If Any request contact us :techtanu17@gmail.com << Catch on Facebook << If any link broken, Plz tell. we try to fix them.

Thursday 11 July 2013

DECEMBER 2008 SOLVED PAPER II PART-2

UGC NET JUNE 2013 SYLLABUS, MODEL PAPER/ PREVIOUS YEARS SOLVED QUESTION PAPERS.
UGC NET (NATIONAL ELIGIBILITY TEST) : OLD SOLVED/PREVIOUS EXAM QUESTION PAPERS WITH SOLUTIONS AND EXPLANATIONS AND FREE STUDY MATERIALS.
COMPUTER MEMORY BASED PREVIOUS YEARS SOLVED PAPERS I, II AND III TO PREPARE AND PASS THE UGC NET/SLET ENTRANCE EXAMINATION WITH HIGH PERCENTAGE.
COMPUTER BASIC QUESTIONS FOR BANK EXAM, HTAT, CTAT, TAT, UGC-NET, INTERVIEW AND OTHER EXAM'S, WHERE BASIC QUESTION'S ARE REQUIRED.

26. The output of the program code
main()
{
int x = 0;
while ( x < = 10)
for(;;)
if (++x%10==0)
break;
printf(“x=%d”,x);
}
is:

(A). x = 1 

(B). compilation error
(C ). x = 20 

(D) none of the above


27. A copy constructor is invoked when : 
(A). a function returns by value 
(B). an argument is passed by value 
(C ). A function returns by reference
 (D). none of the above


28. When a language has the capability to produce new data types, it is said to be : 
(A). extensible 
(B). encapsulated 
(C ). Overloaded 
(D). none of the above


29. How many constructors can a class have? 
(A) Zero 
(B) 1 
(C ) 2 
(D) any number


30. An entity has:
 (i) a set of properties 
(ii) a set of properties and values for all the properties 
(iii) a set of properties and the values for some set of properties may non-uniquely identify an entity 
(iv) a set of properties and the values for some set of properties may uniquely identify an entity Which of the above are valid? 
(A) (i) only 
(B) (ii) only 
(C ) (iii) only 
(D) (iv) only


31. Aggregation is:
 (A) An abstraction through which relationships are treated as lower level entities 
(B) An abstraction through which relationships are treated as higher level entities 
(C) An abstraction through which relationships are not treated at all as entities 
(D) None of the above


32. Suppose R is a relation schema and F is a set of functional dependencies on R. Further, suppose R1 and R2 forma a decomposition of R. Then the decomposition is a lossless join decomposition of R provided that : 
(A) R1nR2 ->R1 is in F+
(B) R1 n R2->R2 is in F+
(C) Both R1 n R2->R1 and R1 n R2->R3 functional dependencies are in F+
(D)At least one from R1nR2->R1 and R1 n R2->R2 is in F+


 
 
33. In a heap, every element is ________________ of all the elements in the subtree.
(A) Maximum 

(B) minimum
(C ) sum 

(D) product


34. If (rear == maxsize – 1) rear=0; else rear=rear+1; is required in :
(A) circular queue 

(B) linear queue 
(C) stack 
(D) deque


35. A high performance switching and multiplexing technology that utilizes fixed length packets to carry different types of traffic is :
(A) ATM 

(B) ADSL 
(C) SONET 
(D) None of the above
 


36. A conventional LAN bridge specifies only the functions of OSI:
(A) Layers 1 and 2 

(B) layers 1 through 3 
(C) all layers 
(D) none of the above


 37. An assembly program contains:
(A) Imperative and declarative statements
(B) Imperative statements and assembler directives
(C) Imperative and declarative statements as well as assembler directives
(D) Declarative statements and assembler directives


 
 
38. In which addressing mode, the effective address of the operand is generated by adding a constant value to the contents of a register?
(A) Absolute mode 

(B) immediate mode 
(C) indirect mode 
(D) index mode


39. Which of the following are Assembler directives?
(i) EQU

 (ii) ORIGIN 
(iii) START
(iv) END

(A) (ii),(iii) and (iv) 

(B) (i),(iii) and (iv)
(B) (iii) and (iv) 

(D) (i),(ii),(iii) and (iv)

 
40. Which of the following OS treats hardware as a file system?
(A) UNIX 

(B) DOS 
(C) Windows NT 
(D) none of the above

 
41. In which of the following, ready to execute processes must be present in RAM?
(A) Multiprocessing 

(B) multiprogramming 
(C) multitasking 
(D) all of the above

 
 
42. If the executing program size is greater than the existing RAM of a computer, it is still possible to execute the program if the OS supports:
(A) Multitasking 

(B) virtual memory 
(C) paging system 
(D) none of the above
 



43. Software Quality Assurance (SQA) encompasses:
(A) Verification 

(B) validation 
(C) both verification and validation 
(D) none of the above



44. Which level is called as “defined” in capability maturity model?
(A) Level 0 
(B) level 3 
(C) level 4 
(D) level 1
 

 
45. COCOMO model is used for:
(A) Product quality estimation 
(B). product complexity estimation
(C) product cost estimation
 (D) all of the above
 

 
46. Font sizes are usually expressed in points. One point is:
(A) 0.0069 inch 
(B) 0.0138 inch
(C) 0.0207 inch 
(D) 0.0276 inch
 


47. Assertion (A): Cellular telephone systems can handle a multitude of users.
Reasoning(R ): Cellular telephone systems permit extensive frequency reuse in a small local area.

(A) Both (A) and (R ) are true and (R ) is the correct explanation for (A)
(B) Both (A) and (R ) are true but (R ) is not the correct explanation
(C) (A) is true but (R ) is false
(D) (A) is false but (R ) is true



48. E-Commerce involves:
(A)Electronic Data Interchange
 (B) Electronic mail
(C) Electronic Bulletin boards 
(D) All of the above


49. An example of a data mining algorithm which uses squared error score function is:
(A) CART algorithm 
(B) back propagation algorithm 
(C) a priori algorithm
(D) vector space algorithm



50. (I) Each object in the active directory of windows 2000 has an access control list.
(II) The scheme is a blueprint of all objects in the domain of windows 2000. Which of the following is true?

(A) Only (I) 
(B) only (II) 
(C) both (I) and (II) 
(d) none of the above

 
IF YOU FIND ANY ANSWER WRONG,COMMNET ME, SO THAT I RIGHT THAT ANSWER
THANKS    


0 comments:

Post a Comment