If Any request contact us :techtanu17@gmail.com << Catch on Facebook << If any link broken, Plz tell. we try to fix them.

Thursday 11 July 2013

JUNE 2010 SOLVED PAPER II PART-1

UGC NET JUNE 2013 SYLLABUS, MODEL PAPER/ PREVIOUS YEARS SOLVED QUESTION PAPERS.
UGC NET (NATIONAL ELIGIBILITY TEST) : OLD SOLVED/PREVIOUS EXAM QUESTION PAPERS WITH SOLUTIONS AND EXPLANATIONS AND FREE STUDY MATERIALS.
COMPUTER MEMORY BASED PREVIOUS YEARS SOLVED PAPERS I, II AND III TO PREPARE AND PASS THE UGC NET/SLET ENTRANCE EXAMINATION WITH HIGH PERCENTAGE.
COMPUTER BASIC QUESTIONS FOR BANK EXAM, HTAT, CTAT, TAT, UGC-NET, INTERVIEW AND OTHER EXAM'S, WHERE BASIC QUESTION'S ARE REQUIRED.
 

NOTE: Move mouse over your answer to see your  answer is right or wrong.

1. “x1 is a clone of x” means x1 is identical to x in terms of the physical attributes namely, height, weight and complexion. Given, height, weight and complexion only form a complete set of attributes for an entity, cloning is an equivalence relation. What is your impression about this statement ?

(A) The statement is true
(B) The statement is false
(C) The truth value of the statement cannot be computed
(D) None of these

2. ‘R is a robot of M’ means R can perform some of the tasks that otherwise M would do and R is unable to do anything else. Which of the following is the most appropriate representation to model this situation ?

ANS TELL ME. 
3. “My Lafter Machin (MLM) recognizes the following strings :
(i) a
(ii) aba
(iii) abaabaaba
(iv) abaabaabaabaabaabaabaabaaba

Using this as an information, how would you compare the following regular expressions ?
(i) (aba)3x
(ii) a.(baa)3x–1. ba
(iii) ab.(aab).3x–1.a

(A) (ii) and (iii) are same, (i) is different.
(B) (ii) and (iii) are not same.
(C) (i), (ii) and (iii) are different.
(D) (i), (ii) and (iii) are same.

4. S1 : I teach algorithms and maths.
S2 : My professor teaches maths,electronics and computer science.
S3 : I have a student of maths.
S4 : Algorithm is a part of computer science.
S5 : Maths students know computer science.


What would be the chromatic number of a graph, vertices of which are the actors/entities that are involved in the sentences S1 to S5 and edges-to represent the associations/relationships amongst the entities/actors as expressed in the sentences S1 to S5 above ?
(A) 2
(B) 3
(C) 4
(D) None of these
ANS TELL ME.

5. Four your ATM debit card, you have a 4-decimal-digit personal secret code. In the absence of any clue, a
brute-force attack takes time-‘t’ to crack the code on an ATM terminal. Therefore ‘t’ is the secure-time for a customer to report in case the card is misplaced. Your Bank has decided to facilitate an increased secure-time. Out of the following, which option should provide the largest rise in the value of ‘t’ ?
(A) Instead of 4-decimal-digits, maintain the personal secretcode in 4-hexadecimal-digits.
(B) Instead of 4-decimal digits, maintain a 5-decimal-digit personal secret code.
(C) Reduce the processing speed of the ATM terminals to the half of their current speed.
(D) None of the above provides any improvement

6. The logic expression for the output of the circuit shown in the figure is
 
ANS C.

7. Advantage of synchronous sequential circuits over asynchronous ones is
(A) faster operation
(B) ease of avoiding problems due to hazard
(C) lower hardware requirement
(D) better noise immunity

8. What is the transitive voltage for the voltage input of a CMOS operating from 10V supply ?
(A) 1V
(B) 2V
(C) 5V
(D) 10 V

9. What is decimal equivalent of BCD 11011.1100 ?
(A) 22.0
(B) 22.2
(C) 20.2
(D) 21.2

10. The function represented by the kmap given below is

 
ANS TELL ME.

11. The statement print f (“ % d”, 10 ? 0 ? 5 : 1 : 12); will print
(A) 10
(B) 0
(C) 12
(D) 1

12. What will be the output of the following c-code ?
void main ( )
{
char *P = "ayqm" ;
char c;
c = ++*p ;
printf ("%c", c);
}
(A) a
(B) c
(C) b
(D) q

13. Member of a class specified as _______ are accessible only to method of the class.
(A) private
(B) public
(C) protected
(D) derive

14. Match the following :
(a) Garbage collection in 1. Java
(b) Nameless object 2. generic programming
(c) Template support 3. defines a class
(d) A forward reference 4. member function
(e) Derived class inherits from base class 5. within a statement
Codes :
(a) (b) (c) (d) (e)
(A) 1 5 4 2 3
(B) 1 5 2 3 4
(C) 5 1 2 3 4
(D) 5 4 3 1 2

15. The data type created by the data abstraction process is called
(A) class
(B) structure
(C) abstract data type
(D) user defined data type

16. An entity instance is a single occurrence of an _______.
(A) entity type
(B) relationship type
(C) entity and relationship type
(D) None of these

17. Generalization is _______ process.
(A) top-down
(B) bottom up
(C) both (A) & (B)
(D) None of these

18. Match the following :
I. 2 NF (a) transitive dependencies eliminated
II. 3 NF (b) multivalued attribute removed
III. 4 NF (c) contain no partial functional dependencies
IV. 5 NF (d) contains no join dependency
Codes :
I II III IV
(A) (a) (c) (b) (d)
(B) (d) (a) (b) (c)
(C) (c) (d) (a) (b)
(D) (d) (b) (a) (c)

19. Which data management language component enabled the DBA todefine the schema components ?
(A) DML
(B) Sub-schema DLL
(C) Schema DLL
(D) All of these

20. The PROJECT Command will create new table that has
(A) more fields than the original table
(B) more rows than original table
(C) both (A) & (B)
(D) none of these

21. If we have six stack operations-pushing and popping each of A, B and C-such that push (A) must occur before push (B) which must occur before push (C), then A, C, B is a possible order for the pop operations,
since this could be our sequence : push (A), pop (A), push (B), push (C), pop (C), pop (B). Which one of the following orders could not be the order the pop operations are run, if we are to satisfy the requirements described above ?
(A) ABC
(B) CBA
(C) BAC
(D) CAB

22. What is the most appropriate data structure to implement a priority queue ?
(A) Heap
(B) Circular array
(C) Linked list
(D) Binary tree

23. In a complete binary tree of n nodes, how far are the two most distant nodes ? Assume each edge in the
path counts as !
(A) About log2n
(B) About 2 log2n
(C) About n log2n
(D) About 2n

24. A chained hash table has an array size of 100. What is the maximum number of entries that can be placed in the table ?
(A) 100
(B) 200
(C) 10000
(D) There is no upper limit
ANS TELL ME. 

25. In a B tree of order 5, the following keys are inserted as follows :7, 8, 1, 4, 13, 20, 2, 6 and 5
How many elements are present in the root of the tree ?
(A) 1
(B) 2
(C) 3
(D) 4
IF YOU FIND ANY ANSWER WRONG,COMMENT ME, SO THAT I RIGHT THAT ANSWER
THANKS


0 comments:

Post a Comment