SUBJECT MATERIAL, EBOOKS, IMPORTANT QUESTION , ASSIGNMENT QUESTION, OLD QUESTION PAPER

Tuesday 1 August 2017

UGC NET COMPUTER SCIENCE SOLVED QUESTION PAPER - 3 - December 2015 / PART-2

41.         Match the following in Unix file system : List - I                         List - II (a) Boot block               (i) Infor... thumbnail 1 summary
41.       Match the following in Unix file system :
List - I                         List - II
(a) Boot block               (i) Information about file system
(b) Super block            (ii) Information about file
(c) Inode table              (iii) Storage space
(d) Data block               (iv) Code for making OS ready
Codes :
      (a)  (b)  (c)  (d)
(A) (iv)  (i)   (ii)  (iii)
(B) (i)    (iii) (ii)  (iv)
(C) (iii)  (i)   (ii)  (iv)
(D) (iv)  (ii)  (i)   (iii)
Answer: A
42.       In an operating system, indivisibility of operation means :
(A) Operation is interruptable
(B) Race - condition may occur
(C) Processor can not be pre-empted
(D) All of the above
Answer: C
43.       A horn clause is ......................
(A) A clause in which no variables occur in the expression
(B) A clause that has at least one negative literal
(C) A disjunction of a number of literals
(D) A clause that has at most one positive literal
Answer: D
44.       In Propositional Logic, given P and P→Q, we can infer .................
(A) ~Q                (B) Q
(C) PQ             (D) ~PQ
Answer: B
45.       Reasoning strategies used in expert systems include ...............
(A) Forward chaining, backward chaining and problem reduction
(B) Forward chaining, backward chaining and boundary mutation
(C) Forward chaining, backward chaining and back propagation
(D) Backward chaining, problem reduction and boundary mutation
Answer: A

(A) It has high level of flexibility
(B) It doesn’t require cash up-front
(C) It is a business investment
(D) Little risk of obsolescence
Answer: C
49.       Consider the conditional entropy and mutual information for the binary symmetric channel. The input source has alphabet X={0,1} and associated probabilities {1/2,1/2}. The channel matrix is
where p is the transition probability. Then the conditional entropy is given by :
(A) 1                                           (B) -plog(p)-(1-p)log(1-p)
(C) 1+plog(p)+(1-p)log(1-p)    (D) 0
Answer: B
50.    Which of the following is not a lossy compression technique ?
(A) JPEG           (B) MPEG
(C) FFT              (D) Arithmetic coding
Answer: D

51.       Blind image deconvolution is ................
(A) Combination of blur identification and image restoration
(B) Combination of segmentation and classification
(C) Combination of blur and non-blur image
(D) None of the above
Answer: A
52.       A basic feasible solution of a linear programming problem is said to be ............... if at least one of the basic variable is zero.
(A) degenerate             (B) non-degenerate
(C) infeasible               (D) unbounded
Answer: A
53.       Consider the following conditions :
(a) The solution must be feasible, i.e. it must satisfy all the supply and demand constraints.
(b) The number of positive allocations must be equal to m+n-1, where m is the number
of rows and n is the number of columns.
(c) All the positive allocations must be in independent positions.
The initial solution of a transportation problem is said to be non-degenerate basic feasible solution if it satisfies :
Codes :
(A) (a) and (b) only      (B) (a) and (c) only
(C) (b) and (c) only      (D) (a), (b) and (c)
Answer: D
54.       Consider the following transportation problem :
The transportation cost in the initial basic feasible solution of the above transportation problem using Vogel’s Approximation method is :
(A) 1450            (B) 1465
(C) 1480            (D) 1520
Answer: B
55.       The character set used in Windows 2000 operating system is ...............
(A) 8 bit ASCII              (B) Extended ASCII
(C) 16 bit UNICODE    (D) 12 bit UNICODE
Answer: C

56.       In Unix, the command to enable execution permission for file “mylife” by all is ................
(A) Chmod ugo+X myfile       (B) Chmod a+X myfile
(C) Chmod +X myfile              (D) All of the above
Answer: D
57.       What will be the output of the following Unix command ?
$rm chap0\[1 - 3\]
(A) Remove file chap0[1 - 3]
(B) Remove file chap01, chap02, chap03
(C) Remove file chap\[1 - 3\]
(D) None of the above
Answer: A
58.       Which of the following statements regarding the features of the object-oriented approach to databases are true ?
(a) The ability to develop more realistic models of the real world.
(b) The ability to represent the world in a non-geometric way.
(c) The ability to develop databases using natural language approaches.
(d) The need to split objects into their component parts.
(e) The ability to develop database models based on location rather than state and behaviour.
Codes :
(A) (a), (b) and (c)        (B) (b), (c) and (d)
(C) (a), (d) and (e)        (D) (c), (d) and (e)
Answer: A
59.       Consider the following database table :
Create table test(
one integer,
two integer,
primary key(one),
unique(two),
check(one≥1 and ≤10),
check(two≥1 and ≤5) );
How many data records/tuples atmost can this table contain ?
(A) 5       (B) 10
(C) 15     (D) 50
Answer: A
60.    Suppose ORACLE relation R(A, B) currently has tuples {(1, 2), (1, 3), (3, 4)} and relation S(B, C) currently has {(2, 5), (4, 6), (7, 8)}. Consider the following two SQL queries SQ1 and SQ2 :
SQ1 : Select *
From R Full Join S
On R.B=S.B;
SQ2 : Select *
From R Inner Join S
On R.B=S.B;
The numbers of tuples in the result of the SQL query SQ1 and the SQL query SQ2 are given by :
(A) 2 and 6 respectively          (B) 6 and 2 respectively
(C) 2 and 4 respectively         (D) 4 and 2 respectively
Answer: D

61.       Consider the following three SQL queries (Assume the data in the people table) :
(a) Select Name from people where Age>21;
(b) Select Name from people where Height>180;
(c) Select Name from people where (Age>21) or (Height>180);
If the SQL queries (a) and (b) above, return 10 rows and 7 rows in the result set respectively, then what is one possible number of rows returned by the SQL query (c) ? (A) 3   (B) 7
(C) 10     (D) 21
Answer: C
62.       The distributed system is a collection of (P) and communication is achieved in distributed system by (Q) , where (P) and (Q) are :
(A) Loosely coupled hardware on tightly coupled software and disk sharing, respectively.
(B) Tightly coupled hardware on loosely coupled software and shared memory, respectively.
(C) Tightly coupled software on loosely coupled hardware and message passing,
respectively.
(D) Loosely coupled software on tightly coupled hardware and file sharing, respectively.
Answer: C
63.       Consider the following three tables R, S and T. In this question, all the join operations are natural joins (). (Ï€) is the projection operation of a relation :
Possible answer tables for this question are also given as below :
What is the resulting table of Ï€A,B(RT) ⨝ Ï€B,C(ST) ?
(A) (a)                 (B) (b)
(C) (c)                 (D) (d)
Answer: A
64.       Consider the two class classification task that consists of the following points :
Class C1: [-1, -1], [-1, 1], [1, -1]
Class C2: [1, 1]
The decision boundary between the two classes C1 and C2 using single perceptron is given by :
(A) x1-x2-0.5=0              (B) -x1+x2-0.5=0
(C) 0.5(x1+x2)-1.5=0     (D) x1+x2-0.5=0
Answer: D
65.       Consider a standard additive model consisting of rules of the form of
If x is Ai AND y is Bi THEN z is Ci.
Given crisp inputs x=x0, y=y0, the output of the model is :















Answer: C

66.       A bell-shaped membership function is specified by three parameters (a, b, c) as follows:












Answer: B
67.       Which of the following is/are the principle components of a memory-tube display ?
(a) Flooding gun                      (b) Collector
(c) Phosphorus grains            (d) Ground
Codes :
(A) (a) and (b)               (B) (c) only
(C) (d) only                    (D) All the above
Answer: D
68.       Which of the following steps is/are not required for analog to digital conversion ?
(a) Sensing                  (b) Conversion         (c) Amplification
(d) Conditioning          (e) Quantization
Codes :
(A) (a) and (b)               (B) (c) and (d)
(C) (a), (b) and (e)        (D) None of the above
Answer: D
69.       Which raster locations would be chosen by Bresenham’s algorithm when scan converting a line from (1, 1) to (8, 5) ?
Answer: C
70.    Consider a unit square centred at origin. The coordinates of the square are translated by a factor (1/2, 1) and rotated by an angle of 90o. What shall be the coordinates of the new
square ?
(A) (-1/2, 0), (-1/2, 1), (-3/2, 1), (-3/2, 0)
(B) (-1/2, 0), (1/2, 1), (3/2, 1), (3/2, 0)
(C) (-1/2, 0), (1/2, 0), (-3/2, 1), (-3/2, 0)
(D) (-1/2, 0), (1/2, 1), (-3/2, 1), (-3/2, 0)
Answer: A

71.       Which of the following is/are the components of a CRT ?
(a) Electron Gun
(b) Control Electrode
(c) Focusing Electrode
(d) Phosphor Coated Screen
Codes :
(A) (a) and (d)                           (B) (a), (b) and (d)
(C) (a), (b), (c) and (d)             (D) (a), (c) and (d)
Answer: C
72.       Which one of the following statements is incorrect ?
(A) Pareto analysis is a statistical method used for analyzing causes, and is one of the
primary tools for quality management.
(B) Reliability of a software specifies the probability of failure-free operation of that software for a given time duration.
(C) The reliability of a system can also be specified as the Mean Time To Failure (MTTF).
(D) In white-box testing, the test cases are decided from the specifications or the
requirements.
Answer: D

73.       Consider a language A defined over the alphabet ∑={0, 1} as A = {0[n/2] 1n: n >= 0} .
The expression [n/2] means the floor of n/2, or what you get by rounding n/2 down to the nearest integer.
Which of the following is not an example of a string in A ?
(A) 011               (B) 0111
(C) 0011            (D) 001111
Answer: C
74.       Which one of the following statements, related to the requirements phase in Software
Engineering, is incorrect ?
(A) “Requirement validation” is one of the activities in the requirements phase.
(B) “Prototyping” is one of the methods for requirement analysis.
(C) “Modelling-oriented approach” is one of the methods for specifying the functional
specifications.
(D) “Function points” is one of the most commonly used size metric for requirements.
Answer: C
75.       ............... tag is an extension to HTML that can enclose any number of Javascript statements.
(A) <SCRIPT>              (B) <BODY>
(C) <HEAD>                 (D) <TITLE>
Answer: A


<<<<<<PREVIOUS