If Any request contact us :techtanu17@gmail.com << Catch on Facebook << If any link broken, Plz tell. we try to fix them.

Thursday 11 July 2013

UGC NET DEC 2005 PAPER II SOLVED PART-2

UGC NET JUNE 2013 SYLLABUS, MODEL PAPER/ PREVIOUS YEARS SOLVED QUESTION PAPERS.
UGC NET (NATIONAL ELIGIBILITY TEST) : OLD SOLVED/PREVIOUS EXAM QUESTION PAPERS WITH SOLUTIONS AND EXPLANATIONS AND FREE STUDY MATERIALS.
COMPUTER MEMORY BASED PREVIOUS YEARS SOLVED PAPERS I, II AND III TO PREPARE AND PASS THE UGC NET/SLET ENTRANCE EXAMINATION WITH HIGH PERCENTAGE.
COMPUTER BASIC QUESTIONS FOR BANK EXAM, HTAT, CTAT, TAT, UGC-NET, INTERVIEW AND OTHER EXAM'S, WHERE BASIC QUESTION'S ARE REQUIRED.
 26. The data unit in the TCP/IP application Layer is called a __________ .
(A) message  

(B) segment 
(C) datagram (
D) frame


27. Which of following file retrieval methods use hypermedia ?
(A) HTML 

(B) Veronica 
(C) WAIS 
(D) HTTP



28. Which of following is an example of a client - server model :
(A) DNS 

(B) FTP 
(C) TELNET 
 (D) All the above


 

29. __________ provide a method to recover data that has been delivered but not get used :
(A) Segmentation 

(B) Concatenation 
(C) Transalation 
(D) Synchronization



30. Encryption and decryption are the functions of the __________ layer of OSI model :
(A) transport 

(B) session 
(C) router
(D) presentation


31. The Register or main memory location which contains the effective address of the operand is known as :
(A) Pointer 

(B)Indexed register 
(C) Special Locations 
(D) Scratch Pad



32. A Top - down Parse generates :
(A) Left most derivation 

(B) Right - most derivation
(C) Right - most derivation in reverse 

(D) Left - most derivation in reverse



33. A general macro processor is an in built function of :
(A) Loader 

(B) Linker 
(C) Editor 
(D) Assembler



34. Which of the following is not collision Resolution Technique :
(A) Hash addressing 

(B) Chaining
(C) Indexing 

(D) None of these


35. Which activities is not included in the first pass of two pass assembler ?
(A) build the symbol table
(B) construct the Intermediate code
(C) separate mnemonic op code and operand field.
(D) none of these



36. Producer consumer problem can be solved using :
(A) semaphores 

(B) event counters
(C) monitors 

 (D) all the above



37. If you want to execute more than one program at a time, the systems software that are
used must be capable of :
(A) word processing 

(B) virtual memory
(C) compiling 

(D) multitasking



38. Which of the following checks cannot be carried out on the input data to a system ?
(A) Consistency check 

(B) Syntax check
(C) Range check 

(D) All the above



39. Non modifiable procedures are called :
(A) Serially usable procedure 

(B) Concurrent procedure
(C) Re entrant procedure 

(D) Top-down procedure



40. Banker's algorithm is used for __________ purpose :
(A) Deadlock avoidance 

(B) Deadlock removal
(C) Deadlock prevention 

(D) Deadlock continuations



41. The testing of software against SRS is called :
(A) Acceptance testing 


(B) Integration testing
(C) Regression testing 

(D) Series testing


42. The lower degree of cohesion is :
(A) logical cohesion 

(B) coincidential cohesion
(C) procedural cohesion 

(D) communicational cohesion



43. The Reliability of the software is directly dependent upon :
(A) Quality of the design 


(B) Programmer’s experience
(C) Number of error 

(D) Set of user requirements


44. Successive layer of design in software using but ton-up design is called :
(A) Layer of Definement 

(B) Layer of Construction
(C) Layer of abstraction 

(D) None of the above



45. Sliding window concept of software project management is :
(A) Preperation of comprehensible plan
(B) Preparation of the various stages of development
(C) Ad-hoc planning
(D) Requirement analysis



46. Which of the following transmission media is used in Blue tooth Technology :
(A) Radio links 

(B) Microwave links
(C) V SAT Communication 

(D) Fiber – optic



47. Which of the following is a EDI standard ?
(A) ANSI X.15 

(B) ANSI X.14 
(C) ANSI X.13 
(D) ANSI X.12



48. Analysis of large database to retrieve information is called :
(A) OLTP 


(B) OLAP 
(C) OLDP 
(D) TLPP



49. The cost of the network is usually determined by :
(A) Time complexity 

(B) Switching complexity
(C) Circuit complexity 

(D) None of these


50. The mechanism with which several uses can share a medium without interference is :
(A) Frequency modulation 

(B) Amplitude modulation
(C) Multiplexing 

(D) None of these

                                          
   GO TO DEC 2005 PART-1 
                                   
IF YOU FIND ANY ANSWER WRONG,COMMENT ME, SO THAT I RIGHT THAT ANS.
THANKS


0 comments:

Post a Comment