If Any request contact us :techtanu17@gmail.com << Catch on Facebook << If any link broken, Plz tell. we try to fix them.

Thursday 11 July 2013

UGC NET JUNE 2005 SOLVED PAPERII PART-2

UGC NET JUNE 2013 SYLLABUS, MODEL PAPER/ PREVIOUS YEARS SOLVED QUESTION PAPERS.
UGC NET (NATIONAL ELIGIBILITY TEST) : OLD SOLVED/PREVIOUS EXAM QUESTION PAPERS WITH SOLUTIONS AND EXPLANATIONS AND FREE STUDY MATERIALS.
COMPUTER MEMORY BASED PREVIOUS YEARS SOLVED PAPERS I, II AND III TO PREPARE AND PASS THE UGC NET/SLET ENTRANCE EXAMINATION WITH HIGH PERCENTAGE.
COMPUTER BASIC QUESTIONS FOR BANK EXAM, HTAT, CTAT, TAT, UGC-NET, INTERVIEW AND OTHER EXAM'S, WHERE BASIC QUESTION'S ARE REQUIRED. 

26.Which of the following are Data link layer standard ?
(1)Ethernet (2)HSSI (3) Frame Relay (4)10-base T (5)Token ring
(A) 1, 2 

(B) 1, 3, 5 
(C) 1, 3, 4, 5 
(D) 1, 2, 3, 4, 5


27.Which type of Bridge would be used to connect an Ethernet Segment with a token ring Segment ?
(A) Transparent Bridge 

(B) Source-Route Bridge 
(C) Translation Bridge 
(D) None


28.Which type of links are used for a connection between two DTE devices ?
(A) X.21 

(B) Frame Relay 
(C) ATM 
(D) Modem


29.Which protocol is used to encapsulate a data pocket created of a higher OSI model layer ?
(A) HDLC 

(B) SDLC 
(C) LAPB 
(D) LAPD


30.What is the correct subnet mask to use for a class-B address to support 30 Networks
and also have the most hosts possible ?
(A) 255.255.255.0 

(B) 255.255.192.0 
(C) 255.255.240.0 
(D) 255.255.248.0


31.Which of the statements related to Compilers is wrong ?
(A) Lexical analysis is breaking the input into tokens 

(B) Syntax analysis is for parsing the phrase
(C) Syntax analysis is for analyzing the semantic 

(D) None of these


32.Which of the following is the most general phase - structured grammar ?
(A) Regular 

(B) Context – Sensitive 
(C) Context free 
(D) None of these


33.Which activity is not included in the first pass of two pass assemblers ?
(A) Build the symbol table 

(B) Construct the machine code
(C) Separate mnemonic opcode and operand fields. 

(D) None of these


34.The dynamic binding occurs during the :
(A) Compile time 

(B) Run time 
(C) Linking time 
(D) Pre-processing time.


35.Symbol Table can be used for :
(A) Checking type compatibility 

(B) Suppressing duplication of error message
(C) Storage allocation 

(D) All of these


36.Moving Process from main memory to disk is called :
(A) Caching 

(B) Termination 
(C) Swapping 
(D) Interruption


37.The principle of Locality of reference justifies the use of :
(A) Virtual memory 

(B) Interrupts 
(C) Cache memory 
(D) Secondary memory


38.Bankers algorithm is for.
(A) Dead lock Prevention 

(B) Dead lock Avoidance
(C) Dead lock Detection 

(D) Dead lock creation


39.Which is the correct definition of a valid process transition in an operating system ?
(A) Wake up : Ready ?? Running
(B) Dispatch : Ready?? Running
(C) Block : Ready ?? Running
(D) Timer run out : Ready ?? Blocked



40.Which of the following is not an Unix Command ?
(A) Whoami 

(B) wc 
(C) ls 
(D) put


41.The capability maturity model (err) defines 5 levels :
(a)Level 1 (i)Managed
(b)Level 2 (ii)Defined
(c)Level 3 (iii) Repeatable
(d) Level 4 (iv) Initial
(e)Level 5 (v)Optimized 


correct matching is :
       a   b    c   d   e
(A) (i) (ii) (iii) (iv) (v)
(B) (iv) (iii) (ii) (i) (v)
(C) (v) (i) (iii) (ii) (iv)
(D) (v) (ii) (i) (iii) (iv)



42.Which one of the following is not a software process model ?
(A) Linear sequential model 

(B) Prototyping model
(C) The spiral model 

(D) COCOMO model


43. System Development Life-cycle has following stages :
(I) Requirement analysis 

(II) Coding
(III) Design 

(IV) Testing

Which option describes the correct sequence of stages ?
(A) III,I, IV,II 

(B) II, III,I, IV 
(C) I,III,IV,II 
(D) None of the above


44.Which one is measure of software complexity ?
(A) Number of lines of code (LOC) 

(B) Number of man years
(C) Number of function points (FP) 

(D) All of the above


45.Which type of coupling is least preferred ?
(A) Content coupling 

(B) Data coupling 
(C) Control coupling
(D) Common coupling


46.PVM and MPI Library functions are implemented on the top of the :
(A) Universal Message Passing (UMS)
(B) Network Interface Driver (NID)
(C) Media Access Control (MAC)
(D) None of these



47.The frequency reuse plan is divided into cell grouping using how many cells, where the
number of cells equals N ?
(A) 3 

(B) 10 
(C) 7 
(D) 21



 48.Which interim standard describes inter-switching networking ?
(A) IS - 54 

(B) IS - 95 
(C) DS - 45 
(D) ANSI – 41


49.Theoretically, how many 1.25 MHz Carriers are there in a CDMA cell ?
(A) 18 

(B) 22 
(C) 9 
(D) 64


50.Another name of IEEE 802.11a is :
(A) WECA 

(B) Fast Ethernet 
(C) Wi-Fi 5 
(D) 802.11g

 
IF YOU FIND ANY ANSWER WRONG,COMMENT ME, SO THAT I RIGHT THAT ANS.
THANKS


0 comments:

Post a Comment