If Any request contact us :techtanu17@gmail.com << Catch on Facebook << If any link broken, Plz tell. we try to fix them.

Thursday 11 July 2013

DECEMBER 2009 PAPER II SOLVED PART-2

UGC NET JUNE 2013 SYLLABUS, MODEL PAPER/ PREVIOUS YEARS SOLVED QUESTION PAPERS.
UGC NET (NATIONAL ELIGIBILITY TEST) : OLD SOLVED/PREVIOUS EXAM QUESTION PAPERS WITH SOLUTIONS AND EXPLANATIONS AND FREE STUDY MATERIALS.
COMPUTER MEMORY BASED PREVIOUS YEARS SOLVED PAPERS I, II AND III TO PREPARE AND PASS THE UGC NET/SLET ENTRANCE EXAMINATION WITH HIGH PERCENTAGE.
COMPUTER BASIC QUESTIONS FOR BANK EXAM, HTAT, CTAT, TAT, UGC-NET, INTERVIEW AND OTHER EXAM'S, WHERE BASIC QUESTION'S ARE REQUIRED.

 26. Device on one network can communicate with devices on another network via a
(A) Hub/switch 

(B) Utility server
( C) File server 

(D) Gateway


27. What is the maximum window size in sliding window protocol used in a computer network?
(A) 4 

(B) 8 
(C ) 15 
(D) 16

 
 28. Which of the following are Data Link Layer standard?
1. Ethernet 

2. HSSI 
3. Frame Relay
4. 10-Base T 

5. Token Ring

(A) 1,2,3 

(B) 1,3,5 
(C) 1,3,4,5 
(D) 1,2,3,4,5


29. In case of Bus/Tree topology signal balancing issue is overcome by
(A) Modulation 

(B) Polling
(C ) Segmentation 

(D) Strong transmitter


30. Match the following:
(i) Ethernet                          (a) Deterministic
(ii) Token Ring                    (b) Utilize the full wire speed
(iii) Cut-through switch       (c ) Prevent Looping
(iv) Spanning tree               (d) Checking valid address



Codes:
(A) i-d,ii-a,iii-b,iv-c 

(B) i-a,ii-d,iii-b,iv-c
(C ) i-d,ii-d,iii-c,iv-b 

(D) i-d,ii-c,iii-b,iv-a


31. In an absolute loading scheme which loader function is accomplished by assembler?
(A) re-allocation 

(B) allocation 
(C ) linking
(D) loading


 32. Which of the following grammar is LR(1)?
(A) A->aAb, A->bAb,A->a,A->b
(B) A->aAa,A->aAb,A->c
(C ) A->A+A,A->a
(D)Both (A) and (B)



33. A shift-reduce parser carries out the actions specified within braces immediately after reducing with the corresponding rule of the grammar.
S->xxW[ print “1” ]
S->y [ print “2” ]
W->S2 [ print “3” }, what is the translation of “x x x x y z z”?

(A) 1 1 2 3 1 

(B) 1 1 2 3 3
(C) 2 3 1 3 1 
(D) 2 3 3 2 1


34. Context-free Grammar(CFG) can be recognized by
(A) Finite state automata
(B) 2-way linear bounded automata
(C ) push down automata
(D ) Both (B) and (C)



35. Synthesized attribute can be easily simulated by a
(A) LL grammar 

(B) Ambiguous grammar
(C ) LR grammar 

(D) None of the above


36. In the process management Round-robin method is essentially the per-emptive version of _______________.
(A) FILO 

(B) FIFO
(C ) SSF 

(D) Longest time first


37. A page fault
(A) is an error specific page
(B) is an access to the page not currently in memory
(C ) occur when a page program occur in a page memory.
(D ) page used in the previous page reference.



38. A semaphore count of negative n means (s=-n) that the queue contains ___n__________ waiting processes.
(A) n + 1 

(B) n 
(C) n – 1 
(D) 0


39. A program is located in the smallest available hole in the memory is ______________
(A) best-fit 

(B) first-bit 
(C ) worst-fit 
(D ) buddy


40. The UNIX command used to find out the number of characters in a file is
(A) nc 

(B) wc 
(C ) chcnt 
(D) lc


 41. Software Engineering is a discipline that integrates __________ for the development of computer software.
(A) Process 

(B) Methods 
(C ) Tools 
(D) All


42. Any error whose cause cannot be identified anywhere within the software system is called _________________.
(A) Internal error 

(B) External error
(C ) Inherent error

 (D) Logic error


43. Recorded software attributes can be used in the following endeavors:
(i) Cost and schedule estimates.
(ii) Software product reliability predictions
(iii )Managing development process
(iv). No where

 
Codes:
(A) (i) (ii) (iv)
(B) (ii) (iii) (iv)
(C) (i) (ii) (iii)
(D) (i) (ii) (iii) (iv)



44. Black box testing is done
(A) To show that s/w is operational at its interfaces i.e. input and output.
(B) To examine internal details of code
(C) At client side
(D) None of the above


45. The name of the transaction file shall be provided by the operator and the file that contains the edited transactions ready for execution shall be called
(A) Batch.exe 

(B) Trans.exe 
(C ) Opt.exe 
(D) Edit.exe


46. The single stage network is also called
(A) One sided network 

(B) two sided network 
(C ) recirculating network
(D) pipeline network



47. Analysis of large database to retrieve information is called
(A) OLTP 

(B) OLAP 
(C ) OLDP 
(D) OLPP


48. Which technology is sometime referred to as wireless cable?
(A) MMDS 

(B) ATM 
(C ) LMDS 
(D) CDMA


 49. Another name of IEEE 802.11 a is ______________
(A) Wi-Max 

(B) Fast Ethernet 
(C) Wi-fi 
(D) 802.11 g


50. The unlicensed National Information Infrastructure band operates at the _______frequency
(A) 2.4 GHz 

(B) 5 GHz 
(C ) 33 MHz 
(D) 5 MHz

 
 GOTO DEC 2009 PAPER II SOLVED PART-1 

 IF YOU FIND ANY ANSWER WRONG,COMMENT ME,SO THAT I RIGHT THAT ANSWER
THANKS


0 comments:

Post a Comment