Search Topics....

Friday, July 29, 2011

UGC NET Questions For Computer Science - Paper II

Q. Let e : B^m → B^n is a group code. The minimum distance of ‘e’ is equal to
(A) the maximum weight of a non zero code word
(B) the minimum weight of a non zero code word
(C) m
(D) n

Q. A context free grammar is :
(A) type 0.
(B) type 2.
(C) type 1.
(D) type 3.

Q. In order to build a MOD - 18 counter, the minimum number of flip flops needed is equal to :
(B) 5
(C) 9
(D) 4

Q.Amongst the logic families DTL, TTL, ECL and CMOS, the family with the least power dissipation is :  
(B) DTL   

Q. Which of the following is not true in C++ ?
(A) “Private” elements of a base class are not accessible by members of its derived class.
(B)“Protected” elements of base class are not accessible by members of its derived class. 
(C) When base class access specified is “Public”, public elements of the base class become public members of its derived class.  
(D) When base class access specified is “Public”, protected elements of a base class become protected   members of its derived class. 

Q. A primary key for an entity is :
(A) a candidate key
(B) any attribute
(C) a unique attribute
(D) a superkey

Q. Which of the following is true of constructor function in C++ ?
(A) A class must have at least one constructor.
(B) A constructor is a unique function which cannot be overloaded.
(C) A constructor function must be invoked with the object name.
(D) A constructor function is automatically invoked when an object is created.

Q. Aggregate functions in SQL are :

Q.If a relation is in 2NF and 3NF forms then :
(A)  no non-prime attribute is functionally dependent on other non-prime attributes
(B)  no non-prime attribute is functionally dependent on prime attributes
(C) all attributes are functionally independent
(D) prime attribute is functionally independent of all non-prime attributes

Q.The end of an SQL command is denoted by :
(A) an end-of-line character
(B) an ‘enter-key’ marker
(C) entering F4 key
(D) a semicolon (;)

Q. The aging algorithm with a = 0.5 is used to predict run times. The previous four runs from oldest to most recent are 40, 20, 20, and 15 msec. The prediction for the next time will be :
(A)15 msec.
(B)25 msec.
(C)39 msec.
(D)40 msec.

Q. A major defect in water fall model in software development is that :
(A)the documentation is difficult
(B)a blunder at any stage can be disastrous
(C)a trial version is available only at the end of the project
(D)the maintenance of the software is difficult

Q.Function point metric of a software also depends on the :
(A)number of function needed
(B)number of final users of the software
(C)number of external inputs and outputs
(D)time required for one set of output from a set of input data

Q.An error message produced by an interactive system should have :
(A)always the error code
(B)the list of mistakes done by the user displayed
(C)a non-judgmental approach
(D)the past records of the occurrence of the same mistake

Q.System development cost estimation with use-cases is problematic because :
(A)of paucity of examples
(B)the data can be totally incorrect
(C)the expertise and resource available are not used
(D)the problem is being over simplified

Q.The approach to software testing is to design test cases to :
(A)break the software
(B)understand the software
(C)analyse the design of sub processes in the software
(D)analyze the output of the software

Q.Given a parallel algorithm A with computation time t, if parallel algorithm A performs m computational operation, then p processors can execute algorithm A in time given by :

Q.With reference to implementation of different association mining algorithms, identify the correct statement :
(A)The FP growth method was usually better than the best implementation of the a priori algorithm
(B)Apriori algorithm is usually better than CHARM
(C)Apriori algorithm is good when the support required is low
(D)At very low support the number of frequent items becomes less

Q.Consider a typical mobile communication system. If 840 frequencies are available, how many can be used in a given cell ?

Q.Identify the incorrect statement :
(A)The internet has evolved into phenomenally successful e-commerce engine
(B)e-business is synonymous with e-commerce
(C)The e-commerce model B2C did not begin with billboardware
(D)The e-commerce model G2C began with billboardware

Q. Identify the incorrect statement :
(A)ATM provides both real time and non-real time service
(B)ATM provides faster packet switching than X.25
(C)ATM was developed as part of the work on broadband ISDN
(D)ATM does not have application in Non-ISDN environments where very high data rates are required

See More Questions >>

No comments: