UGC NET JUNE 2013
SYLLABUS, MODEL PAPER/ PREVIOUS YEARS SOLVED QUESTION PAPERS.
UGC NET (NATIONAL ELIGIBILITY TEST) : OLD SOLVED/PREVIOUS EXAM QUESTION PAPERS WITH SOLUTIONS AND EXPLANATIONS AND FREE STUDY MATERIALS.
COMPUTER MEMORY BASED PREVIOUS YEARS SOLVED PAPERS I, II AND III TO PREPARE AND PASS THE UGC NET/SLET ENTRANCE EXAMINATION WITH HIGH PERCENTAGE.
COMPUTER BASIC QUESTIONS FOR BANK EXAM, HTAT, CTAT, TAT, UGC-NET, INTERVIEW AND OTHER EXAM'S, WHERE BASIC QUESTION'S ARE REQUIRED.
NOTE: Move mouse over your answer to see your answer is right or wrong. 26. Frequency shift keying is used mostly in
(A) Radio transmission
(B) Telegraphy
(C) Telephone
(D) None of the above
27. The baud rate is
(A) always equal to the bit transfer rate
(B) equal to twice the bandwidth of an ideal channel
(C) not equal to the signalling rate
(D) equal to half of the bandwidth of an ideal channel
28. How much bandwidth is there in 1 micron of spectrum at a wavelength of 1 micron ?
(A) 300 MHz
(B) 3 GHz
(C) 300 THz
(D) 30 KHz
29. Which of the following file transfer protocols use TCP and establishes two virtual circuits between the local and remote server ?
(A) FTP
(B) TFTP
(C) TELNET
(D) NFS
30. The threshold effect in demodulator is
(A) exhibited by all demodulator, when the input signal to noise ratio is low.
(B) the rapid fall on output signal to noise ratio when the input signal to noise ratio fall below a particular value.
(C) the property exhibited by all A.M. suppressed carrier coherent demodulator.
(D) the property exhibited by correlation receiver.
31. Object code is the output of ______.
(A) Operating System
(B) Compiler or Assembler
(C) only Assembler
(D) only Compiler
32. ‘Macro’ in an assembly level program is _______.
(A) sub program
(B) a complete program
(C) a hardware portion
(D) relative coding
33. Grammar of the programming is checked at ________ phase of compiler.
(A) semantic analysis
(B) code generation
(C) syntax analysis
(D) code optimization
34. The register or main memory location which contains the effective address of the operand is known as
(A) pointer
(B) special location
(C) indexed register
(D) None of the above
35. Macro-processors are ______.
(A) Hardware
(B) Compiler
(C) Registers
(D) None of the above
36. The dynamic allocation of storage areas with VSAM files is accomplished by
(A) Hashing
(B) Control splits
(C) Overflow areas
(D) Relative recoding
37. Which of the following command the file names in multiple columns ?
(A) IS – X
(B) IS
(C) IS – 1
(D) IS – f – X
38. WINDOWS is a _________ operating.
(A) Real time
(B) Multi-user
(C) Preemptive
(D) Non-preemptive
39. Page making process from main memory to disk is called
(A) Interruption
(B) Termination
(C) Swapping
(D) None of the above
40. A Dead-lock in an Operating System is
(A) Desirable process
(B) Undesirable process
(C) Definite waiting process
(D) All of the above
41. Prototyping is used to
(A) test the software as an end product
(B) expand design details
(C) refine and establish requirements gathering
(D) None of the above
42. Which one of these are not software maintenance activity ?
(A) Error correction
(B) Adaptation
(C) Implementation of Enhancement
(D) Establishing scope
43. The system specification is the first deliverable in the computer system engineering process which does not include
(A) Functional Description
(B) Cost
(C) Schedule
(D) Technical Analysis
44. The COCOMO model was introduced in the book title “Software Engineering Economics” authored by
(A) Abraham Silberschatz
(B) Barry Boehm
(C) C.J. Date
(D) D.E. Knuth
45. The Warnier diagram enables analyst
(A) to represent information hierarchy in a compact manner
(B) to further identify requirement
(C) to estimate the total cost involved
(D) None of the above
46. A data mart may contain
(A) summarised data
(B) de-normalized data
(C) aggregate departmental data
(D) All of the above
47. Data mining is
(A) the process of extracting valid, previously unknown, comprehensible and actionable information from large databases and using it to make crucial business decisions.
(B) a tool that allows end users direct access and manipulation of data from within datawarehousing environment without the intervention of customised programming activity.
(C) a tool that helps end users extract useful business information from large database.
(D) All of the above
48. E-Choupal refers to
(A) calling meeting of Surpanches electronically.
(B) conducting Panchayat meeting using latest electronic gadgets.
(C) providing window of information to villagers and farmers in NIC network.
(D) None of the above
49. The basic concepts of ethics in information society is/are
(A) Responsibility
(B) Accountability
(C) Liability
(D) All of the above
50. One of the distinguished features of super-computer over other category of computer is
(A) parallel processing
(B) highest accuracy level
(C) more speed
(D) more capacity
UGC NET (NATIONAL ELIGIBILITY TEST) : OLD SOLVED/PREVIOUS EXAM QUESTION PAPERS WITH SOLUTIONS AND EXPLANATIONS AND FREE STUDY MATERIALS.
COMPUTER MEMORY BASED PREVIOUS YEARS SOLVED PAPERS I, II AND III TO PREPARE AND PASS THE UGC NET/SLET ENTRANCE EXAMINATION WITH HIGH PERCENTAGE.
COMPUTER BASIC QUESTIONS FOR BANK EXAM, HTAT, CTAT, TAT, UGC-NET, INTERVIEW AND OTHER EXAM'S, WHERE BASIC QUESTION'S ARE REQUIRED.
NOTE: Move mouse over your answer to see your answer is right or wrong. 26. Frequency shift keying is used mostly in
(A) Radio transmission
(B) Telegraphy
(C) Telephone
(D) None of the above
27. The baud rate is
(A) always equal to the bit transfer rate
(B) equal to twice the bandwidth of an ideal channel
(C) not equal to the signalling rate
(D) equal to half of the bandwidth of an ideal channel
28. How much bandwidth is there in 1 micron of spectrum at a wavelength of 1 micron ?
(A) 300 MHz
(B) 3 GHz
(C) 300 THz
(D) 30 KHz
29. Which of the following file transfer protocols use TCP and establishes two virtual circuits between the local and remote server ?
(A) FTP
(B) TFTP
(C) TELNET
(D) NFS
30. The threshold effect in demodulator is
(A) exhibited by all demodulator, when the input signal to noise ratio is low.
(B) the rapid fall on output signal to noise ratio when the input signal to noise ratio fall below a particular value.
(C) the property exhibited by all A.M. suppressed carrier coherent demodulator.
(D) the property exhibited by correlation receiver.
31. Object code is the output of ______.
(A) Operating System
(B) Compiler or Assembler
(C) only Assembler
(D) only Compiler
32. ‘Macro’ in an assembly level program is _______.
(A) sub program
(B) a complete program
(C) a hardware portion
(D) relative coding
33. Grammar of the programming is checked at ________ phase of compiler.
(A) semantic analysis
(B) code generation
(C) syntax analysis
(D) code optimization
34. The register or main memory location which contains the effective address of the operand is known as
(A) pointer
(B) special location
(C) indexed register
(D) None of the above
35. Macro-processors are ______.
(A) Hardware
(B) Compiler
(C) Registers
(D) None of the above
36. The dynamic allocation of storage areas with VSAM files is accomplished by
(A) Hashing
(B) Control splits
(C) Overflow areas
(D) Relative recoding
37. Which of the following command the file names in multiple columns ?
(A) IS – X
(B) IS
(C) IS – 1
(D) IS – f – X
38. WINDOWS is a _________ operating.
(A) Real time
(B) Multi-user
(C) Preemptive
(D) Non-preemptive
39. Page making process from main memory to disk is called
(A) Interruption
(B) Termination
(C) Swapping
(D) None of the above
40. A Dead-lock in an Operating System is
(A) Desirable process
(B) Undesirable process
(C) Definite waiting process
(D) All of the above
41. Prototyping is used to
(A) test the software as an end product
(B) expand design details
(C) refine and establish requirements gathering
(D) None of the above
42. Which one of these are not software maintenance activity ?
(A) Error correction
(B) Adaptation
(C) Implementation of Enhancement
(D) Establishing scope
43. The system specification is the first deliverable in the computer system engineering process which does not include
(A) Functional Description
(B) Cost
(C) Schedule
(D) Technical Analysis
44. The COCOMO model was introduced in the book title “Software Engineering Economics” authored by
(A) Abraham Silberschatz
(B) Barry Boehm
(C) C.J. Date
(D) D.E. Knuth
45. The Warnier diagram enables analyst
(A) to represent information hierarchy in a compact manner
(B) to further identify requirement
(C) to estimate the total cost involved
(D) None of the above
46. A data mart may contain
(A) summarised data
(B) de-normalized data
(C) aggregate departmental data
(D) All of the above
47. Data mining is
(A) the process of extracting valid, previously unknown, comprehensible and actionable information from large databases and using it to make crucial business decisions.
(B) a tool that allows end users direct access and manipulation of data from within datawarehousing environment without the intervention of customised programming activity.
(C) a tool that helps end users extract useful business information from large database.
(D) All of the above
48. E-Choupal refers to
(A) calling meeting of Surpanches electronically.
(B) conducting Panchayat meeting using latest electronic gadgets.
(C) providing window of information to villagers and farmers in NIC network.
(D) None of the above
49. The basic concepts of ethics in information society is/are
(A) Responsibility
(B) Accountability
(C) Liability
(D) All of the above
50. One of the distinguished features of super-computer over other category of computer is
(A) parallel processing
(B) highest accuracy level
(C) more speed
(D) more capacity
IF YOU FIND ANY ANSWER WRONG,COMMENT ME, SO THAT I RIGHT THAT ANSWER
THANKS
THANKS
0 comments:
Post a Comment