Friday, January 24, 2020

Important Questions and Answer of Computer Science Paper II (UGC NET)

1.X – = Y + 1 means
(A) X=X– Y +1
(B) X = –X – Y – 1
(C) X=–X+Y+1
(D) =X– Y – 1

Answer: A

2.Consider a code with five valid code words of length ten-
Hamming distance of the code is
(A) 5
(B) 10
(C) 8
(D) 9

Answer: A

3.Select the best option as output of following code:

#include <stdio.h>
        char *p = 0;
        *p = 'a';
        printf("value in pointer p is %c\n", *p);

(A) It will print a
(B)It will print 0
(C)Compile time error
(D)Run time error

Answer: D

4.Which of the following languages is more suited to a structured program?


Answer: D

5.Which of the following special cases doesn't require reformulation of the problem in order to obtain a solution?
(C)Alternate optimality
(D)None of the above

Answer: C

6.Which of the following computer language is used for artificial intelligence?


Answer: D

7.The basic responsibility of the logical unit in the CPU of a computer is:

(A)to do match's task
(B)to compare numbers
(C)to produce results
(D)to control flow of information


8.Which of the following is a component of an expert system?

(A)inference engine
(B)knowledge base
(C)user interface
(D)All of the above

Answer: D

9.Select the correct option for A software package that process texual matter and ceates organised documents is

(A)Page processor
(B)word processor
(D)language processor

Answer: B

10.Name the technique to implement virtual memory where memory is divided into units of fixed size memory?

(D)none of the above


11.Narrowband channel is a communication channels that

(A)handles low volumes of data
(B)handles high volumes of data with less number of channels
(C)used mainly for telegraph lines and low speed terminals
(D)none of these

Answer: D

12.Select the odd collection from the following

(A)Register indirect
(B)Relative indexed
(C)Immediate operand

Answer: B

13.Which of the following Boolean algebra rules is wrong?

(A)0 + A = A
(B)1 + A = 1
(C)A + A = A
(D)1 . x = 1

Answer: D

14.Web Mining is not used in

(A) Information filtering
(B) Crime fighting on the internet
(C) Online transaction processing
(D) Click stream analysis.

Answer: B

15.Which of the following devices translates hostnames into IP addresses?

(A) Hub
(C)DNS Server
(D)DHCP Server

Answer: C

16.Which of the following memory allocation scheme suffers from external fragmentation ?

(B)Pure demand paging

Answer: A

17.What is the memory from 1K - 640K called ?

(A)Temporary Memory
(B)Low Memory
(C)Extended Memory
(D)Conventional Memory


18.8 queens problem can be solved by

(A)Polyphase sort
(B)Backtracking method
(C)Natural merging
(D)None of the above

Answer: B

19.The efficient data structure to insert/delete a number in a stored set of numbers is

(A)double linked list
(B)binary tree
(D)Both B & C

Answer: A

20.Pre-emptive scheduling is the strategy of temporarily suspending a running process

(A)to avoid collision
(B)to allow starving processes to run
(C)before the CPU time slice expires
(D)all of the above

Answer: C