If Any request contact us :techtanu17@gmail.com << Catch on Facebook << If any link broken, Plz tell. we try to fix them.

Thursday 11 July 2013

UGC NET DEC 2006 SOLVED PAPER II PART-2

UGC NET JUNE 2013 SYLLABUS, MODEL PAPER/ PREVIOUS YEARS SOLVED QUESTION PAPERS.
UGC NET (NATIONAL ELIGIBILITY TEST) : OLD SOLVED/PREVIOUS EXAM QUESTION PAPERS WITH SOLUTIONS AND EXPLANATIONS AND FREE STUDY MATERIALS.
COMPUTER MEMORY BASED PREVIOUS YEARS SOLVED PAPERS I, II AND III TO PREPARE AND PASS THE UGC NET/SLET ENTRANCE EXAMINATION WITH HIGH PERCENTAGE.
COMPUTER BASIC QUESTIONS FOR BANK EXAM, HTAT, CTAT, TAT, UGC-NET, INTERVIEW AND OTHER EXAM'S, WHERE BASIC QUESTION'S ARE REQUIRED.

26. How many DS1 signals are transported on a DS3 signal ?
(A) 24
(B) 672
(C) 14
(D) 28
ANS TELL ME.

27. A 10 BASE-2 network is limited to :
(A) 20 bytes per data field
(B) 30 stations per segment
(C) 40 segments
(D) 50 feet of cable

28. The network 198.78.41.0 is a :
(A) Class A Network
(B) Class B Network
(C) Class C Network
(D) Class D Network

29. The subnet mask 255.255.255.192
(A) Extends the network portion to 16 bits
(B) Extends the network portion to 26 bits
(C) Extends the network portion to 36 bits
(D) Has no effect on the network portion of an IP address
ANS TELL ME. 

30. The LAPB frame structure and the frame structure of SDLC are :
(A) Opposite
(B) Identical
(C) Reversed
(D) Non-identical

31. Linking :
(A) cannot be performed before relocation
(B) cannot be performed after relocation
(C) can be performed both before and after relocation
(D) is not required if relocation is performed
ANS TELL ME. 

32. Which of the following is the most general phase-structured grammar ?
(A) Regular
(B) Context-sensitive
(C) Context free
(D) Syntax tree

33. A compiler for a high level language that runs on one machine and produces code for  a different machine is called :
(A) Optimizing
(B) One pass compiler
(C) Cross compiler
(D) Multipass compiler

34. The ‘K’ in LR (R) cannot be :
(A) 0
(B) 1
(C) 2
(D) None of these

35. Peer-hole optimization is a form of :
(A) loop optimization
(B) local optimization
(C) constant folding
(D) data flow analysis

36. An operating system is :
(A) Collection of hardware components
(B) Collection of input-output devices
(C) Collection of software routines
(D) All the above

37. ____________ is one of pre-emptive scheduling algorithm.
(A) Shortest-Job-first
(B) Round-robin
(C) Priority based
(D) Shortest-Job-next

38. A software to create a Job Queue is called ____________ .
(A) Linkage editor
(B) Interpreter
(C) Driver
(D) Spooler

39. A permanent database of a general model of compiler is ____________ .
(A) Identifier table
(B) Page map table
(C) Literal table
(D) Terminal table
ANS TELL ME. 

40. Loading operating system from secondary memory to primary memory is called ____________ .
(A) Compiling
(B) Booting
(C) Refreshing
(D) Reassembling

41. Software Cost Performance index (CPI) is given by :
(A) BCWP/ACWP
(B)
(C) BCWP−ACWP
(D) BCWP−BCWS
Where : BCWP stands for Budgeted Cost of Work Performed
BCWS stands for Budget Cost of Work Scheduled
ACWP stands for Actual Cost of Work Performed

42. Software Risk estimation involves following two tasks :
(A) risk magnitude and risk impact
(B) risk probability and risk impact
(C) risk maintenance and risk impact
(D) risk development and risk impact
ANS TELL ME. 

43. In a object oriented software design, ‘Inheritance’ is a kind of __________ .
(A) relationship
(B) module
(C) testing
(D) optimization

44. Reliability of software is directly dependent on :
(A) quality of the design
(B) number of errors present
(C) software engineer’s experience
(D) user requirement
ANS TELL ME. 

45. ‘Abstraction’ is ____________ step of Attribute in a software design.
(A) First
(B) Final
(C) Last
(D) Middle
ANS TELL ME. 

46. The frequency band allocated for the downlink in GSM is :
(A) 960 - 985 MHz
(B) 935 - 960 MHz
(C) 920 - 945 MHz
(D) 930 - 955 MHz

47. Which of the following is an EDI standard ?
(A) ANSI X.15
(B) ANSI X.14
(C) ANSI X.13
(D) ANSI X.12

48. An INT file in Windows 95 is :
(A) a program file
(B) a message file
(C) a text file
(D) link file
ANS TELL ME. 

49. Link analysis operation in data mining uses ___________ technique.
(A) Classification
(B) Association discovery
(C) Visualisation
(D) Neural clustering

50. The maximum size of SMS in IS-95 is ______ octets.
(A) 120
(B) 95
(C) 128
(D) 64
ANS TELL ME. 
IF YOU FIND ANY ANSWER WRONG,COMMENT ME, SO THAT I RIGHT THAT ANSWER
THANKS


1 comments:

S P Sajjan says:

https://www.youtube.com/channel/UCEYgQmj6OG1sbk1b26DQidA

Post a Comment