UGC NET JUNE 2013
SYLLABUS, MODEL PAPER/ PREVIOUS YEARS SOLVED QUESTION PAPERS.
UGC NET (NATIONAL ELIGIBILITY TEST) : OLD SOLVED/PREVIOUS EXAM QUESTION PAPERS WITH SOLUTIONS AND EXPLANATIONS AND FREE STUDY MATERIALS.
COMPUTER MEMORY BASED PREVIOUS YEARS SOLVED PAPERS I, II AND III TO PREPARE AND PASS THE UGC NET/SLET ENTRANCE EXAMINATION WITH HIGH PERCENTAGE.
COMPUTER BASIC QUESTIONS FOR BANK EXAM, HTAT, CTAT, TAT, UGC-NET, INTERVIEW AND OTHER EXAM'S, WHERE BASIC QUESTION'S ARE REQUIRED.
26. Queue is a __________ list.
(A) LIFO
(B) LILO
(C) FILO
(D) FIFO
27. In a full binary tree of height k, there are __________ internal nodes.
(A) 2**k-1
(B) 2**(k-1)
(C) 2**k
(D) 2**k+1
28. A binary tree is said to have heap property if the elements along any path :
(A) from leaf to root are non–increasing
(B) from leaf to root are non–decreasing
(C) from root to leaf are non–decreasing
(D) from root to leaf are non–increasing
29. X.25 protocol consists of :
(A) Physical and Frame levels
(B) Frame and Packet levels
(C) Physical, Frame and Packet levels
(D) None of the above
30. GSM/CDMA systems :
(A) are limited to very low speed data
(B) require no local loop wires
(C) are predominantly used for voice
(D) all of the above
ANS TELL ME.
31. Usually information security in a network is achieved by :
(A) Layering
(B) Cryptography
(C) Grade of service
(D) None of the above
32 The linker :
(A) is similar to interpreter
(B) uses source code as its input
(C) is required to create a load module
(D) none of the above
33. In which addressing mode the operand is given explicitly in the instruction itself ?
(A) Absolute mode
(B) Immediate mode
(C) Indirect mode
(D) Index mode
34. A compiler that runs on one machine and produces code for a different machine is called :
(A) Cross compilation
(B) One pass compilation
(C) Two pass compilation
(D) None of the above
35. Any syntactic construct that can be described by a regular expression can also be described by a :
(A) Context sensitive grammar
(B) Non context free grammar
(C) Context free grammar
(D) None of the above
36. Find the odd man out :
(A) tail
(B) cut
(C) wart
(D) sed
37. Which of the following changes permission to deny write permission to group and
others ?
(A) Chmod go2w filex
(B) Chmod go w filex
(C) Chmod go5w filex
(D) None of the above
38. Variable partition memory management technique with compaction results in :
(A) Reduction of fragmentation
(B) Minimal wastage
(C) Segment sharing
(D) None of the above
39. Capability Maturity Model is meant for :
(A) Product
(B) Process
(C) Product and Process
(D) None of the above
40. In the light of software engineering software consists of :
(A) Programs
(B) Data
(C) Documentation
(D) All of the above
41. Which one of the following ISO standard is used for software process ?
(A) ISO 9000
(B) ISO 9001
(C) ISO 9003
(D) ISO 9000–3
42. Which of the following is used for test data generation ?
(A) White Box
(B) Black Box
(C) Boundary–value analysis
(D) All of the above
43. Reverse engineering is the process which deals with :
(A) Size measurement
(B) Cost measurement
(C) Design recovery
(D) All of the above
44. The spacing between character pairs is called :
(A) kerning
(B) x-height
(C) intercap
(D) serif
45. When compared with analog cellular systems, an advantage of digital TDMA cellular system is that :
(A) it is less complicated
(B) it requires less of computer memory
(C) it conserves spectrum bandwidth
(D) it costs less
46. E–commerce includes :
(A) B2C
(B) B2B
(C) C2C
(D) All of the above
47. A clustering technique that permits a convenient graphical display is :
(A) partition based clustering
(B) probabilistic model based clustering
(C) hierarchical clustering
(D) agglomerative clustering
48. After sending a message ,the sender should not be able to, at a later date, deny having
sent the message, is referred to as :
(A) Authenticity
(B) Non–Repudiability
(C) Auditability
(D) Repudiability
49. The device which connects dissimilar LANs of different topologies using different sets
of communication protocols so that information can flow from one to another is called :
(A) Router
(B) Bridge
(C) Gateway
(D) Switch
50. We can not delete the __________ icon but we can made it invisible.
(A) Recycle
(B) My computer
(C) Internet explorer
(D) None of the above
UGC NET (NATIONAL ELIGIBILITY TEST) : OLD SOLVED/PREVIOUS EXAM QUESTION PAPERS WITH SOLUTIONS AND EXPLANATIONS AND FREE STUDY MATERIALS.
COMPUTER MEMORY BASED PREVIOUS YEARS SOLVED PAPERS I, II AND III TO PREPARE AND PASS THE UGC NET/SLET ENTRANCE EXAMINATION WITH HIGH PERCENTAGE.
COMPUTER BASIC QUESTIONS FOR BANK EXAM, HTAT, CTAT, TAT, UGC-NET, INTERVIEW AND OTHER EXAM'S, WHERE BASIC QUESTION'S ARE REQUIRED.
26. Queue is a __________ list.
(A) LIFO
(B) LILO
(C) FILO
(D) FIFO
27. In a full binary tree of height k, there are __________ internal nodes.
(A) 2**k-1
(B) 2**(k-1)
(C) 2**k
(D) 2**k+1
28. A binary tree is said to have heap property if the elements along any path :
(A) from leaf to root are non–increasing
(B) from leaf to root are non–decreasing
(C) from root to leaf are non–decreasing
(D) from root to leaf are non–increasing
29. X.25 protocol consists of :
(A) Physical and Frame levels
(B) Frame and Packet levels
(C) Physical, Frame and Packet levels
(D) None of the above
30. GSM/CDMA systems :
(A) are limited to very low speed data
(B) require no local loop wires
(C) are predominantly used for voice
(D) all of the above
ANS TELL ME.
31. Usually information security in a network is achieved by :
(A) Layering
(B) Cryptography
(C) Grade of service
(D) None of the above
32 The linker :
(A) is similar to interpreter
(B) uses source code as its input
(C) is required to create a load module
(D) none of the above
33. In which addressing mode the operand is given explicitly in the instruction itself ?
(A) Absolute mode
(B) Immediate mode
(C) Indirect mode
(D) Index mode
34. A compiler that runs on one machine and produces code for a different machine is called :
(A) Cross compilation
(B) One pass compilation
(C) Two pass compilation
(D) None of the above
35. Any syntactic construct that can be described by a regular expression can also be described by a :
(A) Context sensitive grammar
(B) Non context free grammar
(C) Context free grammar
(D) None of the above
36. Find the odd man out :
(A) tail
(B) cut
(C) wart
(D) sed
37. Which of the following changes permission to deny write permission to group and
others ?
(A) Chmod go2w filex
(B) Chmod go w filex
(C) Chmod go5w filex
(D) None of the above
38. Variable partition memory management technique with compaction results in :
(A) Reduction of fragmentation
(B) Minimal wastage
(C) Segment sharing
(D) None of the above
39. Capability Maturity Model is meant for :
(A) Product
(B) Process
(C) Product and Process
(D) None of the above
40. In the light of software engineering software consists of :
(A) Programs
(B) Data
(C) Documentation
(D) All of the above
41. Which one of the following ISO standard is used for software process ?
(A) ISO 9000
(B) ISO 9001
(C) ISO 9003
(D) ISO 9000–3
42. Which of the following is used for test data generation ?
(A) White Box
(B) Black Box
(C) Boundary–value analysis
(D) All of the above
43. Reverse engineering is the process which deals with :
(A) Size measurement
(B) Cost measurement
(C) Design recovery
(D) All of the above
44. The spacing between character pairs is called :
(A) kerning
(B) x-height
(C) intercap
(D) serif
45. When compared with analog cellular systems, an advantage of digital TDMA cellular system is that :
(A) it is less complicated
(B) it requires less of computer memory
(C) it conserves spectrum bandwidth
(D) it costs less
46. E–commerce includes :
(A) B2C
(B) B2B
(C) C2C
(D) All of the above
47. A clustering technique that permits a convenient graphical display is :
(A) partition based clustering
(B) probabilistic model based clustering
(C) hierarchical clustering
(D) agglomerative clustering
48. After sending a message ,the sender should not be able to, at a later date, deny having
sent the message, is referred to as :
(A) Authenticity
(B) Non–Repudiability
(C) Auditability
(D) Repudiability
49. The device which connects dissimilar LANs of different topologies using different sets
of communication protocols so that information can flow from one to another is called :
(A) Router
(B) Bridge
(C) Gateway
(D) Switch
50. We can not delete the __________ icon but we can made it invisible.
(A) Recycle
(B) My computer
(C) Internet explorer
(D) None of the above
IF YOU FIND ANY ANSWER WRONG,COMMENT ME,SO THAT I RIGHT THAT ANSWER
THANKS
THANKS
0 comments:
Post a Comment