Previous Year Question Papers for UGC NET Jan 2025 Computer Science with Solutions
Q1➡ | Computer Network The network using CSMA/CD has a bandwidth of 20 Mbps. If the maximum propagation time is 25µ sec (microsecond), what is the minimum size of the frame? |
i ➥ 500 bits |
ii ➥ 1000 bits |
iii ➥ 1500 bits |
iv ➥ 2000 bits |
Best Explanation: Answer: II Explanation: Upload Soon |
More Discussion | Explanation On YouTube | Learn Topic Wise | Help-Line |
Q2âž¡ | Artificial Intelligence Which of the following is not a component of the classic Planning Definition? |
i ➥ Init |
ii ➥ Domain |
iii ➥ Action |
iv ➥Goal |
Best Explanation: Answer: II Explanation: Upload Soon |
More Discussion | Explanation On YouTube | Learn Topic Wise | Help-Line |
Q3âž¡ | Theory of Computation Which of the following CFG(s) is/are in Chomsky Normal Form (All capital letters are variables & lower case are terminals)? ![]() a) ![]() b) ![]() c) ![]() d) ![]() Choose the correct answer from the options given below |
i ➥ A & B only |
ii ➥ B only |
iii ➥ C only |
iv ➥ B & D only |
Best Explanation: Answer: II Explanation: Upload Soon |
More Discussion | Explanation On YouTube | Learn Topic Wise | Help-Line |
Q4âž¡ | Artificial Intelligence What is the correct sequence of steps used by knowledge base designing? A. Ask questions about the intended interpretation. B. Choose task domain or world to represent. C. Select atoms to represent propositions of Interest. D. Tell the system propositions that are true in the intended interpretation/axiomatizing the domain. Choose the correct answer from the options given below: |
i ➥ B, C, D, A |
ii ➥ B, C, D, A |
iii ➥C, D, A, B |
iv ➥ D, A, B, C |
Best Explanation: Answer: II Explanation: Upload Soon |
More Discussion | Explanation On YouTube | Learn Topic Wise | Help-Line |
Q5âž¡ | Software Engineering Which one of the following is not a part of requirement management? |
i ➥ Features Traceability Table |
ii ➥ Dependency Traceability Table |
iii ➥ Interface Traceability Table |
iv ➥Page Traceability Table |
Best Explanation: Answer: IV Explanation: Upload Soon |
More Discussion | Explanation On YouTube | Learn Topic Wise | Help-Line |
Q6âž¡ | DBMS What will be the right sequence of the phases of database design? A. Physical Design B. Conceptual Design C. Logical Design D. Requirement Collection and Analysis Choose the correct answer from the options given below: |
i ➥ D, A, B, C |
ii ➥ D, B, C, A |
iii ➥ D, B, A, C |
iv ➥ D, A, C, B |
Best Explanation: Answer: II Explanation: Upload Soon |
More Discussion | Explanation On YouTube | Learn Topic Wise | Help-Line |
Q7âž¡ | Match the LIST-I with LIST-II ![]() Choose the correct answer from the options given below: |
i ➥ A-IV, B-III, C-I, D-II |
ii ➥A-III, B-I, C-IV, D-II |
iii ➥ A-III, B-I, C-II, D-IV |
iv ➥A-II, B-III, C-I, D-IV |
Best Explanation: Answer: III Explanation: Upload Soon |
More Discussion | Explanation On YouTube | Learn Topic Wise | Help-Line |
Q8➡ | Discrete Math Which of the following statements are true about the sets? A. 0∈∅ B. ∅∈{0} C. ∅∈{∅} D. {∅}∈{∅} E. {∅}⊆{∅,{∅}} Choose the correct answer from the options given below: |
i ➥ A, B, C, D, and E |
ii ➥ A, B, C, and E only |
iii ➥ A, C only |
iv ➥ C and E only |
Best Explanation: Answer: IV Explanation: Upload Soon |
More Discussion | Explanation On YouTube | Learn Topic Wise | Help-Line |
Q9âž¡ | Programming Match the LIST-I with LIST-II ![]() Choose the correct answer from the options given below: |
i ➥ A-II, B-III, C-I, D-IV |
ii ➥ A-III, B-I, C-IV, D-II |
iii ➥ A-III, B-I, CII-, D-IV |
iv ➥A-II, B-IV, C-III, D-I |
Best Explanation: Answer: II Explanation: Upload Soon |
More Discussion | Explanation On YouTube | Learn Topic Wise | Help-Line |
Q10âž¡ | DBMS In concurrency control, phantom problem may occur, when- |
i ➥ records are inserted |
ii ➥ records are deleted |
iii ➥ records are modified |
iv ➥ records are indexed |
Best Explanation: Answer: I Explanation: Upload Soon |
More Discussion | Explanation On YouTube | Learn Topic Wise | Help-Line |
Q11âž¡ | DBMS Which of the following/s is/are FALSE statement? A. An all key relation is always in BCNF since it has no FDs. B. A relation that is not in 4NF due to nontrivial MVD must be decomposed to convert it into a set of relations in 4NF. C. The decomposition removes the redundancy by the MVD. D. 3NF is stronger than BCNF. Choose the correct answer from the options given below: |
i ➥ A only |
ii ➥ A. B only |
iii ➥D only |
iv ➥ C only |
Best Explanation: Answer: III Explanation: Upload Soon |
More Discussion | Explanation On YouTube | Learn Topic Wise | Help-Line |
Q12âž¡ | Computer architecture Correct the order of instruction cycle: A. Read the effective address B. Fetch the information C. Execute the instruction D. Decode the instruction Choose the correct answer from the options given below: |
i ➥ A, B, C, D |
ii ➥ B, D, A, С |
iii ➥ B, A, D, C |
iv ➥A, B, D, C |
Best Explanation: Answer: II Explanation: Upload Soon |
More Discussion | Explanation On YouTube | Learn Topic Wise | Help-Line |
Q13âž¡ | Computer architecture Match the LIST-I with LIST-II ![]() Choose the correct answer from the options given below: |
i ➥ A-II, B-I, C-IV, D-III |
ii ➥ A-II, B-IV, C-I, D-III |
iii ➥ A-III, B-IV, C-I, D-II |
iv ➥ A-IV, B-III, C-II, D-I |
Best Explanation: Answer: II Explanation: Upload Soon |
More Discussion | Explanation On YouTube | Learn Topic Wise | Help-Line |
Q14âž¡ | Computer architecture The entire set of parameters, including return address that is stored for a procedure invocation is referred to |
i ➥ stack frame |
ii ➥ stack base |
iii ➥ stack limit |
iv ➥ stack record |
Best Explanation: Answer: I Explanation: Upload Soon |
More Discussion | Explanation On YouTube | Learn Topic Wise | Help-Line |
Q15âž¡ | Theory of Computation Which of the following is TRUE about the Pumping Lemma for regular language? |
i ➥ It applies to all regular language |
ii ➥ It applies only to infinite regular languages |
iii ➥ It applies to all context free languages |
iv ➥It applies to all recursively enumerable languages |
Best Explanation: Answer: II Explanation: Upload Soon |
More Discussion | Explanation On YouTube | Learn Topic Wise | Help-Line |
Q16âž¡ | Algorithm Choose the correct statement(s) A. A problem which is NP-Complete will have the property that it can be solved in polynomial time iff all other NP-complete problems can also be solved in polynomial time. B. All NP-complete problem are NP-hard problems. C. If an NP-hard problem can be solved in polynomial time, then all NP-complete problem can be solved in polynomial time D. All NP-hard-problems are not NP-complete. Choose the correct answer from the options given below: |
i ➥ A, C only |
ii ➥ B, D only |
iii ➥ A, B, C only |
iv ➥ A, B, C, D |
Best Explanation: Answer: IV Explanation: Upload Soon |
More Discussion | Explanation On YouTube | Learn Topic Wise | Help-Line |
Q17âž¡ | Computer Network Which of the following are key features of Mobile Adhoc Networks (MANETS) A. Self – Organizing and decentralized. B. High Mobility of nodes. C. Requires fixed Infrastructure for operation. D. Network Topology is dynamic and constantly changing. E. It requires a central controller to manage network traffic. Choose the correct answer from the options given below: |
i ➥ A, B & E only |
ii ➥ B, C, D & E only |
iii ➥A, B & D only |
iv ➥ A, B & C only |
Best Explanation: Answer: III Explanation: Upload Soon |
More Discussion | Explanation On YouTube | Learn Topic Wise | Help-Line |
Q18âž¡ | Data Structure Which of the following description(s) is/are true: A. Red Black Tree – Guarantees worst case of O(log n) time for search, insert & delete. B. Trie Used for efficient prefix – based searches. C. AVL Tree – self balancing binary search tree with stricker balance criteria. D. B- Tree Allows efficient search, inert, delete operations in disk-based system. Choose the correct answer from the options given below: |
i ➥ A & B only |
ii ➥ C & D only |
iii ➥ B only |
iv ➥ A, B & D only |
Best Explanation: Answer: IV Explanation: Upload Soon |
More Discussion | Explanation On YouTube | Learn Topic Wise | Help-Line |
Q19âž¡ | Data Structure![]() Considering below binary tree, what will be the inorder traversal |
i ➥ BADCEGFH |
ii ➥GHFEDCBA |
iii ➥ BACDEGFH |
iv ➥GHFDEBCA |
Best Explanation: Answer: I Explanation: Upload Soon |
More Discussion | Explanation On YouTube | Learn Topic Wise | Help-Line |
Q20âž¡ | Computer Network The primary function of firewall in network security is |
i ➥ To monitor network traffic and detect anomalies |
ii ➥ To create virtual private networks for secure communication |
iii ➥ To filter incoming and outgoing network traffic based on security rules |
iv ➥ To encrypt data before Transmission |
Best Explanation: Answer: III Explanation: Upload Soon |
More Discussion | Explanation On YouTube | Learn Topic Wise | Help-Line |
Q21âž¡ | Programming The characteristics of modern programming are: A. Each module should do only one thing. B. Communication between modules is allowed only by a calling module. C. Communication can take place directly between modules that do not have calling – called relationship. D. All modules are designed as single-entry, single exit systems using control structure. Choose the correct answer from the options given below: |
i ➥ A, B & C only |
ii ➥ A, B & D only |
iii ➥ A, C & D only |
iv ➥C & D only |
Best Explanation: Answer: II Explanation: Upload Soon |
More Discussion | Explanation On YouTube | Learn Topic Wise | Help-Line |
Q22âž¡ | Computer Architecture Arrange the following in the increasing order with respect to access time. A. Solid State Drive B. Optical Disks C. DRAMS D. SRAMS E. Registers Choose the correct answer from the options given below: |
i ➥ D, C, A, B, E |
ii ➥ B, D, C, A, E |
iii ➥ A, E, B, D, C |
iv ➥ E, D, C, A, B |
Best Explanation: Answer: IV Explanation: Upload Soon |
More Discussion | Explanation On YouTube | Learn Topic Wise | Help-Line |
Q23âž¡ | Computer Architecture Which of the following are not data manipulation instructions? A. Call B. Load C. And D. Increment E. Shift Choose the correct answer from the options given below: |
i ➥ C & E only |
ii ➥ A & B only |
iii ➥ D & E only |
iv ➥ A & C only |
Best Explanation: Answer: II Explanation: Upload Soon |
More Discussion | Explanation On YouTube | Learn Topic Wise | Help-Line |
Q19âž¡ | Data Structure![]() Considering below binary tree, what will be the inorder traversal |
i ➥ BADCEGFH |
ii ➥GHFEDCBA |
iii ➥ BACDEGFH |
iv ➥GHFDEBCA |
Best Explanation: Answer: I Explanation: Upload Soon |
More Discussion | Explanation On YouTube | Learn Topic Wise | Help-Line |
Q20âž¡ | Computer Network The primary function of firewall in network security is |
i ➥ To monitor network traffic and detect anomalies |
ii ➥ To create virtual private networks for secure communication |
iii ➥ To filter incoming and outgoing network traffic based on security rules |
iv ➥ To encrypt data before Transmission |
Best Explanation: Answer: III Explanation: Upload Soon |
More Discussion | Explanation On YouTube | Learn Topic Wise | Help-Line |