UGC NET JUNE 2013
SYLLABUS, MODEL PAPER/ PREVIOUS YEARS SOLVED QUESTION PAPERS.
UGC NET (NATIONAL ELIGIBILITY TEST) : OLD SOLVED/PREVIOUS EXAM QUESTION PAPERS WITH SOLUTIONS AND EXPLANATIONS AND FREE STUDY MATERIALS.
COMPUTER MEMORY BASED PREVIOUS YEARS SOLVED PAPERS I, II AND III TO PREPARE AND PASS THE UGC NET/SLET ENTRANCE EXAMINATION WITH HIGH PERCENTAGE.
COMPUTER BASIC QUESTIONS FOR BANK EXAM, HTAT, CTAT, TAT, UGC-NET, INTERVIEW AND OTHER EXAM'S, WHERE BASIC QUESTION'S ARE REQUIRED.
26. The data unit in the TCP/IP application Layer is called a __________ .
(A) message
(B) segment
(C) datagram (
D) frame
27. Which of following file retrieval methods use hypermedia ?
(A) HTML
(B) Veronica
(C) WAIS
(D) HTTP
28. Which of following is an example of a client - server model :
(A) DNS
(B) FTP
(C) TELNET
(D) All the above
29. __________ provide a method to recover data that has been delivered but not get used :
(A) Segmentation
(B) Concatenation
(C) Transalation
(D) Synchronization
30. Encryption and decryption are the functions of the __________ layer of OSI model :
(A) transport
(B) session
(C) router
(D) presentation
31. The Register or main memory location which contains the effective address of the operand is known as :
(A) Pointer
(B)Indexed register
(C) Special Locations
(D) Scratch Pad
32. A Top - down Parse generates :
(A) Left most derivation
(B) Right - most derivation
(C) Right - most derivation in reverse
(D) Left - most derivation in reverse
33. A general macro processor is an in built function of :
(A) Loader
(B) Linker
(C) Editor
(D) Assembler
34. Which of the following is not collision Resolution Technique :
(A) Hash addressing
(B) Chaining
(C) Indexing
(D) None of these
35. Which activities is not included in the first pass of two pass assembler ?
(A) build the symbol table
(B) construct the Intermediate code
(C) separate mnemonic op code and operand field.
(D) none of these
36. Producer consumer problem can be solved using :
(A) semaphores
(B) event counters
(C) monitors
(D) all the above
37. If you want to execute more than one program at a time, the systems software that are
used must be capable of :
(A) word processing
(B) virtual memory
(C) compiling
(D) multitasking
38. Which of the following checks cannot be carried out on the input data to a system ?
(A) Consistency check
(B) Syntax check
(C) Range check
(D) All the above
39. Non modifiable procedures are called :
(A) Serially usable procedure
(B) Concurrent procedure
(C) Re entrant procedure
(D) Top-down procedure
40. Banker's algorithm is used for __________ purpose :
(A) Deadlock avoidance
(B) Deadlock removal
(C) Deadlock prevention
(D) Deadlock continuations
41. The testing of software against SRS is called :
(A) Acceptance testing
(B) Integration testing
(C) Regression testing
(D) Series testing
42. The lower degree of cohesion is :
(A) logical cohesion
(B) coincidential cohesion
(C) procedural cohesion
(D) communicational cohesion
43. The Reliability of the software is directly dependent upon :
(A) Quality of the design
(B) Programmer’s experience
(C) Number of error
(D) Set of user requirements
44. Successive layer of design in software using but ton-up design is called :
(A) Layer of Definement
(B) Layer of Construction
(C) Layer of abstraction
(D) None of the above
45. Sliding window concept of software project management is :
(A) Preperation of comprehensible plan
(B) Preparation of the various stages of development
(C) Ad-hoc planning
(D) Requirement analysis
46. Which of the following transmission media is used in Blue tooth Technology :
(A) Radio links
(B) Microwave links
(C) V SAT Communication
(D) Fiber – optic
47. Which of the following is a EDI standard ?
(A) ANSI X.15
(B) ANSI X.14
(C) ANSI X.13
(D) ANSI X.12
48. Analysis of large database to retrieve information is called :
(A) OLTP
(B) OLAP
(C) OLDP
(D) TLPP
49. The cost of the network is usually determined by :
(A) Time complexity
(B) Switching complexity
(C) Circuit complexity
(D) None of these
50. The mechanism with which several uses can share a medium without interference is :
(A) Frequency modulation
(B) Amplitude modulation
(C) Multiplexing
(D) None of these
IF YOU FIND ANY ANSWER WRONG,COMMENT ME, SO THAT I RIGHT THAT ANS.
THANKS
UGC NET (NATIONAL ELIGIBILITY TEST) : OLD SOLVED/PREVIOUS EXAM QUESTION PAPERS WITH SOLUTIONS AND EXPLANATIONS AND FREE STUDY MATERIALS.
COMPUTER MEMORY BASED PREVIOUS YEARS SOLVED PAPERS I, II AND III TO PREPARE AND PASS THE UGC NET/SLET ENTRANCE EXAMINATION WITH HIGH PERCENTAGE.
COMPUTER BASIC QUESTIONS FOR BANK EXAM, HTAT, CTAT, TAT, UGC-NET, INTERVIEW AND OTHER EXAM'S, WHERE BASIC QUESTION'S ARE REQUIRED.
26. The data unit in the TCP/IP application Layer is called a __________ .
(A) message
(B) segment
(C) datagram (
D) frame
27. Which of following file retrieval methods use hypermedia ?
(A) HTML
(B) Veronica
(C) WAIS
(D) HTTP
28. Which of following is an example of a client - server model :
(A) DNS
(B) FTP
(C) TELNET
(D) All the above
29. __________ provide a method to recover data that has been delivered but not get used :
(A) Segmentation
(B) Concatenation
(C) Transalation
(D) Synchronization
30. Encryption and decryption are the functions of the __________ layer of OSI model :
(A) transport
(B) session
(C) router
(D) presentation
31. The Register or main memory location which contains the effective address of the operand is known as :
(A) Pointer
(B)Indexed register
(C) Special Locations
(D) Scratch Pad
32. A Top - down Parse generates :
(A) Left most derivation
(B) Right - most derivation
(C) Right - most derivation in reverse
(D) Left - most derivation in reverse
33. A general macro processor is an in built function of :
(A) Loader
(B) Linker
(C) Editor
(D) Assembler
34. Which of the following is not collision Resolution Technique :
(A) Hash addressing
(B) Chaining
(C) Indexing
(D) None of these
35. Which activities is not included in the first pass of two pass assembler ?
(A) build the symbol table
(B) construct the Intermediate code
(C) separate mnemonic op code and operand field.
(D) none of these
36. Producer consumer problem can be solved using :
(A) semaphores
(B) event counters
(C) monitors
(D) all the above
37. If you want to execute more than one program at a time, the systems software that are
used must be capable of :
(A) word processing
(B) virtual memory
(C) compiling
(D) multitasking
38. Which of the following checks cannot be carried out on the input data to a system ?
(A) Consistency check
(B) Syntax check
(C) Range check
(D) All the above
39. Non modifiable procedures are called :
(A) Serially usable procedure
(B) Concurrent procedure
(C) Re entrant procedure
(D) Top-down procedure
40. Banker's algorithm is used for __________ purpose :
(A) Deadlock avoidance
(B) Deadlock removal
(C) Deadlock prevention
(D) Deadlock continuations
41. The testing of software against SRS is called :
(A) Acceptance testing
(B) Integration testing
(C) Regression testing
(D) Series testing
42. The lower degree of cohesion is :
(A) logical cohesion
(B) coincidential cohesion
(C) procedural cohesion
(D) communicational cohesion
43. The Reliability of the software is directly dependent upon :
(A) Quality of the design
(B) Programmer’s experience
(C) Number of error
(D) Set of user requirements
44. Successive layer of design in software using but ton-up design is called :
(A) Layer of Definement
(B) Layer of Construction
(C) Layer of abstraction
(D) None of the above
45. Sliding window concept of software project management is :
(A) Preperation of comprehensible plan
(B) Preparation of the various stages of development
(C) Ad-hoc planning
(D) Requirement analysis
46. Which of the following transmission media is used in Blue tooth Technology :
(A) Radio links
(B) Microwave links
(C) V SAT Communication
(D) Fiber – optic
47. Which of the following is a EDI standard ?
(A) ANSI X.15
(B) ANSI X.14
(C) ANSI X.13
(D) ANSI X.12
48. Analysis of large database to retrieve information is called :
(A) OLTP
(B) OLAP
(C) OLDP
(D) TLPP
49. The cost of the network is usually determined by :
(A) Time complexity
(B) Switching complexity
(C) Circuit complexity
(D) None of these
50. The mechanism with which several uses can share a medium without interference is :
(A) Frequency modulation
(B) Amplitude modulation
(C) Multiplexing
(D) None of these
THANKS
0 comments:
Post a Comment