UGC NET June 2010 Computer Science Solved Paper
UGC NET June 2010 Computer Science Solved Paper
com/forum
weight and complexion. Given, height, weight and complexion only form a complete set of attributes
for an entity, cloning is an equivalence relation. What is your impression about this statement ?
(A) The statement is true
2. R is a robot of M means R can perform some of the tasks that otherwise M would do and R is
unable to do anything else. Which of the following is the most appropriate representation to model
this situation ?
(ii) aba
(iii) abaabaaba
(iv) abaabaabaabaabaabaabaabaaba
Using this as an information, how would you compare the following regular expressions ?
(i) (aba)3x
(ii) a.(baa)3x1. ba
(iii) ab.(aab).3x1.a
What would be the chromatic number of a graph, vertices of which are the actors/entities that are
involved in the sentences S1 to S5 and edges-to represent the associations/relationships amongst
the entities/actors as expressed in the sentences S1 to S5 above ?
(A) 2
(B) 3
(C) 4
(D) None of these
5. Four your ATM debit card, you have a 4-decimal-digit personal secret code. In the absence of any
clue, a
brute-force attack takes time-t to crack the code on an ATM terminal. Therefore t is the securetime for a customer to report in case the card is misplaced. Your Bank has decided to facilitate an
increased secure-time. Out of the following, which option should provide the largest rise in the value
of t ?
(A) Instead of 4-decimal-digits, maintain the personal secretcode in 4-hexadecimal-digits.
(B) Instead of 4-decimal digits, maintain a 5-decimal-digit personal secret code.
(C) Reduce the processing speed of the ATM terminals to the half of their current speed.
(D) None of the above provides any improvement
6. The logic expression for the output of the circuit shown in the figure is
Ans: C
7. Advantage of synchronous sequential circuits over asynchronous ones is
(A) faster operation
(B) ease of avoiding problems due to hazard
(C) lower hardware requirement
(D) better noise immunity
8. What is the transitive voltage for the voltage input of a CMOS operating from 10V supply ?
(A) 1V (B) 2V (C) 5V (D) 10 V
9. What is decimal equivalent of BCD 11011.1100 ?
(A) 22.0 (B) 22.2 (C) 20.2 (D) 21.2
10. The function represented by the kmap given below is
1. Java
2. generic programming
3. defines a class
4. member function
(A) 1 5 4 2 3
(B) 1 5 2 3 4
(C) 5 1 2 3 4
(D) 5 4 3 1 2
15. The data type created by the data abstraction process is called
(A) class
(B) structure
III. 4 NF
II. 3 NF
IV. 5 NF
Codes :
I II III IV
(A) (a) (c) (b) (d)
(B) (d) (a) (b) (c)
(A) DML
20. The PROJECT Command will create new table that has
(A) more fields than the original table
(B) more rows than original table
(C) both (A) & (B)
(D) none of these
21. If we have six stack operations-pushing and popping each of A, B and C-such that push (A) must
occur
before push (B) which must occur before push (C), then A, C, B is a possible order for the pop
operations,
since this could be our sequence : push (A), pop (A), push (B), push (C), pop (C), pop (B). Which one
of
the following orders could not be the order the pop operations are run, if we are to satisfy the
requirements
described above ?
(A) ABC (B) CBA (C) BAC (D) CAB
22. What is the most appropriate data structure to implement a priority queue ?
(A) Heap (B) Circular array (C) Linked list (D) Binary tree
23. In a complete binary tree of n nodes, how far are the two most distant nodes ? Assume each edge
in the
path counts as 1
(A) About log2n
(B) 200
(C) 10000
26. The ______ field is the SNMP PDV reports an error in a response message.
(A) error index
(B) error status
(C) set request
(B) I, III, V
(C) I, II, IV
3. Addressing
(D) Loading
32. Which of the following expression is represented by the parse tree ?
(B) Context-sensitive
(C) Context free
(D) Scanner
36. Match the following :
(a) Disk scheduling
1. Round-robin
2. SCAN
3. LIFO
(A) 3 4 2 1
(B) 4 3 2 1
(C) 2 4 1 3
(D) 1 4 3 2
37. ________ synchronizes critical resources to prevent dead lock.
(A) P-operator (B) V-operator (C) Semaphore (D) Swapping
(B) bottom-up
(C) random
(D) centre fringing
45. Applications-software
(A) is used to control the operating system
(B) includes programs designed to help programmers
(C) performs a specific task for computer users
(D) all of the above
46. The cost of the network is usually determined by
(A) time complexity
(B) switching complexity
(C) circuit complexity
(D) none of these
47. A leased special high-speed connection from the local telephone carrier for business users that
transmits at 1.544 mbps is known as ________ carrier.
(A) T1 (B) T2 (C) T3 (D) T4
49. At any given time Parallel Virtual Machine (PVM) has ________ send buffer
and ________ receive buffer.