Previous Year Question Papers for UGC NET Jan 2025 Computer Science with Solutions

Q1âž¡ | Computer Network
The network using CSMA/CD has a bandwidth of 20 Mbps. If the maximum propagation time is 25µ sec (microsecond), what is the minimum size of the frame?
i ➥ 500 bits
ii ➥ 1000 bits
iii ➥ 1500 bits
iv ➥ 2000 bits
Best Explanation:
Answer: II
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q2âž¡ | Artificial Intelligence
Which of the following is not a component of the classic Planning Definition?
i ➥ Init
ii ➥ Domain
iii ➥ Action
iv ➥Goal
Best Explanation:
Answer: II
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q3âž¡ | Theory of Computation
Which of the following CFG(s) is/are in Chomsky Normal Form (All capital letters are variables & lower case are terminals)?
ugc net-jan-2025-question-toc computer science previous year questions

a) ugc net-jan-2025-question-3_2-toc computer science previous year questions answer

b) ugc net-jan-2025-question-3_3-toc computer science previous year questions

c)ugc net-jan-2025-question-3_4-toc computer science previous year questions

d)ugc net-jan-2025-question-3_5-toc computer science previous year questions
Choose the correct answer from the options given below
i ➥ A & B only
ii ➥ B only
iii ➥ C only
iv ➥ B & D only
Best Explanation:
Answer: II
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q4âž¡ | Artificial Intelligence
What is the correct sequence of steps used by knowledge base designing?
A. Ask questions about the intended interpretation.
B. Choose task domain or world to represent.
C. Select atoms to represent propositions of Interest.
D. Tell the system propositions that are true in the intended interpretation/axiomatizing the domain.
Choose the correct answer from the options given below:
i ➥ B, C, D, A
ii ➥ B, C, D, A
iii ➥C, D, A, B
iv ➥ D, A, B, C
Best Explanation:
Answer: II
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q5âž¡ | Software Engineering
Which one of the following is not a part of requirement management?
i ➥ Features Traceability Table
ii ➥ Dependency Traceability Table
iii ➥ Interface Traceability Table
iv ➥Page Traceability Table
Best Explanation:
Answer: IV
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q6âž¡ | DBMS
What will be the right sequence of the phases of database design?
A. Physical Design
B. Conceptual Design
C. Logical Design
D. Requirement Collection and Analysis
Choose the correct answer from the options given below:
i ➥ D, A, B, C
ii ➥ D, B, C, A
iii ➥ D, B, A, C
iv ➥ D, A, C, B
Best Explanation:
Answer: II
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q7âž¡ |
Match the LIST-I with LIST-II
Match the LIST-I with LIST-II

LIST-I	LIST-II
A. Hadoop Distribution File System	I. Trust
B. Veracity	II. Facebook
C. Apache Pig	III. Name-Node
D. Apache Hive	IV. Yahoo
Choose the correct answer from the options given below:
Choose the correct answer from the options given below:
i ➥ A-IV, B-III, C-I, D-II
ii ➥A-III, B-I, C-IV, D-II
iii ➥ A-III, B-I, C-II, D-IV
iv ➥A-II, B-III, C-I, D-IV
Best Explanation:
Answer: III
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q8âž¡ | Discrete Math
Which of the following statements are true about the sets?
A. 0∈∅
B. ∅∈{0}
C. ∅∈{∅}
D. {∅}∈{∅}
E. {∅}⊆{∅,{∅}}
Choose the correct answer from the options given below:
i ➥ A, B, C, D, and E
ii ➥ A, B, C, and E only
iii ➥ A, C only
iv ➥ C and E only
Best Explanation:
Answer: IV
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q9âž¡ | Programming
Match the LIST-I with LIST-II
9.	Match the LIST-I with LIST-II 
LIST-I 
(FUNCTIONS)	LIST-II 
(Uses of functions)
A.		fseek ()	I.		Gives the current position in the file
B.		ftell()
II.		Sets the position to the beginning of the file
C.		feof()		III.		Sets the position to a desired point in the file
D.		rewind()	IV.		Used to test for an end of file condition
 Choose the correct answer from the options given below:
 Choose the correct answer from the options given below:
i ➥ A-II, B-III, C-I, D-IV
ii ➥ A-III, B-I, C-IV, D-II
iii ➥ A-III, B-I, CII-, D-IV
iv ➥A-II, B-IV, C-III, D-I
Best Explanation:
Answer: II
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q10âž¡ | DBMS
In concurrency control, phantom problem may occur, when-
i ➥ records are inserted
ii ➥ records are deleted
iii ➥ records are modified
iv ➥ records are indexed
Best Explanation:
Answer: I
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q11âž¡ | DBMS
Which of the following/s is/are FALSE statement?
A. An all key relation is always in BCNF since it has no FDs.
B. A relation that is not in 4NF due to nontrivial MVD must be decomposed to convert it into a set of relations in 4NF.
C. The decomposition removes the redundancy by the MVD.
D. 3NF is stronger than BCNF.
Choose the correct answer from the options given below:
i ➥ A only
ii ➥ A. B only
iii ➥D only
iv ➥ C only
Best Explanation:
Answer: III
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q12âž¡ | Computer architecture
Correct the order of instruction cycle:
A. Read the effective address
B. Fetch the information
C. Execute the instruction
D. Decode the instruction
Choose the correct answer from the options given below:
i ➥ A, B, C, D
ii ➥ B, D, A, С
iii ➥ B, A, D, C
iv ➥A, B, D, C
Best Explanation:
Answer: II
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q13âž¡ | Computer architecture
Match the LIST-I with LIST-II
13.	Match the LIST-I with LIST-II 
LIST-I 	LIST-II 
A.		RAID level 1 	I.		bit-interleaved parity organization 
B.		RAID level 2	II.		disk mirroring 
C.		RAID level 3 	III.		block-interleaved parity organization 
D.		RAID level 4 	IV.		ECC organization
Choose the correct answer from the options given below:
i ➥ A-II, B-I, C-IV, D-III
ii ➥ A-II, B-IV, C-I, D-III
iii ➥ A-III, B-IV, C-I, D-II
iv ➥ A-IV, B-III, C-II, D-I
Best Explanation:
Answer: II
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q14âž¡ | Computer architecture
The entire set of parameters, including return address that is stored for a procedure invocation is referred to
i ➥ stack frame
ii ➥ stack base
iii ➥ stack limit
iv ➥ stack record
Best Explanation:
Answer: I
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q15âž¡ | Theory of Computation
Which of the following is TRUE about the Pumping Lemma for regular language?
i ➥ It applies to all regular language
ii ➥ It applies only to infinite regular languages
iii ➥ It applies to all context free languages
iv ➥It applies to all recursively enumerable languages
Best Explanation:
Answer: II
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q16âž¡ | Algorithm
Choose the correct statement(s)
A. A problem which is NP-Complete will have the property that it can be solved in polynomial time iff all other NP-complete problems can also be solved in polynomial time.
B. All NP-complete problem are NP-hard problems.
C. If an NP-hard problem can be solved in polynomial time, then all NP-complete problem can be solved in polynomial time
D. All NP-hard-problems are not NP-complete.
Choose the correct answer from the options given below:
i ➥ A, C only
ii ➥ B, D only
iii ➥ A, B, C only
iv ➥ A, B, C, D
Best Explanation:
Answer: IV
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q17âž¡ | Computer Network
Which of the following are key features of Mobile Adhoc Networks (MANETS)
A. Self – Organizing and decentralized.
B. High Mobility of nodes.
C. Requires fixed Infrastructure for operation.
D. Network Topology is dynamic and constantly changing.
E. It requires a central controller to manage network traffic.
Choose the correct answer from the options given below:
i ➥ A, B & E only
ii ➥ B, C, D & E only
iii ➥A, B & D only
iv ➥ A, B & C only
Best Explanation:
Answer: III
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q18âž¡ | Data Structure
Which of the following description(s) is/are true:
A. Red Black Tree – Guarantees worst case of O(log n) time for search, insert & delete.
B. Trie Used for efficient prefix – based searches.
C. AVL Tree – self balancing binary search tree with stricker balance criteria.
D. B- Tree Allows efficient search, inert, delete operations in disk-based system.
Choose the correct answer from the options given below:
i ➥ A & B only
ii ➥ C & D only
iii ➥ B only
iv ➥ A, B & D only
Best Explanation:
Answer: IV
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q19âž¡ | Data Structure
20.	Considering below binary tree, what will be the inorder traversal  
a)	BADCEGFH 
b)	GHFEDCBA 
c)	BACDEGFH 
d)	GHFDEBCA
Considering below binary tree, what will be the inorder traversal
i ➥ BADCEGFH
ii ➥GHFEDCBA
iii ➥ BACDEGFH
iv ➥GHFDEBCA
Best Explanation:
Answer: I
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q20âž¡ | Computer Network
The primary function of firewall in network security is
i ➥ To monitor network traffic and detect anomalies
ii ➥ To create virtual private networks for secure communication
iii ➥ To filter incoming and outgoing network traffic based on security rules
iv ➥ To encrypt data before Transmission
Best Explanation:
Answer: III
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q21âž¡ | Programming
The characteristics of modern programming are:
A. Each module should do only one thing.
B. Communication between modules is allowed only by a calling module.
C. Communication can take place directly between modules that do not have calling – called relationship.
D. All modules are designed as single-entry, single exit systems using control structure.
Choose the correct answer from the options given below:
i ➥ A, B & C only
ii ➥ A, B & D only
iii ➥ A, C & D only
iv ➥C & D only
Best Explanation:
Answer: II
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q22âž¡ | Computer Architecture
Arrange the following in the increasing order with respect to access time.
A. Solid State Drive
B. Optical Disks
C. DRAMS
D. SRAMS
E. Registers
Choose the correct answer from the options given below:
i ➥ D, C, A, B, E
ii ➥ B, D, C, A, E
iii ➥ A, E, B, D, C
iv ➥ E, D, C, A, B
Best Explanation:
Answer: IV
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q23âž¡ | Computer Architecture
Which of the following are not data manipulation instructions?
A. Call
B. Load
C. And
D. Increment
E. Shift
Choose the correct answer from the options given below:
i ➥ C & E only
ii ➥ A & B only
iii ➥ D & E only
iv ➥ A & C only
Best Explanation:
Answer: II
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q19âž¡ | Data Structure
20.	Considering below binary tree, what will be the inorder traversal  
a)	BADCEGFH 
b)	GHFEDCBA 
c)	BACDEGFH 
d)	GHFDEBCA
Considering below binary tree, what will be the inorder traversal
i ➥ BADCEGFH
ii ➥GHFEDCBA
iii ➥ BACDEGFH
iv ➥GHFDEBCA
Best Explanation:
Answer: I
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q20âž¡ | Computer Network
The primary function of firewall in network security is
i ➥ To monitor network traffic and detect anomalies
ii ➥ To create virtual private networks for secure communication
iii ➥ To filter incoming and outgoing network traffic based on security rules
iv ➥ To encrypt data before Transmission
Best Explanation:
Answer: III
Explanation: Upload Soon
More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

error: Content is protected !!
Open chat
1
Hi,how Can We Help You ?