ? Assume that the guard bands are Hz wide.
A. B.
C. D. None of the above
ugcnetjune2014iii computer-networks
Answer key ☟
Answer key ☟
A Pure ALOHA Network transmits 200 bit frames using a shared channel with 200 kbps bandwidth . If the
system (all stations put together) produces 500 frames per sec , then the throughput of the system is
Answer key ☟
The ____ is a set of standards that defines how a dynamic web document should be written, how input data
should be supplied to the program, and how the output result should be used.
Answer key ☟
The start and stop bits are used in serial communication for
A. error detection B. error correction
C. synchronization D. slowing down the communication
ugcnetcse-dec2013-paper3 computer-networks serial-communication
Answer key ☟
In a binary Hamming Code the number of check digits is r then number of message digits is equal to
A. B. C. D.
ugcnetcse-june2015-paper3 computer-networks hamming-code
Answer key ☟
Answer key ☟
Four channels are multiplexed using TDM. If each channel sends 100 bytes/second and we multiplex 1 byte per
channel, then the bit rate for the link is
Answer key ☟
A network device is sending out the data at the rate of bps. How long does it take to send a file of
characters?
A. B. C. D.
ugcnetcse-dec2015-paper3 computer-networks
Answer key ☟
Which of the following steps is/are not required for analog to digital conversion?
i. Sensing
ii. Conversion
iii. Amplification
iv. Conditioning
v. Quantization
A. a and b B. c and d C. a, b and e D. None of the above
ugcnetcse-dec2015-paper3 computer-networks
Answer key ☟
A multiplexer combines four 100-Kbps channels using a time slot of 2 bits. What is the bit rate?
Answer key ☟
i. Frequency Division Multiplexing is a technique that can be applied when a bandwidth of a link is greater than
combined bandwidth of signals to be transmitted
ii. Wavelength Division Multiplexing (WDM) is an analogue multiplexing technique to combine optical signals
iii. WDM is a digital multiplexing technique
iv. TDM is a digital multiplexing technique
Answer key ☟
A. B.
C. D.
ugcnetcse-july2016-paper3 computer-networks
Answer key ☟
All of the following are examples of real security and privacy risks except
Answer key ☟
computer-networks
Answer key ☟
5.0.24 UGC NET CSE | December 2011 | Part 2 | Question: 42
A. B. C. D.
computer-networks
Answer key ☟
A. B. C. D.
ugcnetcse-dec2010-paper2 computer-networks hamming-code
Answer key ☟
A. B. C. D.
ugcnetcse-june2010-paper2 computer-networks
Answer key ☟
Answer key ☟
Let C be a binary linear code with minimum distance then it can correct upto ___ bits of error
A. B. C. D.
ugcnetcse-jan2017-paper3 computer-networks hamming-code
Answer key ☟
i. Multilayer perceptron
ii. Self organizing feature map
iii. Hopfield network
A. B.
C. D.
ugcnetcse-dec2009-paper2 computer-networks
Answer key ☟
ugcnetcse-june2009-paper2
Answer key ☟
1. time slots
2. bandpass filters
3. handsets
4. frequency bands
ugcnetcse-june2009-paper2
Answer key ☟
protocol consists of :
ugcnetcse-june2009-paper2
Answer key ☟
GSM/CDMA systems :
ugcnetcse-june2009-paper2
Answer key ☟
A. Layering
B. Cryptography
C. Grade of service
D. None of the above
ugcnetcse-june2009-paper2
Which one of the following ISO standard is used for software process ?
A. B.
C. D.
ugcnetcse-june2009-paper2
Answer key ☟
When compared with analog cellular systems, an advantage of digital cellular system is that :
A. it is less complicated
B. it requires less of computer memory
C. it conserves spectrum bandwidth
D. it costs less
ugcnetcse-june2009-paper2
Answer key ☟
E-commerce includes :
A. B.
C. D. All of the above
ugcnetcse-june2009-paper2
Answer key ☟
ugcnetcse-june2009-paper2
Answer key ☟
A.
B.
C.
D.
ugcnetcse-nov2017-paper3 computer-networks
Answer key ☟
In the _______method , after the station finds the line idle , it sends or refrains from sending based on
probability
a)None-Persistent
b)One -Persistent
c) P-Persistent
d)Non-Persistent
Answer key ☟
Answer key ☟
Identify the correct sequence in which the following packets are transmitted on the network by a host when a
browser requests a webpage from a remote server, assuming that the host has just been restarted.
A. HTTP GET request, DNS query, TCP SYN B. DNS query, HTTP GET request, TCP SYN
C. TCP SYN, DNS query, HTTP GET request D. DNS query, TCP SYN, HTTP GET request
ugcnetcse-dec2018-paper2 computer-networks
Answer key ☟
A host is connected to a department network which is part of a university network. The university network, in
turn, is part of the Internet. The largest network, in which the Ethernet address of the host is unique, is
Answer key ☟
Consider network architecture reference model. Session layer of this model offers dialog control,
token management and ______ as services.
Answer key ☟
A. Connectionless B. Error-free
C. Segmentation D. Connection-oriented
ugcnetcse-dec2004-paper2
Answer key ☟
Answer key ☟
Answer key ☟
Making sure that all the data packets of a message are delivered to the destination is _________ control.
Answer key ☟
5.0.51 UGC NET CSE | December 2004 | Part 2 | Question: 26
Error control is needed at the transport layer because of potential error occurring __________.
A. from transmission line noise B. in router
C. from out of sequency delivery D. from packet losses
ugcnetcse-dec2004-paper2
Answer key ☟
A network is limited to :
A. bytes per data field B. stations per segment
C. segments D. feet of cable
ugcnetcse-dec2006-paper2
Answer key ☟
A. B. C. D.
ugcnetcse-dec2006-paper2
Answer key ☟
A. B. C. D.
ugcnetcse-dec2007-paper2
Answer key ☟
Answer key ☟
Answer key ☟
ugcnetcse-dec2007-paper2
Answer key ☟
Let e : B^m → B^n is a group code. The minimum distance of ‘e’ is equal to :
A. the maximum weight of a non zero code word B. the minimum weight of a non zero code word
C. m D. n
ugcnetcse-dec2007-paper2
Answer key ☟
ugcnetcse-oct2020-paper2 computer-networks
Answer key ☟
Consider a code with only four valid code words: , , , and . This
code has distance . If the code word arrived is then the original code word must be _______
A. B. C. D.
ugcnetcse-oct2020-paper2 computer-networks hamming-code
Answer key ☟
Identify the correct order of the terms A-E to complete the paragraph about MAC addresses and IP addresses
given below.
A MAC address is a media access_______ address. A network device has a ____________ MAC address that can help
________ the device in the network. An IP address is an Internet __________ address. An IP address can be static or
________.
i. Protocol
ii. Control
iii. Dynamic
iv. Identify
v. E. unique
Answer key ☟
5.1.1 Analog & Digital Transmission: UGC NET CSE | Junet 2015 | Part 3 | Question: 15
The process of dividing an analog signal into a string of discrete outputs, each of constant amplitude, is called:
Answer key ☟
5.2.1 Analog Signals: UGC NET CSE | December 2014 | Part 2 | Question: 26
A. B. C. D.
ugcnetcse-dec2014-paper2 computer-networks analog-signals
Answer key ☟
5.3.1 Application Layer: UGC NET CSE | January 2017 | Part 2 | Question: 27
The maximum size of the data that the application layer can pass on to the layer below is ________.
Answer key ☟
5.4.1 Asymmetric Key Cryptography: UGC NET CSE | December 2014 | Part 3 | Question: 30
A. Private key is kept by the receiver and public key is announced to the public.
B. Public key is kept by the receiver and private key is announced to the public.
C. Both private key and public key are kept by the receiver.
D. Both private key and public key are announced to the public.
Answer key ☟
5.5.1 Asymptotic Notation: UGC NET CSE | June 2013 | Part 2 | Question: 35
A. B.
C. D.
ugcnetcse-june2013-paper2 asymptotic-notation
Answer key ☟
5.6.1 Binary Search Tree: UGC NET CSE | December 2010 | Part 2 | Question: 25
Which of the following can be the sequence of nodes examined in binary search tree while searching for key ?
A. B.
C. D.
ugcnetcse-dec2010-paper2 computer-networks binary-search-tree
Answer key ☟
5.7.1 Binary Symmetric Channel: UGC NET CSE | June 2013 | Part 3 | Question: 53
Answer key ☟
5.8.1 Bit Oriented Protocol: UGC NET CSE | December 2014 | Part 3 | Question: 29
________ is a bit-oriented protocol for communication over point-to-point and multipoint links.
Answer key ☟
5.9.1 Bit Rate: UGC NET CSE | December 2014 | Part 2 | Question: 29
An analog signal has a bit rate of bps and a baud rate of baud. How many data elements are carried by
each signal element
A. bits/baud B. bits/baud
C. bits/baud D. None of the above
ugcnetcse-dec2014-paper2 computer-networks bit-rate
Answer key ☟
A. layers 1 and 2
B. layers 1 through 3
C. all layers
D. none of the above
Answer key ☟
5.11 CRC Polynomial (2)
5.11.1 CRC Polynomial: UGC NET CSE | December 2013 | Part 3 | Question: 33
The message 11001001 is to be transmitted using the CRC polynomial to protect it from errors. The
message that should be transmitted is
Answer key ☟
5.11.2 CRC Polynomial: UGC NET CSE | January 2017 | Part 3 | Question: 27
Let be generator polynomial used for CRC checking. The condition that should be satisfied by to
correct odd numbered error bits, will be:
A. is factor of B. is factor of
C. is factor of D. is factor of
ugcnetcse-jan2017-paper3 computer-networks crc-polynomial
Answer key ☟
5.12.1 Cache Memory: UGC NET CSE | December 2008 | Part 2 | Question: 9
Suppose it takes to access page table and to access associative memory. If the average access time
is , the corresponding hit rate is:
A. percent
B. percent
C. percent
D. percent
Answer key ☟
In CRC checksum method, assume that given frame for transmission is 1101011011 and the generator
polynomial is . After implementing encoder, the encoded word sent from sender side
is _____.
A. 11010110111110 B. 11101101011011
C. 110101111100111 D. 110101111001111
ugcnetcse-aug2016-paper3 computer-networks crc-polynomial checksum
Answer key ☟
5.14.1 Classful Addressing: UGC NET CSE | December 2012 | Part 3 | Question: 15
A. A B. B C. C D. D
ugcnetcse-dec2012-paper3 computer-networks ip-addressing classful-addressing
Answer key ☟
5.14.2 Classful Addressing: UGC NET CSE | December 2014 | Part 2 | Question: 27
A. B. C. D.
ugcnetcse-dec2014-paper2 computer-networks classful-addressing
Answer key ☟
5.15.1 Classless Addressing: UGC NET CSE | Junet 2015 | Part 2 | Question: 30
Answer key ☟
What is the bit rate for transmitting uncompressed 800 600 pixel colour frames with 8 bits/pixel at 40
frames/second?
A. 2.4 Mbps B. 15.36 Mbps
C. 153.6 Mbps D. 1536 Mbps
ugcnetcse-dec2013-paper3 computer-networks communication
Answer key ☟
A client-server system uses a satellite network, with the satellite at a height of 40,000 kms. What is the best-case
delay in response to a request? (Note that the speed of light in air is 3,00,000 km/second)
A. 133.33 m sec B. 266.67 m sec
C. 400.00 m sec D. 533.33 m sec
ugcnetcse-dec2013-paper3 communication computer-networks
Answer key ☟
____ is a type of transmission impairment in which the signal looses strength due to the resistance of the
transmission medium
Answer key ☟
Answer key ☟
_____ is a satellite based tracking system that enables the determination of person’s position
A. Bluetooth B. WAP
C. Short Message Service D. Global Positioning System
computer-networks communication ugcnetcse-june2012-paper2
Answer key ☟
Match the following with link quality measurement and handoff initiation :
A. B.
C. D.
computer-networks communication ugcnetcse-june2012-paper3
Answer key ☟
Infrared signals can be used for short range communication in a closed area using _______ propagation.
Answer key ☟
In a digital transmission, the receiver clock is percent faster than the sender clock. How many extra bits per
second does the receiver receive if the data rate is Mbps ?
Answer key ☟
Firewall is a device that filters access to the protected network from the outside network. Firewalls can filter the
packets on the basis of
i. Source IP address
ii. Destination IP address
iii. TCP Source Port
iv. UDP Source Port
v. TCP Destination Port
Answer key ☟
The plain text message encrypted with algorithm using and and the characters
of the message are encoded using the values to for letters A to Z. Suppose character by character
encryption was implemented. Then, the Cipher Text message is _____.
Answer key ☟
A. In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption.
B. The symmetric cipher DES (Data Encryption Standard) was widely used in the industry for security product.
C. The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.
D. Public key algorithms use two different keys for Encryption and Decryption
Answer key ☟
How many distinct stages are there in algorithm, which is parameterized by a -bit key ?
A. B. C. D.
ugcnetcse-dec2014-paper2 computer-networks cryptography
Answer key ☟
Match the following symmetric block ciphers with corresponding block and key sizes:
A. B.
C. D.
ugcnetcse-july2018-paper2 cryptography computer-networks
Answer key ☟
A. B.
C. D.
ugcnetjune2014iii computer-networks network-security cryptography
Answer key ☟
Using ‘RSA’ public key cryptosystem, if , and , find the value of and encrypt the number
A. B. C. D.
ugcnetcse-oct2020-paper2 computer-networks network-security cryptography
Answer key ☟
i. A hash function takes a message of arbitrary length and generates a fixed length code
ii. A hash function takes a message of fixed length and generates a code of variable length
iii. A hash function may give same hash value for distinct messages
Answer key ☟
5.19.1 Data Communication: UGC NET CSE | December 2009 | Part 2 | Question: 26
Device on one network can communicate with devices on another network via a
(A) Hub/Switch
(D) Gateway
ugcnetcse-dec2009-paper2 computer-networks data-communication
Answer key ☟
5.19.2 Data Communication: UGC NET CSE | December 2011 | Part 2 | Question: 35
A. B. C. D.
ugcnetcse-dec2011-paper2 computer-networks data-communication
Answer key ☟
5.19.3 Data Communication: UGC NET CSE | December 2011 | Part 2 | Question: 37
A. Transfer an ongoing call from one base station to another B. Initiating a new call
C. Dropping an ongoing call D. None of above
ugcnetcse-dec2011-paper2 computer-networks data-communication
Answer key ☟
5.19.4 Data Communication: UGC NET CSE | December 2011 | Part 2 | Question: 48
Answer key ☟
5.19.5 Data Communication: UGC NET CSE | June 2010 | Part 2 | Question: 47
A leased special high-speed connection from the local telephone carrier for business users that transmits at
mbps is known as ________ carrier.
A. B. C. D.
ugcnetcse-june2010-paper2 computer-networks data-communication
Answer key ☟
5.19.6 Data Communication: UGC NET CSE | June 2010 | Part 2 | Question: 48
A. B. C. D.
ugcnetcse-june2010-paper2 computer-networks data-communication
5.19.7 Data Communication: UGC NET CSE | Junet 2015 | Part 3 | Question: 29
Suppose a digitazed voice channel is made by digitizing 8 kHz bandwidth analog voice signal. It is required to
sample the signal at twice the highest frequency (two samples per hertz). What is the bit rate required, if it is
assumed that each sample required 8 bits?
5.20.1 Data Link Layer: UGC NET CSE | December 2008 | Part 2 | Question: 16
A. B.
C. D.
ugcnetcse-dec2008-paper2 computer-networks data-link-layer
Answer key ☟
5.20.2 Data Link Layer: UGC NET CSE | December 2009 | Part 2 | Question: 28
2. HSSI
3. Frame Relay
4. 10 – Base T
5. Token Ring
(A) 1, 2, 3
(B) 1, 3, 5
(C) 1, 3, 4, 5
(D) 1, 2, 3, 4, 5
ugcnetcse-dec2009-paper2 computer-networks data-link-layer
Answer key ☟
5.20.3 Data Link Layer: UGC NET CSE | July 2016 | Part 3 | Question: 29
Assume that we need to download text documents at the rate of 100 pages per minute. A page is in average of
24 lines with 80 characters in each line requires 8 bits. Then the required bit rate of the channel is
Answer key ☟
5.20.4 Data Link Layer: UGC NET CSE | November 2017 | Part 3 | Question: 25
Suppose we want to download text documents at the rate of pages per second. Assume that a page consists
of an average of lines with characters in each line. What is the required bit rate of the channel?
Answer key ☟
5.20.5 Data Link Layer: UGC NET CSE | November 2017 | Part 3 | Question: 27
If a file consisting of characters takes seconds to send, then the data rate is _________
Answer key ☟
5.20.6 Data Link Layer: UGC NET CSE | September 2013 | Part 2 | Question: 2
In ______ CSMA protocol, after the station finds the line idle, it sends or refrains from sending based on the
outcome of a random number generated.
Answer key ☟
5.20.7 Data Link Layer: UGC NET CSE | September 2013 | Part 3 | Question: 7
Suppose a file of 10,000 characters is to be sent over a line at 2400 bps. Assume that the data is sent in frames.
Each frame consists of 1000 characters and an overhead of 48 bits per frame. Using synchronous transmission,
the total overhead time is
Answer key ☟
5.21.1 Data Mining Algorithm: UGC NET CSE | December 2008 | Part 2 | Question: 49
An example of a data mining algorithm which uses squared error score function is :
A. CART algorithm
B. back propagation algorithm
C. a priori algorithm
D. vector space algorithm
Answer key ☟
5.22.1 Data Transmission: UGC NET CSE | December 2014 | Part 3 | Question: 26
How many characters per second ( bits + parity) can be transmitted over a bps line if the transfer is
asynchronous ? (Assuming start bit and stop bit)
A. B. C. D.
ugcnetcse-dec2014-paper3 computer-networks data-transmission asynchronous-transmission
Answer key ☟
5.23.1 Distance Vector Routing: UGC NET CSE | December 2007 | Part 2 | Question: 30
Answer key ☟
5.23.2 Distance Vector Routing: UGC NET CSE | January 2017 | Part 2 | Question: 29
Distance vector routing algorithm is a dynamic routing algorithm. The routing tables in distance vector routing
algorithm are updated __________.
A. automatically B. by server
C. by exchanging information with neighbour nodes D. with back up database
ugcnetjan2017ii computer-networks distance-vector-routing
Answer key ☟
5.24.1 Edi Layer: UGC NET CSE | December 2008 | Part 2 | Question: 48
E-commerce involves :
5.25.1 Electronic Payment Systems: UGC NET CSE | December 2015 | Part 2 | Question: 50
____ uses electronic means to transfer funds directly from one account to another rather than by cheque or cash
Answer key ☟
Answer key ☟
Given code word is to be transmitted with even parity check bit. The encoded word to be
transmitted for this code is
A. B. C. D.
computer-networks ugcnetcse-june2013-paper3 encoding
Answer key ☟
5.27.1 Encryption Decryption: UGC NET CSE | July 2018 | Part 2 | Question: 50
Answer key ☟
5.27.2 Encryption Decryption: UGC NET CSE | June 2019 | Part 2 | Question: 86
In the TCP/IP model, encryption and decryption are functions of ____ layer.
Answer key ☟
Answer key ☟
5.29.1 Error Correction: UGC NET CSE | December 2009 | Part 2 | Question: 03
If in an error detection and correction code a message M : “You are good students” is stored as M' : Youare
areyou aregood goodare goodstudents studentsgood. What is the space required to store M' in general ? (assume
that ‘n’ is the length of M)
A. 2n B. 3n C. 4n D. less than 4n
ugcnetcse-dec2009-paper2 computer-networks error-correction
Answer key ☟
5.29.2 Error Correction: UGC NET CSE | December 2011 | Part 2 | Question: 12
Answer key ☟
5.29.3 Error Correction: UGC NET CSE | July 2018 | Part 2 | Question: 49
To guarantee correction of upto errors, the minimum Hamming distance in a block code must be ______
A. B. C. D.
ugcnetcse-july2018-paper2 computer-networks error-correction error-detection
Answer key ☟
5.29.4 Error Correction: UGC NET CSE | June 2009 | Part 2 | Question: 02
In order that a code is error correcting, the minimum Hamming distance should be :
1.
2.
3.
4.
ugcnetcse-june2009-paper2 error-correction
Answer key ☟
5.29.5 Error Correction: UGC NET CSE | September 2013 | Part 3 | Question: 56
If the data unit is 111111 and the divisor is 1010. In CRC method, what is the dividend at the transmission
before division?
Answer key ☟
5.30.1 Error Detection Correction: UGC NET CSE | June 2014 | Part 3 | Question: 57
A. B. C. D.
ugcnetjune2014iii computer-networks error-detection-correction hamming-distance
Answer key ☟
The baud rate of a signal is 600 baud/second. If each signal unit carries 6 bits, then the bit rate of a signal is
____
Answer key ☟
Answer key ☟
The minimum frame length for Mbps Ethernet is ________ bytes and maximum is _______ bytes.
A. & B. &
C. & D. &
ugcnetcse-june2014-paper2 computer-networks ethernet
Answer key ☟
5.31.4 Ethernet: UGC NET CSE | September 2013 | Part 2 | Question: 1
A file is downloaded in a home computer using 56 kbps MODEM connected to an Internet Service Provider. If
the download of the file completes in 2 minutes, what is the maximum size of the data downloaded?
Answer key ☟
What is the maximum length of CAT-5 UTP cable in Fast Ethernet network?
Answer key ☟
A _____ can forward or block packets based on the information in the network layer and transport layer header
A. Proxy firewall B. Firewall
C. Packet filter firewall D. Message digest firewall
ugcnetcse-sep2013-paper3 computer-networks firewall
Answer key ☟
5.33.1 Hamming Distance: UGC NET CSE | June 2013 | Part 3 | Question: 54
A. 3 B. 4 C. 5 D. 6
ugcnetcse-june2013-paper3 computer-networks hamming-distance
Answer key ☟
5.34.1 Huffman Code: UGC NET CSE | June 2013 | Part 3 | Question: 14
A data file of characters contains only the characters with the frequencies as indicated in table:
using the variable-length code by Huffman codes, the file can be encoded with
A. bits B. bits
C. bits D. bits
ugcnetcse-june2013-paper3 computer-networks huffman-code data-link-layer
Answer key ☟
The network is a :
Answer key ☟
Answer key ☟
A. 125.123.123.2 B. 191.023.21.54
C. 192.128.32.56 D. 10.14.12.34
ugcnetcse-dec2008-paper2 computer-networks ip-addressing
Answer key ☟
Answer key ☟
The dotted-decimal notation of the following IPV4 address in binary notation is ____
10000001 00001011 00001011 11101111
A. 111.56.45.239 B. 129.11.10.238
C. 129.11.11.239 D. 111.56.11.239
ugcnetcse-july2018-paper2 computer-networks ip-addressing
Answer key ☟
What is the correct subnet mask to use for a class- address to support Networks and also have the most
hosts possible ?
A. B.
C. D.
ugcnetcse-june2005-paper2 computer-networks ip-addressing subnetting
Answer key ☟
5.35.7 IP Addressing: UGC NET CSE | June 2012 | Part 3 | Question: 29
Answer key ☟
A network on the Internet has a subnet mask of . What is the maximum number of hosts it can
handle ?
A. B. C. D.
ugcnetjune2014iii computer-networks ip-addressing
Answer key ☟
What percentage of the IPv4, IP address space do all class C addresses consume?
A. B. C. D.
ugcnetcse-june2019-paper2 ip-addressing
Answer key ☟
Answer key ☟
The address of a class host is to be split into subnets with a – bit subnet number. What is the maximum
number of subnets and maximum number of hosts in each subnet?
Answer key ☟
Given the IP address 201.14.78.65 and the subset mask 255.255.255.224. What is the subset address?
Answer key ☟
Which of the following is the size of Network bits and Host bits of Class A of IP address?
If a packet arrive with M-bit value is ‘1’ and a fragmentation offset value ‘0’, then it is ____ fragement.
Answer key ☟
Answer key ☟
5.37.1 Internal Memory: UGC NET CSE | Junet 2015 | Part 3 | Question: 1
For the 8 bit word 00111001,the check bits stored with it would we 0111. Suppose when the word is read from
memory, the check bits are calculated to be 1101. What is the data word that was read from memory?
Answer key ☟
5.38.1 Internet Security: UGC NET CSE | July 2018 | Part 2 | Question: 47
A. Proves that she knows the secret without revealing it B. Proves that she does not know the secret
C. Reveals the secret D. Gives a challenge
ugcnetcse-july2018-paper2 computer-networks internet-security
Answer key ☟
5.39.1 Internet Stack Layers: UGC NET CSE | June 2019 | Part 2 | Question: 87
Which of the following statements is/are true with regard to various layers in the Internet stack?
P: At the link layer, a packet of transmitted information is called a frame.
Q: At the network layer, a packet of transmitted information is called a segment.
Answer key ☟
i. The fragmentation fields in the base header section of have moved to the fragmentation extension header in
.
ii. The authentication extension header is new in .
iii. The record route option is not implemented in .
Answer key ☟
5.41.1 LAN Technologies: UGC NET CSE | December 2010 | Part 2 | Question: 27
Answer key ☟
5.41.2 LAN Technologies: UGC NET CSE | January 2017 | Part 3 | Question: 25
Suppose there are N stations in a slotted LAN. Each station attempts to transmit with a probability P in each
time slot. The probability that only one station transmits in a given slot is____
A. B. C. D.
ugcnetcse-jan2017-paper3 computer-networks lan-technologies
Answer key ☟
5.42.1 Link State Routing: UGC NET CSE | January 2017 | Part 2 | Question: 30
In link state routing algorithm after construction of link state packets, new routes are computed using :
A. DES algorithm B. Dijkstra's algorithm
C. RSA algorithm D. Packets
ugcnetjan2017ii computer-networks link-state-routing
Answer key ☟
5.43.1 Loopback Address: UGC NET CSE | June 2019 | Part 2 | Question: 85
Consider the following two statements with respect to IPv4 in computer networking:
P: The loopback (IP) address is a member of class B network.
Q: The loopback (IP) address is used to send a packet from host to itself.
What can you say about the statements P and Q?
Answer key ☟
5.44.1 Mesh topology: UGC NET CSE | December 2014 | Part 3 | Question: 25
For devices in a network, ________ number of duplex-mode links are required for a mesh topology.
A. B.
C. D.
ugcnetcse-dec2014-paper3 computer-networks network-topologies mesh-topology
Answer key ☟
5.44.2 Mesh topology: UGC NET CSE | July 2016 | Part 2 | Question: 27
In a fully connected mesh network with 10 computers, total ___ number of cables are required and ____ number
od ports are required for each device
Answer key ☟
5.44.3 Mesh topology: UGC NET CSE | June 2019 | Part 2 | Question: 81
A fully connected network topology is a topology in which there is a direct link between all pairs of nodes.
Given a fully connected network with nodes, the number of direct links as a function of can be expressed as
A. B. C. D.
ugcnetcse-june2019-paper2 mesh-topology
Answer key ☟
5.45.1 Mobile Communication: UGC NET CSE | December 2012 | Part 2 | Question: 3
The GSM network is divided into the following three major systems:
A. SS, BSS, OSS B. BSS, BSC, MSC
C. CELL, BSS, OSS D. SS, CELL, MSC
ugcnetcse-dec2012-paper2 computer-networks communication mobile-communication
Answer key ☟
5.45.2 Mobile Communication: UGC NET CSE | December 2012 | Part 3 | Question: 26
A. Private data, Shared data, User data B. Public data, User data, Virtual data
C. Private data, Public data, Shared data D. Public data, Virtual data, User data
ugcnetcse-dec2012-paper3 mobile-communication computer-networks
Answer key ☟
5.45.3 Mobile Communication: UGC NET CSE | December 2012 | Part 3 | Question: 30
Answer key ☟
5.45.4 Mobile Communication: UGC NET CSE | December 2014 | Part 2 | Question: 46
Answer key ☟
5.45.5 Mobile Communication: UGC NET CSE | December 2015 | Part 2 | Question: 24
In a typical mobile phone system with hexagonal cells, it is forbidden to reuse a frequency band in adjacent
cells. If 840 frequencies are available, how many can be used in a given cell?
Answer key ☟
5.45.6 Mobile Communication: UGC NET CSE | June 2012 | Part 3 | Question: 60
Answer key ☟
5.45.7 Mobile Communication: UGC NET CSE | June 2014 | Part 2 | Question: 26
Answer key ☟
A. Frequency and phase of the carrier B. Frequency and Amplitude of the carrier
C. Amplitude and phase of the carrier D. Amplitude and Wavelength of the carrier
ugcnetcse-nov2017-paper3 computer-networks modulation physical-layer
Answer key ☟
Which of the following is an bit rate of an 8-PSK signal having 2500 Hz bandwidth?
Answer key ☟
5.47.1 Multimedia Protocol: UGC NET CSE | December 2015 | Part 3 | Question: 14
In electronic mail, which of the following protocols allows the transfer of multimedia messages?
Answer key ☟
5.48.1 Multiple Access Protocol: UGC NET CSE | August 2016 | Part 3 | Question: 28
A slotted ALOHA network transmits bits frames using a shared channel with kbps bandwidth. If the
system (all stations put together) produces frames per second, then the throughput of the system is
_______.
A. B. C. D.
ugcnetcse-aug2016-paper3 computer-networks multiple-access-protocol transmission-media
Answer key ☟
A high performance switching and multiplexing technology that utilizes fixed length packets to carry different
types of traffic is:
Answer key ☟
5.49.2 Multiplexing: UGC NET CSE | December 2010 | Part 2 | Question: 30
A. Exhibited by all demodulator, when the input signal to noise ratio is low.
B. The rapid fall on output signal to noise ratio when the input signal to noise ratio fall below a particular value.
C. The property exhibited by all A.M. suppressed carrier coherent demodulator.
D. The property exhibited by correlation receiver.
Answer key ☟
5.50.1 Network Addressing: UGC NET CSE | December 2015 | Part 3 | Question: 10
Answer key ☟
5.50.2 Network Addressing: UGC NET CSE | December 2015 | Part 3 | Question: 13
Answer key ☟
5.51.1 Network Layer: UGC NET CSE | December 2015 | Part 2 | Question: 40
Answer key ☟
5.52.1 Network Layering: UGC NET CSE | December 2012 | Part 2 | Question: 17
Answer key ☟
5.52.2 Network Layering: UGC NET CSE | December 2013 | Part 3 | Question: 45
Which layer of OSI reference model is responsible for decomposition of messages and generation of sequence
numbers to ensure correct re-composition from end to end of the network?
Answer key ☟
5.52.3 Network Layering: UGC NET CSE | June 2012 | Part 2 | Question: 15
Decryption and encryption of data are responsibility of which of the following layer?
A. Physical layer B. Data link layer
C. Presentation layer D. Session layer
ugcnetcse-june2012-paper2 computer-networks network-layering
Answer key ☟
5.52.4 Network Layering: UGC NET CSE | June 2012 | Part 2 | Question: 6
Both hosts and routers and TCP/IP protocol software. However, routers do not use protocol from all layers. The
layer for which the protocol software is not needed by a router is
Answer key ☟
5.52.5 Network Layering: UGC NET CSE | June 2014 | Part 2 | Question: 05
A. B.
C. D.
ugcnetcse-june2014-paper2 computer-networks network-layering
Answer key ☟
5.53.1 Network Protocols: UGC NET CSE | August 2016 | Part 2 | Question: 30
Which of the following protocols is used by email server to maintain a central repository that can be accessed
from any machine ?
A. B. C. D.
ugcnetcse-aug2016-paper2 computer-networks network-protocols
Answer key ☟
5.53.2 Network Protocols: UGC NET CSE | August 2016 | Part 3 | Question: 26
Answer key ☟
5.53.3 Network Protocols: UGC NET CSE | December 2010 | Part 2 | Question: 29
Which of the following file transfer protocols use and establishes two virtual circuits between the local
and remote server ?
A. B. C. D.
ugcnetcse-dec2010-paper2 computer-networks network-protocols
Answer key ☟
5.53.4 Network Protocols: UGC NET CSE | December 2012 | Part 2 | Question: 8
The Mobile Application Protocol (MAP) typically runs on top of which protocol?
A. SNMP (Simple Network Management Protocol) B. SMTP (Simple Mail Transfer Protocol)
C. SS7 (Signalling System 7) D. HTTP (Hyper Text Transfer Protocol)
ugcnetcse-dec2012-paper2 computer-networks network-protocols
Answer key ☟
5.53.5 Network Protocols: UGC NET CSE | June 2010 | Part 2 | Question: 26
The ______ field is the SNMP PDV reports an error in a response message.
Answer key ☟
5.53.6 Network Protocols: UGC NET CSE | October 2020 | Part 2 | Question: 33
Protocols in which the sender sends one frame and then waits for an acknowledgment before proceeding for next
frame are called as ______
A. Simplex protocols B. Unrestricted simplex protocols
C. Simplex stop and wait protocols D. Restricted simplex protocols
ugcnetcse-oct2020-paper2 computer-networks network-protocols
Answer key ☟
5.53.7 Network Protocols: UGC NET CSE | October 2020 | Part 2 | Question: 59
Post office protocol (POP) is a message access protocol which is used to extract message for client. In this
regards, which of the following are true?
Answer key ☟
5.53.8 Network Protocols: UGC NET CSE | October 2020 | Part 2 | Question: 72
Match with
Answer key ☟
5.53.9 Network Protocols: UGC NET CSE | September 2013 | Part 2 | Question: 42
Answer key ☟
5.53.10 Network Protocols: UGC NET CSE | September 2013 | Part 3 | Question: 11
Codes:
A. B.
C. D.
ugcnetcse-sep2013-paper3 computer-networks network-protocols
Answer key ☟
5.54.1 Network Security: UGC NET CSE | August 2016 | Part 2 | Question: 46
An attacker sits between the sender and receiver and captures the information and retransmits to the receiver
after some time without altering the information. This attack is called as _____.
Answer key ☟
5.54.2 Network Security: UGC NET CSE | December 2010 | Part 2 | Question: 20
Which of the following is the process by which a user’s access to physical data in the application is limited,
based on his privileges?
A. Authorization B. Authentication
C. Access Control D. All of these
ugcnetcse-dec2010-paper2 computer-networks network-security
Answer key ☟
5.54.3 Network Security: UGC NET CSE | December 2012 | Part 2 | Question: 37
AES is a round cipher based on the Rijndal Algorithm that uses a 128 – bit block of data. AES has three
different configurations. ______ rounds with a key size of 128-bits, ______ rounds with a key size of 192 bits
and ______ rounds with a key size of 256 –bits
Answer key ☟
5.54.4 Network Security: UGC NET CSE | December 2012 | Part 3 | Question: 72
Answer key ☟
5.54.5 Network Security: UGC NET CSE | December 2012 | Part 3 | Question: 8
Using RSA algorithm, what is the value of cipher text C, if the plain text M=5 and p=3, q=11 and d=7?
A. 33 B. 5 C. 25 D. 26
ugcnetcse-dec2012-paper3 computer-networks network-security
Answer key ☟
5.54.6 Network Security: UGC NET CSE | December 2015 | Part 2 | Question: 25
Using p=3, q=13, d=7 and e=3 in the RSA algorithm, what is the value of ciphertext for a plain text 5?
A. 13 B. 21 C. 26 D. 33
ugcnetcse-dec2015-paper2 computer-networks network-security
Answer key ☟
5.54.7 Network Security: UGC NET CSE | December 2018 | Part 2 | Question: 66
Answer key ☟
5.54.8 Network Security: UGC NET CSE | December 2018 | Part 2 | Question: 90
Suppose that everyone in a group of people wants to communicate secretly with other people using
symmetric key cryptographic system. The communication between any two persons should not be decodable by
the others in the group. The number of keys required in the system as a whole to satisfy the confidentiality requirement
is
A. B. C. D.
Answer key ☟
5.54.9 Network Security: UGC NET CSE | July 2016 | Part 2 | Question: 29
If there are people in the world and are using secret key encryption and decryption for privacy purpose, then
the number of secret keys required will be
A. B. C. D.
ugcnetcse-july2016-paper2 computer-networks network-security
Answer key ☟
5.54.10 Network Security: UGC NET CSE | July 2016 | Part 2 | Question: 46
An attacker sits between customer and banker and captures the information from the customer and retransmits
to the banker by altering the information . This attack is called as
A. Masquerade attack B. Replay attack
C. Passive attack D. Denial of service attack
ugcnetcse-july2016-paper2 computer-networks network-security
Answer key ☟
5.54.11 Network Security: UGC NET CSE | July 2016 | Part 3 | Question: 30
Encrypt the plain text message using Transposition cipher technique with the following key :
A. B. C. D.
ugcnetcse-july2016-paper3 computer-networks network-security
Answer key ☟
5.54.12 Network Security: UGC NET CSE | June 2009 | Part 2 | Question: 48
After sending a message, the sender should not be able to, at a later date, deny having sent the message, is
referred to as :
A. Authenticity
B. Non-Repudiability
C. Auditability
D. Repudiability
ugcnetcse-june2009-paper2 network-security
Answer key ☟
5.54.13 Network Security: UGC NET CSE | June 2010 | Part 2 | Question: 5
For your ATM debit card, you have a -decimal-digit personal secret code. In the absence of any clue, a brute-
force attack takes time- to crack the code on an ATM terminal. Therefore is the secure-time for a customer
to report in case the card is misplaced. Your Bank has decided to facilitate an increased secure-time. Out of the
following, which option should provide the largest rise in the value of ?
Answer key ☟
5.54.14 Network Security: UGC NET CSE | June 2014 | Part 2 | Question: 30
SET, an open encryption and security specification model that is designed for protecting credit card transactions
on the internet, stands for
Answer key ☟
5.54.15 Network Security: UGC NET CSE | June 2019 | Part 2 | Question: 89
The ability to inject packets into the Internet with a false source address is known as
A. Man-in-the-middle attack B. IP phishing
C. IP sniffing D. IP spoofing
ugcnetcse-june2019-paper2 network-security
Answer key ☟
5.54.16 Network Security: UGC NET CSE | Junet 2015 | Part 3 | Question: 27
Answer key ☟
5.54.17 Network Security: UGC NET CSE | Junet 2015 | Part 3 | Question: 28
A message "COMPUTERNETWORK" encrypted (ignore quotes) using columnar transposition cipher with a
key "LAYER". The encrypted message is
A. CTTOEWMROPNRUEK B. MROUEKCTTPNROEW
C. OEWPNRCTTUEKMRO D. UEKPNRMROOEQCTT
ugcnetcse-june2015-paper3 computer-networks network-security
Answer key ☟
5.54.18 Network Security: UGC NET CSE | October 2020 | Part 2 | Question: 89
Answer key ☟
5.55.1 Network Switching: UGC NET CSE | August 2016 | Part 3 | Question: 25
Suppose transmission rate of a channel is kbps. If there are routes from source to destination and each
packet contains bits. Total end to end delay in sending packet is _____.
Answer key ☟
5.55.2 Network Switching: UGC NET CSE | December 2011 | Part 2 | Question: 10
Which of the following network access standard disassembler is used for connection station to a packet switched
network ?
A. B. C. D.
ugcnetcse-dec2011-paper2 computer-networks network-switching
Answer key ☟
5.55.3 Network Switching: UGC NET CSE | January 2017 | Part 3 | Question: 28
In a packet switching network, if the message size is 48 bytes and each packet contains a header of 3 bytes. If 24
packets are required to transmit the message, the packet size is
Answer key ☟
5.55.4 Network Switching: UGC NET CSE | July 2018 | Part 2 | Question: 46
A. only B. only
C. only D. only
ugcnetcse-july2018-paper2 computer-networks network-switching
Answer key ☟
5.55.5 Network Switching: UGC NET CSE | June 2012 | Part 2 | Question: 16
In which circuit switching, delivery of data is delayed because data must be stored and retrieved from RAM?
A. Space division B. Time division C. Virtual D. Packet
ugcnetcse-june2012-paper2 computer-networks network-switching
Answer key ☟
5.56.1 Network topologies: UGC NET CSE | December 2009 | Part 2 | Question: 29
(A) Modulation
(B) Polling
(C) Segmentation
5.56.2 Network topologies: UGC NET CSE | December 2009 | Part 2 | Question: 46
Answer key ☟
5.56.3 Network topologies: UGC NET CSE | December 2011 | Part 2 | Question: 8
Answer key ☟
5.56.4 Network topologies: UGC NET CSE | June 2013 | Part 3 | Question: 16
In a fully connected mesh network with n devices, there are _____ physical channels to link all devices.
Answer key ☟
5.57.1 Osi Model: UGC NET CSE | August 2016 | Part 2 | Question: 29
Answer key ☟
5.57.2 Osi Model: UGC NET CSE | December 2008 | Part 2 | Question: 17
A. Network layer
B. Physical layer
C. Presentation layer
D. Application layer
Answer key ☟
5.57.3 Osi Model: UGC NET CSE | December 2008 | Part 2 | Question: 18
A. Both (A) and (R) are true and (R) is the correct explanation for (A)
B. Both (A) and (R) are true but (R) is not the correct explanation
C. (A) is true but (R) is false
D. (A) is false but (R) is true
Answer key ☟
5.57.4 Osi Model: UGC NET CSE | December 2008 | Part 2 | Question: 6
A. Physical layer
B. Presentation layer
C. Network layer
D. Application layer
Answer key ☟
5.57.5 Osi Model: UGC NET CSE | December 2012 | Part 2 | Question: 43
Answer key ☟
5.57.6 Osi Model: UGC NET CSE | December 2013 | Part 2 | Question: 1
When data and acknowledgement are sent in same frame, this is called as
A. Piggy packing B. Piggy backing
C. Back packing D. Good packing
ugcnetcse-dec2013-paper2 computer-networks osi-model
Answer key ☟
5.57.7 Osi Model: UGC NET CSE | December 2013 | Part 2 | Question: 2
Answer key ☟
5.57.8 Osi Model: UGC NET CSE | June 2010 | Part 2 | Question: 28
Answer key ☟
5.57.9 Osi Model: UGC NET CSE | June 2010 | Part 2 | Question: 29
A. B. C. D.
ugcnetcse-june2010-paper2 computer-networks osi-model
Answer key ☟
5.57.10 Osi Model: UGC NET CSE | June 2013 | Part 3 | Question: 18
A. B.
C. D.
ugcnetcse-june2013-paper3 computer-networks osi-model
Answer key ☟
5.57.11 Osi Model: UGC NET CSE | June 2014 | Part 3 | Question: 70
Answer key ☟
5.58.1 Osi Protocol: UGC NET CSE | December 2012 | Part 3 | Question: 10
A. B.
C. D.
ugcnetcse-dec2012-paper3 computer-networks osi-protocol
Answer key ☟
5.58.2 Osi Protocol: UGC NET CSE | January 2017 | Part 2 | Question: 26
Match the following Layers and Protocols for a user browsing with
A. B.
C. D.
ugcnetjan2017ii computer-networks osi-protocol
Answer key ☟
5.58.3 Osi Protocol: UGC NET CSE | June 2012 | Part 3 | Question: 11
Answer key ☟
5.58.4 Osi Protocol: UGC NET CSE | June 2012 | Part 3 | Question: 41
Which layer of OSI reference model uses the ICMP (Internet Control Message Protocol)?
Answer key ☟
5.58.5 Osi Protocol: UGC NET CSE | Junet 2015 | Part 2 | Question: 26
Which of the following protocols is an application layer protocol that establishes, manages and terminates
multimedia sessions?
A. Session Maintenance Protocol B. Real-time Streaming Protocol
C. Real-time Transport Control Protocol D. Session Initiation Protocol
ugcnetcse-june2015-paper2 osi-protocol computer-networks
Answer key ☟
5.59.1 Physical Layer: UGC NET CSE | December 2010 | Part 2 | Question: 28
Answer key ☟
5.59.2 Physical Layer: UGC NET CSE | December 2013 | Part 2 | Question: 3
An analog signal carries 4 bits in each signal unit. If 1000 signal units are sent per second, then baud rate and bit
rate of the signal are _____ and _____
A. 4000 bauds/sec & 1000 bps B. 2000 bauds/sec & 1000 bps
C. 1000 bauds/sec & 500 bps D. 1000 bauds/sec & 4000 bps
ugcnetcse-dec2013-paper2 computer-networks osi-model physical-layer
Answer key ☟
5.59.3 Physical Layer: UGC NET CSE | July 2018 | Part 2 | Question: 42
Answer key ☟
5.59.4 Physical Layer: UGC NET CSE | June 2013 | Part 3 | Question: 21
Answer key ☟
5.60.1 Port Numbers: UGC NET CSE | Junet 2015 | Part 2 | Question: 27
Answer key ☟
5.61.1 Propagation Delay: UGC NET CSE | June 2019 | Part 2 | Question: 83
You are designing a link layer protocol for a link with bandwidth of Gbps ( bits/second) over a fiber link
with length of km. Assume the speed of light in this medium is km/second. What is the propagation
delay in this link?
A. millisecond B. milliseconds
C. milliseconds D. milliseconds
ugcnetcse-june2019-paper2 propagation-delay
Answer key ☟
5.62.1 Propagation Time: UGC NET CSE | December 2014 | Part 3 | Question: 28
What is the propagation time if the distance between the two points is ? Assume the propagation speed to
be metre/second in cable.
A. ms B. ms C. ms D. ms
ugcnetcse-dec2014-paper3 computer-networks propagation-time
Answer key ☟
A. B.
C. D.
ugcnetcse-dec2014-paper2 computer-networks protocol
Answer key ☟
5.64.1 Rarp Protocol: UGC NET CSE | June 2019 | Part 2 | Question: 82
What is the name of the protocol that allows a client to send a broadcast message with its MAC address and
receive an IP address in reply?
5.65.1 Routers Bridge Hubs Switches: UGC NET CSE | June 2009 | Part 2 | Question: 49
The device which connects dissimilar of different topologies using different sets of communication
protocols so that information can flow from one to another is called :
A. Router
B. Bridge
C. Gateway
D. Switch
Answer key ☟
5.65.2 Routers Bridge Hubs Switches: UGC NET CSE | June 2014 | Part 2 | Question: 02
Answer key ☟
A station in a network in a network forward incoming packets by placing them on its shortest output queue.
What routing algorithm is being used ?
Answer key ☟
Consider a subnet with routers. If a three level hierarchy is chosen with clusters, each containing regions
of routers, then total number of entries in the routing table is _______
A. B. C. D.
computer-networks routing ugcnetcse-dec2015-paper3
Answer key ☟
Answer key ☟
Answer key ☟
5.67.1 Routing Algorithm: UGC NET CSE | December 2008 | Part 2 | Question: 19
Answer key ☟
5.67.2 Routing Algorithm: UGC NET CSE | December 2014 | Part 2 | Question: 28
Answer key ☟
5.67.3 Routing Algorithm: UGC NET CSE | September 2013 | Part 2 | Question: 6
Answer key ☟
Using data p=3, q=11, n=pq, d=7 in RSA algorithm find the cipher text of the given plain text SUZANNE
Answer key ☟
5.69.1 Rsa Public Key: UGC NET CSE | December 2013 | Part 2 | Question: 5
Using the RSA public key crypto system, if p=13, q=31 and d=7, then the value of e is
Answer key ☟
In RSA public key cryptosystem suppose where and are primes. and are public and
private keys respectively. Let be an integer such that and .
Which of the following equations represent RSA public key cryptosystem?
I.
II.
III.
IV.
Answer key ☟
5.70.2 Rsa Security Networks: UGC NET CSE | June 2019 | Part 2 | Question: 90
The RSA encryption algorithm also works in reverse, that is, you can encrypt a message with the private key and
decrypt it using the public key. This property is used in
Answer key ☟
5.71.1 Session Layer: UGC NET CSE | Junet 2015 | Part 2 | Question: 28
Answer key ☟
Answer key ☟
The ______ measure the relative strengths of two signals or a signal at two different points.
A. frequency B. attenuation C. throughput D. decibel
ugcnetcse-june2013-paper3 computer-networks signals
Answer key ☟
5.74.1 Sliding Window: UGC NET CSE | December 2009 | Part 2 | Question: 27
What is the maximum window size in sliding window protocol used in a computer
network ?
(A) 4
(B) 8
(C) 15
(D) 16
ugcnetcse-dec2009-paper2 computer-networks sliding-window
Answer key ☟
5.74.2 Sliding Window: UGC NET CSE | December 2012 | Part 3 | Question: 4
The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next
outgoing data frame is known as
Answer key ☟
5.74.3 Sliding Window: UGC NET CSE | January 2017 | Part 3 | Question: 26
Station uses byte packets t transmit messages to station using sliding window protocol. The round trip
delay between and is milliseconds and the bottleneck bandwidth on the path between and is
kbps. The optimal window size of is
A. B. C. D.
ugcnetcse-jan2017-paper3 computer-networks sliding-window
Answer key ☟
5.74.4 Sliding Window: UGC NET CSE | June 2014 | Part 3 | Question: 72
Four bits are used for packed sequence numbering in a slinding window protocol used in a computer network.
What is the maximum window size?
A. 4 B. 8 C. 15 D. 16
ugcnetjune2014iii computer-networks sliding-window
Answer key ☟
5.75.1 Slotted Aloha: UGC NET CSE | July 2018 | Part 2 | Question: 41
A slotted ALOHA network transmits 200-bit frames using a shared channel with a 200 Kbps bandwidth. Find
the throughput of the system (all stations put together) produces 250 frames per second:
Answer key ☟
An Internet Service Provider has following chunk of based addresses available with it :
. The wants to give half of this chunk addresses to organization and a quarter to
organization while retaining the remaining with itself. Which of the following is a valid allocation of addresses to
and ?
A. B.
C. D.
ugcnetcse-dec2018-paper2 computer-networks subnetting
You need subnets, each with about usable host address per subnet. What network mask will you assign
using a class B network address?
A. B.
C. D.
ugcnetcse-june2019-paper2 subnetting
Answer key ☟
A packet whose destination is outside the local network segment is sent to ________.
Answer key ☟
Which one of the following control fields in TCP header is used to specify whether the sender has no more data
to transmit?
Answer key ☟
Answer key ☟
Which of the following field of the TCP header tells how many bytes may be sent starting at the byte
acknowledged?
Answer key ☟
5.78.1 TCP Header: UGC NET CSE | December 2014 | Part 3 | Question: 27
Answer key ☟
5.79.1 TCP IP Model: UGC NET CSE | July 2016 | Part 2 | Question: 28
In TCP/IP reference model, the job of ____ layer is to permit hosts to inject packets into any network and travel
them independently to the destination
Answer key ☟
5.80.1 TCP IP Suit Protocols: UGC NET CSE | December 2012 | Part 3 | Question: 22
Which provides an interface to the TCP/IP suit protocols in Windows 95 and Windows NT?
Answer key ☟
5.81.1 Tele Communication: UGC NET CSE | Junet 2015 | Part 3 | Question: 25
Which transmission technique guarantees that data packets will be received by the receiver in the same order in
which they were sent by the sender?
A. Broadcasting B. Unicasting
C. Packet switching D. Circuit switching
ugcnetcse-june2015-paper3 computer-networks data-communication tele-communication
Answer key ☟
5.82.1 Token Bucket: UGC NET CSE | January 2017 | Part 3 | Question: 30
A node on a Mbps network is regulated by a token bucket. The token bucket is filled at a rate of Mbps.
Token bucket is initially filled with megabits. The maximum duration taken by to transmit at full rate of
Mbps is ______secs.
A. B. C. D.
ugcnetcse-jan2017-paper3 computer-networks token-bucket
Answer key ☟
5.83 Transmission Media (9)
5.83.1 Transmission Media: UGC NET CSE | August 2016 | Part 2 | Question: 26
Answer key ☟
5.83.2 Transmission Media: UGC NET CSE | August 2016 | Part 2 | Question: 27
In a fast Ethernet cabling, Base- uses ______ cable and maximum segment size is ______.
Answer key ☟
5.83.3 Transmission Media: UGC NET CSE | August 2016 | Part 2 | Question: 28
A network with bandwidth of Mbps can pass only an average of frames per minute with each frame
carrying an average of bits. What is the throughput of this network ?
Answer key ☟
5.83.4 Transmission Media: UGC NET CSE | August 2016 | Part 3 | Question: 29
An analog signal has a bit rate of bps and a baud rate of . Then analog signal has _____ signal elements
and carry _____ data elements in each signal.
Answer key ☟
5.83.5 Transmission Media: UGC NET CSE | December 2008 | Part 2 | Question: 10
Transmission of N signals, each band limited to fm Hz by TDM, requires a minimum band-width of:
A. fm
B. 2 fm
C. N fm
D. 2N fm
Answer key ☟
5.83.6 Transmission Media: UGC NET CSE | December 2008 | Part 2 | Question: 7
1. bytes long
2. bytes long
3. bytes long
4. bytes long
Answer key ☟
5.83.7 Transmission Media: UGC NET CSE | December 2010 | Part 2 | Question: 26
Answer key ☟
5.83.8 Transmission Media: UGC NET CSE | December 2012 | Part 2 | Question: 23
Coaxial cables are categorized by Radio Government rating are adapted for specialized functions. Category RG-
59 with impedance 75 used for
Answer key ☟
5.83.9 Transmission Media: UGC NET CSE | July 2016 | Part 2 | Question: 30
Optical fiber uses reflection to guide light through a channel, in which angle of incidence is ____ the critical
angle
A. equal to B. less than
C. greater than D. less than or equal to
ugcnetcse-july2016-paper2 computer-networks transmission-media
Answer key ☟
5.84.1 Unguided Media: UGC NET CSE | December 2013 | Part 2 | Question: 4
Answer key ☟
(A) Wi-Max
(C) Wi-Fi
(D) 802.11 g
ugcnetcse-dec2009-paper2 computer-networks wifi
Answer key ☟
5.86.1 Wireless Communication: UGC NET CSE | June 2012 | Part 2 | Question: 28
Answer key ☟
5.87.1 Wireless Lan: UGC NET CSE | December 2009 | Part 2 | Question: 48
(A) MMDS
(B) ATM
(C) LMDS
(D) CDMA
ugcnetcse-dec2009-paper2 computer-networks wireless-lan
Answer key ☟
5.87.2 Wireless Lan: UGC NET CSE | December 2009 | Part 2 | Question: 50
The unlicensed National Information Infrastructure band operates at the _________ frequency
(B) 5 GHz
(C) 33 MHz
(D) 5 MHz
ugcnetcse-dec2009-paper2 computer-networks wireless-lan
Answer key ☟
5.87.3 Wireless Lan: UGC NET CSE | December 2015 | Part 2 | Question: 21
Which of the following services is not provided by wireless access point in 802.11 WLAN?
A. Association B. Disassociation
C. Error correction D. Integration
ugcnetcse-dec2015-paper2 computer-networks wireless-lan
Answer key ☟
5.87.4 Wireless Lan: UGC NET CSE | June 2010 | Part 2 | Question: 30
What is the maximum operating rate of a wireless LAN using infrared communication ?
5.88.1 Wireless Networks: UGC NET CSE | December 2008 | Part 2 | Question: 47
A. Both (A) and (R) are true and (R) is the correct explanation for (A)
B. (B) Both (A) and (R) are true but (R) is not the correct explanation
C. (A) is true but (R) is false
D. (A) is false but (R) is true
5.89.1 Wireless Protocol: UGC NET CSE | December 2013 | Part 2 | Question: 42
A. B.
C. D.
ugcnetcse-dec2013-paper2 computer-networks wireless-protocol
Answer key ☟
5.90.1 Wireless Transmission: UGC NET CSE | June 2012 | Part 3 | Question: 66
If the period of a signal is 1000 ms, then what is its frequency in kiliohertz?
Answer key ☟
Answer Keys
5.0.1 B 5.0.2 D 5.0.3 A 5.0.4 D 5.0.5 X
5.0.6 D 5.0.7 B 5.0.8 C 5.0.9 B 5.0.10 B
5.0.11 B 5.0.12 D 5.0.13 C 5.0.14 B 5.0.15 A
5.0.16 D 5.0.17 B 5.0.18 C 5.0.19 C 5.0.20 D
5.0.21 B 5.0.22 Q-Q 5.0.23 Q-Q 5.0.24 D 5.0.25 Q-Q
5.0.26 Q-Q 5.0.27 Q-Q 5.0.28 B 5.0.29 D 5.0.30 Q-Q
5.0.31 Q-Q 5.0.32 Q-Q 5.0.33 Q-Q 5.0.34 Q-Q 5.0.35 Q-Q
5.0.36 Q-Q 5.0.37 Q-Q 5.0.38 Q-Q 5.0.39 Q-Q 5.0.40 Q-Q
Answer key ☟
6.1.1 Data Cube: UGC NET CSE | December 2015 | Part 2 | Question: 31
A data cube has dimensions, and each dimensions has exactly distinct values in the base cuboid. Assume
that there are no concept hierarchies associated with the dimensions. What is the maximum number of cells
possible in the data cube,
A. B. C. D.
ugcnetcse-dec2015-paper2 data-cube data-modelling
Answer key ☟
6.2.1 Data Mining: UGC NET CSE | October 2020 | Part 2 | Question: 35
The process of removing details from a given state representation is called _____
Answer key ☟
6.3.1 Data Mining and Warehousing: UGC NET CSE | December 2015 | Part 2 | Question: 34
____ allows selection of the relevant information necessary for the data warehouse:
A. The Top-Down View B. Data Warehouse View
C. Datasource View D. Business Query View
ugcnetcse-dec2015-paper2 data-warehousing data-mining-and-warehousing
Answer key ☟
6.4.1 Decision Tree: UGC NET CSE | September 2013 | Part 2 | Question: 40
Answer key ☟
A. B.
C. D.
ugcnetcse-dec2014-paper3 artificial-intelligence expert-system
Answer key ☟
6.6.1 Fuzzy Set: UGC NET CSE | June 2012 | Part 3 | Question: 6
A. B.
C. D.
ugcnetcse-june2012-paper3 fuzzy-set
Answer key ☟
6.7.1 Group Decision Support System: UGC NET CSE | August 2016 | Part 3 | Question: 73
Answer key ☟
6.8.1 K Means Clustering: UGC NET CSE | October 2020 | Part 2 | Question: 83
Statement I: If and have correlation of the cluster centroid will be in straight line
Statement II: If and have correlation of the cluster centroid will be in straight line
In the light of the above statements, choose the correct answer from the options given below
ugcnetcse-oct2020-paper2 k-means-clustering
Answer key ☟
6.9.1 Knowledge Representation: UGC NET CSE | December 2013 | Part 3 | Question: 23
High level knowledge which relates to the use of sentences in different contexts and how the context affect the
meaning of the sentences?
Answer key ☟
6.9.2 Knowledge Representation: UGC NET CSE | December 2014 | Part 3 | Question: 58
A. B.
C. D.
ugcnetcse-dec2014-paper3 artificial-intelligence knowledge-representation
6.9.3 Knowledge Representation: UGC NET CSE | June 2010 | Part 2 | Question: 2
' is a robot of ’ means can perform some of the tasks that otherwise would do and is unable to
do anything else.Which of the following is the most appropriate representation to model this situation?
A.
B.
C.
D. None of these
Which of the following is a knowledge representation technique used to represent knowledge about stereotype
situation?
Answer key ☟
6.9.5 Knowledge Representation: UGC NET CSE | June 2014 | Part 3 | Question: 08
A.
B.
C.
D.
Answer key ☟
6.10.1 Non Gatecse: UGC NET CSE | January 2017 | Part 3 | Question: 56
A. A B. B C. C D. B and C
ugcnetcse-jan2017-paper3 non-gatecse
Answer key ☟
____ system is market oriented and is used for data analysis by knowledge workers including Managers,
Executives adn Analysts.
Answer key ☟
Answer key ☟
Answer Keys
6.0.1 Q-Q 6.1.1 D 6.2.1 D 6.3.1 A 6.4.1 A
6.5.1 B 6.6.1 X 6.7.1 Q-Q 6.8.1 C 6.9.1 D
6.9.2 B 6.9.3 Q-Q 6.9.4 C 6.9.5 D 6.10.1 A
6.11.1 B 6.12.1 D
7 Databases (180)
Manager’s salary details are hidden from the employee. This is called as
Answer key ☟
A. B.
C. D.
ugcnetcse-june2014-paper2 databases
Answer key ☟
In multiuser database if two users wish to update the same record at the same time, they are prevented from
doing so by
Answer key ☟
The problem that occurs when one transaction updates a database item and the transaction fails for some reason
is
Answer key ☟
The User Work Area (UWA) is a set of Program variables declared in the host program to communicate the
contents of individual records between
A. DBMS and the Host record B. Host program and the Host record
C. Host program and DBMS D. Host program and Host language
ugcnetcse-dec2012-paper2 databases
Answer key ☟
7.0.6 UGC NET CSE | June 2013 | Part 3 | Question: 47
Answer key ☟
GO BOTTOM and SKIP-3 commands are given one after another in a database file of 30 records. It shifts the
control to
Answer key ☟
A. B.
C. D.
ugcnetcse-dec2013-paper3 databases
Answer key ☟
A. B.
C. D.
ugcnetcse-dec2015-paper2 databases match-the-following
Answer key ☟
A. A specific concrete object with a defined set of processes (e.g. Jatin with diabetes)
B. A value given to a particular attribute (e.g. height - 230 cm)
C. A thing that we wish to collect data about zero or more, possibly real world examples of it may exist
D. A template for a group of things with the same set of characteristics that may exist in the real world
ugcnetcse-dec2015-paper2 databases
Answer key ☟
A data which improves the performance and accessibility of the database are called:
Answer key ☟
Which of the following statement(s) is/are FALSE in the context of Relational DBMS?
I. Views in a database system are important because they with access control by aloowing users to see only a
particular subset of the data in the databse
II. E-R diagrams are useful to logically model concepts
III. An update anamoly is when it is not possible to store information unless some other, unrelated information is stored
as well
IV. SQL is a procedural language
A. I and IV only B. III and IV only C. I, II and III only D. II, III and IV only
ugcnetcse-july2016-paper2 databases
Answer key ☟
Answer key ☟
Answer key ☟
7.0.15 UGC NET CSE | August 2016 | Part 3 | Question: 12
Which one of the following pairs is correctly matched in the context of database design ?
Codes :
Answer key ☟
(i) includes a query language based on both relation algebra and tuple calculus
(ii) includes a query language based on tuple calculus
(iii) includes a query language based on relational algebra
(iv) includes a query language based on none of the relational algebra and tuple calculus
Which one is correct ?
A. (i) only
B. (ii) only
C. (iii) only
D. (iv) only
ugcnetcse-june2009-paper2
Answer key ☟
Which construct in SQL is used to test whether a subquery has any tuples in its result ?
A. UNIQUE
B. EXISTS
C. GROUP BY
D. EXCEPT
ugcnetcse-june2009-paper2
Answer key ☟
ORACLE supports :
A. inner join and outer join only
B. outer join and semi join only
C. inner join, outer join , semi join only
D. inner join, outer join, semi join and anti join
ugcnetcse-june2009-paper2
Answer key ☟
Database systems that store each relation in a separate operating system file may use the operating system's
authorization scheme, instead of defining a special scheme themselves. In this case, which of the following is
false?
ugcnetcse-july2018-paper2 databases
Answer key ☟
The entity type on which the __________ type depends is called the identifying owner.
Answer key ☟
Answer key ☟
A. Top - down B. Bottom - up C. Both (A) and (B) D. None of the above
ugcnetcse-dec2004-paper2
Answer key ☟
i. Entities
ii. The relationship among entities
iii. The attributes of the entities
Then
A. (i) and (iii) B. (i) and (ii) C. (ii) and (iii) D. None of the above
ugcnetcse-dec2004-paper2
Answer key ☟
ugcnetcse-dec2006-paper2
Answer key ☟
A. All the updates are done first but the entries are made in the log file later
B. All the log files entries are made first but the actual updates are done later
C. Every update is done first followed by a writing on the log file
D. Changes in the views are deferred till a query asks for a view
ugcnetcse-dec2006-paper2
Answer key ☟
ugcnetcse-dec2007-paper2
Answer key ☟
Answer key ☟
7.0.28 UGC NET CSE | December 2007 | Part 2 | Question: 17
Answer key ☟
Answer key ☟
Aggregation is :
Answer key ☟
A. Aggregation is a strong type of association between two classes with full ownership
B. Aggregation is a strong type of association between two classes with partial ownership
C. Aggregation is a weak type of association between two classes with partial ownership
D. Aggregation is a weak type of association between two classes with full ownership
Answer key ☟
A.
B.
C.
D.
Answer key ☟
The upper bound and lower bound for the number of leaves in a B-tree of degree with height is given by :
A. and B. and
C. and D. and
ugcnetcse-june2014-paper2 databases b-tree
Answer key ☟
The order of a leaf node in a tree is the maximum number of children it can have. Suppose that block size is
kilobytes, the child pointer takes bytes long and search field value takes bytes long. The order of the leaf
node is _________.
A. B. C. D.
ugcnetjan2017ii databases b+tree
Answer key ☟
bcnf-decomposition
7.5.1 Candidate Key: UGC NET CSE | January 2017 | Part 3 | Question: 8
Answer key ☟
7.5.2 Candidate Key: UGC NET CSE | July 2016 | Part 2 | Question: 20
Consider the following database table having and as its four attributes and four possible candidate
keys for this table :
If different symbols stand for different values in the table is definitely not equal to then which of the above
could not be the candidate key for the database table?
Answer key ☟
7.5.3 Candidate Key: UGC NET CSE | June 2019 | Part 2 | Question: 35
Which of the following key constraints is required for functioning of foreign key in the context relational
databases?
Answer key ☟
7.5.4 Candidate Key: UGC NET CSE | June 2019 | Part 2 | Question: 36
In relational database management, which of the following is/are property/properties of candidate key?
P: Uniqueness
Q: Irreducibility
Answer key ☟
7.6.1 Cardinality Ratio: UGC NET CSE | December 2013 | Part 2 | Question: 14
Based on the cardinality ratio and participation ______ associated with a relationship type, choose either the
Foreign Key Design, the Cross Referencing Design or Mutual Referencing Design.
Answer key ☟
If else is required in :
A. circular queue
B. linear queue
C. stack
D. deque
Answer key ☟
7.8.1 Concurrency Control Protocols: UGC NET CSE | December 2009 | Part 2 | Question: 20
Answer key ☟
7.9.1 Conflict Serializable: UGC NET CSE | July 2018 | Part 2 | Question: 65
Answer key ☟
Answer key ☟
7.11.1 Data Dependency: UGC NET CSE | December 2006 | Part 2 | Question: 18
Answer key ☟
7.11.2 Data Dependency: UGC NET CSE | October 2020 | Part 2 | Question: 14
A.
B.
C.
D.
Answer key ☟
7.12.1 Data Integrity: UGC NET CSE | December 2013 | Part 2 | Question: 15
Answer key ☟
7.13.1 Data Mining: UGC NET CSE | December 2009 | Part 2 | Question: 47
(A) OLTP
(B) OLAP
(C) OLDP
(D) OLPP
ugcnetcse-dec2009-paper2 databases data-mining
Answer key ☟
7.13.2 Data Mining: UGC NET CSE | January 2017 | Part 2 | Question: 47
__________ refers loosely to the process of semi-automatically analyzing large databases to find useful
patterns.
Answer key ☟
7.14.1 Data Model: UGC NET CSE | June 2012 | Part 3 | Question: 8, UGCNET-Dec2012-III: 59
Which level of abstraction describes what data are stored in the database?
Answer key ☟
7.14.2 Data Model: UGC NET CSE | September 2013 | Part 2 | Question: 39
Views are useful for ____ unwanted information, and for collecting together information from more than one
relation into a single view.
Answer key ☟
7.15.1 Database Constraints: UGC NET CSE | December 2013 | Part 2 | Question: 11
Answer key ☟
7.16.1 Database Design: UGC NET CSE | December 2005 | Part 2 | Question: 18
7.16.2 Database Design: UGC NET CSE | January 2017 | Part 2 | Question: 16
An attribute of datatype varchar has value 'Ram' and the attribute of datatype char has value
'Sita' in oracle. The attribute has ________ memory spaces and has _______ memory spaces.
A. B. C. D.
ugcnetjan2017ii databases database-design
Answer key ☟
7.17.1 Database Normalization: UGC NET CSE | December 2004 | Part 2 | Question: 20
Answer key ☟
7.17.2 Database Normalization: UGC NET CSE | December 2008 | Part 2 | Question: 32
Suppose R is a relation schema and F is a set of functional dependencies on R. Further, suppose R1 and
R2 form a decomposition of R. Then the decomposition is a lossless join decomposition of R provided that:
A. R1∩R2→R1 is in F+
B. R1∩R2→R2 is in F+
C. both R1∩R2→R1 and R1∩R2→R2 functional dependencies are in F+
D. at least one from R1∩R2→R1 and R1∩R2→R2 is in F+
Answer key ☟
7.17.3 Database Normalization: UGC NET CSE | December 2009 | Part 2 | Question: 18
A. B.
C. D.
ugcnetcse-dec2009-paper2 databases database-normalization match-the-following
Answer key ☟
7.17.4 Database Normalization: UGC NET CSE | December 2009 | Part 2 | Question: 19
(B) 2 NF
(C) 4 NF
(D) BCNF
ugcnetcse-dec2009-paper2 databases database-normalization
Answer key ☟
7.17.5 Database Normalization: UGC NET CSE | December 2010 | Part 2 | Question: 17
The dependency preservation decomposition is a property to decompose database schema D, in which each
functional dependency specified in ,
Answer key ☟
7.17.6 Database Normalization: UGC NET CSE | December 2012 | Part 2 | Question: 13
Answer key ☟
7.17.7 Database Normalization: UGC NET CSE | December 2012 | Part 3 | Question: 63
Answer key ☟
7.17.8 Database Normalization: UGC NET CSE | December 2013 | Part 3 | Question: 59
Armstrong proposed systematic approach to derive functional dependencies. Match the following w.r.t
functional dependencies:
Codes:
A. B.
C. D.
ugcnetcse-dec2013-paper3 databases database-normalization
Answer key ☟
7.17.9 Database Normalization: UGC NET CSE | December 2014 | Part 2 | Question: 19
The best normal form of relation scheme along with the set of functional dependencies
is
Answer key ☟
7.17.10 Database Normalization: UGC NET CSE | December 2014 | Part 2 | Question: 20
Identify the minimal key for relational scheme with functional dependencies
A. B. C. D.
ugcnetcse-dec2014-paper2 databases database-normalization
Answer key ☟
7.17.11 Database Normalization: UGC NET CSE | December 2014 | Part 3 | Question: 10
Answer key ☟
7.17.12 Database Normalization: UGC NET CSE | December 2014 | Part 3 | Question: 12
Answer key ☟
7.17.13 Database Normalization: UGC NET CSE | December 2015 | Part 2 | Question: 20
A relation R={A,B,C,D,E,F,G} is given with following set of functional dependencies: F={AD→E, BE→F,
B→C, AF→G}. Which of the following is a candidate key?
A. A B. AB C. ABC D. ABD
ugcnetcse-dec2015-paper2 databases database-normalization
Answer key ☟
7.17.14 Database Normalization: UGC NET CSE | January 2017 | Part 3 | Question: 10
For database relation where the domains of and include only atomic values, only the
following functional dependencies and those that can be inferred from them are:
The relation is in
Answer key ☟
7.17.15 Database Normalization: UGC NET CSE | June 2005 | Part 2 | Question: 19
A. B. C. D.
ugcnetcse-june2005-paper2 database-normalization
Answer key ☟
7.17.16 Database Normalization: UGC NET CSE | June 2010 | Part 2 | Question: 18
A. B.
C. D.
ugcnetcse-june2010-paper2 databases database-normalization
Answer key ☟
7.17.17 Database Normalization: UGC NET CSE | June 2013 | Part 3 | Question: 9
For a database relation R(a, b, c, d) where the domains of a, b, c, d include only the atomic values. The
functional dependency a c, b d holds in the following relation.
Answer key ☟
7.17.18 Database Normalization: UGC NET CSE | June 2014 | Part 2 | Question: 49
A. CD B. EC C. AE D. AC
ugcnetcse-june2014-paper2 databases database-normalization
Answer key ☟
7.17.19 Database Normalization: UGC NET CSE | June 2014 | Part 3 | Question: 22
Answer key ☟
7.17.20 Database Normalization: UGC NET CSE | June 2019 | Part 2 | Question: 34
In relational databases, if relation R is in BCNF, then which of the following is true about relation R?
Answer key ☟
7.17.21 Database Normalization: UGC NET CSE | Junet 2015 | Part 3 | Question: 10
The Relation
Vendor Order (V_no, V_ord_no, V_name, Qty_sup, unit_price) is in 2NF because
Answer key ☟
7.17.22 Database Normalization: UGC NET CSE | November 2017 | Part 3 | Question: 9
If every non-key attribute is functionally dependent on the primary key, then the relation is in ________
Answer key ☟
7.17.23 Database Normalization: UGC NET CSE | October 2022 | Part 1 | Question: 53
A. B.
C. D.
ugcnetcse-oct2022-paper1 database-normalization
Answer key ☟
Consider the table with attributes and . The functional dependencies that hold on are :
. Which of the following statements is/are True ?
I. The decomposition of into and is lossless.
II. The decomposition of into and is lossy.
Answer key ☟
If a relation with a Schema R is decomposed into two relations and such that then
which one of the following is to be satisfied for a lossless joint decomposition ( indicates functional
independency)
A.
B.
C.
D.
Answer key ☟
The relation schemas and form a Lossless join decomposition of if and only if
i.
ii.
iii.
iv.
A. happen B. happen
C. happen D. happen
ugcnetcse-june2015-paper3 databases decomposition database-normalization
Answer key ☟
7.19.1 Dependency Preserving: UGC NET CSE | January 2017 | Part 2 | Question: 19
Answer key ☟
7.20.1 Distributed Database: UGC NET CSE | August 2016 | Part 3 | Question: 8
The Global conceptual Schema in a distributed database contains information about global relations. The
condition that all the data of the global relation must be mapped into the fragments, that is, it must not happen
that a data item which belongs to a global relation does not belong to any fragment, is called :
A. Disjointness condition B. Completeness condition
C. Reconstruction condition D. Aggregation condition
ugcnetcse-aug2016-paper3 databases distributed-database
Answer key ☟
7.20.2 Distributed Database: UGC NET CSE | July 2016 | Part 3 | Question: 8
In distributed databases, location transparency allows for database users, programmers and administratirs to
treat the data as if it is at one location, A SQL query with location transparency needs to specify
Answer key ☟
Consider the following Entity-Relationship diagram and three possible relationship sets I, II and
III) for this diagram:
If different symbols stand for different values (e.g., is definitely not equal to ), then which of the above could not
be the relationship set for the diagram ?
Answer key ☟
An entity has:
(i) a set of properties
(ii) a set of properties and values for all the properties
(iii) a set of properties and the values for some set of properties may non-uniquely identify an entity
(iv) a set of properties and the values for some set of properties may uniquely identify an entity
Which of the above are valid?
A. (i) only
B. (ii) only
C. (iii) only
D. (iv) only
Answer key ☟
7.21.3 ER Diagram: UGC NET CSE | December 2009 | Part 2 | Question: 16
(A) I, II
(B) I, II, IV
Answer key ☟
(A) top-down
(B) bottom up
Answer key ☟
Answer key ☟
Answer key ☟
A. 2 B. 3 C. 4 D. 5
ugcnetcse-dec2013-paper3 databases er-diagram
Answer key ☟
A. The relationship construct known as the weak relationship type was defined by Dey, Storey & Barron (1999)
B. A weak relationship occurs when two relationship types are linked by either Event- Precedent sequence
or Condition- recedent sequence.
C. Conceptual model is not accurate representation of “Universe of interest”.
D. Ternary, Quaternary and Quintary relationships are shown through a series of application scenario’s and vignette’s.
Answer key ☟
What kind of mechanism is to be taken into account for converting a weak entity set into strong entity set in
entity-relationship diagram
A. Generalization B. Aggregation
C. Specialization D. Adding suitable attributes
ugcnetcse-dec2014-paper2 databases er-diagram
Answer key ☟
A.
B.
C.
D.
Answer key ☟
7.21.11 ER Diagram: UGC NET CSE | December 2019 | Part 2 | Question: 23
Find minimum number of tables required for converting the following entity relationship diagram into relational
database?
A. B. C. D.
ugcnetcse-dec2019-paper2 er-diagram
Answer key ☟
Let and be two entities in an diagram with simple single value attributes. and are two
relationship between and , where as , is one-to-many and , is many-to-many.
The minimum number of tables required to represent , and , in the relational model are ___________.
A. B. C. D.
ugcnetjan2017ii databases er-diagram
Answer key ☟
A. 1 NF B. 2 NF C. 3 NF D. 4 NF
databases er-diagram database-normalization ugcnetcse-july2018-paper2
Answer key ☟
Answer key ☟
A. Weak entities can be deleted automatically when their strong entity is deleted
B. Weak entity set avoids the data duplication and consequent possible inconsistencies caused by duplicating the key of
the string entity
C. A weak entity set has no primary keys unless attributes of the strong entity set on which it depends are included
D. Tuples in a weak entity set are not partitioned according to their relationship with tuples with a strong entity set
Answer key ☟
Let and be two entities in E-R diagram with simple single valued attributes. and are two
relationships between and where is one-many and is many-many. and do not have any
attribute of their own. How many minimum number of tables are required to represent this situation in the Relational
Model?
A. 4 B. 3 C. 2 D. 1
databases er-diagram ugcnetcse-june2015-paper3
Answer key ☟
A. B.
C. D.
ugcnetcse-sep2013-paper3 databases er-diagram match-the-following easy
Answer key ☟
ii. Relationship
b.
iii. Many to Many Relationship
c.
Answer key ☟
7.22.1 Enhanced ER Model: UGC NET CSE | June 2014 | Part 3 | Question: 23
Answer key ☟
7.23.1 File System: UGC NET CSE | Junet 2015 | Part 2 | Question: 19
Database application were directly built on top of file system to overcome the following drawbacks of using
file-systems:
A. B. C. D.
ugcnetcse-june2015-paper2 databases file-system
Answer key ☟
7.24.1 Functional Dependency: UGC NET CSE | January 2017 | Part 3 | Question: 9
Let denotes primary key of relation . A many-to-one relationship that exists between two relations
and can be expressed as follows:
A. B.
C. D.
ugcnetcse-jan2017-paper3 databases functional-dependency database-normalization
Answer key ☟
Answer key ☟
What is Granularity?
Answer key ☟
Answer key ☟
Answer key ☟
Answer key ☟
Consider the following three tables and In this question, all the join operations are natural joins .
is the projection operation of a relation:
Possible answer tables for this question are also given as below:
A. (a) B. (b) C. (c) D. (d)
ugcnetcse-dec2015-paper3 databases joins
Answer key ☟
In RDBMS, which type of Join returns all rows that satisfy the join condition?
Answer key ☟
7.31.1 Object Oriented Database: UGC NET CSE | December 2015 | Part 3 | Question: 58
Which of the following statements regarding the features of the object-oriented approach to databases are true?
Answer key ☟
7.31.2 Object Oriented Database: UGC NET CSE | July 2016 | Part 3 | Question: 7
A. Objects in object-oriented databse contain not only data but also methods for processing the data
B. Object-oriented database store computational instructions in the same place as the data
C. Object-oriented database are mmore adapt at handling structured (analytical) data than relational databases
D. Object-oriented databases store more types of data than relational databases and access that data faster
7.32.1 Protocol: UGC NET CSE | June 2014 | Part 3 | Question: 27, UGCNET-June2015-II: 17
Which of the following concurrency protocol ensues both conflict serializability and freedom from deadlock:
I. -phase locking
II. Time phase ordering
Answer key ☟
A. B. C. D.
ugcnetcse-june2023-paper2 database-normalization question-fixed
Answer key ☟
In RDBMS, the constraint that no key attribute (column) may be NULL is referred to as:
A. Referential integrity B. Multi-valued dependency
C. Entity integrity D. Functional dependency
ugcnetcse-july2016-paper2 databases rdbms sql
Answer key ☟
In a relational database model, NULL values canbe used for all but which one of the following?
A. To allow duplicate tuples in the table by filling the primary key column(s) with NULL
B. To avoid confusion with actual legitimate data values like 0 (zero) or integer columns and " (the empty string) for
string columns
C. To leave columns in a tuple marked as "unknown" when the actual value is unknown
D. To fill a column in a tuple when that column does not really "exist" for that particular tuple
Answer key ☟
Consider a relation book (title, price) which contains the titles and prices of different books. Assuming that no
two books have the same price, what does the following SQL query?
Select title
from book as B
where (select count(*)
from book as T
where T.price > B. price < 7
Answer key ☟
7.34.4 Rdbms: UGC NET CSE | July 2018 | Part 2 | Question: 66
For a database relation where the domains of a, b, c and d include only atomic values and only the
following functional dependencies and those that can be inferred from them hold:
A. First normal form but not in second normal form B. Second normal form but not in third normal form
C. Third normal form D. BCNF
ugcnetcse-july2018-paper2 databases rdbms
Answer key ☟
A many-to-one relationship exists between entity sets and . How will it be represented using functional
dependencies if denotes the primary key attribute of relation ?
A. B.
C. D.
ugcnetcse-july2018-paper2 databases rdbms
Answer key ☟
Answer key ☟
The “PROJECT” operator of a relational algebra creates a new table that has always
Answer key ☟
Answer key ☟
7.35.1 Recovery From Failure: UGC NET CSE | December 2014 | Part 3 | Question: 09
_________ rules used to limit the volume of log information that has to be handled and processed in the event of
system failure involving the loss of volatile information.
Answer key ☟
7.36.1 Referential Integrity: UGC NET CSE | December 2012 | Part 3 | Question: 70
Answer key ☟
7.36.2 Referential Integrity: UGC NET CSE | June 2019 | Part 2 | Question: 39
Following table has two attributes Employee_id and Manager_id, where Employee_id is a primary key and
manager_id is a foreign key referencing Employee_id with on-delete cascade:
On deleting the table , the set of other tuples that must be deleted to maintain the referential integrity of table is
Answer key ☟
7.36.3 Referential Integrity: UGC NET CSE | September 2013 | Part 3 | Question: 24
____ constraints ensure that a value that appears in one relation for a given set of attributes also appears for a
certain set of attributes in another relation.
A. Logical Integrity B. Referential Integrity
C. Domain Integrity D. Data Integrity
ugcnetcse-sep2013-paper3 databases referential-integrity
Answer key ☟
7.37 Relation (1)
Let and be two relations in which a is the foreign key of that refers to the primary key
of . Consider the following four options.
a. Insert into b. Insert into
c. Delete from d. Delete from
Which of the following is correct about the referential integrity constraint with respect to above?
A. Operations a and b will cause violation B. Operations b and c will cause violation
C. Operations c and d will cause violation D. Operations d and a will cause violation
ugcnetcse-july2018-paper2 databases relation
Answer key ☟
7.38.1 Relational Algebra: UGC NET CSE | December 2013 | Part 3 | Question: 56
A. )
B. )
C. )
D. )
Answer key ☟
7.38.2 Relational Algebra: UGC NET CSE | July 2016 | Part 3 | Question: 9
Consider the relations and and the following four relational algebra queries over R ans S
I.
II.
III.
IV. where refers to the column B in table R
A. I, III and IV are the same query B. II, III and IV are the same query
C. I, II and IV are the same query D. I, II and III are the same query
ugcnetcse-july2016-paper3 databases relational-algebra
Answer key ☟
7.38.3 Relational Algebra: UGC NET CSE | June 2019 | Part 2 | Question: 33
With respect to relational algebra, which of the following operations are included from mathematical set theory?
i. Join
ii. Intersection
iii. Cartisian product
iv. Project
A. i and iv B. ii and iii C. iii and iv D. ii and iv
ugcnetcse-june2019-paper2 relational-algebra
Answer key ☟
7.39.1 Relational Calculus: UGC NET CSE | June 2019 | Part 2 | Question: 31
Which of the following has same expressive power with regard to relational query language?
A. i and ii only B. iii and iv only C. i and iii only D. ii and iv only
ugcnetcse-june2019-paper2 relational-calculus
Answer key ☟
7.39.2 Relational Calculus: UGC NET CSE | September 2013 | Part 3 | Question: 47
7.40.1 Relational Model: UGC NET CSE | June 2019 | Part 2 | Question: 32
Answer key ☟
7.40.2 Relational Model: UGC NET CSE | October 2020 | Part 2 | Question: 67
Match with
Choose the correct answer from the options given below:
A. B.
C. D.
ugcnetcse-oct2020-paper2 databases relational-model
Answer key ☟
7.41.1 Relational Schema: UGC NET CSE | November 2017 | Part 3 | Question: 12
A. Dependency preserving and lossless join B. Lossless join but dependency preserving
C. Dependency preserving but not lossless join D. Not dependency preserving and not lossless join
ugcnetcse-nov2017-paper3 databases relational-schema rdbms
Answer key ☟
Consider a database table with attributes and . Which of the following queries is illegal ?
A. SELECT A FROM R; B. SELECT A, COUNT(*) FROM R;
C. SELECT A, COUNT(*) FROM R GROUP BY A; D. SELECT A, B, COUNT(*) FROM R GROUP BY A, B;
ugcnetcse-aug2016-paper2 databases sql
Answer key ☟
Answer key ☟
Answer key ☟
Which command classes text file, which has been created using "SET ALTERNATIVE" "Command" ?
Which of the following statements is true, when structure of database file with 20 records is modified ?
Answer key ☟
The Expression Select distinct . branch name from branch , branch where . assets . assets and
. branch-city = DELHI, finds the name of
A. All branches that have greater asset than any branch located in DELHI.
B. All branches that have greater assets than allocated in DELHI.
C. The branch that has the greatest asset in DELHI.
D. Any branch that has greater asset than any branch located in DELHI.
Answer key ☟
Given a Relation POSITION (Posting-No, Skill), then the query to retrieve all distinct pairs of posting-nos.
requiring skill is
A. Select p.posting-No, p.posting-No from position p where p.skill=p.skill and p.posting-No < p.posting-No
B. Select p .posting-No, p .posting-No from position p , position p where p .skill=p .skill
C. Select p .posting-No, p .posting-No from position p , position p where p .skill=p .skill and p .posting.No < p
.posting-No
D. Select p .posting-No, p .posting-No from position p , position p where p .skill=p .skill and p .posting.No = p
.posting-No
Answer key ☟
Consider the table student (stuid, name, course, marks). Which one of the following two queries is correct to
find the highest marks student in course 5?
Q.1. Select S.stuid from student S where not exist (select * from student e where e course ='5' and e marks s marks)
Q.2. select s.stu.id From student S where s.marks > any (select distinct marks from student S where s.course =5)
A. Q.1 B. Q.2 C. Both Q.1 and Q.2 D. Neither Q.1 nor Q.2
ugcnetcse-dec2013-paper3 databases sql
Answer key ☟
Answer key ☟
Answer key ☟
Consider a "CUSTOMERS" database table having a column "CITY" filled with all the names of Indian cities (in
capital letters). The SQL statement that finds all cities that have "GAR" somewhere in its name, is:
A. select * from customers where city='%GAR%';
A. B. C. D.
ugcnetcse-dec2015-paper3 databases sql
Answer key ☟
Suppose ORACLE relation currently has tuples and relation currently has
.Consider the following two SQL queries SQ1 and SQ2:
SQ1: Select * From R Full Join S On R.B=S.B;
SQ2: Select * From R Inner Join S On R.B=S.B;
The numbers of tuples in the result of the SQL query SQ1 and the SQL query SQ2 are given by:
A. and respectively B. and respectively
C. and respectively D. and respectively
ugcnetcse-dec2015-paper3 databases sql
Answer key ☟
Consider the following three SQL queries (Assume the data in the people table):
If the SQL queries and above, return rows and rows in the result set respectively, then what is one possible
number of rows returned by the SQL query ?
A. B. C. D.
ugcnetcse-dec2015-paper3 databases sql
Answer key ☟
ugcnetcse-dec2019-paper2 sql
Answer key ☟
Integrity constraints ensure that changes made to the database by authorized users do not result into loss of data
consistency. Which of the following statement(s) is (are) true w.r.t.the examples of integrity constraints?
i. An instructor Id. No. cannot be null, provided Instructor Id No. being primary key.
ii. No two citizens have same Adhar-ld.
iii. Budget of a company must be zero.
Answer key ☟
A. Find the highest paid employee who earns more than the average salary of all employees of his company.
B. Find the highest paid employee who earns more than the average salary of all the employees of all the companies.
C. Find all employees who earn more than the average salary of all employees all the companies.
D. Find all employees who earn more than the average salary of all employees of their company.
Answer key ☟
Consider the following two comments C1 and C2 on the relation R from an SQL database:
C1 : drop table R;
C2 : delete from R
Answer key ☟
Answer key ☟
Which data management language component enabled the DBA to define the schema components ?
Answer key ☟
A. More fields than the original table B. More rows than original table
C. Both (A) & (B) D. None of these
ugcnetcse-june2010-paper2 databases sql
Answer key ☟
The employee information of an organization is stored in a relation: Employee (name, sex, salary, deptname).
Consider the following SQL query:
Select deptname from Employee where sex=’M’ group by dept name having
avg (salary) > {select avg (salary) from Employee}
Answer key ☟
Answer key ☟
An Assertion is predicate expressing a condition we wish database to always satisfy. The correct syntax for
Assertion is:
A. CREATE ASSERTION 'ASSERTION Name' CHECK 'Predicate'
B. CREATE ASSERTION 'ASSERTION Name'
C. CREATE ASSERTION, CHECK 'Predicate'
D. SELECT ASSERTION
Answer key ☟
A. a B. a, b and c C. d D. a and d
ugcnetcse-june2015-paper2 databases sql
Answer key ☟
The STUDENT information in a university stored in the relation STUDENT (Name, SEX, Marks,
DEPT_Name). COnsider the following SQL Query:
SELECT DEPT_Name from STUDENT where SEX='M'
group by DEPT_Name having avg(Marks)>SELECT avg(Marks) from STUDENT
A. The average marks of Male students is more than the average marks of students in the department
B. The average marks of Male students is more than the average marks of students in the university
C. The average marks of students is more than the average marks of male students in the university
D. The average marks of Male students is more than the average marks of male students in the university
Answer key ☟
Answer key ☟
7.42.28 SQL: UGC NET CSE | October 2020 | Part 2 | Question: 100
Consider the following table structures related to a university for the below question.
EMPLOYEE
DEPARTMENT
PROJECT WORK:
Refer table, structures given above, University decided to give all employees in the ‘SCIENCE’ department a rise
in salary. Which of the following query/queries will compute the above results?
i. UPDATE EMPLOYEE
SET SALARY = SALARY*1.20
WHERE DEPT NO. IN (SELECT DID FROM DEPARTMENT WHERE DNAME = ‘SCIENCE’);
Answer key ☟
Consider the following table structures related to a university for the below question.
EMPLOYEE
NAME VARCHAR (30) NOT NULL,
EID VARCHAR (10) NOT NULL,
DEPTNO INT (5) NOT NULL,
HODEID VARCHAR (10),
SALARY INT (10),
PRIMARY KEY (EID),
FOREIGN KEY (HODEID) REFERENCES EMPLOYEE (EID),
FOREIGN KEY (DEPTNO) REFERENCES DEPARTMENT (DID);
DEPARTMENT
DID INT (5) NOT NULL,
DNAME VARCHAR(30) NOT NULL,
HODID VARCHAR (10) NOT NULL,
HODNAME VARCHAR (30),
PRIMARY KEY (DID),
UNIQUE (DNAME),
FOREIGN KEY (HODID) REFERENCES EMPLOYEE (EID)
PROJECT WORK:
EMPID VARCHAR (10) NOTNULL,
PROJNO INT(5) NOT NULL,
PROJECTLOC VARCHAR (30) NOT NULL,
PRIMARY KEY (EMPID, PROJNO),
FOREIGN KEY (EMPID) REFERENCES EMPLOYEE (EID),
On the basis of above given table structures, retrieve the distinct employee ID (EMPID) of all employees of university
who are working on project. No. and
Answer key ☟
Consider the following table structures related to a university for the below question.
EMPLOYEE
DEPARTMENT
PROJECT WORK:
Given below are two statements to find the sum of salaries of all employees of the English department as well as the
maximum, minimum and average salary in English department
STATEMENT :
SELECT SUM (SALARY) MAX(SALARY) MIN(SALARY),
AVG (SALARY) FROM EMPLOYEE, DEPARTMENT
WHERE DEPTNO=DID AND DNAME=’ENGLISH’
STATEMENT :
SELECT SUM (SALARY), MAX(SALARY), MIN (SALARY),
AVG (SALARY), FROM EMPLOYEE, DEPARTMENT
WHERE DNAME=’ENGLISH’
In the light of the above statements, choose the correct answer from the options given below:
Answer key ☟
Consider the following table structures related to a university for the below question.
EMPLOYEE
DEPARTMENT
PROJECT WORK:
Which of the following query/queries return the employee ID and name of employees whose salary is greater than the
salary of all employees in department number of university. Order result by employee ID (refer table structures given
above).
Answer key ☟
Consider the following table structures related to a university for the below question.
EMPLOYEE
DEPARTMENT
PROJECT WORK:
In reference to the above given table structures, which of the following query/queries will drop the ‘SALARY’ column
from ‘EMPLOYEE’ table?
Answer key ☟
A. All branches that have greater assets than some branch located in Mumbai
B. All branches that have greater assets than all branches in Mumbai
C. The branch that has greatest asset in Mumbai
D. Any branch that has greater assets than any branch in Mumbai
Answer key ☟
7.43.1 Transaction and Concurrency: UGC NET CSE | December 2010 | Part 2 | Question: 18
Answer key ☟
7.43.2 Transaction and Concurrency: UGC NET CSE | December 2014 | Part 3 | Question: 08
Answer key ☟
7.43.3 Transaction and Concurrency: UGC NET CSE | January 2017 | Part 3 | Question: 7
Answer key ☟
7.43.4 Transaction and Concurrency: UGC NET CSE | June 2012 | Part 2 | Question: 12
Answer key ☟
7.43.5 Transaction and Concurrency: UGC NET CSE | November 2017 | Part 3 | Question: 7
Consider the following four schedules due to three transactions (indicated by the subscript) using read and write
on a data item , denoted by and respectively. Which one of them is conflict serializable?
:
:
:
:
A. B. C. D.
ugcnetcse-nov2017-paper3 databases transaction-and-concurrency
Answer key ☟
7.43.6 Transaction and Concurrency: UGC NET CSE | November 2017 | Part 3 | Question: 8
Suppose a database schedule S involves transactions . Consider the precedence graph of with
vertices representing the transactions and edges representing the conflicts. If is serializable, which one of the
following orderings of the vertices of the precedence graph is guaranteed to yield a serial schedule?
A. Topological order B. Depth – first order
C. Breadth – first order D. Ascending order of transactions indices
ugcnetcse-nov2017-paper3 databases transaction-and-concurrency
Answer key ☟
7.43.7 Transaction and Concurrency: UGC NET CSE | September 2013 | Part 2 | Question: 37
Answer key ☟
7.43.8 Transaction and Concurrency: UGC NET CSE | September 2013 | Part 2 | Question: 43
Thoma’s-write rule is
Answer key ☟
7.44 Transactions and Concurrency Control (2)
7.44.1 Transactions and Concurrency Control: UGC NET CSE | June 2023 | Part 2: 44
Answer key ☟
7.44.2 Transactions and Concurrency Control: UGC NET CSE | October 2020 | Part 2 | Question: 48
In the context of concurrency control, a given pair of operations in a schedule is called conflict schedule if
Answer key ☟
7.45.1 Weak Entity: UGC NET CSE | Junet 2015 | Part 2 | Question: 20
For a weak entity set to be meaningful, it must be associated with another entity set in combination with some of
their attribute values, is called as:
Answer key ☟
Answer Keys
7.0.1 C 7.0.2 D 7.0.3 D 7.0.4 C 7.0.5 C
7.0.6 B 7.0.7 B 7.0.8 D 7.0.9 B 7.0.10 D
7.0.11 A 7.0.12 D 7.0.13 D 7.0.14 Q-Q 7.0.15 Q-Q
7.0.16 Q-Q 7.0.17 Q-Q 7.0.18 Q-Q 7.0.19 Q-Q 7.0.20 Q-Q
7.0.21 Q-Q 7.0.22 Q-Q 7.0.23 Q-Q 7.0.24 Q-Q 7.0.25 Q-Q
7.0.26 Q-Q 7.0.27 Q-Q 7.0.28 Q-Q 7.0.29 Q-Q 7.1.1 Q-Q
7.1.2 C 7.2.1 A 7.2.2 A 7.3.1 X 7.4.1 Q-Q
7.5.1 B 7.5.2 C 7.5.3 B 7.5.4 C 7.6.1 B
7.7.1 A 7.8.1 Q-Q 7.9.1 Q-Q 7.10.1 B 7.11.1 Q-Q
7.11.2 D 7.12.1 B 7.13.1 Q-Q 7.13.2 A 7.14.1 D
7.14.2 A 7.15.1 A 7.16.1 Q-Q 7.16.2 B 7.17.1 N/A
7.17.2 D 7.17.3 A 7.17.4 B 7.17.5 Q-Q 7.17.6 A
7.17.7 B 7.17.8 D 7.17.9 B 7.17.10 B 7.17.11 B
7.17.12 A 7.17.13 D 7.17.14 A 7.17.15 Q-Q 7.17.16 Q-Q
7.17.17 A 7.17.18 B 7.17.19 C 7.17.20 D 7.17.21 A
7.17.22 C 7.17.23 Q-Q 7.18.1 C 7.18.2 A 7.18.3 C
7.19.1 A 7.20.1 Q-Q 7.20.2 B 7.21.1 Q-Q 7.21.2 Q-Q
7.21.3 Q-Q 7.21.4 Q-Q 7.21.5 Q-Q 7.21.6 A 7.21.7 B
7.21.8 C 7.21.9 D 7.21.10 A 7.21.11 Q-Q 7.21.12 A
7.21.13 A 7.21.14 Q-Q 7.21.15 B 7.21.16 B 7.21.17 A
7.21.18 C 7.22.1 B 7.23.1 D 7.24.1 B 7.25.1 Q-Q
7.26.1 B 7.27.1 Q-Q 7.28.1 A 7.29.1 B 7.30.1 B
7.30.2 Q-Q 7.31.1 B 7.31.2 C 7.32.1 B 7.33.1 Q-Q
7.34.1 C 7.34.2 A 7.34.3 Q-Q 7.34.4 Q-Q 7.34.5 A
7.34.6 D 7.34.7 C 7.34.8 A 7.35.1 B 7.36.1 B
7.36.2 B 7.36.3 B 7.37.1 D 7.38.1 A 7.38.2 D
7.38.3 B 7.39.1 B 7.39.2 C 7.40.1 C 7.40.2 C
7.41.1 A 7.42.1 B 7.42.2 B 7.42.3 Q-Q 7.42.4 Q-Q
7.42.5 Q-Q 7.42.6 Q-Q 7.42.7 C 7.42.8 B 7.42.9 B
7.42.10 D 7.42.11 C 7.42.12 B 7.42.13 B 7.42.14 C
7.42.15 Q-Q 7.42.16 C 7.42.17 D 7.42.18 C 7.42.19 A
7.42.20 Q-Q 7.42.21 Q-Q 7.42.22 D 7.42.23 C 7.42.24 A
7.42.25 C 7.42.26 B 7.42.27 B 7.42.28 B 7.42.29 C
7.42.30 C 7.42.31 D 7.42.32 A 7.42.33 A 7.43.1 Q-Q
7.43.2 D 7.43.3 C 7.43.4 D 7.43.5 D 7.43.6 A
7.43.7 B 7.43.8 B 7.44.1 Q-Q 7.44.2 B 7.45.1 C
8 Digital Logic (114)
A. B.
C. D.
ugcnetcse-june2013-paper3 digital-logic
Answer key ☟
A. B.
C. D.
ugcnetsep2013ii digital-logic match-the-following easy
Answer key ☟
of a component is defined as
ugcnetcse-dec2013-paper2 digital-logic
Answer key ☟
Answer key ☟
Synchronization is achieved by a timing device called a ______ which generates a periodic train of
__________.
Answer key ☟
A. B.
C. D.
ugcnetcse-july2016-paper2 digital-logic
Answer key ☟
A. B.
C. D.
ugcnetcse-july2016-paper2 digital-logic
Answer key ☟
Answer key ☟
Answer key ☟
i.
ii.
A. (i) is true and (ii) is false B. (i) is false and (ii) is true
C. Both (i) and (ii) are true D. Both (i) and (ii) are false
ugcnetcse-dec2018-paper2 digital-logic
Answer key ☟
Answer key ☟
i. Every logic network is equivalent to one using just NAND gates or just NOR gates.
ii. Boolean expressions and logic networks correspond to labelled acyclic diagraphs.
iii. No two Boolean algebras with n atoms are isomorphic.
iv. Non-zero elements of finite Boolean algebras are not uniquely expressible as joins of atoms
A. i and iv only B. i, ii and iii only C. i and ii only D. ii, iii, and iv only
ugcnetcse-dec2018-paper2 digital-logic
8.0.13 UGC NET CSE | December 2006 | Part 2 | Question: 9
A. B. C. D.
ugcnetcse-dec2006-paper2
Answer key ☟
ugcnetcse-dec2006-paper2 digital-logic
Answer key ☟
A. B. C. D.
ugcnetcse-dec2007-paper2
Answer key ☟
The period of a signal is ms, then the frequency of this signal in kilohertz is ______
A. B. C. D.
ugcnetcse-oct2020-paper2 digital-logic
Answer key ☟
A. B.
C. D.
ugcnetcse-aug2016-paper2 digital-logic adder
Answer key ☟
8.1.2 Adder: UGC NET CSE | December 2005 | Part 2 | Question: 7
Answer key ☟
I. A circuit that adds two bits, producing a sum bit and carry bit is called half adder.
II. A circuit that adds two bits, producing a sum bit and carry bit is called full adder.
III. A circuit that adds two bits and a carry bit producing a sum bit and a carry bit is called full adder.
IV. A device that accepts the value of a Boolean variable as input and produces its complement is called an inverter.
A. I & II B. II & III C. I, II, III D. I, III & IV
ugcnetcse-dec2013-paper2 digital-logic adder
Answer key ☟
Answer key ☟
8.2.1 Boolean Algebra: UGC NET CSE | December 2009 | Part 2 | Question: 06
(A) X + Y + ZX + Y
(B) XY – YZ
(C) X + YZ
(D) XZ + Y
ugcnetcse-dec2009-paper2 digital-logic boolean-algebra
Answer key ☟
8.2.2 Boolean Algebra: UGC NET CSE | December 2018 | Part 2 | Question: 7
A. B. C. D.
ugcnetcse-dec2018-paper2 digital-logic boolean-algebra
Answer key ☟
8.2.3 Boolean Algebra: UGC NET CSE | July 2016 | Part 2 | Question: 9
A. B. C. D.
ugcnetcse-july2016-paper2 digital-logic boolean-algebra
Answer key ☟
8.2.4 Boolean Algebra: UGC NET CSE | June 2005 | Part 2 | Question: 7
A. B. C. D.
ugcnetcse-june2005-paper2 digital-logic boolean-algebra
Answer key ☟
8.2.5 Boolean Algebra: UGC NET CSE | June 2009 | Part 2 | Question: 03
A. x B. y C. z D.
ugcnetcse-june2009-paper2 digital-logic boolean-algebra
Answer key ☟
8.2.6 Boolean Algebra: UGC NET CSE | June 2011 | Part 2 | Question: 4
A. B.
C. D. None of the above
digital-logic boolean-algebra ugcnetcse-june2011-paper2
Answer key ☟
8.2.7 Boolean Algebra: UGC NET CSE | June 2013 | Part 2 | Question: 41
A. B. C. D.
ugcnetcse-june2013-paper2 digital-logic boolean-algebra
Answer key ☟
8.2.8 Boolean Algebra: UGC NET CSE | June 2014 | Part 2 | Question: 16
How many different truth tables of the compound propositions are there that involve the propositions & ?
A. B. C. D.
ugcnetcse-june2014-paper2 digital-logic boolean-algebra
Answer key ☟
8.2.9 Boolean Algebra: UGC NET CSE | June 2014 | Part 2 | Question: 17
A. B. C. D.
ugcnetcse-june2014-paper2 digital-logic boolean-algebra
Answer key ☟
8.2.10 Boolean Algebra: UGC NET CSE | Junet 2015 | Part 2 | Question: 6
Answer key ☟
8.3.1 Circuit Output: UGC NET CSE | December 2012 | Part 2 | Question: 1
Consider the circuit shown below. IN a certain steady state, ‘Y’ is at logical ‘l’. What are the possible values of
A, B, C?
A. B. C. D.
ugcnetcse-dec2012-paper2 digital-logic circuit-output
Answer key ☟
8.3.2 Circuit Output: UGC NET CSE | December 2013 | Part 3 | Question: 53
A. x y B. x y C. x y D. x y
ugcnetcse-dec2013-paper3 digital-logic circuit-output
Answer key ☟
8.3.3 Circuit Output: UGC NET CSE | December 2018 | Part 2 | Question: 17
Find the boolean expression for the logic circuit shown below:
A. B.
C. D.
ugcnetcse-dec2018-paper2 digital-logic circuit-output
Answer key ☟
8.3.4 Circuit Output: UGC NET CSE | June 2010 | Part 2 | Question: 6
The logic expression for the output of the circuit shown in the figure is
A. B.
C. D.
ugcnetcse-june2010-paper2 digital-logic circuit-output digital-circuits
Answer key ☟
8.3.5 Circuit Output: UGC NET CSE | September 2013 | Part 2 | Question: 49
A. B. C. D.
ugcnetsep2013ii digital-logic circuit-output
Answer key ☟
8.4.1 Combinational Circuit: UGC NET CSE | August 2016 | Part 2 | Question: 9
Which of the following logic operations is performed by the following given combinational circuit ?
Answer key ☟
8.4.2 Combinational Circuit: UGC NET CSE | August 2016 | Part 3 | Question: 6
A. B. C. D.
ugcnetcse-aug2016-paper3 digital-logic combinational-circuit
Answer key ☟
8.4.3 Combinational Circuit: UGC NET CSE | July 2018 | Part 2 | Question: 93
A. B.
C. D.
ugcnetcse-july2018-paper2 digital-logic combinational-circuit
Answer key ☟
8.5.1 Digital Circuits: UGC NET CSE | August 2016 | Part 3 | Question: 65
A. (a) and (b) B. (b) and (c) C. (c), (d) and (e) D. (d) and (e)
ugcnetcse-aug2016-paper3 digital-logic digital-circuits
Answer key ☟
8.5.2 Digital Circuits: UGC NET CSE | December 2008 | Part 2 | Question: 4
Extremely low power dissipation and low cost per gate can be achieved in:
8.5.3 Digital Circuits: UGC NET CSE | December 2008 | Part 2 | Question: 5
1. gate
2. gate
3. gate
4. gate
Answer key ☟
8.5.4 Digital Circuits: UGC NET CSE | December 2010 | Part 2 | Question: 7
is equivalent to
A. B.
C. D.
ugcnetcse-dec2010-paper2 digital-logic digital-circuits
Answer key ☟
8.5.5 Digital Circuits: UGC NET CSE | December 2012 | Part 2 | Question: 38
A. B.
C. D.
ugcnetcse-dec2012-paper2 digital-logic digital-circuits
Answer key ☟
8.5.6 Digital Circuits: UGC NET CSE | December 2012 | Part 2 | Question: 47
A. B.
C. D.
ugcnetcse-dec2012-paper2 digital-logic digital-circuits match-the-following
Answer key ☟
8.5.7 Digital Circuits: UGC NET CSE | December 2012 | Part 2 | Question: 49
Answer key ☟
8.5.8 Digital Circuits: UGC NET CSE | January 2017 | Part 2 | Question: 7
ECL is the fastest of all logic families. High speed in ECL is possible because transistors are used in difference
amplifier configuration, in which they are never driven into ________.
Answer key ☟
8.5.9 Digital Circuits: UGC NET CSE | June 2010 | Part 2 | Question: 8
What is the transitive voltage for the voltage input of a CMOS operating from supply ?
A. B. C. D.
ugcnetcse-june2010-paper2 digital-logic digital-circuits
8.5.10 Digital Circuits: UGC NET CSE | September 2013 | Part 2 | Question: 23
Which one of the following set of gates is best suited for ‘parity’ checking and ‘parity’ generation?
A. AND, OR, NOT B. NAND, NOR C. EX-OR, EX-NOR D. None of the above
ugcnetsep2013ii digital-logic digital-circuits
Answer key ☟
8.6.1 Digital Counter: UGC NET CSE | December 2007 | Part 2 | Question: 8
In order to build a counter, the minimum number of flip flops needed is equal to :
A. B. C. D.
ugcnetcse-dec2007-paper2 digital-logic digital-counter
Answer key ☟
8.6.2 Digital Counter: UGC NET CSE | June 2019 | Part 2 | Question: 15
What will be the number of states when a MOD- counter is followed by a MOD- counter?
A. B. C. D.
ugcnetcse-june2019-paper2 digital-logic digital-counter
Answer key ☟
A. B. C. D.
ugcnetcse-june2014-paper2 computer-networks encoding
Answer key ☟
Answer key ☟
A.
B.
C.
D.
ugcnetcse-dec2004-paper2 flip-flop
Answer key ☟
8.9.2 Flip Flop: UGC NET CSE | December 2005 | Part 2 | Question: 10
When an inventor is placed between both inputs of an flip flop, the resulting flip flop is :
Answer key ☟
8.9.3 Flip Flop: UGC NET CSE | December 2008 | Part 2 | Question: 14
A. = B. = C. = D. =
ugcnetcse-dec2008-paper2 digital-logic flip-flop
Answer key ☟
8.9.4 Flip Flop: UGC NET CSE | December 2010 | Part 2 | Question: 8
Answer key ☟
8.9.5 Flip Flop: UGC NET CSE | January 2017 | Part 2 | Question: 8
A binary -bit down counter uses - flip-flops, with inputs , and outputs , = respectively.
The minimized expression for the input from following is :
I.
II.
III.
IV.
V.
VI.
Answer key ☟
8.9.6 Flip Flop: UGC NET CSE | July 2016 | Part 2 | Question: 10
In a positive edge triggered - flip flop , if and both are high then the output will be ______on the rising
edge of the clock :
A. No change B. Set C. Reset D. Toggle
ugcnetcse-july2016-paper2 digital-logic flip-flop
Answer key ☟
8.9.7 Flip Flop: UGC NET CSE | July 2018 | Part 2 | Question: 92
In flip-flop, the output of the flip-flop at time same as the output at time , after the occurrence of a
clock pulse if :
A. B. C. D.
ugcnetcse-july2018-paper2 digital-logic flip-flop
Answer key ☟
8.9.8 Flip Flop: UGC NET CSE | June 2009 | Part 2 | Question: 04
Answer key ☟
8.9.9 Flip Flop: UGC NET CSE | September 2013 | Part 3 | Question: 34
The power dissipation of a flip-flop is mW. The power dissipation of a digital system with flip-flops is given
by :
A. mW B. mW C. mW D. mW
ugcnetcse-sep2013-paper3 digital-logic flip-flop
Answer key ☟
8.9.10 Flip Flop: UGC NET CSE | September 2013 | Part 3 | Question: 35
An Astable multi vibrator using the timer to generate a square wave of KHz with duty cycle will have
:
A.
B.
C.
D.
Answer key ☟
8.10.1 Floating Point Representation: UGC NET CSE | December 2014 | Part 2 | Question: 09
The range of representable normalized numbers in the floating point binary fractional representation in a -bit
word with -bit sign, -bit excess biased exponent and -bit mantissa is :
A. to B. to
C. to D. to
ugcnetcse-dec2014-paper2 digital-logic floating-point-representation
Answer key ☟
8.10.2 Floating Point Representation: UGC NET CSE | December 2018 | Part 2 | Question: 16
The decimal floating point number represented using -bit representation and written in
hexadecimal form is
A. B. C. D.
ugcnetcse-dec2018-paper2 digital-logic number-representation floating-point-representation
Answer key ☟
8.11.1 Full Adder: UGC NET CSE | Junet 2015 | Part 2 | Question: 7
A. and B. and
C. and D. and
ugcnetcse-june2015-paper2 digital-logic full-adder
Answer key ☟
8.12.1 IEEE Representation: UGC NET CSE | July 2016 | Part 2 | Question: 7
The double precision format to represent floating point numbers, has a length of ______ bits.
A. B. C. D.
ugcnetcse-july2016-paper2 digital-logic ieee-representation
Answer key ☟
8.12.2 IEEE Representation: UGC NET CSE | September 2013 | Part 2 | Question: 7
The single-precision and double-precision format to represent floating-point numbers, has a length of
______ and ________ respectively.
A. bits and bits B. bits and bits
C. bits and bits D. bits and bits
ugcnetsep2013ii digital-logic ieee-representation
Answer key ☟
Answer key ☟
Answer key ☟
A. B.
C. D.
ugcnetcse-june2010-paper2 digital-logic k-map
Answer key ☟
A. B.
C. D.
ugcnetcse-june2013-paper3 digital-logic k-map
Answer key ☟
is
A. B.
C. D.
ugcnetcse-nov2017-paper2 digital-logic k-map
Answer key ☟
i.
ii.
iii.
iv.
Answer key ☟
A. B. C. D.
ugcnetcse-dec2009-paper2 digital-logic memory
A. input
B. input
C. input
D. input
Answer key ☟
Answer key ☟
A. B.
C. D.
ugcnetcse-june2012-paper3 digital-logic multiplexer
Answer key ☟
A terminal multiplexer has six bps terminals and bps terminals connected to it. If the outgoing line
is bps, what is the value of ?
A. B. C. D.
ugcnetjune2014iii digital-logic multiplexer
Answer key ☟
8.16.1 Number Representation: UGC NET CSE | August 2016 | Part 2 | Question: 6
A. and B. and
C. and D. and
ugcnetcse-aug2016-paper2 digital-logic number-representation
Answer key ☟
8.16.2 Number Representation: UGC NET CSE | August 2016 | Part 2 | Question: 7
Which of the following is the most efficient to perform arithmetic operations on the numbers ?
A. Sign-magnitude B. complement
C. complement D. complement
ugcnetcse-aug2016-paper2 digital-logic number-representation
Answer key ☟
8.16.3 Number Representation: UGC NET CSE | December 2009 | Part 2 | Question: 09
(A) 150
(B) 241
(C) 142
(D) 101011110
ugcnetcse-dec2009-paper2 digital-logic number-representation
Answer key ☟
8.16.4 Number Representation: UGC NET CSE | December 2009 | Part 2 | Question: 10
(A) 8
(B) 9
(C) 10
(D) 11
ugcnetcse-dec2009-paper2 digital-logic number-representation
Answer key ☟
8.16.5 Number Representation: UGC NET CSE | December 2010 | Part 2 | Question: 6
A. B. C. D.
ugcnetcse-dec2010-paper2 digital-logic number-representation
Answer key ☟
8.16.6 Number Representation: UGC NET CSE | December 2010 | Part 2 | Question: 9
-bit complement of is
A. B.
C. D.
ugcnetcse-dec2010-paper2 digital-logic number-representation
Answer key ☟
8.16.7 Number Representation: UGC NET CSE | July 2018 | Part 2 | Question: 95
A. D24 B. 1 B D C. 1 A E D. 1 A D
ugcnetcse-july2018-paper2 digital-logic number-representation easy
Answer key ☟
8.16.8 Number Representation: UGC NET CSE | July 2018 | Part 2 | Question: 96
Perform the following operation for the binary equivalent of the decimal numbers . The
solution in 8 bit representation is
Answer key ☟
8.16.9 Number Representation: UGC NET CSE | June 2005 | Part 2 | Question: 9
A. B. C. D.
ugcnetcse-june2005-paper2 digital-logic number-representation
Answer key ☟
8.16.10 Number Representation: UGC NET CSE | June 2012 | Part 2 | Question: 35
If an integer needs two bytes of storage, then the maximum value of signed integer is
A. B. C. D.
digital-logic number-representation ugcnetcse-june2012-paper2
Answer key ☟
8.16.11 Number Representation: UGC NET CSE | June 2014 | Part 2 | Question: 18
A. & B. & C. D.
ugcnetcse-june2014-paper2 digital-logic number-representation
Answer key ☟
8.17.1 Number System: UGC NET CSE | December 2005 | Part 2 | Question: 6
A. B. C. D.
ugcnetcse-dec2005-paper2 digital-logic number-system
Answer key ☟
8.17.2 Number System: UGC NET CSE | December 2006 | Part 2 | Question: 6
A. B. C. D.
ugcnetcse-dec2006-paper2 digital-logic number-system
Answer key ☟
8.17.3 Number System: UGC NET CSE | December 2013 | Part 2 | Question: 32
Given that in some number system . The base of that number system is
Answer key ☟
8.17.4 Number System: UGC NET CSE | January 2017 | Part 2 | Question: 10
A. B. C. D.
ugcnetjan2017ii digital-logic number-system
Answer key ☟
8.17.5 Number System: UGC NET CSE | January 2017 | Part 2 | Question: 15
A. B. C. D.
ugcnetjan2017ii digital-logic number-system
Answer key ☟
8.17.6 Number System: UGC NET CSE | January 2017 | Part 2 | Question: 9
A. B. C. D.
ugcnetjan2017ii digital-logic number-system
Answer key ☟
8.17.7 Number System: UGC NET CSE | June 2009 | Part 2 | Question: 13
A. B. C. D.
ugcnetcse-june2009-paper2 digital-logic number-system number-representation
Answer key ☟
8.17.8 Number System: UGC NET CSE | June 2019 | Part 2 | Question: 18
A. B. C. D.
ugcnetcse-june2019-paper2 number-system
Answer key ☟
8.17.9 Number System: UGC NET CSE | Junet 2015 | Part 3 | Question: 4
8.17.10 Number System: UGC NET CSE | November 2017 | Part 2 | Question: 7
A. B. C. D.
ugcnetcse-nov2017-paper2 digital-logic number-system number-representation
Answer key ☟
8.18.1 Number Theory: UGC NET CSE | June 2010 | Part 2 | Question: 9
A. B. C. D.
ugcnetcse-june2010-paper2 digital-logic number-theory
Answer key ☟
8.19.1 Priority Encoder: UGC NET CSE | June 2019 | Part 2 | Question: 17
The parallel bus arbitration technique uses an external priority encoder and a decoder. Suppose, a parallel arbiter
has bus arbiters. What will be the size of priority encoder and decoder respectively?
A. B.
C. D.
ugcnetcse-june2019-paper2 priority-encoder
Answer key ☟
The size of the required to build an 8-bit adder / subtractor with mode control, carry input, carry output
and two's complement overflow output is given as
A. B.
C. D.
ugcnetcse-dec2014-paper2 digital-logic rom
Answer key ☟
8.21.1 Ripple Counter Operation: UGC NET CSE | August 2016 | Part 3 | Question: 1
A ripple counter is a :
A. Synchronous Counter B. Asynchronous counter
C. Parallel counter D. None of the above
ugcnetcse-aug2016-paper3 digital-logic ripple-counter-operation
8.21.2 Ripple Counter Operation: UGC NET CSE | July 2018 | Part 2 | Question: 94
Answer key ☟
8.21.3 Ripple Counter Operation: UGC NET CSE | September 2013 | Part 3 | Question: 36
A binary ripple counter is required to count up to 16383. How many flip-flops are required?
Answer key ☟
8.22.1 Sequential Circuit: UGC NET CSE | July 2016 | Part 3 | Question: 1
Answer key ☟
8.22.2 Sequential Circuit: UGC NET CSE | June 2009 | Part 2 | Question: 14
A reduced state table has rows. The minimum number of Flip-flops needed to implement the sequential
machine is :
A. B. C. D.
ugcnetcse-june2009-paper2 digital-logic sequential-circuit
Answer key ☟
8.22.3 Sequential Circuit: UGC NET CSE | June 2010 | Part 2 | Question: 7
Answer key ☟
8.22.4 Sequential Circuit: UGC NET CSE | June 2014 | Part 3 | Question: 42
Answer key ☟
8.22.5 Sequential Circuit: UGC NET CSE | June 2014 | Part 3 | Question: 44
Answer key ☟
8.22.6 Sequential Circuit: UGC NET CSE | Junet 2015 | Part 3 | Question: 6
A. 8 B. 9 C. 27 D. 11
ugcnetcse-june2015-paper3 digital-logic sequential-circuit flip-flop
Answer key ☟
8.23.1 Sum of Product: UGC NET CSE | December 2013 | Part 2 | Question: 33
A.
B.
C.
D.
Answer key ☟
ugcnetcse-dec2015-paper3 unix
Answer key ☟
Answer Keys
8.0.1 C 8.0.2 A 8.0.3 A 8.0.4 C 8.0.5 A
8.0.6 C 8.0.7 C 8.0.8 Q-Q 8.0.9 B 8.0.10 Q-Q
8.0.11 D 8.0.12 Q-Q 8.0.13 Q-Q 8.0.14 Q-Q 8.0.15 Q-Q
8.0.16 Q-Q 8.0.17 C 8.1.1 Q-Q 8.1.2 Q-Q 8.1.3 D
8.1.4 D 8.2.1 C 8.2.2 Q-Q 8.2.3 A 8.2.4 Q-Q
8.2.5 C 8.2.6 C 8.2.7 D 8.2.8 D 8.2.9 D
8.2.10 D 8.3.1 A;D 8.3.2 C 8.3.3 C 8.3.4 Q-Q
8.3.5 B 8.4.1 Q-Q 8.4.2 Q-Q 8.4.3 Q-Q 8.5.1 Q-Q
8.5.2 Q-Q 8.5.3 Q-Q 8.5.4 Q-Q 8.5.5 A 8.5.6 A
8.5.7 B;D 8.5.8 B 8.5.9 Q-Q 8.5.10 C 8.6.1 Q-Q
8.6.2 B 8.7.1 B 8.8.1 A OR C 8.9.1 Q-Q 8.9.2 Q-Q
8.9.3 Q-Q 8.9.4 Q-Q 8.9.5 D 8.9.6 D 8.9.7 Q-Q
8.9.8 Q-Q 8.9.9 D 8.9.10 X 8.10.1 D 8.10.2 Q-Q
8.11.1 A 8.12.1 D 8.12.2 C 8.13.1 B 8.13.2 Q-Q
8.13.3 Q-Q 8.13.4 A 8.13.5 A 8.13.6 D 8.14.1 Q-Q
8.15.1 Q-Q 8.15.2 Q-Q 8.15.3 A 8.15.4 B 8.16.1 Q-Q
8.16.2 Q-Q 8.16.3 C 8.16.4 Q-Q 8.16.5 Q-Q 8.16.6 Q-Q
8.16.7 Q-Q 8.16.8 Q-Q 8.16.9 Q-Q 8.16.10 B 8.16.11 C
8.17.1 Q-Q 8.17.2 Q-Q 8.17.3 D 8.17.4 C 8.17.5 B
8.17.6 A 8.17.7 Q-Q 8.17.8 B 8.17.9 C 8.17.10 B
8.18.1 Q-Q 8.19.1 D 8.20.1 B 8.21.1 Q-Q 8.21.2 Q-Q
8.21.3 D 8.22.1 C 8.22.2 Q-Q 8.22.3 Q-Q 8.22.4 C
8.22.5 C 8.22.6 B 8.23.1 D 8.24.1 D
9 Discrete Mathematics: Combinatory (18)
The number of distinct bracelets of five beads made up of red, blue and green beads (two bracelets are
indistinguishable if the rotation of one yield another) is,
A. 243 B. 81 C. 51 D. 47
ugcnetcse-dec2012-paper3
Answer key ☟
9.1.1 Binary Tree: UGC NET CSE | July 2016 | Part 3 | Question: 31
A. 6 B. 42 C. 132 D. 256
ugcnetcse-july2016-paper3 combinatory binary-tree
Answer key ☟
The number of ways to distribute n distinguishable objects into k distinguishable boxes, so that objects are
placed into box , equals which of the following?
A. B.
C. D.
ugcnetcse-dec2012-paper3 discrete-mathematics combinatory
Answer key ☟
lamps are to be connected to a single electric outlet by using an extension board each of which has four
outlets. The number of extension boards needed to connect all the light is
A. B. C. D.
ugcnetcse-dec2012-paper3 combinatory
Answer key ☟
A. B.
C. D.
ugcnetcse-dec2013-paper2 discrete-mathematics combinatory
Answer key ☟
How many committees of five people can be chosen from 20 men and 12 women such that each committee
contains at least three women
A. 75240 B. 52492 C. 41800 D. 9900
combinatory ugcnetcse-dec2015-paper2
Answer key ☟
How many cards must be chosen from a deck to guarantee that at least
A. B.
C. D.
ugcnetcse-june2014-paper2 combinatory
Answer key ☟
How many ways are there to place indistinguishable balls into four distinguishable bins?
A. B. C. D.
ugcnetcse-june2019-paper2 combinatory
Answer key ☟
How many ways are there to pack six copies of the same book into four identical boxes, where a box can
contain as many as six books?
A. B. C. D.
ugcnetcse-oct2020-paper2 discrete-mathematics combinatory
Answer key ☟
is
A. B. C. D.
Answer key ☟
How many strings of digits have the property that the sum of their digits is ?
A. B. C. D.
ugcnetcse-june2015-paper2 discrete-mathematics counting
Answer key ☟
9.3.3 Counting: UGC NET CSE | Junet 2015 | Part 2 | Question: 3
In how many ways can indistinguishable fish be placed into different ponds, so that each pond contains at
least one fish?
A. B. C. D.
ugcnetcse-june2015-paper2 combinatory counting
Answer key ☟
9.4.1 Euler Phi Function: UGC NET CSE | June 2019 | Part 2 | Question: 63
where runs over all the primes dividing . What is the value of ?
A. B. C. D.
ugcnetcse-june2019-paper2 euler-phi-function
Answer key ☟
9.5.1 Inclusion Exclusion: UGC NET CSE | June 2019 | Part 2 | Question: 3
How many bit strings of length ten either start with a bit or end with two bits ?
A. B. C. D.
ugcnetcse-june2019-paper2 combinatory inclusion-exclusion
Answer key ☟
In how many ways can the string be fully paranthesized to yield an infix expression?
A. 15 B. 14 C. 13 D. 12
ugcnetcse-july2016-paper2 parenthesization combinatory
Answer key ☟
9.7.1 Permutation and Combination: Computer Science - UGC NET 2021 [ Question ID = 2353 ]
How many ways are there to assign 5 different jobs to 4 different employees if every employee is assigned at
least 1 job ?
1. 1024
2. 625
3. 240
4. 20
discrete-mathematics permutation-and-combination engineering-mathematics
Answer key ☟
9.8.1 Pigeonhole Principle: UGC NET CSE | June 2019 | Part 2 | Question: 7
How many cards must be selected from a standard deck of cards to guarantee that at least three hearts are
present among them?
A. B. C. D.
ugcnetcse-june2019-paper2 combinatory pigeonhole-principle
Answer key ☟
9.9.1 Recurrence Relation: UGC NET CSE | December 2012 | Part 2 | Question: 10
The number of bit strings of length eight that will either start with a 1 bit and end with two bits 00 shall be
A. 32 B. 64 C. 128 D. 160
ugcnetcse-dec2012-paper2 combinatory recurrence-relation
Answer key ☟
Answer Keys
9.0.1 C 9.1.1 C 9.2.1 C 9.2.2 D 9.2.3 A
9.2.4 B 9.2.5 A 9.2.6 B 9.2.7 D 9.3.1 D
9.3.2 B 9.3.3 A 9.4.1 D 9.5.1 C 9.6.1 B
9.7.1 Q-Q 9.8.1 D 9.9.1 D
10 Discrete Mathematics: Graph Theory (45)
How many edges must be removed to produce the spanning forest of a graph with N vertices, M edges and C
connected components?
Answer key ☟
1. Which of the following connected graph has exactly one spanning tree?
Answer key ☟
ugcnetjune2014iii graph-theory
Answer key ☟
Answer key ☟
Which one of the following is decimal value of a signed binary number 1101010, if it is in 2’s complement
form?
Answer key ☟
When a mobile telephone physically moves from one to another cell, the base station transfers ownership to the
cell getting strongest signal. This process is known as
A. handoff B. mobile switching
C. mobile routing D. cell switching
ugcnetcse-june2013-paper2
Answer key ☟
Answer key ☟
A ____ complete subgraph and a _____ subset of vertices of a graph G=(V,E) are a clique and a vertex cover
respectively
A. minimal, maximal B. minimal, minimal
C. maximal, minimal D. maximal, maximal
ugcnetcse-dec2013-paper3 engineering-mathematics discrete-mathematics graph-theory
Answer key ☟
Consider a Hamiltonian Graph(G) with no loops and parallel edges. Which of the following is true with respect
to this graph (G)?
Answer key ☟
i. A connected multigraph has an Euler Circuit if and only if each of its vertices has even degree.
ii. A connected multigraph has an Euler Path but not an Euler Circuit if and only if it has exactly two vertices of odd
degree.
iii. A complete graph (Kn) has a Hamilton Circuit whenever n 3.
iv. A cycle over six vertices (C6) is not a bipartite graph but a complete graph over 3 vertices is bipartite.
Codes :
Answer key ☟
The two distinct set of vertices, which make the graph bipartite are
A.
B.
C.
D.
ugcnetcse-dec2015-paper2 graph-theory
Answer key ☟
(A) No vertices
(C) ∞ vertices
(A) n
(D) (n^2)/2
ugcnetcse-dec2009-paper2 graph-theory
Answer key ☟
A.
B.
C.
D.
ugcnetcse-june2009-paper2
Answer key ☟
Answer key ☟
A. edges B. edges
C. edges D. edges
ugcnetcse-dec2008-paper2 graph-theory
Answer key ☟
E is the number of edges in the graph and f is maximum flow in the graph. When the capacities are integers, the
runtime of Ford-Fulberson algorithm is bounded by
A. B. C. D.
ugcnetcse-july2018-paper2 graph-theory
Answer key ☟
For which values of and does the complete bipartite graph have a Hamiltonian circuit ?
A. B.
C. D.
ugcnetcse-june2019-paper2 graph-theory
Answer key ☟
Weighted graph :
A. Is a bi-directional graph B. Is directed graph
C. Is graph in which number associated with arc D. Eliminates table method
ugcnetcse-dec2004-paper2
Answer key ☟
The following lists are the degrees of all the vertices of a graph :
i.
ii.
iii.
iv.
A. (i) and (ii) B. (iii) and (iv) C. (iii) and (ii) D. (ii) and (iv)
ugcnetcse-dec2004-paper2
Answer key ☟
A. B. C. D.
ugcnetcse-dec2006-paper2
Answer key ☟
A. B. C. D.
ugcnetcse-dec2007-paper2
Answer key ☟
10.1.1 Binary Tree: UGC NET CSE | November 2017 | Part 3 | Question: 31
Consider a full binary tree with internal nodes, internal path length , and external path length . the internal
length of a full binary tree is the sum, taken over all nodes of the tree, of the depth of each node. Similarly, the
external path length is the sum, taken over all leaves of the tree, of the depth of each leaf.
Which of the following is correct for the full binary tree?
A. B. C. D.
ugcnetcse-nov2017-paper3 data-structures binary-tree
Answer key ☟
10.2.1 Euler Graph: UGC NET CSE | August 2016 | Part 2 | Question: 5
Answer key ☟
10.2.2 Euler Graph: UGC NET CSE | December 2010 | Part 2 | Question: 2
An undirected graph possesses an eulerian circuit if and only if it is connected and its vertices are
A. All of even degree B. All of odd degree
C. Of any degree D. Even in number
ugcnetcse-dec2010-paper2 graph-theory euler-graph
Answer key ☟
10.3.1 Flow Network: UGC NET CSE | June 2019 | Part 2 | Question: 69
Consider the following properties with respect to a flow network in which a flow is a real-valued
function :
: For all
: for all
Answer key ☟
10.4 Graph Coloring (3)
10.4.1 Graph Coloring: UGC NET CSE | January 2017 | Part 2 | Question: 5
Consider a Hamiltonian Graph with no loops or parallel edges and with . The which of the
following is true?
B.
Answer key ☟
10.4.2 Graph Coloring: UGC NET CSE | June 2010 | Part 2 | Question: 4
A. B. C. D. None of these
ugcnetcse-june2010-paper2 graph-coloring
Answer key ☟
10.4.3 Graph Coloring: UGC NET CSE | June 2012 | Part 2 | Question: 4
The number of colours required to properly colour the vertices of every planer graph is
A. 2 B. 3 C. 4 D. 5
ugcnetcse-june2012-paper2 graph-theory graph-coloring
Answer key ☟
10.5.1 Graph Connectivity: UGC NET CSE | August 2016 | Part 2 | Question: 22
Consider an undirected graph where self-loops are not allowed. The vertex set of is
. There is an edge between and if or . The number of
edges in this graph is
A. B. C. D.
ugcnetcse-aug2016-paper2 graph-theory graph-connectivity
Answer key ☟
10.5.2 Graph Connectivity: UGC NET CSE | December 2010 | Part 2 | Question: 4
A. B. C. D.
ugcnetcse-dec2010-paper2 graph-theory graph-connectivity
Answer key ☟
10.5.3 Graph Connectivity: UGC NET CSE | December 2011 | Part 2 | Question: 15
McCabe’s cyclomatic metric of a graph with vertices, edges and connected component is
A. B. C. D.
ugcnetcse-dec2011-paper2 graph-theory graph-connectivity
Answer key ☟
10.5.4 Graph Connectivity: UGC NET CSE | December 2011 | Part 2 | Question: 5
A. B.
C. D.
ugcnetcse-dec2011-paper2 graph-theory graph-connectivity
Answer key ☟
10.5.5 Graph Connectivity: UGC NET CSE | June 2013 | Part 3 | Question: 15
Answer key ☟
10.5.6 Graph Connectivity: UGC NET CSE | September 2013 | Part 2 | Question: 22
Answer key ☟
10.5.7 Graph Connectivity: UGC NET CSE | September 2013 | Part 2 | Question: 8
Consider an undirected graph G with 100 nodes. The maximum number of edges to be included in G so that the
graph is not connected is
Answer key ☟
A.
B.
C.
D.
Answer key ☟
10.7.1 Graph Planarity: UGC NET CSE | December 2012 | Part 3 | Question: 46
Two graphs A and B are shown below: Which one of the following statements is true?
10.7.2 Graph Planarity: UGC NET CSE | June 2012 | Part 3 | Question: 72
Answer key ☟
10.8.1 Hamiltonian Graph: UGC NET CSE | June 2014 | Part 2 | Question: 23
Consider a complete bipartite graph . For which values of and does this, complete graph have a
Hamilton circuit
A. B.
C. D.
ugcnetcse-june2014-paper2 graph-theory hamiltonian-graph
Answer key ☟
10.9.1 Handshaking Theorem: UGC NET CSE | June 2019 | Part 2 | Question: 4
Suppose that a connected planar graph has six vertices, each of degree four. Into how many regions is the plane
divided by a planar representation of this graph?
A. B. C. D.
ugcnetcse-june2019-paper2 graph-planarity handshaking-theorem
Answer key ☟
10.10.1 Minimum Spanning Tree: UGC NET CSE | Junet 2015 | Part 2 | Question: 21
A.
B.
C.
D.
Answer key ☟
10.11.1 Non Planar: UGC NET CSE | December 2013 | Part 2 | Question: 39
Answer key ☟
Using the property of eccentricity of a vertex, find every vertex that is the centre of the given tree:
Answer key ☟
How many edges are there in a forest of t-trees containing a total of n vertices ?
A. n + t B. n – t C. n ∗ t D. n t
ugcnetcse-dec2013-paper2 data-structures tree
Answer key ☟
Answer Keys
10.0.1 C 10.0.2 D 10.0.3 B 10.0.4 B 10.0.5 B
10.0.6 A 10.0.7 C 10.0.8 C 10.0.9 D 10.0.10 D
10.0.11 C 10.0.12 Q-Q 10.0.13 Q-Q 10.0.14 Q-Q 10.0.15 Q-Q
10.0.16 Q-Q 10.0.17 Q-Q 10.0.18 C 10.0.19 Q-Q 10.0.20 Q-Q
10.0.21 Q-Q 10.0.22 Q-Q 10.1.1 B 10.2.1 C 10.2.2 A
10.3.1 A 10.4.1 D 10.4.2 Q-Q 10.4.3 C 10.5.1 Q-Q
10.5.2 Q-Q 10.5.3 D 10.5.4 D 10.5.5 C 10.5.6 B
10.5.7 C 10.6.1 C 10.7.1 A 10.7.2 D 10.8.1 C
10.9.1 B 10.10.1 B 10.11.1 C 10.12.1 D 10.12.2 B
11 Discrete Mathematics: Mathematical Logic (44)
Which of the following shall be a compound proposition involving the propositions p, q and r, that is true when
exactly two of the p, q and r are true and is false otherwise?
A.
B.
C.
D.
ugcnetcse-june2013-paper2
Answer key ☟
A. True and False B. False and True C. False and False D. True and True
ugcnetcse-june2013-paper2
Answer key ☟
The tracing model in Prolog describes program execution in terms of certain events. These events are
A. call and exit B. call and fail
C. call, exit and redo D. call, exit, redo and fail
ugcnetcse-sep2013-paper3
i. "If Gora gets the job and works hard, then he will be promoted. if Gora gets promotion, then he will be happy. He
will not be happy, therefore, either he will not get the job or he will not work hard."
ii. "Either Puneet is not guilty or Pankaj is telling the truth. Pankaj is not telling the truth, therefore, Puneet is not
guilty."
iii. If is a real number such that , then . Suppose that , then .
A. i and iii B. ii and iii C. i,ii, and iii D. i and ii
ugcnetcse-dec2015-paper2 discrete-mathematics mathematical-logic
Answer key ☟
________ predicate calculus allows quantified variables to refer to objects in the domain of discourse and not to
predicates or functions.
A. Zero-order B. First-order
C. Second-order D. High-order
ugcnetjune2014iii discrete-mathematics mathematical-logic
Answer key ☟
11.0.6 UGC NET CSE | Junet 2015 | Part 2 | Question: 8
"If my computations are correct and I pay the electric bill, then I will run out of money. If I don't pay the electric
bill, the power will be turned off. Therefore, If I don't run out of money and the power is still on then my
computations are incorrect."
Convert this argument into logical notations using the variables for propositions of computations, electric bills,
out of money and the power respectively. (Where means NOT).
A.
B.
C.
D.
ugcnetcse-june2015-paper2 mathematical-logic
Answer key ☟
is
A. B.
C. D.
ugcnetcse-dec2014-paper3 mathematical-logic
Answer key ☟
A. B.
C. D.
ugcnetcse-dec2014-paper3 mathematical-logic
Answer key ☟
A.
B.
C.
D.
ugcnetcse-june2015-paper3 mathematical-logic
Answer key ☟
Let P(m,n) be the statement "m divides n" where the universe of discourse for both the variable is the set of
positive integers. Determine the truth values of each of the following propositions:
i. ,
ii.
iii.
A. a-True, b-True, c-False
B. a-True, b-False, c-False
C. a-False, b-False, c-False
D. a-True, b-True, c-True
Answer key ☟
i.
ii.
iii.
Answer key ☟
A. B.
C. D.
ugcnetcse-june2011-paper2 discrete-mathematics mathematical-logic
Answer key ☟
A. B.
C. D.
ugcnetcse-nov2017-paper2 discrete-mathematics mathematical-logic
Answer key ☟
Match List-I with List-II and choose the correct answer from the code given below :
Answer key ☟
Answer key ☟
Codes:
ugcnetjan2017ii mathematical-logic
Answer key ☟
Answer key ☟
Which of these statements about the floor and ceiling functions are correct ?
Statement 1 : ⌊2x⌋ = ⌊x⌋ + ⌊x + (1/2)⌋ for all real numbers x.
Answer key ☟
If universe of disclosure are all real numbers, then which of the following are true?
(A) ∃x ∀y (x + y = y)
(B) ∀x ∀y (((x ≥ 0) ∧ (y < 0))→ (x - y > 0))
(C) ∃x ∃y (((x ≤ 0) ∧ (y ≤ 0)) ∧ (x - y > 0))
(D) ∀x ∀y ((x ≠ 0) ∧ (y ≠ 0) ↔ (xy ≠ 0))
Choose the correct answer from the options given below:
(1) (A) and (B) Only
(2) (A), (C) and (D) Only
(3) (A), (B) and (D) Only
(4) (A), (B), (C) and (D) Only
Answer key ☟
11.1.1 Countable Uncountable Set: UGC NET CSE | December 2015 | Part 2 | Question: 3
Answer key ☟
11.2.1 First Order Logic: UGC NET CSE | January 2017 | Part 3 | Question: 60
The first order logic (FOL) statement is equivalent to which of the following?
A.
B.
C.
D.
Answer key ☟
11.2.2 First Order Logic: UGC NET CSE | July 2018 | Part 2 | Question: 77
A. It is syntactically valid but does not express the meaning of the English sentence
B. It is syntactically valid and expresses the meaning of the English sentence also
C. It is syntactically invalid but expresses the meaning of the English sentence
D. It is syntactically invalid and does not express the meaning of the English sentence
Answer key ☟
11.2.3 First Order Logic: UGC NET CSE | June 2013 | Part 3 | Question: 69
If we convert
to .
This process is known as
A. Simplification
B. Unification
C. Skolemization
D. Resolution
Answer key ☟
11.2.4 First Order Logic: UGC NET CSE | June 2014 | Part 2 | Question: 19
The notation denotes the proposition “there exists a unique such that is true”. Give the truth
values of the following statements :
I.
II.
A. Both & are true. B. Both & are false.
C. - false, - true D. - true, - false
ugcnetcse-june2014-paper2 mathematical-logic first-order-logic
Answer key ☟
11.2.5 First Order Logic: UGC NET CSE | September 2013 | Part 3 | Question: 1
Which of the following is a correct predicate logic statement for “Every Natural number has one successor”?
A.
B.
C.
D.
first-order-logic ugcnetcse-sep2013-paper3
Answer key ☟
Answer key ☟
11.4.1 Group Theory: UGC NET CSE | December 2015 | Part 2 | Question: 10
Which of the following property/ies a Group G must hold, in order to be an Abelian group?
Answer key ☟
How many atoms are matched to the variable 'X' before the query father(X, Jane) reports a Result?
A. B. C. D.
ugcnetcse-dec2015-paper3 mathematical-logic prolog non-gatecse
Answer key ☟
11.6.1 Propositional Logic: Computer Science - UGC NET 2021 [ Question ID = 2351 ]
Answer key ☟
11.6.2 Propositional Logic: UGC NET CSE | December 2006 | Part 2 | Question: 2
A. B. C. D.
Answer key ☟
11.6.3 Propositional Logic: UGC NET CSE | December 2013 | Part 2 | Question: 34
Let P(m,n) be the statement "m divides n" where the universe of discourse for both the variable is the set of
positive integers. Determine the truth values of each of the following propositions:
I. ,
II.
A. Both I and II are true B. Both I and II are false
C. I-false & II-true D. I-true& II-false
ugcnetcse-dec2013-paper2 discrete-mathematics propositional-logic
Answer key ☟
11.6.4 Propositional Logic: UGC NET CSE | December 2015 | Part 3 | Question: 44
A. B.
C. D.
ugcnetcse-dec2015-paper3 propositional-logic mathematical-logic
Answer key ☟
11.6.5 Propositional Logic: UGC NET CSE | January 2017 | Part 2 | Question: 6
is the premise :
A. B. C. D.
ugcnetjan2017ii discrete-mathematics propositional-logic
Answer key ☟
11.6.6 Propositional Logic: UGC NET CSE | January 2017 | Part 3 | Question: 59
Answer key ☟
11.6.7 Propositional Logic: UGC NET CSE | June 2009 | Part 2 | Question: 25
A.
B.
C.
D. None
ugcnetcse-june2009-paper2 propositional-logic
Answer key ☟
11.6.8 Propositional Logic: UGC NET CSE | June 2014 | Part 2 | Question: 20
Give a compound proposition involving propositions and that is true when exactly two of and are
true and is false otherwise
A.
B.
C.
D.
Answer key ☟
11.6.9 Propositional Logic: UGC NET CSE | June 2019 | Part 2 | Question: 6
Answer key ☟
11.6.10 Propositional Logic: UGC NET CSE | June 2019 | Part 2 | Question: 8
ugcnetcse-june2019-paper2 propositional-logic
Answer key ☟
11.6.11 Propositional Logic: UGC NET CSE | Junet 2015 | Part 2 | Question: 10
Answer key ☟
11.6.12 Propositional Logic: UGC NET CSE | Junet 2015 | Part 2 | Question: 9
A. B.
C. D.
ugcnetcse-june2015-paper2 mathematical-logic propositional-logic
Answer key ☟
11.6.13 Propositional Logic: UGC NET CSE | October 2020 | Part 2 | Question: 61
i.
ii.
iii.
iv.
Answer key ☟
11.6.14 Propositional Logic: UGC NET CSE | October 2022 | Part 1 | Question: 85
Consider as logical variables. Identify which of the following represents correct logical equivalence :
(A)
(B)
(C)
(D)
Choose the correct answer from the options given below :
A. (A) and (D) only B. (B) and (C) only, C. (A) and (C) only D. (B) and (D) only
ugcnetcse-oct2022-paper1 propositional-logic
11.6.15 Propositional Logic: UGC NET CSE | September 2013 | Part 2 | Question: 24
The quantification denotes the proposition “There exists a unique x such that P(x) is true”, express he
quantification using universal and existential quantifications and logical operators?
A.
B.
C.
D.
Answer key ☟
i. Reflexive
ii. Antisymmetric
iii. Symmetric
Answer key ☟
Answer Keys
11.0.1 C 11.0.2 D 11.0.3 D 11.0.4 B 11.0.5 B
11.0.6 A 11.0.7 C 11.0.8 B 11.0.9 A 11.0.10 A
11.0.11 X 11.0.12 Q-Q 11.0.13 A;B 11.0.14 D 11.0.15 A
11.0.16 A 11.0.17 C 11.0.18 Q-Q 11.0.19 Q-Q 11.1.1 D
11.2.1 B 11.2.2 A 11.2.3 C 11.2.4 A 11.2.5 A
11.3.1 Q-Q 11.4.1 D 11.5.1 A 11.6.1 Q-Q 11.6.2 Q-Q
11.6.3 C 11.6.4 B;C 11.6.5 A;B;C;D 11.6.6 B 11.6.7 Q-Q
11.6.8 D 11.6.9 A 11.6.10 D 11.6.11 C 11.6.12 A
11.6.13 D 11.6.14 Q-Q 11.6.15 C 11.7.1 D
12 Discrete Mathematics: Set Theory & Algebra (20)
How many difference equivalence relations with exactly three different equivalence classes are there on a set
with five elements?
A. 10 B. 15 C. 25 D. 30
ugcnetcse-july2016-paper2 discrete-mathematics set-theory&algebra
Answer key ☟
Find the zero-one matrix of the transitive closure of the relation given by the matrix :
A.
B.
C.
D.
ugcnetcse-june2019-paper2 set-theory&algebra
Answer key ☟
If then is :
A. B. C. D. None of these
ugcnetcse-dec2004-paper2
Answer key ☟
A. B. C. D.
ugcnetcse-june2019-paper2 boolean function
Answer key ☟
Given
Answer key ☟
12.3.1 Euler Phi Function: UGC NET CSE | June 2019 | Part 2 | Question: 70
Answer key ☟
How many multiples of are there between the following pairs of numbers?
Answer key ☟
12.5.1 Function Composition: UGC NET CSE | December 2013 | Part 2 | Question: 37
Let f and g be the functions from the set of integers defined by and . Then the
composition of f and g and g and f is given as
A. 6x+7, 6x+11 B. 6x+11, 6x+7
C. 5x+5, 5x+5 D. None of the above
ugcnetcse-dec2013-paper2 algebra function-composition
Answer key ☟
Answer key ☟
A. and
B. and
C. and
D. and
Answer key ☟
If F and G are Boolean functions of degree n. Then, which of the following is true?
A. F F + G and F G F B. G F + G and F G G
C. F F + G and F G F D. G F + G and F G F
functions ugcnetsep2013ii
Answer key ☟
12.7.1 Inclusion Exclusion: UGC NET CSE | October 2020 | Part 2 | Question: 1
The number of positive integers not exceeding that are either odd or the square of an integer is _______
A. B. C. D.
ugcnetcse-oct2020-paper2 discrete-mathematics inclusion-exclusion
Answer key ☟
Answer key ☟
12.9 Power Set (1)
12.9.1 Power Set: UGC NET CSE | December 2012 | Part 2 | Question: 4
A. B.
C. D.
ugcnetcse-dec2012-paper2 set-theory&algebra set-theory power-set
Answer key ☟
12.10.1 Relational Algebra: UGC NET CSE | December 2008 | Part 2 | Question: 12
Answer key ☟
If she is my friend and you are her friend, then we are friends. Given this, the friend relationship in this context
is ____________.
(B) (iii)
Answer key ☟
Suppose that and are reflecive relations on a set A. Which of the following statements is correct?
Answer key ☟
B.
C.
D.
Answer key ☟
" is a clone of " means is identical to in terms of the physical attributes namely, height, weight and
complexion. Given, height, weight and complexion only form a complete set of attributes for an entity, cloning
is an equivalence relation. What is your impression about this statement ?
Answer key ☟
Answer key ☟
Answer Keys
12.0.1 C 12.0.2 A 12.0.3 Q-Q 12.1.1 A 12.2.1 C
12.3.1 A 12.4.1 C 12.5.1 A 12.6.1 D 12.6.2 D
12.6.3 A 12.7.1 C 12.8.1 D 12.9.1 B 12.10.1 Q-Q
12.11.1 Q-Q 12.11.2 C 12.11.3 Q-Q 12.11.4 Q-Q 12.11.5 B
13 Engineering Mathematics: Discrete Mathematics (36)
I.
II.
where and are real numbers. Then which of the following is valid?
Answer key ☟
How many relations are there on a set with n elements that are symmetric and a set with n elements that are
reflexive and symmetric?
A. B.
C. D.
ugcnetcse-june2012-paper3 discrete-mathematics set-theory&algebra
Answer key ☟
Consider a set .
How many members of A shall be divisible by or by or by both and ?
Answer key ☟
The objective of ____ procedure is to discover at least one ____ that causes two literals to match.
A. unification, validation B. unification, substituion
C. substitution, unification D. minimax, maximum
ugcnetcse-dec2013-paper3 discrete-mathematics mathematical-logic
Answer key ☟
Answer key ☟
13.0.6 UGC NET CSE | July 2018 | Part 2 | Question: 86
If then is
A. Z B. Q C. R D. C
ugcnetcse-july2018-paper2 discrete-mathematics
Answer key ☟
Let be a simple undirected graph, be a DFS tree on , and be the BFS tree on . Consider the
following statements.
Statement : No edge of is a cross with respect to
Statement : For every edge of , if is at depth and is at depth in then
In the light of the above statements, choose the correct answer from the options given below
Answer key ☟
If is my friend, and is perfect, then correct logical translation of the statement “some of my
friends are not perfect” is ______
A. B.
C. D.
ugcnetcse-oct2020-paper2 discrete-mathematics mathematical-logic
Answer key ☟
Let be a directed graph whose vertex set is the set of numbers from to . There is an edge from a vertex
to a vertex if and only if either or . The minimum number of edges in a path in from vertex
to vertex is ______
A. B. C. D.
ugcnetcse-oct2020-paper2 discrete-mathematics graph-theory
Answer key ☟
A. and
B. and
C. and
D. and
Answer key ☟
13.1.1 Boolean Function: UGC NET CSE | August 2016 | Part 2 | Question: 1
A. B. C. D.
ugcnetcse-aug2016-paper2 discrete-mathematics boolean-function
Answer key ☟
where
A. B. C. D.
ugcnetcse-dec2012-paper3 discrete-mathematics combinatory
Answer key ☟
How many solutions are there for the equation subject to the constraints that
?
Answer key ☟
13.3.1 Equivalence Class: UGC NET CSE | July 2018 | Part 2 | Question: 89
Which of the following is an equivalence relation on the set of all functions from Z to Z?
A.
B.
C.
D.
Answer key ☟
Answer key ☟
13.4.2 First Order Logic: UGC NET CSE | October 2020 | Part 2 | Question: 40
Answer key ☟
A. B.
C. D.
ugcnetcse-dec2011-paper2 discrete-mathematics functions
Answer key ☟
Answer key ☟
13.6.1 Group Theory: UGC NET CSE | June 2012 | Part 3 | Question: 67
Answer key ☟
13.7.1 Linear Programming: UGC NET CSE | July 2016 | Part 3 | Question: 70
Answer key ☟
13.8.1 Number Representation: UGC NET CSE | December 2011 | Part 2 | Question: 34
Answer key ☟
13.9.1 Partial Order: UGC NET CSE | December 2010 | Part 2 | Question: 3
A partially ordered set is said to be a lattice if every two elements in the set have
Answer key ☟
13.9.2 Partial Order: UGC NET CSE | July 2018 | Part 2 | Question: 90
Answer key ☟
13.10.1 Propositional Logic: UGC NET CSE | August 2016 | Part 2 | Question: 2
Let us assume that you construct ordered tree to represent the compound proposition
.
Then, the prefix expression and post-fix expression determined using this ordered tree are given as _____ and
______ respectively.
A.
B.
C.
D.
Answer key ☟
13.10.2 Propositional Logic: UGC NET CSE | August 2016 | Part 3 | Question: 70
Let mean is a vegetarian, for is meat, and for eats . Based on these, consider the
following sentences :
I.
II.
III.
One can determine that
A. Only and are equivalent sentences B. Only and are equivalent sentences.
C. Only and are equivalent sentence . D. and are equivalent sentences.
ugcnetcse-aug2016-paper3 discrete-mathematics propositional-logic
Answer key ☟
13.10.3 Propositional Logic: UGC NET CSE | August 2016 | Part 3 | Question: 74
Answer key ☟
13.10.4 Propositional Logic: UGC NET CSE | December 2011 | Part 2 | Question: 43
Answer key ☟
13.10.5 Propositional Logic: UGC NET CSE | December 2012 | Part 3 | Question: 75
Let be the statement “x+y=z” and let there be two quantification given as
I.
II.
where x, y, z are real numbers, then which one of the following is correct?
A. I is true and II is true B. I is true and II is false
C. I is false and II is true D. I is false and II is false
ugcnetcse-dec2012-paper3 discrete-mathematics propositional-logic
Answer key ☟
13.10.6 Propositional Logic: UGC NET CSE | December 2015 | Part 2 | Question: 8
A. B.
C. D.
ugcnetcse-dec2015-paper2 discrete-mathematics propositional-logic
Answer key ☟
13.10.7 Propositional Logic: UGC NET CSE | July 2018 | Part 2 | Question: 76
a. False True
b. If
Answer key ☟
13.10.8 Propositional Logic: UGC NET CSE | Junet 2015 | Part 3 | Question: 57
Answer key ☟
13.11 Quantifiers (1)
The equivalence of is
A.
B.
C.
D.
Answer key ☟
Answer key ☟
13.13.1 Set Theory: UGC NET CSE | August 2016 | Part 2 | Question: 3
Let and be sets in a finite universal set . Given the following : and
Which of the following is in order of increasing size ?
A.
B.
C.
D.
Answer key ☟
13.13.2 Set Theory: UGC NET CSE | December 2012 | Part 3 | Question: 34
A. 256 B. 64 C. 16 D. 4
ugcnetcse-dec2012-paper3 engineering-mathematics discrete-mathematics set-theory
Answer key ☟
Answer Keys
13.0.1 B 13.0.2 D 13.0.3 C 13.0.4 B 13.0.5 B
13.0.6 Q-Q 13.0.7 C 13.0.8 A 13.0.9 B 13.0.10 D
13.0.11 D 13.1.1 Q-Q 13.2.1 D 13.2.2 B 13.3.1 Q-Q
13.4.1 C 13.4.2 B 13.5.1 Q-Q 13.5.2 C 13.6.1 C
13.7.1 A 13.8.1 Q-Q 13.9.1 Q-Q 13.9.2 Q-Q 13.10.1 Q-Q
13.10.2 Q-Q 13.10.3 Q-Q 13.10.4 Q-Q 13.10.5 B 13.10.6 A
13.10.7 Q-Q 13.10.8 B 13.11.1 Q-Q 13.12.1 Q-Q 13.13.1 D
13.13.2 B
14 Engineering Mathematics: Linear Algebra (3)
Which homogeneous matrix transforms the figure (a) on the left side to figure (b) on the right?
A.
B.
C.
D.
ugcnetcse-dec2018-paper2
Answer key ☟
is called :
A. Identity law B. De Morgan’s law
C. Idempotent law D. Complement law
ugcnetcse-dec2004-paper2
Answer key ☟
Let be a real matrix. Suppose 1 and -1 are two of the three Eigen values of and 18 is one of the Eigen
values of . Then
A box contains six red balls and four green balls. Four balls are selected at random from the box. What is the
probability that two of the selected balls are red and two are green ?
A. B. C. D.
ugcnetcse-dec2007-paper2
Answer key ☟
15.1.1 Binary Tree: UGC NET CSE | July 2018 | Part 2 | Question: 25
A text is made up of the characters A, B, C, D, E each occurring with the probability 0.08, 0.40, 0.25, 0.15 and
0.12 respectively. The optimal coding will have the average length of
Answer key ☟
15.2.1 Joint Distribution: UGC NET CSE | December 2018 | Part 2 | Question: 100
A full joint distribution for the Toothache, Cavity and Catch is given in the table below.
Toothache Toothache
Catch Catch Catch Catch
Cavity
Cavity
What is the probability of Cavity, given evidence of Toothache?
A. B.
C. D.
ugcnetcse-dec2018-paper2 joint-distribution probability non-gatecse
Answer key ☟
15.3.1 Poisson Distribution: UGC NET CSE | December 2011 | Part 2 | Question: 27
The multiuser operating system, requests are made to use a particular resource per hour, on an average the
probability that no request are made in minutes is
A. B. C. D.
ugcnetcse-dec2011-paper2 probability poisson-distribution
Answer key ☟
What is the probability that a randomly selected bit string of length 10 is a palindrome ?
A. B. C. D.
ugcnetcse-aug2016-paper2 probability
Answer key ☟
An experimental file server is up % of the time and down for % of the time due to bugs. How many times
does this file server have to be replicated to give an availability of at least % ?
A. B. C. D.
ugcnetcse-aug2016-paper3 probability
Answer key ☟
What is the probability of choosing correctly an unknown integer between and with chances ?
A. B. C. D.
ugcnetcse-dec2011-paper2 probability
Answer key ☟
A box contains six red balls and four green balls. Four balls are selected at random from the box. What is the
probability that two of the selected balls will be red and two will be in green?
A. B. C. D.
ugcnetcse-dec2018-paper2 probability
Answer key ☟
There are three cards in a box. Both sides of one card are black, both sides of one card are red and the third card
has one black side and one red side. We pick a card at random and observe only one side. What is the probability
that the opposite side is the same colour as the one side we observed?
Answer key ☟
Consider the set of all possible five-card poker hands dealt fairly from a standard deck of fifty-two cards. How
many atomic events are there in the joint probability distribution?
Answer key ☟
Digital data received from a sensor can fill up 0 to 32 buffers. Let the sample space be
where the sample denote that of the buffers are full and . Let A denote the event that the
even number of buffers are full. Then is
Answer key ☟
Considering an experiment of tossing two fair dice, one black and one red. What is the probability that the
number on the black die divides the number on red die?
A. B. C. D.
ugcnetcse-june2015-paper2 probability
Answer key ☟
How many people must there be in a room before there is a 50% chance that two of them were born on the same
day of the year?
Answer key ☟
Answer Keys
15.0.1 Q-Q 15.1.1 Q-Q 15.2.1 Q-Q 15.3.1 A 15.4.1 Q-Q
15.4.2 Q-Q 15.4.3 Q-Q 15.4.4 Q-Q 15.4.5 B 15.4.6 Q-Q
15.4.7 Q-Q 15.4.8 C 15.4.9 A
16 General Aptitude: Analytical Aptitude (1)
A. B. C. D.
ugcnetcse-june2023-paper1 logical-reasoning analytical-aptitude number-series
Answer key ☟
Answer Keys
16.1.1 Q-Q
17 General Aptitude: Quantitative Aptitude (27)
A computer program selects an integer in the set at random and prints out the result.
This process is repeated 1 million times. What is the probability that the value k = 1 appears in the printout
atleast once ?
A. B. C. D.
ugcnetcse-dec2014-paper2 quantitative-aptitude
Answer key ☟
A. B. C. D.
ugcnetcse-dec2010-paper2 quantitative-aptitude
Answer key ☟
Consider the problem of connecting lamps to a single electric outlet by using extension cords each of which
has four outlets. The number of extension cords required is
A. B. C. D.
ugcnetcse-dec2010-paper2 quantitative-aptitude
Answer key ☟
For a country CO2 emissions (million metric tons) from various sectors are given in the following table.
Sector
Year Power Industry Commercial Agriculture Domestic
2005 500 200 150 80 100
2006 600 300 200 90 110
2007 650 320 250 100 120
2008 700 400 300 150 150
2009 800 450 320 200 180
What is the average annual growth rate of CO2 emissions in power sector ?
(A) ~12.57% (B) ~16.87%
(C) ~30.81% (D) ~50.25%
The world population growth rate at a certain reference year was 3.5%. Assuming exponential growth of
population, after how many years, the population of the world would have increased by a factor 16 ?
(A) ~ 80 years (B) ~ 40 years
(C) ~ 160 years (D) ~ 320 years
Answer: A
could you please explain the step?
Answer key ☟
If the time is now O' clock, what will be the time hours from now?
Answer key ☟
Consider a vocabulary with only four propositions A, B, C and D. How many models are there for the following
sentence?
A. 10 B. 12 C. 15 D. 16
ugcnetcse-july2018-paper2 quantitative-aptitude
Answer key ☟
Consider the following table that shows the number (in lakhs) of different sizes of LED television sets sold by a
company over the last seven years from to . Answer the question based on the data contained in the
table:
Sale of LED Television sets (in lakhs) of different sizes (in inches)
Answer key ☟
Consider the following table that shows the number (in lakhs) of different sizes of LED television sets sold by a
company over the last seven years from to . Answer the question based on the data contained in the
table:
Sale of LED Television sets (in lakhs) of different sizes (in inches)
What is the total sale of Television sets of size -inches (in lakhs) over all the seven years?
A. B. C. D.
ugcnetcse-june2019-paper1 general-aptitude quantitative-aptitude
Answer key ☟
Consider the following table that shows the number (in lakhs) of different sizes of LED television sets sold by a
company over the last seven years from to . Answer the question based on the data contained in the
table:
Sale of LED Television sets (in lakhs) of different sizes (in inches)
What is the difference in the number of -inch Television sets sold in and
A. B. C. D.
ugcnetcse-june2019-paper1 general-aptitude quantitative-aptitude
Answer key ☟
Consider the following table that shows the number (in lakhs) of different sizes of LED television sets sold by a
company over the last seven years from to . Answer the question based on the data contained in the
table:
Sale of LED Television sets (in lakhs) of different sizes (in inches)
For which size LED Television sets in the total sales of all seven years the maximum?
A. – inch Television B. – inch Television
C. – inch Television D. – inch Television
ugcnetcse-june2019-paper1 general-aptitude quantitative-aptitude
Answer key ☟
Consider the following table that shows the number (in lakhs) of different sizes of LED television sets sold by a
company over the last seven years from to . Answer the question based on the data contained in the
table:
Sale of LED Television sets (in lakhs) of different sizes (in inches)
What was the approximate percentage increase/decrease in the sales of -inch LED Television sets in compared
to that in ?
A. B. C. D.
ugcnetcse-june2019-paper1 general-aptitude quantitative-aptitude
Answer key ☟
Given below are two premises with four conclusions drawn from them. Which of the following conclusions
could be validly drawn from the premises?
Premises:
i. No paper is pen
ii. Some paper are handmade
Conclusions:
A. All paper are handmade B. Some handmade are pen
C. Some handmade are not pen D. All handmade are paper
ugcnetcse-june2019-paper1 general-aptitude quantitative-aptitude
Answer key ☟
A sum of money doubles at compound interest in 6 years. In how many years it will become times?
Answer key ☟
In a new budget, the price of petrol rose by . By how much percent must a person reduce his consumption
so that his expenditure on it does not increase?
A. B. C. D.
ugcnetcse-june2019-paper1 general-aptitude quantitative-aptitude
Answer key ☟
If is divided into four parts proportional to , , and , then the smallest part is
A. B. C. D.
ugcnetcse-june2019-paper1 general-aptitude quantitative-aptitude
Answer key ☟
17.0.17 UGC NET CSE | June 2019 | Part 1 | Question: 22
A. B. C. D.
ugcnetcse-june2019-paper1 general-aptitude quantitative-aptitude
Answer key ☟
The following table gives the percentage of marks obtained by students in different subjects in an
examination. The numbers in the parenthesis give the maximum marks in each subject. Answer the given
questions based on the table:
In which subject the performance of the students is worst in terms of percentage of marks?
Answer key ☟
17.1.1 Data Interpretation: UGC NET CSE | October 2020 | Part 1 | Question: 1
The following table shows total number of students in the Department of the Institute along with percentage of
Females and Male students. Answer the question based on the data given below:
What is the respective ratio of the number of females in Mechanical Department to the number of females in
Electronics Department?
A. B. C. D.
ugcnetcse-oct2020-paper1 general-aptitude quantitative-aptitude data-interpretation
Answer key ☟
17.1.2 Data Interpretation: UGC NET CSE | October 2020 | Part 1 | Question: 2
The following table shows total number of students in the Department of the Institute along with percentage of
Females and Male students. Answer the question based on the data given below:
A. B. C. D.
ugcnetcse-oct2020-paper1 general-aptitude quantitative-aptitude data-interpretation
Answer key ☟
17.1.3 Data Interpretation: UGC NET CSE | October 2020 | Part 1 | Question: 3
The following table shows total number of students in the Department of the Institute along with percentage of
Females and Male students. Answer the question based on the data given below:
What is the total number of male students in Computer and Mining Department together?
A. B. C. D.
ugcnetcse-oct2020-paper1 general-aptitude quantitative-aptitude data-interpretation
Answer key ☟
17.1.4 Data Interpretation: UGC NET CSE | October 2020 | Part 1 | Question: 4
The following table shows total number of students in the Department of the Institute along with percentage of
Females and Male students. Answer the question based on the data given below:
What is the ratio of the number of females in Civil and Electrical departments together to the number of males in the
same departments together?
A. B. C. D.
ugcnetcse-oct2020-paper1 general-aptitude quantitative-aptitude data-interpretation
Answer key ☟
17.1.5 Data Interpretation: UGC NET CSE | October 2020 | Part 1 | Question: 5
The following table shows total number of students in the Department of the Institute along with percentage of
Females and Male students. Answer the question based on the data given below:
A. B. C. D.
ugcnetcse-oct2020-paper1 general-aptitude quantitative-aptitude data-interpretation
Answer key ☟
17.2.1 Number System: UGC NET CSE | June 2011 | Part 2 | Question: 1
A. B. C. D.
ugcnetcse-dec2011-paper2 quantitative-aptitude number-system
Answer key ☟
Suppose that from given statistics, it is known that meningitis causes stiff neck 50% of the time, that the
proportion of persons having meningitis is , and that the proportion od people having stiff neck is . Then
the percentage of people who had meningtis and complain about stiff neck is:
17.4.1 Quadratic Equations: UGC NET CSE | October 2020 | Part 2 | Question: 8
What is the radix of the numbers if the solution to the quadratic equation is and ?
A. B. C. D.
ugcnetcse-oct2020-paper2 quadratic-equations
Answer key ☟
If and can complete a piece of work in and days respectively, they together will complete the work
in
Answer key ☟
Answer Keys
17.0.1 C 17.0.2 B 17.0.3 Q-Q 17.0.4 Q-Q 17.0.5 Q-Q
17.0.6 A 17.0.7 Q-Q 17.0.8 D 17.0.9 D 17.0.10 A
17.0.11 C 17.0.12 B 17.0.13 C 17.0.14 B 17.0.15 C
17.0.16 D 17.0.17 B 17.0.18 Q-Q 17.1.1 B 17.1.2 D
17.1.3 C 17.1.4 D 17.1.5 A 17.2.1 Q-Q 17.3.1 B
17.4.1 D 17.5.1 Q-Q
18 General Aptitude: Verbal Aptitude (8)
Given two jugs of capacities 5 litres and 3 litres with no measuring marks on them. Then the minimum number
of states to measure 4 litres of water will be
A. 3 B. 4 C. 5 D. 7
ugcnetcse-june2013-paper3 quantitative-aptitude general-aptitude
Answer key ☟
A knowledge base contains just one sentence, . Consider the following two sentences
obtained after applying existential instantiation.
ugcnetcse-july2018-paper2 verbal-aptitude
Answer key ☟
‘All republics are grateful’ and ‘Some republics are not grateful’ cannot both be true, and they cannot both be
false. This is called as
Answer key ☟
If the proposition ‘Houses are not bricks’ is taken to be False then which of the following propositions can be
True?
Answer key ☟
18.0.5 UGC NET CSE | June 2019 | Part 1 | Question: 21
Answer key ☟
Answer key ☟
18.1.1 Logical Reasoning: UGC NET CSE | June 2019 | Part 1 | Question: 29
Answer key ☟
18.1.2 Logical Reasoning: UGC NET CSE | June 2019 | Part 1 | Question: 30
The proposition ‘No historians are non-mathematician’ is equivalent to which of the following proposition?
Answer key ☟
Answer Keys
18.0.1 D 18.0.2 Q-Q 18.0.3 B 18.0.4 D 18.0.5 C
18.0.6 A 18.1.1 B 18.1.2 A
19 Non GATE CSE: Big Data Systems (1)
19.1.1 Big Data Systems: UGC NET CSE | October 2020 | Part 2 | Question: 13
A. Worker Node and Master Node respectively B. Master Node and Worker Node respectively
C. Both Worker Nodes D. Both Master Nodes
ugcnetcse-oct2020-paper2 non-gatecse big-data-systems
Answer key ☟
Answer Keys
19.1.1 A
20 Non GATE CSE: Cloud Computing (2)
20.1.1 Cloud Computing: UGC NET CSE | December 2018 | Part 2 | Question: 64
Suppose a cloud contains software stack such as Operating systems, Application softwares, etc. This model is
referred as ____ model
A. B. C. D.
ugcnetcse-dec2018-paper2 cloud-computing
Answer key ☟
20.1.2 Cloud Computing: UGC NET CSE | October 2020 | Part 2 | Question: 58
Which of the following cloud concept/s is/are related to pooling and sharing of resources?
i. Virtual Memory
ii. Service
iii. Virtualization
Answer key ☟
Answer Keys
20.1.1 Q-Q 20.1.2 A
21 Non GATE CSE: Computer Graphics (83)
homogeneous coordinates. Which of the following statements about the matrix M is True?
Answer key ☟
A matrix which mirrors any point about the -axis, is a rotation matrix.
What can you say about the statements and ?
A. Both and are true B. Only is true
C. Only is true D. Both and are false
ugcnetcse-june2019-paper2 2d-transformation
Answer key ☟
Which of the following statements is/are True regarding the solution of the visibility problem in 3D graphics?
S1: The painter's algorithm sorts polygons by depth and then paints (scan - converts) each Polygon on to the
screen starting with the most nearest polygon
S2: Backface Culling refers to eliminating geometry with backfacing normals
Answer key ☟
In the context of 3D computer graphics, which of the following statements is/are true?
P : Orthographic transformations keep parallel lines parallel.
Q : Orthographic transformations are affine transformations.
Select the correct answer from the options given below:
Answer key ☟
Answer key ☟
Answer key ☟
21.6.1 Anti Aliasing: UGC NET CSE | September 2013 | Part 3 | Question: 61
Answer key ☟
21.7.1 Breshenmans Algorithm: UGC NET CSE | July 2016 | Part 3 | Question: 13
Consider the Breshenman's circle generation algorithm for plotting a circle with centre (0,0) and radius 'r' unit in
first quadrant. If the current point is and decision parameter is then what will be the next point
and updates decision parameter for ?
A.
B.
C.
D.
Answer key ☟
21.8 Color Models (1)
21.8.1 Color Models: UGC NET CSE | September 2013 | Part 3 | Question: 62
Answer key ☟
21.9.1 Computer Graphics: Computer Science - UGC NET 2021 [ Question ID = 2338 ]
What is the transformation matrix M that transforms a square in the xy plane defined by (1, 1), (-1, 1), (-1, -
1), (1, -1) to a parallelogram whose corresponding vertices are (2, 1), (0,1), (-2, -1), and (0, -1) ?
A. 1 1 0 B. 1 0 0
010 110
001 001
C. 1 1 1 D. 1 1 0
010 110
001 001
computer-graphics
Answer key ☟
21.9.2 Computer Graphics: Computer Science - UGC NET 2021 [ Question ID = 2339 ]
Suppose a Bezier curve P(t) is defined by the following four control points in the xy - plane : P0 = (-2,0); P1 =
(-2,4); P2 = (2,4); and P3 = (2,0). Then which of the following statements are correct ?
21.9.3 Computer Graphics: Computer Science - UGC NET 2021 [ Question ID = 2340 ]
21.9.4 Computer Graphics: UGC NET CSE | December 2012 | Part 3 | Question: 12
Let and , then the angle between and and a vector perpendicular to both
and shall be
A. B.
C. D.
ugcnetcse-dec2012-paper3 computer-graphics
Answer key ☟
21.9.5 Computer Graphics: UGC NET CSE | December 2012 | Part 3 | Question: 33
The Z-buffer algorithm is used for Hidden surface removal of objects. The maximum number of objects that can
be handled by this algorithm shall
Answer key ☟
21.9.6 Computer Graphics: UGC NET CSE | December 2012 | Part 3 | Question: 6
ugcnetcse-dec2012-paper3 computer-graphics
Answer key ☟
21.9.7 Computer Graphics: UGC NET CSE | December 2013 | Part 3 | Question: 62
Answer key ☟
21.9.8 Computer Graphics: UGC NET CSE | December 2013 | Part 3 | Question: 63
Answer key ☟
21.9.9 Computer Graphics: UGC NET CSE | December 2013 | Part 3 | Question: 64
Which of the following points lies on the same side as the origin, with reference to the line 3x+7y=2?
Answer key ☟
21.9.10 Computer Graphics: UGC NET CSE | December 2013 | Part 3 | Question: 65
The transformation required for conversion of CMY colour model to RGB colour model is given as:
A.
B.
C.
D.
Answer key ☟
21.9.11 Computer Graphics: UGC NET CSE | December 2013 | Part 3 | Question: 66
What steps shall be required to rotate an object from point (as shown in fig. 1) and its placement such that
what was at is now reduced and is at (as shown in fig. 2)?
I. Translate to origin
II. Scale as required
III. Rotate
IV. Translate to the final position
A. I, II and III B. II, III and IV C. I, III and IV D. All of the above
ugcnetcse-dec2013-paper3 computer-graphics non-gatecse
Answer key ☟
21.9.12 Computer Graphics: UGC NET CSE | December 2014 | Part 3 | Question: 15
A technique used to approximate halftones without reducing spatial resolution is known as________.
A. Halftoning B. Dithering
C. Error diffusion D. None of the above
ugcnetcse-dec2014-paper3 computer-graphics non-gatecse
Answer key ☟
21.9.13 Computer Graphics: UGC NET CSE | December 2015 | Part 3 | Question: 33
Which of the following graphic primitives are considered as the basic building blocks of computer graphics?
i. Points
ii. Lines
iii. Polylines
iv. Polygons
A. B. C. D.
ugcnetcse-dec2015-paper3 computer-graphics
Answer key ☟
21.9.14 Computer Graphics: UGC NET CSE | December 2015 | Part 3 | Question: 50
Answer key ☟
21.9.15 Computer Graphics: UGC NET CSE | December 2015 | Part 3 | Question: 67
i. Flooding gun
ii. Collector
iii. Phosphorus grains
iv. Ground
A. B.
C. D. All of the above
ugcnetcse-dec2015-paper3 computer-graphics
Answer key ☟
21.9.16 Computer Graphics: UGC NET CSE | December 2015 | Part 3 | Question: 69
Which raster locations would be chosen by Bresenham's algorithm when scan converting a line from to
?
A.
B.
C.
D.
ugcnetcse-dec2015-paper3 computer-graphics
Answer key ☟
21.9.17 Computer Graphics: UGC NET CSE | December 2015 | Part 3 | Question: 70
Consider a unit square centered at origin. The coordinates at the square are translated by a factor and
rotated by an angle of . What shall be the coordinates of the new square?
A.
B.
C.
D.
ugcnetcse-dec2015-paper3 computer-graphics
Answer key ☟
21.9.18 Computer Graphics: UGC NET CSE | January 2017 | Part 3 | Question: 16
Below are the few steps given for scan-converting a circle using Bresenham’s Algorithm. Which of the given
steps is not correct?
A. Compute (where is radius) B. Stop if
C. If , then and D. If , then and
ugcnetcse-jan2017-paper3 non-gatecse computer-graphics
Answer key ☟
21.9.19 Computer Graphics: UGC NET CSE | January 2017 | Part 3 | Question: 17
i. Aliasing
ii. Unequal intensity of diagonal lines
iii. Overstriking in photographic applications
iv. Local or Global aliasing
A. B.
C. D.
ugcnetcse-jan2017-paper3 non-gatecse computer-graphics
Answer key ☟
21.9.20 Computer Graphics: UGC NET CSE | January 2017 | Part 3 | Question: 18
Consider a line with and . Apply a simple algorithm and compute the first four
plots on this line.
A. B.
C. D.
ugcnetcse-jan2017-paper3 non-gatecse computer-graphics
Answer key ☟
21.9.21 Computer Graphics: UGC NET CSE | July 2016 | Part 3 | Question: 15
Let R be the rectangular window against which the lines are to be clipped using 2D Sutherland-Cohen line
clipping algorithm. The rectangular window has lower rectangular corner at (-5, 1) and upper right-hand corner
at (3, 7). Consider the following three lines for clipping with the given end-point coordinates?
Line AB:A(-6,2) and B(-1,8)
Line CD: C(-1,5) and D(4,8)
Line EF: E(-2,3) and F(1,2)
Which of the following lines is/are candidate for clipping?
A. AB B. DC C. EF D. AB and CD
ugcnetcse-july2016-paper3 computer-graphics
Answer key ☟
21.9.22 Computer Graphics: UGC NET CSE | July 2016 | Part 3 | Question: 17
Let us consider that the original point is (x,y) and new transformed point is (x’,y’). Further Sh and Sh are
shearing factors in x and y directions. If we perform the y direction shear relative to x=s then the transformed
point is given by
A. B.
C. D.
ugcnetcse-july2016-paper3 computer-graphics
Answer key ☟
21.9.23 Computer Graphics: UGC NET CSE | July 2016 | Part 3 | Question: 18
Which of the following statements is/are correct with reference to curve generation?
Answer key ☟
21.9.24 Computer Graphics: UGC NET CSE | July 2018 | Part 2 | Question: 8
A graphic display system has a frame buffer that is 640 pixels high , 480 pixels high and 1 bit of color depth. If
the access time for each pixel on the average is 200 nanoseconds, then the refresh rate of this frame buffer is
approximately:
A. 16 frames per second B. 19 frames per second
C. 21 frames per second D. 23 frames per second
ugcnetcse-july2018-paper2 computer-graphics
Answer key ☟
21.9.25 Computer Graphics: UGC NET CSE | June 2012 | Part 3 | Question: 14
If the pixels of an image are shuffled then the parameter that may change is
Answer key ☟
21.9.26 Computer Graphics: UGC NET CSE | June 2012 | Part 3 | Question: 63
If a and b are the end points of a line, then which of the following is true?
A. If both end points are left, right, above or below the window, the line is invisible.
B. If both end points are left, right, above or below the window, the line is completely visible.
C. If both end points are left, right, above or below the window, the line is trivially visible
D. If both end points are left, right, above or below the window, the line is trivially invisible
Answer key ☟
21.9.27 Computer Graphics: UGC NET CSE | June 2014 | Part 3 | Question: 01
Beam-penetration and shadow-mask are the two basic techniques for producing color displays with a CRT.
Which of the following is not true ?
I. The beam-penetration is used with random scan monitors.
II. Shadow-mask is used in rasterscan systems.
III. Beam-penetration method is better than shadow-mask method.
IV. Shadow-mask method is better than beam-penetration method.
21.9.28 Computer Graphics: UGC NET CSE | June 2014 | Part 3 | Question: 02
Line caps are used for adjusting the shape of the line ends to give them a better appearance. Various kinds of line
caps used are
A. Butt cap and sharp cap B. Butt cap and round cap
C. Butt cap, sharp cap and round cap D. Butt cap, round cap and projecting square cap
ugcnetjune2014iii non-gatecse computer-graphics
Answer key ☟
21.9.29 Computer Graphics: UGC NET CSE | June 2014 | Part 3 | Question: 03
Given below are certain output primitives and their associated attributes. Match each primitive with its
corresponding attributes
A. B.
C. D.
ugcnetjune2014iii non-gatecse computer-graphics
Answer key ☟
21.9.30 Computer Graphics: UGC NET CSE | June 2014 | Part 3 | Question: 04
Consider a window bounded by the lines : and . The line segment joining and
, if clipped against this window will connect the points
A. and B. and
C. and D. and
ugcnetjune2014iii non-gatecse geometry computer-graphics
Answer key ☟
21.9.31 Computer Graphics: UGC NET CSE | June 2014 | Part 3 | Question: 05
Which of the following color models are defined with three primary colors ?
A. RGB and HSV color models B. CMY and HSV color models
C. HSV and HLS color models D. RGB and CMY color models
ugcnetjune2014iii non-gatecse computer-graphics
Answer key ☟
21.9.32 Computer Graphics: UGC NET CSE | Junet 2015 | Part 3 | Question: 16
Which of the following is not a basic primitive of the Graphics Kernel System (GKS)?
Answer key ☟
21.9.33 Computer Graphics: UGC NET CSE | Junet 2015 | Part 3 | Question: 17
Answer key ☟
21.9.34 Computer Graphics: UGC NET CSE | Junet 2015 | Part 3 | Question: 18
A.
B.
C.
D.
ugcnetcse-june2015-paper3 computer-graphics
Answer key ☟
21.9.35 Computer Graphics: UGC NET CSE | November 2017 | Part 3 | Question: 13
Answer key ☟
21.9.36 Computer Graphics: UGC NET CSE | October 2020 | Part 2 | Question: 46
In the context of Computer graphics, which of the following statements is/are correct?
i. Under perspective projection, each set of parallel lines in the object do not stay parallel in the image (except those
that are parallel to the viewplane to start with).
ii. Applying a perspective transformation in the graphics pipeline to a vertex involves dividing by its coordinate
iii. Perspective transformation is a linear transformation
Answer key ☟
21.9.37 Computer Graphics: UGC NET CSE | October 2020 | Part 2 | Question: 47
Concerning phong shading and Gouraud shading in a scene, which of the following statements are true?
21.9.38 Computer Graphics: UGC NET CSE | October 2020 | Part 2 | Question: 66
Answer key ☟
21.9.39 Computer Graphics: UGC NET CSE | October 2020 | Part 2 | Question: 76
Given below are different properties of projections from . Identify the correct order on the basis of
property true of a perspective projection only, an orthographic projection only, both orthographic and
projective transformations and neither orthographic nor projective transformation, respectively.
A. B. C. D.
ugcnetcse-oct2020-paper2 non-gatecse computer-graphics
Answer key ☟
21.9.40 Computer Graphics: UGC NET CSE | October 2020 | Part 2 | Question: 82
Answer key ☟
21.9.41 Computer Graphics: UGC NET CSE | September 2013 | Part 3 | Question: 59
Which of the following graphics devices are known as active graphics devices?
I. Alphanumeric devices
II. Thumb wheels
III. Digitizers
IV. Joystics
A. I and II B. III and IV C. I, II and III D. I, II, III and IV
ugcnetcse-sep2013-paper3 computer-graphics
Answer key ☟
Answer key ☟
A. The path an electron beam takes when returning to the left side of the CRT
B. The path an electron beam takes when returning to the right side of the CRT
C. The technique of turning, the electron beam off while retracing
D. The technique of turning, the electron beam on/ off while retracing
Answer key ☟
21.11.1 Digital Image Processing: UGC NET CSE | June 2013 | Part 3 | Question: 19
An image is 1024 800 pixels with 3 bytes/pixel. Assume the image is uncompressed. How long does it make to
transmit it over a 10 Mbps Ethernet?
A. 196.6 seconds B. 19.66 seconds
C. 1.966 seconds D. 0.1966 seconds
ugcnetcse-june2013-paper3 computer-graphics digital-image-processing
Answer key ☟
21.11.2 Digital Image Processing: UGC NET CSE | June 2013 | Part 3 | Question: 31
Images tend to be very large collection of data. The size of memory required for a 1024 by 1024 image in which
the color of each pixel is represented by a n-bit number, (in an 8-bit machines) is
A. n 8 MB B. n/8 MB
C. (1024 1024)/8 MB D. 1024 MB
ugcnetcse-june2013-paper3 computer-graphics digital-image-processing
Answer key ☟
21.11.3 Digital Image Processing: UGC NET CSE | June 2013 | Part 3 | Question: 56
The number of distinct binary images which can be generated from a given binary image of right M N are
A. M+N B. M N C. 2 D. 2
ugcnetcse-june2013-paper3 computer-graphics digital-image-processing
Answer key ☟
21.11.4 Digital Image Processing: UGC NET CSE | June 2013 | Part 3 | Question: 57
Answer key ☟
21.11.5 Digital Image Processing: UGC NET CSE | November 2017 | Part 3 | Question: 18
Answer key ☟
21.12.1 Display Devices: UGC NET CSE | June 2013 | Part 3 | Question: 28
The refresh rate above which a picture stops flickering and fuses into a steady image is called ____
A. Crucial fusion frequency B. Current frequency fusion
C. Critical fusion frequency D. Critically diffused frequency
ugcnetcse-june2013-paper3 computer-graphics display-devices
Answer key ☟
21.13.1 Frame Buffer: UGC NET CSE | August 2016 | Part 3 | Question: 14
Consider a -bit plane frame buffer with -bit wide lookup table with . How many intensity levels are
available at a time ?
A. B. C. D.
ugcnetcse-aug2016-paper3 computer-graphics frame-buffer
Answer key ☟
Halftoning is defined as
Answer key ☟
21.15.1 Image Compression: UGC NET CSE | September 2013 | Part 3 | Question: 55
MPEG involves both spatial compression and temporal compression. The spatial compression is similar to
JPEG and temporal compression removes _____ frames.
Answer key ☟
21.16 Image Entropy (1)
21.16.1 Image Entropy: UGC NET CSE | December 2012 | Part 3 | Question: 71
A. B. C. D.
ugcnetcse-dec2012-paper3 computer-graphics image-entropy
Answer key ☟
21.17.1 Image Rotation: UGC NET CSE | July 2016 | Part 3 | Question: 14
A point P(5,1) is rotated by 90 about a pivot point (2,2). What is the coordinate of new transformed point P'?
Answer key ☟
21.17.2 Image Rotation: UGC NET CSE | Junet 2015 | Part 3 | Question: 14
Consider a triangle A(0,0), B(1, 1) and C(5, 2). The triangle has to be rotated by an angle of 45 about the point
P(-1, -1). What shall be the coordinates of new triangle?
A.
B.
C.
D.
Answer key ☟
21.18.1 Line Clipping: UGC NET CSE | December 2014 | Part 3 | Question: 17
In Cyrus-Beck algorithm for line clipping the value of parameter is computed by the relation:
(Here and are the two end points of the line, is a point on the boundary, is inner normal).
A. B.
C. D.
ugcnetcse-dec2014-paper3 non-gatecse computer-graphics line-clipping
Answer key ☟
21.19.1 Line Drawing Algorithm: UGC NET CSE | August 2016 | Part 3 | Question: 15
Consider the Breshenham’s line generation algorithm for a line with gradient greater than one, current point
and decision parameter, . The next point to be plotted and updated decision parameter,
, for are given as _______.
A.
B.
C.
D.
Answer key ☟
21.19.2 Line Drawing Algorithm: UGC NET CSE | August 2016 | Part 3 | Question: 18
The Liang-Barsky line clipping algorithm uses the parametric equation of a line from to along
with its infinite extension which is given as :
Where , and is the parameter with . A line with end points and
is to be clipped against a rectangular window with , and . The lower
and upper bound values of the parameter u for the clipped line using Liang-Barsky algorithm is given as :
A. B. C. D.
ugcnetcse-aug2016-paper3 computer-graphics line-drawing-algorithm
Answer key ☟
21.19.3 Line Drawing Algorithm: UGC NET CSE | June 2013 | Part 3 | Question: 27
Answer key ☟
21.20.1 Parametric Line Equation: UGC NET CSE | September 2013 | Part 3 | Question: 63
The parametric representation of the line segment between the position vectors and is given as
A.
B.
C.
D.
Answer key ☟
21.21.1 Phong Color Model: UGC NET CSE | June 2019 | Part 2 | Question: 30
Using the phong reflectance model, the strength of the specular highlight is determined by the angle between
A. the view vector and the normal vector B. the light vector and the normal vector
C. the light vector and the reflected vector D. the reflected vector and the view vector
ugcnetcse-june2019-paper2 phong-color-model
Answer key ☟
A point is rotated about a pivot point by 60°. What is the new transformed point ?
A. B. C. D.
ugcnetcse-aug2016-paper3 computer-graphics projection
Answer key ☟
In perspective projection (from 3D to 2D), objects behind the centre of projection are projected upside down and
backward onto the view-plane. This is known as _____.
A. Topological distortion B. Vanishing point
C. View confusion D. Perspective foreshortening
ugcnetcse-aug2016-paper3 computer-graphics projection
Answer key ☟
A. B.
C. D.
ugcnetcse-dec2014-paper3 computer-graphics projection non-gatecse
Answer key ☟
In perspective projection, if a line segment joining a point which lies in front of the viewer to a point in back of
the viewer is projected to a broken line of infinte extent. This is known as ____
A. View confusion B. Vanishing point
C. Topological distortion D. Perspective foreshortening
ugcnetcse-july2016-paper3 computer-graphics projection
Answer key ☟
The perspective projection matrix, on the view plan z=d where the centre of projection is the origin (0, 0, 0)
shall be
A.
B.
C.
D.
Answer key ☟
Answer key ☟
Answer key ☟
I. two of the three foreshortening factors are equal and third is arbitrary
II. all of the three foreshortening factors are equal
III. all of the three foreshortening factors are arbitrary
Answer key ☟
Consider a raster grid having -axes in positive -direction and positive upward -direction with
, , , and . What is the address of memory pixel with location in
raster grid assuming base address (one) ?
A. B. C. D.
ugcnetcse-aug2016-paper3 computer-graphics raster-graphics
Answer key ☟
21.23.2 Raster Graphics: UGC NET CSE | June 2019 | Part 2 | Question: 27
Consider a raster system with resolution by . What size is frame buffer (in bytes) for this system to store
bits per pixel?
A. kilobytes B. kilobytes
C. kilobytes D. kilobytes
ugcnetcse-june2019-paper2 raster-graphics
Answer key ☟
If 40 black lines interleaved with 40 white lines can be distinguished across one inch, the resolution is
A. 40 line-pairs per inch B. 80 line-pairs per inch
C. 1600 lines per inch D. 40 lines per inch
ugcnetcse-june2013-paper3 computer-graphics resolution
Answer key ☟
The Mandelbrot set used for the construction of beautiful images is based on the following transformation.
. Here,
A. Both and are real numbers B. Both and are complex numbers
C. is real and is complex D. is complex and is real
ugcnetcse-dec2012-paper3 computer-graphics transformation
Answer key ☟
Give the number of principal vanishing point(s) along with their direction for the standard prospective
transformation:
Answer key ☟
Answer Keys
21.1.1 Q-Q 21.2.1 B 21.3.1 Q-Q 21.3.2 A 21.4.1 C
21.5.1 D 21.6.1 A 21.7.1 B 21.8.1 A 21.9.1 Q-Q
21.9.2 Q-Q 21.9.3 Q-Q 21.9.4 X 21.9.5 B 21.9.6 A
21.9.7 D 21.9.8 C 21.9.9 D 21.9.10 C 21.9.11 X
21.9.12 B 21.9.13 D 21.9.14 X 21.9.15 B 21.9.16 C
21.9.17 D 21.9.18 D 21.9.19 D 21.9.20 A 21.9.21 D
21.9.22 C 21.9.23 D 21.9.24 Q-Q 21.9.25 D 21.9.26 D
21.9.27 C 21.9.28 D 21.9.29 C 21.9.30 A 21.9.31 D
21.9.32 B 21.9.33 D 21.9.34 A 21.9.35 D 21.9.36 A
21.9.37 C 21.9.38 D 21.9.39 C 21.9.40 D 21.9.41 D
21.10.1 C 21.10.2 A 21.11.1 C 21.11.2 B 21.11.3 D
21.11.4 A 21.11.5 C 21.12.1 C 21.13.1 Q-Q 21.14.1 B
21.15.1 D 21.16.1 C 21.17.1 A 21.17.2 C 21.18.1 B
21.19.1 Q-Q 21.19.2 Q-Q 21.19.3 B 21.20.1 C 21.21.1 D
21.22.1 Q-Q 21.22.2 Q-Q 21.22.3 D 21.22.4 C 21.22.5 B
21.22.6 D 21.22.7 D 21.22.8 C 21.23.1 Q-Q 21.23.2 A
21.24.1 A 21.25.1 B 21.25.2 A
22 Non GATE CSE: Computer Peripherals (3)
22.1.1 Computer Peripherals: UGC NET CSE | December 2013 | Part 3 | Question: 61
Which of the following is not true with respect to to a trackball and/or spaceball?
I. A trackball is a two dimensional positioning device while as a spaceball provides six degrees of freedom
II. Unlike the trackball a spaceball does not actually move
III. A trackball is a three dimensional positioning device while as a spaceball provides six degrees of freedom
A. I and II B. II and III C. II only D. III only
ugcnetcse-dec2013-paper3 non-gatecse computer-peripherals
Answer key ☟
A. B.
C. D.
ugcnetcse-dec2014-paper3 non-gatecse computer-peripherals io-devices
Answer key ☟
22.3.1 Matrix Printer: UGC NET CSE | December 2014 | Part 3 | Question: 03
In a dot matrix printer the time to print a character is m.sec., time to space in between characters is m.sec.,
and the number of characters in a line are . The printing speed of the dot matrix printer in characters per
second and the time to print a character line are given by which of the following options ?
A. chars/second and seconds B. chars/second and seconds
C. chars/second and seconds D. chars/second and seconds
ugcnetcse-dec2014-paper3 computer-peripherals non-gatecse matrix-printer io-devices
Answer key ☟
Answer Keys
22.1.1 D 22.2.1 C 22.3.1 X
23 Non GATE CSE: Digital Image Processing (8)
Answer key ☟
Given a simple image of size whose histogram models the symbol probabilities and is given by
a b c d
The first order estimate of image entropy is maximum when
A. B.
C. D.
ugcnetcse-dec2014-paper3 digital-image-processing entropy
Answer key ☟
Consider the conditional entropy and mutual information for the binary symmetric channel. The input source has
alphabet and associated probabilities . The channel matrix is wgere p is the
transition probability. Then the conditional entropy is given by:
A. B.
C. D.
ugcnetcse-dec2015-paper3 digital-image-processing entropy
Answer key ☟
23.3.1 Fourier Transform: UGC NET CSE | December 2012 | Part 3 | Question: 64
If the Fourier transform of the function f(x,y) is F(m,n), then the Fourier transform of the function f(2x,2y) is
A. B. C. D.
ugcnetcse-dec2012-paper3 fourier-transform digital-image-processing
23.4.1 Image Compression: UGC NET CSE | July 2016 | Part 3 | Question: 60
Which of the following is used for the boundary representation of an image object?
Answer key ☟
23.4.2 Image Compression: UGC NET CSE | June 2012 | Part 3 | Question: 10
In an image compression system 16384 bits are used to represent 256 256 image with 256 gray levels. What
is the compression ratio for this system?
A. 1 B. 2 C. 4 D. 8
ugcnetcse-june2012-paper3 image-compression
Answer key ☟
23.4.3 Image Compression: UGC NET CSE | June 2012 | Part 3 | Question: 19
ugcnetcse-june2012-paper3 image-compression
Answer key ☟
23.4.4 Image Compression: UGC NET CSE | June 2014 | Part 3 | Question: 55
Given an image of size pixels in which intensity of each pixel is an -bit quality. It requires
_______ of storage space if the image is not compressed.
Answer key ☟
Answer Keys
23.1.1 D 23.2.1 D 23.2.2 D 23.3.1 A 23.4.1 D
23.4.2 X 23.4.3 A 23.4.4 B
24 Non GATE CSE: Digital Signal Processing (5)
Answer key ☟
24.1.1 Butterworth Lowpass Filter: UGC NET CSE | December 2014 | Part 3 | Question: 66
A Butterworth lowpass filter of order , with a cutoff frequency at distance from the origin, has the transfer
function given by
A. B.
C. D.
Answer key ☟
24.2.1 Digital Signal Processing: UGC NET CSE | June 2012 | Part 2 | Question: 18
Page Shift Keying (PSK) Method is used to modulate digital signal at 9600 bps using 16 level. Find the line
signals and speed (i.e., modulation rate)
Answer key ☟
24.3.1 Discrete Memoryless Channel: UGC NET CSE | July 2016 | Part 3 | Question: 58
Consider a discrete memoryless channel and assume that H(x) is the amount of information per symbol at the
input of the channel; H(y) is the amount of information per symbol at the output of the channel. H(x y) is the
amount of uncertainty remaining on x knowing y; and I(x;y)is the information transmission. Which of the following
does not define the channel capacity of a descrete memoryless channel?
A. max I(x;y); p(x) B. max [H(y)-H(y x)]; p(x)
C. max [H(x)-H(x y)]; p(x) D. max H(x y); p(x)
ugcnetcse-july2016-paper3 digital-image-processing discrete-memoryless-channel
Answer key ☟
24.4.1 Spatial Mask: UGC NET CSE | December 2014 | Part 3 | Question: 64
Answer key ☟
Answer Keys
24.0.1 C 24.1.1 A 24.2.1 A 24.3.1 D 24.4.1 B
25 Non GATE CSE: Distributed Computing (11)
25.1.1 Computing Models: UGC NET CSE | December 2014 | Part 3 | Question: 75
Which of the following computing models is not an example of distributed computing environment ?
A. Cloud computing B. Parallel computing
C. Cluster computing D. Peer-to-peer computing
ugcnetcse-dec2014-paper3 distributed-computing computing-models
Answer key ☟
25.2.1 Distributed Computing: UGC NET CSE | December 2014 | Part 3 | Question: 11
Answer key ☟
25.2.2 Distributed Computing: UGC NET CSE | December 2014 | Part 3 | Question: 54
ugcnetcse-dec2014-paper3 distributed-computing
Answer key ☟
25.2.3 Distributed Computing: UGC NET CSE | June 2014 | Part 2 | Question: 27
Answer key ☟
25.3.1 Distributed Database: UGC NET CSE | December 2014 | Part 3 | Question: 07
Answer key ☟
25.3.2 Distributed Database: UGC NET CSE | July 2016 | Part 3 | Question: 12
Semi-join strategies are techniques for query processing in distributed database system. Which of the following
is semi-joined technique?
A. Only the joining attributes are sent from one site to another and then all of the rows are returned
B. All of the attributes are sent from one site to another and then only the required rows are returned
C. Only the joining attributes are sent from one site to another and then only the required rows are returned
D. All of the attributes are sent from one site to another and then only the required rows are returned
Answer key ☟
25.4.1 Distributed System: UGC NET CSE | December 2015 | Part 3 | Question: 62
The distributed system is a collection of _____(P)_____ and communication is achieved in disributed system by
____(Q)____, where (P) and (Q) are:
A. Loosely coupled hardware on tightly coupled software and disk sharing, repspectively
B. Tightly coupled hardware on loosely coupled software and shared memory, repspectively
C. Tightly coupled software on loosely coupled hardware and message passing, repspectively
D. Loosely coupled software on tightly coupled hardware and file sharing, repspectively
ugcnetcse-dec2015-paper3 distributed-system
Answer key ☟
25.4.2 Distributed System: UGC NET CSE | September 2013 | Part 3 | Question: 68
Which of the following statements is not correct with respect to the distributed systems?
A. Distributed system represents a global view of the network and considers it as a virtual uniprocessor system by
controlling and managing resources across the network on all the sites.
B. Distributed system is built on bare machine, not an add-on to the existing software
C. In a distributed system, kernel provides smallest possible set of services on which other services are built. This
kernel is called microkernel. Open servers provide other services and access to shared resources.
D. In a distributed system, if a user wants to run the program on other nodes or share the resources on remote sites due
to their beneficial aspects, user has to log on to that site.
ugcnetcse-sep2013-paper3 distributed-system
Answer key ☟
25.5.1 Message Passing: UGC NET CSE | Junet 2015 | Part 2 | Question: 50
Which of the following is not valid with reference to Message Passing Interface(MPI)?
Answer key ☟
25.6.1 Parallel Virtual Machine: UGC NET CSE | Junet 2015 | Part 2 | Question: 47
Which of the following statements is incorrect for Parallel Virtual Machine (PVM)?
A. The PVM communication model provides asynchronous blocking send, asynchronous blocking receive, amd non-
blocking receive function
B. Message buffers are allocated dynamically
C. The PVM communication model assumes that any task can send a message to any order PVM task and that there is
no limit to the size or number of such messages
D. In PVM model, the message order is not preserved
Answer key ☟
Suppose that the time to do a null remote procedure call (RPC) (i.e., 0 data bytes) is 1.0 msec with an additional
1.5 msec for every 1K of data. How long does it take to read 32 K from the file server as 32 1K RPCs?
Answer key ☟
Answer Keys
25.1.1 B 25.2.1 D 25.2.2 B 25.2.3 D 25.3.1 A
25.3.2 C 25.4.1 B 25.4.2 D 25.5.1 C 25.6.1 D
25.7.1 B
26 Non GATE CSE: Geometry (2)
A.
B.
C.
D.
Answer key ☟
26.2.1 Lines Curves: UGC NET CSE | December 2015 | Part 3 | Question: 32
The end points of a given line are and . Compute each value of y as x steps from to , by using
equation of straight line:
A. For
B. For
C. For
D. For
Answer key ☟
Answer Keys
26.1.1 A 26.2.1 C
27 Non GATE CSE: Integrated Circuits (1)
27.1.1 Integrated Circuits: UGC NET CSE | June 2012 | Part 2 | Question: 36
Which of the following logic families is well suited for high-speed operations?
Answer key ☟
Answer Keys
27.1.1 B
28 Non GATE CSE: IS&Software Engineering (215)
Answer key ☟
A. Product
B. Process
C. Product and Process
D. None of the above
ugcnetcse-june2009-paper2
Answer key ☟
A. Programs
B. Data
C. Documentation
D. All of the above
ugcnetcse-june2009-paper2
Answer key ☟
A. Size measurement
B. Cost measurement
C. Design recovery
D. All of the above
ugcnetcse-june2009-paper2
Answer key ☟
A legacy software system has modules. The latest release required that of these modules be changed. In
addition, new modules were added and old modules were removed. Compute the software maturity index
for the system.
A. B. C. D.
ugcnetcse-dec2018-paper2
Answer key ☟
28.0.6 UGC NET CSE | December 2004 | Part 2 | Question: 45
Answer key ☟
Answer key ☟
ugcnetcse-dec2004-paper2
Answer key ☟
ugcnetcse-dec2004-paper2
Answer key ☟
ugcnetcse-dec2006-paper2
Answer key ☟
ugcnetcse-dec2006-paper2
Answer key ☟
ugcnetcse-dec2006-paper2
Answer key ☟
Answer key ☟
A. B.
C. BCWP-ACWP D. BCWP-BCWS
Where :
ugcnetcse-dec2006-paper2
Answer key ☟
ugcnetcse-dec2006-paper2
Answer key ☟
Which of the following tools is not required during system analysis phase of system development life cycle ?
Answer key ☟
28.0.17 UGC NET CSE | December 2006 | Part 2 | Question: 16
Which possibility among the following is invalid in case of a Data Flow Diagram ?
A. A process having in-bound data flows more than out-bound data flows
B. A data flow between two processes
C. A data flow between two data stores
D. A data store having more than one in-bound data flows
ugcnetcse-dec2006-paper2
Answer key ☟
Answer key ☟
Answer key ☟
ugcnetcse-dec2007-paper2
Answer key ☟
ugcnetcse-dec2007-paper2
Answer key ☟
Software products need adaptive maintenance for which of the following reasons?
ugcnetcse-june2019-paper2 adaptive-maintenance
Answer key ☟
28.2.1 Artificial Intelligence: UGC NET CSE | December 2012 | Part 3 | Question: 74
Answer key ☟
28.2.2 Artificial Intelligence: UGC NET CSE | June 2012 | Part 3 | Question: 23
Which of the following prolog programs correctly implement “if G succeeds then execute goal P else execute
goal ”?
ugcnetcse-june2012-paper3 artificial-intelligence
Answer key ☟
28.3.1 Assignment Problem: UGC NET CSE | June 2012 | Part 3 | Question: 62
The optimal solution of the following assignment problem using Hungarian method is
A. B.
C. D.
ugcnetcse-june2012-paper3 optimization assignment-problem
Answer key ☟
28.4.1 CRC Polynomial: UGC NET CSE | December 2015 | Part 3 | Question: 31
Answer key ☟
28.5.1 Cmm Model: UGC NET CSE | December 2014 | Part 2 | Question: 42
Requirement Development, Organizational Process Focus, Organizational Training, Risk Management and
Integrated Supplier Management are process areas required to achieve maturity level
Answer key ☟
28.5.2 Cmm Model: UGC NET CSE | July 2016 | Part 3 | Question: 47
Which of the following sets represent five stages defined by Capability Maturity Model (CMM) in increasing
order of maturity?
Answer key ☟
28.5.3 Cmm Model: UGC NET CSE | June 2014 | Part 3 | Question: 21
Which one of the following is not a key process area in CMM level ?
Answer key ☟
Answer key ☟
28.7.1 Cocomo Model: UGC NET CSE | December 2008 | Part 2 | Question: 45
Answer key ☟
28.7.2 Cocomo Model: UGC NET CSE | December 2010 | Part 2 | Question: 44
The COCOMO model was introduced in the book title “Software Engineering Economics” authored by
Answer key ☟
28.7.3 Cocomo Model: UGC NET CSE | January 2017 | Part 3 | Question: 48
A software company needs to develop a project that is estimated as function points and is planning to use
JAVA as the programming language whose approximate lines of code per function point is accepted as .
Considering as multiplicative factor, as exponention factor for the basic COCOMO effort equation and
as multiplicative factor, as exponention factor for the basic COCOMO duration equation,
approximately how long does project take to complete?
A. months B. months
C. months D. months
ugcnetcse-jan2017-paper3 is&software-engineering cocomo-model
Answer key ☟
Answer key ☟
Answer key ☟
Answer key ☟
28.10.1 Cost Estimation Model: UGC NET CSE | December 2009 | Part 2 | Question: 43
Codes :
(A) (i) (ii) (iv)
(B) (ii) (iii) (iv)
(C) (i) (ii) (iii)
(D) (i) (ii) (iii) (iv)
ugcnetcse-dec2009-paper2 is&software-engineering cost-estimation-model
Answer key ☟
28.10.2 Cost Estimation Model: UGC NET CSE | December 2013 | Part 3 | Question: 5
Answer key ☟
28.11 Coupling (3)
A. B.
C. D.
ugcnetcse-dec2013-paper3 is&software-engineering coupling
Answer key ☟
Coupling is a measure of the strength of the interconnections between software modules. Which of the following
are correct statements with respect to module coupling?
P: Common coupling occurs when one module controls the flow of another module by passing it information on what to
do
Q: In data coupling, the complete data structure is passed from one module to another through parameters.
R: Stamp coupling occurs when modules share a composite data structure and use only parts of it.
Code:
Answer key ☟
In _____, modules A and B make use of a common data type, but perhaps perform different operations on it.
A. Data coupling B. Stamp coupling
C. Control coupling D. Content coupling
ugcnetcse-sep2013-paper3 is&software-engineering coupling
Answer key ☟
28.12.1 Coupling Cohesion: UGC NET CSE | June 2019 | Part 2 | Question: 51
Answer key ☟
28.13 Cyclomatic Complexity (2)
28.13.1 Cyclomatic Complexity: UGC NET CSE | December 2014 | Part 2 | Question: 45
Answer key ☟
28.13.2 Cyclomatic Complexity: UGC NET CSE | July 2016 | Part 2 | Question: 44
A. P+1
B. P-1
C. P-2
D. P+2
ugcnetcse-july2016-paper2 cyclomatic-complexity
Answer key ☟
28.14.1 Data Mining: UGC NET CSE | December 2012 | Part 3 | Question: 5
______ is process of extracting previously non known valid and actionable information from large data to make
crucial business and strategic decisions.
Answer key ☟
28.14.2 Data Mining: UGC NET CSE | June 2012 | Part 3 | Question: 12
Answer key ☟
28.15.1 Digital Marketing: UGC NET CSE | December 2012 | Part 3 | Question: 1
Answer key ☟
of a component is defined as
A. Count of the number of components that can call, or pass control, to a component
B. Number of components related to component
C. Number of components dependent on component
D. None of the above
Answer key ☟
28.17.1 Flow Chart: UGC NET CSE | December 2010 | Part 2 | Question: 45
Answer key ☟
28.18.1 Function Point Metric: UGC NET CSE | December 2014 | Part 3 | Question: 44
A. B. C. D.
ugcnetcse-dec2014-paper3 is&software-engineering function-point-metric
Answer key ☟
28.18.2 Function Point Metric: UGC NET CSE | June 2014 | Part 2 | Question: 14
A. B. C. D.
ugcnetcse-june2014-paper2 is&software-engineering function-point-metric
Answer key ☟
Answer key ☟
28.20.1 Information System: UGC NET CSE | December 2014 | Part 3 | Question: 60
Answer key ☟
is&software-engineering
Answer key ☟
28.21.2 Is&software Engineering: UGC NET CSE | August 2016 | Part 3 | Question: 47
ugcnetcse-aug2016-paper3 is&software-engineering
Answer key ☟
28.21.3 Is&software Engineering: UGC NET CSE | August 2016 | Part 3 | Question: 48
Which of the following is/are CORRECT statement(s) about version and release ?
I. A version is an instance of a system, which is functionally identical but nonfunctionally distinct from other
instances of a system.
II. A version is an instance of a system, which is functionally distinct in some way from other system instances.
III. A release is an instance of a system, which is distributed to users outside of the development team.
IV. A release is an instance of a system, which is functionally identical but nonfunctionally distinct from other instances
of a system.
Answer key ☟
28.21.4 Is&software Engineering: UGC NET CSE | December 2011 | Part 2 | Question: 14
An SRS
A. Establishes the basis for agreement between client and the supplier.
B. Provides a reference for validation of the final product.
C. Is a prerequisite to high quality software.
D. All of the above.
ugcnetcse-dec2011-paper2 is&software-engineering
Answer key ☟
28.21.5 Is&software Engineering: UGC NET CSE | December 2011 | Part 2 | Question: 17
Answer key ☟
28.21.6 Is&software Engineering: UGC NET CSE | December 2012 | Part 2 | Question: 19
Answer key ☟
28.21.7 Is&software Engineering: UGC NET CSE | December 2012 | Part 2 | Question: 6
Answer key ☟
28.21.8 Is&software Engineering: UGC NET CSE | December 2013 | Part 2 | Question: 10
Answer key ☟
28.21.9 Is&software Engineering: UGC NET CSE | December 2013 | Part 2 | Question: 7
Answer key ☟
28.21.10 Is&software Engineering: UGC NET CSE | December 2013 | Part 2 | Question: 8
A. the changes due to the evolution of work products as the project proceeds
B. the changes due to defects (bugs) being found and then fixed
C. the changes due to requirement changes
D. all of the above
ugcnetcse-dec2013-paper2 is&software-engineering
Answer key ☟
28.21.11 Is&software Engineering: UGC NET CSE | December 2013 | Part 2 | Question: 9
Answer key ☟
28.21.12 Is&software Engineering: UGC NET CSE | December 2013 | Part 3 | Question: 9
A. Once we write the program and get it to work, our job is done
B. Projects requirements continually change, but change can be easily accommodated because software is flexible
C. If we get behind schedule, we can add more programmers and catch up
D. If an organization does not understand how to control software projects internally, it will invariably struggle when it
outsources software projects.
ugcnetcse-dec2013-paper3 is&software-engineering
Answer key ☟
28.21.13 Is&software Engineering: UGC NET CSE | December 2015 | Part 3 | Question: 25
Which of the following non-functional quality attributes is not highly affected by the architecture of the
software?
Answer key ☟
28.21.14 Is&software Engineering: UGC NET CSE | December 2015 | Part 3 | Question: 72
A. Pareto analysis is a statistical method used for analyzing causes, and is one of the primary tools for quality
management.
B. Reliability of a software specifies the probability of failure-free operation of that software for a given time duration.
C. The reliability of a system can also be specified as the Mean Time To Failure (MTTF).
D. In white-box testing, the test cases are decided from the specifications or the requirements.
ugcnetcse-dec2015-paper3 is&software-engineering
Answer key ☟
28.21.15 Is&software Engineering: UGC NET CSE | December 2015 | Part 3 | Question: 74
Which one of the following statements, related to the requirements phase in Software Engineering, is incorrect?
ugcnetcse-dec2015-paper3 is&software-engineering
Answer key ☟
28.21.16 Is&software Engineering: UGC NET CSE | January 2017 | Part 2 | Question: 41
ugcnetjan2017ii is&software-engineering
Answer key ☟
28.21.17 Is&software Engineering: UGC NET CSE | January 2017 | Part 2 | Question: 42
Which of the following is not one of three software product aspects addressed by McCall's software quality
factors ?
A. Ability to undergo change B. Adaptiability to new environments
C. Operational characteristics D. Production costs and scheduling
ugcnetjan2017ii is&software-engineering
Answer key ☟
28.21.18 Is&software Engineering: UGC NET CSE | January 2017 | Part 2 | Question: 43
Which of the following statement(s) is/are true with respect to software architecture?
: Coupling is a measure of how well the things grouped together in a module belong together logically.
: Cohesion is a measure of the degree of interaction between software modules.
: If coupling is low and cohesion is high then it is easier to change one module without affecting others.
Answer key ☟
28.21.19 Is&software Engineering: UGC NET CSE | January 2017 | Part 2 | Question: 44
ugcnetjan2017ii is&software-engineering
Answer key ☟
28.21.20 Is&software Engineering: UGC NET CSE | January 2017 | Part 3 | Question: 45
Match the terms related to Software Configuration Management (SCM) in List-Ⅰ with the descriptions in List-II.
A. B.
C. D.
ugcnetcse-jan2017-paper3 is&software-engineering
Answer key ☟
28.21.21 Is&software Engineering: UGC NET CSE | January 2017 | Part 3 | Question: 46
A software project was estimated at Function Points . A four person team will be assigned to this project
consisting of an architect, two programmers, and a tester The salary of the architect is ₹ per month, the
programmer ₹ per month and the tester ₹ per month. The average productivity for the team is per
person month. Which of the following represents the projected cost of the project?
A. ₹ B. ₹
C. ₹ D. ₹
ugcnetcse-jan2017-paper3 is&software-engineering
Answer key ☟
28.21.22 Is&software Engineering: UGC NET CSE | January 2017 | Part 3 | Question: 47
Complete each of the following sentences in List-I on the left hand side by filling in the word or phrase from the
List –II on the right hand side that best completes the sentence :
A. B.
C. D.
ugcnetcse-jan2017-paper3 is&software-engineering
Answer key ☟
28.21.23 Is&software Engineering: UGC NET CSE | July 2016 | Part 2 | Question: 41
If is total number of modules defined in the program architecture, is the number of modules whose
correct function depends on prior processing then the number of modules not dependent on prior processing is:
A. B. C. D.
ugcnetcse-july2016-paper2 is&software-engineering
Answer key ☟
28.21.24 Is&software Engineering: UGC NET CSE | July 2016 | Part 3 | Question: 44
A. B.
C. D.
ugcnetcse-july2016-paper3 is&software-engineering
Answer key ☟
28.21.25 Is&software Engineering: UGC NET CSE | July 2018 | Part 2 | Question: 12
A. B.
C. D.
ugcnetcse-july2018-paper2 is&software-engineering match-the-following
Answer key ☟
28.21.26 Is&software Engineering: UGC NET CSE | July 2018 | Part 2 | Question: 13
Which one of the following is not typically provided by Source Code Management Software?
Answer key ☟
28.21.27 Is&software Engineering: UGC NET CSE | July 2018 | Part 2 | Question: 14
A software system crashed 20 times in the year 2017 and for each crash, it took 2 minutes to restart.
Approximately, what was the software availability in that year?
A. 96.9924% B. 97.9924% C. 98.9924% D. 99.9924%
ugcnetcse-july2018-paper2 is&software-engineering
Answer key ☟
28.21.28 Is&software Engineering: UGC NET CSE | July 2018 | Part 2 | Question: 18
Answer key ☟
28.21.29 Is&software Engineering: UGC NET CSE | July 2018 | Part 2 | Question: 19
Which of the following is not a key strategy followed by the clean room approach to software development?
Answer key ☟
28.21.30 Is&software Engineering: UGC NET CSE | July 2018 | Part 2 | Question: 20
Answer key ☟
28.21.31 Is&software Engineering: UGC NET CSE | June 2005 | Part 2 | Question: 42
Answer key ☟
28.21.32 Is&software Engineering: UGC NET CSE | June 2007 | Part 2 | Question: 43
Answer key ☟
28.21.33 Is&software Engineering: UGC NET CSE | June 2010 | Part 2 | Question: 41
Answer key ☟
28.21.34 Is&software Engineering: UGC NET CSE | June 2012 | Part 2 | Question: 20
Answer key ☟
28.21.35 Is&software Engineering: UGC NET CSE | June 2012 | Part 2 | Question: 21
Key process areas of CMM level 4 are also classified by a process which is
Answer key ☟
28.21.36 Is&software Engineering: UGC NET CSE | June 2012 | Part 2 | Question: 22
Validation means
A. are we building the product right B. are we building the right product
C. verification of fields D. None of the above
ugcnetcse-june2012-paper2 is&software-engineering non-gatecse
Answer key ☟
28.21.37 Is&software Engineering: UGC NET CSE | June 2012 | Part 2 | Question: 23
Answer key ☟
28.21.38 Is&software Engineering: UGC NET CSE | June 2012 | Part 2 | Question: 24
Answer key ☟
28.21.39 Is&software Engineering: UGC NET CSE | June 2012 | Part 2 | Question: 25
Which of the following metric does not depend on the programming language used?
A. Line of code B. Function count
C. Member of token D. All of the above
non-gatecse is&software-engineering ugcnetcse-june2012-paper2
Answer key ☟
28.21.40 Is&software Engineering: UGC NET CSE | June 2012 | Part 2 | Question: 43
Answer key ☟
28.21.41 Is&software Engineering: UGC NET CSE | June 2012 | Part 3 | Question: 37
A. Verification B. Validation
C. Testing D. Software quality assurance
ugcnetcse-june2012-paper3 is&software-engineering
Answer key ☟
28.21.42 Is&software Engineering: UGC NET CSE | June 2013 | Part 2 | Question: 3
While estimating the cost of software, Lines Of Code (LOC) and Function Points (FP) are used to measure
which one of the following?
A. Length of code B. Size of software
C. Functionality of software D. None of the above
is&software-engineering ugcnetcse-june2013-paper2
Answer key ☟
28.21.43 Is&software Engineering: UGC NET CSE | June 2014 | Part 2 | Question: 11
in stands for
A. Key Process Area B. Key Product Area
C. Key Principal Area D. Key Performance Area
ugcnetcse-june2014-paper2 is&software-engineering
Answer key ☟
28.21.44 Is&software Engineering: UGC NET CSE | June 2014 | Part 2 | Question: 13
_________ of a system is the structure or structures of the system which comprise software elements, the
externally visible properties of these elements and the relationship amongst them.
A. Software construction B. Software evolution
C. Software architecture D. Software reuse
ugcnetcse-june2014-paper2 is&software-engineering
Answer key ☟
28.21.45 Is&software Engineering: UGC NET CSE | June 2014 | Part 2 | Question: 28
A. B.
C. D. All of the above
ugcnetcse-june2014-paper2 is&software-engineering
Answer key ☟
28.21.46 Is&software Engineering: UGC NET CSE | June 2014 | Part 3 | Question: 19
A. B.
C. D.
ugcnetjune2014iii is&software-engineering
Answer key ☟
28.21.47 Is&software Engineering: UGC NET CSE | June 2014 | Part 3 | Question: 20
A. It refers to the discrepancy between a computed, observed or measured value and the true, specified or theoretically
correct value.
B. It refers to the actual output of a software and the correct output.
C. It refers to a condition that causes a system to fail.
D. It refers to human action that results in software containing a defect or fault.
ugcnetjune2014iii is&software-engineering
Answer key ☟
28.21.48 Is&software Engineering: UGC NET CSE | Junet 2015 | Part 3 | Question: 44
Which design matric is used to measure the compactness of the program in terms of lines of code?
Answer key ☟
28.21.49 Is&software Engineering: UGC NET CSE | Junet 2015 | Part 3 | Question: 45
Answer key ☟
28.21.50 Is&software Engineering: UGC NET CSE | Junet 2015 | Part 3 | Question: 60
A. B.
C. D.
ugcnetcse-june2015-paper3 is&software-engineering
Answer key ☟
28.21.51 Is&software Engineering: UGC NET CSE | October 2020 | Part 2 | Question: 19
Answer key ☟
28.21.52 Is&software Engineering: UGC NET CSE | October 2020 | Part 2 | Question: 20
Answer key ☟
28.21.53 Is&software Engineering: UGC NET CSE | October 2020 | Part 2 | Question: 21
A company has a choice of two languages and to develop a software for their client. Number of LOC
required to develop an application in is thrice the LOC in language . Also, software has to be maintained
for next years. Various parameters for two languages are given below to decide which language should be preferred
for development.
Total cost of project include cost of development and maintenance. What is the for for which cost of
developing the software with both languages must be same?
A. B. C. D.
ugcnetcse-oct2020-paper2 non-gatecse is&software-engineering
Answer key ☟
28.21.54 Is&software Engineering: UGC NET CSE | October 2020 | Part 2 | Question: 22
A Software project was estimated at Function Points. A six person team will be assigned to project
consisting of a requirement gathering person, one designer, two programmers and two testers. The salary of the
designer is per month, requirement gatherer is per month, programmer is per month
and a tester is per month. Average productivity for the team is FP per person month. Which of the
following represents the projected cost of the project
A. B.
C. D.
ugcnetcse-oct2020-paper2 non-gatecse is&software-engineering
Answer key ☟
28.21.55 Is&software Engineering: UGC NET CSE | October 2020 | Part 2 | Question: 45
i. XML is a set of tags designed to tell browsers how to display text and images in a web page
ii. XML defines a syntax for representing data, but the meaning of data varies from application to application
iii. <Letter>, <LETTER> and <letter> are three different tags in XML
Answer key ☟
28.21.56 Is&software Engineering: UGC NET CSE | October 2020 | Part 2 | Question: 49
i. Execution Time
ii. Calender Time
iii. Clock Time
Answer key ☟
28.21.57 Is&software Engineering: UGC NET CSE | October 2020 | Part 2 | Question: 50
a. Evaluates all use-cases b. Builds state transition diagram for the system
c. Reviews the object behaviour model to verify accuracyd. Identifies events that do not derive the interaction
and consistency sequence
Choose the correct answer from the options given below:
Answer key ☟
28.21.58 Is&software Engineering: UGC NET CSE | October 2020 | Part 2 | Question: 51
Answer key ☟
28.21.59 Is&software Engineering: UGC NET CSE | October 2020 | Part 2 | Question: 68
Match with
With reference to CMM developed by Software Engineering Institute (SEI)
A. B.
C. D.
ugcnetcse-oct2020-paper2 non-gatecse is&software-engineering
Answer key ☟
28.21.60 Is&software Engineering: UGC NET CSE | October 2020 | Part 2 | Question: 77
Arrange the following types of Cohesion from the best to worst type.
a. Logical Cohesion
b. Sequential Cohesion
c. Communication Cohesion
d. Temporal Cohesion
e. Procedural Cohesion
A.
B.
C.
D.
Answer key ☟
28.21.61 Is&software Engineering: UGC NET CSE | October 2020 | Part 2 | Question: 85
Statement : Quality control involves the series of inspections, reviews and tests used throughout the software
process, to ensure each work product meets the requirements placed upon it.
Statement : Quality assurance consists of auditing and reporting functions of management
In the light of the above statements, choose the correct answer from the options given below
Answer key ☟
28.21.62 Is&software Engineering: UGC NET CSE | September 2013 | Part 2 | Question: 28
The _____ of a program or computing system is the structure or structures of the system, which comprise
software components, the externally visible properties of these components and the relationship among them.
Answer key ☟
28.22.1 Life Cycle Model: UGC NET CSE | Junet 2015 | Part 2 | Question: 43
Answer key ☟
A. Provides guidance in identifying problems, finding and evaluating alternative solutions, and selecting or comparing
alternatives
B. Draws on diverse yet predictable data resources to aggregate and summarize data
C. High volume, data capture focus
D. Has as its goal the efficiency of data movement and processing and interfacing different TPS
Answer key ☟
28.24.1 Model View Controller: UGC NET CSE | June 2019 | Part 2 | Question: 52
ugcnetcse-june2019-paper2 model-view-controller
Answer key ☟
28.25.1 Object Oriented Modelling: UGC NET CSE | December 2014 | Part 3 | Question: 41
Answer key ☟
In any simplex table, if corresponding to any negative j, all elements of the column are negative or zero, the
solution under the test is
A. degenerate solution B. unbounded solution
C. alternative solution D. non-existing solution
ugcnetcse-june2012-paper3 optimization linear-programming
Answer key ☟
28.27.1 Project Planning: UGC NET CSE | Junet 2015 | Part 2 | Question: 45
Which one from the following is highly associated activity of project planning?
Answer key ☟
28.28.1 Project Tracking: UGC NET CSE | June 2019 | Part 2 | Question: 59
Which of the following are the primary objectives of risk monitoring in software project tracking?
P: To assess whether predicted risks do, in fact, occur
Q: To ensure that risk aversion steps defined for the risk are being properly applied
R: To collect information that can be used for future risk analysis
Answer key ☟
28.29.1 Risk Management: UGC NET CSE | December 2014 | Part 3 | Question: 45
Assume that the software team defines a project risk with % probability of occurrence of risk in the following
manner: Only percent of the software components scheduled for reuse will be integrated into the application
and the remaining functionality will have to be custom developed. If reusable components were planned with average
component size as LOC and software engineering cost for each LOC as $14, then the risk exposure would be
Answer key ☟
28.29.2 Risk Management: UGC NET CSE | June 2014 | Part 2 | Question: 12
Which one of the following is not a risk management technique for managing the risk due to unrealistic
schedules and budgets ?
A. Detailed multi source cost and schedule estimation. B. Design cost
C. Incremental development D. Information hiding
ugcnetcse-june2014-paper2 is&software-engineering risk-management
Answer key ☟
28.29.3 Risk Management: UGC NET CSE | September 2013 | Part 3 | Question: 50
Sixty reusable components were available for an application. If only 70% of these components can be used, rest
30% would have to be developed from scratch. If average component is 100 LOC and cost of each LOC is Rs.
14, what will be risk of exposure if risk probability is 80%?
A. Rs. 25, 200 B. Rs. 20, 160 C. Rs. 25, 160 D. Rs. 20, 400
ugcnetcse-sep2013-paper3 is&software-engineering risk-management
Answer key ☟
28.30.1 Size Metrices: UGC NET CSE | Junet 2015 | Part 2 | Question: 41
A. B.
C. D.
ugcnetcse-june2015-paper2 size-metrices is&software-engineering
Answer key ☟
A software design pattern used to enhance the functionality of an object at run-time is:
Answer key ☟
28.32.1 Software Configuration: UGC NET CSE | December 2013 | Part 3 | Question: 7
A process which defines a series of tasks that have the following four primary objectives is known as
Answer key ☟
28.33.1 Software Cost Estimation: UGC NET CSE | June 2014 | Part 3 | Question: 18
Answer key ☟
28.34.1 Software Design: Computer Science - UGC NET 2021 [ Question ID = 2342 ]
1. User interface.
4. Translating between user interface actions / events and operations on the domain objects.
software-design
Answer key ☟
28.34.2 Software Design: Computer Science - UGC NET 2021 [ Question ID = 2344 ]
If every requirement stated in the Software Requirement Specification (SRS) has only one interpretation, then
SRS is said to be :
1. correct
2. consistent
3. unambiguous
4. verifiable
software-design
Answer key ☟
28.34.3 Software Design: Computer Science - UGC NET 2021 [ Question ID = 2348 ]
Identify the correct order of the following five levels of Capability Maturity Model (from lower to higher) to
measure the maturity of an organization's software process.
A. Defined B. Optimizing
C. Initial D. Managed
E. Repeatable Choose the correct answer from the options given below
1. C, A, E, D, B
2. C, B, D, E, A
3. C,E, A, B, D
4. C, E, A, D, B
non-gatecse software-design
Answer key ☟
28.34.4 Software Design: Computer Science - UGC NET 2021 [ Question ID = 2350 ]
Given below are two statements, one is labelled as Assertion A and the other is labelled as Reason R :
Assertion A : Software developers do not do exhaustive software testing in practice.
Reason R : Even for small inputs, exhaustive testing is too computationally intensive (e.g., takes too long) to run all the
tests.
In light of the above statements, choose the correct answer from the options given below :
Answer key ☟
28.34.5 Software Design: UGC NET CSE | August 2016 | Part 2 | Question: 43
The quick design of a software that is visible to end users leads to _____.
A. Iterative model B. Prototype model
C. Spiral model D. Waterfall model
ugcnetcse-aug2016-paper2 is&software-engineering software-design
Answer key ☟
28.34.6 Software Design: UGC NET CSE | December 2011 | Part 2 | Question: 41
A. Risk magnitude and risk impact B. Risk probability and risk impact
C. Risk maintenance and risk impact D. Risk development and risk impact
ugcnetcse-dec2011-paper2 is&software-engineering software-design
Answer key ☟
28.34.7 Software Design: UGC NET CSE | December 2014 | Part 2 | Question: 43
The software _______ of a program or a computing system is the structure or structures of the system, which
comprise software components, the externally visible properties of those components, and the relationships
among them.
A. Design B. Architecture
C. Process D. Requirement
ugcnetcse-dec2014-paper2 is&software-engineering software-design
Answer key ☟
28.34.8 Software Design: UGC NET CSE | July 2016 | Part 3 | Question: 45
A. B.
C. D.
ugcnetcse-july2016-paper3 is&software-engineering software-design
Answer key ☟
28.34.9 Software Design: UGC NET CSE | July 2018 | Part 2 | Question: 17
Answer key ☟
28.34.10 Software Design: UGC NET CSE | June 2010 | Part 2 | Question: 42
Answer key ☟
28.34.11 Software Design: UGC NET CSE | June 2010 | Part 2 | Question: 44
Answer key ☟
28.34.12 Software Design: UGC NET CSE | June 2013 | Part 3 | Question: 1
Answer key ☟
28.34.13 Software Design: UGC NET CSE | June 2013 | Part 3 | Question: 10
A. B.
C. D.
ugcnetcse-june2013-paper3 is&software-engineering software-design
Answer key ☟
28.34.14 Software Design: UGC NET CSE | June 2013 | Part 3 | Question: 3
______ is a process model that removes defects before they can precipitate serious hazards.
Answer key ☟
28.34.15 Software Design: UGC NET CSE | June 2013 | Part 3 | Question: 5
are of
A. User satisfaction B. Good interface design
C. Saving system’s resources D. None of these
ugcnetcse-june2013-paper3 is&software-engineering software-design
Answer key ☟
28.34.16 Software Design: UGC NET CSE | Junet 2015 | Part 3 | Question: 42
Modulo design is used to maximize cohesion and minimize coupling. Which of the following is the key to
implement this rule?
Answer key ☟
28.34.17 Software Design: UGC NET CSE | Junet 2015 | Part 3 | Question: 47
Answer key ☟
28.34.18 Software Design: UGC NET CSE | Junet 2015 | Part 3 | Question: 48
Answer key ☟
28.35.1 Software Development: UGC NET CSE | December 2009 | Part 2 | Question: 43
Software Engineering is a discipline that integrates _________ for the development of computer software.
(A) Process
(B) Methods
(C) Tools
(D) All
ugcnetcse-dec2009-paper2 is&software-engineering software-development
Answer key ☟
28.35.2 Software Development: UGC NET CSE | July 2018 | Part 2 | Question: 11
If E, D and C are the estimated development effort (in person-month), estimated development time (in months), and
estimated development cost (in INR Lac) respectively, then (E, D, C) = ______
Answer key ☟
28.35.3 Software Development: UGC NET CSE | September 2013 | Part 2 | Question: 27
Answer key ☟
28.36.1 Software Development Life Cycle Models: UGC NET CSE | August 2016 | Part 3 | Question: 44
A. B.
C. D.
ugcnetcse-aug2016-paper3 is&software-engineering software-development-life-cycle-models
Answer key ☟
28.36.2 Software Development Life Cycle Models: UGC NET CSE | December 2008 | Part 2 | Question: 44
A. level B. level
C. level D. level
ugcnetcse-dec2008-paper2 is&software-engineering software-development-life-cycle-models
Answer key ☟
28.36.3 Software Development Life Cycle Models: UGC NET CSE | December 2010 | Part 2 | Question: 42
Answer key ☟
28.36.4 Software Development Life Cycle Models: UGC NET CSE | December 2010 | Part 2 | Question: 43
The system specification is the first deliverable in the computer system engineering process which does not
include
A. Functional Description B. Cost
C. Schedule D. Technical Analysis
ugcnetcse-dec2010-paper2 is&software-engineering software-development-life-cycle-models
Answer key ☟
28.36.5 Software Development Life Cycle Models: UGC NET CSE | December 2011 | Part 2 | Question: 13
For a data entry project for office staff who have never used computers before (user interface and user
friendliness are extremely important), one will use
Answer key ☟
28.36.6 Software Development Life Cycle Models: UGC NET CSE | December 2012 | Part 2 | Question: 24
Answer key ☟
28.36.7 Software Development Life Cycle Models: UGC NET CSE | December 2012 | Part 2 | Question: 48
_____ is an “umbrella” activity that is applied throughout the software engineering process.
A. Debugging B. Testing
C. Designing D. Software quality assurance
ugcnetcse-dec2012-paper2 is&software-engineering software-development-life-cycle-models
Answer key ☟
28.36.8 Software Development Life Cycle Models: UGC NET CSE | December 2015 | Part 2 | Question: 47
Answer key ☟
28.36.9 Software Development Life Cycle Models: UGC NET CSE | July 2016 | Part 2 | Question: 42
The ____ model is preferred for software development when the requirements are not clear.
A. Rapid Application Development B. Rational Unified Process
C. Evolutionary Model D. Waterfall Model
ugcnetcse-july2016-paper2 is&software-engineering software-development-life-cycle-models
Answer key ☟
28.36.10 Software Development Life Cycle Models: UGC NET CSE | June 2019 | Part 2 | Question: 57
Answer key ☟
28.36.11 Software Development Life Cycle Models: UGC NET CSE | September 2013 | Part 2 | Question: 29
Answer key ☟
28.37.1 Software Development Models: UGC NET CSE | June 2010 | Part 2 | Question: 43
Answer key ☟
28.38.1 Software Intergrity: UGC NET CSE | June 2019 | Part 2 | Question: 56
A Web application and its support environment has not been fully fortified against attack. Web engineers
estimate that the likelihood of repelling an attack is only percent. The application does not contain sensitive
or controversial information, so the threat probability is percent. What is the integrity of the web application?
A. B. C. D.
ugcnetcse-june2019-paper2 software-intergrity
Answer key ☟
28.39.1 Software Maintenance: UGC NET CSE | Junet 2015 | Part 3 | Question: 46
Answer key ☟
28.39.2 Software Maintenance: UGC NET CSE | September 2013 | Part 3 | Question: 45
Answer key ☟
28.40.1 Software Metrics: UGC NET CSE | December 2014 | Part 2 | Question: 44
Which one of the following set of attributes should not be encompassed by effective software metrics ?
Answer key ☟
28.40.2 Software Metrics: UGC NET CSE | July 2016 | Part 3 | Question: 48
The number of function points of a proposed system is calculated as 500. Suppose that the system is planned to
be developed in Java and the LOC/FP ratio of Jave is 50. Estimate teh effort (E) required to complete the project
using the effort formula of basic COCOMO given: E=a(KLOC)
Assume that the values of a and b are 2.5 and 1.0 respectively
A. 25 person months B. 75 person months
C. 62.5 person months D. 72.5 person months
ugcnetcse-july2016-paper3 is&software-engineering software-metrics
Answer key ☟
28.40.3 Software Metrics: UGC NET CSE | June 2012 | Part 3 | Question: 33
Answer key ☟
28.41.1 Software Process: UGC NET CSE | December 2014 | Part 2 | Question: 41
Answer key ☟
28.42.1 Software Quality Assurance: UGC NET CSE | August 2016 | Part 3 | Question: 46
Answer key ☟
28.42.2 Software Quality Assurance: UGC NET CSE | December 2012 | Part 3 | Question: 55
A. correctness, reliability
B. efficiency, usability, maintainability
C. testability, portability, accuracy, error tolerances, expandability, access control, audit
D. All of the above
Answer key ☟
28.43.1 Software Quality Characteristics: UGC NET CSE | July 2016 | Part 2 | Question: 45
Answer key ☟
28.44.1 Software Reliability: Computer Science - UGC NET 2021 [ Question ID = 2345 ]
A system has 99.99% uptime and has a mean-time-between-failure of 1 day. How fast does the system have to
repair itself in order to reach this availability goal ?
1. 10 Seconds
2. 11 Seconds
3. 12 Seconds
4. 9 Seconds
Answer key ☟
28.44.2 Software Reliability: Computer Science - UGC NET 2021 [ Question ID = 2346 ]
In the context of Software Configuration Management (SCM), what kind of files should be committed to your
source control repository ?
A. Code files B. Documentation files
C. Output files D. Automatically generated files that are required for your
system to be used
Choose the correct answer from the options given below:
1. A and B only
2. B and C only
3. C and D only
4. D and A only
Answer key ☟
28.44.3 Software Reliability: Computer Science - UGC NET 2021 [ Question ID = 2349 ]
Statement II: Cleanroom software engineering follows the classic analysis, design, code, test, and debug cycle to
software development and focussing on defect removal rather than defect prevention.
In light of the above statements, choose the correct answer from the options given below :
Answer key ☟
28.44.4 Software Reliability: UGC NET CSE | August 2016 | Part 2 | Question: 45
The extent to which a software performs its intended functions without failures, is termed as
Answer key ☟
28.44.5 Software Reliability: UGC NET CSE | December 2011 | Part 2 | Question: 16
Answer key ☟
28.44.6 Software Reliability: UGC NET CSE | December 2014 | Part 3 | Question: 46
A. B. C. D.
ugcnetcse-dec2014-paper3 is&software-engineering software-reliability
Answer key ☟
28.44.7 Software Reliability: UGC NET CSE | July 2016 | Part 3 | Question: 43
A server crashes on the average once in 30 days, that is, the Mean Time Between Failures (MTBF) is 30 days.
When it happens it takes 12 hours to reboot it, that is, Mean Time To Repair (MTTR) is 12 hours. The
availability of server with these reliability data values is approximately.
Answer key ☟
28.44.8 Software Reliability: UGC NET CSE | June 2013 | Part 3 | Question: 2
A. B.
C. D.
ugcnetcse-june2013-paper3 is&software-engineering software-reliability non-gatecse
Answer key ☟
28.44.9 Software Reliability: UGC NET CSE | June 2013 | Part 3 | Question: 6
Software safety is a ______ activity that focuses on the identification and assessment of potential hazards that
may affect software negatively and cause an entire system to fail.
A. Risk mitigation, monitoring and management B. Software quality assurance
C. Software quality assurance D. Defect removal efficiency
ugcnetcse-june2013-paper3 is&software-engineering software-reliability
Answer key ☟
28.44.10 Software Reliability: UGC NET CSE | June 2014 | Part 3 | Question: 17
Assume that a program will experience 200 failures in infinite time. It has now experienced 100 failures. The
initial failure intensity was 20 failures/CPU hr. Then the current failure intensity will be
A. 5 failured/CPU hr B. 10 failured/CPU hr
C. 20 failured/CPU hr D. 40 failured/CPU hr
ugcnetjune2014iii is&software-engineering software-reliability
Answer key ☟
28.44.11 Software Reliability: UGC NET CSE | September 2013 | Part 3 | Question: 44
The failure intensity for a basic model as a function of failures experienced is given as
where is the initial failure intensity at the start of the execution, is the average or expected number of
failures at a given point in time, the quantity is the total number of failures that would occur in infinite time.
Assume that a program will experience 100 failures in infinite time, the initial failure intensity was 10 failures/CPU hr.
Then the decrement of failures intensity per failure will be
Answer key ☟
28.45.1 Software Requirement Specification: UGC NET CSE | September 2013 | Part 2 | Question: 31
A. I, II and III B. I, III and IV C. II, III and IV D. I, II, III and IV
ugcnetsep2013ii is&software-engineering software-requirement-specification
Answer key ☟
28.46.1 Software Requirement Specifications: UGC NET CSE | August 2016 | Part 2 | Question: 41
A. B. C. D.
Where is the number of requirements for which all reviewers have identical interpretations, is number of
requirements in a specification.
Answer key ☟
28.47.1 Software Reuse: UGC NET CSE | June 2019 | Part 2 | Question: 54
Software reuse is
A. the process of analysing software with the objective of recovering its design and specification
B. the process of using existing software artifacts and knowledge to build new software
C. concerned with reimplementing legacy system to make them more maintainable
D. the process of analysing software to create a representation of a higher level of abstraction and breaking software
down into its parts to see how it works
ugcnetcse-june2019-paper2 software-reuse
Answer key ☟
28.48 Software Testing (22)
28.48.1 Software Testing: Computer Science - UGC NET 2021 [ Question ID = 2341 ]
software-testing
Answer key ☟
28.48.2 Software Testing: Computer Science - UGC NET 2021 [ Question ID = 2343 ]
1. Textual
2. Diagrammatic
3. Mathematical
4. Computer code
software-testing
Answer key ☟
28.48.3 Software Testing: UGC NET CSE | August 2016 | Part 2 | Question: 44
For a program of variables, boundary value analysis yields ______ test cases.
A. B. C. D.
ugcnetcse-aug2016-paper2 is&software-engineering software-testing
Answer key ☟
28.48.4 Software Testing: UGC NET CSE | December 2008 | Part 2 | Question: 43
A. verification
B. validation
C. both verification and validation
D. none of the above
Answer key ☟
28.48.5 Software Testing: UGC NET CSE | December 2009 | Part 2 | Question: 42
Any error whose cause cannot be identified anywhere within the software system is called ________
Answer key ☟
28.48.6 Software Testing: UGC NET CSE | December 2009 | Part 2 | Question: 47
(A) to show that s/w is operational at its interfaces i.e. input and output.
(B) to examine internal details of code.
(C) at client side.
(D) none of above.
ugcnetcse-dec2009-paper2 is&software-engineering software-testing
Answer key ☟
28.48.7 Software Testing: UGC NET CSE | December 2010 | Part 2 | Question: 15
Answer key ☟
28.48.8 Software Testing: UGC NET CSE | December 2010 | Part 2 | Question: 41
Prototyping is used to
Answer key ☟
28.48.9 Software Testing: UGC NET CSE | December 2011 | Part 2 | Question: 18
Following is used to demonstrate that the new release of software still performs the old one did by rerunning the
old tests :
A. Functional testing B. Path testing
C. Stress testing D. Regression testing
ugcnetcse-dec2011-paper2 is&software-engineering software-testing
Answer key ☟
28.48.10 Software Testing: UGC NET CSE | December 2012 | Part 2 | Question: 31
Answer key ☟
28.48.11 Software Testing: UGC NET CSE | December 2013 | Part 3 | Question: 8
A. they are not effective B. they do not explore combinations of input circumstances
C. they explore combinations of input circumstances D. none of the above
ugcnetcse-dec2013-paper3 is&software-engineering software-testing
Answer key ☟
28.48.12 Software Testing: UGC NET CSE | December 2015 | Part 2 | Question: 46
In software testing, how the error, fault and failure are related to each other?
A. Error leads to failure but fault is not related to error and failure
B. Fault leads to failure but error is not related to fault and failure
C. Error leads to fault and fault leads to failure
D. Fault leads to error and error leads to failure
Answer key ☟
28.48.13 Software Testing: UGC NET CSE | January 2017 | Part 3 | Question: 43
Which of the following statement(s) is/are TRUE with regard to software testing?
I. Regression testing technique ensures that the software product runs correctly after the changes during maintenance.
II. Equivalence partitioning is a white-box testing technique that divides the input domain of a program into classes of
data from which test cases can be derived.
A. only I B. only II
C. both I and II D. neither I nor II
ugcnetcse-jan2017-paper3 is&software-engineering software-testing
Answer key ☟
28.48.14 Software Testing: UGC NET CSE | January 2017 | Part 3 | Question: 44
Which of the following are facts about a top-down software testing approach?
Answer key ☟
28.48.15 Software Testing: UGC NET CSE | June 2012 | Part 3 | Question: 30
While unit testing a module, it is found that for a set of test data, maximum 90% of the code alone were tested
with a probability of success 0.9. The reliability of the module is
A. at least greater than 0.9 B. equal to 0.9
C. at most 0.81 D. at least 1/0.81
ugcnetcse-june2012-paper3 is&software-engineering software-testing
Answer key ☟
28.48.16 Software Testing: UGC NET CSE | June 2013 | Part 3 | Question: 4
Equivalence partitioning is a ______ method that divides the input domain of a program into classes of data
from which test cases can be derived
A. White-box testing B. Black-box testing
C. Orthogonal array testing D. Stress testing
ugcnetcse-june2013-paper3 is&software-engineering software-testing non-gatecse
Answer key ☟
28.48.17 Software Testing: UGC NET CSE | June 2014 | Part 2 | Question: 15
Answer key ☟
28.48.18 Software Testing: UGC NET CSE | June 2014 | Part 3 | Question: 16
Software testing is
Answer key ☟
28.48.19 Software Testing: UGC NET CSE | Junet 2015 | Part 2 | Question: 42
Which of the testing strategy requirements established during requirements analysis are validated against
developed software?
Answer key ☟
28.48.20 Software Testing: UGC NET CSE | September 2013 | Part 2 | Question: 30
Equivalence partitioning is a _____ testing method that divides the input domain of a program into classes of
data from which test cases can be derived.
Answer key ☟
28.48.21 Software Testing: UGC NET CSE | September 2013 | Part 3 | Question: 29
____ refers to the discrepancy among a computed, observed or measured value and the true specified or
theoretically correct values?
Answer key ☟
28.48.22 Software Testing: UGC NET CSE | September 2013 | Part 3 | Question: 43
Equivalence class partitioning approach is used to divide the input domain into a set of equivalence classes, so
that if a program works correctly for all the other values in that class. This is used _____
Answer key ☟
28.49.1 Software Validation: UGC NET CSE | December 2012 | Part 3 | Question: 65
_____ establishes information about when,why and by whom changes are made in a Software.
A. Software Configuration Management B. Change Control
C. Version Control D. An Audit Trail
ugcnetcse-dec2012-paper3 is&software-engineering software-validation
Answer key ☟
28.50.1 Source Code Metric: UGC NET CSE | December 2014 | Part 3 | Question: 43
Answer key ☟
An actor in an animation is a small program invoked _____ per frame to determine the characteristics of some
object in the animation.
Answer key ☟
A. use cases and user requirements B. implementation and system design blueprints
C. detailed specifications and user requirements D. functional specifications and use cases
ugcnetcse-june2019-paper2 validation
Answer key ☟
28.53.1 Waterfall Model: UGC NET CSE | August 2016 | Part 2 | Question: 42
28.53.2 Waterfall Model: UGC NET CSE | July 2016 | Part 2 | Question: 43
Answer key ☟
28.54.1 White Box Testing: UGC NET CSE | June 2019 | Part 2 | Question: 53
In the context of software testing, which of the following statements is/are NOT correct?
P: A minimal test set that achieves path coverage will also achieve statement coverage.
Q: A minimal test set that achieves path coverage will generally detect more faults than one that achieves
statement coverage.
R: A minimal test set that achieves statement coverage will generally detect more faults than one that achieves
branch coverage.
Answer key ☟
Answer Keys
28.0.1 Q-Q 28.0.2 Q-Q 28.0.3 Q-Q 28.0.4 Q-Q 28.0.5 Q-Q
28.0.6 Q-Q 28.0.7 Q-Q 28.0.8 Q-Q 28.0.9 Q-Q 28.0.10 Q-Q
28.0.11 Q-Q 28.0.12 Q-Q 28.0.13 Q-Q 28.0.14 Q-Q 28.0.15 Q-Q
28.0.16 Q-Q 28.0.17 Q-Q 28.0.18 Q-Q 28.0.19 Q-Q 28.0.20 Q-Q
28.0.21 Q-Q 28.1.1 B 28.2.1 C 28.2.2 B 28.3.1 B
28.4.1 C 28.5.1 C 28.5.2 B 28.5.3 C 28.6.1 Q-Q
28.7.1 Q-Q 28.7.2 Q-Q 28.7.3 B 28.8.1 B 28.9.1 D
28.9.2 C 28.10.1 Q-Q 28.10.2 A 28.11.1 B 28.11.2 Q-Q
28.11.3 B 28.12.1 B 28.13.1 D 28.13.2 A 28.14.1 C
28.14.2 C 28.15.1 B 28.16.1 A 28.17.1 Q-Q 28.18.1 B
28.18.2 C 28.19.1 C 28.20.1 B 28.21.1 Q-Q 28.21.2 Q-Q
28.21.3 Q-Q 28.21.4 Q-Q 28.21.5 Q-Q 28.21.6 A 28.21.7 C
28.21.8 B 28.21.9 C 28.21.10 D 28.21.11 C 28.21.12 D
28.21.13 D 28.21.14 A 28.21.15 A 28.21.16 C 28.21.17 D
28.21.18 B 28.21.19 B 28.21.20 B 28.21.21 D 28.21.22 D
28.21.23 B 28.21.24 B 28.21.25 N/A 28.21.26 Q-Q 28.21.27 Q-Q
28.21.28 Q-Q 28.21.29 Q-Q 28.21.30 Q-Q 28.21.31 Q-Q 28.21.32 N/A
28.21.33 Q-Q 28.21.34 D 28.21.35 C 28.21.36 B 28.21.37 C
28.21.38 B 28.21.39 B 28.21.40 B 28.21.41 B 28.21.42 B
28.21.43 A 28.21.44 C 28.21.45 B 28.21.46 A 28.21.47 C
28.21.48 B 28.21.49 B 28.21.50 B 28.21.51 B 28.21.52 C
28.21.53 C 28.21.54 B 28.21.55 C 28.21.56 C 28.21.57 A
28.21.58 B 28.21.59 C 28.21.60 D 28.21.61 A 28.21.62 C
28.22.1 A 28.23.1 B 28.24.1 C 28.25.1 A 28.26.1 B
28.27.1 C 28.28.1 D 28.29.1 B 28.29.2 D 28.29.3 B
28.30.1 D 28.31.1 B 28.32.1 B 28.33.1 D 28.34.1 Q-Q
28.34.2 Q-Q 28.34.3 Q-Q 28.34.4 Q-Q 28.34.5 Q-Q 28.34.6 Q-Q
28.34.7 B 28.34.8 C 28.34.9 Q-Q 28.34.10 Q-Q 28.34.11 Q-Q
28.34.12 A 28.34.13 X 28.34.14 C 28.34.15 B 28.34.16 C
28.34.17 D 28.34.18 A 28.35.1 Q-Q 28.35.2 Q-Q 28.35.3 C
28.36.1 Q-Q 28.36.2 Q-Q 28.36.3 Q-Q 28.36.4 Q-Q 28.36.5 Q-Q
28.36.6 C 28.36.7 D 28.36.8 D 28.36.9 C 28.36.10 D
28.36.11 A 28.37.1 Q-Q 28.38.1 D 28.39.1 B 28.39.2 B
28.40.1 D 28.40.2 C 28.40.3 B 28.41.1 B 28.42.1 Q-Q
28.42.2 D 28.43.1 D 28.44.1 Q-Q 28.44.2 Q-Q 28.44.3 Q-Q
28.44.4 Q-Q 28.44.5 Q-Q 28.44.6 C 28.44.7 C 28.44.8 D
28.44.9 B 28.44.10 B 28.44.11 C 28.45.1 D 28.46.1 Q-Q
28.47.1 B 28.48.1 Q-Q 28.48.2 Q-Q 28.48.3 Q-Q 28.48.4 Q-Q
28.48.5 B 28.48.6 Q-Q 28.48.7 Q-Q 28.48.8 Q-Q 28.48.9 Q-Q
28.48.10 B 28.48.11 B 28.48.12 C 28.48.13 A 28.48.14 A
28.48.15 C 28.48.16 B 28.48.17 D 28.48.18 D 28.48.19 A
28.48.20 B 28.48.21 D 28.48.22 B 28.49.1 D 28.50.1 B
28.51.1 A 28.52.1 C 28.53.1 Q-Q 28.53.2 B 28.54.1 A
29 Non GATE CSE: Java (10)
29.1.1 Abstract Method: UGC NET CSE | August 2016 | Part 3 | Question: 40
Answer key ☟
Answer key ☟
Answer key ☟
Answer key ☟
Answer key ☟
29.4.1 Method Overriding: UGC NET CSE | August 2016 | Part 3 | Question: 38
Answer key ☟
29.5.1 Multi Threaded Programming: UGC NET CSE | December 2014 | Part 3 | Question: 37
Which methods are utilized to control the access to an object in multi-threaded programming ?
A. Asynchronized methods B. Synchronized methods
C. Serialized methods D. None of the above
ugcnetcse-dec2014-paper3 java multi-threaded-programming
Answer key ☟
Answer key ☟
29.7 Servlet (1)
A. B.
C. D.
ugcnetjune2014iii java servlet
Answer key ☟
29.8.1 Wrapper Class Object: UGC NET CSE | December 2014 | Part 3 | Question: 39
Converting a primitive type data into its corresponding wrapper class object instance is called
Answer key ☟
Answer Keys
29.1.1 Q-Q 29.2.1 C 29.3.1 Q-Q 29.3.2 Q-Q 29.3.3 X
29.4.1 Q-Q 29.5.1 B 29.6.1 B;C 29.7.1 D 29.8.1 D
30 Non GATE CSE: Numerical Methods (3)
30.1.1 Hungarian Method: UGC NET CSE | December 2014 | Part 3 | Question: 69
Five men are available to do five different jobs. From past records, the time (in hours) that each man takes to do
each job is known and is given in the following table :
Find out the minimum time required to complete all the jobs.
A. B. C. D.
ugcnetcse-dec2014-paper3 assignment-problem hungarian-method
Answer key ☟
30.2.1 Operation Research Pert Cpm: UGC NET CSE | December 2018 | Part 2 | Question: 8
Answer key ☟
30.3.1 Simplex Method: UGC NET CSE | June 2019 | Part 2 | Question: 10
What shall be the solution of the LLP after applying first iteration of the Simplex Method?
A. B.
C. D.
ugcnetcse-june2019-paper2 simplex-method
Answer key ☟
Answer Keys
30.1.1 C 30.2.1 Q-Q 30.3.1 B
31 Non GATE CSE: Object Oriented Programming (59)
A. B.
C. D.
ugcnetcse-dec2012-paper2 match-the-following
Answer key ☟
Polymorphism means :
Answer key ☟
ugcnetcse-dec2007-paper2
Answer key ☟
A. “Private” elements of a base class are not accessible by members of its derived class.
B. “Protected” elements of base class are not accessible by members of its derived class.
C. When base class access specified is “Public”, public elements of the base class become public members of its
derived class.
D. When base class access specified is “Public”, protected elements of a base class become protected members of its
derived class.
ugcnetcse-dec2007-paper2
Answer key ☟
Answer key ☟
31.1.2 Abstract Class: UGC NET CSE | December 2015 | Part 3 | Question: 36
Which of the following is/are correct with reference to Abstract class and interface?
i. A class can inherit only one Abstract class but may inherit several interfaces
ii. An abstract class can provide complete and default code but an interface has no code
A. i is true B. ii is true
C. Both i and ii are true D. Neitehr i nor ii are true
ugcnetcse-dec2015-paper3 object-oriented-programming abstract-class
Answer key ☟
A. B. C. D.
ugcnetcse-aug2016-paper2 object-oriented-programming c++ function
Answer key ☟
Answer key ☟
A. Composition is a strong type of association between two classes with full ownership.
B. Composition is a strong type of association between two classes with partial ownership.
C. Composition is a weak type of association between two classes with partial ownership.
D. Composition is a weak type of association between two classes with strong ownership.
Answer key ☟
Answer key ☟
Answer key ☟
A. zero
B. 1
C. 2
D. any number
Answer key ☟
Answer key ☟
31.6.1 Friend Class: UGC NET CSE | July 2016 | Part 2 | Question: 13
Which one of the following is correct, when a class grants friend status to another class?
A. The member functions of the class generating friendship can access teh members of the friend class
B. All member functions of the class granted friendship have unrestricted access to the members of the class granting
the friendship
C. Class friendship is reciprocal to each other
D. There is no such concept
ugcnetcse-july2016-paper2 object-oriented-programming friend-class
Answer key ☟
31.7.1 Friend Function: UGC NET CSE | August 2016 | Part 2 | Question: 13
Answer key ☟
31.7.2 Friend Function: UGC NET CSE | June 2014 | Part 2 | Question: 44
Answer key ☟
_____ allows to create classes which are derived from other classes, so that they automatically include some of
its "parent's" members, plus its own members.
Answer key ☟
Which of the following, in C++, is inherited in a derived class from base class?
Answer key ☟
When the inheritance is private, the private methods in base class are _____ in the derived class (in C++)
Answer key ☟
31.9 Java (10)
Which is the method used to retrieve the current state of a check box?
A. get State ( ) B. put State ( )
C. retrieve State ( ) D. write State ( )
ugcnetcse-dec2012-paper3 object-oriented-programming java
Answer key ☟
Answer key ☟
Answer key ☟
Which of the following statement(s) with regard to an abstract class in JAVA is /are TRUE ?
A. Only I B. only II
C. Neither I nor II D. Both I and II
ugcnetcse-jan2017-paper3 object-oriented-programming java
Answer key ☟
31.9.5 Java: UGC NET CSE | July 2016 | Part 3 | Question: 38
It is possible to define a class within a class termed as nested class. There are __ types of nested classes
A. 2 B. 3 C. 4 D. 5
ugcnetcse-july2016-paper3 object-oriented-programming java
Answer key ☟
When one object reference variable is assigned to another object reference variable then
Answer key ☟
31.9.7 Java: UGC NET CSE | June 2012 | Part 3 | Question: 70, UGCNET-Sep2013-III: 52
Assume that we have constructor functions for both base class and derived class. Now consider the declaration
in
main()
Base *P=New Derived;
In what sequence will the constructor be called?
Answer key ☟
Answer key ☟
The Servlet Response interface enables a servlet to formulate a response for a client using the method
A. void log(Exception e, String s) B. void destroy()
C. int get ServerPort() D. void set ContextType(String Type)
ugcnetcse-june2015-paper3 object-oriented-programming java
Answer key ☟
Answer key ☟
31.10.1 Object Oriented Programming: UGC NET CSE | December 2008 | Part 2 | Question: 28
When a language has the capability to produce new data types, it is said to be :
A. extensible
B. encapsulated
C. overloaded
D. none of the above
ugcnetcse-dec2008-paper2 object-oriented-programming
31.10.2 Object Oriented Programming: UGC NET CSE | December 2012 | Part 3 | Question: 48
Answer key ☟
31.10.3 Object Oriented Programming: UGC NET CSE | December 2013 | Part 3 | Question: 10
A. B.
C. D.
ugcnetcse-dec2013-paper3 object-oriented-programming
Answer key ☟
31.10.4 Object Oriented Programming: UGC NET CSE | December 2013 | Part 3 | Question: 11
Answer key ☟
31.10.5 Object Oriented Programming: UGC NET CSE | December 2013 | Part 3 | Question: 18
A. One defined by C++ and the other not defined by C B. One defined by C and one specific to C++
C. Both are specific to C++ D. Both of them are improvements of C
ugcnetcse-dec2013-paper3 object-oriented-programming
Answer key ☟
31.10.6 Object Oriented Programming: UGC NET CSE | December 2013 | Part 3 | Question: 19
Answer key ☟
31.10.7 Object Oriented Programming: UGC NET CSE | December 2014 | Part 2 | Question: 15
Which of the following differentiates between overloaded functions and overridden functions ?
A. Overloading is a dynamic or runtime binding and overridden is a static or compile time binding.
B. Overloading is a static or compile time binding and overriding is dynamic or runtime binding.
C. Redefining a function in a friend class is called overloading, while redefining a function in a derived class is called
as overridden function.
D. Redefining a function in a derived class is called function overloading, while redefining a function in a friend class
is called function overriding.
ugcnetcse-dec2014-paper2 object-oriented-programming
Answer key ☟
31.10.8 Object Oriented Programming: UGC NET CSE | December 2015 | Part 2 | Question: 12
31.10.9 Object Oriented Programming: UGC NET CSE | December 2015 | Part 3 | Question: 30
A. B.
C. D.
ugcnetcse-dec2015-paper3 object-oriented-programming
Answer key ☟
31.10.10 Object Oriented Programming: UGC NET CSE | January 2017 | Part 2 | Question: 11
Answer key ☟
31.10.11 Object Oriented Programming: UGC NET CSE | January 2017 | Part 2 | Question: 12
Answer key ☟
31.10.12 Object Oriented Programming: UGC NET CSE | January 2017 | Part 2 | Question: 14
Answer key ☟
31.10.13 Object Oriented Programming: UGC NET CSE | January 2017 | Part 3 | Question: 37
Abstraction and encapsulation are fundamental principles that underlie the object oriented approach to software
development. What can you say about the following two statements?
I. Abstraction allows us to focus on what something does without considering the complexities of how it works.
II. Encapsulation allows us to consider complex ideas while ignoring irrelevant detail that would confuse us.
A. Neither I nor II is correct B. Both I and II are correct
C. Only II is correct D. Only I is correct
ugcnetcse-jan2017-paper3 object-oriented-programming
Answer key ☟
31.10.14 Object Oriented Programming: UGC NET CSE | July 2016 | Part 2 | Question: 14
When a method in subclass has the same name and type signatures as a method in the superclass, then the
method in the subclass ____ the method in the superclass.
Answer key ☟
31.10.15 Object Oriented Programming: UGC NET CSE | July 2016 | Part 3 | Question: 37
Answer key ☟
31.10.16 Object Oriented Programming: UGC NET CSE | July 2018 | Part 2 | Question: 5
Which of these would actually swap the contents of the two integer variables and ?
Answer key ☟
31.10.17 Object Oriented Programming: UGC NET CSE | June 2005 | Part 2 | Question: 13
Answer key ☟
31.10.18 Object Oriented Programming: UGC NET CSE | June 2010 | Part 2 | Question: 13
Member of a class specified as ______ are accessible only to method of the class.
Answer key ☟
31.10.19 Object Oriented Programming: UGC NET CSE | June 2010 | Part 2 | Question: 14
A.
B.
C.
D.
ugcnetcse-june2010-paper2 object-oriented-programming
Answer key ☟
31.10.20 Object Oriented Programming: UGC NET CSE | June 2014 | Part 3 | Question: 12
ugcnetjune2014iii object-oriented-programming
Answer key ☟
31.10.21 Object Oriented Programming: UGC NET CSE | June 2014 | Part 3 | Question: 13
Match the following with respect to I/O classes in object oriented programming
A. B.
C. D.
ugcnetjune2014iii object-oriented-programming match-the-following
Answer key ☟
31.10.22 Object Oriented Programming: UGC NET CSE | June 2014 | Part 3 | Question: 49
A. collection of continuous objects that incorporates both data structure and behaviour.
B. collection of discrete objects that incorporates both discrete structure and behaviour.
C. collection of discrete objects that incorporates both data structure and behaviour.
D. collection of objects that incorporates both discrete data structure and behaviour.
ugcnetjune2014iii object-oriented-programming
Answer key ☟
31.10.23 Object Oriented Programming: UGC NET CSE | June 2014 | Part 3 | Question: 50
The "part-whole”or "a-part-of", relationship in which objects representing the components of something
associated with an object representing the entire assembly is called as
A. Association B. Aggregation
C. Encapsulation D. Generalisation
ugcnetjune2014iii object-oriented-programming
31.10.24 Object Oriented Programming: UGC NET CSE | June 2014 | Part 3 | Question: 51
The pure object oriented programming language with extensive metadata available and modifiable at run time is
Answer key ☟
31.10.25 Object Oriented Programming: UGC NET CSE | October 2020 | Part 2 | Question: 12
Consider the following recursive Java function that takes two long arguments and returns a float value:
public static float f (long m, long n) {
float result = (float)m / (float)n;
if (m < 0 || n<0) return 0.0f;
else result -=f(m*2, n*3);
return result;
}
A. B. C. D.
ugcnetcse-oct2020-paper2 non-gatecse object-oriented-programming
31.11.1 Operator Overloading: UGC NET CSE | December 2013 | Part 2 | Question: 18
A. * B. += C. == D. : :
ugcnetcse-dec2013-paper2 programming-in-c operator-overloading
Answer key ☟
The function f() returns the int that represents the ____P____ in the binary representation of positive integer n, where P
is
Answer key ☟
31.13.1 Software Design: UGC NET CSE | December 2012 | Part 3 | Question: 54
The Object Modelling Technique (OMT) uses the following three kinds of model to describe a system
Answer key ☟
31.14.1 Template Vs Macro: UGC NET CSE | Junet 2015 | Part 2 | Question: 14
A. when we write overloaded function we must code the function for each usage
B. when we write function template we code the function only once
C. it is difficult to debug macros
D. templates are more efficient than macros
Answer key ☟
Answer key ☟
Answer Keys
31.0.1 A 31.0.2 X 31.0.3 Q-Q 31.0.4 Q-Q 31.1.1 B
31.1.2 C 31.2.1 Q-Q 31.2.2 B 31.3.1 Q-Q 31.4.1 Q-Q
31.4.2 Q-Q 31.4.3 Q-Q 31.5.1 Q-Q 31.6.1 Q-Q 31.7.1 Q-Q
32.1.1 Assignment Problem: UGC NET CSE | June 2014 | Part 3 | Question: 59
The given maximization assignment problem can be converted into a minimization problem by
A. Subtracting each entry in a column from the maximum value in that column.
B. Subtracting each entry in the table from the maximum value in that table.
C. Adding each entry in a column from the maximum value in that column.
D. Adding maximum value of the table to each entry in the table.
Answer key ☟
32.1.2 Assignment Problem: UGC NET CSE | Junet 2015 | Part 3 | Question: 67
In the Hungarian method for solving assignment problem, an optimal assignment requires that the maximum
number of lines that can be drawn through squares with zero opportunity cost be equal to the number of
A. rows or columns B. rows + columns
C. rows + columns -1 D. rows + columns +1
ugcnetcse-june2015-paper3 assignment-problem optimization
Answer key ☟
32.2.1 Dual Linear Programming: UGC NET CSE | December 2012 | Part 3 | Question: 24
Answer key ☟
32.3.1 Linear Programming: UGC NET CSE | October 2020 | Part 2 | Question: 4
A. B. C. D.
ugcnetcse-oct2020-paper2 non-gatecse linear-programming
Answer key ☟
32.4.1 Linear Programming Problem: UGC NET CSE | December 2013 | Part 3 | Question: 1
If the primal Linear Programming pro blem has unbounded solution, then it's dual problem will have
A. feasible solution B. alternative solution
C. no feasible solution at all D. no alternative solution at all
ugcnetcse-dec2013-paper3 optimization linear-programming-problem
Answer key ☟
In a Linear Programming Problem, suppose there are three basic variables and 2 non-basic variables, then the
possible number of basic solutions are
A. 6 B. 8 C. 10 D. 12
ugcnetcse-dec2012-paper3 optimization linear-programming
Answer key ☟
A.
B.
C.
D. All of these
Answer key ☟
Subject to
Answer key ☟
ugcnetcse-dec2015-paper3 optimization
Answer key ☟
32.5.5 Optimization: UGC NET CSE | December 2015 | Part 3 | Question: 52
A basic feasible solution of a linear programming problem is said to be ______ if at least one of the basic
variable is zero
Answer key ☟
Answer key ☟
Which of the following special cases does not require reformulation of the problem in order to obtain a solution
?
Answer key ☟
Answer key ☟
32.6.1 Transportation Problem: UGC NET CSE | December 2012 | Part 3 | Question: 28
The initial basic feasible solution to the following transportation problem using Vogel’s approximation method
is
A. , Total cost
B. , Total cost
C. , Total cost
D. None of the above
Answer key ☟
32.6.2 Transportation Problem: UGC NET CSE | December 2015 | Part 3 | Question: 53
i. The solution must be feasible, i.e. it must satisfy all the supply and demand constraints
ii. The number of positive allocations must be equal to , where is the number of rows and is the number
of columns
iii. All the positive allocations must be in independent positions
The initial solution of a transportation problem is said to be non-degenerate basic feasible solution if it satisfies:
A. and only B. and only
C. and only D. , and
ugcnetcse-dec2015-paper3 optimization transportation-problem
Answer key ☟
32.6.3 Transportation Problem: UGC NET CSE | December 2015 | Part 3 | Question: 54
Stores
I II III IV Supply
A 4 6 8 13 50
Factories B 13 11 10 8 70
C 14 4 10 13 30
D 9 11 13 8 50
Demand 25 35 105 20
The transportation cost in the initial basic feasible solution of the above transportation problem using Vogel's
Approximation method is
A. B. C. D.
ugcnetcse-dec2015-paper3 optimization transportation-problem
Answer key ☟
32.6.4 Transportation Problem: UGC NET CSE | June 2014 | Part 3 | Question: 60
A. 76 B. 78 C. 80 D. 82
ugcnetjune2014iii optimization transportation-problem
Answer key ☟
32.6.5 Transportation Problem: UGC NET CSE | Junet 2015 | Part 3 | Question: 68
The initial basic feasible solution of the above transportation problem using Vogel's Approximation method (VAM) is
given below:
Answer key ☟
Answer Keys
32.1.1 B 32.1.2 A 32.2.1 A 32.3.1 D 32.4.1 C
32.5.1 C 32.5.2 D 32.5.3 B 32.5.4 A 32.5.5 A
32.5.6 B 32.5.7 A 32.5.8 D 32.6.1 D 32.6.2 A
32.6.3 B 32.6.4 A 32.6.5 B
33 Non GATE CSE: Others (150)
Which of the following changes permission to deny write permission to group and others ?
ugcnetcse-june2009-paper2
ugcnetcse-dec2004-paper2
Answer key ☟
ugcnetcse-dec2004-paper2
Answer key ☟
A. B. C. D.
ugcnetcse-dec2006-paper2
Answer key ☟
ugcnetcse-dec2006-paper2
ugcnetcse-dec2007-paper2
ugcnetcse-dec2007-paper2
A. B. C. D.
ugcnetcse-oct2022-paper1
A.
B.
C.
D.
ugcnetcse-oct2022-paper1
Answer key ☟
A. B. C. D.
ugcnetcse-oct2022-paper1
A. B. C. D.
ugcnetcse-oct2022-paper1
ugcnetcse-oct2022-paper1
Answer key ☟
Table : Reserves
Table : Boats
Which of the following relational algebra query computes the names of sailor who have reserved all boats?
ugcnetcse-oct2022-paper1
Answer key ☟
Table : Reserves
Table : Boats
Which of the following relational algebra query/queries computes/compute the sid’s of sailors with age over who
have not reserved red boat?
ugcnetcse-oct2022-paper1
Table : Reserves
Table : Boats
Which of the following relational algebra query/queries computes/compute the name of sailors who have reserved red
boat?
sname (( = Boats) Reserves Sailors)
sname ( (( = ) Reserves) Sailors)
sname (( = Reserves) Boats Sailors)
1. Both and
2. Both and
3. Only
4. Only
ugcnetcse-oct2022-paper1
Table : Reserves
Table : Boats
Which of the following relational algebra query/queries computes/compute the name of sailors who have reserved boat
?
sname (( = Boats) Sailors)
sname = ( = (Reserves Sailors))
sname = (( = Reserves) Sailors)
A. Both and B. Both and
C. Only D. Only
ugcnetcse-oct2022-paper1
Answer key ☟
Table : Reserves
Table : Boats
Which of the following relational algebra query computes the names of sailors who have reserved a red and a green
boat?
ugcnetcse-oct2022-paper1
In a game playing search tree, upto which depth pruning can be applied?
(A) Root level
(B) level
(C) level
(D) Depends on utility value in a breadth first order
Choose the correct answer from the options given below :
Answer key ☟
Answer key ☟
A. , and
B. and
C. and
D. and
ugcnetcse-oct2022-paper1
Modules and operate on the same input and output, then the cohesion is
For the following page reference string , the number of page faults that occur in Least
Recently Used page replacement algorithm with frame size is
A. B. C. D.
ugcnetcse-oct2022-paper1
ugcnetcse-oct2022-paper1
33.0.25 UGC NET CSE | October 2022 | Part 1 | Question: 86
List I List II
(A) Localization (I) Encapsulationlation
(B) Packaging or
binding of a (II) Abstraction
collection of items
(C) Mechanism that (III) Characteristic of
enables designer software that indicates
to focus on essential the manner in which
details of a program information is
component. concentrated in program
(IV) Suppressing the
(D) Information
operational details of a
hiding
program component
The total storage capacity of a floppy disk having tracks and storing bytes/sector is bytes. How
many sectors does this disk have?
A. B. C. D.
ugcnetcse-oct2022-paper1
Answer key ☟
The process to gather the software requirements from client, analyze and document is known as -
A. Software Engineering Process B. User Engineering Process
C. Requirement Elicitation Process D. Requirement Engineering Process
ugcnetcse-oct2022-paper1
Answer key ☟
33.0.30 UGC NET CSE | October 2022 | Part 1 | Question: 79
The reduced grammar equivalent to the grammar, whose production rules are given below, is
A.
B.
C.
D.
ugcnetcse-oct2022-paper1
A magnetic tape drive has transport speed of inches per second and a recording density of bytes per
inch. The time required to write bytes of data grouped in characters record with a blocking factor
is
A. B.
C. D.
ugcnetcse-oct2022-paper1
Consider
Which of the following string is in ?
A. B. C. D.
ugcnetcse-oct2022-paper1
Answer key ☟
ugcnetcse-oct2022-paper1
Answer key ☟
Given below are two statements : one is labelled as Assertion and the other is labelled as Reason :
Assertion :
Reason
In the light of the above statements, choose the correct answer from the options given below :
ugcnetcse-oct2022-paper1
ugcnetcse-oct2022-paper1
ugcnetcse-oct2022-paper1
33.0.38 UGC NET CSE | October 2022 | Part 1 | Question: 70
ugcnetcse-oct2022-paper1
Answer key ☟
ugcnetcse-oct2022-paper1
Which mechanism in allows organizations to specify globally unique names as element tags in
documents?
A. B.
C. D.
ugcnetcse-oct2022-paper1
How many rotations are required during the construction of an tree if the following elements are to be
added in the given sequence?
Answer key ☟
A. B.
C. D.
ugcnetcse-oct2022-paper1
A trigger is
ugcnetcse-oct2022-paper1
Given below are two statements : one is labelled as Assertion and the other is labelled as Reason :
Assertion : A load-and-go assembler avoids the overhead of writing the object program out and reading it back in.
Reason : This can be done with either one-pass or two pass assembler.
In the light of the above statements, choose the correct answer from the options given below :
ugcnetcse-oct2022-paper1
33.0.50 UGC NET CSE | October 2022 | Part 1 | Question: 55
The representation of bit code into bit, even parity Hamming code is
A. B. C. D.
ugcnetcse-oct2022-paper1 hamming-code
Answer key ☟
In a cache memory, if address has bits in Tag field and bits in index field, the size of main memory and
cache memory would be respectively
A. B. ,
C. D.
ugcnetcse-oct2022-paper1
ugcnetcse-oct2022-paper1
Consider a logic gate circuit, with 8 input lines and 3 output lines specified
by following operations
Answer key ☟
A. is true B. is true
C. Both and are true D. It does not depend on and
ugcnetcse-oct2022-paper1
If an operating system does not allow a child process to exist when the parent process has been terminated, this
phenomenon is called as.
A. Threading B. Cascading termination
C. Zombie termination D. Process killing
ugcnetcse-oct2022-paper1
A.
B.
C.
D.
ugcnetcse-oct2022-paper1
A. Statement only
B. Statement and Statement only
C. Statement , Statement and Statement only
D. Statement , Statement and Statement only
ugcnetcse-oct2022-paper1
ugcnetcse-oct2022-paper1
Answer key ☟
For the graph; the following sequences of depth first search (DFS) are given
(A)
(B)
(C)
(D)
Which of the following is correct?
A. only B.
C. , only D. only
ugcnetcse-oct2022-paper1
Hidden surface removal problem with minimal pipeline can be solved with
A. Painter's algorithm B. Window Clipping algorithm
C. Brute force rasterization algorithm D. Flood fill algorithm
ugcnetcse-oct2022-paper1
Answer key ☟
Which one is a connectionless transport - layer protocol that belongs to the Internet protocol family?
A. Transmission Control Protocol (TCP) B. User Datagram Protocol (UDP)
C. Routing Protocol (RP) D. Datagram Control Protocol (DCP),
ugcnetcse-oct2022-paper1
Answer key ☟
A. B. C. D.
ugcnetcse-oct2022-paper1
There are three boxes. First box has white, black and red balls. Second box has white, black and red
balls. Third box has white, black and red balls. A box is chosen at random and balls are drawn out of
which is white, and 1 is red. What is the probability that the balls came from first box?
A. B. C. D.
ugcnetcse-oct2022-paper1
A. B.
C. D.
ugcnetcse-oct2022-paper1
Answer key ☟
A. , B. C. D.
ugcnetcse-oct2022-paper1
Answer key ☟
Consider an error-free satellite channel used to send byte data frames in one direction with very short
acknowledgements coming back the other way. What is the maximum throughput for window size of ?
A. B.
C. D. ,
ugcnetcse-oct2022-paper1
Answer key ☟
Answer key ☟
ugcnetcse-oct2022-paper1
A. B.
C. D.
ugcnetcse-oct2022-paper1
33.0.75 UGC NET CSE | October 2022 | Part 1 | Question: 29
Answer key ☟
Answer key ☟
Answer key ☟
ugcnetcse-oct2022-paper1
Answer key ☟
Answer key ☟
33.0.80 UGC NET CSE | October 2022 | Part 1 | Question: 24
: Micro-operation fields
: Condition for branching
: Branch field
: Address field
ugcnetcse-oct2022-paper1
A. B.
C. D.
ugcnetcse-oct2022-paper1
Answer key ☟
Answer key ☟
Consider a memory system having address spaced at a distance of Bank cycle time and number of
banks, then the average data access time per word access in synchronous organization is
A.
B.
C.
D.
ugcnetcse-oct2022-paper1
Answer key ☟
Which layer divides each message into packets at the source and re-assembles them at the destination?
A. Network layer B. Transport layer
C. Data link layer D. Physical layer
ugcnetcse-oct2022-paper1
Answer key ☟
Answer key ☟
Consider a B-tree of height h. minimum degree that contains any -key, where . Which of the
following is correct?
A. B.
C. D.
ugcnetcse-oct2022-paper1
Answer key ☟
Answer key ☟
Assume that and are asymptotically positive. Which of the following is correct?
A. and
B. and
C. and
D. and
ugcnetcse-oct2022-paper1
Answer key ☟
Which Metrics are derived by normalizing quality and/or productivity measures by considering the size of the
software that has been produced?
A. Function - Oriented Metrics B. Function - Point Metrics
C. Line of Code Metrics D. Size Oriented Metrics
ugcnetcse-oct2022-paper1
Answer key ☟
Consider the hash table of size that uses open addressing with linear probing. Let be the
hash function. A sequence of records with keys is inserted into an initially empty
hash table, the bins of which are indexed from to . What is the index of the bin into which the last record is
inserted?
A. B. C. D.
ugcnetcse-oct2022-paper1
Answer key ☟
Answer key ☟
ugcnetcse-oct2022-paper1
Answer key ☟
33.0.94 UGC NET CSE | October 2022 | Part 1 | Question: 9
A. B. C. D.
ugcnetcse-oct2022-paper1
A -stage pipeline has the stage delay as and ns respectively. Registers that are used between
the stages have delay of . Assuming constant locking rate, the total time required to process data items
on this pipeline is
A. B.
C. D.
ugcnetcse-oct2022-paper1
Answer key ☟
ugcnetcse-oct2022-paper1
Answer key ☟
A. B.
C. D.
ugcnetcse-oct2022-paper1
Answer key ☟
33.0.99 UGC NET CSE | October 2022 | Part 1 | Question: 4
ugcnetcse-oct2022-paper1
Answer key ☟
Using algorithm, if and . the value of and cipher value of with key are
A. B. C. D.
ugcnetcse-oct2022-paper1
:
List A List B
ugcnetcse-oct2022-paper1
Answer key ☟
Consider a 3-puzzle where, like in the usual 8-puzzle game, a tile can only move to an adjacent empty space.
Given the initial state
12
3
which of the following state cannot be reached?
31
A
2
3
B
21
13
C
2
2
D
13
Answer key ☟
33.2.1 Algorithm Design: UGC NET CSE | October 2022 | Part 1 | Question: 74
Which of the following algorithm design approach is used in Quick sort algorithm?
Answer key ☟
33.3.1 Alpha Beta Pruning: UGC NET CSE | July 2016 | Part 3 | Question: 73
Consider the following game tree in which root is a maximizing node and children are visited left to right. What
nodes will be pruned by the alpha-beta pruning?
A. B. C. D.
ugcnetcse-july2016-paper3 artificial-intelligence alpha-beta-pruning
Answer key ☟
33.4.1 Alpha Cut: UGC NET CSE | June 2019 | Part 2 | Question: 95
Answer key ☟
33.5.1 Application Software: UGC NET CSE | June 2010 | Part 2 | Question: 45
Applications-software
A. Is used to control the operating system B. Includes programs designed to help programmers
C. Performs a specific task for computer users D. All of the above
ugcnetcse-june2010-paper2 application-software
Answer key ☟
33.6.1 Bigdata Hadoop: UGC NET CSE | June 2019 | Part 2 | Question: 38
Hadoop (a big data tool) works with number of related tools. Choose from the following, the common tools
included into Hadoop:
A. MySQL, Google API and Map reduce B. Map reduce, Scala and Hummer
C. Map reduce, H Base and Hive D. Map reduce, Hummer and Heron
ugcnetcse-june2019-paper2 bigdata-hadoop
Answer key ☟
33.7.1 Convex Optimization: UGC NET CSE | July 2018 | Part 2 | Question: 82
ugcnetcse-july2018-paper2 convex-optimization
Answer key ☟
33.8.1 Data Mining: UGC NET CSE | July 2016 | Part 2 | Question: 50
Answer key ☟
33.8.2 Data Mining: UGC NET CSE | June 2010 | Part 2 | Question: 50
Data Mining uses _______, _______ and _______ to build effective predictive model.
and
and
and
and
ugcnetcse-june2010-paper2 data-mining
33.9.1 Data Warehousing: UGC NET CSE | July 2016 | Part 2 | Question: 47
I. Business intelligence and Data warehousing is used for forecasting and Data mining
II. Business intelligence and Data warehousing is used for analysis of large volumes of sales data
Answer key ☟
33.9.2 Data Warehousing: UGC NET CSE | July 2016 | Part 2 | Question: 49
I. Data scrubling is a process to upgrade the quality of data, before it is moved into Data warehouse
II. Data scrubling is a process of rejecting data from data warehouse to create indexes
Answer key ☟
33.9.3 Data Warehousing: UGC NET CSE | June 2012 | Part 3 | Question: 20
Answer key ☟
33.9.4 Data Warehousing: UGC NET CSE | June 2012 | Part 3 | Question: 7
A. B.
C. D.
ugcnetcse-june2012-paper3 data-mining data-warehousing
Answer key ☟
ugcnetcse-dec2014-paper2 debugger
Answer key ☟
Answer key ☟
33.12.1 Encryption Decryption: UGC NET CSE | July 2018 | Part 2 | Question: 48
Decrypt the message "WTAAD" using the Caesar Cipher with key =15
Answer key ☟
33.13.1 Fuzzy Relation: UGC NET CSE | July 2016 | Part 3 | Question: 64
R=
and
S=
Then, the resulting relation T, which related elements of universe xto elements of universe z using max-min
composition is given by
A. T=
B. T=
C. T=
D. T=
Answer key ☟
33.14.1 Fuzzy Set: UGC NET CSE | December 2012 | Part 3 | Question: 13
Consider a fuzzy set A defined on the interval X=[0, 10]of integers by the membership Junction .
Then the cut corresponding to $\alpha =0.5 will be
A. B.
C. D.
ugcnetcse-dec2012-paper3 fuzzy-set
Answer key ☟
33.14.2 Fuzzy Set: UGC NET CSE | December 2014 | Part 3 | Question: 71
Answer key ☟
33.14.3 Fuzzy Set: UGC NET CSE | December 2015 | Part 3 | Question: 65
A.
B.
C.
D.
ugcnetcse-dec2015-paper3 fuzzy-set
Answer key ☟
33.14.4 Fuzzy Set: UGC NET CSE | December 2015 | Part 3 | Question: 66
ugcnetcse-dec2015-paper3 fuzzy-set
Answer key ☟
33.14.5 Fuzzy Set: UGC NET CSE | July 2016 | Part 3 | Question: 65
A. {(0.5, 12), (0.6, 13), (1, 14), (0.7, 15), (0.7, 16), (1, 17), (1, 18)}
B. {(0.5, 12), (0.6, 13), (1, 14), (1, 15), (1, 16), (1, 17), (1, 18)}
C. {(0.3, 12), (0.5, 13), (0.5, 14), (1, 15), (0.7, 16), (0.5, 17), (0.2, 18)}
D. {(0.3, 12), (0.5, 13), (0.6, 14), (1, 15), (0.7, 16), (0.5, 17), (0.2, 18)}
ugcnetcse-july2016-paper3 fuzzy-set
Answer key ☟
33.15.1 Geographical Information System: UGC NET CSE | December 2011 | Part 2 | Question: 46
A. Both maps must be in digital form B. Both maps must be at the same equivalent scale.
C. Both maps must be on the same coordinate system D. All of the above
ugcnetcse-dec2011-paper2 geographical-information-system
Answer key ☟
33.16.1 Hill Climbing Search: UGC NET CSE | July 2016 | Part 3 | Question: 72
How does randomized Hill climbing choose the next move each time?
Answer key ☟
________ model is designed to bring prices down by increasing the number of customers who buy a particular
product at once.
A. Economic Order Quantity B. Inventory
C. Data Mining D. Demand-Sensitive Pricing
ugcnetcse-dec2014-paper2 optimization inventory
Answer key ☟
33.18.1 K Mean Clustering: UGC NET CSE | June 2019 | Part 2 | Question: 40
K-mean clustering algorithm has clustered the given observations into clusters after st iteration as follows:
What will be the Manhattan distance for observation from cluster centroid in the second iteration?
A. B. C. D.
ugcnetcse-june2019-paper2 k-mean-clustering data-mining
Answer key ☟
Subject to
has
Answer key ☟
33.20.1 Machine Learning: UGC NET CSE | June 2014 | Part 2 | Question: 29
A. B.
C. D.
ugcnetcse-june2014-paper2 machine-learning
Answer key ☟
Can someone please tell what's the use of giving UGC NET in computer science after doing MTech and have
given GATE in CSE?
What benefits will NET give when applying for Phd or as an assistant professor?
What is the requirement of NET? I am currently in 1st year MTech, AFAIK we are eligible only if we are in final year
MTECH(ie 2nd year) is this right?
net-exam general admissions query
33.22.1 Operational Research: UGC NET CSE | December 2014 | Part 3 | Question: 68
Answer key ☟
33.22.2 Operational Research: UGC NET CSE | September 2013 | Part 3 | Question: 14
An optimal assignment requires that the minimum number of horizontal and vertical lines that can be drawn to
cover all zeros be equal to the number of
A. rows or columns B. rows + columns
C. rows + columns -1 D. rows + columns +1
ugcnetcse-sep2013-paper3 operational-research assignment-problem
Answer key ☟
The region of feasible solution of a linear programminig problem has a ____ property in geometry, provided the
feasible solution of the problem exists
Answer key ☟
33.24.1 Process Scheduling: UGC NET CSE | October 2022 | Part 1 | Question: 60
Answer key ☟
Answer key ☟
Answer key ☟
33.27.1 Shell Script: UGC NET CSE | June 2014 | Part 2 | Question: 35
Answer key ☟
33.27.2 Shell Script: UGC NET CSE | June 2014 | Part 3 | Question: 39
A. B.
C. D.
ugcnetjune2014iii unix shell-script
Answer key ☟
Answer key ☟
33.29.1 Simplex Method: UGC NET CSE | December 2014 | Part 3 | Question: 67
If an artificial variable is present in the ‘basic variable’ column of optimal simplex table, then the solution is
A. Optimum B. Infeasible
C. Unbounded D. Degenerate
ugcnetcse-dec2014-paper3 linear-programming simplex-method
Answer key ☟
33.29.2 Simplex Method: UGC NET CSE | July 2016 | Part 3 | Question: 62
i. Revised simplex method requires lesser computations than the simplex methods
ii. Revised simplex method automatically generates the inverse of the current basis matrix
iii. Less number of entries are needed in each table of the revised simplex method than usual simplex method
Answer key ☟
33.30.1 System Software& Compilers: UGC NET CSE | July 2016 | Part 2 | Question: 32
The content of the accumulator after the execution of the following 8085 assembly language program, is:
MVI A,
42H
MVI B, 05h
UGC: ADD B
DCR B
JNZ UGC
ADI 25H
HLT
A. 82 H B. 78 H C. 76 H D. 47 H
ugcnetcse-july2016-paper2 system-software&-compilers
Answer key ☟
33.31.1 Transportation Problem: UGC NET CSE | July 2016 | Part 3 | Question: 63
Has a solution
Answer key ☟
33.32.1 Unified Modeling Language: UGC NET CSE | June 2012 | Part 3 | Question: 44
Which diagram provides a formal graphic notation for modelling objects, classes and their relationships to one
another?
A. Object diagram B. Class diagram
C. Instance diagram D. Analysis diagram
ugcnetcse-june2012-paper3 unified-modeling-language
Answer key ☟
In UNIX, ____ creates three subdirectories; 'PIS' and two subdirectories 'progs' and 'data' from just created
subdirectory 'PIS'
A. mkdir PIS/progs PIS/data PIS B. mkdir PIS progs data
C. mkdir PIS PIS/progs PIS/data D. mkdir PIS/progs data
ugcnetcse-july2016-paper2 unix
Answer key ☟
Which of the following option with reference to UNIX operating system is not correct?
A. INT signal is sent by the terminal driver when one types <Control-C> and it is a request to terminate the current
operation
B. TERM is a request to terminate execution completely. The receiving process will clean up its state and exit
C. QUIT is similat to TERM, except that it defaults to producing a core dump if not caught.
D. KILL is a blockable signal
ugcnetcse-july2016-paper3 unix
Answer key ☟
A. It runs the word count program to count the number of lines in its input, a, writing the result to b, as a foreground
process
B. It runs the word count program to count the number of lines in its input, a, writing the result to b, but does it in the
background
C. It counts the error during the execution of the process, a, and puts the result in process b
D. It copies the 'l' numbers of lines of program file, a, and stores in file b
ugcnetcse-july2016-paper3 unix
Answer key ☟
At any given time Parallel Virtual Machine (PVM) has _______ send buffer and ________ receive buffer.
Answer key ☟
33.34.1 Vertex Cover: UGC NET CSE | October 2022 | Part 1 | Question: 56
ugcnetcse-june2012-paper3 windows
Answer key ☟
Answer Keys
33.0.1 Q-Q 33.0.2 Q-Q 33.0.3 Q-Q 33.0.4 Q-Q 33.0.5 Q-Q
33.0.6 Q-Q 33.0.7 Q-Q 33.0.8 Q-Q 33.0.9 Q-Q 33.0.10 Q-Q
33.0.11 Q-Q 33.0.12 Q-Q 33.0.13 Q-Q 33.0.14 Q-Q 33.0.15 Q-Q
33.0.16 Q-Q 33.0.17 Q-Q 33.0.18 Q-Q 33.0.19 Q-Q 33.0.20 Q-Q
33.0.21 Q-Q 33.0.22 Q-Q 33.0.23 Q-Q 33.0.24 Q-Q 33.0.25 Q-Q
33.0.26 Q-Q 33.0.27 Q-Q 33.0.28 Q-Q 33.0.29 Q-Q 33.0.30 Q-Q
33.0.31 Q-Q 33.0.32 Q-Q 33.0.33 Q-Q 33.0.34 Q-Q 33.0.35 Q-Q
33.0.36 Q-Q 33.0.37 Q-Q 33.0.38 Q-Q 33.0.39 Q-Q 33.0.40 Q-Q
33.0.41 Q-Q 33.0.42 Q-Q 33.0.43 Q-Q 33.0.44 Q-Q 33.0.45 Q-Q
33.0.46 Q-Q 33.0.47 Q-Q 33.0.48 Q-Q 33.0.49 Q-Q 33.0.50 Q-Q
33.0.51 Q-Q 33.0.52 Q-Q 33.0.53 Q-Q 33.0.54 Q-Q 33.0.55 Q-Q
33.0.56 Q-Q 33.0.57 Q-Q 33.0.58 Q-Q 33.0.59 Q-Q 33.0.60 Q-Q
33.0.61 Q-Q 33.0.62 Q-Q 33.0.63 Q-Q 33.0.64 Q-Q 33.0.65 Q-Q
33.0.66 Q-Q 33.0.67 Q-Q 33.0.68 Q-Q 33.0.69 Q-Q 33.0.70 Q-Q
33.0.71 Q-Q 33.0.72 Q-Q 33.0.73 Q-Q 33.0.74 Q-Q 33.0.75 Q-Q
33.0.76 Q-Q 33.0.77 Q-Q 33.0.78 Q-Q 33.0.79 Q-Q 33.0.80 Q-Q
33.0.81 Q-Q 33.0.82 Q-Q 33.0.83 Q-Q 33.0.84 Q-Q 33.0.85 Q-Q
33.0.86 Q-Q 33.0.87 Q-Q 33.0.88 Q-Q 33.0.89 Q-Q 33.0.90 Q-Q
33.0.91 Q-Q 33.0.92 Q-Q 33.0.93 Q-Q 33.0.94 Q-Q 33.0.95 Q-Q
33.0.96 Q-Q 33.0.97 Q-Q 33.0.98 Q-Q 33.0.99 Q-Q 33.0.100 Q-Q
33.0.101 Q-Q 33.1.1 C 33.2.1 Q-Q 33.3.1 B 33.4.1 A
33.5.1 Q-Q 33.6.1 C 33.7.1 Q-Q 33.8.1 B 33.8.2 Q-Q
33.9.1 B 33.9.2 A 33.9.3 B 33.9.4 B 33.10.1 C
33.11.1 D 33.12.1 Q-Q 33.13.1 C 33.14.1 C 33.14.2 C
33.14.3 D 33.14.4 A 33.14.5 D 33.15.1 Q-Q 33.16.1 C
33.17.1 D 33.18.1 A 33.19.1 Q-Q 33.20.1 C 33.21.1 Q-Q
33.22.1 C 33.22.2 A 33.23.1 B 33.24.1 Q-Q 33.25.1 B
33.26.1 C 33.27.1 C 33.27.2 C 33.28.1 Q-Q 33.29.1 B
33.29.2 D 33.30.1 C 33.31.1 B 33.32.1 A 33.33.1 C
33.33.2 D 33.33.3 B 33.33.4 Q-Q 33.34.1 Q-Q 33.35.1 D
34 Non GATE CSE: Web Technologies (32)
Answer key ☟
34.2.1 Client Server Application: UGC NET CSE | June 2014 | Part 3 | Question: 26
Answer key ☟
34.3.1 Data Warehousing: UGC NET CSE | December 2014 | Part 2 | Question: 47
Answer key ☟
Which e-business model allows consumers to name their own price for products and services ?
A. B. C. D.
ugcnetcse-dec2014-paper2 e-commerce
Answer key ☟
34.5.1 Edi Layer: UGC NET CSE | December 2013 | Part 2 | Question: 44
The document standards for EDI were first developed by large business house during the 1970s and are now
under the control of the following standard organization.
Answer key ☟
34.5.2 Edi Layer: UGC NET CSE | December 2013 | Part 2 | Question: 45
Answer key ☟
Which of the following tag in HTML is used to surround information, such as signature of the person who
created the page?
A. <body></body> B. <address></address>
C. <strong></strong> D. <em></em>
ugcnetcse-aug2016-paper3 web-technologies html
Answer key ☟
A. B.
C. D.
ugcnetcse-dec2012-paper3 web-technologies html
Answer key ☟
Which of the following HTML code will affect the vertical alignment of the table content?
Answer key ☟
Answer key ☟
HTML is defined using SGML – an _____ standard, information processing-text and office systems (SGML)
for text information processing.
Answer key ☟
Answer key ☟
If is the number of alert dialog boxes generated by this JavaScript code and D1, D2, , represents the content
displayed in the each of the dialog boxes, then:
Answer key ☟
34.8.1 Non Gatecse: UGC NET CSE | June 2012 | Part 2 | Question: 9
Answer key ☟
Identify the Risk factors which are associated with Electronic payment system
A. Fraudulent use of credit card B. Sending credit card details over internet
C. Remote storage of credit card details D. All of the above
ugcnetcse-dec2012-paper2 computer-networks transmission-media
Answer key ☟
34.10.1 Trojan Horse: UGC NET CSE | December 2014 | Part 3 | Question: 74
A Trojan horse is
A. A program that performs a legitimate function that is known to an operating system or its user and also has a hidden
component that can be used for nefarious purposes like attacks on message security or impersonation.
B. A piece of code that can attach itself to other programs in the system and spread to other systems when programs are
copied or transferred.
C. A program that spreads to other computer systems by exploiting security holes like weaknesses in facilities for
creation of remote processes
D. All of the above
ugcnetcse-dec2014-paper3 trojan-horse
Answer key ☟
34.11.1 Web Technologies: UGC NET CSE | December 2013 | Part 3 | Question: 13
The document that is used by XSLT to indicate, how to transform the elements of the XML document to
another format is
A. HTML page B. DOC type procedure
C. Style sheet D. Stored procedure
ugcnetcse-dec2013-paper3 web-technologies
Answer key ☟
34.11.2 Web Technologies: UGC NET CSE | December 2015 | Part 3 | Question: 75
__________ tag is an extension to HTML that can enclose any number of Javascript statements.
A. <SCRIPT> B. <BODY>
C. <HEAD> D. <TITLE>
ugcnetcse-dec2015-paper3 web-technologies
Answer key ☟
34.11.3 Web Technologies: UGC NET CSE | January 2017 | Part 3 | Question: 42
Answer key ☟
34.11.4 Web Technologies: UGC NET CSE | June 2012 | Part 2 | Question: 42
Answer key ☟
34.11.5 Web Technologies: UGC NET CSE | June 2012 | Part 2 | Question: 44
Answer key ☟
34.11.6 Web Technologies: UGC NET CSE | June 2014 | Part 3 | Question: 54
Linking to another place in the same or another webpage require two A (Anchor) tags, the first with the _______
attribute and the second with the _______ attribute.
A. NAME & LINK B. LINK & HREF
C. HREF & NAME D. TARGET & VALUE
ugcnetjune2014iii web-technologies
Answer key ☟
34.11.7 Web Technologies: UGC NET CSE | June 2019 | Part 2 | Question: 25
Answer key ☟
34.11.8 Web Technologies: UGC NET CSE | October 2020 | Part 2 | Question: 10
Answer key ☟
Answer key ☟
Which of the following statements are true with reference to the way of describing XML data?
Answer key ☟
The definitions in an XML document are said to be ______ when the tagging system ans definitions in the DTD
are all in compliance
Answer key ☟
Answer key ☟
Answer key ☟
Answer key ☟
34.12.7 Xml: UGC NET CSE | September 2013 | Part 2 | Question: 38
The _____ language was originally designed as the Transformation Language for Style Sheet Facility
Answer key ☟
Answer key ☟
Answer Keys
34.1.1 D 34.2.1 B 34.3.1 B 34.4.1 D 34.5.1 B
34.5.2 B 34.6.1 Q-Q 34.6.2 A 34.6.3 A 34.6.4 D
34.6.5 B 34.7.1 C 34.7.2 Q-Q 34.8.1 C 34.9.1 D
34.10.1 A 34.11.1 C 34.11.2 B 34.11.3 X 34.11.4 D
34.11.5 D 34.11.6 C 34.11.7 A 34.11.8 B 34.12.1 D
34.12.2 B 34.12.3 Q-Q 34.12.4 A 34.12.5 C 34.12.6 A
34.12.7 A 34.13.1 D
35 Operating System (232)
Answer key ☟
A. B.
C. D.
operating-system ugcnetcse-dec2015-paper3
Answer key ☟
Which of the following is the correct value returned to the operating system upon the successful completion of a
program ?
A. 0 B. 1
C. -1 D. Program do not return a value.
ugcnetcse-june2014-paper2 operating-system
Answer key ☟
____ is sometimes said to be object oriented, because the only way to manipulate kernel objects is by invoking
methods on their handles.
A. Windows NT B. Windows XP
C. Windows VISTA D. Windows 95/98
ugcnetcse-june2012-paper3 operating-system
Answer key ☟
Answer key ☟
A. B.
C. D.
ugcnetcse-dec2012-paper3 operating-system match-the-following
Answer key ☟
A job has four pages A, B, C, D and the main memory has two page frames only. The job needs to process its
pages in following order:
ABACABDBACD
Assuming that the page interrupt occurs when a new page is brought in the main memory, irrespective of whether the
page is swapped out or not. The number of page interrupts in FIFO and LRU page replacement algorithms are
Answer key ☟
A. B.
C. D.
ugcnetcse-sep2013-paper3 operating-system page-fault
Answer key ☟
For the implementation of a paging scheme, suppose the average process size be bytes, the page size be
bytes, and each page entry requires bytes. The optimum page size that minimizes the total overhead due to the
page table and the internal fragmentation loss is given by
A. B. C. D.
ugcnetcse-dec2014-paper2 operating-system paging
Answer key ☟
35.0.10 UGC NET CSE | December 2014 | Part 2 | Question: 40
In a demand paging memory system, page table is held in registers. The time taken to service a page fault is
m.sec. if an empty frame is available or if the replaced page is not modified, and it takes m.secs., if the
replaced page is modified. What is the average access time to service a page fault assuming that the page to be replaced
is modified % of the time ?
A. m.sec. B. m.sec.
C. m.sec. D. m.sec.
ugcnetcse-dec2014-paper2 operating-system demand-paging
Answer key ☟
The virtual address generated by a CPU is 32 bits. The Translation Look-aside Buffer (TLB) can hold total 64
page table entries and a 4-way set associative (i.e. with 4-cache lines in the set). The page size is 4 KB. The
minimum size of TLB tag is
Answer key ☟
Match the following for operating system techniques with the most appropriate advantage :
A. B.
C. D.
ugcnetcse-june2015-paper3 operating-system
Answer key ☟
Answer key ☟
Suppose that the number of instructions executed between page fault is directly proportional to the number of
page frames allocated to a program. If the available memory is doubled, the mean interval between the page
faults is also doubled. Further, consider that a normal instruction takes one microsecond, but if a page fault occurs, it
takes 2001 microseconds. If a program takes 60 sec to run, during which time it gets 15,000 page faults, how long
would it take to run twice as much memory were available?
A system has 4 processes and 5 allocatable resources. The current allocation and maximum needs are as follows:
Allocated Maximum Available
Process A 1 0 2 1 1 1 1 2 1 3 00x11
Process B 2 0 1 1 0 2 2 2 1 0
Process C 1 1 0 1 0 2 1 3 1 0
Process D 1 1 1 1 0 1 1 2 2 1
The smallest value of x for which the above system in safe state is
A. 1 B. 3 C. 2 D. 0
ugcnetcse-dec2015-paper2 operating-system
Answer key ☟
Consider a system with twelve magnetic tape drives and three processes and . process requires
maximum ten tape drives, process may need as many as four tape drives and may need upto nine tape
drives. Suppose that at time , process is holding five tape drives, process is holding two tape drives and process
is holding three tape drives, At time , system is in:
A. safe state B. unsafe state
C. deadlocked state D. starvation state
ugcnetcse-dec2015-paper3 operating-system
Answer key ☟
With reference to current allocation, is system safe? If so, what is the safe sequence?
A. No B. Yes,
C. Yes, D. Yes,
ugcnetcse-july2016-paper2 operating-system
Answer key ☟
Optical storage is a
ugcnetcse-dec2010-paper2 operating-system
Answer key ☟
A. B.
C. D.
ugcnetcse-june2010-paper2 operating-system match-the-following easy
Answer key ☟
Remote Computing Service involves the use of time sharing and _______.
A. Multi-processing
B. Interactive processing
C. Batch processing
D. Real-time processing
ugcnetcse-june2010-paper2 operating-system
Answer key ☟
An operating system supports a paged virtual memory, using a central processor with a cycle time of one
microsecond. It costs an additional one microsecond to access a page other than the current one. Pages have
words, and the paging device is a drum that rotates at revolutions per minute and transfers one million words per
second. Further, one percent of all instructions executed accessed a page other than the current page. The instruction that
accessed another page, % accessed a page already in memory and when a new page was required, the replaced page
was modified % of the time. What is the effective access time on this system, assuming that the system is running
only one process and the processor is idle during drum transfers ?
A. microseconds B. microseconds
C. microseconds D. microseconds
ugcnetcse-aug2016-paper3 operating-system paging
Answer key ☟
Which of the following options, gives the correct number of page faults related to LRU, FIFO, and optimal page
replacement algorithms respectively, assuming page frames and all frames are initially empty ?
A. B. C. D.
ugcnetcse-aug2016-paper3 operating-system page-fault
Answer key ☟
A page fault
Answer key ☟
Assume segments in memory and a page size of bytes. The wastage on account of internal fragmentation is
:
1. bytes
2. bytes
3. bytes
4. bytes
ugcnetcse-june2009-paper2
Answer key ☟
Consider a system with five processes through and three resource types and . Resource type has
seven instances, resource type has two instances and resource type has six instances suppose at time we
have the following allocation.
Answer key ☟
Consider a virtual page reference string 1, 2, 3, 2, 4, 2, 5, 2, 3, 4. Suppose LRU page replacement algorithm is
implemented with 3 page frames in main memory. Then the number of page faults are _____
A. 5 B. 7 C. 9 D. 10
ugcnetcse-july2018-paper2 operating-system page-fault paging
Answer key ☟
Page information memory is also called as Page Table. The essential contents in each entry of a page table is/are
____
A. Page Access information B. Virtual Page number
C. Page Frame number D. Both virtual page number and Page frame number
ugcnetcse-july2018-paper2 operating-system paging
Answer key ☟
In a multi-user operating system, 30 requests are made to use a particular resource per hour, on an average. The
probability that no requests are made in 40 minutes, when arrival pattern is a poisson distribution, is ______
A. B. C. D.
ugcnetcse-july2018-paper2 operating-system
Answer key ☟
In a paged memory, the page hit ratio is 0.40. The time required to access a page in secondary memory is equal
to 120 ns. The time required to access a page in primary memory is 15 ns. The average time required to access a
page is ____
A. 105 B. 68 C. 75 D. 78
ugcnetcse-july2018-paper2 operating-system paging
Answer key ☟
Suppose and are co-operating processes satisfying Mutual Exclusion condition. Then, if the process
is executing in its critical section then
ugcnetcse-dec2018-paper2 operating-system
Answer key ☟
35.0.33 UGC NET CSE | January 2017 | Part 2 | Question: 40
ugcnetjan2017ii operating-system
Answer key ☟
In a paging system, it takes ns to search translation Look-a-side Buffer (TLB) and ns to access the main
memory. If the TLB hit ratio is , the effective memory access time is :
A. ns B. ns C. ns D. ns
ugcnetjan2017ii operating-system paging
Answer key ☟
i. MS-DOS
ii. XENIX
iii. OS/
In the above list, following operating systems didn’t provide multiuser facility.
A. (i) only B. (i) and (ii)only
C. (ii) and (iii) only D. (i),(ii) and (iii)
ugcnetcse-jan2017-paper3 operating-system
Answer key ☟
A. B.
C. D.
ugcnetcse-dec2004-paper2 operating-system match-the-following
Answer key ☟
Answer key ☟
35.0.38 UGC NET CSE | December 2004 | Part 2 | Question: 37
In which of the following storage replacement strategies, is a program placed in the largest available hole in the
memory ?
Answer key ☟
Answer key ☟
Loading operating system from secondary memory to primary memory is called ____________ .
ugcnetcse-dec2006-paper2 operating-system
Answer key ☟
An operating system is :
A. Collection of hardware components B. Collection of input-output devices
C. Collection of software routines D. All the above
ugcnetcse-dec2006-paper2 operating-system
Answer key ☟
The aging algorithm with a = is used to predict run times. The previous four runs from oldest to most recent
are and msec. The prediction for the next time will be :
Answer key ☟
Average process size = bytes. Each page entry requires bytes. The optimum page size is given by :
A. B. C. D.
ugcnetcse-dec2007-paper2
Answer key ☟
A program has five virtual pages, numbered from to . If the pages are referenced in the order ,
with three page frames, the total number of page faults with FIFO will be equal to :
A. B. C. D.
ugcnetcse-dec2007-paper2
Answer key ☟
A. B. C. D.
ugcnetcse-dec2007-paper2
Answer key ☟
The performance of a file system depends upon the cache hit rate. If it takes msec to satisfy a request from the
cache but msec to satisfy a request if a disk read is needed, then the mean time (ms) required for a hit rate
is given by :
A. B. C. D.
ugcnetcse-dec2007-paper2
Answer key ☟
Consider a single-level page table system, with the page table stored in the memory. If the hit rate to TLB is
, and it takes nanoseconds to search the , and nanoseconds to access the main memory, then
what is the effective memory access time, in nanoseconds?
A. B. C. D.
ugcnetcse-oct2020-paper2 operating-system translation-lookaside-buffer
Answer key ☟
A. B.
C. D.
ugcnetcse-oct2022-paper1 operating-system
Answer key ☟
Given as 4 GB (4.3X10^9 bytes) of virtual space and typical page size of 4KB and each page table entry is 5
bytes. How many virtual pages would this imply? What is the size of the whole page table?
OPTIONS:
35.1.1 Applications In Windows: UGC NET CSE | December 2012 | Part 3 | Question: 35
Answer key ☟
35.2.1 Bankers Algorithm: UGC NET CSE | December 2005 | Part 2 | Question: 40
Answer key ☟
35.2.2 Bankers Algorithm: UGC NET CSE | June 2005 | Part 2 | Question: 38
Answer key ☟
35.2.3 Bankers Algorithm: UGC NET CSE | June 2013 | Part 3 | Question: 61
An operating system using banker’s algorithm for deadlock avoidance has ten dedicated devices (of same type)
and has three processes P1, P2 and P3 with maximum resource requirements of 4, 5 and 8 respectively. There
are two states of allocation of devices as follows:
State 1 Processes P1 P2 P3
Devices allocated 2 3 4
State 2 Processes P1 P2 P3
Devices allocated 0 2 4
Which of the following is correct?
A. State 1 is unsafe and State 2 is safe B. State 1 is safe and State 2 is unsafe
C. Both State 1 and State 2 are safe D. Both State 1 and State 2 are unsafe
ugcnetcse-june2013-paper3 operating-system bankers-algorithm deadlock-prevention-avoidance-detection
Answer key ☟
In order to allow only one process to enter its critical section, binary semaphore are initialized to
A. B. C. D.
ugcnetcse-june2010-paper2 operating-system binary-semaphore
Answer key ☟
35.4.1 Counting Semaphores: UGC NET CSE | June 2019 | Part 2 | Question: 46
At a particular time of computation, the value of a counting semaphore is . Then (wait) operations and
(signal) operations are completed on this semaphore. What is the resulting value of the semaphore?
A. B. C. D.
ugcnetcse-june2019-paper2 counting-semaphores
Answer key ☟
35.5.1 Critical Section: UGC NET CSE | December 2014 | Part 2 | Question: 38
Which of the following conditions does not hold good for a solution to a critical section problem ?
Answer key ☟
35.6.1 Deadlock Prevention Avoidance Detection: UGC NET CSE | August 2016 | Part 2 | Question: 36
Consider a system with seven processes through and six resources through .
Resource ownership is as follows :
process holds and wants
process holds nothing but wants
process holds nothing but wants
process holds and wants &
process holds and wants
process holds and wants
process holds and wants
Is the system deadlocked ? If yes, _______ processes are deadlocked.
Answer key ☟
35.6.2 Deadlock Prevention Avoidance Detection: UGC NET CSE | August 2016 | Part 2 | Question: 38
Consider a system having ‘m’ resources of the same type. These resources are shared by three processes
and which have peak demands of and resources respectively. For what value of deadlock will not
occur ?
A. B. C. D.
ugcnetcse-aug2016-paper2 operating-system deadlock-prevention-avoidance-detection
Answer key ☟
35.6.3 Deadlock Prevention Avoidance Detection: UGC NET CSE | August 2016 | Part 3 | Question: 50
Consider a system which have number of processes and number of resource types. The time complexity
of the safety algorithm, which checks whether a system is in safe state or not, is of the order of :
A. B. C. D.
ugcnetcse-aug2016-paper3 operating-system deadlock-prevention-avoidance-detection
Answer key ☟
35.6.4 Deadlock Prevention Avoidance Detection: UGC NET CSE | December 2010 | Part 2 | Question: 40
Answer key ☟
35.6.5 Deadlock Prevention Avoidance Detection: UGC NET CSE | December 2011 | Part 2 | Question: 26
Answer key ☟
35.6.6 Deadlock Prevention Avoidance Detection: UGC NET CSE | December 2013 | Part 3 | Question: 71
Answer key ☟
35.6.7 Deadlock Prevention Avoidance Detection: UGC NET CSE | December 2014 | Part 3 | Question: 52
An operating system has tape drives. There are three processes & . Maximum requirement of
is tape drives, is tape drives and is tape drives. Currently, is allocated tape drives, is
allocated tape drives and is allocated tape drives. Which of the following sequences represent a safe state?
1.
2.
3.
4.
Answer key ☟
35.6.8 Deadlock Prevention Avoidance Detection: UGC NET CSE | December 2018 | Part 2 | Question: 70
Suppose a system has instances of some resource with processes competing for that resource. Each process
may require instances of the resources. The maximum value of for which the system never enters into
deadlock is
A. B. C. D.
ugcnetcse-dec2018-paper2 operating-system deadlock-prevention-avoidance-detection
Answer key ☟
35.6.9 Deadlock Prevention Avoidance Detection: UGC NET CSE | June 2019 | Part 2 | Question: 48
A computer has six tape drives with processes competing for them. Each process may need two drives. What
is the maximum value of for the system to be deadlock free?
A. B. C. D.
ugcnetcse-june2019-paper2 deadlock-prevention-avoidance-detection
Answer key ☟
A Multicomputer with 256 CPUs is organized as 16 16 grid . What is the worst case delay(in hops) that a
message might have to take
A. 16 B. 15 C. 32 D. 30
ugcnetcse-july2016-paper3 operating-system delay
Answer key ☟
35.8.1 Dijkstras Bankers Algorithm: UGC NET CSE | September 2013 | Part 3 | Question: 69
A system contains units of resource of same type. The resource requirement and current allocation of these
resources for three processes and are as follows
Answer key ☟
35.9.1 Directory Structure: UGC NET CSE | December 2014 | Part 2 | Question: 23
The directory can be viewed as _______ that translates filenames into their directory entries.
A. Symbol table B. Partition C. Swap space D. Cache
ugcnetcse-dec2014-paper2 operating-system file-system directory-structure
Answer key ☟
How much space will be required to store the bit map of a 1.3 GB disk with 512 bytes block size?
A. 332.8 KB
B. 83.6 KB
C. 266.2 KB
D. 256.6 KB
Answer key ☟
Consider a disk with 16384 bytes per track having a rotation time of 16 msec and average seek time of 40 msec.
What is the time in msec to read a block of 1024 bytes from this disk?
Answer key ☟
Consider a disk pack with surfaces, tracks and sectors per pack. bytes of data are stored in a bit
serial manner in a sector. The number of bits required to specify a particular sector in the disk is
A. B. C. D.
ugcnetcse-dec2018-paper2 operating-system disk
Answer key ☟
35.10.4 Disk: UGC NET CSE | June 2013 | Part 3 | Question: 64, UGCNET-Dec2015-II: 49
A UNIX file system has 1 KB block size and 4-byte disk addresses. What is the maximum file size if the inode
contains ten direct block entries, one single indirect block entry, one double indirect block entry and one triple
indirect block entry?
A. 30 GB B. 64 GB C. 16 GB D. 1 GB
ugcnetcse-june2013-paper3 ugcnetcse-dec2015-paper2 operating-system disk
Answer key ☟
Suppose you have a Linux file system where the block size is bytes, a disk address is bits, and an node
contains the disk addresses of the first direct blocks of file, a single indirect block and a double indirect block.
Approximately, what is the largest file that can be represented by an node?
Answer key ☟
35.10.6 Disk: UGC NET CSE | October 2020 | Part 2 | Question: 91
The question given below: concern a disk with a sector size of bytes, tracks per surface, sectors per
track, five double-sided platters, and average seek time of milliseconds.
If is the capacity of a track in bytes, and is the capacity of each surface in bytes, then _______
A. B.
C. D.
ugcnetcse-oct2020-paper2 operating-system disk
Answer key ☟
The question given below: concern a disk with a sector size of bytes, tracks per surface, sectors per
track, five double-sided platters, and average seek time of milliseconds.
What is the capacity of the disk, in bytes?
A. B. C. D.
ugcnetcse-oct2020-paper2 operating-system disk
Answer key ☟
The question given below: concern a disk with a sector size of bytes, tracks per surface, sectors per
track, five double-sided platters, and average seek time of milliseconds.
Given below are two statements:
Statement : The disk has a total number of cylinders.
Statement : bytes is not a valid block size for the disk.
In the light of the above statements, choose the correct answer from the options given below:
Answer key ☟
The question given below concern a disk with a sector size of bytes, tracks per surface, sectors per
track, five double-sided platters, and average seek time of milliseconds.
If the disk platters rotate at rpm (revolutions per minute), then approximately what is the maximum rotational
delay?
A. seconds B. seconds
C. seconds D. seconds
ugcnetcse-oct2020-paper2 operating-system disk
Answer key ☟
The question given below concern a disk with a sector size of bytes, tracks per surface, sectors per
track, five double-sided platters, and average seek time of milliseconds.
If one track of data can be transferred per revolution, then what is the data transfer rate?
A. KBytes/second B. KBytes/second
C. KBytes/second D. KBytes/second
ugcnetcse-oct2020-paper2 operating-system disk
Answer key ☟
35.11.1 Disk Cpu Memory Interrupt: UGC NET CSE | June 2019 | Part 2 | Question: 42
Answer key ☟
35.12.1 Disk Scheduling: UGC NET CSE | December 2012 | Part 2 | Question: 5 UGCNET-June2013-II: 47
If the disk head is located initially at 32, find the number of disk moves required with FCFS if the disk queue of
I/O blocks requests are 98. 37, 14, 124, 65, 67.
Answer key ☟
35.12.2 Disk Scheduling: UGC NET CSE | December 2013 | Part 2 | Question: 48
Consider a disk queue with request for input/output to block cylinders 98, 183, 37, 122, 14, 124, 65, 67 in that
order. Assume that disk head is initially positioned at cylinder 53 and moving towards cylinder number 0. The
total number of head movements using Shortest Seek Time First (SSTF) and SCAN algorithms are respectively
A. 236 and 252 cylinders B. 640 and 236 cylinders
C. 235 and 640 cylinders D. 235 and 252 cylinders
ugcnetcse-dec2013-paper2 operating-system disk-scheduling
Answer key ☟
35.12.3 Disk Scheduling: UGC NET CSE | December 2014 | Part 3 | Question: 51
Consider an imaginary disk with cylinders. A request come to read a block on cylinder . While the seek to
cylinder is in progress, new requests come in for cylinders and in that order. The number of
arm motions using shortest seek first algorithm is
A. B. C. D.
ugcnetcse-dec2014-paper3 operating-system disk-scheduling
Answer key ☟
35.12.4 Disk Scheduling: UGC NET CSE | January 2017 | Part 3 | Question: 50
Consider a disk queue with I/O requests on the following cylinders in their arriving order:
. The disk head is assumed to be at cylinder and moving in the direction of
decreasing number of cylinders. Total number of cylinders in the disk is . The disk head movement using SCAN –
scheduling algorithm is:
A. B.
C. D.
ugcnetcse-jan2017-paper3 operating-system disk-scheduling
Answer key ☟
35.12.5 Disk Scheduling: UGC NET CSE | July 2016 | Part 2 | Question: 38
If the Disk head is located initially at track 32, find the number of disk moves required with FCFS scheduling
criteria if the disk queue of I/O blocks requests are 98, 37, 14, 124, 65, 67
Answer key ☟
35.12.6 Disk Scheduling: UGC NET CSE | June 2012 | Part 3 | Question: 74
On a disk with 1000 cylinders (0 to 999) find the number of tracks, the disk arm must move to satisfy all the
requests in the disk queue. Assume the last request service was at track 345 and the head is moving toward track
0. The queue in FIFO order contains requests for the following tracks:
123, 874, 692, 475, 105, 376
(Assume scan algorithm)
Answer key ☟
35.12.7 Disk Scheduling: UGC NET CSE | Junet 2015 | Part 2 | Question: 36
A disk drive has cylinders, numbered to . Disk requests come to the disk driver for cylinders
and in that order. The driver is currently serving a request at a cylinder . A seek takes
msec per cylinder moved. How much seek time is needed for shortest seek time first (SSTF) algorithm?
Answer key ☟
35.12.8 Disk Scheduling: UGC NET CSE | October 2020 | Part 2 | Question: 16
Consider a disk system having cylinders. Disk requests are received by a disk drive for cylinders
and , in that order. Assuming the disk head is currently at cylinder , what is the time taken
to satisfy all the requests if it takes milliseconds to move from one cylinder to adjacent one and Shortest Seek Time
First (SSTF) algorithm is used?
A. milliseconds B. milliseconds
C. milliseconds D. milliseconds
ugcnetcse-oct2020-paper2 operating-system disk-scheduling
Answer key ☟
35.12.9 Disk Scheduling: UGC NET CSE | September 2013 | Part 2 | Question: 46
Consider the input/output (I/O) request made at different instants of time directed at a hypothetical disk having
tracks as given in the following table
Assume that
Current head position is at track no.
Direction of last movement is towards higher number of tracks.
Current clock time is milliseconds
Head movement time per track is millisecond
is a variant of disk-arm scheduling algorithm. In this algorithm, if no more I/O requests are left in
current direction, the disk head reveres its direction. The seek time in Shortest Seek First (SSF) and disk-arm
scheduling algorithms respectively are :
A. and milliseconds B. and milliseconds
C. and milliseconds D. and milliseconds
ugcnetsep2013ii operating-system disk-scheduling
Answer key ☟
35.13.1 Distributed Computing: UGC NET CSE | December 2012 | Part 3 | Question: 2
The efficiency (E) and speed up (sp) for Multiprocessor with p processors satisfies:
A. B.
C. D.
ugcnetcse-dec2012-paper3 operating-system distributed-computing
Answer key ☟
35.14.1 Distributed System: UGC NET CSE | December 2008 | Part 2 | Question: 24
Answer key ☟
35.15.1 Dynamic Linking: UGC NET CSE | July 2016 | Part 2 | Question: 34
Answer key ☟
Suppose it takes ns to access a page table and ns to access associative memory with a % hit rate, the
average access time equals :
A. B.
C. D.
ugcnetcse-june2009-paper2 operating-system effective-memory-access
Answer key ☟
35.17.1 File System: UGC NET CSE | August 2016 | Part 3 | Question: 53
Consider a file currently consisting of blocks. Assume that the file control block and the index block is
already in memory. If a block is added at the end (and the block information to be added is stored in memory),
then how many disk operations are required for indexed (single-level) allocation strategy ?
A. B. C. D.
ugcnetcse-aug2016-paper3 operating-system file-system
Answer key ☟
35.17.2 File System: UGC NET CSE | December 2013 | Part 3 | Question: 72
Answer key ☟
35.17.3 File System: UGC NET CSE | December 2014 | Part 3 | Question: 50
How many disk blocks are required to keep list of free disk blocks in a GB hard disk with kB block size
using linked list of free disk blocks ? Assume that the disk block number is stored in bits.
A. blocks B. blocks
C. blocks D. blocks
ugcnetcse-dec2014-paper3 operating-system file-system
Answer key ☟
35.17.4 File System: UGC NET CSE | June 2012 | Part 2 | Question: 10
Answer key ☟
35.17.5 File System: UGC NET CSE | June 2014 | Part 2 | Question: 34
Answer key ☟
35.17.6 File System: UGC NET CSE | Junet 2015 | Part 3 | Question: 12
In the indexed scheme of blocks to a file, the maximum possible size of the file depends on:
A. The number of blocks used for index and the size of index
B. Size of Blocks and size of Address
C. Size of index
D. Size of block
Answer key ☟
35.17.7 File System: UGC NET CSE | Junet 2015 | Part 3 | Question: 53
In _____ allocation method for disk block allocation in a file system, insertion and deletion of blocks in a file is
easy
Answer key ☟
i. External Fragmentation exists when there is enough total memory space to satisfy a request but the available space
is contiguous.
ii. Memory Fragmentation can be internal as well as external
iii. One solution to external Fragmentation is compaction
Answer key ☟
The maximum amount of information that is available in one portion of the disk access arm for a removal disk
pack (without further movement of the arm with multiple heads)
A. A plate of data B. A cylinder of data
C. A track of data D. A block of data
ugcnetcse-dec2011-paper2 operating-system system hard-disk-drive
35.20.1 Hit Ratio: UGC NET CSE | September 2013 | Part 2 | Question: 45
The hit ratio of a Transaction Look Aside Buffer (TLAB) is 80%. It takes 20 nanoseconds (ns) to search TLAB
and 100 ns to access main memory. The effective memory access time is _____
A. 36 ns B. 140 ns C. 122 ns D. 40 ns
ugcnetsep2013ii operating-system cache-memory hit-ratio
Answer key ☟
Normally user programs are prevented from handling I/O directly by I/O instructions in them. For CPUs having
explicit I/O instructions, such I/O protection is ensured by having the I/O instructions privileged. In a CPU with
memory mapped I/O, there is no explicit I/O instruction. Which one of the following is true for a CPU with memory
mapped I/O?
Answer key ☟
35.22.1 Input Output: UGC NET CSE | January 2017 | Part 2 | Question: 38
Answer key ☟
35.22.2 Input Output: UGC NET CSE | October 2020 | Part 2 | Question: 65
Match with
Answer key ☟
Answer key ☟
For switching from a CPU user mode to the supervisor mode following type of interrupt is most appropriate
A. Internal interrupts B. External interrupts
C. Software interrupts D. None of the above
ugcnetcse-dec2014-paper3 operating-system interrupts
Answer key ☟
Answer key ☟
Which UNIX/Linux command is used to make all files and sub-directions in the directory "progs" executable by
all users?
A. chmod - R a + x progs B. chmod - R 222 progs
C. chmod - X a + x progs D. chmod - X 222 progs
ugcnetcse-july2018-paper2 unix linux operating-system non-gatecse
Answer key ☟
35.26.1 Memory Management: UGC NET CSE | December 2008 | Part 2 | Question: 40
A.
B.
C.
D. None of the above
Answer key ☟
35.26.2 Memory Management: UGC NET CSE | December 2009 | Part 2 | Question: 39
(D) buddy
ugcnetcse-dec2009-paper2 operating-system memory-management
Answer key ☟
35.26.3 Memory Management: UGC NET CSE | December 2011 | Part 2 | Question: 30
Consider a logical address space of pages of words mapped with memory of frames. How many bits
are there in the physical address ?
1. bits
2. bits
3. bits
4. bits
Answer key ☟
35.26.4 Memory Management: UGC NET CSE | December 2012 | Part 2 | Question: 14
Given a memory partitions of 100 K, 500 K, 200 K, 300 K and 600 K (in order) and processes of 212 K, 417 K,
112 K and 426 K (in order), using the first fit algorithm, in which partition would the process requiring 426 K be
placed?
Answer key ☟
35.26.5 Memory Management: UGC NET CSE | December 2012 | Part 2 | Question: 30
Which of the following memory allocation scheme suffers from external fragmentation?
A. Segmentation
B. Pure demand paging
C. Swapping
D. Paging
Answer key ☟
35.26.6 Memory Management: UGC NET CSE | December 2015 | Part 3 | Question: 37
A. B.
C. D.
operating-system memory-management ugcnetcse-dec2015-paper3
Answer key ☟
35.26.7 Memory Management: UGC NET CSE | January 2017 | Part 3 | Question: 49
A memory management system has 64 pages with 512 bytes page size. Physical memory consists of 32 page
frames. Number of bits required in logical and physical address are respectively:
Answer key ☟
35.26.8 Memory Management: UGC NET CSE | Junet 2015 | Part 3 | Question: 51
Answer key ☟
Answer key ☟
A. It is higher level synchronization primitive and is a collection of procedures, variables, and data structures grouped
together in a special package.
B. It is a non-negative integer which apart from initialization can be acted upon by wait and signal operations.
C. It uses two primitives, send and receive which are system calls rather than language constructs.
D. It consists of the primitives implemented as system calls to block the process when they are not allowed to
enter critical region to save time.
Answer key ☟
35.29.1 Multiprogramming Os: UGC NET CSE | December 2012 | Part 3 | Question: 7
i. More than one program loaded into main memory at the same time.
ii. If a program waits for certain event another program is immediately scheduled
iii. If the execution of a program terminates, another program is immediately scheduled
A. B.
C. D.
ugcnetcse-dec2012-paper3 operating-system multiprogramming-os
Answer key ☟
35.30.1 Mutual Exclusion: UGC NET CSE | June 2012 | Part 3 | Question: 65
Consider the methods used by processes and for accessing their critical sections. The initial values of
shared Boolean variables and are randomly assigned,
Answer key ☟
35.31.1 Non Gatecse: UGC NET CSE | December 2012 | Part 3 | Question: 40
Which of the following operating system is better for implementing client-server network?
Answer key ☟
35.31.2 Non Gatecse: UGC NET CSE | December 2013 | Part 3 | Question: 69
Answer key ☟
35.31.3 Non Gatecse: UGC NET CSE | October 2022 | Part 1 | Question: 1
Answer key ☟
35.32.1 Page Replacement: UGC NET CSE | August 2016 | Part 2 | Question: 37
Suppose that the virtual Address space has eight pages and physical memory with four page frames. If
page replacement algorithm is used, ______ number of page faults occur with the reference string.
021354637473355311172341
A. B. C. D.
ugcnetcse-aug2016-paper2 operating-system least-recently-used page-replacement
Answer key ☟
35.32.2 Page Replacement: UGC NET CSE | December 2018 | Part 2 | Question: 72
Suppose for a process , reference to pages in order are . Assume that main memory can
accomodate pages and the main memory has already and in the order – first, – second. At this moment,
assume FIFO Page Replacement Algorithm is used then the number of page faults that occur to complete the execution
of process is
A. B. C. D.
ugcnetcse-dec2018-paper2 operating-system page-replacement page-fault
Answer key ☟
35.32.3 Page Replacement: UGC NET CSE | July 2016 | Part 2 | Question: 36
A. 10, 9 B. 9, 9 C. 10, 10 D. 9, 10
ugcnetcse-july2016-paper2 operating-system page-replacement page-fault
Answer key ☟
35.32.4 Page Replacement: UGC NET CSE | June 2012 | Part 2 | Question: 33
A. 8 B. 9 C. 10 D. 12
operating-system page-replacement ugcnetcse-june2012-paper2
Answer key ☟
35.32.5 Page Replacement: UGC NET CSE | June 2014 | Part 3 | Question: 35
Consider a program that consists of pages (from to ) and we have page frames in the physical memory for
the pages. The page reference string is :
The number of page faults in LRU and optimal page replacement algorithms are respectively (without including initial
page faults to fill available page frames with pages) :
Answer key ☟
35.32.6 Page Replacement: UGC NET CSE | June 2019 | Part 2 | Question: 43
Consider that a process has been allocated frames and has a sequence of page referencing as
. What shall be the difference in page faults for the above string using the algorithms of
LRU and optimal page replacement for referencing the string?
A. B. C. D.
ugcnetcse-june2019-paper2 page-replacement least-recently-used
Answer key ☟
35.32.7 Page Replacement: UGC NET CSE | Junet 2015 | Part 2 | Question: 38
A LRU page replacement is used with page frames and eight pages. How many page faults will occur with the
reference string if the four frames are initially empty?
A. B. C. D.
ugcnetcse-june2015-paper2 operating-system page-replacement
Answer key ☟
35.32.8 Page Replacement: UGC NET CSE | October 2020 | Part 2 | Question: 15
Consider a hypothetical machine with pages of physical memory, pages of virtual memory, and
as the stream of page reference by an application. If and
are the number of page faults that the application would incur with FIFO and LRU page replacement algorithms
respectively, then _______(Assuming enough space for storing page frames)
A. B. C. D.
ugcnetcse-oct2020-paper2 operating-system page-replacement
Answer key ☟
35.32.9 Page Replacement: UGC NET CSE | September 2013 | Part 3 | Question: 71
Consider a main memory with three page frames for the following page reference string:
5, 4, 3, 2, 1, 4, 3, 5, 4, 3, 4, 1, 4
Assuming that the execution of process is initialized after loading page 5 in memory,, the number of page faults in FIFO
and second chance replacement respectively are
Answer key ☟
The speed up of a pipeline processing over an equivalent non-pipeline processing is defined by the ration:
where no. of tasks
time of completion of each tasks
no. of segments of pipeline
clock cycle time
speed up ratio
A. B.
C. D.
ugcnetsep2013ii operating-system pipelining
Answer key ☟
A specific editor has of program text, of initial stack, of initialized data, and of bootstrap
code. If five editors are started simultaneously, how much physical memory is needed if shared text is used?
A. B. C. D.
ugcnetcse-dec2014-paper2 operating-system process
Answer key ☟
Answer key ☟
35.35.1 Process Model: UGC NET CSE | December 2008 | Part 2 | Question: 21
N processes are waiting for . A process spends a fraction of its time in wait state. The
utilization is given by :
1. 1-p-N
2. 1-pN
3. pN
4. p-N
ugcnetcse-dec2008-paper2 operating-system process-model
Answer key ☟
35.35.2 Process Model: UGC NET CSE | December 2008 | Part 2 | Question: 22
If holes are half as large as processes, the fraction of memory wasted in holes is :
A.
B.
C.
D.
Answer key ☟
35.36.1 Process Scheduling: UGC NET CSE | August 2016 | Part 2 | Question: 39
Five jobs and are waiting in Ready Queue. Their expected runtimes are and
respectively. All jobs entered in Ready queue at time zero. They must run in _____ order to minimize average
response time if .
A. B.
C. D.
ugcnetcse-aug2016-paper2 operating-system process-scheduling
Answer key ☟
35.36.2 Process Scheduling: UGC NET CSE | August 2016 | Part 2 | Question: 40
Consider three CPU intensive processes which require and units of time, arrive at times
and respectively. Suppose operating system is implementing Shortest Remaining Time first (preemptive
scheduling) algorithm, then _____ context switches are required (suppose context switch at the beginning of Ready
queue and at the end of Ready queue are not counted).
A. B. C. D.
ugcnetcse-aug2016-paper2 operating-system process-scheduling
Answer key ☟
35.36.3 Process Scheduling: UGC NET CSE | December 2006 | Part 2 | Question: 37
Answer key ☟
35.36.4 Process Scheduling: UGC NET CSE | December 2006 | Part 2 | Question: 38
Answer key ☟
35.36.5 Process Scheduling: UGC NET CSE | December 2009 | Part 2 | Question: 36
In the process management Round-robin method is essentially the pre-emptive version of _________
(A) FILO
(B) FIFO
(C) SSF
Answer key ☟
35.36.6 Process Scheduling: UGC NET CSE | December 2012 | Part 2 | Question: 20
The problem of indefinite blockage of low-priority jobs in general priority scheduling algorithm can be solved
using:
Answer key ☟
35.36.7 Process Scheduling: UGC NET CSE | December 2013 | Part 2 | Question: 46
Consider a preemptive priority based scheduling algorithm based on dynamically changing priority. Larger
priority number implies higher priority. When the process is waiting for CPU in the ready queue (but not yet
started execution), its priority changes at a rate a=2. When it starts running, its priority changes at a rate b=1. All the
processes are assigned priority value 0 when they enter ready queue. Assume that the following processes want to
execute:
Process Arrival Service
ID Time Time
P1 0 4
P2 1 1
P3 2 2
P4 3 1
The time quantum q=1. When two processes want to join ready queue simultaneously, the process which has not
executed recently is given priority. The finish time of processes P1, P2, P3 and P4 will respectively be
Answer key ☟
35.36.8 Process Scheduling: UGC NET CSE | December 2014 | Part 2 | Question: 36
Consider the following justifications for commonly using the two-level scheduling:
I. It is used when memory is too small to hold all the ready processes.
II. Because its performance is same as that of the .
III. Because it facilitates putting some set of processes into memory and a choice is made from that.
IV. Because it does not allow to adjust the set of in-core processes.
Which of the following is true ?
Answer key ☟
35.36.9 Process Scheduling: UGC NET CSE | December 2018 | Part 2 | Question: 73
Consider the following set of processes and the length of CPU burst time given in milliseconds :
Assume that processes being scheduled with Round-Robin Scheduling Algorithm with time quantum ms. Then the
waiting time for is ______ ms
A. B. C. D.
ugcnetcse-dec2018-paper2 operating-system process-scheduling round-robin-scheduling
Answer key ☟
35.36.10 Process Scheduling: UGC NET CSE | January 2017 | Part 3 | Question: 52
Answer key ☟
35.36.11 Process Scheduling: UGC NET CSE | July 2016 | Part 2 | Question: 40
A scheduling Algorithm assigns priority proportional to the waiting time of a process. Every process starts with
priority zero (lowest priority). The scheduler reevaluates the process priority for every 'T' time units and declares
next process to be scheduled. If teh process have no I/O operations and all arrive at time zero, then the schduler
implements ___ criteria
A. Priority scheduling B. Rond Robin Scheduling
C. Shortest Job First D. FCFS
ugcnetcse-july2016-paper2 operating-system process-scheduling
Answer key ☟
35.36.12 Process Scheduling: UGC NET CSE | July 2018 | Part 2 | Question: 60
In which of the following scheduling criteria, context switching will never take place?
A. ROUND ROBIN B. Preemptive SJF
C. Non-preemptive SJF D. Preemptive priority
ugcnetcse-july2018-paper2 process-scheduling operating-system
Answer key ☟
35.36.13 Process Scheduling: UGC NET CSE | June 2005 | Part 2 | Question: 39
35.36.14 Process Scheduling: UGC NET CSE | June 2010 | Part 2 | Question: 38
A. B. C. D. Priority based
ugcnetcse-june2010-paper2 operating-system process-scheduling
Answer key ☟
35.36.15 Process Scheduling: UGC NET CSE | June 2012 | Part 2 | Question: 29
Answer key ☟
35.36.16 Process Scheduling: UGC NET CSE | June 2012 | Part 2 | Question: 30
In round robin CPU scheduling as time quantum is increased the average turn around time
A. increases
B. decreases
C. remains constant
D. varies irregularly
Answer key ☟
35.36.17 Process Scheduling: UGC NET CSE | June 2013 | Part 3 | Question: 58
Consider the following processes with time slice of 4 milliseconds (I/O requests are ignored):
Process A B C D
Arrival
time 0 1 2 3
CPU
8 4 9 5
Cycle
The average turnaround time of these processes will be
Answer key ☟
35.36.18 Process Scheduling: UGC NET CSE | June 2014 | Part 2 | Question: 32
A. B.
C. D.
ugcnetcse-june2014-paper2 operating-system process-scheduling
Answer key ☟
35.36.19 Process Scheduling: UGC NET CSE | June 2014 | Part 3 | Question: 34
Consider a uniprocessor system where new processes arrive at an average of five processes per minute and each
process needs an average of seconds of service time. What will be the CPU utilization ?
A. % B. % C. % D. %
ugcnetjune2014iii operating-system process-scheduling
Answer key ☟
35.36.20 Process Scheduling: UGC NET CSE | June 2014 | Part 3 | Question: 36
Which of the following statements is not true about disk-arm scheduling algorithms ?
Answer key ☟
35.36.21 Process Scheduling: UGC NET CSE | June 2019 | Part 2 | Question: 45
Consider three CPU intensive processes, which require , and units of time and arrive at times , and
respectively. How many context switches are needed if the operating system implements a shortest remaining
time first scheduling algorithm? Do not count the context switches at time zero and at the end.
A. B. C. D.
ugcnetcse-june2019-paper2 process-scheduling
Answer key ☟
Consider the following table of arrival time and burst time for three processes :
Process arrival time Burst time
The pre-emptive shortest job first scheduling algorithm is used. Scheduling is carried out only at arrival or completion
of a process. What is the average waiting time for the three processes?
A. B.
C. D.
ugcnetcse-june2023-paper2 operating-system process-scheduling
Answer key ☟
35.36.23 Process Scheduling: UGC NET CSE | Junet 2015 | Part 3 | Question: 50
Which of the following statements is not true for Multi Level Feedback Queue processor scheduling algorithm?
Answer key ☟
35.36.24 Process Scheduling: UGC NET CSE | September 2013 | Part 2 | Question: 44
A. B.
C. D.
ugcnetsep2013ii operating-system process-scheduling match-the-following easy
Answer key ☟
35.36.25 Process Scheduling: UGC NET CSE | September 2013 | Part 3 | Question: 70
Consider the following set of processes with the length of CPU burst time in milliseconds (ms)
Using round robin scheduling with time slice of ms, the average turn around time is
A. ms B. ms C. ms D. ms
ugcnetcse-sep2013-paper3 operating-system process-scheduling
Answer key ☟
35.37.1 Process Synchronization: UGC NET CSE | December 2018 | Part 2 | Question: 69
To overcome difficulties in Readers-Writers problem, which of the following statement/s is/are true?
A. (i) only B. (ii) only C. (iii) only D. Both (ii) and (iii)
ugcnetcse-dec2018-paper2 operating-system process-synchronization
Answer key ☟
35.37.2 Process Synchronization: UGC NET CSE | July 2018 | Part 2 | Question: 51
At a particular time of computation, the value of a counting semaphore is 10. Then 12 P operations and "x" V
operations were performed on this semaphore. If the final value of semaphore is 7, x will be
A. 8 B. 9 C. 10 D. 11
ugcnetcse-july2018-paper2 operating-system process-synchronization
Answer key ☟
A. multiprocessing
B. multiprogramming
C. multitasking
D. all of the above
Answer key ☟
35.39.1 Resource Allocation: UGC NET CSE | June 2012 | Part 2 | Question: 31
Answer key ☟
35.39.2 Resource Allocation: UGC NET CSE | June 2014 | Part 2 | Question: 33
Consider a system with five processes through and three resource types , and . Resource type
has instances, has instances and has instances. Suppose that at time , the following snapshot
of the system has been taken :
Allocation
0 1 0
2 0 0
3 0 2
2 1 1
0 2 2
Max
7 5 3
3 2 2
9 0 2
2 2 2
4 3 3
Available
3 3 2
Assume that now the process requests one additional instance of type and two instances of resource type . The
state resulting after this allocation will be
A. Ready state B. Safe state
C. Blocked state D. Unsafe state
ugcnetcse-june2014-paper2 operating-system resource-allocation
Answer key ☟
35.40.1 Runtime Environment: UGC NET CSE | December 2009 | Part 2 | Question: 31
(A) re-allocation
(B) allocation
(C) linking
(D) loading
ugcnetcse-dec2009-paper2 operating-system runtime-environment
Answer key ☟
Answer key ☟
a. First-come-first-served
b. Round Robin
c. Priority
Answer key ☟
Consider the following three processes with the arrival time and CPU burst time given in miliseconds:
Arrival Burst
Process
Time Time
0 7
1 4
2 8
The Gantt Chart for preemptive SJF scheduling algorithm is _______
A.
B.
C.
D.
Answer key ☟
35.42.1 Seek Latency: UGC NET CSE | June 2019 | Part 2 | Question: 16
For a magnetic disk with concentric circular tracks, the seek latency is not linearly proportional to the seek
distance due to
ugcnetcse-june2019-paper2 seek-latency
Answer key ☟
A semaphore count of negative n means (s = – n) that the queue contains ________ waiting processes.
(A) n + 1
(B) n
(C) n – 1
(D) 0
ugcnetcse-dec2009-paper2 operating-system semaphore
Answer key ☟
35.43.2 Semaphore: UGC NET CSE | January 2017 | Part 2 | Question: 36
There are three processes and sharing a semaphore for synchronizing a variable. Initial value of
semaphore is one. Assume that negative value of semaphore tells us how many processes are waiting in queue.
Processes access the semaphore in following order :
a. needs to access
b. needs to access
c. needs to access
A. B. C. D.
ugcnetjan2017ii operating-system semaphore
Answer key ☟
Suppose and are two semaphores initialized to and are two processes which are sharing resources.
Answer key ☟
35.44.1 Shell Script: UGC NET CSE | July 2016 | Part 3 | Question: 68
Which of the following statements is not correct with reference to cron daemon in UNIX OS?
A. The cron daemon is the standard tool for running commands on a predetermined-schedule
B. It starts when the system boots and runs as long as the system is up
C. Cron reads configuration files that contain list of command lines and the times at which they invoked
D. Crontab for individual users are not stored
Answer key ☟
35.44.2 Shell Script: UGC NET CSE | July 2016 | Part 3 | Question: 69
In Unix, files can be protected by assigning each one a 9-bit mode called rights bits, now, consider the following
two statements:
I. A mode of 641 (octal) means that the owner can read and write the file, other members of the owner's group can read
it, and users can execute only
II. A mode of 100 (octal) allows the owner to execute the file , but prohibits all other access
Which of the following statements is correct with reference to above statements?
A. Only I is correct B. Only II is correct
C. Both I and II are correct D. Both I and II are incorrect
ugcnetcse-july2016-paper3 unix shell-script
Answer key ☟
35.44.3 Shell Script: UGC NET CSE | June 2019 | Part 2 | Question: 50
Which of the following UNIX/Linux pipes will count the number of lines in all the files having .c and .h as their
extension in the current working directory?
A. cat ch wc B. cat c-h wc
C. cat ch ls D. cat ch wc
ugcnetcse-june2019-paper2 shell-script
Answer key ☟
35.44.4 Shell Script: UGC NET CSE | Junet 2015 | Part 2 | Question: 39
A. It will print all of the lines in the file x that match the search string "abc"
B. It will print all of the lines in file x that do not match the search string "abc"
C. It will print the total number of lines in the file x that match the search string "abc"
D. It will print the specific line numbers of the file x in which there is a match for string "abc"
Answer key ☟
35.44.5 Shell Script: UGC NET CSE | Junet 2015 | Part 3 | Question: 75
ugcnetcse-june2015-paper3 shell-script
Answer key ☟
35.44.6 Shell Script: UGC NET CSE | September 2013 | Part 3 | Question: 72
Which of the following shell scripts will produce the output “my first script”?
Answer key ☟
35.44.7 Shell Script: UGC NET CSE | September 2013 | Part 3 | Question: 75
Which of the following statements is not true for UNIX Operating System?
A. Major strength of UNIX Operating System is its open standards which enables large number of organizations
ranging from academicia to industries to participate in its development
B. UNIX kernel uses modules with well specified interfaces and provides advantages like simplified tesing and
maintenance of kernel.
C. UNIX is kernel based operating system with two main components viz. process management subsystem and file
management subsystem.
D. All devices are represented as files which simplify the management of I/O devices and files. The directories
structure used is directed acyclic graph.
Answer key ☟
Four jobs J1, J2, J3 and J4 are waiting to be run. Their expected run times are 9, 6, 3 and 5 respectively. In order
to minimize average response time, the jobs should be run in the order:
(A) J1 J2 J3 J4 (B) J4 J3 J2 J1
(C) J3 J4 J1 J2 (D) J3 J4 J2 J1
ugcnetcse-dec2008-paper2 operating-system sjf scheduling
Answer key ☟
Consider a disk system with cylinders. The requests to access the cylinders occur in the following
sequences:
Assuming that the head is currently at cylinder , what is the time taken to satisfy all requests if it takes ms to move
from the cylinder to adjacent one and the shortest seek time first policy is used?
A. ms B. ms C. ms D. ms
ugcnetcse-june2019-paper2 disk-scheduling sstf
Answer key ☟
35.47.1 Storage Devices: UGC NET CSE | December 2014 | Part 3 | Question: 49
Various storage devices used by an operating system can be arranged as follows in increasing order of accessing
speed :
A. Magnetic tapes magnetic disks optical disks electronic disks main memory cache registers
B. Magnetic tapes magnetic disks electronic disks optical disks main memory cache registers
C. Magnetic tapes electronic disks magnetic disks optical disks main memory cache registers
D. Magnetic tapes optical disks magnetic disks electronic disks main memory cache registers
Answer key ☟
Match the following WINDOWS system calls and UNIX system calls with reference to process control and File
manipulation.
A.
B.
C.
D.
Answer key ☟
35.48.2 System Call: UGC NET CSE | October 2020 | Part 2 | Question: 84
Assuming that the system call never fails, consider the following C program and executed on a
UNIX/Linux system:
Answer key ☟
35.49.1 System Reliability: UGC NET CSE | August 2016 | Part 3 | Question: 43
An Operating System crashes on the average once in 30 days, that is, the Mean Time Between Failures
(MTBF) = 30 days. When this happens, it takes 10 minutes to recover the OS, that is, the Mean Time To Repair
(MTTR) = 10 minutes. The availability of the OS with these reliability figures is approximately :
Answer key ☟
Answer key ☟
Answer key ☟
One of the disadvantages of user level threads compared to Kernel level thread is
A. If a user level thread of a process executes a system call, all threads in that process are blocked.
B. Scheduling is application dependent.
C. Thread switching doesn’t require kernel mode privileges.
D. The library procedures invoked for thread management in user level threads are local procedures.
Answer key ☟
Which of the following are NOT shared by the threads of the same process?
Answer key ☟
35.51.1 Transaction and Concurrency: UGC NET CSE | Junet 2015 | Part 2 | Question: 37
Let and two processes, R be the set of variables read from memory, and W be the set of variables
written to memory. For the concurrent execution of two processes and which of the conditions are not
true?
A. B.
C. D.
ugcnetcse-june2015-paper2 transaction-and-concurrency
Answer key ☟
The Unix Operating System Kernel maintains two key data structures related to processes, the process table and
the user structure. Now, consider the following two statements :
I. The process table is resident all the time and contain information needed for all processes, even those that are not
currently in memory.
II. The user structure is swapped or paged out when its associated process is not in memory, in order not to waste
memory on information that is not needed.
Which of the following options is correct with reference to above statements ?
Answer key ☟
The Unix command used to find out the number of characters in a file is
(A) nc
(B) wc
(C) chcnt
(D) lc
ugcnetcse-dec2009-paper2 unix operating-system
Answer key ☟
In UNIX, which of the following command is used to set the task priority?
Answer key ☟
Everything below the system call interface and above the physical hardware is known as
Answer key ☟
Answer key ☟
In Unix, how do you check that two given strings a and b are equal?
C. test $a = $b D. sh -C test $a == $b
Answer key ☟
Which statement is not true about process O in the Unix operating system ?
Answer key ☟
Answer key ☟
In Unix, the login prompt can be changed by changing the contents of the file_____
Answer key ☟
In Unix, the command to enable execution permission for file "mylife" by all is_____
A. Chmod ugo X mylife B. Chmod a X mylife
C. Chmod X mylife D. All of the above
ugcnetcse-dec2015-paper3 unix operating-system non-gatecse
Answer key ☟
Answer key ☟
A. B.
C. D.
ugcnetcse-jan2017-paper3 operating-system unix
Answer key ☟
Answer key ☟
In UNIX , processes that have finished execution but have not yet had their status collected are known as
_________
A. Sleeping processes B. Stopped Processes
C. Zombie Process D. Orphan Processes
ugcnetcse-july2016-paper3 operating-system unix
Answer key ☟
35.52.15 Unix: UGC NET CSE | July 2016 | Part 3 | Question: 50
In UNIX OS , when a process creates a new process using the fork() system call , which of the following state is
shared between the parent process and child process
A. Heap B. Stack
C. Shared memory segments D. Both heap and Stack
ugcnetcse-july2016-paper3 operating-system unix
Answer key ☟
Which of the following information about the UNIX file system is not correct?
A. Super block contains the number of i-nodes, the number of disk blocks, and the start of the list of free disk blocks
B. An i-node contains accounting information as well as enough information to locate all the disk blocks that holds the
file's data
C. Each i-node is 256-bytes long
D. All the files and directories are stored in data blocks
Answer key ☟
Answer key ☟
__________ maintains the list of free disk blocks in the Unix file system.
Answer key ☟
Answer key ☟
The Unix Kernel maintains two key data structures related to processes, the process table and the user structure.
Which of following information is not the part of user structure?
A. File descriptor table B. System call state
C. Scheduling parameters D. Kernel stack
ugcnetcse-june2015-paper2 unix
Answer key ☟
Answer key ☟
A. B.
C. D.
ugcnetcse-june2015-paper3 operating-system unix
Answer key ☟
Assume that an implementation of Unix operating system uses i-nodes to keep track of data blocks allocated to a
file. It supports 12 direct block addresses, one in direct block address and one double indirect block address. The
file system has 256 bytes block size and 2 bytes for disk block address. The maximum possible size of a file in this
system is
A. 16 MB B. 16 KB C. 70 KB D. 71 KB
ugcnetsep2013ii operating-system unix
Answer key ☟
Answer key ☟
35.53.1 Virtual Memory: UGC NET CSE | December 2008 | Part 2 | Question: 42
If the executing program size is greater than the existing of a computer, it is still possible to execute the
program if the supports :
A. multitasking
B. virtual memory
C. paging system
D. none of the above
Answer key ☟
35.53.2 Virtual Memory: UGC NET CSE | December 2013 | Part 3 | Question: 70
Answer key ☟
35.53.3 Virtual Memory: UGC NET CSE | December 2015 | Part 2 | Question: 26
A virtual memory has a page size of words. There are eight pages and four blocks. The associative memory
page table contains the following entries :
Which of the following list of virtual addresses (in decimal) will not cause any page fault if referenced by the CPU?
A. B.
C. D.
ugcnetcse-dec2015-paper2 operating-system virtual-memory
Answer key ☟
35.53.4 Virtual Memory: UGC NET CSE | January 2017 | Part 3 | Question: 2
35.53.5 Virtual Memory: UGC NET CSE | June 2005 | Part 2 | Question: 36
Answer key ☟
35.53.6 Virtual Memory: UGC NET CSE | June 2014 | Part 2 | Question: 31
In a paged memory management algorithm, the hit ratio is %. If it takes nanoseconds to search Translation
Look-aside Buffer (TLB) and nanoseconds (ns) to access memory, the effective memory access time is
A. ns B. ns C. ns D. ns
ugcnetcse-june2014-paper2 operating-system virtual-memory
Answer key ☟
35.53.7 Virtual Memory: UGC NET CSE | June 2019 | Part 2 | Question: 47
The minimum number of page frames that must be allocated to a running process in a virtual memory
environment is determined by
Answer key ☟
Answer key ☟
In windows 2000 operating system all the processor-dependent code is isolated in a dynamic link library called
A. NTFS file system B. Hardware abstraction layer
C. Microkernel D. Process Manger
ugcnetcse-dec2013-paper3 operating-system windows non-gatecse
Answer key ☟
Which of the following versions of Windows O.S. contain built-in partition manager which allows us to shrink
and expand pre-defined drives ?
Answer key ☟
35.55.3 Windows: UGC NET CSE | December 2015 | Part 3 | Question: 55
Answer key ☟
The versions of windows operating system like Windows XP and Window Vista uses following file system:
A. FAT-16 B. FAT-32
C. NTFS (NT File System) D. All of the above
ugcnetcse-june2013-paper3 operating-system windows
Answer key ☟
Answer key ☟
Answer Keys
35.0.1 C 35.0.2 A 35.0.3 A 35.0.4 A 35.0.5 A
35.0.6 A 35.0.7 C 35.0.8 A 35.0.9 C 35.0.10 B
35.0.11 C 35.0.12 B 35.0.13 B 35.0.14 C 35.0.15 X
35.0.16 D 35.0.17 C 35.0.18 Q-Q 35.0.19 Q-Q 35.0.20 N/A
35.0.21 Q-Q 35.0.22 B 35.0.23 Q-Q 35.0.24 Q-Q 35.0.25 Q-Q
35.0.26 Q-Q 35.0.27 X 35.0.28 B 35.0.29 Q-Q 35.0.30 Q-Q
35.0.31 Q-Q 35.0.32 B 35.0.33 C 35.0.34 B 35.0.35 X
35.0.36 N/A 35.0.37 Q-Q 35.0.38 Q-Q 35.0.39 Q-Q 35.0.40 Q-Q
35.0.41 Q-Q 35.0.42 Q-Q 35.0.43 Q-Q 35.0.44 Q-Q 35.0.45 Q-Q
35.0.46 Q-Q 35.0.47 B 35.0.48 Q-Q 35.0.49 Q-Q 35.1.1 C
35.2.1 Q-Q 35.2.2 Q-Q 35.2.3 A 35.3.1 B 35.4.1 C
35.5.1 C 35.6.1 Q-Q 35.6.2 Q-Q 35.6.3 B 35.6.4 Q-Q
35.6.5 Q-Q 35.6.6 D 35.6.7 A 35.6.8 Q-Q 35.6.9 A
35.7.1 D 35.8.1 C 35.9.1 A 35.10.1 A 35.10.2 B
35.10.3 C 35.10.4 C 35.10.5 B 35.10.6 C 35.10.7 B
35.10.8 A 35.10.9 A 35.10.10 D 35.11.1 B 35.12.1 C
35.12.2 X 35.12.3 D 35.12.4 B 35.12.5 C 35.12.6 B
35.12.7 D 35.12.8 C 35.12.9 B 35.13.1 B 35.14.1 Q-Q
35.15.1 B 35.16.1 Q-Q 35.17.1 Q-Q 35.17.2 C 35.17.3 X
35.17.4 B 35.17.5 B 35.17.6 A 35.17.7 B 35.18.1 Q-Q
35.19.1 Q-Q 35.20.1 B 35.21.1 Q-Q 35.22.1 A 35.22.2 C
35.23.1 B 35.23.2 C 35.24.1 A 35.25.1 Q-Q 35.26.1 Q-Q
35.26.2 Q-Q 35.26.3 Q-Q 35.26.4 X 35.26.5 A 35.26.6 B
35.26.7 C 35.26.8 C 35.27.1 A 35.28.1 A 35.29.1 D
35.30.1 C 35.31.1 C 35.31.2 D 35.31.3 Q-Q 35.32.1 Q-Q
35.32.2 Q-Q 35.32.3 D 35.32.4 C 35.32.5 B 35.32.6 A
35.32.7 B 35.32.8 D 35.32.9 D 35.33.1 A 35.34.1 B
35.34.2 B 35.35.1 Q-Q 35.35.2 Q-Q 35.36.1 Q-Q 35.36.2 Q-Q
35.36.3 Q-Q 35.36.4 Q-Q 35.36.5 Q-Q 35.36.6 B 35.36.7 B
35.36.8 D 35.36.9 Q-Q 35.36.10 C 35.36.11 B 35.36.12 Q-Q
35.36.13 Q-Q 35.36.14 Q-Q 35.36.15 A 35.36.16 D 35.36.17 B
35.36.18 D 35.36.19 B 35.36.20 B 35.36.21 B 35.36.22 Q-Q
35.36.23 C 35.36.24 A 35.36.25 A 35.37.1 Q-Q 35.37.2 Q-Q
35.38.1 Q-Q 35.39.1 A 35.39.2 B 35.40.1 Q-Q 35.41.1 Q-Q
35.41.2 Q-Q 35.41.3 B 35.41.4 Q-Q 35.42.1 B 35.43.1 Q-Q
35.43.2 A 35.43.3 D 35.44.1 D 35.44.2 C 35.44.3 D
35.44.4 B 35.44.5 B 35.44.6 C 35.44.7 B 35.45.1 Q-Q
35.46.1 D 35.47.1 D 35.48.1 A 35.48.2 C 35.49.1 D
35.50.1 B 35.50.2 B 35.50.3 A 35.50.4 C 35.51.1 C
35.52.1 3 35.52.2 Q-Q 35.52.3 B 35.52.4 A 35.52.5 B
35.52.6 C 35.52.7 A 35.52.8 D 35.52.9 C 35.52.10 B
35.52.11 B 35.52.12 B 35.52.13 C 35.52.14 C 35.52.15 C
35.52.16 C 35.52.17 C 35.52.18 C 35.52.19 C 35.52.20 C
35.52.21 D 35.52.22 A 35.52.23 X 35.52.24 C 35.53.1 Q-Q
35.53.2 D 35.53.3 C 35.53.4 B 35.53.5 Q-Q 35.53.6 D
35.53.7 C 35.54.1 Q-Q 35.55.1 B 35.55.2 A 35.55.3 C
35.55.4 D 35.55.5 D
36 Others: Others (687)
Which of the following binary tree is optimal, if probabilities of successful search and unsuccessful search are
same?
A.
B.
C.
D.
ugcnetcse-june2012-paper3
Answer key ☟
The colour of an object is largely determined by its diffuse reflection coefficient. If , then what
shall be the colour of the object, of the light used is blue and magenta?
A. White and Red B. Red and Blue C. Black and White D. Black and Red
ugcnetcse-june2012-paper3
Answer key ☟
Answer key ☟
Answer key ☟
ugcnetcse-june2013-paper2
Answer key ☟
When the following code is executed what will be the value of x and y?
int x=1, y=0;
y=x++;
A. 2, 1 B. 2, 2 C. 1, 1 D. 1, 2
ugcnetcse-june2013-paper2
Answer key ☟
A. m B. m C. m(m+1) D. m(m+2)
ugcnetcse-june2013-paper2
Answer key ☟
A. 1 B. 2 C. 3 D. 0
ugcnetcse-june2013-paper2
Answer key ☟
How many times the word ‘print’ shall be printed by the following program segment?
for (i=1, i 2, i++)
for (j=1, j 2, j++)
for (k=1, k 2, k++)
printf(“print\n”)
A. 1 B. 3 C. 6 D. 8
ugcnetcse-june2013-paper2
Answer key ☟
Answer key ☟
Manager’s salary details are to be hidden from Employee table. This Technique is called as
A. Conceptual level Datahiding B. Physical level Datahiding
C. External level Datahiding D. Logical level Datahiding
ugcnetcse-june2013-paper2
Answer key ☟
A Network Schema
A. restricts to one to many relationship B. permits to many to many relationship
C. Stores Data in a Database D. Stores Data in a Relation
ugcnetcse-june2013-paper2
Answer key ☟
Answer key ☟
If are domains in a relational model, then the relation is a table, which is a subset of
A. B.
C. D.
ugcnetcse-june2013-paper2
Answer key ☟
Which of the following addresses is used to deliver a message to the correct application program running on a
host?
In _____ substitution, a character in the plaintext is always changed to the same character in ciphertext,
regardless of its position in the text.
A. polyalphabetic B. monoalphabetic
C. transpositional D. multialphabetic
ugcnetcse-june2013-paper2
Answer key ☟
In hierarchical routing with 4800 routers, what region and cluster sizes should be chosen to minimize the size of
the routing table for the three-layer hierarchy?
A. 10 clusters, 24 regions and 20 routers B. 12 clusters, 20 regions and 20 routers
C. 16 clusters, 12 regions and 25 routers D. 15 clusters, 16 regions and 20 routers
ugcnetcse-june2013-paper2
Answer key ☟
In IPv4 header, the ____ field is needed to allow the destination host to determine which datagram a newly
arrived fragments belongs to
A. identification B. fragment offset
C. time to live D. header checksum
ugcnetcse-june2013-paper2
Answer key ☟
A. B. C. D.
ugcnetcse-june2013-paper2
Answer key ☟
Answer key ☟
Given an open address hash table with load factor , the expected number of probes in a successful search is
A. Atmost In B. Atmost In
C. Atleast In D. Atleast In
ugcnetcse-june2013-paper2
Answer key ☟
For a B-tree of height h and degree t, the total CPU time used to insert a node is
Answer key ☟
A. 17 B. 131 C. 64 D. 52
ugcnetcse-june2013-paper2
Answer key ☟
Repository of information gathered from multiple sources, storing under unified scheme at a single site is called
Answer key ☟
Answer key ☟
A test contains 100 true/false questions. How many different ways can a student answer the question on the test,
if the answer may be left blank also.
A. B. C. D.
ugcnetcse-june2013-paper2
Answer key ☟
Answer key ☟
36.0.28 UGC NET CSE | June 2013 | Part 2 | Question: 44
A set of processors can execute in parallel if Bernstein’s conditions are satisfied on a pairwise
basis; that is if and only if:
A. B.
C. D.
ugcnetcse-june2013-paper2
Answer key ☟
A virtual memory based memory management algorithm partially swaps out a process. This is an example of
A. short term scheduling B. long term scheduling
C. medium term scheduling D. mutual exclusion
ugcnetcse-june2013-paper2
Answer key ☟
A. Sort, taking the input from “temp”, prints 20 lines from temp and delete the file temp
B. Sort eh file “temp”, removes 30 lines from temp and delete the file temp
C. Sort, taking the input from “in” and writing the output to “temp”, then prints 30 lines from temp on terminal. Finally
“temp” is removed
D. Sort, taking the input from “temp”, and then prints 30 lines from “temp” on terminal. Finally “temp” is removed.
ugcnetcse-june2013-paper2
Answer key ☟
Answer key ☟
Answer key ☟
Which is the protocol for performing RPCs between applications in a language and system independent way?
ugcnetcse-dec2013-paper3
Answer key ☟
A. B.
C. D.
ugcnetcse-dec2013-paper3
Answer key ☟
ugcnetcse-dec2014-paper3
Answer key ☟
In alpha-beta pruning, _____ is used to cut off the search at maximizing level only and ____ is used to cut off
the search at maximizing level only.
Answer key ☟
Answer key ☟
The circumference of the two concentric disks are divided into sections each. For the outer disk, of the
sections are painted red and of the sections are painted blue. For the inner disk, the sections are painted red
and blue in an arbitrary manner. It is possible to align the two disks so that
A. or more
B. or more
C. or more
D. or more
of the sections on the inner disks have their colours matched with the corresponding section on outer disk.
ugcnetcse-june2011-paper2
Answer key ☟
A. B. C. D.
ugcnetcse-june2011-paper2
Answer key ☟
A. B. C. D.
ugcnetcse-june2011-paper2
Answer key ☟
is equivalent to
A. B.
C. D.
ugcnetcse-june2011-paper2
Answer key ☟
Answer key ☟
A. Accepts one input and gives several output B. Accepts many inputs and gives many output
C. Accepts many inputs and gives one output D. Accepts one input and gives one output
ugcnetcse-june2011-paper2
Answer key ☟
Answer key ☟
36.0.45 UGC NET CSE | June 2011 | Part 2 | Question: 11
From the point of view of the programmer, what are the major advantages of using a high-level language rather
than internal machine code or assembly language?
Answer key ☟
Answer key ☟
Answer key ☟
Answer key ☟
A smart modem can dial, hangup and answer incoming calls automatically. Can you tell who provides the
appropriate instructions to the modem for this purpose ?
Answer key ☟
Which of the following permanent database that has an entry for each terminal symbol ?
A. Literal table B. Identifier table
C. Terminal table D. Source table
ugcnetcse-june2011-paper2 databases
Answer key ☟
36.0.51 UGC NET CSE | August 2016 | Part 2 | Question: 17
ugcnetcse-aug2016-paper2
Answer key ☟
Which of the following statements is/are True regarding some advantages that an objectoriented DBMS
(OODBMS) offers over a relational database ?
I. An OODBMS avoids the “impedance mismatch” problem.
II. An OODBMS avoids the “phantom” problem.
III. An OODBMS provides higher performance concurrency control than most relational databases.
IV. An OODBMS provides faster access to individual data objects once they have been read from disk.
Answer key ☟
A neuron with inputs has the weight vector and a bias . If the input vector is
. Then the total input to the neuron is:
A. B. C. D.
ugcnetcse-jan2017-paper3
Answer key ☟
ugcnetcse-june2009-paper2
Answer key ☟
36.0.56 UGC NET CSE | June 2019 | Part 1 | Question: 48
The present form of Inter University Board that was previously established for promoting cooperation and
coordination among Universities is
Answer key ☟
Answer key ☟
Which of the following statements is/are true w.r.t. Enterprise Resource Planning (ERP)?
Answer key ☟
A. B.
C. D.
ugcnetjan2017ii
Answer key ☟
36.0.60 UGC NET CSE | January 2017 | Part 3 | Question: 69
At which of the following stage(s), the degeneracy do not occur in transportation problem?
( represents number of sources and destinations respectively)
Answer key ☟
With respect to a loop in the transportation table, which one of following is not correct?
ugcnetcse-jan2017-paper3
Answer key ☟
which one of the following is not a word in the dictionary created by LZ-coding (the initial words are a,b)?
A. B. C. D.
ugcnetcse-jan2017-paper3
Answer key ☟
A. B. C. D.
ugcnetcse-jan2017-paper3 binary-codes
Answer key ☟
Answer key ☟
A. B. C. D.
ugcnetcse-dec2004-paper2
Answer key ☟
Answer key ☟
A. B. C. D.
ugcnetcse-dec2004-paper2
Answer key ☟
If denotes the set of integers modulo , then the following are fields with respect to the operations of
addition modulo and multiplication modulo :
i.
ii.
iii.
iv.
Another name of is :
A. B. C. D.
ugcnetcse-june2005-paper2
36.0.71 UGC NET CSE | June 2005 | Part 2 | Question: 48
A. B. C. D.
ugcnetcse-june2005-paper2
Answer key ☟
The frequency reuse plan is divided into cell grouping using how many cells, where the number of cells equals
?
A. B. C. D.
ugcnetcse-june2005-paper2
Answer key ☟
Answer key ☟
Answer key ☟
I. Requirement analysis
II. Coding
III. Design
IV. Testing
Answer key ☟
36.0.77 UGC NET CSE | June 2005 | Part 2 | Question: 41
Correct matching is :
ugcnetcse-june2005-paper2
Answer key ☟
A. Whoami B. wc C. Is D. put
ugcnetcse-june2005-paper2
Answer key ☟
Answer key ☟
Answer key ☟
Which protocol is used to encapsulate a data pocket created of a higher model layer ?
A. B. C. D.
ugcnetcse-june2005-paper2
Answer key ☟
36.0.82 UGC NET CSE | June 2005 | Part 2 | Question: 28
Which type of links are used for a connection between two devices ?
Answer key ☟
Which type of Bridge would be used to connect an Ethernet Segment with a token ring Segment ?
A. Transparent Bridge B. Source-Route Bridge
C. Translation Bridge D. None of these
ugcnetcse-june2005-paper2
Answer key ☟
1. Ethernet
2.
3. Frame Relay
4. -base
5. Token ring
A. B. C. D.
ugcnetcse-june2005-paper2
Answer key ☟
The algorithm that will efficiently sort an array that is nearly sorted except for the interchange of some adjacent
pairs of numbers like is :
Answer key ☟
Answer key ☟
Answer key ☟
36.0.88 UGC NET CSE | June 2005 | Part 2 | Question: 20
Answer key ☟
A black hole in a is a :
A. A data store with no in bound flows B. A data store with only in bound flows
C. A data store with more than one in bound flow D. None of these
ugcnetcse-june2005-paper2
Answer key ☟
Which of the following tools is not required during system analysis phase of system development Life cycle ?
A. CASE Tool B. RAD Tool
C. Reverse engineering tool D. None of these
ugcnetcse-june2005-paper2
Answer key ☟
Answer key ☟
Answer key ☟
A. Exclusive- B. C. Exclusive- D.
ugcnetcse-june2005-paper2
Answer key ☟
Answer key ☟
, then is equal to :
A. B. C. D.
ugcnetcse-june2005-paper2
Answer key ☟
Minimum number of individual shoes to be picked up from a dark room ( containing pair of shoes) if we have
to get atleast one proper pair :
A. B. C. D. None of these
ugcnetcse-june2005-paper2
Answer key ☟
Consider the relation on the set of non-negative integers defined by if and only if:
A. B.
C. D. None of the above
ugcnetcse-june2005-paper2
Answer key ☟
Answer key ☟
ugcnetcse-june2005-paper2
Answer key ☟
Encryption and decryption are the functions of the _________ layer of model :
__________ provide a method to recover data that has been delivered but not get used :
A. Segmentation B. Concatenation
C. Transalation D. Synchronization
ugcnetcse-dec2005-paper2
Answer key ☟
A. B. Veronica C. D.
ugcnetcse-dec2005-paper2
Answer key ☟
Answer key ☟
In what tree, for every node the height of its left subtree and right subtree differ at least by one:
A. Binary search tree B. -tree
C. Threaded binary tree D. Complete tree
ugcnetcse-dec2005-paper2
A. accessed by only one user B. modified by users with the correct password
C. is used to hide sensitive information D. both and
ugcnetcse-dec2005-paper2
Answer key ☟
A schema describes :
A. data elements B. records and files
C. record relationship D. all of the above
ugcnetcse-dec2005-paper2
Answer key ☟
Answer key ☟
Answer key ☟
Answer key ☟
Answer key ☟
36.0.114 UGC NET CSE | December 2005 | Part 2 | Question: 3
A.
B.
C.
D.
ugcnetcse-dec2005-paper2
Answer key ☟
A. is a tree
B. contains no cycles
C. Every pairs of vertices in is connected by exactly one path
D. All of these
ugcnetcse-dec2005-paper2
Answer key ☟
The program used to determine the round – trip delay between a workstation and a destination adress is :
Answer key ☟
Answer key ☟
What is the difference between the Ethernet frame preamble field and the preamble and start of
frame Delimiter fields?
Answer key ☟
36.0.120 UGC NET CSE | June 2006 | Part 2 | Question: 27
How much bandwidth is required to send voice- grade channels by on an international satellite
system?
A. B. C. D.
ugcnetcse-june2006-paper2
Answer key ☟
Answer key ☟
A. * B. * C. * D. *
ugcnetcse-june2006-paper2
Answer key ☟
Answer key ☟
In the balanced binary tree given below, how many nodes will become unbalanced when a node is inserted as a
child of the node .
A. B. C. D.
ugcnetcse-june2006-paper2
A. Category B. Classification
C. Combination D. Partial participation
ugcnetcse-june2006-paper2
Which data management language component enabled the DBA to define the schema components?
ugcnetcse-june2006-paper2
Answer key ☟
A. B. C. D. None of these
ugcnetcse-june2006-paper2
Answer key ☟
Answer key ☟
define max is a macro definition, which can find the maximum of two numbers and
if:
A. and are both integers only B. and are both declared as float only
C. and are both declared as double only D. and are both integers, float or double
ugcnetcse-june2006-paper2
while(num>=0)
ugcnetcse-june2006-paper2
ugcnetcse-june2006-paper2
A. B. C. D.
ugcnetcse-june2006-paper2
A. B. C. D.
ugcnetcse-june2006-paper2
Answer key ☟
A. B. C. D.
ugcnetcse-june2006-paper2
Answer key ☟
A. B. C. D.
ugcnetcse-june2006-paper2
Which of the following expression removes static hazard from a two level gate implementation of
A. B. C. D.
ugcnetcse-june2006-paper2
Answer key ☟
A. B. C. D.
ugcnetcse-june2006-paper2
A. injective B. surjective
C. both injective and surjective D. neither injective nor surjective
ugcnetcse-june2006-paper2
Answer key ☟
36.0.143 UGC NET CSE | June 2006 | Part 2 | Question: 3
For a complete graph with vertices, the total number of spanning trees is given by:
A. B. C. D.
ugcnetcse-june2006-paper2
Answer key ☟
A. B. C. D.
ugcnetcse-june2006-paper2
Answer key ☟
The mechanism with which several uses can share a medium without interference is :
A. Frequency modulation B. Amplitude modulation
C. Multiplexing D. None of these
ugcnetcse-dec2005-paper2
Answer key ☟
A. B. C. D.
ugcnetcse-dec2005-paper2
Answer key ☟
A. B. C. D.
ugcnetcse-dec2005-paper2
Answer key ☟
36.0.150 UGC NET CSE | December 2005 | Part 2 | Question: 46
Answer key ☟
Answer key ☟
Answer key ☟
Answer key ☟
Answer key ☟
Answer key ☟
36.0.157 UGC NET CSE | December 2005 | Part 2 | Question: 38
Which of the following checks cannot be carried out on the input data to a system?
A. Consistency check B. Syntax check
C. Range check D. All the above
ugcnetcse-dec2005-paper2
Answer key ☟
If you want to execute more than one program at a time, the systems software that are used must be capable of :
A. word processing B. virtual memory
C. compiling D. multitasking
ugcnetcse-dec2005-paper2
Answer key ☟
Answer key ☟
Answer key ☟
The Register or main memory location which contains the effective address of the operand is known as:
Answer key ☟
Answer key ☟
Answer key ☟
36.0.164 UGC NET CSE | December 2004 | Part 2 | Question: 39
Answer key ☟
Answer key ☟
Answer key ☟
Downflow is the process associated with _____ and back up of data in a warehouse.
Answer key ☟
Answer key ☟
(Multimedia Messaging Service) uses ______ types of messages to perform messaging transactions.
A. B. C. D.
ugcnetcse-june2006-paper2
Answer key ☟
36.0.171 UGC NET CSE | June 2006 | Part 2 | Question: 44
Answer key ☟
A. B. C. D. n*
ugcnetcse-june2006-paper2
Answer key ☟
Answer key ☟
A page fault_____.
ugcnetcse-june2006-paper2
Answer key ☟
36.0.178 UGC NET CSE | June 2006 | Part 2 | Question: 37
In processor management, round robin method essentially uses the preemptive version of_____.
Answer key ☟
A. B. C. D.
ugcnetcse-june2006-paper2
Answer key ☟
The action of passing the source program into the proper syntactic class is known as:
A. Syntax analysis B. Lexical analysis
C. Interpretation analysis D. Uniform symbol generation
ugcnetcse-june2006-paper2
Answer key ☟
A. B. C. D.
ugcnetcse-june2006-paper2
Answer key ☟
A. Check the validity of a source string B. Determine the syntactic structure of a source string
C. Both A and B D. None of these
ugcnetcse-june2006-paper2
ugcnetcse-june2006-paper2
Answer key ☟
ugcnetcse-dec2006-paper2
Answer key ☟
ugcnetcse-dec2006-paper2
A. B. C. D.
ugcnetcse-dec2006-paper2
ugcnetcse-dec2006-paper2
A. B. C. D.
ugcnetcse-dec2006-paper2
A. B. A−B=A ∩ ~ B C. D.
ugcnetcse-dec2006-paper2
A. B. C. D.
ugcnetcse-june2007-paper2
A. B. C. D.
ugcnetcse-june2007-paper2
A. Localities B. C. D.
ugcnetcse-june2007-paper2
Answer key ☟
Which technical concept sets cellular apart from all preceding mobile/ratio systems?
Answer key ☟
Which of the following combination is preferred with respect to cohesion and coupling:
A. low and low B. low and high C. high and low D. high and high
ugcnetcse-june2007-paper2
Answer key ☟
A. B. C. D.
ugcnetcse-june2007-paper2
Answer key ☟
Answer key ☟
Part of a program where the shared memory is accessed and which should be executed indivisibly, is called:
A. Semaphores B. Directory
C. Critical section D. Mutual exclusion
ugcnetcse-june2007-paper2
Answer key ☟
36.0.206 UGC NET CSE | June 2007 | Part 2 | Question: 35
Answer key ☟
Answer key ☟
Answer key ☟
Answer key ☟
1. Quality of service
2. Routing
3. Addressing
4. Connection-oriented delivery
5. Framming bits
A. B. C. D.
ugcnetcse-june2007-paper2
Answer key ☟
is _____.
A. A primary /secondary type protocol B. A peer/peer protocol
C. A Non-priority peer/peer protocol D. A priority type protocol
ugcnetcse-june2007-paper2
1. Windowing
2. Routing
3.
4. Buffering
A. B. C. D.
ugcnetcse-june2007-paper2
Answer key ☟
Answer key ☟
Which algorithm has some average, worst case and best case time:
A. Binary search B. Maximum of numbers
C. Quick sort D. Fibonacci search
ugcnetcse-june2007-paper2
A. B. C. D. None of these
ugcnetcse-june2007-paper2
36.0.219 UGC NET CSE | June 2007 | Part 2 | Question: 22
The time required to find the shortest path in a graph with vertices and edges is:
A. B. C. D.
ugcnetcse-june2007-paper2
Answer key ☟
ugcnetcse-june2007-paper2
A. B. C. D. None of these
ugcnetcse-june2007-paper2
Answer key ☟
Answer key ☟
Answer key ☟
ugcnetcse-june2007-paper2
Answer key ☟
ugcnetcse-june2007-paper2
Answer key ☟
Answer key ☟
In case of right shift bitwise operator in language, after shifting bits, the leftmost bits:
A. are always filled with zeros B. are always filled with ones
C. are filled with zeros or ones and is machine dependent D. none of the above
ugcnetcse-june2007-paper2
Answer key ☟
Answer key ☟
What is the maximum counting speed of a -bit binary counter which is composed of Flip-Flop with a
propagation delay of ?
A. B. C. D.
ugcnetcse-june2007-paper2
Answer key ☟
36.0.231 UGC NET CSE | June 2007 | Part 2 | Question: 9
If then:
A. B.
C. D.
ugcnetcse-june2007-paper2
Answer key ☟
A. B. C. D.
ugcnetcse-june2007-paper2
Answer key ☟
A. B. C. D.
ugcnetcse-june2007-paper2
’s complement of is:
A. B. C. D.
ugcnetcse-june2007-paper2
Answer key ☟
Answer key ☟
ugcnetcse-june2007-paper2
Answer key ☟
A. B.
C. D. None of the above
ugcnetcse-june2007-paper2
Answer key ☟
Consider a typical mobile communication system. If frequencies are available, how many can be used in a
given cell ?
A. B. C. D.
ugcnetcse-dec2007-paper2
With reference to implementation of different association mining algorithms, identify the correct statement :
A. The FP growth method was usually better than the best implementation of the apriori algorithm
B. Apriori algorithm is usually better than CHARM
C. Apriori algorithm is good when the support required is low
D. At very low support the number of frequent items becomes less
ugcnetcse-dec2007-paper2
Given a parallel algorithm with computation time , if parallel algorithm performs computational
operation, then processors can execute algorithm in time given by :
A. B. C. D.
ugcnetcse-dec2007-paper2
A. B. C. D.
ugcnetcse-dec2007-paper2
Answer key ☟
ugcnetcse-dec2007-paper2
ugcnetcse-dec2007-paper2
Amongst the logic families and , the family with the least power dissipation is :
A. B. C. D.
ugcnetcse-dec2007-paper2
Answer key ☟
36.0.248 UGC NET CSE | December 2007 | Part 2 | Question: 9
A. B. C. D.
ugcnetcse-dec2007-paper2
Answer key ☟
A. B. ~ C. ~ ~ D. ~
ugcnetcse-dec2007-paper2
Answer key ☟
Rashtriya Uchhatar Shiksha Abhiyan aims to achieve the following in Higher Education System:
i. Equity
ii. Access
iii.
iv. Excellence
Answer key ☟
ugcnetcse-dec2019-paper1
Answer key ☟
According to (General Agreement on Trade and Services), higher education should be a commodity in
the
A. domestic public sector B. domestic private sector
C. non-trading sector D. global marketplace
ugcnetcse-dec2019-paper1
Answer key ☟
Answer key ☟
Answer key ☟
The most important pollutants that cause degradation of water quality in rivers and streams are
i. Bacteria
ii. Nutrients
iii. Metals
iv. Total dissolved solids
v. Algae
Choose the most appropriate answer from the options given below:
A. i, ii and iii B. i, ii and iv
C. i, ii, iv and v D. i, ii, iii, iv and v
ugcnetcse-dec2019-paper1
Answer key ☟
Answer key ☟
A. a, b, c, e and f B. b, c , e and f
C. b, c , d, e and f D. a, b, c and f
ugcnetcse-dec2019-paper1
Answer key ☟
36.0.263 UGC NET CSE | December 2019 | Part 1 | Question: 37
Under Green India Mission, how many hectares of degraded forest land is to be brought under afforestation?
A. million hectares B. million hectares
C. million hectares D. million hectares
ugcnetcse-dec2019-paper1
Answer key ☟
Identify from the options given below, the co-benefit of Montreal Protocol
ugcnetcse-dec2019-paper1
Answer key ☟
The national agency for responding to computer security incidents as and when they occur, is
A. B. C. D.
ugcnetcse-dec2019-paper1
Answer key ☟
stands for
A. Partial Component Interconnect B. Partial Component Interaction
C. Peripheral Component Interconnect D. Peripheral Component Interaction
ugcnetcse-dec2019-paper1
Answer key ☟
_________ is a wireless technology built in electronic gadgets for transferring data over short distance
Answer key ☟
A. petabytes B. megabytes
C. kilobytes D. bytes
ugcnetcse-dec2019-paper1
Answer key ☟
Which one of the following tasks is associated with changing appearance of a document in word processing?
A. Editing B. Formatting C. Writing D. Printing
ugcnetcse-dec2019-paper1
Answer key ☟
The following table gives the percentage of marks obtained by students in different subjects in an
examination. The numbers in the parenthesis give the maximum marks in each subject. Answer the given
questions based on the table:
How many students obtained and above marks in all the subjects?
Answer key ☟
The following table gives the percentage of marks obtained by students in different subjects in an
examination. The numbers in the parenthesis give the maximum marks in each subject. Answer the given
questions based on the table:
What is the average marks obtained by all the six students in Chemistry?
A. B. C. D.
ugcnetcse-dec2019-paper1
Answer key ☟
The following table gives the percentage of marks obtained by students in different subjects in an
examination. The numbers in the parenthesis give the maximum marks in each subject. Answer the given
questions based on the table:
What was the aggregate of marks obtained by Sanya in all the five subjects?
A. B. C. D.
ugcnetcse-dec2019-paper1
Answer key ☟
The following table gives the percentage of marks obtained by students in different subjects in an
examination. The numbers in the parenthesis give the maximum marks in each subject. Answer the given
questions based on the table:
A. B. C. D.
ugcnetcse-dec2019-paper1
Answer key ☟
According to classical Indian school of logic, what is the correct sequence of steps involved in Anum na
(influence)?
ugcnetcse-dec2019-paper1
Which one of the following fallacious hetu (middle term) is not uniformly concomitant with the major term?
A. Asatpratipaksa B. Auyatireki
C. Anyonya-Asiddha D. Suy bhic ra
ugcnetcse-dec2019-paper1
36.0.276 UGC NET CSE | December 2019 | Part 1 | Question: 23
Answer key ☟
A. B. C. D.
ugcnetcse-dec2019-paper1
Answer key ☟
Which one of the following hetwabhasa (fallacy) is involved in the argument, “Sound is element because it is
caused”?
ugcnetcse-dec2019-paper1
Answer key ☟
What is the exact equivalent discount of three successive discounts of , and by sale of an article?
A. B. C. D.
ugcnetcse-dec2019-paper1
A certain principal invested at compound interest payable yearly amounts to Rs. in years and Rs.
in years. What is the rate of interest?
A. B. C. D.
ugcnetcse-dec2019-paper1
The sum of a number and its inverse is . The sum of their cubes is:
A. B. C. D.
ugcnetcse-dec2019-paper1
Answer key ☟
36.0.282 UGC NET CSE | December 2019 | Part 1 | Question: 17
If of of
and of of ,
then what percentage of is ?
A.
B.
C.
D.
ugcnetcse-dec2019-paper1
In a certain coding language, is written as . Using the same coding language, will
be written as
A. B. C. D.
ugcnetcse-dec2019-paper1
Answer key ☟
Given below are two Statements – One is labelled as Assertion and other is labelled as Reason :
Assertion : Use of slang in formal teaching makes communication lively and interesting.
Reasons : Academic decency demands the avoidance of slang in the classroom environment.
In the light of the above statements, choose the correct option:
ugcnetcse-dec2019-paper1
Which of the following modes of communication can be employed in a classroom for effective teaching?
a. Top-down b. Iconic
c. Associational d. Dissociational
e. Symbolic f. Abstract
Choose the most appropriate option from the following:
A. (a), (b) and (f) B. (c) , (e) and (f)
C. (b) , (c) and (e) D. (a), (c) and (d)
ugcnetcse-dec2019-paper1
Answer key ☟
36.0.286 UGC NET CSE | December 2019 | Part 1 | Question: 13
Answer key ☟
Answer key ☟
When there is an animated discussion between a teacher and his or her students in the classroom, it can be
classified as
A. Horizontal communication B. Mechanical communication
C. Linear communication D. Categorical communication
ugcnetcse-dec2019-paper1
Answer key ☟
A research scholar while submitting his/her thesis, did not acknowledge in the preface the help and support of
the respondents of questionnaires. This will be called an instance of
A. Technical lapse B. Wilful negligence
C. Unethical act D. Lack of respect
ugcnetcse-dec2019-paper1
Answer key ☟
In which of the following formats ‘Chapter Scheme’ of the document has to be formally approved by a research
degree committee in the university?
A. Thesis/dissertation B. Seminar papers
C. Research articles D. Research monographs
ugcnetcse-dec2019-paper1
Answer key ☟
Which of the following sampling procedures will be appropriate for conducting researches with empirico-
inductive research paradigm?
A. Simple random sampling procedure B. Systematic sampling procedure
C. Stratified sampling procedure D. Any of the non-probability sampling procedures
ugcnetcse-dec2019-paper1
Answer key ☟
A researcher intends to make use of in his/her research. What considerations should weigh most in such a
decision?
i. Appropriateness of the tool used
ii. Cost involved in procuring it
iii. Availability of tools in the department where research is to be undertaken
iv. Willingness of his/her supervisor to offer help
v. The company from which the equipment has been procured
Answer key ☟
A university teacher plans to improve the study habits of students in his/her class. Which type of research
paradigm will be helpful in this regard?
A. Evaluative research paradigm B. Fundamental research paradigm
C. Applied research paradigm D. Action research paradigm
ugcnetcse-dec2019-paper1
Answer key ☟
Which of the following types of assessment is conducted periodically with an eye on standards?
A. Formative assessment B. Summative assessment
C. Portfolio assessment D. Performance assessment
ugcnetcse-dec2019-paper1
Answer key ☟
In which of the following types of learning materials, the presentations are highly structured and individualised?
ugcnetcse-dec2019-paper1
Answer key ☟
Which of the following are classroom related factors that influence effectiveness of teaching?
Answer key ☟
36.0.297 UGC NET CSE | December 2019 | Part 1 | Question: 2
Answer key ☟
Which of the learning outcomes are intended in teaching organized at understanding level?
ugcnetcse-dec2019-paper1
An organization needs to maintain database having five attributes . These attributes are
functionally dependent on each other for which functionality dependency set is given as:
. Consider a universal relation with functional
dependency set . Also all attributes are simple and take atomic values only.
Assume that given table is decomposed in two tables
with functional dependency set and
with set
Which of the following option is true w.r.t. given decomposition?
A. Dependency preservation property is followed B. and are both in
C. is in and is in D. is in and is in
ugcnetcse-dec2019-paper2
Answer key ☟
An organization needs to maintain database having five attributes . These attributes are
functionally dependent on each other for which functionality dependency set is given as:
. Consider a universal relation with functional
dependency set . Also all attributes are simple and take atomic values only.
Identify the redundant functional dependency in
A. B.
C. D.
ugcnetcse-dec2019-paper2
Answer key ☟
36.0.301 UGC NET CSE | December 2019 | Part 2 | Question: 98
An organization needs to maintain database having five attributes . These attributes are
functionally dependent on each other for which functionality dependency set is given as:
. Consider a universal relation with functional
dependency set . Also all attributes are simple and take atomic values only.
Identify the normal form in which relation belong to
A. B. C. D.
ugcnetcse-dec2019-paper2
Answer key ☟
An organization needs to maintain database having five attributes . These attributes are
functionally dependent on each other for which functionality dependency set is given as:
. Consider a universal relation with functional
dependency set . Also all attributes are simple and take atomic values only.
Identify primary key of table with functional dependency set
A. B. C. D.
ugcnetcse-dec2019-paper2
Answer key ☟
An organization needs to maintain database having five attributes . These attributes are
functionally dependent on each other for which functionality dependency set is given as:
. Consider a universal relation with functional
dependency set . Also all attributes are simple and take atomic values only.
MInimal cover of functional dependency set is
A.
B.
C.
D.
ugcnetcse-dec2019-paper2
Answer key ☟
A flow graph with entry node and exit node is shown below:
How many predicate nodes are there and what are their names?
A. Three: B. Three:
C. Four: D. Four:
ugcnetcse-dec2019-paper2
Answer key ☟
A flow graph with entry node and exit node is shown below:
A. B. C. D.
ugcnetcse-dec2019-paper2
A flow graph with entry node and exit node is shown below:
A. B. C. D.
ugcnetcse-dec2019-paper2
Answer key ☟
A flow graph with entry node and exit node is shown below:
A. B. C. D.
ugcnetcse-dec2019-paper2
Answer key ☟
36.0.308 UGC NET CSE | December 2019 | Part 2 | Question: 91
A flow graph with entry node and exit node is shown below:
A. B. C. D.
ugcnetcse-dec2019-paper2
Answer key ☟
The Data Encryption Standard has a function consists of four steps. Which of the following is correct
order of these four steps?
ugcnetcse-dec2019-paper2
Answer key ☟
The sequence diagram given in Figure for the Weather Information System takes place when an external system
requests the summarized data from the weather station. The increasing order of lifeline for the objects in the system are:
A. Sat comms Weather station Commslink Weather data
B. Sat comms Comms link Weather station Weather data
C. Weather data Comms link Weather station Sat Comms
D. Weather data Weather station Comms link Sat Comms
ugcnetcse-dec2019-paper2
Answer key ☟
Match with :
Answer key ☟
Match and :
Answer key ☟
An instruction is stored at location with its address field at location . The address field has the value .
A processor register contains the number . Match the addressing mode given below with
effective address for the given instruction:
Choose the correct option from those given below:
A. B.
C. D.
ugcnetcse-dec2019-paper2
Answer key ☟
Match with :
Answer key ☟
Match the Agile Process models with the task performed during the model:
A.
B.
C.
D.
ugcnetcse-dec2019-paper2
Answer key ☟
According to the Standard Quality Model, match the attributes given in with their definitions
in :
Choose the correct options from the ones given below:
A.
B.
C.
D.
ugcnetcse-dec2019-paper2
Answer key ☟
Match and :
A.
B.
C.
D.
ugcnetcse-dec2019-paper2
Answer key ☟
Answer key ☟
i. Message confidentiality means that the sender and the receiver expect privacy
ii. Message integrity means that the data must arrive at the receiver exactly as they were sent.
iii. Message authentication means the receiver is ensured that the message is coming from the intended sender
Answer key ☟
Answer key ☟
Answer key ☟
A. Only (ii) and (i) B. Only (ii) C. Only (ii) and (iii) D. Only (ii) and (iv)
ugcnetcse-dec2019-paper2
Answer key ☟
Answer key ☟
Answer key ☟
Two concurrent executing transactions and are allowed to update same stock item say in an
uncontrolled manner. In such scenario, following problems may occur:
a. Dirty read problem b. Lost update problem
c. Transaction failure d. Inconsistent database state
Which of the following option is correct if database system has no concurrency module and allows concurrent execution
of above two transactions?
A. (a), (b) and (c) only B. (c) and (d) only
C. (a) and (b) only D. (a), (b) and (d) only
ugcnetcse-dec2019-paper2
Answer key ☟
i. int *P=&44;
A. (i) and (ii) B. (ii) and (iii) C. (ii) and (iv) D. (i) and (iv)
ugcnetcse-dec2019-paper2
Answer key ☟
i. Overloading gives the capability to an existing operator to operate on other data types
ii. Inheritance in object oriented programming provides support to reusability
iii. When object of a derived class is defined, first the constructor of derived class is excecuted then constructor of a
base class is executed
iv. Overloading is a type of polymorphism
Answer key ☟
Consider the following statements with respect to approaches to fill area on raster systems:
: To determine the overlap intervals for scan lines that cross the area
: To start from a given interior position and pain outward from this point until we encounter the specified boundary
conditions.
Select the correct answer from the options given below:
Answer key ☟
Which of the following binary codes for decimal digits are self complementing?
i. code
ii. code
iii. excess- code
iv. excess- gray code
Answer key ☟
A. (i) and (ii) B. (ii) and (iii) C. (i) and (iv) D. (iii) and (iv)
ugcnetcse-dec2019-paper2
Answer key ☟
i. The final simplex table giving optimal solution of the primal also contains optimal solution of its dual in itself
ii. If either the primal or the dual problem has a finite optimal solution, then the other problem also has a finite optimal
solution
iii. If either problem has an unbounded optimum solution, then the other problem has no feasible solution at all
Answer key ☟
Answer key ☟
Let the population of chromosomes in genetic algorithm is represented in terms of binary number. The strength
of fitness of a chromosome in decimal form, , is given by
where
Answer key ☟
A. B. C. D.
ugcnetcse-dec2019-paper2
Answer key ☟
Let represents weight between node at layer and node at layer of a given multilayer perceptron.
The weight updation using gradient descent method is given by
A.
B.
C.
D.
Where and represents learning rate and Error in the output respectively.
ugcnetcse-dec2019-paper2
A fuzzy conjuction operators, , and a fuzzy disjunction operator, , form a pair if they satisfy:
.
If then is given by
A. B. C. D.
ugcnetcse-dec2019-paper2
Answer key ☟
36.0.339 UGC NET CSE | December 2019 | Part 2 | Question: 60
Here and represent MIN and MAX nodes respectively, The value of the root node of the game tree is:
A. B. C. D.
ugcnetcse-dec2019-paper2
Answer key ☟
ugcnetcse-dec2019-paper2
Answer key ☟
Answer key ☟
A network with bandwidth of can pass only an average of frames per minute with each frame
carrying an average of bits. What is the throughput of this network?
A. B.
C. D.
ugcnetcse-dec2019-paper2
Answer key ☟
Piconet is a basic unit of a bluetooth system consisting of __________ master node and up to _________ active
slave nodes.
Answer key ☟
Consider a subnet with routers. If a three-level hierarchy is chosen, with eight clusters, each containing
regions of routers, then total number of entries in hierarchical table of each router is
A. B. C. D.
ugcnetcse-dec2019-paper2
Answer key ☟
Answer key ☟
Answer key ☟
Answer key ☟
A.
B.
C.
D.
ugcnetcse-dec2019-paper2
Answer key ☟
Let be any context-free grammar without any -productions or unit productions. Let be the
maximum number of symbols on the right of any production in . The maximum number of production rules
for any equivalent grammar in Chomsky normal form is given by:
A. B.
C. D.
Where denotes the cardinality of the set.
ugcnetcse-dec2019-paper2
Answer key ☟
Answer key ☟
Answer key ☟
Answer key ☟
A.
B.
C.
D.
ugcnetcse-dec2019-paper2
Answer key ☟
Answer key ☟
The time complexity to multiply two polynomials of degree using Fast Fourier transform method is:
A. B. C. D.
ugcnetcse-dec2019-paper2
Answer key ☟
36.0.357 UGC NET CSE | December 2019 | Part 2 | Question: 41
When using Dijkstra’s algorithm to find shortest path in a graph, which of the following statement is not true?
A. It can find shortest path within the same graph data structure
B. Every time a new node is visited, we choose the node with smallest known distance/ cost (weight) to visit first
C. Shortest path always passes through least number of vertices
D. The graph needs to have a non-negative weight on every edge
ugcnetcse-dec2019-paper2
Answer key ☟
Consider a weighted directed graph. The current shortest distance from source to node is represented by
. Let , , . What is the updated value of based on current information?
A. B. C. D.
ugcnetcse-dec2019-paper2
Answer key ☟
Give asymptotic upper and lower bound for given below. Assume is constant for .
A.
B.
C.
D.
ugcnetcse-dec2019-paper2
Answer key ☟
In a B-Tree, each node represents a disk block. Suppose one block holds bytes. Each key uses bytes. In a
B-tree of order there are keys. Since each branch is on another disk block, we assume a branch is of
bytes. The total memory requirement for a non-leaf node is
A. B.
C. D.
ugcnetcse-dec2019-paper2
Answer key ☟
What is the worst case running time of Insert and Extract-min, in an implementation of a priority queue using an
unsorted array? Assume that all the insertions can be accomodated.
A. B.
C. D.
ugcnetcse-dec2019-paper2
Answer key ☟
ugcnetcse-dec2019-paper2
Answer key ☟
A. B. C. D.
ugcnetcse-dec2019-paper2
Answer key ☟
An _______ chart is a project schedule representation that presents project plan as a directed graph. The critical
path is the __________ sequence of ________ tasks and it defines project ________.
A. Activity, Shortest, Independent, Cost B. Activity, Longest, Dependent, Duration
C. Activity, Longest, Independent, Duration D. Activity, Shortest, Dependent, Duration
ugcnetcse-dec2019-paper2
Answer key ☟
In a system for a restaurant, the main scenario for placing order is given below:
A sequence diagram for the scenario will have at least how many objects among whom the messages will be exchanged
A. B. C. D.
ugcnetcse-dec2019-paper2
Answer key ☟
Java Virtual Machine is used to execute architectural neutral byte code. Which of the following is
needed by the for execution of Java Code?
A. Class loader only B. Class loader and Java Interpreter
C. Class loader, Java Interpreter and D. Java Interpreter only
ugcnetcse-dec2019-paper2
Answer key ☟
36.0.367 UGC NET CSE | December 2019 | Part 2 | Question: 31
Which of the following methods are used to pass any number of parameters to the operating system through
system calls?
A. Registers B. Block or table in main memory
C. Stack D. Block in main memory and stack
ugcnetcse-dec2019-paper2
Answer key ☟
Find average turnaround time and average waiting time using round robin scheduling?
A. B. C. D.
ugcnetcse-dec2019-paper2
Answer key ☟
Which of the following interprocess communication model is used to exchange messages among co-operative
processes?
A. Shared memory model B. Message passing model
C. Shared memory and message passing model D. Queues
ugcnetcse-dec2019-paper2
Answer key ☟
Suppose a system has magnetic tape drives and at time , three processes are allotted tape drives out of their
need as given below:
At time , the system is in safe state. Which of the following is safe sequence so that deadlock is avoided?
A.
B.
C.
D.
ugcnetcse-dec2019-paper2
Answer key ☟
36.0.371 UGC NET CSE | December 2019 | Part 2 | Question: 27
Consider a paging system where translation look aside buffer ( ) a special type of associative memory is used
with hit ratio of .
Assume that memory reference takes nanoseconds and reference time to is nanoseconds. What will be the
effective memory access time given hit ratio?
A. nanoseconds B. nanoseconds
C. nanoseconds D. nanoseconds
ugcnetcse-dec2019-paper2
Answer key ☟
Answer key ☟
Answer key ☟
A counting semaphore is initialized to . wait ( ) operations and signal ( ) operations are applied. Find the
current value of semaphore variable.
A. B. C. D.
ugcnetcse-dec2019-paper2
Answer key ☟
Given two tables and with and number of tuples respectively. Find maximum number of
tuples in the output of natural join between tables and i.e. ? ( - Natural Join)
A. B. C. D.
ugcnetcse-dec2019-paper2
Answer key ☟
Which of the component module of does rearrangement and possible ordering of operations, eliminate
redundancy in query and use efficient algorithms and indexes during the execution of a query?
A. query compiler B. query optimizer
C. Stored data manager D. Database processor
ugcnetcse-dec2019-paper2
Answer key ☟
36.0.377 UGC NET CSE | December 2019 | Part 2 | Question: 19
If we want to resize a pixels image to one that is pixels wide with the same aspect ratio, what
would be the height of the resized image?
Answer key ☟
A rectangle is bound by the lines and . The line segment joining and , if
clipped against this window will connect the points __________.
Answer key ☟
Which tag is used to enclose any number of javascript statements in HTML document?
A. <code> B. <script>
C. <title> D. <body>
ugcnetcse-dec2019-paper2
Answer key ☟
Let be the base class in and be the derived class from with protected inheritance. Which of the
following statement is false for class ?
ugcnetcse-dec2019-paper2
Answer key ☟
A. B. C. D.
ugcnetcse-dec2019-paper2
Answer key ☟
The following program is stored in the memory unit of the basic computer. Give the content of accumulator
register in hexadecimal after the execution of the program.
A. B. C. D.
ugcnetcse-dec2019-paper2
A. B. C. D.
ugcnetcse-dec2019-paper2
Answer key ☟
A micro instruction format has microoperation field which is divided into sunbfields and , each having
distinct microoperations, condition field for four status bits, branch field having four options used in
conjunction with address field . The address space is of memory words. The size of micro instruction is:
A. B. C. D.
ugcnetcse-dec2019-paper2
Answer key ☟
A computer uses a memory unit of words of bits each. A binary instruction code is stored in one word
of the memory. The instruction has four parts: an addressing mode field to specify one of the two-addressing
mode (direct and indirect), an operation code, a register code part to specify one of the registers and an address part.
How many bits are there in addressing mode part, opcode part, register code part and the address part?
A. B. C. D.
ugcnetcse-dec2019-paper2
Answer key ☟
36.0.387 UGC NET CSE | December 2019 | Part 2 | Question: 8
A. B. C. D.
ugcnetcse-dec2019-paper2
Answer key ☟
A tree has vertices of degree , vertices of degree , vertices of degree . Determine the number of
vertices and edges in tree.
A. B. C. D.
ugcnetcse-dec2019-paper2
Answer key ☟
Let be the set of all people. Let be a binary relation on such that is in if is a brother of . Is
symmetric transitive, an equivalence relation, a partial order relation?
A. B.
C. D.
ugcnetcse-dec2019-paper2
Answer key ☟
What are the greatest lower bound and the least upper bound of the sets and
if they exist in poset ?
A.
B.
C.
D.
ugcnetcse-dec2019-paper2
Answer key ☟
A. B.
C. D.
ugcnetcse-dec2019-paper2
Answer key ☟
36.0.392 UGC NET CSE | December 2019 | Part 2 | Question: 1
Answer key ☟
IP datagram has arrived with following partial information in the header (in hexadecimal)
.
What is the header size?
ugcnetcse-june2023-paper2
IP datagram has arrived with following partial information in the header (in hexadecimal)
.
How many more routers can the packet travel to?
A. B. C. D.
ugcnetcse-june2023-paper2
IP datagram has arrived with following partial information in the header (in hexadecimal)
.
What is the protocol of the payload being carried by the packet?
A. B. C. protocol D.
ugcnetcse-june2023-paper2
IP datagram has arrived with following partial information in the header (in hexadecimal)
A. B. C. D.
ugcnetcse-june2023-paper2
IP datagram has arrived with following partial information in the header (in hexadecimal)
.
What is the size of datagram?
Consider the following program fragment that deals with a table with rows and columns, computing
an average for each column and printing it to screen ( is row index and is column index):
for
temp
for
temp temp
print ( temp 17.0) ;}
[i] [i] and temp are bit floating point values and memory is word addressable. The temporary variable temp is kept
in a processor register so access to temp does not involve a memory reference. The main memory is page and holds
pages of size words, the page replacement policy is "least recently used ", If is stored in the virtual address space
in row major format.
What is the main memory hit ratio?
A. B. C. D.
ugcnetcse-june2023-paper2
Consider the following program fragment that deals with a table with rows and columns, computing
an average for each column and printing it to screen ( is row index and is column index):
for j = 0 . .1023]{
temp ;
for ;
temp temp
print temp
[i] [i] and temp are bit floating point values and memory is word addressable. The temporary variable temp is kept
in a processor register so access to temp does not involve a memory reference. The main memory is page and holds
pages of size words, the page replacement policy is "least recently used ", If is stored in the virtual address space
in row major format.
Consider that is stored in column major format, how many page faults will be encountered?
A. B. C. D.
ugcnetcse-june2023-paper2
Consider the following program fragment that deals with a table with rows and columns, computing
an average for each column and printing it to screen ( is row index and is column index):
for
temp
for
temp temp
print ( temp/ 17.0); }
[i] [j] and temp are bit floating point values and memory is word addressable. The temporary variable temp is kept
in a processor register so access to temp does not involve a memory reference. The main memory is page and holds
pages of size words, the page replacement policy is "least recently used ", If is stored in the virtual address space
in row major format.
How many page faults will be encountered?
A. B. C. D.
ugcnetcse-june2023-paper2
Consider the following program fragment that deals with a table with rows and columns, computing
an average for each column and printing it to screen ( is row index and is column index):
for
temp
for ;
temp temp
print temp/ 17.0) ; }
[i] [j] and temp are bit floating point values and memory is word addressable. The temporary variable temp is kept
in a processor register so access to temp does not involve a memory reference. The main memory is page and holds
pages of size 1024 words, the page replacement policy is "least recently used ", If T is stored in the virtual address space
in row major format.
Consider again that is stored in column-major format, what is the main memory hit ratio?
A. B. C. D.
ugcnetcse-june2023-paper2
Consider the following program fragment that deals with a table with 17 rows and 1024 columns, computing
an average for each column and printing it to screen ( is row index and is column index):
for
temp
for
temp temp
print temp/ 17.0);
[i] [j] and temp are 32 bit floating point values and memory is word addressable. The temporary variable temp is kept
in a processor register so access to temp does not involve a memory reference. The main memory is page and holds 16
pages of size 1024 words, the page replacement policy is "least recently used ", If is stored in the virtual address
space in row major format.
What is fault ratio of row major to column major arrangements ?
A. B. C. D.
ugcnetcse-june2023-paper2
The compiler for high level language that runs on one machine and produces code for other machine is called-
A. Cross compiler B. Multipass compiler
C. Optimizing Compiler D. One pass Compiler
ugcnetcse-june2023-paper2
Answer key ☟
36.0.404 UGC NET CSE | June 2023 | Part 2: 89
A. B. C. D.
ugcnetcse-june2023-paper2
ugcnetcse-june2023-paper2
Let be a finite automata which is obtained by reversal of . Then which of the following is correct?
A.
B.
C.
D.
ugcnetcse-june2023-paper2
Find the sum of all four digit numbers formed using the digits and .
A. B. C. D.
ugcnetcse-june2023-paper2
A. B.
C. D. Illegal use of pointer in main function
ugcnetcse-june2023-paper2
ugcnetcse-june2023-paper2
A. B. C. D.
ugcnetcse-june2023-paper2
Answer key ☟
Given below are two statements: one is labelled as Assertion and the other is labelled as Reason .
Assertion : The AVL trees are more balanced as compared to Red Black trees, but they may cause more rotations
during insertion and deletion
Reason : A Red Black tree with n nodes has height that is greater than and the AVL tree with n nodes
has height less than (where is golden ratio)
In the light of the above statements, choose the correct answer from the options given below.
ugcnetcse-june2023-paper2
Given below are two statements: one is labelled as Assertion and the other is labelled as Reason .
Assertion : Dendral is an expert system
Reason : The rationality of an agent is not related to its reaction to the environment.
In the light of the above statements, choose the correct answer from the options given below.
ugcnetcse-june2023-paper2
An observational technique that can be used to understand operational process and help to derive requirement
for software to support operational process is known as
A. Requirement specification B. Structural specification
C. Ethnography D. Natural language specification
ugcnetcse-june2023-paper2
ugcnetcse-june2023-paper2
Choose the correct answer from the options given below: Choose the correct answer from the options given below:
A. B.
C. D.
ugcnetcse-june2023-paper2
Answer key ☟
Given below are two statements: one is labelled as Assertion and the other is labelled as Reason .
Assertion : I/O protection is ensured by a hardware trap
Reason : I/O interrupt caused by the condition like I/O completion and device malfunction occuring within the I/O
devices
In the light of the above statements, choose the correct answer from the options given below.
ugcnetcse-june2023-paper2
Choose the correct answer from the options given below: Choose the correct answer from the options given below:
ugcnetcse-june2023-paper2
What will be the output of the following code? What will be the output of the following code?
# include <stdio.h>
int main ( ) {
int a, b, c;
a=ox10; b=010;
c=a+b;
printf ( %d", c);
return 0 ;
}
A. B. C. Garbage D. error
ugcnetcse-june2023-paper2
Answer key ☟
i. The set of turning machine codes for that accept all inputs that are palindromes (possible along with some
other inputs) is decidable
ii. The language of codes for that when started with blank tape, eventually write a somewhere on the tape is
undecidable
iii. The language accepted by a is is always recursive
iv. Post's correspondence problem is undecidable
ugcnetcse-june2023-paper2
ugcnetcse-june2023-paper2
Answer key ☟
36.0.421 UGC NET CSE | June 2023 | Part 2: 72
Let denote the set of all natural numbers and be the relation on defined by , if
. Then is
A. Symmetric only B. Reflexive only
C. Transitive only D. An equivalence relation
ugcnetcse-june2023-paper2
Given the basic diagram and relational model, which of the the following is incorrect?
ugcnetcse-june2023-paper2
Answer key ☟
ugcnetcse-june2023-paper2
Let denote the group of all integers under addition. Then the number of all automorphisms of is
A. B. C. D.
ugcnetcse-june2023-paper2
At a particular time of computation, the value of a counting semaphore is . Then operations and ' '
operations were completed on this semaphore. If the final value of semaphore is . will be
A. B. C. D.
ugcnetcse-june2023-paper2
ugcnetcse-june2023-paper2
ugcnetcse-june2023-paper2
Given below are two statements: one is labelled as Assertion and the other is labelled as Reason .
Assertion : Validity checks real need of system users
Reason : Completeness checks system user defined requirements.
In the light of the above statements, choose the correct answer from the options given below.
ugcnetcse-june2023-paper2
36.0.430 UGC NET CSE | June 2023 | Part 2: 63
Choose the correct answer from the options given below: Choose the correct answer from the options given below:
A. B.
C. D.
ugcnetcse-june2023-paper2
A. is a natural number
B. is a natural number
C. is a natural number
D. is a natural number
ugcnetcse-june2023-paper2
Answer key ☟
The following table shows the time between failures for a software :
Error number
time since last failure (Hours)
The reliability of the system for one hour operation assuming an exponential model is-
A. B. C. D.
ugcnetcse-june2023-paper2
A -tree used as an index for a large database table has four levels including the root node. If a new key is
inserted in this index, then maximum number of nodes that could be newly created in the process is
A. B. C. D.
ugcnetcse-june2023-paper2
ugcnetcse-june2023-paper2
Answer key ☟
Suppose a circular queue of capacity ( elements is implemented with an array of elements. Assume that
the insertion and deletion operations are carried out using REAR and FRONT as array index variable
respectively. Initially,
ugcnetcse-june2023-paper2
Answer key ☟
Given below are two statements: one is labelled as Assertion and the other is labelled as Reason .A virtual
memory system uses first-in first-out page replacement policy and allocates a fixed number of frames to a
process
Assertion : Increasing number of page frames allocated to a process sometimes increases the page fault rate.
Reason : Some programs do not exhibit locality of reference.
In the light of the above statements, choose the correct answer from the options given below.
ugcnetcse-june2023-paper2
36.0.439 UGC NET CSE | June 2023 | Part 2: 54
Consider the following statements about the software product line system:
Statement : At the interaction level, components provide an operator display interface and an interface with the
communication system used.
Statement : At the I/O management level, components handle operator authentication, report generator and query
manager.
In the light of the above statements, choose the most appropriate answer from the options given below.
ugcnetcse-june2023-paper2
ugcnetcse-june2023-paper2
Given below are two statements: one is labelled as Assertion and the other is labelled as Reason .
Assertion : A process involves a library function to create a thread.
Reason : The threads make system calls to convey their resource and I/O requirement to the Kernel.
In the light of the above statements, choose the correct answer from the options given below.
ugcnetcse-june2023-paper2
Answer key ☟
ugcnetcse-june2023-paper2
is
A. Context free but not linear B. Not context free
C. Context free and linear D. Linear
ugcnetcse-june2023-paper2
i. A database design is in BCNF if each member of the set of relation schemas that constitutes the design is in BCNF
ii. A BCNF schema can have transitive dependency
iii. It is always possible to obatin a design without sacrificing a lossless join
ugcnetcse-june2023-paper2
ugcnetcse-june2023-paper2
36.0.447 UGC NET CSE | June 2023 | Part 2: 46
Consider a popular sports news site. At a given moment, concurrent users submit a request (a transaction,
T) once every minutes on average. Each transaction requires the webapp to download a new article that on
average has bytes in length. What is the throughput?
A. B. C. D.
ugcnetcse-june2023-paper2
Answer key ☟
Let and be asymptotically positive functions. The following conjectures are given
Statement : land
Statement : where for all sufficient large .
In the light of the above statements, choose the most appropriate answer from the options given below.
ugcnetcse-june2023-paper2
ugcnetcse-june2023-paper2
ugcnetcse-june2023-paper2
The total cost of retrieving records in sorted order using an unclustered tree is (P-Average number of
records per data page
N- Data pages
F- Ratio of the size of a data entry to the size of a data record)
A. B.
C. D.
ugcnetcse-june2023-paper2
ugcnetcse-june2023-paper2
Answer key ☟
36.0.456 UGC NET CSE | June 2023 | Part 2: 36
Which of the following is not a property of a good system for representation of knowledge in a particular
domain?
A. Presentation adequacy B. infrential adequacy
C. Infential efficiency D. acquisitional efficiency
ugcnetcse-june2023-paper2
Given below are two statements: one is labelled as Assertion and the other is labelled as Reason .
Assertion A: It is possible to create doubly linked list using only one pointer with every node.
Reason R: By storing the of the addresses of the previous and next nodes.
In the light of the above statements, choose the most appropriate answer from the options given below.
ugcnetcse-june2023-paper2
A. B.
C. D.
ugcnetcse-june2023-paper2
Consider the rectangle with vertices . There is scaling of 2 towards -axis and towards
-axis. The new cordinates of the rectangle are
A. B.
C. D.
ugcnetcse-june2023-paper2
Let and be groups under the multiplication. Then, the map defined by
is
How will you free the memory allocated by the following program?
A. memfree ; B. dealloc ;
C. malloc ; D. free :
ugcnetcse-june2023-paper2
ugcnetcse-june2023-paper2
Answer key ☟
A three dimensional array in is declared as int [c]. Consider that array elements are stored in row
major order and indexing begin from . Here the address of an item at the location computed in terms of
word length of an integer is
ugcnetcse-june2023-paper2
Answer key ☟
ugcnetcse-june2023-paper2
ugcnetcse-june2023-paper2
A. B. C. D.
ugcnetcse-june2023-paper2
Let denote XOR operation. Let and denote the binary constants and is the Boolean expression over two
variables and
Which of the following is equivalent expression to ?
A. B. C. D.
ugcnetcse-june2023-paper2
Answer key ☟
A TCP server application is programmed to listen on port on host . A TCP client is connected to the TCP
server over the network, Consider that while TCP connection is active the server is crashed and rebooted.
Assume that the client does not use TCP keepalive timer. Which of the following behaviour is/are possible?
Statement I: The TCP application server on can listen on after reboot.
Statement II: If client sends a packet after the server reboot, it will receive the RST segment.
In the light of the above statements, choose the correct answer from the options given below.
ugcnetcse-june2023-paper2
Consider two hosts and that are connected through a router . The maximum transfer unit value of
the link between and is bytes and between and is bytes. A segment of size bytes is
transferred from to through with IP identification value of . Assume that IP header size is bytes.
Further the pcaket is allowed to be fragmented that is Don't fragment (DF) flag in the IP Header is not set by . Which
of the following statement/s is/are true?
A. Two fragments are created at and IP datagram size carrying the second fragment is bytes
B. If the second fragment is lost, then resends the fragment with IP identification value of
C. If the second fragment lost, then requires to resend the entire segment.
D. destination port can be determined by analyzing the second fragment only.
ugcnetcse-june2023-paper2
In the standard Ethernet with transmission rate of , asssume that the length of the medium is and
size of a frame is bytes. The propagation speed of a signal in a cable is normally . The transmission
delay and propogation delay are
A. and B. and
C. and D. and
ugcnetcse-june2023-paper2
Consider a disk system with cylinders. The request to access the cylinders occurs in the following sequence:
Assuming that the head is currently at cylinder , what is the time taken to satisfy all requests if it takes to move
from one cylinder to adjacent one and shortest seek time first policy is used?
A. B.
C. D.
ugcnetcse-june2023-paper2
Answer key ☟
A. B. C. D.
ugcnetcse-june2023-paper2
Answer key ☟
Which is not a basic approach to the problem of conflict resolution in a production system?
________ is intended to show that a system both conforms to its specifications and meets the expectations of the
system customer.
A. Software specification B. Software design
C. Software evaluation D. Software validation
ugcnetcse-june2023-paper2
Answer key ☟
A processor chip is used for application in which of execution time is spent on floating point addition. For
the new model of the processor, the design team has come up with redesign the floating point adder to make it
twice as fast. What will be possible maximum speed up by this redesign?
A. B. C. D.
ugcnetcse-june2023-paper2
In a multiuser operating system, requests are made to use a particular resource per hour, on an average. The
probability that no request is made in minutes is
A. B. C. D.
ugcnetcse-june2023-paper2
Answer key ☟
ugcnetcse-june2023-paper2
Answer key ☟
A. and
B. and
C. and
D. and
ugcnetcse-june2023-paper2
36.0.482 UGC NET CSE | June 2023 | Part 2: 5
Which of the following scenario may lead to an irrecoverable error in a database system?
ugcnetcse-june2023-paper2
Answer key ☟
ugcnetcse-june2023-paper2
Answer key ☟
There are points on one straight line and points on another straight line none of them being .
How many triangles can be formed with these points as vertices?
A. B. C. D.
ugcnetcse-june2023-paper2
ugcnetcse-june2023-paper2
Answer key ☟
ugcnetcse-june2008-paper2
ugcnetcse-june2008-paper2
In a mobile communication system, a geographic region is divided into cells. For each frequency set, there is a
buffer _________ wide where that frequency is not used.
ugcnetcse-june2008-paper2
With reference to cluster analysis in data mining, a distance measure that is NOT used is :
A. Euclidean distance. B. Manhattan distance.
C. Chebychev's distance. D. Lee distance.
ugcnetcse-june2008-paper2
36.0.491 UGC NET CSE | June 2008 | Part 2 | Question: 45
ugcnetcse-june2008-paper2
ugcnetcse-june2008-paper2
ugcnetcse-june2008-paper2
In software development, value adjustment factors include the following among others :
ugcnetcse-june2008-paper2
Answer key ☟
ugcnetcse-june2008-paper2
36.0.496 UGC NET CSE | June 2008 | Part 2 | Question: 39
With bit virtual addresses, a page and of RAM, an inverted page table requires :
A. entries. B. entries.
C. entries. D. entries.
ugcnetcse-june2008-paper2
ugcnetcse-june2008-paper2
There are ' ' processes in memory. A process spends a fraction ' ' of its time waiting for to complete.
The CPU utilization is given by :
A. B. C. D.
ugcnetcse-june2008-paper2
Answer key ☟
ugcnetcse-june2008-paper2
ugcnetcse-june2008-paper2
ugcnetcse-june2008-paper2
36.0.502 UGC NET CSE | June 2008 | Part 2 | Question: 32
ugcnetcse-june2008-paper2
Assembler program is :
A. dependent on the operating system B. dependent on the compiler
C. dependent on the hardware D. independent of the hardware
ugcnetcse-june2008-paper2
Answer key ☟
With reference to hierarchical routing, the optimum number of levels for an router subnet is:
A. B. C. D.
ugcnetcse-june2008-paper2
Answer key ☟
ugcnetcse-june2008-paper2
Answer key ☟
For a channel of bandwidth and signal to noise ratio of , the maximum data rate is:
A. B.
C. D.
ugcnetcse-june2008-paper2
Answer key ☟
A. B. C. D.
ugcnetcse-june2008-paper2
A. B. C. D.
ugcnetcse-june2008-paper2
ugcnetcse-june2008-paper2
Files that are related to input/output and are used to model serial devices such as terminals, printers and
networks are called:
ugcnetcse-june2008-paper2
Answer key ☟
Which of the following can be the sequence of nodes examined in a binary search tree while searching for key
?
A. B.
C. D.
ugcnetcse-june2008-paper2
Which of the following data structures is most efficient in terms of both space and time to reverse a string of
characters?
ugcnetcse-june2008-paper2
Answer key ☟
Consider the query: SELECT student_name FROM student_data WHERE rollno (SELECT rollno FROM
student_marks WHERE SEM1_MARK=SEM2_MARK); Which of the following is true?
A. It gives the name of the student whose marks in semester and semester are same.
B. It gives all the names and roll nos of those students whose marks in semester and semester are same.
C. It gives the names of all the students whose marks in semester and semester are same.
D. It gives roll numbers of all students whose marks in semester and semester are same.
ugcnetcse-june2008-paper2
Answer key ☟
A. A relation in is always in
B. A relation in is always in
C. and are totally different
D. A relation in is in but not in
ugcnetcse-june2008-paper2
Answer key ☟
If a relation is in then :
ugcnetcse-june2008-paper2
Answer key ☟
A. B.
C. D.
ugcnetcse-june2008-paper2
Answer key ☟
ugcnetcse-june2008-paper2
ugcnetcse-june2008-paper2
Answer key ☟
ugcnetcse-june2008-paper2
Answer key ☟
A. B. C. D.
ugcnetcse-june2008-paper2
Answer key ☟
ugcnetcse-june2008-paper2
Answer key ☟
A. B. C. D.
ugcnetcse-june2008-paper2
Answer key ☟
A.
B.
C.
D.
ugcnetcse-june2008-paper2
A. B. C. D.
ugcnetcse-june2008-paper2
Answer key ☟
A. B. C. D.
ugcnetcse-june2008-paper2
Answer key ☟
An example of a tautology is :
A. B.
C. D.
ugcnetcse-june2008-paper2
Answer key ☟
36.0.528 UGC NET CSE | June 2008 | Part 2 | Question: 5
In a set of positive integers, there always exists a pair of numbers having the same remainder when divided by
:
A. B. C. D.
ugcnetcse-june2008-paper2
36.1.1 Abelian Group: UGC NET CSE | June 2008 | Part 2 | Question: 4
ugcnetcse-june2008-paper2 abelian-group
Answer key ☟
36.2.1 Acid Properties: UGC NET CSE | December 2009 | Part 2 | Question: 45
The name of the transaction file shall be provided by the operator and the file that contains the edited
transactions ready for execution shall be called
(D) Edit.Exe
ugcnetcse-dec2009-paper2 databases acid-properties
Which of the following is true for a sorted list with ' ' elements?
Answer key ☟
36.4.1 Artificial Intelligence: UGC NET CSE | August 2016 | Part 3 | Question: 71
Match each Artificial Intelligence term in List-I that best describes a given situation in List-II :
A. B.
C. D.
ugcnetcse-aug2016-paper3 artificial-intelligence
Answer key ☟
Answer key ☟
Answer key ☟
36.7.1 Binary Tree: UGC NET CSE | June 2011 | Part 2 | Question: 22
Given a binary tree whose inorder and preorder traversal are given by
Inorder : EICFBGDJHK
Preorder : BCEIFDGHJK
The post order traversal of the above binary tree is
A. I E F C G J K H D B B. I E F C J G K H D B
C. I E F C G K J H D B D. I E F C G J K D B H
ugcnetcse-june2011-paper2 algorithms binary-tree
Answer key ☟
36.8.1 Boolean Algebra: UGC NET CSE | December 2019 | Part 2 | Question: 3
The Boolean expression is unaffected by the value of the Boolean variable _________.
A. B. C. D. and
ugcnetcse-dec2019-paper2 digital-logic boolean-algebra
Answer key ☟
Find the number of ways to paint 12 offices so that 3 of them will be green, 2 of them pink, 2 of them yellow
and the rest ones white.
Answer key ☟
36.10.1 Compilation Phases: UGC NET CSE | December 2010 | Part 2 | Question: 33
Answer key ☟
36.11.1 Crypt Arithmetic: UGC NET CSE | September 2013 | Part 3 | Question: 3
Assume that each alphabet can have a value between 0 to 9 in a cryptoarithmetic problem
Answer key ☟
Answer key ☟
36.13.1 Data Flow Diagram: UGC NET CSE | June 2011 | Part 2 | Question: 43
Answer key ☟
36.14.1 Data Mart: UGC NET CSE | December 2010 | Part 2 | Question: 46
Answer key ☟
36.15.1 Data Mining: UGC NET CSE | August 2016 | Part 2 | Question: 48
Answer key ☟
36.15.2 Data Mining: UGC NET CSE | August 2016 | Part 2 | Question: 50
Answer key ☟
36.15.3 Data Mining: UGC NET CSE | December 2010 | Part 2 | Question: 47
Data mining is
A. The process of extracting valid, previously unknown, comprehensible and actionable information from large
databases and using it to make crucial business decisions.
B. A tool that allows end users direct access and manipulation of data from within datawarehousing environment
without the intervention of customised programming activity.
C. A tool that helps end users extract useful business information from large database.
D. All of the above
ugcnetcse-dec2010-paper2 databases data-mining
Answer key ☟
36.15.4 Data Mining: UGC NET CSE | December 2011 | Part 2 | Question: 47
Answer key ☟
36.16.1 Data Warehousing: UGC NET CSE | August 2016 | Part 2 | Question: 47
_______ is subject oriented, integrated, time variant, nonvolatile collection of data in support of management
decisions.
A. Data mining B. Web mining
C. Data warehouse D. Database Management System
ugcnetcse-aug2016-paper2 data-warehousing
Answer key ☟
36.16.2 Data Warehousing: UGC NET CSE | June 2011 | Part 2 | Question: 46
Answer key ☟
36.17.1 Deadlock Prevention Avoidance Detection: UGC NET CSE | June 2008 | Part 2 | Question: 40
A computer has tape drives with ' ' processes competing for them. Each process may need two drives. For
which values of ' ' is the system deadlock free?
A. B. C. D.
ugcnetcse-june2008-paper2 deadlock-prevention-avoidance-detection
A. Redundancy B. Inconsistencies
C. Anomalies D. All of the above
ugcnetcse-june2011-paper2 databases decomposition
Answer key ☟
If the histogram of an image is clustered towards origin on X-axis of a histogram plot then it indicates that the
image is ______.
Answer key ☟
36.19.2 Digital Image Processing: UGC NET CSE | December 2013 | Part 3 | Question: 31
Answer key ☟
36.19.3 Digital Image Processing: UGC NET CSE | June 2012 | Part 3 | Question: 22
Answer key ☟
Answer key ☟
36.21.1 Disk Scheduling: UGC NET CSE | June 2011 | Part 2 | Question: 23
A. B. C. D. None of these
ugcnetcse-june2011-paper2 operating-system disk-scheduling
Answer key ☟
Answer key ☟
Answer key ☟
Which is the most valuable electronic commerce to the individual customer in long run ?
A. Business to Customer B. Business to Business
C. Customer to Customer D. None of the above
ugcnetcse-june2011-paper2 e-technologies e-commerce
Answer key ☟
Answer key ☟
E-Choupal refers to
ugcnetcse-dec2010-paper2 e-technologies
Answer key ☟
Answer key ☟
36.25.3 E Technologies: UGC NET CSE | June 2011 | Part 2 | Question: 48
"M-Commerce" refers to
ugcnetcse-june2011-paper2 e-technologies
Answer key ☟
36.26.1 Encryption Decryption: UGC NET CSE | September 2013 | Part 2 | Question: 3
Which of the following substitution technique have the relationship between a character in the plaintext and a
character in the ciphertext as one-to-many?
A. Monoalphabetic B. Polyalphabetic
C. Transpositional D. None of the above
ugcnetsep2013ii cryptography encryption-decryption
Answer key ☟
36.26.2 Encryption Decryption: UGC NET CSE | September 2013 | Part 3 | Question: 57
If user A wants to send an encrypted message to user B, the plain text of A is encrypted with the
A. Public key of user A B. Public key of user B
C. Private key of user A D. Private key of user B
ugcnetcse-sep2013-paper3 cryptography encryption-decryption
Answer key ☟
36.27.1 Enterprise Resource Planning: UGC NET CSE | December 2011 | Part 2 | Question: 44
ugcnetcse-dec2011-paper2 enterprise-resource-planning
Answer key ☟
36.27.2 Enterprise Resource Planning: UGC NET CSE | December 2011 | Part 2 | Question: 45
ugcnetcse-dec2011-paper2 enterprise-resource-planning
Answer key ☟
36.28 Error Correction (1)
36.28.1 Error Correction: UGC NET CSE | June 2008 | Part 2 | Question: 3
A. B. C. D.
Answer key ☟
36.29.1 File System: UGC NET CSE | June 2011 | Part 2 | Question: 37
Answer key ☟
36.30.1 Fuzzy Logic: UGC NET CSE | August 2016 | Part 3 | Question: 64
What are the following sequence of steps taken in designing a fuzzy logic machine ?
Answer key ☟
36.30.2 Fuzzy Logic: UGC NET CSE | September 2013 | Part 3 | Question: 26
Let A be a set of comfortable houses given as and be the set of affordable houses
Then the set of comfortable and affordable houses is
A.
B.
C.
D.
Answer key ☟
36.31.1 Fuzzy Relations: UGC NET CSE | August 2016 | Part 3 | Question: 66
A.
B.
C.
D.
Answer key ☟
36.32.1 Fuzzy Set: UGC NET CSE | December 2013 | Part 3 | Question: 28
Answer key ☟
36.32.2 Fuzzy Set: UGC NET CSE | December 2013 | Part 3 | Question: 29
Answer key ☟
36.33.1 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 1
To organize discussion method in teaching effectively, which of the following conditions should be met?
i. Topic be easy
ii. Topic be declared in advance
iii. Topic of common interest
iv. Availability of more than one teacher
v. Language facility of participants
Answer key ☟
36.33.2 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 10
Answer key ☟
36.33.3 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 11
Michaelangelo is famous for having successfully interpreted the human body. His great achievement is that of
the painting of David whose hands reach out as a sign of human capability and potential. It is assumed that the
time he lived was ripe for exchange of knowledge, development in science and matured enough to advance the horizon
of investigation in all fields. Renaissance humanism stressed on a serious rethink on the nature of art that focussed
on accurate details. In painting and sculpture, artists focussed on not so casual but verifiable and minute details.
Michaelangelo’s paintings are no exception to it. In a study published in the journal of the Royal Society of medicine, a
group of surgeons are of the opinion that the great master was “afflicted by an illness involving his joints”. They have
used his portraits as evidence to argue their view. During his life, he complained of what he felt to be ‘gout’. Later he
complained of his sore and stiff hands which the doctors would find to be natural for someone who was engaged in
handmade art. The doctors found corroboration of those claims in portraits of the artist that show a hanging left hand
with both degenerative and non-degenerative changes. They attribute the pain not just to arthritis, but to the stress of
hammering and chiselling and note that though the master was seen hammering days before his death at an old age, he
did not write or sign his own letters before his death. In recent times there have been attempts to diagnose famous artists
with diseases that were not known during their time. This practice has raised many questions, especially on the issue of
ethics in research. It is also inferred from authentic analysis that Michaelangelo persisted in his work until his last days.
This theory would emphasize that his artistic subject defined his physical infirmities.
Michaelangelo lived during a time that lets us know that
36.33.4 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 12
Michaelangelo is famous for having successfully interpreted the human body. His great achievement is that of
the painting of David whose hands reach out as a sign of human capability and potential. It is assumed that the
time he lived was ripe for exchange of knowledge, development in science and matured enough to advance the horizon
of investigation in all fields. Renaissance humanism stressed on a serious rethink on the nature of art that focussed on a
accurate details. In painting and sculpture, artists focussed on not so casual but verifiable and minute details.
Michaelangelo’s paintings are no exception to it. In a study published in the journal of the Royal Society of medicine, a
group of surgeons are of the opinion that the great master was “afflicted by an illness involving his joints”. They have
used his portraits as evidence to argue their view. During his life, he complained of what he felt to be ‘gout’. Later he
complained of his sore and stiff hands which the doctors would find to be natural for someone who was engaged in
handmade art. The doctors found corroboration of those claims in portraits of the artist that show a hanging left hand
with both degenerative and non-degenerative changes. They attribute the pain not just to arthritis, but to the stress of
hammering and chiselling and note that though the master was seen hammering days before his death at an old age, he
did not write or sign his own letters before his death. In recent times there have been attempts to diagnose famous artists
with diseases that were not known during their time. This practice has raised many questions, especially on the issue of
ethics in research. It is also inferred from authentic analysis that Michaelangelo persisted in his work until his last days.
This theory would emphasize that his artistic subject defined his physical infirmities.
Renaissance painting in Europe was sceptical of
A. The obsessive medieval method of accuracy B. The classical simplicity and lack of control
C. The case and decorative excess of earlier art D. Expressionist technique
ugcnetcse-june2019-paper1 general-awareness passage-reading
36.33.5 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 13
Michaelangelo is famous for having successfully interpreted the human body. His great achievement is that of
the painting of David whose hands reach out as a sign of human capability and potential. It is assumed that the
time he lived was ripe for exchange of knowledge, development in science and matured enough to advance the horizon
of investigation in all fields. Renaissance humanism stressed on a serious rethink on the nature of art that focussed on a
accurate details. In painting and sculpture, artists focussed on not so casual but verifiable and minute details.
Michaelangelo’s paintings are no exception to it. In a study published in the journal of the Royal Society of medicine, a
group of surgeons are of the opinion that the great master was “afflicted by an illness involving his joints”. They have
used his portraits as evidence to argue their view. During his life, he complained of what he felt to be ‘gout’. Later he
complained of his sore and stiff hands which the doctors would find to be natural for someone who was engaged in
handmade art. The doctors found corroboration of those claims in portraits of the artist that show a hanging left hand
with both degenerative and non-degenerative changes. They attribute the pain not just to arthritis, but to the stress of
hammering and chiselling and note that though the master was seen hammering days before his death at an old age, he
did not write or sign his own letters before his death. In recent times there have been attempts to diagnose famous artists
with diseases that were not known during their time. This practice has raised many questions, especially on the issue of
ethics in research. It is also inferred from authentic analysis that Michaelangelo persisted in his work until his last days.
This theory would emphasize that his artistic subject defined his physical infirmities.
The controversy that the passage above refers to is whether
36.33.6 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 14
Michaelangelo is famous for having successfully interpreted the human body. His great achievement is that of
the painting of David whose hands reach out as a sign of human capability and potential. It is assumed that the
time he lived was ripe for exchange of knowledge, development in science and matured enough to advance the horizon
of investigation in all fields. Renaissance humanism stressed on a serious rethink on the nature of art that focussed on a
accurate details. In painting and sculpture, artists focussed on not so casual but verifiable and minute details.
Michaelangelo’s paintings are no exception to it. In a study published in the journal of the Royal Society of medicine, a
group of surgeons are of the opinion that the great master was “afflicted by an illness involving his joints”. They have
used his portraits as evidence to argue their view. During his life, he complained of what he felt to be ‘gout’. Later he
complained of his sore and stiff hands which the doctors would find to be natural for someone who was engaged in
handmade art. The doctors found corroboration of those claims in portraits of the artist that show a hanging left hand
with both degenerative and non-degenerative changes. They attribute the pain not just to arthritis, but to the stress of
hammering and chiselling and note that though the master was seen hammering days before his death at an old age, he
did not write or sign his own letters before his death. In recent times there have been attempts to diagnose famous artists
with diseases that were not known during their time. This practice has raised many questions, especially on the issue of
ethics in research. It is also inferred from authentic analysis that Michaelangelo persisted in his work until his last days.
This theory would emphasize that his artistic subject defined his physical infirmities.
What generalisations do people subscribe to?
A. Establishing facts by tests
B. Inferring the essence of character from famous people’s handwriting
C. Carbon dating of the hair of celebrities to draw conclusion on their physical structure
D. To retroactively diagnose famous artists and public figures of conditions that were not prevalent during their time
36.33.7 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 15
Michaelangelo is famous for having successfully interpreted the human body. His great achievement is that of
the painting of David whose hands reach out as a sign of human capability and potential. It is assumed that the
time he lived was ripe for exchange of knowledge, development in science and matured enough to advance the horizon
of investigation in all fields. Renaissance humanism stressed on a serious rethink on the nature of art that focussed on a
accurate details. In painting and sculpture, artists focussed on not so casual but verifiable and minute details.
Michaelangelo’s paintings are no exception to it. In a study published in the journal of the Royal Society of medicine, a
group of surgeons are of the opinion that the great master was “afflicted by an illness involving his joints”. They have
used his portraits as evidence to argue their view. During his life, he complained of what he felt to be ‘gout’. Later he
complained of his sore and stiff hands which the doctors would find to be natural for someone who was engaged in
handmade art. The doctors found corroboration of those claims in portraits of the artist that show a hanging left hand
with both degenerative and non-degenerative changes. They attribute the pain not just to arthritis, but to the stress of
hammering and chiselling and note that though the master was seen hammering days before his death at an old age, he
did not write or sign his own letters before his death. In recent times there have been attempts to diagnose famous artists
with diseases that were not known during their time. This practice has raised many questions, especially on the issue of
ethics in research. It is also inferred from authentic analysis that Michaelangelo persisted in his work until his last days.
This theory would emphasize that his artistic subject defined his physical infirmities.
What actually may be concluded from the above passage?
36.33.8 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 16
The dance of the honeybee conveying to other bees where nector will be found is an example of
A. Mass communication B. Group communication
C. Interpersonal communication D. Intrapersonal communication
ugcnetcse-june2019-paper1 general-awareness
36.33.9 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 17
Choose the correct sequence of communication from the options given below:
ugcnetcse-june2019-paper1 general-awareness
36.33.10 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 18
1. To transmit culture
2. To formulate national policies
3. To help the judiciary take its decision
4. To stabilise the share market
ugcnetcse-june2019-paper1 general-awareness
36.33.11 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 19
In a classroom situation, a teacher organises group discussion to help arrive at a solution of a problem. In terms
of a model communication used, it will be called
A. A transaction model B. An interaction model
C. A horizontal model D. A linear model
ugcnetcse-june2019-paper1 general-awareness
36.33.12 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 2
Answer key ☟
36.33.13 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 3
From the list of the effective teaching behaviours, identify those which are called key behaviours.
36.33.14 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 36
Which of the following is a type of malware intentionally inserted into a software system that will setoff a
malicious function when specified conditions are met?
Answer key ☟
36.33.15 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 37
A. An OS controls peripherals, allocates memory and organises data into fields and records
B. An OS provides protection against viruses and controls peripherals
C. An OS controls peripheral, and allocates memory and processor time
D. An OS controls the procesor and peripherals and allows user to connect to the Internet
ugcnetcse-june2019-paper1 general-awareness
Answer key ☟
36.33.16 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 38
Select the option that shows the storage devices in order of capacity from lowest to highest
A. CD-ROM, DVD-ROM, Blu-ray B. Blu-ray, CD-ROM, DVD-ROM
C. DVD-ROM, Blu-ray, CD-ROM D. DVD-ROM, CD-ROM, Blu-ray
ugcnetcse-june2019-paper1 general-awareness
Answer key ☟
36.33.17 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 39
Answer key ☟
36.33.18 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 4
ugcnetcse-june2019-paper1 general-awareness
Answer key ☟
36.33.19 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 40
A. Giga Byte :
B. : Cathode Ray Tube
C. : Rapid Online Memory
D. : Central Processing Unit
ugcnetcse-june2019-paper1 general-awareness
Answer key ☟
36.33.20 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 41
In the last few years, India has been affected by which of the following tropical cyclones?
A. Gaja, Hudhud, Bhima B. Hudhud, Bhima, Ockhi
C. Gaja, Hudhud, Ockhi D. Gaja, Bhima, Ockhi
ugcnetcse-june2019-paper1 general-awareness
36.33.21 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 42
Which of the following are priority areas in relation to the Sustainable Development Goals?
i. No poverty
ii. Zero hunger
iii. Reducing urbanization
iv. Peace, justice and strong institutions
Choose the correct answer from the options given below :
36.33.22 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 43
Assertion (A) : Methemoglobinemia is a condition in which blood is not able to carry and deliver enough
oxygen to the body.
Reason (R) : Consuming drinking water with high nitrate levels may cause methemoglobinemia.
Choose the correct answer from the options given below :
A. Both (A) and (R) are true and (R) is the correct explanation of (A)
B. Both (A) and (R) are true but (R) is not the correct explanation of (A)
C. (A) is true but (R) is false
D. (A) is false but (R) is true
ugcnetcse-june2019-paper1 general-awareness
36.33.23 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 44
A. Both (A) and (R) are true and (R) is the correct explanation of (A)
B. Both (A) and (R) are true but (R) is not the correct explanation of (A)
C. (A) is true but (R) is false
D. (A) is false but (R) is true
ugcnetcse-june2019-paper1 general-awareness
36.33.24 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 45
Answer key ☟
36.33.25 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 46
In post independence India, which one of the following committee/commission’s report deals with all levels of
education in India?
A. Sargeant Commission B. Hartog Committee
C. Kothari Commission D. Radhakrishnan Commission
ugcnetcse-june2019-paper1 general general-awareness
36.33.26 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 47
The Education Commission of India that first took serious note of the problem of Brain Drain was
A. The Education Commission of India B. The University Education Commission
C. The Calcutta University Commission D. The Sargeant Commission
ugcnetcse-june2019-paper1 general-awareness
36.33.27 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 49
Which one of the following instructional designs is not a part of SWAYAM launched by Government of India?
A. E-tutorial B. E-Content
C. Physical interaction D. Discussion Forum
ugcnetcse-june2019-paper1 general-awareness
Answer key ☟
36.33.28 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 5
Which among the following best describes the Emotional Intelligence of learners?
Answer key ☟
36.33.29 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 50
A. Only i and ii B. Only ii and iii C. Only iii D. Only i and iii
ugcnetcse-june2019-paper1 general-awareness
Answer key ☟
36.33.30 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 6
36.33.31 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 7
The research design is specifically related to which of the following features in research?
i. Sample selection
ii. Formulation of a plan
iii. Deciding about the tool for data collection
iv. Hypothesis making
v. Choice of a field of inquiry
36.33.32 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 8
Through which research method, the manipulation of an independent variable and its effect on dependent
variable is examined with reference to a hypothesis under controlled conditions?
A. Ex-post facto research B. Descriptive research
C. Case study research D. Experimental research
ugcnetcse-june2019-paper1 general-awareness
36.33.33 General Awareness: UGC NET CSE | June 2019 | Part 1 | Question: 9
In which of the following research studies interpretation and meaning get more attention than formulation of
generalisations?
i. Historical studies
ii. Survey studies
iii. Philosophical studies
iv. Ethnographic studies
v. Hypothetico – deductive studies
vi. Ex-post facto studies
Answer key ☟
Consider a hash table of size and the hash function for . The
location to the key is
A. 46 B. 47 C. 41 D. 43
ugcnetcse-june2011-paper2 data-structures hashing
Answer key ☟
36.35.1 Image Compression: UGC NET CSE | August 2016 | Part 3 | Question: 58
Answer key ☟
As compared to rental and leasing methods to acquire computer systems for a Management Information System
(MIS), purchase method has following advantage:
A. It has high level of flexibility B. It does not require cash up-front
C. It is a business investment D. Little risk of obsolescence
ugcnetcse-dec2015-paper3 information-system
Answer key ☟
Answer key ☟
36.38.1 Is&software Engineering: UGC NET CSE | June 2011 | Part 2 | Question: 41
Which one of the items listed below is not one of the software engineering layers ?
Answer key ☟
Answer key ☟
Answer key ☟
36.41.1 Kruskals Algorithm: UGC NET CSE | June 2008 | Part 2 | Question: 2
The complexity of Kruskal's minimum spanning tree algorithm on a graph with ' ' nodes and ' ' edges is :
A. B.
C. D.
ugcnetcse-june2008-paper2 kruskals-algorithm minimum-spanning-tree
Answer key ☟
36.42.1 Linear Programming: UGC NET CSE | August 2016 | Part 3 | Question: 61
and
The total maximum profit for the above problem is :
A. B. C. D.
ugcnetcse-aug2016-paper3 linear-programming
Answer key ☟
36.42.2 Linear Programming: UGC NET CSE | January 2017 | Part 3 | Question: 70
A.
B.
C.
D.
ugcnetcse-jan2017-paper3 linear-programming
Answer key ☟
36.42.3 Linear Programming: UGC NET CSE | June 2013 | Part 3 | Question: 23
Answer key ☟
Object modules generated by assembler that contains unresolved external references are resolved for two or
more object module by a/an
Answer key ☟
Answer key ☟
36.45.1 Management Information System: UGC NET CSE | June 2011 | Part 2 | Question: 45
Answer key ☟
36.45.2 Management Information System: UGC NET CSE | Junet 2015 | Part 3 | Question: 55
A. B.
C. D.
ugcnetcse-june2015-paper3 management-information-system
Answer key ☟
ugcnetjune2014iii microprocessors
Answer key ☟
36.47.1 Minimum Spanning Tree: UGC NET CSE | December 2019 | Part 2 | Question: 6
The weight of minimum spanning tree in graph , calculated using Kruskal’s algorithm is:
A. B. C. D.
ugcnetcse-dec2019-paper2 algorithms minimum-spanning-tree
Answer key ☟
36.48 Mis (1)
Answer key ☟
36.49.1 Mobile Communication: UGC NET CSE | January 2017 | Part 2 | Question: 48
Answer key ☟
36.49.2 Mobile Communication: UGC NET CSE | January 2017 | Part 2 | Question: 49
Answer key ☟
36.50.1 Multiple Document Interface: UGC NET CSE | August 2016 | Part 3 | Question: 68
Which of the following statements is incorrect for a Windows Multiple Document Interface (MDI) ?
A. Each document in an MDI application is displayed in a separate child window within the client area of the
application’s main window.
B. An MDI application has three kinds of windows namely a frame window, an MDI client window and number of
child windows.
C. An MDI application can support more than one kind of document.
D. An MDI application displays output in the client area of the frame window.
36.51.1 Natural Join: UGC NET CSE | August 2016 | Part 3 | Question: 9
Suppose database table currently has tuples and table currently has
. Consider the following three relational algebra queries and :
: where is natural join symbol
: where is left outer join symbol
: and
The number of tuples in the resulting table of RA1, RA2 and RA3 are given by :
A. respectively B. respectively
C. respectively D. respectively
ugcnetcse-aug2016-paper3 databases natural-join
Answer key ☟
36.52.1 Natural Language Processing: UGC NET CSE | June 2014 | Part 3 | Question: 29
STRIPS addresses the problem of efficiently representing and implementation of a planner. It is not related to
which one of the following?
Answer key ☟
36.53.1 Network Switching: UGC NET CSE | June 2011 | Part 2 | Question: 30
Which of the following switching techniques is most suitable for interactive traffic ?
A. Circuit switching B. Message switching
C. Packet switching D. All of the above
ugcnetcse-june2011-paper2 computer-networks network-switching
Answer key ☟
36.54.1 Neural Network: UGC NET CSE | June 2013 | Part 3 | Question: 73
A. Support
B. - cut
C. Convex
D. Concave
Answer key ☟
36.54.2 Neural Network: UGC NET CSE | June 2013 | Part 3 | Question: 74
A. B.
C. D.
ugcnetcse-june2013-paper3 neural-network fuzzy-set
Answer key ☟
36.54.3 Neural Network: UGC NET CSE | Junet 2015 | Part 3 | Question: 70
Consider the two class classification task that consists of the following points:
Class : [1 1.5] [1 -1.5]
Class : [-2 2.5] [-2 -2.5]
The decision boundary between the two classes using single perceptron is given by:
A. B. C. D.
ugcnetcse-june2015-paper3 fuzzy-set neural-network
Answer key ☟
36.54.4 Neural Network: UGC NET CSE | Junet 2015 | Part 3 | Question: 71
is _____ . [Note: ]
Answer key ☟
36.54.5 Neural Network: UGC NET CSE | Junet 2015 | Part 3 | Question: 72
Suppose the function y and a fuzzy integer number around - 4 for x are given as . Around - 4 =
{(2, 0.3), (3, 0.6), (4, 1), (5, 0.6), (6, 0.3)} respectively. Then f(Around-4) is given by
A. {(2, 0.6), (3, 0.3), (6, 1), (11, 0.3)} B. {(2, 0.6), (3, 1), (6, 1), (11, 0.3)}
C. {(2, 0.6), (3, 1), (6, 0.6), (11, 0.3)} D. {(2, 0.6), (3, 0.3), (6, 0.6), (11, 0.3)}
ugcnetcse-june2015-paper3 fuzzy-set neural-network
Answer key ☟
36.54.6 Neural Network: UGC NET CSE | September 2013 | Part 3 | Question: 27
A.
B.
C.
D.
Answer key ☟
36.55.1 Non Gatecse: UGC NET CSE | January 2017 | Part 2 | Question: 1
A. B.
C. D.
ugcnetjan2017ii non-gatecse
Answer key ☟
36.55.2 Non Gatecse: UGC NET CSE | January 2017 | Part 3 | Question: 13
ugcnetcse-jan2017-paper3 non-gatecse
Answer key ☟
36.55.3 Non Gatecse: UGC NET CSE | January 2017 | Part 3 | Question: 14
A segment is any object described by GKS commands and data that start with CREATE SEGMENT and
Terminates with CLOSE SEGMENT command. What functions can be performed on these segments?
A. Translation and Rotation B. Panning and Zooming
C. Scaling and Shearing D. Translation, Rotation, Panning and Zooming
ugcnetcse-jan2017-paper3 non-gatecse
Answer key ☟
36.55.4 Non Gatecse: UGC NET CSE | January 2017 | Part 3 | Question: 15
A. B.
C. D.
ugcnetcse-jan2017-paper3 non-gatecse
Answer key ☟
36.55.5 Non Gatecse: UGC NET CSE | January 2017 | Part 3 | Question: 57
Answer key ☟
36.55.6 Non Gatecse: UGC NET CSE | January 2017 | Part 3 | Question: 58
Answer key ☟
36.55.7 Non Gatecse: UGC NET CSE | January 2017 | Part 3 | Question: 73
A. Multilayer perception
B. Self organizing feature map
C. Hopfield network
A. (A) only
B. (B) only
C. (A) and (B) only
D. (A) and (C) only
ugcnetcse-jan2017-paper3 non-gatecse
Answer key ☟
36.55.8 Non Gatecse: UGC NET CSE | January 2017 | Part 3 | Question: 74
Unix command to change the case of first three lines of file “shortlist” from lower to upper
ugcnetcse-jan2017-paper3 non-gatecse
Answer key ☟
36.55.9 Non Gatecse: UGC NET CSE | January 2017 | Part 3 | Question: 75
A. B.
C. D.
ugcnetcse-jan2017-paper3 non-gatecse
Answer key ☟
36.56 Number System (1)
36.56.1 Number System: UGC NET CSE | December 2005 | Part 2 | Question: 12
A. B. C. D.
ugcnetcse-dec2005-paper2 digital-logic number-system
Answer key ☟
36.57.1 Oops Concept: UGC NET CSE | August 2016 | Part 2 | Question: 14
Answer key ☟
36.58.1 Operator Overloading: UGC NET CSE | June 2011 | Part 2 | Question: 13
Answer key ☟
ugcnetcse-june2008-paper2 parsing
Answer key ☟
A non-pipelined system takes to process a task. The same task can be processed in a four-segment pipeline
with a clock cycle of . Determine the speed up of the pipeline for tasks.
A. B. C. D.
ugcnetcse-dec2019-paper2 co-and-architecture pipelining
Answer key ☟
A relationship between processes such that each has some part (critical section) which must not be executed
while the critical section of another is being executed, is known as
A. Semaphore B. Mutual exclusion
C. Multiprogramming D. Message passing
ugcnetcse-june2011-paper2 operating-system process-scheduling
Answer key ☟
36.61.2 Process Scheduling: UGC NET CSE | June 2011 | Part 2 | Question: 39
A. B. C. D.
ugcnetcse-june2011-paper2 operating-system process-scheduling
Answer key ☟
Answer key ☟
36.63.1 Quadratic Equations: UGC NET CSE | June 2013 | Part 3 | Question: 11
The golden ratio and its conjugate both satisfy the equation
A. B. C. D.
ugcnetcse-june2013-paper3 quadratic-equations
Answer key ☟
When the priority queue is represented by max heap, the insertion and deletion of an element can be performed
in (queue containing elements)
A. and respectively B. and respectively
C. and respectively D. None of the above
ugcnetcse-june2011-paper2 data-structures queue binary-heap
Answer key ☟
Answer key ☟
Then, the resulting relation, , which relates elements of universe to the elements of universe using max-min
composition is given by:
A.
B.
C.
D.
Answer key ☟
A. Is a graph-based method of knowledge representation where nodes represent concepts and arcs represent relations
between concepts.
B. Is a graph-based method of knowledge representation where nodes represent relations between concepts and arcs
represent concepts.
C. Represents an entity as a set of slots and associated rules.
D. Is a subset of first-order logic.
Answer key ☟
Answer key ☟
36.69.1 Single Layer Perceptron: UGC NET CSE | June 2013 | Part 3 | Question: 75
and is defined as
Answer key ☟
36.70.1 Software Development Life Cycle Models: UGC NET CSE | June 2011 | Part 2 | Question: 42
Answer key ☟
Answer key ☟
36.72.1 Software Testing: UGC NET CSE | Junet 2015 | Part 3 | Question: 43
Verification:
A. refers to the set of activities that ensure that software correctly implements a specific function
B. Gives answer to the question - Are we building the right product
C. requires execution of software
D. both A and B
Answer key ☟
36.73.1 System Software Compilers: UGC NET CSE | August 2016 | Part 3 | Question: 45
A. B.
C. D.
ugcnetcse-aug2016-paper3 system-software-compilers macros
Answer key ☟
36.74.1 Transaction and Concurrency: UGC NET CSE | June 2011 | Part 2 | Question: 16
Answer key ☟
36.74.2 Transaction and Concurrency: UGC NET CSE | June 2011 | Part 2 | Question: 18
Answer key ☟
36.74.3 Transaction and Concurrency: UGC NET CSE | June 2011 | Part 2 | Question: 19
Answer key ☟
36.75.1 Transportation Problem: UGC NET CSE | August 2016 | Part 3 | Question: 63
A. (a) and (b) only B. (a) and (c) only C. (b) and (c) only D. (a), (b) and (c)
ugcnetcse-aug2016-paper3 linear-programming transportation-problem
Answer key ☟
36.75.2 Transportation Problem: UGC NET CSE | June 2013 | Part 3 | Question: 24
A basic feasible solution to a m-origin, n-destination transportation problem is said to be ______ if the number
of positive allocations are less than m+n-1.
Answer key ☟
36.75.3 Transportation Problem: UGC NET CSE | June 2013 | Part 3 | Question: 25
The total transportation cost in an initial basic feasible solution to the following transportation problem using
Vogel’s Approximation method is
A. B. C. D.
ugcnetcse-june2013-paper3 linear-programming transportation-problem
Answer key ☟
Answer key ☟
Answer key ☟
Consider the following operations to be performed in Unix : "The pipe sorts all files in the current directory
modified in the month of "June" by order of size and prints them to the terminal screen. The sort option skips
ten fields then sorts the lines in numeric order." Which of the following Unix command will perform above set of
operations ?
ugcnetcse-aug2016-paper3 unix
Answer key ☟
Which of the following statement(s) is/are True regarding ‘nice’ command of UNIX ?
I. It is used to set or change the priority of a process.
II. A process’s nice value can be set at the time of creation.
III. ‘nice’ takes a command line as an argument.
Answer key ☟
A. B. C. D.
ugcnetcse-dec2010-paper2 unix
36.77.4 Unix: UGC NET CSE | September 2013 | Part 2 | Question: 48
Which of the following set of Unix commands will always display “WELCOME”?
ugcnetsep2013ii unix
Answer key ☟
36.78.1 Virtual Memory: UGC NET CSE | June 2011 | Part 2 | Question: 47
Virtual memory is
A. Related to virtual reality B. A form of ROM
C. A form of RAM D. None of the above
ugcnetcse-june2011-paper2 co-and-architecture virtual-memory
Answer key ☟
(I) Each object in the active directory of windows 2000 has an access control list.
(II) The scheme is a blueprint of all objects in the domain of windows 2000.
Which of the following is true?
A. only (I)
B. only (II)
C. both (I) and (II)
D. None of the above
ugcnetcse-dec2008-paper2 windows
Answer key ☟
Answer key ☟
Answer key ☟
36.79.4 Windows: UGC NET CSE | June 2014 | Part 3 | Question: 47
All the classes necessary for windows programming are available in the module :
Answer key ☟
Answer key ☟
36.80.1 Windows Programming: UGC NET CSE | June 2009 | Part 2 | Question: 50
A. Recycle
B. My Computer
C. Internet explorer
D. None of the above
ugcnetcse-june2009-paper2 windows-programming
36.80.2 Windows Programming: UGC NET CSE | Junet 2015 | Part 3 | Question: 74
WOW32 is a
ugcnetcse-june2015-paper3 windows-programming
Answer key ☟
Answer Keys
36.0.1 D 36.0.2 D 36.0.3 B 36.0.4 A 36.0.5 C
36.0.6 A 36.0.7 D 36.0.8 D 36.0.9 D 36.0.10 D
36.0.11 C 36.0.12 B 36.0.13 B 36.0.14 B 36.0.15 A
36.0.16 B 36.0.17 D 36.0.18 A 36.0.19 D 36.0.20 B
36.0.21 B 36.0.22 D 36.0.23 D 36.0.24 C 36.0.25 B
36.0.26 D 36.0.27 B 36.0.28 A 36.0.29 C 36.0.30 C
36.0.31 C 36.0.32 Q-Q 36.0.33 C 36.0.34 A 36.0.35 C
36.0.36 B 36.0.37 D 36.0.38 Q-Q 36.0.39 Q-Q 36.0.40 Q-Q
36.0.41 Q-Q 36.0.42 Q-Q 36.0.43 Q-Q 36.0.44 Q-Q 36.0.45 Q-Q
36.0.46 D 36.0.47 Q-Q 36.0.48 Q-Q 36.0.49 Q-Q 36.0.50 Q-Q
When an array is passed as parameter to a function, which of the following statements is correct ?
Answer key ☟
Answer key ☟
37.2.1 Array of Pointers: UGC NET CSE | August 2016 | Part 2 | Question: 12
int * f[]()
declares :
Answer key ☟
37.3.1 Dangling Pointers: UGC NET CSE | September 2013 | Part 3 | Question: 65
If an integer needs two bytes of storage, then the maximum value of unsigned integer is
A. B. C. D.
ugcnetcse-dec2011-paper2 programming-in-c data-types
Answer key ☟
37.5.1 Input Output Statement: UGC NET CSE | December 2009 | Part 2 | Question: 12
What would be the output of the following program, if run from the command line as “myprog 1 2 3” ?
{ int i ;
(A) 123
(B) 6
(C) Error
(D) “123”
ugcnetcse-dec2009-paper2 programming-in-c input-output-statement
Answer key ☟
37.6.1 Operator Precedence: UGC NET CSE | December 2010 | Part 2 | Question: 12
A. B. C. D.
ugcnetcse-dec2010-paper2 programming-in-c operator-precedence
Answer key ☟
37.6.2 Operator Precedence: UGC NET CSE | December 2011 | Part 2 | Question: 36
means
A. B.
C. D.
ugcnetcse-dec2011-paper2 programming-in-c operator-precedence
Answer key ☟
A. 1 B. 3 C. 2 D. 0
ugcnetcse-dec2012-paper2 programming-in-c operators
Answer key ☟
A. B. C. D.
ugcnetcse-june2010-paper2 programming-in-c operators
Answer key ☟
37.8.1 Parameter Passing: UGC NET CSE | December 2012 | Part 3 | Question: 44
Answer key ☟
37.9.1 Pointer Declaration: UGC NET CSE | September 2013 | Part 3 | Question: 51
Answer key ☟
Given
What is the output of given expression?
x * 3 & & 3 || j | k
A. B. C. D.
ugcnetcse-aug2016-paper2 programming-in-c
Answer key ☟
Answer key ☟
Which one of the following will set the value of to if has the value , but not otherwise ?
A. If B. If
C. If D. If
ugcnetcse-dec2010-paper2 programming-in-c
Answer key ☟
Answer key ☟
A horn clause is
programming-in-c ugcnetcse-dec2015-paper3
Answer key ☟
37.10.6 Programming In C: UGC NET CSE | June 2007 | Part 2 | Question: 14
A. B. C. D.
ugcnetcse-june2007-paper2 programming-in-c
Answer key ☟
Answer key ☟
Consider the following pseudo-code fragment, where and are integer variables that have been initialized:
/* Pre-conditions : */
/* Assume that overflow never occurs */
int ; int ;
while
;
;
When the while loop terminates, what will be the value of in terms of and ?
A.
B.
C. /* means floor */
D. /* means ceil */
ugcnetcse-oct2020-paper2 programming-in-c
Answer key ☟
What is the size of the following union? Assume that the size of int=2, size of float =4, size of char=1
union tag {
int a;
float b;
char c;
};
A. 2 B. 4 C. 1 D. 7
ugcnetsep2013ii programming-in-c
Answer key ☟
A. 10 B. 16 C. 15 D. 14
ugcnetsep2013ii programming-in-c
Answer key ☟
Answer key ☟
A. 15 B. 25 C. 45 D. 20
ugcnetcse-sep2013-paper3 programming-in-c
Answer key ☟
37.11.1 Storage Classes In C: UGC NET CSE | January 2017 | Part 2 | Question: 13
37.12.1 Three Dimensional Array: UGC NET CSE | December 2015 | Part 2 | Question: 16
A three dimensional array in 'C' is declared as int A[x][y][z]. Here, the address of an item at the location A[p][q]
[r] can be computed as follows: (where w is the word length of an integer)
A. &A[0][0][0]+w(y*z*q+z*p+r) B. &A[0][0][0]+w(y*z*p+z*q+r)
C. &A[0][0][0]+w(x*y*p+z*q+r) D. &A[0][0][0]+w(x*y*q+z*p+r)
ugcnetcse-dec2015-paper2 programming-in-c three-dimensional-array
Answer key ☟
Answer Keys
37.1.1 A 37.1.2 C 37.2.1 Q-Q 37.3.1 B 37.4.1 A
37.5.1 Q-Q 37.6.1 Q-Q 37.6.2 D 37.7.1 D 37.7.2 Q-Q
37.8.1 A 37.9.1 D 37.10.1 Q-Q 37.10.2 Q-Q 37.10.3 Q-Q
37.10.4 B 37.10.5 B 37.10.6 Q-Q 37.10.7 C 37.10.8 X
37.10.9 B 37.10.10 C 37.10.11 C 37.10.12 D 37.11.1 B
37.12.1 B
38 Programming and DS: DS (107)
Answer key ☟
A binary tree is said to have heap property if the elements along any path :
ugcnetcse-june2009-paper2
Answer key ☟
Answer key ☟
What operation is supported in constant time by the doubly linked list, but not by the singly linked list ?
ugcnetcse-dec2004-paper2
Answer key ☟
Suppose we are implementing quadratic probing with a Hash function, Hash mode . If an element
with key is inserted and the first three locations attempted are already occupied, then the next cell that will
be tried is :
A. B. C. D.
ugcnetcse-dec2004-paper2
Answer key ☟
What item is at the root after the following sequence of insertions into an empty splay tree :
A. B. C. D.
ugcnetcse-dec2004-paper2
Answer key ☟
Answer key ☟
Answer key ☟
1.
2.
3.
4. None of these
ugcnetcse-dec2006-paper2
Answer key ☟
Answer key ☟
Answer key ☟
ugcnetcse-dec2007-paper2
Answer key ☟
38.0.13 UGC NET CSE | December 2007 | Part 2 | Question: 21
Consider a rooted tree in which every node has at least three children. What is the minimum number of nodes at
level i (i > ) of the tree ? Assume that the root is at level :
A. B. C. D.
ugcnetcse-dec2007-paper2
Answer key ☟
Which of the following piece of code will insert the node pointed to by at the end of the list ?
A.
B.
C.
D.
ugcnetcse-dec2007-paper2
Answer key ☟
38.1.1 AVL Tree: UGC NET CSE | December 2012 | Part 2 | Question: 2
The worst case time complexity of AVL is tree is better in comparison to binary search tree for
A. Search and Insert Operations B. Search and Delete Operations
C. Insert and Delete Operations D. Search, Insert and Delete Operations
data-structures binary-tree ugcnetcse-dec2012-paper2 avl-tree
Answer key ☟
38.1.2 AVL Tree: UGC NET CSE | June 2005 | Part 2 | Question: 23
In the balanced binary tree given below, how many nodes will become unbalanced when a node is inserted as a
child of the node “ ” ?
A. B. C. D.
ugcnetcse-june2005-paper2 data-structures avl-tree
Answer key ☟
A. B.
C. D.
ugcnetcse-dec2012-paper2 b-tree databases
Answer key ☟
38.3.1 B and Bplus Trees: UGC NET CSE | June 2010 | Part 2 | Question: 25
In a tree of order , the following keys are inserted as follows : and How many elements
are present in the root of the tree ?
A. B. C. D.
ugcnetcse-june2010-paper2 data-structures b-and-bplus-trees
Answer key ☟
38.4.1 Binary Heap: UGC NET CSE | December 2008 | Part 2 | Question: 33
A. maximum
B. minimum
C. sum
D. product
Answer key ☟
38.4.2 Binary Heap: UGC NET CSE | January 2017 | Part 2 | Question: 23
a. b. c. d.
A. B. C. D.
ugcnetjan2017ii data-structures binary-heap
Answer key ☟
38.4.3 Binary Heap: UGC NET CSE | July 2018 | Part 2 | Question: 22
Consider the array A=<4, 1, 3, 2, 16, 9, 10, 14, 8, 7>. After building heap from the array A, the depth of the
heap and the right child of max-heap are ______ and _____ respectively (Root is at level 0).
A. 3, 14 B. 3, 10 C. 4, 14 D. 4, 10
ugcnetcse-july2018-paper2 data-structures binary-heap
Answer key ☟
38.4.4 Binary Heap: UGC NET CSE | June 2013 | Part 3 | Question: 13
Answer key ☟
38.4.5 Binary Heap: UGC NET CSE | Junet 2015 | Part 3 | Question: 36
Answer key ☟
38.4.6 Binary Heap: UGC NET CSE | November 2017 | Part 3 | Question: 20
Answer key ☟
38.4.7 Binary Heap: UGC NET CSE | October 2020 | Part 2 | Question: 24
In a binary max heap containing numbers, the smallest element can be found in ______
A. B. C. D.
ugcnetcse-oct2020-paper2 data-structures binary-heap
Answer key ☟
38.5.1 Binary Search Tree: UGC NET CSE | August 2016 | Part 2 | Question: 23
The runtime for traversing all the nodes of a binary search tree with nodes and printing them in an order is
A. B. C. D.
ugcnetcse-aug2016-paper2 data-structures binary-search-tree
Answer key ☟
38.5.2 Binary Search Tree: UGC NET CSE | December 2005 | Part 2 | Question: 25
Which traversal techniques lists the nodes of a binary search tree in ascending order?
Answer key ☟
38.5.3 Binary Search Tree: UGC NET CSE | July 2016 | Part 2 | Question: 21
If we remove the root node which of the node from the left subtree will be the new root?
A. 11 B. 12 C. 13 D. 16
data-structures binary-tree binary-search-tree ugcnetcse-july2016-paper2
Answer key ☟
38.5.4 Binary Search Tree: UGC NET CSE | July 2016 | Part 3 | Question: 35
Suppose that we have numbers between 1 and 1,000 in a binary search tree and want to search for the number
364. Which of the following sequences could not be the sequence of nodes examined?
A. 925, 221, 912, 245, 899, 259, 363, 364 B. 3, 400, 388, 220, 267, 383, 382, 279, 364
C. 926, 203, 912, 241, 913, 246, 364 D. 3, 253, 402, 399, 331, 345, 398, 364
ugcnetcse-july2016-paper3 data-structures binary-search-tree
Answer key ☟
38.5.5 Binary Search Tree: UGC NET CSE | July 2018 | Part 2 | Question: 26
A binary search tree in which every non-leaf node has non-empty left and right subtrees is called a strictly binary
tree. Such a tree with 19 leaves:
A. cannot have more than 37 nodes B. has exactly 37 nodes
C. has exactly 35 nodes D. cannot have more than 35 nodes
ugcnetcse-july2018-paper2 data-structures binary-search-tree
Answer key ☟
38.5.6 Binary Search Tree: UGC NET CSE | September 2013 | Part 3 | Question: 41
Given a binary search trees for a set of keys with the following probabilities
A. B. C. D.
ugcnetcse-sep2013-paper3 data-structures binary-search-tree
Answer key ☟
38.6.1 Binary Tree: UGC NET CSE | December 2009 | Part 2 | Question: 21
If the number of leaves in a strictly binary tree is an odd number, then what can you say with full conviction
about total number of nodes in the tree ?
(A) It is an odd number.
(B) It is an even number.
(C) It cannot be equal to the number of leaves.
(D) It is always greater than twice the number of leaves.
ugcnetcse-dec2009-paper2 data-structures binary-tree
Answer key ☟
38.6.2 Binary Tree: UGC NET CSE | June 2009 | Part 2 | Question: 27
A. 2k-1
B. 2k-1
C. 2k
D. 2k+1
Answer key ☟
38.6.3 Binary Tree: UGC NET CSE | June 2012 | Part 2 | Question: 27
The Inorder traversal of the tree will yield a sorted listing of elements of tree in
A. Binary tree B. Binary search tree
C. Heaps D. None of the above
data-structures binary-tree ugcnetcse-june2012-paper2
Answer key ☟
38.6.4 Binary Tree: UGC NET CSE | June 2012 | Part 2 | Question: 8
Answer key ☟
38.6.5 Binary Tree: UGC NET CSE | October 2020 | Part 2 | Question: 23
A complete -ary tree is a tree in which each node has children or no children. Let be the number of internal
nodes and be the number of leaves in a complete -ary tree. If , and , what is the value of ?
A. B. C. D.
ugcnetcse-oct2020-paper2 data-structures binary-tree
Answer key ☟
38.6.6 Binary Tree: UGC NET CSE | September 2013 | Part 2 | Question: 11
A. B. C. D.
binary-tree data-structures ugcnetsep2013ii
Answer key ☟
38.6.7 Binary Tree: UGC NET CSE | September 2013 | Part 2 | Question: 21
Answer key ☟
If is chosen from a universal collection of hash functions and is used to hash keys into a table of size ,
where , the expected number of collisions involving a particular key is less than __________.
A. B. C. D.
ugcnetjan2017ii cryptography hashing data-structures
Answer key ☟
38.8.1 Data Structures: UGC NET CSE | December 2011 | Part 2 | Question: 1
Answer key ☟
38.8.2 Data Structures: UGC NET CSE | July 2016 | Part 2 | Question: 2
The number of different spanning trees in complete graph, and bipartite graph, have ____ and ___
respectively.
A. 14, 14 B. 16, 14 C. 16, 4 D. 14, 4
ugcnetcse-july2016-paper2 data-structures graph-theory
Answer key ☟
38.8.3 Data Structures: UGC NET CSE | July 2016 | Part 2 | Question: 5
A clique in a simple undirected graph is a complete subgraph that is not contained in any larger complete
subgraph. How many cliques are there in a graph shown below?
A. 2 B. 4 C. 5 D. 6
ugcnetcse-july2016-paper2 data-structures graph-theory
Answer key ☟
38.8.4 Data Structures: UGC NET CSE | June 2012 | Part 2 | Question: 49
Answer key ☟
38.8.5 Data Structures: UGC NET CSE | June 2013 | Part 3 | Question: 49
Suppose you want to delete the name that occurs before ‘Vivek’ in an alphabetical listing. Which one of the
following data structures shall be most efficient for this operation?
A. Circular linked list B. Doubly linked list
C. Linked list D. Dequeue
ugcnetcse-june2013-paper3 data-structures
Answer key ☟
38.8.6 Data Structures: UGC NET CSE | October 2020 | Part 2 | Question: 63
i. Minimax search is breadth-first; it processes all the nodes at a level before moving to a node in next level.
ii. The effectiveness of the alpha-beta pruning is highly dependent on the order in which the states are examined
iii. The alpha-beta search algorithms computes the same optimal moves as minimax algorithm
iv. Optimal play in games of imperfect information does not require reasoning about the current and future belief states
of each player
Answer key ☟
38.8.7 Data Structures: UGC NET CSE | September 2013 | Part 3 | Question: 15
Which of the following is the minimum cost for an assignment problem given below?
A. B. C. D.
ugcnetcse-sep2013-paper3 data-structures
Answer key ☟
38.9.1 Graph Algorithms: UGC NET CSE | July 2018 | Part 2 | Question: 24
Answer key ☟
38.10.1 Graph Connectivity: UGC NET CSE | September 2013 | Part 2 | Question: 20
I. A graph in which there is a unique path between every pair of vertices is a tree.
II. A connected graph with e=v-1 is a tree
III. A connected graph with e=v-1 that has no circuit is a tree
Answer key ☟
A. B. C. D.
ugcnetcse-aug2016-paper3 data-structures hashing
Answer key ☟
Answer key ☟
A hash function f defined as f(key) = key mod 7, with linear probing used to resolve collisions. Insert the keys
37, 38, 72, 48, 98 and 11 into the table indexed from 0 to 6.
(A) 3
(B) 4
(C) 5
(D) 6
ugcnetcse-dec2009-paper2 data-structures hashing
Answer key ☟
A hash table has space for records, then the probability of collision before the table is % full.
A. B. C. D.
ugcnetcse-dec2011-paper2 data-structures hashing
Answer key ☟
A hash function defined as , with linear probing is used to insert keys 55, 58, 68, 91,
27, 145. What will be the location of 79?
A. 1 B. 2 C. 3 D. 4
ugcnetcse-dec2012-paper2 data-structures hashing
Answer key ☟
Answer key ☟
A hash function h defined h(key)=key mod 7, with linear probing, is used to insert the keys 44, 45, 79, 55, 91,
18, 63 into a table indexed from 0 to 6. What will be the location of key 18?
A. 3 B. 4 C. 5 D. 6
ugcnetcse-july2018-paper2 data-structures hashing
Answer key ☟
38.11.8 Hashing: UGC NET CSE | July 2018 | Part 2 | Question: 70
Consider a hash table of sze seven, with starting index zero, and a hash function (7x+3) mod 4. Assuming that
the hash table is initially empty, which of the following is the contents of the table when the sequence 1, 3, 8, 10
is inserted into the table using closed hashing? Here "____" denotes an empty location in the table.
A. 3, 10, 1, 8, ___ , ____ , ____ B. 1, 3, 8, 10, ___, ___, ___
C. 1, ___, 3, ___, 8, ___, 10 D. 3, 10, ___, ____, 8, ___, ___
ugcnetcse-july2018-paper2 data-structures hashing
Answer key ☟
A chained hash table has an array size of . What is the maximum number of entries that can be placed in the
table ?
A. B.
C. D. There is no upper limit
ugcnetcse-june2010-paper2 data-structures hashing
Answer key ☟
Searching for an element in the hash table requires time for the _________time, whereas for direct
addressing it holds for the _______ time.
A. worst-case, average B. worst-case, worst-case
C. average, worst-case D. best, average
ugcnetcse-june2014-paper2 hashing data-structures
Answer key ☟
If is chosen from a universal collection of hash functions and is used to hash keys into a table of size ,
where , the expected number of collisions involving a particular key is
A. Less than B. Less than
C. Greater than D. Greater than
ugcnetjune2014iii data-structures hashing
Answer key ☟
Consider a hash table of size seven with starting index zero and a hash function . Assuming the
hash table is initially empty. Which of the following is the content of the table when the sequence , is
inserted into the table using closed hashing? Here " denotes an empty location in the table.
A. _,_ B. _,
C. _, ,_, D. _ ,_
ugcnetcse-june2023-paper2 data-structures hashing
Answer key ☟
Consider a hash table of size m=100 and the hash function h(k)=floor (m(kA mod 1)) for
. Compute the location to which the key k=123456 is placed in hash table
A. 77 B. 82 C. 88 D. 89
ugcnetcse-june2015-paper3 data-structures hashing
Answer key ☟
38.12 Infix Prefix (2)
38.12.1 Infix Prefix: UGC NET CSE | August 2016 | Part 2 | Question: 25
A. B. C. D.
ugcnetcse-aug2016-paper2 data-structures infix-prefix
Answer key ☟
38.12.2 Infix Prefix: UGC NET CSE | June 2012 | Part 2 | Question: 1
Answer key ☟
38.13.1 Linear Probing: UGC NET CSE | December 2005 | Part 2 | Question: 22
A hash function defined as , with linear probing it is used to insert the key
into a table index from to . What will be the locations of :
A. B. C. D.
ugcnetcse-dec2005-paper2 data-structures hashing linear-probing
Answer key ☟
38.14.1 Linked List: UGC NET CSE | August 2016 | Part 2 | Question: 21
Consider an implementation of unsorted single linked list. Suppose it has its representation with a head and a tail
pointer (i.e. pointers to the first and last nodes of the linked list). Given the representation, which of the
following operation can not be implemented in time ?
Answer key ☟
38.14.2 Linked List: UGC NET CSE | December 2009 | Part 2 | Question: 24
(A) An algorithm to search for an element in a singly linked list requires 0(n)
operations in the worst case.
(B) An algorithm for deleting the first element in a singly linked list requires 0(n)
operations in the worst case.
(C) An algorithm for finding the maximum value in a circular linked list requires 0(n)
operations.
(D) An algorithm for deleting the middle node of a circular linked list requires 0(n)
operations.
ugcnetcse-dec2009-paper2 data-structures linked-list time-complexity
Answer key ☟
38.15.1 Max Heap: UGC NET CSE | July 2016 | Part 3 | Question: 33
Answer key ☟
38.16.1 Minimum Spanning Tree: UGC NET CSE | August 2016 | Part 3 | Question: 33
Consider a weighted complete graph on the vertex set such that the weight of the edge
is . The weight of minimum cost spanning tree of is :
A. B. C. D.
ugcnetcse-aug2016-paper3 data-structures minimum-spanning-tree
Answer key ☟
38.16.2 Minimum Spanning Tree: UGC NET CSE | December 2008 | Part 2 | Question: 3
The total number of spanning trees that can be drawn using five labeled vertices is:
1. 125
2. 64
3. 36
4. 16
Answer key ☟
Answer key ☟
38.18.1 Priority Queue: UGC NET CSE | August 2016 | Part 3 | Question: 34
A priority queue is implemented as a max-heap. Initially, it has five elements. The levelorder traversal of the
heap is as follows :
20, 18, 15, 13, 12
Two new elements ‘10’ and ‘17’ are inserted in the heap in that order. The level-order traversal of the heap after the
insertion of the element is :
A. 20, 18, 17, 15, 13, 12, 10 B. 20, 18, 17, 12, 13, 10, 15
C. 20, 18, 17, 10, 12, 13, 15 D. 20, 18, 17, 13, 12, 10, 15
ugcnetcse-aug2016-paper3 data-structures priority-queue
Answer key ☟
38.18.2 Priority Queue: UGC NET CSE | June 2010 | Part 2 | Question: 22
Answer key ☟
Answer key ☟
The initial configuration of quaue is . is at the front. To get the configuration how many
deletions and additions required:
A. deletions, additions B. deletions, additions
C. deletions, additions D. deletions, additions
ugcnetcse-dec2005-paper2 data-structures queue
Answer key ☟
At a hill station, the parking lot is one long drive way snaking up a hill side. Cars drive in and park right behind
the car in front of them, one behind another. A car can’t leave until all the cars in front of it have left. Is the
parking lot more like
(A) An array
(B) A stack
(C) A queue
Answer key ☟
38.19.4 Queue: UGC NET CSE | June 2009 | Part 2 | Question: 26
Answer key ☟
Answer key ☟
38.20.1 Quick Sort: UGC NET CSE | September 2013 | Part 2 | Question: 10
Suppose that the splits at every level of Quicksort are in proportion , where is a constant.
The number of elements in an array is n. The maximum depth is approximately
A. 0.5 Ig n B. 0.5 (1- ) Ig n
C. -(Ig n)/(Ig ) D. -(Ig n)/Ig (1- )
ugcnetsep2013ii data-structures sorting algorithms quick-sort
Answer key ☟
38.21.1 Radix Sort: UGC NET CSE | August 2016 | Part 3 | Question: 35
If there are integers to sort, each integer has d digits, and each digit is in the set , radix sort can
sort the numbers in :
A. B.
C. D.
ugcnetcse-aug2016-paper3 data-structures radix-sort
Answer key ☟
38.21.2 Radix Sort: UGC NET CSE | July 2018 | Part 2 | Question: 28
The maximum number of comparisons needed to sort 9 items using radix sort is (assume each item is 5 digit
octal number):
A. 45 B. 72 C. 360 D. 450
ugcnetcse-july2018-paper2 data-structures radix-sort
Answer key ☟
Answer key ☟
38.23.1 Relational Algebra: UGC NET CSE | October 2020 | Part 2 | Question: 64
Match with
Let and
Answer key ☟
What is the time required to insert an element in a stack with linked implementation ?
A. B. C. D.
ugcnetcse-dec2006-paper2 stack
Answer key ☟
Given an empty stack, after performing push(1), push(2), pop, push(3), push(4), pop, pop, push(5), pop, what is
the value of the top of the stack?
A. 4 B. 3 C. 2 D. 1
ugcnetcse-dec2012-paper2 data-structures stack
Answer key ☟
Which of the following permutations can be obtained in the output using a stack of size 3 elements assuming
that input, sequence is 1, 2, 3, 4, 5?
A. 3, 2, 1, 5, 4 B. 5, 4, 3, 2, 1
C. 3, 4, 5, 2, 1 D. 3, 4, 5, 1, 2
ugcnetcse-dec2012-paper3 data-structures stack
Answer key ☟
How many PUSH and POP operations will be needed to evaluate the following expression by reverse polish
notation in a stack machine ?
A. PUSH and POP instructions B. PUSH and POP instructions
C. PUSH and POP instructions D. PUSH and POP instructions
ugcnetcse-dec2014-paper2 data-structures stack
Answer key ☟
Convert the following infix expression into its equivalent post fix expression ^
A. ^ B. ^
C. ^ D. ^
ugcnetcse-dec2014-paper2 data-structures stack
Answer key ☟
The seven elements and are pushed onto a stack in reverse order, i.e., starting from . The
stack is popped five times and each element is inserted into a queue. Two elements are deleted from the queue
and pushed back onto the stack. Now, one element is popped from the stack. The popped item is ___________.
A. B. C. D.
ugcnetjan2017ii data-structures stack
Answer key ☟
Answer key ☟
Answer key ☟
What is the time required to insert an element in a stack with linked implementation?
A. B. C. D.
ugcnetcse-june2005-paper2 data-structures linked-list stack
Answer key ☟
If we have six stack operationspushing and popping each of and -such that push must occur before
push which must occur before push , then is a possible order for the pop operations, since this
could be our sequence : push , pop , push , push , pop , pop . Which one of the following orders
could not be the order the pop operations are run, if we are to satisfy the requirements described above?
A. B. C. D.
ugcnetcse-june2010-paper2 data-structures stack
Answer key ☟
The following postfix expression is evaluated using a stack. 823^/23*+51*- . The top two elements of the stack
after first * is evaluated
A. 6,1 B. 5, 7 C. 3,2 D. 1, 5
ugcnetcse-june2012-paper3 data-structures stack
Answer key ☟
A.
B.
C.
D.
Answer key ☟
Answer key ☟
In which tree, for every node the height of its left subtree and right subtree differ almost by 1?
A. Binary Search Tree B. AVL Tree
C. Threaded Binary Tree D. Complete Binary Tree
ugcnetcse-dec2012-paper2 data-structures tree binary-tree
Answer key ☟
Suppose that someone starts with a chain letter. Each person who receives the letter is asked to send it on to
other people. Some people do this, while some do not send any letter. How many people have seen the letter,
including the first person, if none receives more than one letter and if the chain letter ends after there have been 100
people who read it but did not send it out? Also find out how many people sent out the letter?
Answer key ☟
38.25.3 Tree: UGC NET CSE | December 2014 | Part 2 | Question: 02
A certain tree has two vertices of degree , one vertex of degree and one vertex of degree . If the other vertices
have degree , how many vertices are there in the graph ?
A. B. C. D.
ugcnetcse-dec2014-paper2 data-structures tree
Answer key ☟
A tree with n vertices is called graceful, if its vertices can be labelled with integers 1, , ..., n such that the
absolute value of the difference of the labels of adjacent vertices are all different. Which of the following trees
are graceful?
a.
c.
b.
Answer key ☟
Suppose you are given a binary tree with n nodes, such that each node has exactly eiter zero or two children. The
maximum height of the tree will be
A. B. C. D.
ugcnetcse-july2016-paper2 data-structures tree
Answer key ☟
A 5-ary tree in which every internal node has exactly 5 children. The number of left nodes in such a tree with 8
internal nodes will be:
A. 30 B. 33 C. 45 D. 125
ugcnetcse-july2018-paper2 data-structures tree
Answer key ☟
In a complete binary tree of n nodes, how far are the two most distant nodes ? Assume each edge in the path
counts as !
A. About B. About
C. About D. About
ugcnetcse-june2010-paper2 data-structures tree
Answer key ☟
Answer key ☟
A. Binary tree
B. B-tree
C. AVL-tree
D. Expression tree
ugcnetcse-june2012-paper2 programming tree
Answer key ☟
Answer key ☟
A. 32 B. 36 C. 120 D. 42
ugcnetcse-june2012-paper3 data-structures tree
Answer key ☟
38.26.1 Tree Traversal: UGC NET CSE | December 2015 | Part 2 | Question: 38
A.
B.
C.
D.
ugcnetcse-dec2015-paper2 data-structures tree-traversal
Answer key ☟
Answer Keys
38.0.1 B 38.0.2 Q-Q 38.0.3 Q-Q 38.0.4 Q-Q 38.0.5 Q-Q
38.0.6 Q-Q 38.0.7 Q-Q 38.0.8 Q-Q 38.0.9 Q-Q 38.0.10 Q-Q
38.0.11 Q-Q 38.0.12 Q-Q 38.0.13 Q-Q 38.0.14 Q-Q 38.1.1 D
38.1.2 Q-Q 38.2.1 X 38.3.1 Q-Q 38.4.1 Q-Q 38.4.2 B
38.4.3 Q-Q 38.4.4 D 38.4.5 X 38.4.6 B 38.4.7 A
38.5.1 Q-Q 38.5.2 Q-Q 38.5.3 D 38.5.4 C 38.5.5 Q-Q
38.5.6 C 38.6.1 Q-Q 38.6.2 Q-Q 38.6.3 B 38.6.4 D
38.6.5 C 38.6.6 C 38.6.7 C 38.7.1 A 38.8.1 Q-Q
38.8.2 C 38.8.3 C 38.8.4 D 38.8.5 B 38.8.6 C
38.8.7 C 38.9.1 Q-Q 38.10.1 D 38.11.1 Q-Q 38.11.2 Q-Q
38.11.3 Q-Q 38.11.4 Q-Q 38.11.5 X 38.11.6 C 38.11.7 Q-Q
38.11.8 Q-Q 38.11.9 Q-Q 38.11.10 C 38.11.11 A 38.11.12 Q-Q
38.11.13 C 38.12.1 Q-Q 38.12.2 A 38.13.1 Q-Q 38.14.1 Q-Q
38.14.2 Q-Q 38.15.1 C 38.16.1 Q-Q 38.16.2 Q-Q 38.17.1 D
38.18.1 Q-Q 38.18.2 Q-Q 38.19.1 Q-Q 38.19.2 Q-Q 38.19.3 Q-Q
38.19.4 Q-Q 38.19.5 C 38.20.1 D 38.21.1 B 38.21.2 Q-Q
38.22.1 C 38.23.1 D 38.24.1 Q-Q 38.24.2 D 38.24.3 A;C
38.24.4 B 38.24.5 A 38.24.6 B 38.24.7 B 38.24.8 C
38.24.9 Q-Q 38.24.10 Q-Q 38.24.11 A 38.24.12 B 38.24.13 A
38.25.1 B 38.25.2 C 38.25.3 D 38.25.4 D 38.25.5 C
38.25.6 Q-Q 38.25.7 Q-Q 38.25.8 Q-Q 38.25.9 B 38.25.10 C
38.25.11 D 38.26.1 D
39 Programming: Programming in C (84)
When a programming language has the capacity to produce new datatype, it is called as,
A. Overloaded Language B. Extensible Language
C. Encapsulated Language D. Abstraction Language
programming ugcnetcse-dec2012-paper3
Answer key ☟
Answer key ☟
______ comparisons are necessary in the worst case to find both the maximum and minimum of n numbers.
A. 2n – 2 B. n + floor (lg n) – 2
C. floor ( )–2 D. 2 lg n – 2
ugcnetcse-dec2013-paper3 programming
Answer key ☟
A. B. C. D.
ugcnetcse-june2012-paper3 programming algorithms
Answer key ☟
Enumeration is a process of
A. Declaring a set of numbers B. Sorting a list of strings
C. Assigning a legal values possible for a variable D. Sequencing a list of operators
ugcnetcse-dec2012-paper2 programming
Answer key ☟
39.0.6 UGC NET CSE | June 2013 | Part 3 | Question: 50
Answer key ☟
The programming languages C and C++ are not strongly typed languages because
A. Both C and C++ allow functions for which parameters are not type checked
B. Both C and C++ allow functions for which parameters are type checked
C. Both C and C++ allow functions for which parameters are not type checked and also the union types in these
languages are not type checked.
D. Union types in these (C and C++) languages are not type checked
ugcnetcse-sep2013-paper3 programming
Answer key ☟
Which of the following concepts means adding new concepts to a program as it runs?
A. Data hiding B. Dynamic loading
C. Dynamic typing D. Dynamic binding
ugcnetcse-dec2013-paper3 programming
Answer key ☟
Answer key ☟
A. B.
C. D.
ugcnetcse-dec2013-paper3 programming
Answer key ☟
In C++, which system - provided function is called when no handler is provided to deal with an exception?
Answer key ☟
The ____ transfers the executable image of a C++ program from hard disk to main memory
Answer key ☟
What is the value returned by the function f given below when n=100?
let f(int n)
{ if (n==0) then return n;
else
return n+f(n-2);
}
Answer key ☟
i. To implement Abstract Data Type, a programming language require a syntactic unit to encapsulate type definition
ii. To implement ADT, a programming language requires some primitive operations that are built in the language
processor
iii. C++, Ada, Java 5.0, C#2005 provide support for parameterised ADT
Answer key ☟
Match the following types of variables with the corresponding programming languages :
A. B.
C. D.
ugcnetcse-july2016-paper3 programming
Answer key ☟
Which of the following is false regarding the evaluation of computer programming language:
A. Application oriented features B. Efficiency and reliability
C. Software development D. Hardware maintenance cost
ugcnetcse-july2016-paper3 programming
Answer key ☟
A. B.
C. D.
ugcnetcse-aug2016-paper3 programming
Answer key ☟
P : “Program is a step by step execution of the instructions”. Given P, which of the following is true ?
ugcnetcse-dec2009-paper2 programming
Answer key ☟
ugcnetcse-june2009-paper2
Answer key ☟
There exists a construct which returns a value ‘true’ if the argument subquery is :
A. empty
B. non-empty
C. in error
D. none of the above
ugcnetcse-june2009-paper2
Answer key ☟
A function object :
ugcnetcse-dec2004-paper2
Answer key ☟
A. B. C. D.
ugcnetcse-dec2004-paper2
Answer key ☟
Answer key ☟
A. B. C. D.
ugcnetcse-dec2006-paper2
B. x='A';
switch(x)
{case 'A' <= x <= 'C' : printf ( "%d\n" , x);}
C. x='A' ;
switch(x)
{
case 'A' : printf ( "%d\n" , x);
break;
case 'B' : printf ( "%d\n" , x);
break;
case 'C' : printf ( "%d\n" , x);
break;
}
D. x='A' ;
switch(x)
{
case 'A' =printf ( "%d\n" , x);
case 'B' =printf ( "%d\n" , x);
case 'C' =printf ( "%d\n" , x);
}
ugcnetcse-dec2007-paper2
Answer key ☟
What cannot replace ‘?’ in the following C-code to print all odd numbers less than ?
for (i=1; ? ; i=i+2)
printf("%d\n", i);
1.
2.
3.
4.
ugcnetcse-dec2007-paper2
Answer key ☟
Answer key ☟
When an array is passed as a parameter to a function which of the following statements is correct?
A. The function can values in the original array B. The function cannot values in the original array
C. Results in compilation error D. Results in run-time error
ugcnetcse-june2013-paper3 programming-in-c array
Answer key ☟
What is the output of the following program: (Assume that the appropriate preprocessor directives are included
and there is not syntax error)
main( )
{ char S[]="ABCDEFGH";
printf("%C", *(&S[3]));
printf("%s", S+4);
printf("%u", S);
/*Base address of S is 1000 */
}
A. B. C. D.
ugcnetcse-june2015-paper2 programming-in-c array
Answer key ☟
Suppose you are compiling on a machine with -byte chars, -byte shorts, -byte ints, and -byte doubles, and
with alignment rules that require the address of every primitive data element to be an integer multiple of the
element’s size. Suppose further that the compiler is not permitted to reorder fields; padding is used to ensure alignment.
How much space will be consumed by the following array?
struct {
short s;
char c;
short t;
char d;
double r;
int i;
} A[10]; /*10 element array of structs */
Answer key ☟
39.3.1 Binary Search Tree: UGC NET CSE | December 2014 | Part 3 | Question: 36
Suppose that we have numbers between and in a binary search tree and we want to search for the number
. Which of the following sequences could not be the sequence of nodes examined ?
A.
B.
C.
D.
Answer key ☟
Suppose and are two Integer Variables having values and respectively. The result (in hex)
of applying bitwise operator and to and will be :
1.
2.
3.
4.
Answer key ☟
39.5.1 Data Types: UGC NET CSE | December 2005 | Part 2 | Question: 11
A. 4 4 4 B. 4 8 10 C. 8 4 8 D. 8 8 8
ugcnetcse-dec2005-paper2 programming-in-c data-types
Answer key ☟
39.5.2 Data Types: UGC NET CSE | June 2010 | Part 2 | Question: 15
Answer key ☟
39.6.1 Dynamic Memory Allocation: UGC NET CSE | June 2012 | Part 3 | Question: 24
The ____________ memory allocation function modifies the previous allocated space.
Answer key ☟
39.7.1 Evaluation Postfix: UGC NET CSE | December 2013 | Part 2 | Question: 21
What is the value of the postfix expression a b c d + - * (where a=8, b=4, c=2 and d=5)
A. B. C. 24 D. -24
ugcnetcse-dec2013-paper2 evaluation-postfix
Answer key ☟
Which of the following are two special functions that are meant for handling exception, that occur during
exception handling itself?
Answer key ☟
39.9.1 Expression Evaluation: UGC NET CSE | December 2004 | Part 2 | Question: 13
A. B. C. D. None of these
ugcnetcse-dec2004-paper2 programming-in-c expression-evaluation operator-precedence
Answer key ☟
39.10.1 File Handling: UGC NET CSE | December 2012 | Part 2 | Question: 42
Which of the following mode declaration used in C++ to open a file for input?
Answer key ☟
39.11.1 Graph Coloring: UGC NET CSE | June 2012 | Part 3 | Question: 31
A. B. C. D.
ugcnetcse-june2012-paper3 graph-theory graph-coloring
Answer key ☟
A. x=1
B. compilation error
C. x=20
D. none of the above
Answer key ☟
Answer key ☟
Answer key ☟
The mechanism that binds code and data together and keeps them secure form outside world is known as
Answer key ☟
A. B.
C. D.
ugcnetcse-june2012-paper3 non-gatecse object-oriented-programming java match-the-following
Answer key ☟
If the queue is implemented with a linked list, keeping track of a front pointer, which of these pointers will
change during an insertion into an non-empty queue?
A. Neither of the pointer change B. Only front pointer changes
C. Only rear pointer changes D. Both of the pointer changes
ugcnetcse-dec2013-paper2 data-structures linked-list
Answer key ☟
Answer key ☟
39.16.1 Non Gatecse: UGC NET CSE | December 2012 | Part 2 | Question: 15
Answer key ☟
39.16.2 Non Gatecse: UGC NET CSE | December 2015 | Part 3 | Question: 9
A. B.
C. D.
ugcnetcse-dec2015-paper3 programming non-gatecse
Answer key ☟
39.16.3 Non Gatecse: UGC NET CSE | June 2012 | Part 2 | Question: 38
printf(“%c”, 100);
Answer key ☟
39.16.4 Non Gatecse: UGC NET CSE | June 2014 | Part 3 | Question: 10
Code blocks allow many algorithms to be implemented with the following parameters :
A. clarity, elegance, performance B. clarity, elegance, efficiency
C. elegance, performance, execution D. execution, clarity, performance
ugcnetjune2014iii programming non-gatecse
Answer key ☟
39.17.1 Object Oriented Programming: UGC NET CSE | December 2009 | Part 2 | Question: 14
Encapsulation is
Answer key ☟
39.17.2 Object Oriented Programming: UGC NET CSE | December 2009 | Part 2 | Question: 14
(B) Destructor
(C) Constructor
(D) Structure
ugcnetcse-dec2009-paper2 programming object-oriented-programming
Answer key ☟
39.17.3 Object Oriented Programming: UGC NET CSE | December 2009 | Part 2 | Question: 15
(D) I, II, IV
ugcnetcse-dec2009-paper2 object-oriented-programming
Answer key ☟
39.18 Operator Precedence (1)
39.18.1 Operator Precedence: UGC NET CSE | June 2010 | Part 2 | Question: 33
A. B. C. D.
ugcnetcse-june2010-paper2 programming operator-precedence
Answer key ☟
A. B. C. D.
ugcnetcse-dec2005-paper2 programming-in-c operators
Answer key ☟
Answer key ☟
void main ()
{
char *p= "ayqm";
char c;
c=++*p;
printf ("%c" , c);
}
A. B. C. D.
ugcnetcse-june2010-paper2 programming-in-c pointers
Answer key ☟
Which among the following is (are) able to modify previously allocated space
B. I , II and III
C. III only
D. II only
programming-in-c
Answer key ☟
Answer key ☟
Answer key ☟
main ()
{ int x = 128;
printf ("\n%d", 1+x++);
}
A. B. C. D.
ugcnetcse-dec2014-paper2 programming-in-c
Answer key ☟
Given i=0, j=1, k=-1, x=0.5, y=0.0, what is the output of the following expression in C language?
x*y<i+j k
A. -1 B. 0 C. 1 D. 2
ugcnetcse-july2016-paper2 programming-in-c
Answer key ☟
ugcnetcse-july2016-paper2 programming-in-c
Answer key ☟
Which of the above must be considered as primary design issues for arithmetic expressions?
A. B.
C. D.
ugcnetcse-june2013-paper3 programming-in-c
Answer key ☟
A. B.
C. D.
ugcnetcse-june2013-paper3 programming-in-c
Answer key ☟
Answer key ☟
Answer key ☟
A. B.
C. D.
ugcnetjune2014iii programming programming-in-c
Answer key ☟
S B[10];
S*p=&B[4];
S*q=&B[5];
p → U.b=0x1234;
/* structure S takes 32-bits */
A. B. C. D.
ugcnetcse-june2019-paper2 programming-in-c
Answer key ☟
A. B. C. D.
ugcnetcse-june2015-paper2 programming-in-c
Answer key ☟
Assume that and are non-zero positive integers. What does the following program segment perform?
while (x!=0)
{
if(x>y)
x=x-y;
else y=y-x;
printf(“%d”, x)
}
Answer key ☟
Answer key ☟
Consider the following pseudo-code fragment in which an invariant for the loop is “ and ”
(here, and are integer variable that have been initialized):
/* Pre-conditions : */
/* Assume that overflow never occurs */
int ; int ; int ;
while {
if (k is odd) then ;
;
; /* floor */
}
Which of the following must be true ar the end of the while loop?
A. B. C. D.
ugcnetcse-june2019-paper2 pseudocode
Answer key ☟
39.23.1 Row Major Address Calculation: UGC NET CSE | December 2014 | Part 2 | Question: 24
Consider an array , assume words per memory cell and the base address of array is . What is the
address of ? Assume row major storage.
A. B. C. D.
ugcnetcse-dec2014-paper2 array row-major-address-calculation
Answer key ☟
39.24.1 Storage Classes In C: UGC NET CSE | June 2009 | Part 2 | Question: 16
Which of the following does not represent a valid storage class in ’c’?
A. automatic B. static
C. union D. extern
ugcnetcse-june2009-paper2 programming-in-c storage-classes-in-c
Answer key ☟
39.24.2 Storage Classes In C: UGC NET CSE | June 2014 | Part 2 | Question: 41
A. B.
C. D.
ugcnetcse-june2014-paper2 programming-in-c storage-classes-in-c
Answer key ☟
39.25.1 Tree Traversal: UGC NET CSE | Junet 2015 | Part 2 | Question: 23
Level order Traversal of a rooted Tree can be done by starting from root and performing:
A. Breadth First Search B. Depth First Search
C. Root Search D. Deep Search
ugcnetcse-june2015-paper2 data-structures tree-traversal
Answer key ☟
39.26.1 Undefined Behaviour: UGC NET CSE | June 2009 | Part 2 | Question: 15
What is the value of after the execution of the following code statements :
A.
B.
C.
D. None
Answer key ☟
What is the output of the following ‘C’ program? (Assuming little – endian representation of multi-byte data in
which Least Significant Byte (LSB) is stored at the lowest memory address.)
#include<stdio.h>
#include<stdlib.h>
/* Assume short int occupies two bytes of storage */
int main ()
{
union saving
{
short int one;
char two[2];
};
union saving m;
m.two [0] =5;
m.two [1] =2;
printf(“%d, %d, %d\n”, m.two[0], m.two[1], m.one);
}/* end of main */
A. 5, 2, 1282 B. 5, 2, 52 C. 5, 2, 25 D. 5, 2, 517
ugcnetcse-july2018-paper2 programming-in-c union
Answer key ☟
39.28.1 Variable Scope: UGC NET CSE | December 2008 | Part 2 | Question: 25
A. It cannot be initialized
B. It is initialized once at the commencement of execution and cannot be changed at run time
C. It retains its value during the life of the program
D. None of the above
Answer key ☟
39.28.2 Variable Scope: UGC NET CSE | June 2005 | Part 2 | Question: 11
After calls of the function bug ( ) below, the values of and will be :
int j = 1;
bug ()
{
static int i = 0; int j = 0;
i++; j++;
return (i);
}
A. B. C. D.
ugcnetcse-june2005-paper2 programming-in-c variable-scope
Answer key ☟
39.28.3 Variable Scope: UGC NET CSE | June 2005 | Part 2 | Question: 12
A. B. C. D.
ugcnetcse-june2005-paper2 programming-in-c variable-scope
Answer key ☟
39.28.4 Variable Scope: UGC NET CSE | June 2005 | Part 2 | Question: 15
Main()
{ char *str="abcde";
printf("%c",*str);
printf("%c",*str++);
printf("%c",*(str++));
printf("%s",str);
}
Answer key ☟
Answer Keys
39.0.1 B 39.0.2 A 39.0.3 C 39.0.4 A 39.0.5 C
39.0.6 X 39.0.7 C 39.0.8 B 39.0.9 C 39.0.10 A
39.0.11 A 39.0.12 D 39.0.13 A 39.0.14 D 39.0.15 C
39.0.16 D 39.0.17 Q-Q 39.0.18 Q-Q 39.0.19 C 39.0.20 Q-Q
39.0.21 A 39.0.22 Q-Q 39.0.23 Q-Q 39.0.24 Q-Q 39.0.25 Q-Q
39.0.26 Q-Q 39.1.1 Q-Q 39.2.1 A 39.2.2 D 39.2.3 C
39.3.1 C 39.4.1 B 39.5.1 Q-Q 39.5.2 Q-Q 39.6.1 D
39.7.1 D 39.8.1 A 39.9.1 Q-Q 39.10.1 D 39.11.1 C
39.12.1 Q-Q 39.13.1 B 39.13.2 Q-Q 39.13.3 C 39.13.4 A
39.14.1 C 39.15.1 Q-Q 39.16.1 B 39.16.2 B 39.16.3 B
39.16.4 B 39.17.1 Q-Q 39.17.2 Q-Q 39.17.3 Q-Q 39.18.1 Q-Q
39.19.1 Q-Q 39.20.1 X 39.20.2 Q-Q 39.21.1 Q-Q 39.21.2 B
39.21.3 D 39.21.4 B 39.21.5 C 39.21.6 A 39.21.7 D
39.21.8 A 39.21.9 C 39.21.10 D 39.21.11 A 39.21.12 C
39.21.13 A 39.21.14 B 39.21.15 A 39.22.1 B 39.23.1 A
39.24.1 Q-Q 39.24.2 B 39.25.1 A 39.26.1 Q-Q 39.27.1 Q-Q
39.28.1 Q-Q 39.28.2 Q-Q 39.28.3 Q-Q 39.28.4 Q-Q
40 Theory of Computation (143)
There are exactly ____ different finite automata with three states , and over the alphabet where is
always the start state
A. B. C. D.
ugcnetcse-dec2015-paper3 theory-of-computation
Answer key ☟
Answer key ☟
Answer key ☟
Answer key ☟
40.0.5 UGC NET CSE | June 2012 | Part 3 | Question: 25, UGCNET-Dec2013-III: 42
Answer key ☟
Answer key ☟
Answer key ☟
A.
B.
C.
D.
ugcnetcse-dec2012-paper3 theory-of-computation
Answer key ☟
Given a Non-deterministic Finite Automaton (NFA) with states and as initial and final states respectively and
transition table as given below
The minimum number of states required in Deterministic Finite Automaton (DFA) equivalent to NFA is
A. B. C. D.
ugcnetcse-june2013-paper2 theory-of-computation
Answer key ☟
A.
B.
C.
D.
ugcnetcse-june2013-paper3 theory-of-computation
Answer key ☟
Codes:
A. B.
C. D.
ugcnetcse-june2013-paper3 theory-of-computation match-the-following easy
Answer key ☟
Answer key ☟
Answer key ☟
Answer key ☟
:
Which of the following is correct?
Answer key ☟
A. B. C. D.
ugcnetcse-dec2015-paper3 theory-of-computation
Answer key ☟
ugcnetcse-dec2014-paper3 theory-of-computation
Answer key ☟
A. Both time and space complexities are better in recursive than in non-recursive program
B. Both time and space complexities are better in non-recursive than in recursive program
C. Time complexity is better in recursive version but space complexity is better in non-recursive version of a program
D. Space complexity is better in recursive version but time complexity is better in non-recursive version of a program
ugcnetcse-dec2015-paper2 theory-of-computation
Answer key ☟
Answer key ☟
Any syntactic construct that can be described by a regular expression can also be described by a :
A. Context sensitive grammar B. Non context free grammar
C. Context free grammar D. None of the above
ugcnetcse-june2009-paper2
Answer key ☟
To obtain a string of n Terminals from a given Chomsky normal from grammar, the number of productions to be
used is
A. B. C. D.
ugcnetcse-july2018-paper2 theory-of-computation conjunctive-normal-form
Answer key ☟
Answer key ☟
Answer key ☟
i. Intersection
ii. Union
iii. Complementation
iv. Kleene Star
A. (i) and (iv) B. (i) and (iii) C. (ii) and (iv) D. (ii) and (iii)
ugcnetcse-dec2004-paper2
Answer key ☟
A. B. C. D.
ugcnetcse-dec2006-paper2
Answer key ☟
Then , the language accepted by the machine M, is the set of all strings having :
A. two or more b’s B. three or more b’s
C. two or more a’s D. three or more a’s
ugcnetcse-dec2007-paper2
Answer key ☟
Answer key ☟
40.1.1 Closure Property: UGC NET CSE | December 2012 | Part 3 | Question: 38
Answer key ☟
40.1.2 Closure Property: UGC NET CSE | January 2017 | Part 3 | Question: 21
i. A class of languages that is closed under union and complementation has to be closed under intersection
ii. A class of languages that is closed under union and intersection has to be closed under complementation
Answer key ☟
40.1.3 Closure Property: UGC NET CSE | June 2012 | Part 2 | Question: 40
Answer key ☟
A.
B.
C.
D.
Answer key ☟
40.3.1 Context Free Grammar: UGC NET CSE | August 2016 | Part 3 | Question: 57
Let be a context-free grammar such that every one of its productions is of the form ,
with . The derivation tree for any string has a height such that
A. B.
C. D.
ugcnetcse-aug2016-paper3 theory-of-computation context-free-grammar
40.3.2 Context Free Grammar: UGC NET CSE | December 2005 | Part 2 | Question: 4
A. B. C. D.
ugcnetcse-dec2005-paper2 theory-of-computation context-free-grammar grammar
Answer key ☟
40.3.3 Context Free Grammar: UGC NET CSE | December 2009 | Part 2 | Question: 34
Answer key ☟
40.3.4 Context Free Grammar: UGC NET CSE | December 2013 | Part 2 | Question: 27
A.
B.
C.
D.
Answer key ☟
40.3.5 Context Free Grammar: UGC NET CSE | December 2014 | Part 2 | Question: 35
will generate
A. Odd numbers of and odd numbers of B. Even numbers of and even numbers of
C. Equal numbers of and D. Different numbers of and
ugcnetcse-dec2014-paper2 theory-of-computation context-free-grammar
Answer key ☟
40.3.6 Context Free Grammar: UGC NET CSE | January 2017 | Part 3 | Question: 22
Let be a context-free grammer such that every one of its productions is of the form ,
with . The derivation tree for any has a height such that
A.
B.
C.
D.
Answer key ☟
40.3.7 Context Free Grammar: UGC NET CSE | June 2012 | Part 3 | Question: 28
(i)
(ii)
(iii)
A. (i) and (ii) B. (i) and (iii) C. (ii) and (iii) D. (i), (ii) and (iii)
ugcnetcse-june2012-paper3 theory-of-computation context-free-grammar
Answer key ☟
40.3.8 Context Free Grammar: UGC NET CSE | June 2013 | Part 3 | Question: 38
For every context free grammar (G) there exists an algorithm that passes any in number of steps
proportional to
A. B.
C. D.
ugcnetcse-june2013-paper3 theory-of-computation context-free-grammar
Answer key ☟
40.3.9 Context Free Grammar: UGC NET CSE | Junet 2015 | Part 3 | Question: 61
A.
B.
C.
D.
Answer key ☟
40.4.1 Context Free Language: UGC NET CSE | December 2011 | Part 2 | Question: 38
Answer key ☟
40.4.2 Context Free Language: UGC NET CSE | December 2018 | Part 2 | Question: 36
Consider to be any regular language and , be any two context-free languages. Which of the following is
correct?
Answer key ☟
40.4.3 Context Free Language: UGC NET CSE | January 2017 | Part 3 | Question: 23
Answer key ☟
40.4.4 Context Free Language: UGC NET CSE | July 2016 | Part 3 | Question: 56
ugcnetcse-july2016-paper3 context-free-language
Answer key ☟
40.4.5 Context Free Language: UGC NET CSE | June 2012 | Part 3 | Question: 39
Answer key ☟
40.4.6 Context Free Language: UGC NET CSE | June 2014 | Part 2 | Question: 09
A.
B.
C.
D.
Answer key ☟
40.4.7 Context Free Language: UGC NET CSE | June 2019 | Part 2 | Question: 77
How can the decision algorithm be constructed for deciding whether context-free language is finite?
Answer key ☟
40.4.8 Context Free Language: UGC NET CSE | October 2020 | Part 2 | Question: 29
Answer key ☟
40.5.1 Context Sensitive: UGC NET CSE | December 2015 | Part 3 | Question: 22
The family of context sensitive languages is _____ under union and ____ under reversal
A. closed, not closed B. not closed, not closed
C. closed, closed D. not closed, closed
ugcnetcse-dec2015-paper3 theory-of-computation closure-property context-sensitive
Answer key ☟
40.5.2 Context Sensitive: UGC NET CSE | July 2018 | Part 2 | Question: 37
Answer key ☟
Answer key ☟
Which of the following problems is/are decidable problem(s) (recursively enumerable) on turing machine ?
i. is a CFG with
ii. There exist two TMs and such that language of all TMs.
iii. is a TM that accepts using at most cells of tape
Answer key ☟
Answer key ☟
Let and be arbitrary context free languages and an arbitrary regular language. Consider the following
problems:
i. Is ?
ii. Is ?
iii. Is ?
Answer key ☟
40.6.5 Decidability: UGC NET CSE | October 2020 | Part 2 | Question: 87
Answer key ☟
Answer key ☟
40.8.1 Finite Automata: UGC NET CSE | December 2012 | Part 2 | Question: 44
Let L be set accepted by a non-deterministic finite automaton. The number of states in non-deterministic finite
automaton is . The maximum number of states in equivalent finite automaton that accepts L is
A. B.
C. D.
ugcnetcse-dec2012-paper2 theory-of-computation finite-automata
Answer key ☟
40.8.2 Finite Automata: UGC NET CSE | December 2012 | Part 3 | Question: 47
The minimum number of states of the non-deterministic finite automaton which accepts the language
is
A. 3 B. 4 C. 5 D. 6
ugcnetcse-dec2012-paper3 theory-of-computation finite-automata
Answer key ☟
40.8.3 Finite Automata: UGC NET CSE | December 2018 | Part 2 | Question: 32
The minimum number of states of finite automaton which accepts the language is
A. B. C. D.
ugcnetcse-dec2018-paper2 theory-of-computation finite-automata
Answer key ☟
40.8.4 Finite Automata: UGC NET CSE | July 2018 | Part 2 | Question: 31
Answer key ☟
40.8.5 Finite Automata: UGC NET CSE | July 2018 | Part 2 | Question: 32
Answer key ☟
40.8.6 Finite Automata: UGC NET CSE | June 2012 | Part 3 | Question: 16
I. The power of deterministic finite state machine and non- deterministic finite state machine are same.
II. The power of deterministic pushdown automaton and non- deterministic pushdown automaton are same.
Answer key ☟
40.8.7 Finite Automata: UGC NET CSE | Junet 2015 | Part 3 | Question: 19
Answer key ☟
40.8.8 Finite Automata: UGC NET CSE | Junet 2015 | Part 3 | Question: 21
Answer key ☟
40.8.9 Finite Automata: UGC NET CSE | November 2017 | Part 3 | Question: 23
Answer key ☟
40.8.10 Finite Automata: UGC NET CSE | September 2013 | Part 2 | Question: 13
The number of states in a minimal deterministic finite automaton corresponding to the language
is
A. 3 B. 4 C. 5 D. 6
ugcnetsep2013ii theory-of-computation finite-automata
Answer key ☟
A. The grammar , where is the only non-terminal symbol, and is the null string, is ambiguous.
B. An unambiguous grammar has same left most and right most derivation.
C. An ambiguous grammar can never be for any .
D. Recursive descent parser is a top-down parser.
Answer key ☟
Answer key ☟
40.9.3 Grammar: UGC NET CSE | December 2014 | Part 3 | Question: 62
A. B.
C. D.
ugcnetcse-dec2014-paper3 theory-of-computation grammar
Answer key ☟
Answer key ☟
Answer key ☟
A.
B.
C.
D.
Answer key ☟
Which of the following is/are the fundamental semantic model(s) of parameter passing?
Answer key ☟
40.9.8 Grammar: UGC NET CSE | June 2014 | Part 3 | Question: 73
Answer key ☟
A. B.
C. D.
ugcnetjune2014iii theory-of-computation grammar
Answer key ☟
If all the production rules have single non-terminal symbol on the left side, the grammar defined is:
A. Context free grammar B. Context sensitive grammar
C. Unrestricted grammar D. Phase grammar
ugcnetcse-june2015-paper2 theory-of-computation grammar
Answer key ☟
Answer key ☟
i.
ii.
iii.
Answer key ☟
A.
B.
C.
D.
Answer key ☟
Answer key ☟
A. The language corresponding to the given grammar is a set of even number of a’s
B. The language corresponding to the given grammar is a set of odd number of a’s
C. The language corresponding to the given grammar is a set of even number of a’s followed by odd number of b’s
D. The language corresponding to the given grammar is a set of odd number of a’s followed by even number of b’s
Answer key ☟
40.10.1 Identify Class Language: UGC NET CSE | December 2015 | Part 3 | Question: 28
Answer key ☟
40.10.2 Identify Class Language: UGC NET CSE | December 2019 | Part 2 | Question: 48
Answer key ☟
40.10.3 Identify Class Language: UGC NET CSE | January 2017 | Part 3 | Question: 61
Answer key ☟
40.10.4 Identify Class Language: UGC NET CSE | June 2014 | Part 3 | Question: 75
Answer key ☟
40.10.5 Identify Class Language: UGC NET CSE | October 2020 | Part 2 | Question: 71
Match with
Regular language, : Context free language
Recursive langauge, : Recursively enumerable language.
Answer key ☟
40.10.6 Identify Class Language: UGC NET CSE | September 2013 | Part 3 | Question: 19
is
A. B. C. D.
ugcnetcse-sep2013-paper3 theory-of-computation identify-class-language
Answer key ☟
40.10.7 Identify Class Language: UGC NET CSE | September 2013 | Part 3 | Question: 20
The language is
A. Context free but not linear B. Context free and linear
C. Not context free and not linear D. Not context free but linear
ugcnetcse-sep2013-paper3 theory-of-computation identify-class-language
Answer key ☟
40.10.8 Identify Class Language: UGC NET CSE | September 2013 | Part 3 | Question: 21
Answer key ☟
A. regular language
B. Not a deterministic context free language but a context free language
C. Recursive and is a deterministic context free language
D. Not recursive
Answer key ☟
40.12.1 Languages Classification: UGC NET CSE | June 2019 | Part 2 | Question: 76
Match with :
where Regular language
Context-free language
Recursive language
Recursively enumerable language
Answer key ☟
40.13.1 Languages Relationships: UGC NET CSE | December 2014 | Part 3 | Question: 61
Given the recursively enumerable language , the context sensitive language , the recursive language
, the context free language and deterministic context free language . The relationship
between these families is given by
A.
B.
C.
D.
ugcnetcse-dec2014-paper3 languages-relationships
Answer key ☟
How many states are there in a minimum state automata equivalent to regular expression given below?
Regular expression is
A. B. C. D.
ugcnetcse-june2019-paper2 finite-automata minimal-state-automata
Answer key ☟
Answer key ☟
40.16.1 Pumping Lemma: UGC NET CSE | December 2013 | Part 3 | Question: 40
A. B.
C. D.
ugcnetcse-dec2013-paper3 theory-of-computation context-free-language pumping-lemma
Answer key ☟
40.16.2 Pumping Lemma: UGC NET CSE | November 2017 | Part 3 | Question: 19
Answer key ☟
40.16.3 Pumping Lemma: UGC NET CSE | November 2017 | Part 3 | Question: 21
Answer key ☟
40.17.1 Pushdown Automata: UGC NET CSE | December 2014 | Part 3 | Question: 22
Answer key ☟
40.17.2 Pushdown Automata: UGC NET CSE | July 2018 | Part 2 | Question: 33
A pushdown automata behaves like a Turing machine when the number of auxiliary memory is
A. 0 B. 1 C. 1 or more D. 2 or more
ugcnetcse-july2018-paper2 theory-of-computation pushdown-automata
Answer key ☟
40.17.3 Pushdown Automata: UGC NET CSE | July 2018 | Part 2 | Question: 34
Answer key ☟
40.17.4 Pushdown Automata: UGC NET CSE | June 2013 | Part 3 | Question: 37
Answer key ☟
40.17.5 Pushdown Automata: UGC NET CSE | September 2013 | Part 3 | Question: 22
Non-deterministic pushdown automaton that accepts the language generated by the grammar: is
A.
B.
C.
D.
40.18.1 Recursive and Recursively Enumerable Languages: UGC NET CSE | January 2017 | Part 3 | Question: 63
Answer key ☟
40.18.2 Recursive and Recursively Enumerable Languages: UGC NET CSE | Junet 2015 | Part 3 | Question: 62
Answer key ☟
40.18.3 Recursive and Recursively Enumerable Languages: UGC NET CSE | October 2020 | Part 2 | Question: 27
Consider where
Answer key ☟
40.19.1 Regular Expression: UGC NET CSE | August 2016 | Part 2 | Question: 31
The number of strings of length 4 that are generated by the regular expression , where | is an
alternation character and are quantification characters, is :
A. B. C. D.
ugcnetcse-aug2016-paper2 theory-of-computation regular-expression
Answer key ☟
40.19.2 Regular Expression: UGC NET CSE | August 2016 | Part 3 | Question: 24
A. (a) and (b) only B. (b) and (c) only C. (c) and (a) only D. (a), (b) and (c)
ugcnetcse-aug2016-paper3 theory-of-computation regular-expression
Answer key ☟
40.19.3 Regular Expression: UGC NET CSE | December 2005 | Part 2 | Question: 5
A. { } B. { } C. { } D. None of these
ugcnetcse-dec2005-paper2 theory-of-computation regular-expression
Answer key ☟
40.19.4 Regular Expression: UGC NET CSE | December 2014 | Part 3 | Question: 24
Answer key ☟
40.19.5 Regular Expression: UGC NET CSE | January 2017 | Part 2 | Question: 31
I.
II.
III.
IV.
V.
VI.
Answer key ☟
40.19.6 Regular Expression: UGC NET CSE | July 2016 | Part 2 | Question: 31
The number of strings of length 4 that are generated by the regular expression
, where is an alternation character, are quantification characters, and is the null string, is:
A. 08 B. 10 C. 11 D. 12
ugcnetcse-july2016-paper2 theory-of-computation regular-expression
Answer key ☟
40.19.7 Regular Expression: UGC NET CSE | July 2016 | Part 3 | Question: 23
A.
B.
C.
D.
Answer key ☟
40.19.8 Regular Expression: UGC NET CSE | July 2016 | Part 3 | Question: 24
is any subset of 0*
Which of the following is correct?
A. is regular and is not regular B. is not regular and is regular
C. Both and are regular languages D. Both and are not regular languages
ugcnetcse-july2016-paper3 regular-language regular-expression
Answer key ☟
40.19.9 Regular Expression: UGC NET CSE | July 2016 | Part 3 | Question: 55
Let L be the language generated by regular expression 0*10* and accepted by the deterministic finite automata
M. Consider the relation defined by M as all states that are reachable from the start state. has ___
equivalence classes.
A. 2 B. 4 C. 5 D. 6
ugcnetcse-july2016-paper3 theory-of-computation regular-expression regular-language
Answer key ☟
40.19.10 Regular Expression: UGC NET CSE | June 2010 | Part 2 | Question: 3
Answer key ☟
40.19.11 Regular Expression: UGC NET CSE | June 2012 | Part 3 | Question: 35
Consider the regular expression (a+b)(a+b) ..... (a+b) (n-times). The minimum number of states in finite
automaton that recognizes the language represented by this regular expression contains
Answer key ☟
40.19.12 Regular Expression: UGC NET CSE | June 2012 | Part 3 | Question: 43
Answer key ☟
40.19.13 Regular Expression: UGC NET CSE | Junet 2015 | Part 3 | Question: 20
Answer key ☟
40.19.14 Regular Expression: UGC NET CSE | November 2017 | Part 2 | Question: 33
Which of the following regular expressions, each describing a language of binary numbers (MSB to LSB) that
represents non-negative decimal values, does not include even values?
A. B.
C. D.
Where are quantification characters.
Answer key ☟
40.19.15 Regular Expression: UGC NET CSE | October 2020 | Part 2 | Question: 28
Answer key ☟
40.19.16 Regular Expression: UGC NET CSE | October 2020 | Part 2 | Question: 79
i.
ii.
iii.
Choose the correct answer from the options given below based on the relation between the languages generated by the
regular expressions above:
A. B.
C. D.
ugcnetcse-oct2020-paper2 theory-of-computation regular-expression
Answer key ☟
40.19.17 Regular Expression: UGC NET CSE | September 2013 | Part 2 | Question: 14
40.19.18 Regular Expression: UGC NET CSE | September 2013 | Part 2 | Question: 15
Answer key ☟
https://gateoverflow.in/13365/ugcnet-dec2014-iii-24
i’ve a small doubt in the solution of this question
how is (a+b)*ba(a+b)* complement of the given language?
Answer key ☟
40.20.2 Regular Grammar: UGC NET CSE | August 2016 | Part 3 | Question: 22
(1)
(2)
(3)
(4)
Answer key ☟
40.20.3 Regular Grammar: UGC NET CSE | June 2014 | Part 2 | Question: 10
The regular grammar for the language L= { (w) and are both even, * } is given by :
(Assume, and are states)
Answer key ☟
40.20.4 Regular Grammar: UGC NET CSE | September 2013 | Part 3 | Question: 17
A.
B.
C.
D.
Answer key ☟
40.21.1 Regular Language: UGC NET CSE | August 2016 | Part 3 | Question: 55
40.21.2 Regular Language: UGC NET CSE | December 2013 | Part 2 | Question: 28
Answer key ☟
40.21.3 Regular Language: UGC NET CSE | December 2014 | Part 3 | Question: 23
Answer key ☟
40.21.4 Regular Language: UGC NET CSE | January 2017 | Part 3 | Question: 19
Answer key ☟
40.21.5 Regular Language: UGC NET CSE | January 2017 | Part 3 | Question: 20
A. B. C. D.
ugcnetcse-jan2017-paper3 theory-of-computation regular-language
Answer key ☟
40.21.6 Regular Language: UGC NET CSE | July 2016 | Part 3 | Question: 22
A. The family of regular languages is closed under symmetric difference but not closed under nor
B. The family of regular languages is closed under nor but not closed under symmetric difference
C. The family of regular languages are closed under both symmetric difference and nor
D. The family of regular languages are not closed under both symmetric difference and nor
Answer key ☟
40.21.7 Regular Language: UGC NET CSE | June 2014 | Part 3 | Question: 15
Let be any language. Define as the strings obtained by extracting from the letters in the even-
numbered positions and We define another language by removing
the two leftmost symbols of every string in given by with If is regular
language then
A. is regular and is not regular B. Both and are regular
C. is not regular and is regular D. Both and are not regular
ugcnetjune2014iii theory-of-computation regular-language
Answer key ☟
40.21.8 Regular Language: UGC NET CSE | October 2020 | Part 2 | Question: 56
Answer key ☟
40.21.9 Regular Language: UGC NET CSE | September 2013 | Part 3 | Question: 16
Answer key ☟
40.22.1 Right Quotient: UGC NET CSE | June 2013 | Part 2 | Question: 20
Given L1=L(a*baa*) L2=L(ab*). The regular expression corresponding to language L3=L1/L2 (right quotient)
is given by
Which of the following statements is/are true about the above grammar?
Answer key ☟
40.24.1 Turing Machine: UGC NET CSE | August 2016 | Part 3 | Question: 56
A. B. C. D.
ugcnetcse-aug2016-paper3 theory-of-computation turing-machine
Answer key ☟
40.24.2 Turing Machine: UGC NET CSE | January 2017 | Part 3 | Question: 62
Answer key ☟
40.24.3 Turing Machine: UGC NET CSE | July 2016 | Part 3 | Question: 57
Answer key ☟
40.24.4 Turing Machine: UGC NET CSE | July 2018 | Part 2 | Question: 40
Answer key ☟
40.24.5 Turing Machine: UGC NET CSE | June 2019 | Part 2 | Question: 80
For a statement
A language is recursive if there exists some turing machine . Which of the following conditions is
satisfied for any string ?
ugcnetcse-june2019-paper2 turing-machine
Answer key ☟
Answer Keys
40.0.1 D 40.0.2 A 40.0.3 B 40.0.4 C 40.0.5 B
40.0.6 B 40.0.7 B 40.0.8 B 40.0.9 C 40.0.10 A
40.0.11 C 40.0.12 B 40.0.13 A 40.0.14 C 40.0.15 C
40.0.16 C 40.0.17 B 40.0.18 B 40.0.19 D 40.0.20 Q-Q
40.0.21 Q-Q 40.0.22 A 40.0.23 Q-Q 40.0.24 Q-Q 40.0.25 Q-Q
40.0.26 A 40.0.27 Q-Q 40.1.1 B 40.1.2 C 40.1.3 B
40.2.1 D 40.3.1 Q-Q 40.3.2 Q-Q 40.3.3 Q-Q 40.3.4 D
40.3.5 X 40.3.6 D 40.3.7 C 40.3.8 D 40.3.9 C
40.4.1 Q-Q 40.4.2 Q-Q 40.4.3 C 40.4.4 C 40.4.5 C
40.4.6 D 40.4.7 C 40.4.8 A 40.5.1 B 40.5.2 Q-Q
40.6.1 Q-Q 40.6.2 C 40.6.3 D 40.6.4 D 40.6.5 A
40.7.1 B 40.8.1 D 40.8.2 C 40.8.3 Q-Q 40.8.4 Q-Q
40.8.5 Q-Q 40.8.6 B 40.8.7 D 40.8.8 D 40.8.9 C
40.8.10 C 40.9.1 Q-Q 40.9.2 B 40.9.3 B 40.9.4 Q-Q
A. B. C. D.
ugcnetcse-nov2017-paper2
Answer key ☟
How many distinguishable permutations of the letters in the word of BANANA are there?
A. B. C. D.
ugcnetcse-nov2017-paper2
Answer key ☟
A.
B.
C.
D.
ugcnetcse-nov2017-paper2
Answer key ☟
Answer key ☟
A member function can always access the data in, (in C++)
A. the class of which it is member B. the object of which it is a member
C. the public part of its class D. the private part of its class
ugcnetcse-nov2017-paper2
Answer key ☟
ugcnetcse-nov2017-paper2
Answer key ☟
Answer key ☟
A. Class templates and function templates are instantiated in the same way
B. Class templates differ from function templates in the way they are initiated
C. Class template is initiated by defining an object using the template argument
D. Class templates are generally used for storage classes
ugcnetcse-nov2017-paper2
Answer key ☟
Consider an array representation of an element binary heap where the elements are stored from index to
index of the array. For the element stored at index of the array , the index of the parent is
A. B.
C. D.
ugcnetcse-nov2017-paper2
Answer key ☟
In RDBMS, different classes of relations are created using ________ technique to prevent modification
anomolies.
A. Functional Dependencies B. Data integrity
C. Referential integrity D. Normal Forms
ugcnetcse-nov2017-paper2
Answer key ☟
Answer key ☟
A. B.
C. D.
ugcnetcse-nov2017-paper2 databases
Answer key ☟
The following numbers are inserted into an empty binary search tree in the given order: .
What is the height of the binary search tree?
A. B. C. D.
ugcnetcse-nov2017-paper2
Answer key ☟
41.0.16 UGC NET CSE | November 2017 | Part 2 | Question: 25
Post-order traversal of a given binary search tree produces following sequence of keys:
. Which one of the following sequences of keys can be the result of an in-order
traversal of the tree ?
A. B.
C. D.
ugcnetcse-nov2017-paper2
Answer key ☟
Which of the following devices takes data sent from one network device and forwards it to the destination node
based on MAC address?
Answer key ☟
_________ do not take their decisions on measurements or estimates of the current traffic and topology.
A. Static algorithms B. Adaptive algorithms
C. Non-Adaptive algorithms D. Recursive algorithms.
ugcnetcse-nov2017-paper2
Answer key ☟
Let be an undirected connected graph with distinct edge weight. Let be the edge with maximum weight
and the edge with minimum weight. Which of the following statements is false?
ugcnetcse-nov2017-paper2
Answer key ☟
A list of n strings, each of length n, is sorted into lexicographic order using merge - sort algorithm. The worst
case running time of this computation is:
A. B. C. D.
ugcnetcse-nov2017-paper2
In Distributed system, the capacity of a system to adapt the increased service load is called
Answer key ☟
41.0.22 UGC NET CSE | November 2017 | Part 2 | Question: 39
Which module gives control of the CPU to the process selected by the short-term schedular?
Answer key ☟
Software does not wear-out in the traditional sense of the term, but software does tend to deteriorate as it
evolves, because
ugcnetcse-nov2017-paper2
Answer key ☟
Answer key ☟
A. Re-constructing the original source code from the existing machine (low-level) code program and modifying it ti
make it more user-friendly
B. Scrapping the source code of a software and re-writing it entirely from scratch
C. Re-organising and modifying existing software systems to make them more maintainable
D. Translating source code of an existing software to a new machine (low-level) language
ugcnetcse-nov2017-paper2
Answer key ☟
Suppose there are six files with corresponding sizes KB, KB, KB KB,
KB and KB respectively. The files are to be stored on a sequential device in such a way that optimizes access
time. In what order should the files be stored?
A. B.
C. D.
ugcnetcse-nov2017-paper2
Answer key ☟
Which of the following is not a key issue stressed by an agile philosophy of software engineering?
A. The importance of self-organizing teams as well as communication and collaboration between team members and
customers
B. Recognition that change represents opportunity
C. Emphasis on rapid delivery of software that satisfies the customer
D. Having a separate testing phase after a build phase
ugcnetcse-nov2017-paper2
Answer key ☟
What is the normal order of activities in which traditional software testing is organized?
a. Integration Testing b. System Testing
c. Unit Testing d. Validation Testing
A. (c), (a), (b), (d) B. (c), (a), (d), (b)
C. (d), (c), (b), (a) D. (b), (d), (a), (c)
ugcnetcse-nov2017-paper2
Answer key ☟
Which of the given wireless technologies used in IoT, consumes the least amount of power?
Answer key ☟
Find the equation of the circle in terms of coordinates, assuming that the coordinate system
results from a scaling of units in the direction and units in the direction.
A.
B.
C.
D.
ugcnetcse-nov2017-paper3
Answer key ☟
Find the normalization transformation that maps a window whose lower left corner is at and upper right
corner is at onto a viewpoint that is the entire normalized device screen
A.
B.
C.
D.
ugcnetcse-nov2017-paper3
Answer key ☟
You are given a sequence of elements to sort. The input sequence consists of subsequences, each
containing elements. The elements in a given subsequence are all smaller than the elements in the succeeding
subsequence and larger than the elements in the preceding subsequence. Thus, all that is needed to sort the whole
sequence of length is to sort the elements in each of the subsequences.
The lower bound on the number of comparisons needed to solve this variant of the sorting problem is
A.
B.
C.
D.
ugcnetcse-nov2017-paper3
Answer key ☟
A. B. C. D.
ugcnetcse-nov2017-paper3
Answer key ☟
A. B. C. D.
ugcnetcse-nov2017-paper3
Answer key ☟
41.0.35 UGC NET CSE | November 2017 | Part 3 | Question: 35
A text is made up of the characters each occuring with the probability and
respectively. The optimal Huffman coding technique will have the average length of
A. B. C. D.
ugcnetcse-nov2017-paper3
Answer key ☟
A. B. C. D.
ugcnetcse-nov2017-paper3
Answer key ☟
An XML document that adheres to syntax rules specified by XML specification in that it must satisfy both
physical and logical structured, is called
Answer key ☟
i. A Java Servelet is a server-side component that runs on the web server and extends the capabilities of a server.
ii. A servelet can use the user interface classes like AWT or Swing.
Answer key ☟
B.
C.
D.
ugcnetcse-nov2017-paper3
Answer key ☟
Answer key ☟
Answer key ☟
41.0.42 UGC NET CSE | November 2017 | Part 3 | Question: 40
i. In HTML, character entitites are used to incorporate external content into a web page, such as images.
ii. Once a web server returns a cookie to a browser, the cookie will be included in all future requests from the browser
to the same server.
A simple stand – alone software utility is to be developed in ‘C’ programming by a team of software experts for
a computer running Linux and the overall size of this software is estimated to be lines of code.
Considering as multiplicative and exponention factor for the basic COCOMO effort estimation
equation and as multiplicative and exponention factor for the basic COCOMO development time
estimation equation, approximately how long does the software project take to complete?
Answer key ☟
ugcnetcse-nov2017-paper3
Answer key ☟
If
Number of tests to exhaustively test mcq();
Minimum number of tests to achieve full statement coverage for mcq (); and
Minimum number of tests to achieve full branch coverage for mcq ( );
then ______________
A. B. C. D.
ugcnetcse-nov2017-paper3
Answer key ☟
41.0.46 UGC NET CSE | November 2017 | Part 3 | Question: 44
Which of the following statements is/are FALSE with respect to software testing?
: White-box tests are based on specifications; better at telling whether program meets specification, better at
finding errors of ommission.
: Black-box tests are based on code; better for finding crashes, out of bounds errors, file not closed errors.
: Alpha testing is conducted at the developer’s site by a team of highly skilled testers for software that is developed as
a product to be used by many customers.
A. Only and are FALSE B. Only and are FALSE
C. Only and are FALSE D. All of , and are FALSE
ugcnetcse-nov2017-paper3
A signal processor software is expected to operate for days after repair, and the mean software repair time
is expected to be minutes. Then, the availability of the software is
A. B. C. D.
ugcnetcse-nov2017-paper3
Consider the following four processes with the arrival time and length of CPU burst given in milliseconds:
The average waiting time for preemptive SJF scheduling algorithm is ____________
A. ms B. ms C. ms D. ms
ugcnetcse-nov2017-paper3
Answer key ☟
In Software Configuration Management (SCM), which of the following is a use-case supported by standard
version control systems?
a. Managing several versions or release of a software b. Filing bug reports and tracking their progress
c. Allowing team members to work in parallel d. Identifying when and where a regression occurred
A. Only (a), (c), and (d) B. Only (a), (b), and (c)
C. Only (a), (b), and (d) D. Only (b), (c), and (d)
ugcnetcse-nov2017-paper3
Answer key ☟
User level threads are threads that are visible to the programmer and are unknown to the kernel. The operating
system kernel supports and manages kernel level threads. Three different types of models relate user and kernel
level threads.
Which of the following statements is/are true?
i.
i. The Many – to – one model maps many user threads to one kernel thread
ii. The one – to – one model maps one user thread to one kernel thread
iii. The many – to – many model maps many user threads to smaller or equal kernel threads
ii.
i. Many – to – one model maps many kernel threads to one user thread
ii. One – to – one model maps one kernel thread to one user thread
iii. Many – to – many model maps many kernel threads to smaller or equal user threads
Answer key ☟
Answer key ☟
Answer key ☟
If is the branching factor and is the maximum depth of the search tree, what is the space complexity of
greedy search?
A. B. C. D.
ugcnetcse-nov2017-paper3
Answer key ☟
Consider a disk queue with requests for I/O to blocks on cylinders . Suppose
SSTF disk scheduling algorithm implemented to meet the requests then the total number of head movements are
________ if the disk head is initially at .
A. B. C. D.
ugcnetcse-nov2017-paper3
In Artificial Intelligence (AI), which agent deals with happy and unhappy state?
A. Simple reflex agent B. Model based agent
C. Learning agent D. Utility based agent
ugcnetcse-nov2017-paper3
Let and be Propositions. Assume that the equivalences and hold. Then the
truth value of the formula is always
A. True B. False
C. Same as truth table of D. Same as truth table of
ugcnetcse-nov2017-paper3
Answer key ☟
“If , then unless ” is represented by which of the following formulae in propositional logic?
A. B.
C. D.
ugcnetcse-nov2017-paper3
Answer key ☟
Answer key ☟
ugcnetcse-nov2017-paper3
Answer key ☟
ugcnetcse-nov2017-paper3
A. B. C. D.
ugcnetcse-nov2017-paper3
Answer key ☟
Answer key ☟
ugcnetcse-nov2017-paper3
Entropy of a discrete random variable with possible values and probability density function
is
For any binary linear code with minimum distance or greater where
is
A. B. C. D.
ugcnetcse-nov2017-paper3
Answer key ☟
Which of the following is a valid reason for causing degeneracy in a transportation problem? Here is number
of rows and is number of columns in transportation table.
ugcnetcse-nov2017-paper3
Answer key ☟
A. and B. and
C. and D. and
ugcnetcse-nov2017-paper3
Answer key ☟
A.
B.
C.
D.
ugcnetcse-nov2017-paper3
Answer key ☟
Consider a single perceptron with sign activation function. The perceptron is represented by weight vector
and a bias . If the input vector to the perceptron is then the
output of the perceptron is
A. B. C. D.
ugcnetcse-nov2017-paper3
Answer key ☟
C. D.
ugcnetcse-nov2017-paper3
Answer key ☟
Answer key ☟
Which of the following routing technique / techniques is/are used in distributed systems?
A. (a) only B. (a) and (b) only C. (c) only D. All (a), (b), (c)
ugcnetcse-nov2017-paper3
Answer key ☟
A.
B.
C.
D.
ugcnetcse-dec2018-paper2
Answer key ☟
Consider a vocabulary with only four propositions A, B, C and D. How many models are there for the following
sentence?
A. B. C. D.
ugcnetcse-dec2018-paper2
Answer key ☟
A. B. C. D.
ugcnetcse-dec2018-paper2
Answer key ☟
ugcnetcse-dec2018-paper2
Answer key ☟
ugcnetcse-dec2018-paper2
Answer key ☟
Match List I with List II and choose the correct answer from the code given below.
List I List II
Selects a node for
Greedy Best- expansion if optimal
(a) (i)
First Search path to that node has
been found
Avoids substantial
overhead associated
(b) A* Search (ii)
with keeping the sorted
queue of nodes
Recursive Best- Suffers from excessive
(c) (iii)
First Search node generation
Iterative- Time complexity
(d) deepening A* (iv) depends on the quality
Search of heuristic
Code:
ugcnetcse-dec2018-paper2
Consider the following terminology and match List I with List II and choose the correct answer from the code
given below.
b= branching factor
d = depth of the shallowest solution
m= maximum depth of the search tree
l=depth limit
Code:
ugcnetcse-dec2018-paper2
Answer key ☟
ugcnetcse-dec2018-paper2
Answer key ☟
Answer key ☟
Answer key ☟
41.0.84 UGC NET CSE | December 2018 | Part 2 | Question: 84
Performance
Roll-No Course Marks
18CS101 DBMS 60
18CS101 Compiler Design 65
18CS102 DBMS 80
18CS103 DBMS 85
18CS102 Compiler Design 75
18CS103 Operating System 70
Primary keys in the tables are shown using underline. Now, consider the following query:
SELECT S.Name, Sum (P.Marks) FROM Students, Performance P WHERE S.Roll-No=P.Roll-No GROUP BY S.Name
A. B. C. D.
ugcnetcse-dec2018-paper2 databases
Answer key ☟
Data scrubbing is
A. A process to reject data from the data warehouse and to create the necessary indexes.
B. A process to load the data in the data warehouse and to create the necessary indexes.
C. A process to upgrade the quality of data after it is moved into a data warehouse
D. A process to upgrade the quality of data before it is moved into a data warehouse
ugcnetcse-dec2018-paper2
Answer key ☟
Answer key ☟
41.0.87 UGC NET CSE | December 2018 | Part 2 | Question: 79
Answer key ☟
Data warehouse contains _____ data that is never found in operational environment.
Answer key ☟
An attribute of datatype varchar( ) has the value , and the attribute of datatype char( ) has the value
, then the attribute has _____ spaces and attribute has ____ spaces.
A. B. C. D.
ugcnetcse-dec2018-paper2
Answer key ☟
Answer key ☟
A process residing in Main Memory and Ready and Waiting for execution, is kept on
Answer key ☟
Answer key ☟
In Linux operating system environment ____ command is used to print a file.
A. B. C. D. Broadband
ugcnetcse-dec2018-paper2
Answer key ☟
Answer key ☟
Match the following Secret Key Algorithms (list I) with Corresponding Key Lengths (List II) and choose the
correct answer from the code given below:
Code:
ugcnetcse-dec2018-paper2
Answer key ☟
Software coupling involves dependencies among pieces of software called modules. Which of the following are
correct statements with respect to module coupling ?
P : Common coupling occurs when two modules share the same global data
Q : Control coupling occurs when modules share a composite data structure and use only parts of it
R : Content coupling occurs when one module modifies or relies on the internal working of another module
Choose the correct answer from the code given below :
Answer key ☟
Which of the following is not one of the principles of agile software development method?
A. Customer involvement B. Embrace change
C. Incremental delivery D. Following the plan
ugcnetcse-dec2018-paper2
Answer key ☟
Answer key ☟
If is the minimum number of tests to achieve full statement coverage for , and is the minimum number of tests
to achieve full branch coverage for , then =
A. B. C. D.
ugcnetcse-dec2018-paper2
Answer key ☟
Answer key ☟
A. B.
C. D.
ugcnetcse-dec2018-paper2
Answer key ☟
Software products need perfective maintenance for which of the following reasons?
ugcnetcse-dec2018-paper2
Answer key ☟
The Software Requirement Specification is said to be _____ if and only if no subset of individual
requirements described in it conflict with each other.
Answer key ☟
ugcnetcse-dec2018-paper2
Answer key ☟
Which of the following HTML5 codes will affect the horizontal as well as vertical alignment of the table content
?
ugcnetcse-dec2018-paper2
Answer key ☟
What does the following Java function perform? (Assume int occupies four bytes of storage)
public static int f(int a)
{ // Pre-conditions : a > 0 and no oveflow/underflow occurs
int b=0;
for (int i=0; i<32; i++)
{
b = b<<1;
b=b | ( a & 1);
a=a >>>1; // This is a logical shift
}
return b;
}
ugcnetcse-dec2018-paper2
Answer key ☟
Consider the following recursive Java function that takes two long arguments and returns a float value :
public static float f(long m, long n)
{
float result = (float) m / (float) n;
if (m<0 || n <0)
return 0.0f;
else
result +=f(m*2, n*3);
return result;
}
A. B. C. D.
ugcnetcse-dec2018-paper2
Consider the following two programs and and two statements and about these programs:
Answer key ☟
Consider the following pseudo-code fragment, where is a non-negative integer that has been initialized:
while
end while
Which of the following is a loop invariant for the while statement?
(Note: a loop invariant for a while statement is an assertion that is true each time the guard is evaluated during the
execution of the while statement).
A. and B. and
C. and D. and
ugcnetcse-dec2018-paper2
Answer key ☟
Answer key ☟
In Graphics, which of the following statements about perspective and parallel projection is/are true?
P : In a perspective projection, the farthest an object is from the center of projection, the smaller it appears
Q : Parallel projection is equivalent to a perspective projection where the viewer is standing infinitely far away
R : Perspective projections do not preserve straight lines.
Choose the correct answer from the code given below:
Answer key ☟
Consider the midpoint (or Bresenham) algorithm for rasterizing lines given below:
1. Input and
2.
3. //f is the implicit form of a line
4. for to
5. do
6. plot
7. if
8. then
9.
10.
11. else
12.
13. end
14. end
If the frame buffer has -bits per pixel and -bits are allocated for each of the , and components, then
what would be the size of the color lookup table (LUT)?
A. bytes B. bytes
C. bytes D. bytes
ugcnetcse-dec2018-paper2
Answer key ☟
The grammar is not suitable for predictive parsing because the grammar is
A. Right recursive B. Left recursive
C. Ambiguous D. An operator grammar
ugcnetcse-dec2018-paper2
Answer key ☟
Answer key ☟
i.
ii.
Answer key ☟
In a ternary tree, the number of internal nodes of degree and is , and respectively. The number of leaf
nodes in the ternary tree is
A. B. C. D.
ugcnetcse-dec2018-paper2
Answer key ☟
If a graph (G) has no loops or parallel edges, and if the number of vertices (n) the graph is , then graph G is
Hamiltonian if
i.
ii.
iii.
A. (i) and (iii) only B. (ii) only C. (ii) and (iii) only D. (iii) only
ugcnetcse-dec2018-paper2
Answer key ☟
Consider a system with level cache. Access times of Level cache, Level cache and main memory are ns,
ns and ns respectively. The hit rates of Level and Level caches are and respectively. What is the
average access time of the system ignoring the search time within the cache?
A. ns B. ns C. ns D. ns
ugcnetcse-dec2018-paper2
Answer key ☟
A computer uses a memory unit with K words of bits each. A binary instruction code is stored in one
word of memory. The instruction has four parts: an indirect bit, an operation code and a register code part to
specify one of registers and an address part. How many bits are there in the operation code, the register code part and
the address part?
A. B. C. D.
ugcnetcse-dec2018-paper2
Answer key ☟
A. (i) and (ii) only B. (ii) and (iii) only C. (iii) only D. (ii) only
ugcnetcse-dec2018-paper2
Answer key ☟
i. If and , then
ii. If and , then
iii. If and , then
iv. If and , then
Answer key ☟
A survey has been conducted on methods of commuter travel. Each respondent was asked to check Bus, Train
and Automobile as a major method of travelling to work. More than one answer was permitted. The results
reported were as follows :
Bus people; Train people; Automobile people; Bus and Train people; Bus and Automobile people; Train
and Automobile people; and all the three methods people. How many people completed the survey form?
A. B. C. D.
ugcnetcse-dec2018-paper2
Answer key ☟
A. effect improvement through a joint review of achievement of performance goals within a given timeframe
B. integrate external and internal controls by managers
C. provide managers scope to review the accepted output variables
D. agree upon different performance goals for managers and employees
ugcnetcse-oct2020-paper1
Answer key ☟
ugcnetcse-oct2020-paper1
Answer key ☟
ugcnetcse-oct2020-paper1
Answer key ☟
Answer key ☟
Answer key ☟
What are the advantages of Choice Based Credit System (CBCS) introduces by the UGC for higher education
institutions?
i. Focuses on student centric education
ii. Allows students to choose inter-disciplinary and intra-disciplinary courses
iii. Makes education at par with global standards
iv. Makes it easy to estimate the performance levels of students in terms of marks
v. Offers flexibility for students to undertake studies at different times and at different institutions
Answer key ☟
In the light of the above statements, choose the correct answer from the options given below:
ugcnetcse-oct2020-paper1
Answer key ☟
Which of the following come under the mandate of the University Grants Commission (UGC)?
Match with : consists of the Vedangas and contains subjects dealt in them.
A. B.
C. D.
ugcnetcse-oct2020-paper1
Given below are two statements: One is labelled as Assertion and the other is labelled as Reason
In the light of the above statements, choose the most appropriate answer from the options given below:
ugcnetcse-oct2020-paper1
Answer key ☟
During physical treatment process of waste water, what is the correct order of following operations to be
followed?
a. Flocculation b. Filtration
c. Screening d. Sedimentation
Choose the correct answer from the options given below:
A. B.
C. D.
ugcnetcse-oct2020-paper1
Wind energy is very sensitive to the wind velocity because wind power is directly proportional to the
A. wind velocity B. square of the wind velocity
C. square root of the wind velocity D. cube of the wind velocity
ugcnetcse-oct2020-paper1
Given below are two statements: One is labelled as Assertion and the other is labelled as Reason
In the light of the above statements, choose the correct answer from the options given below:
ugcnetcse-oct2020-paper1
Which of the International Agreements/Convention/Protocols are legally binding on the member countries
(parties)?
Choose the most appropriate answer from the options given below:
Match with
Answer key ☟
Answer key ☟
i. Server
ii. Network
iii. Fire
iv. Individual computer
Answer key ☟
Answer key ☟
Answer key ☟
Answer key ☟
Match with
Answer key ☟
41.0.150 UGC NET CSE | October 2020 | Part 1 | Question: 28
i. S’esavat anumana
ii. Comparison
iii. Purvovat anumana
iv. Both and
Answer key ☟
Given below are two statements: One is labelled as Assertion and the other is labelled as Reason
Assertion : Substance is always the subject of all predicates
Reason : Substance is self-existent and self-conceived
In the light of the above statements, choose the correct answer from the options given below:
ugcnetcse-oct2020-paper1
Which one of the following schools has not accepted anumana (inference) as a valid source of knowledge?
Answer key ☟
Three pipes fill a tank in hours. If two of them take and hours each to fill the tank, how many hours will
the third pipe take to fill the tank?
Answer key ☟
Answer key ☟
41.0.155 UGC NET CSE | October 2020 | Part 1 | Question: 23
Answer key ☟
The ratio of ages of two persons and is and that of ages and is . If the average of all three is
years, what is ’s age?
Answer key ☟
In a park, and are sitting. is the brother of ’s husband and son of . is the daughter of
and sister of .
i. is the grandson of
ii. is the daughter of
iii. is the father of
iv. There are one son and one daughter in the group
v. is the uncle of
Answer key ☟
Match with
Answer key ☟
41.0.159 UGC NET CSE | October 2020 | Part 1 | Question: 19
i. Action
ii. Internalisation
iii. Selection
iv. Understanding
v. Perception
In the light of the above statements, choose the correct answer from the options given below:
ugcnetcse-oct2020-paper1
Answer key ☟
i. Restrictive actions
ii. Empathy
iii. Punctuality
iv. Follow-up
v. Scattered reflections
Choose the most appropriate answer from the options given below:
A. only B. only
C. only D. only
ugcnetcse-oct2020-paper1
Answer key ☟
ugcnetcse-oct2020-paper1
Answer key ☟
Given below are two statements: One is labelled as Assertion (A) and the other is labelled as Reason (R)
In the light of the above statements, choose the most appropriate answer from the options given below:
ugcnetcse-oct2020-paper1
Answer key ☟
1. Cluster sampling
2. Judgemental sampling
3. Systematic sampling
4. Snowball sampling
5. Quota sampling
Answer key ☟
In conducting an empirical study, a researcher employs a non-parametric test for data analysis and finds that the
‘statistics’ arrived at is ‘significant’ at level. What decisions will be warranted thereafter?
In which of the following, there is a greater flexibility in both the methods and process of research?
A. Ethnography and phenomenology B. Descriptive survey and impact studies
C. Experimental and observation based studies D. Expost facto and historical studies
ugcnetcse-oct2020-paper1
In the light of the above statements, choose the correct answer from the options given below:
ugcnetcse-oct2020-paper1
Match with :
In which level of teaching, the teacher’s role is more active rather than being interactive?
A. Memory level B. Understanding level
C. Reflective level D. Autonomous development level
ugcnetcse-oct2020-paper1
Answer key ☟
Identify the teaching strategies which are employed during indirect instruction:
Which of the following teacher competency belongs to the domain of personality and attitude?
A. Locus of control and self-efficacy B. Managing and Monitoring
C. Planning and instructing D. Personalising and contextualizing
ugcnetcse-oct2020-paper1
Answer key ☟
Answer key ☟
41.1.1 Binary Heap: UGC NET CSE | December 2018 | Part 2 | Question: 22
The elements are inserted one by one in the given order into a max-heap. The resultant
max-heap is sorted in an array implementation as
A. B.
C. D.
ugcnetcse-dec2018-paper2 data-structures binary-heap
Answer key ☟
41.2.1 Binary Search Tree: UGC NET CSE | December 2018 | Part 2 | Question: 25
Answer key ☟
41.3.1 CO and Architecture: UGC NET CSE | November 2017 | Part 2 | Question: 46
Answer key ☟
41.3.2 CO and Architecture: UGC NET CSE | November 2017 | Part 2 | Question: 50
Which speed up could be achieved according to Amdahl's Law for infinte number of processes if of a
program is sequential and the remaining part is ideally parallel?
A. Infinite B. C. D.
ugcnetcse-nov2017-paper2 co-and-architecture
Answer key ☟
Answer key ☟
41.5.1 Database Normalization: UGC NET CSE | December 2018 | Part 2 | Question: 82
Answer key ☟
41.6.1 Disk Scheduling: UGC NET CSE | November 2017 | Part 2 | Question: 37
In ________ disk scheduling algorithm, the disk head moves from one end to other end of the disk, serving the
requests along the way. When the head reaches the other end, it immediately returns to the beginning of the disk
without serving any requests on the return trip.
A. LOOK B. SCAN C. C-LOOK D. C-SCAN
ugcnetcse-nov2017-paper2 operating-system disk-scheduling
Answer key ☟
41.7.1 Dynamic Programming: UGC NET CSE | December 2018 | Part 2 | Question: 23
A. B. C. D.
ugcnetcse-dec2018-paper2 algorithms dynamic-programming
Answer key ☟
ugcnetcse-nov2017-paper2 e-technologies
Answer key ☟
Answer key ☟
41.10.1 Graph Algorithms: UGC NET CSE | December 2018 | Part 2 | Question: 27
Match with and choose the correct answer from the code given below.
where and are the number of vertices and edged in graph respectively.
A. B.
C. D.
ugcnetcse-dec2018-paper2 algorithms graph-algorithms time-complexity
Answer key ☟
The IP address _________ is used by hosts when they are being booted.
A. B. C. D.
ugcnetcse-nov2017-paper2 computer-networks ip-addressing
Answer key ☟
Answer key ☟
41.13.1 Linked List: UGC NET CSE | December 2018 | Part 2 | Question: 29
Consider a singly linked list. What is the worst case time complexity of the best-known algorithm to delete the
node , pointer to this node is , from the list?
A. B. C. D.
ugcnetcse-dec2018-paper2 data-structures linked-list time-complexity
Answer key ☟
Which of the following microprocessor hardware interrupt has the lowest priority?
Answer key ☟
41.15.1 Minimum Spanning Tree: UGC NET CSE | December 2018 | Part 2 | Question: 12
A. B. C. D.
ugcnetcse-dec2018-paper2 algorithms minimum-spanning-tree
Answer key ☟
A comparison of frequency division and time division multiplexing system shows that
Answer key ☟
41.17.1 Osi Model: UGC NET CSE | November 2017 | Part 2 | Question: 29
Which of the following layer of OSI Reference model is also called end-to-end layer ?
A. Network layer B. Datalink layer
C. Session layer D. Transport layer
ugcnetcse-nov2017-paper2 computer-networks osi-model
Answer key ☟
41.18.1 Physical Layer: UGC NET CSE | June 2011 | Part 2 | Question: 27
If carrier modulated by a digital bit stream, has one one of the possible phase of and degrees, then
modulation called
Answer key ☟
Answer key ☟
41.20.1 Software Testing: UGC NET CSE | November 2017 | Part 2 | Question: 45
Which of the following testing techniques ensures that the software products runs correctly after the changes in
maintenance?
A. Path Testing B. Integration Testing
C. Unit Testing D. Regression Testing
ugcnetcse-nov2017-paper2 is&software-engineering software-testing
Answer key ☟
The second smallest of elements can be found with ____ comparisons in the worst case.
A. B.
C. D.
ugcnetcse-dec2018-paper2 algorithms sorting
The top two elements of the stack after the second is evaluated, are :
A. B. C. D.
ugcnetcse-dec2018-paper2 data-structures stack
Answer key ☟
41.23.1 Transaction and Concurrency: UGC NET CSE | December 2018 | Part 2 | Question: 83
Consider the following sequence of two transactions on a bank account with initial balance that
transfers to another account and then apply interest.
i. T1 start
ii. T1 A old= new
iii. T1 B old = new =
iv. T1 commit
v. T2 start
vi. T2 A old = new =
vii. T2 commit
Suppose the database system crashes just before log record (vii) is written. When the system is restarted, which one
statement is true of the recovery process?
Answer key ☟
Answer Keys
41.0.1 D 41.0.2 C 41.0.3 A 41.0.4 B 41.0.5 A
41.0.6 C 41.0.7 A 41.0.8 B 41.0.9 B 41.0.10 B;C;D
41.0.11 C 41.0.12 D 41.0.13 C 41.0.14 B 41.0.15 A
41.0.16 D 41.0.17 C 41.0.18 C 41.0.19 C 41.0.20 B
41.0.21 B 41.0.22 A 41.0.23 C 41.0.24 D 41.0.25 C
41.0.26 B 41.0.27 D 41.0.28 B 41.0.29 B 41.0.30 B
41.0.31 A 41.0.32 C 41.0.33 D 41.0.34 C 41.0.35 B
41.0.36 B 41.0.37 A 41.0.38 A 41.0.39 C 41.0.40 B
41.0.41 D 41.0.42 D 41.0.43 B 41.0.44 C 41.0.45 A
41.0.46 A 41.0.47 D 41.0.48 A 41.0.49 A 41.0.50 A
41.0.51 D 41.0.52 A 41.0.53 C 41.0.54 C 41.0.55 D
41.0.56 A 41.0.57 B 41.0.58 A 41.0.59 A 41.0.60 D
41.0.61 D 41.0.62 B 41.0.63 D 41.0.64 X 41.0.65 D
41.0.66 C 41.0.67 C 41.0.68 B 41.0.69 B 41.0.70 D
41.0.71 D 41.0.72 C 41.0.73 D 41.0.74 Q-Q 41.0.75 Q-Q
41.0.76 Q-Q 41.0.77 Q-Q 41.0.78 Q-Q 41.0.79 Q-Q 41.0.80 Q-Q
41.0.81 Q-Q 41.0.82 Q-Q 41.0.83 Q-Q 41.0.84 Q-Q 41.0.85 Q-Q
41.0.86 Q-Q 41.0.87 Q-Q 41.0.88 Q-Q 41.0.89 Q-Q 41.0.90 Q-Q
41.0.91 Q-Q 41.0.92 Q-Q 41.0.93 Q-Q 41.0.94 Q-Q 41.0.95 Q-Q
41.0.96 Q-Q 41.0.97 Q-Q 41.0.98 Q-Q 41.0.99 Q-Q 41.0.100 Q-Q
41.0.101 Q-Q 41.0.102 Q-Q 41.0.103 Q-Q 41.0.104 Q-Q 41.0.105 Q-Q
41.0.106 B 41.0.107 Q-Q 41.0.108 Q-Q 41.0.109 Q-Q 41.0.110 Q-Q
41.0.111 Q-Q 41.0.112 Q-Q 41.0.113 Q-Q 41.0.114 Q-Q 41.0.115 Q-Q
41.0.116 Q-Q 41.0.117 Q-Q 41.0.118 A 41.0.119 Q-Q 41.0.120 B
41.0.121 Q-Q 41.0.122 B 41.0.123 A 41.0.124 Q-Q 41.0.125 Q-Q
41.0.126 Q-Q 41.0.127 Q-Q 41.0.128 A 41.0.129 B 41.0.130 D
41.0.131 C 41.0.132 B 41.0.133 C 41.0.134 C 41.0.135 D
41.0.136 B 41.0.137 B 41.0.138 A 41.0.139 B 41.0.140 D
41.0.141 B 41.0.142 B 41.0.143 D 41.0.144 B 41.0.145 D
41.0.146 D 41.0.147 D 41.0.148 D 41.0.149 B 41.0.150 A
41.0.151 B 41.0.152 C 41.0.153 D 41.0.154 D 41.0.155 A
41.0.156 C 41.0.157 B 41.0.158 A 41.0.159 D 41.0.160 C
41.0.161 B 41.0.162 A 41.0.163 A 41.0.164 A 41.0.165 B
41.0.166 D 41.0.167 A 41.0.168 C 41.0.169 B 41.0.170 A
41.0.171 D 41.0.172 A 41.0.173 D 41.1.1 Q-Q 41.2.1 C
41.3.1 A 41.3.2 C 41.4.1 C 41.5.1 Q-Q 41.6.1 D