SOME SAMPLE COMPUTE SCIENCE AND APPLICATIONS QUESTIONS WITH KEY OF UGC NET EXAM HELD AT DECEMBER 30 2012
PAPER-II
(UGCNET EXAM PAPER KEY,UGCNET DECEMBER 30 KEY,UGCNET COMPUTER SCIENCE KEY 2012,UGC NET COMPUTER SCIENCE AND APPLICATION KEY,UGCNET PAPER-2 KEY,UGCNET DEC 30 KEY, UGCNET PAPER -II KEY,UGC NET KEY RELEASED,UGCNET DECEMBER 30,2012 KEY,FIRST KEY RELEASE OF UGCNET DECEMBER 30 2012,UGCENT KEY RELEASED,UGC NET PAPER1,PAPER 2,PAPER-3,UGCNET COMPUTERS PAPER -3 KEY)
7)THE C LANGUAGE IS ------- ANSWER: CONTEXT SENSITIVE GRAMMAR(B)
8)THE MOBILE APPLICATION PROTOCOL(MAP) TYPICALLY RUNS ON TOP OF WHICH PROTOCOL-------------------------------ANSWER: SS7(SIGNALLING SYSTEM 7) (C)
11)IN COMPILER DESIGN "REDUCING THE STRENGTH" REFERS TO ------ANSWER:CODE OPTIMIZATION USING CHEAPER MACHINE INSTRUCTIONS(B)
13)WHICH OF THE FOLLOWING IS TRUE?---ANSWER:A RELATION IS BCNF IS ALWAYS IN 3NF(A)
16)IN WHICH TREE FOR EVERY NODE THE HEIGHT OF ITS LEFT AND RIGHT SUBTREE DIFFER ALMOST BY 1--------------ANSWER: AVL TREE(B)
17)THE DESIGN ISSUE OF DATALINK LAYER IN OSI REFERENCE MODEL IS -----ANSWER: FRAMING(A)
20)THE PROBLEM OF INDEFINITE BLOCKAGE OF LOW-PRIORITY JOBS IN GENERAL PRIORITY SCHEDULING ALGORITHM CAN BE SOLVED USING ----- ANSWER AGING(B)
21)WHICH API IS USED TO DRAW A CIRCLE ----- ANSWER: CIRCLE(A)(NOT SURE)
26)A HASH FUNCTION F DEFINED AS F(KEY)=KEY MOD 13,WITH LINEAR PROBING IS USED TO INSERT KEYS 55,55,68,91,27,145. WHAT WILL BE THE LOCATION OF 79?....................ANSWER 4(D)
30)WHICH OF THE FOLLOWING MEMORY ALLOCATION SUFFERS FROM EXTERNAL FRAGMENTATION?........................... ANSWER: SEGMENTATION(A)
35)WHICH OF THE FOLLOWING IS THE MOST POWERFUL PARSING METHOD?
ANSWER: CANONICAL LR(B)
36)IN UNIX WHICH OF THE FOLLOWING IS COMMAND IS USED TO SET THE TASK PRIORITY?...................ANSWER NICE(B)
39)MATCH THE FOLLOWING WITH RESPECT TO C++ DATATYPES:
A.USER DEFINED TYPE 1 QUALIFIER
B BUILT IN TYPE 2 UNION
C DERIVED TYPE 3 VOID
D LONG DOUBLE 4 POINTER
......................................
ANSWER: A-2,B-3,C-4,D-1 (1)
40)GIVEN AN EMPTY STACK,AFTER PERFORMING PUSH(1),PUSH(2),POP,PUSH(3),POP,POP,PUSH(5),POP, WHAT IS THE VALUE OF THE TOP OF STACK...................ANSWER: 1(D)
42)WHICH OF THE FOLLOWING MODE DECLARATION IS USED IN C++ TO OPEN FILE FOR INPUT?....................ANSWER: IOS::IN(D)
43)DATA ENCRYPTION TECHNIQUES ARE PARTICULARLY ARE USED FOR ............ANSWER: PROTECTING DATA IN DATA COMMUNICATION SYSTEM(A)
49)IDENTIFY THE OPERATION WHICH IS COMMUTATIVE BUT NOT ASSOCIATIVE?...
ANSWER: NAND (D)