UGC NET JUNE 2013
SYLLABUS, MODEL PAPER/ PREVIOUS YEARS SOLVED QUESTION PAPERS.
UGC NET
(NATIONAL ELIGIBILITY TEST) : OLD SOLVED/PREVIOUS EXAM QUESTION PAPERS WITH
SOLUTIONS AND EXPLANATIONS AND FREE STUDY MATERIALS.
COMPUTER MEMORY BASED PREVIOUS YEARS SOLVED PAPERS I, II AND III TO
PREPARE AND PASS THE UGC NET/SLET ENTRANCE EXAMINATION WITH HIGH
PERCENTAGE.
COMPUTER BASIC QUESTIONS FOR BANK EXAM, HTAT, CTAT,
TAT, UGC-NET, INTERVIEW AND OTHER EXAM'S, WHERE BASIC QUESTION'S ARE REQUIRED.
IF YOU KNOW ANSWER OF ANY QUESTIONS PLEASE TELL ME. THAT ANSWER HELP THE OTHER STUDENT IN FUTURE. THANKS. PLEASE REPLY RIGHT ANSWER.
101. A client-server
system is based on IF YOU KNOW ANSWER OF ANY QUESTIONS PLEASE TELL ME. THAT ANSWER HELP THE OTHER STUDENT IN FUTURE. THANKS. PLEASE REPLY RIGHT ANSWER.
(a) mainframe technology
(b) WAN technology
(c)LAN technology
(d) Unix operating system
102. A multiplexor is a form of
(a) hub
(b) modem
(c) bridge
(d) none of the previous
103. A hub is a
(a) router
(b) a bridge
(c) repeater
(d) all of the previous
104. A search engine is
(a) hardware
(b) IR system for the Internet
(c) browser
(d) none of the previous
105. An ISP
(a) provides access to the Internet
(b) is a CPU register
(c) is a CPU functional unit
(d) make of processor
106. FTP is
(a) used to send email
(b) used to browse the Web
(c) is part of Netscape
(d) is aprotocol for the transfer of files between computers
107. Telnet
(a) used to send email
(b) uses telephone lines
(c) is part of Netscape
(d) is aprotocol that allows for remote login
108. A firewall is
(a) used to protect a computer room from fires and floods
(b) a form ofvirus
(c) a screen saver program
(d) none of the previous
109. A proxy server is
(a) a backup server
(b) an email server
(c) a poor file server
(d) noneof the above
110. An RDBMS is a
(a) remote DBMS
(b) relative DBMS
(c) Relational DBMS
(d)Reliable DBMS
111 Data Warehousing refers to
(a) storing data offline at a separate site
(b) backing up dataregularly
(c) is related to data mining
(d) uses tape as opposed to disk
112. A 4GL is
(a) DBMS system
(b) uses Java
(c) uses C++
(d) none of the previous.
113. The Pentium processor is
(a) 16-bit
(b) 32-bit
(c) 64 bit
(d) 8-bit
114. The IBM/Motorola PowerPC 601 processor is
(a) 16-bit
(b) 32-bit
(c) 64 bit
(d) 8-bit
115. The Motorola 68000 processor is
(a) 16-bit
(b) 32-bit
(c) 64 bit
(d) 8-bit
116. The Digital Alpha processor is
(a) 16-bit
(b) 32-bit
(c) 64 bit
(d) 8-bit
117. Apple’s iMac uses a
(a) ISA bus
(b) NuBus
(c) PCI bus
(d) USB bus
118 Which of the following is NOT a bus standard
(a) EISA
(b) VME
(c) MCA
(d) RS-232
120. The feature size of a Pentium is approx.
(a) 1 micron
(b) 0.1 microns
(c) 4 microns
(d) .4 microns
121. The resolution of an SVGA screen is
(a) 1024 x 768
(b) 512 x 512
(c) 640 x 480
(d)800 x 800
122. A 5 stage pipeline with the stages taking 1, 1, 3, 1, 1, units of time has a throughput of
(a) 1/3
(b) 1/7
(c) 7
(d) 3
123. Given a 5 stage pipeline with stages taking 1, 2, 3, 2, 1 units of time, the throughput of the pipeline is:
(a) 9
(b) 1/9
(c) 1/3
(d) 2
124. Given a 5 stage pipeline with stages taking 1, 2, 3, 1, 1 units of time, the clock period of the pipeline is:
(a) 8
(b) 1/8
(c) 1/3
(d) 3
125. Given a 5 stage pipeline with stages taking 1, 2, 3, 1, 1 units of time, the flowthrough time of the pipeline is:
(a) 8
(b) 1/8
(c) 1/3
(d) 3
126. The average memory access time for a machine with a cache hit rate of 90% where the cache access time is 10ns and the memory access time is 100ns is
(a) 55ns,
(b) 45ns,
(c) 90ns,
(d) 19ns
127. The clock speed of a modern PC is of the order of
(a) 400 Khz
(b) 400 Hz
(c) 400Mhz
(c) 400 Ghz
128. Given that the subprogram putc displays the character in al, the effect of the following instructions:
mov al, ‘c’
sub al, 2
call putc
is to
(a) display 2
(b) display 'c'
(c) display 'a'
(d) display a blank
129. Given that the bl register contains ‘b’, the effect of the following instruction
and bl, 1101 1111 is to
(a) clear bl
(b) store ‘B’ in bl
(c) store 0010 0000 in bl (d) leave bl unchanged
130. Which of the following is an illegal instruction
(a) MoV Ax, 30000
(b) iNc Al, 1
(c) aNd bx, bx
(d) add ax, 30
131 An OR gate generates a low output when
(a) any one of its inputs is low
(b) all of its inputs are high
(c)when all of its inputs are low
(d) power fails
132. Given that the subprogram putc displays the character in al, the effect of the following instructions:
mov al, ‘a’
add al, 2
call putc
is to
(a) display 2
(b) display c
(c) display a
(d) display a blank
133. Given that the bl register contains ‘B’, the effect of the following instruction or bl, 0010 0000 is to
(a) clear bl
(b) store ‘b’ in bl
(c) store 0010 0000 in bl
(d) leave bl unchanged
133b. Given that the bl register contains ‘B’, which of the following instructions will change bl so that it contains 'b'
(a) or bl, 0010 0000
(b) and bl, 0010 0000
(c) or bl, 1101 1111 in bl
(d) and bl, 1101 1111
13 Given that the bl register contains ‘b’, which of the following instructions will change bl so that it contains
'B'
(a) or bl, 0010 0000
(b) and bl, 0010 0000
(c) or bl, 1101 1111 in bl
(d) and bl, 1101 1111
134. Which of the following is an illegal instruction
(a) MoV Ax, 30000
(b) iNc Al
(c) aNd bx, bx
(d) add ax 30
135. An AND gate generates a high output when
(a) any one of its inputs is high
(b) all of its inputs are high
(c)when all of its inputs are low
(d) power fails
136. Given that the subprogram putc displays the character in al, the effect of the following instructions:
mov al, ‘0’
add al, 2
call putc
is to
(a) display ‘2’
(b) display '3'
(c) display '0'
(d) display a blank
137.Given that the bl register contains 1111 0000, the effect of the following instructionor bl, 0000 1111 is to
(a) clear bl
(b) store 1111 1111 in bl
(c) store 0000 1111 in bl
(d) leave bl unchanged
138. Which of the following is an illegal 8086 instruction
(a) mov 20, bx
(b) iNc Al
(c) aNd bx, bx
(d) add ax, 30
139. Which of the following is an illegal l8086 instruction
(a) mov ax, [bx]
(b) iNc [bx]
(c) aDd bx, [bx]
(d) add ax, [cx]
140. Which of the following is an illegal 8086 instruction
(a) mov ax, [bx]
(b) iNc [bx]
(c) aDd bx, [dx]
(d) add [bx], 1
141. Which of the following is an illegal 8086 instruction
(a) ret 2
(b) push al
(c) aDd bx, 25000
(d) and ax, dx
142. The net effect of calling the following subprogram in terms of program behaviour:
Subprog:
push ax
add ax, 10
ret
is to
(a) leave ax unchanged
(b) add 10 to ax
(c) cause the program to behave in an unpredictable manner
(d) do nothing
143. Branch prediction is used in the context of
(a) pipelining
(b) program loops
(c) cache memory
(d) ALUoperation
144. Delayed branching is used
(a) to introduce delays in program execution
(b) in pipelining
(c) in cachememory
(d) decoding instructions
145. A Harvard architecture means that a machine has
(a) separate memories for data and instructions
(b) unifiedcache memory
(c) multiple functional units
(d) an on-chip cache
146. Which is the most complex component of the following
(a) transistor
(b) flip flop
(c) AND gate
(d) decoder
147. An assembly language instruction
(a) always has a label
(b) always takes at least 1 operand
(c) always has an operation field
(d) always modifies the status register
148. An arithmetic instruction always modifies the
(a) stack pointer
(b) status register
(c) program counter
(d) anindex register
149. A conditional jump instruction
(a) always cause a transfer of control
(b) always involves the use of the status register
(c) always modifies the program counter
(d) always involves testing the Zero flag
150. An interrupt instruction
(a) causes an unconditional transfer of control
(b) causes a conditional transfer of control
(c) modifies the status register
(d) is an I/O instruction
GOTO COMPUTER BASIC PART-13
IF YOU FIND ANY
ANSWER WRONG,COMMENT ME, SO THAT I RIGHT THAT ANSWER
0 comments:
Post a Comment