August 2016 UGC NET Paper II

August 2016 UGC NET Paper II

Q1➡ |
The Boolean function [~(~p ∧ q) ∧ ~( ~p ∧ ~q)] ∨ (p ∧ r) is equal to the Boolean function:
i ➥ q
ii ➥ p ∧ r
iii ➥ p ∨ q
iv ➥ p

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q2➡ |
Let us assume that you construct ordered tree to represent the compound proposition (~ (p ∧ q)) ↔ (~ p ∨ ~ q) Then, the prefix expression and post-fix expression determined using this ordered tree are given as ____ and __ respectively.
i ➥ ↔~∧pq∨ ~ ~ pq, pq∧~p~q~∨↔
ii ➥ ↔~∧pq∨ ~ p~q, pq∧~p~q~∨↔
iii ➥ ↔~∧pq∨ ~ ~ pq, pq∧~p~~q∨↔
iv ➥ ↔~∧pq∨ ~ p~ q, pq∧~p~ ~q∨↔

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q3➡ |
Let A and B be sets in a finite universal set U. Given the following: |A – B|, |A ⊕ B|, |A| + |B| and |A ∪ B| Which of the following is in order of increasing size ?
i ➥ |A–B| ≤ |A⊕B| ≤ |A|+|B| ≤ |A∪B|
ii ➥ |A⊕B| ≤ |A–B| ≤ |A∪B| ≤ |A|+|B|
iii ➥ |A⊕B| ≤ |A|+|B| ≤ |A–B| ≤ |A∪B|
iv ➥ |A–B| ≤ |A⊕B| ≤ |A∪B| ≤ |A|+|B|

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q4➡ |
What is the probability that a randomly selected bit string of length 10 is a palindrome?
i ➥ 1/64
ii ➥ 1/32
iii ➥ 1/8
iv ➥ 1/4

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q5➡ |
Given the following graphs:
Given the following graphs: Which of the following is correct? A	G 1 contains Euler circuit and G 2 does not contain Euler circuit.  B	G 1 does not contain Euler circuit and G 2 contains Euler circuit.  C	Both G 1 and G 2 do not contain Euler circuit.  D	Both G 1 and G 2 contain Euler circuit.
Which of the following is correct?
i ➥ G 1 contains Euler circuit and G 2 does not contain Euler circuit.
ii ➥ G 1 does not contain Euler circuit and G 2 contains Euler circuit.
iii ➥ Both G 1 and G 2 do not contain Euler circuit.
iv ➥ Both G 1 and G 2 contain Euler circuit.

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q6➡ |
The octal number 326.4 is equivalent to
i ➥ (214.2) 10 and (D6.8)) 16
ii ➥ (212.5) 10 and (D6.8)) 16
iii ➥ (214.5) 10 and (D6.8)) 16
iv ➥ (214.5) 10 and (D6.4)) 16

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q7➡ |
Which of the following is the most efficient to perform arithmetic operations on the numbers?
i ➥ Sign-magnitude
ii ➥ 1’s complement
iii ➥ 2’s complement
iv ➥ 9’s complement

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q8➡ |
The Karnaugh map for a Boolean function is given as
The Karnaugh map for a Boolean function is given as   The simplified Boolean equation for the above Karnaugh Map is A	AB + CD + AB’ + AD B	AB + AC + AD + BCD C	AB + AD + BC + ACD D	AB + AC + BC + BCD Net July 2016 question
The simplified Boolean equation for the above Karnaugh Map is
i ➥ AB + CD + AB’ + AD
ii ➥ AB + AC + AD + BCD
iii ➥ AB + AD + BC + ACD
iv ➥ AB + AC + BC + BCD

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q9➡ |
Which of the following logic operations is performed by the following given combinational circuit?
Which of the following logic operations is performed by the following given combinational circuit?   A	EXCLUSIVE-OR B	EXCLUSIVE-NOR C	NAND net july 2016
i ➥ EXCLUSIVE-OR
ii ➥ EXCLUSIVE-NOR
iii ➥ NAND
iv ➥ NOR

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q10➡ |
Match the following:
Match the following: a) controlled inverter b) full adder c) half adder d) binary adder   A	a-iii, b-ii, c-iv, d-i B	a-ii, b-iv, c-i, d-iii C	a-ii, b-i, c-iv, d-iii D	a-iii, b-i, c-iv, d-ii
i ➥ a-iii, b-ii, c-iv, d-i
ii ➥ a-ii, b-iv, c-i, d-iii
iii ➥ a-ii, b-i, c-iv, d-iii
iv ➥ a-iii, b-i, c-iv, d-ii

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q11➡ |
Given i= 0, j = 1, k = –1, x = 0.5, y = 0.0 What is the output of given ‘C’ expression ?
x * 3 && 3 || j | k
i ➥ -1
ii ➥ 0
iii ➥ 1
iv ➥ 2

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q12➡ |
The following ‘C’ statement : int *f [ ] ( ); declares:
i ➥ A function returning a pointer to an array of integers.
ii ➥ Array of functions returning pointers to integers.
iii ➥ A function returning an array of pointers to integers.
iv ➥ An illegal statement.

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q13➡ |
If a function is friend of a class, which one of the following is wrong?
i ➥ A function can only be declared a friend by a class itself.
ii ➥ Friend functions are not members of a class, they are associated with it.
iii ➥ Friend functions are members of a class.
iv ➥ It can have access to all members of the class, even private ones.

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q14➡ |
In C++, polymorphism requires:
i ➥ Inheritance only
ii ➥ Virtual functions only
iii ➥ References only
iv ➥ Inheritance, Virtual functions and references

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q15➡ |
A function template in C++ provides _ level of generalization.
i ➥ 4
ii ➥ 3
iii ➥ 2
iv ➥ 1

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q16➡ |
DBMS provides the facility of accessing data from a database through
i ➥ DDL
ii ➥ DML
iii ➥ DBA
iv ➥ Schema

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q17➡ |
Relational database schema normalization is NOT for:
i ➥ reducing the number of joins required to satisfy a query.
ii ➥ eliminating uncontrolled redundancy of data stored in the database.
iii ➥ eliminating number of anomalies that could otherwise occur with inserts and deletes.
iv ➥ ensuring that functional dependencies are enforced.

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q18➡ |
Consider the following statements regarding relational database model:
(a) NULL values can be used to opt a tuple out of enforcement of a foreign key.
(b) Suppose that table T has only one candidate key. If Q is in 3NF, then it is also in BCNF.
(c) The difference between the project operator (Π) in relational algebra and the SELECT keyword in SQL is that if the resulting table/set has more than one occurrences of the same tuple, then Π will return only one of them, while SQL SELECT will return all.
One can determine that:
i ➥ (a) and (b) are true.
ii ➥
iii ➥ (b) and (c) are true
iv ➥ (a), (b) and (c) are true

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line
\

Q19➡ |
Consider the following Entity-Relationship (E-R) diagram and three possible relationship sets (I, II and III) for this E-R diagram:

If different symbols stand for different values (e.g., t1 is definitely not equal to t2 ) , then which of the above could not be the relationship set for the E-R diagram ?
i ➥ I only
ii ➥ I and II only
iii ➥ II only
iv ➥ I, II and III

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q20➡ |
Consider a database table R with attributes A and B. Which of the following SQL queries is illegal ?
i ➥ SELECT A FROM R;
ii ➥ SELECT A, COUNT(*) FROM R;
iii ➥ SELECT A, COUNT(*) FROM R GROUP BY A;
iv ➥ SELECT A, B, COUNT(*) FROM R GROUP BY A, B;

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q21➡ |
Consider an implementation of unsorted singly linked list. Suppose it has its representation with a head and a tail pointer (i.e. pointers to the first and last nodes of the linked list). Given the representation, which of the following operation can not be implemented in O(1) time ?
i ➥ Insertion at the front of the linked list.
ii ➥ Insertion at the end of the linked list.
iii ➥ Deletion of the front node of the linked list.
iv ➥ Deletion of the last node of the linked list.

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q22➡ |
Consider an undirected graph G where self-loops are not allowed. The vertex set of G is {(i, j) | 1 ≤ i ≤ 12, 1 ≤ j ≤ 12}. There is an edge between (a,b) and (c, d) if |a – c| ≤ 1 or | b–d| ≤ 1. The number of edges in this graph is:
i ➥ 726
ii ➥ 796
iii ➥ 506
iv ➥ 616

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q23➡ |
The runtime for traversing all the nodes of a binary search tree with n nodes and printing them in an order is:
i ➥ O(lg n)
ii ➥ O(n lg n)
iii ➥ O(n)
iv ➥ O(n2)

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q24➡ |
Consider the following statements:
S1: A queue can be implemented using two stacks.
S2: A stack can be implemented using two queues.
Which of the following is correct?
i ➥ S 1 is correct and S 2 is not correct.
ii ➥ S 1 is not correct and S 2 is correct.
iii ➥ Both S 1 and S 2 are correct.
iv ➥ Both S 1 and S 2 are incorrect.

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q25➡ |
Given the following prefix expression:
+ 3 + 3 ↑ 3 + 3 3 3
What is the value of the prefix expression ?
i ➥ 2178
ii ➥ 2199
iii ➥ 2205
iv ➥ 2232

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q26➡ |
Which of the following statements is not true with respect to microwaves?
i ➥ Electromagnetic waves with frequencies from 300 GHz to 400 Thz.
ii ➥ Propagation is line-of-sight.
iii ➥ Very high-frequency waves cannot penetrate walls.
iv ➥ Use of certain portions of the band requires permission from authorities.

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q27➡ |
In a fast Ethernet cabling, 100 Base-TX uses _____cable and maximum segment size is_____.
i ➥ twisted pair, 100 metres
ii ➥ twisted pair, 200 metres
iii ➥ fibre optics, 1000 metres
iv ➥ fibre optics, 2000 metres

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q28➡ |
A network with bandwidth of 10 Mbps can pass only an average of 12,000 frames per minute with each frame carrying an average of 10,000 bits. What is the throughput of this network ?
i ➥ 1 Mbps
ii ➥ 2 Mbps
iii ➥ 10 Mbps
iv ➥ 12 Mbps

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q29➡ |
Match the following
i ➥ a-iv, b-i, c-ii, d-iii
ii ➥ a-i, b-iv, c-ii, d-iii
iii ➥ a-iv, b-i, c-iii, d-ii
iv ➥ a-iv, b-ii, c-i, d-iii

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q30➡ |
Which of the following protocols is used by email server to maintain a central repository that can be accessed from any machine ?
i ➥ POP3
ii ➥ IMAP
iii ➥ SMTP
iv ➥ DMSP

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q31➡ |
The number of strings of length 4 that are generated by the regular expression (0 + 1 + | 2 + 3 + )*, where | is an alternation character and {+, *} are quantification characters, is:
i ➥ 08
ii ➥ 09
iii ➥ 10
iv ➥ 12

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q32➡ |
The content of the accumulator after the execution of the following 8085 assembly language program, is
MVI A, 35H
MOV B, A
STC
CMC
RAR
XRA B
i ➥ 00H
ii ➥ 35H
iii ➥ EFH
iv ➥ 2FH

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q33➡ |
In compiler optimization, operator strength reduction uses mathematical identities to replace slow math operations with faster operations. Which of the following code replacements is an illustration of operator strength reduction ?
i ➥ Replace P + P by 2 * P or Replace 3 + 4 by 7.
ii ➥ Replace P * 32 by P << 5
iii ➥ Replace P * 0 by 0
iv ➥ Replace (P << 4) – P by P * 15

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q34➡ |
Which of the following are the principles tasks of the linker?
I. Resolve external references among separately compiled program units.
II. Translate assembly language to machine code.
III. Relocate code and data relative to the beginning of the program.
IV. Enforce access-control restrictions on system libraries
i ➥ I and II
ii ➥ I and III
iii ➥ II and III
iv ➥ I and IV

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q35➡ |
Which of the following is FALSE?
i ➥ The grammar S→aS|aSbS|∈, where S is the only non-terminal symbol, and ∈ is the null string, is ambiguous.
ii ➥ An unambiguous grammar has same leftmost and rightmost derivation.
iii ➥ An ambiguous grammar can never be LR(k) for any k.
iv ➥ Recursive descent parser is a top-down parser.

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q36➡ |
Consider a system with seven processes A through G and six resources R through W. Resource ownership is as follows : process A holds R and wants T process B holds nothing but wants T process C holds nothing but wants S process D holds U and wants S & T process E holds T and wants V process F holds W and wants S process G holds V and wants U Is the system deadlocked ? If yes, __ processes are deadlocked.
i ➥ NO
ii ➥ Yes, A, B, C
iii ➥ Yes, D, E, G
iv ➥ Yes, A, B, F

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q37➡ |
Suppose that the virtual Address space has eight pages and physical memory with four page frames. If LRU page replacement algorithm is used, _____ number of page faults occur with the reference string. 0 2 1 3 5 4 6 3 7 4 7 3 3 5 5 3 1 1 1 7 2 3 4 1
i ➥ 11
ii ➥ 12
iii ➥ 10
iv ➥ 9

Show Answer With Best Explanation

Answer: None of the above
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q38➡ |
Consider a system having ‘m’ resources of the same type. These resources are shared by three processes P 1 , P 2 and P 3 which have peak demands of 2, 5 and 7 resources respectively. For what value of ‘m’ deadlock will not occur ?
i ➥ 70
ii ➥ 14
iii ➥ 13
iv ➥ 7

Show Answer With Best Explanation

Answer: None of the above
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q39➡ |
Five jobs A, B, C, D and E are waiting in Ready Queue. Their expected runtimes are 9, 6, 3,5 and x respectively. All jobs entered in Ready queue at time zero. They must run in _____order to minimize average response time if 3 < x < 5.
i ➥ B, A, D, E, C
ii ➥ C, E, D, B, A
iii ➥ E, D, C, B, A
iv ➥ C, B, A, E, D

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q40➡ |
Consider three CPU intensive processes P1 , P2 , P3 which require 20, 10 and 30 units of time, arrive at times 1, 3 and 7 respectively. Suppose operating system is implementing Shortest Remaining Time first (preemptive scheduling) algorithm, then _ context switches are required (suppose context switch at the beginning of Ready queue and at the end of Ready queue are not counted).
i ➥ 3
ii ➥ 2
iii ➥ 4
iv ➥ 5

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q41➡ |
Which of the following is used to determine the specificity of requirements? [ Where n 1 is the number of requirements for which all reviewers have identical interpretations, n 2 is number of requirements in a specification.]
i ➥ n 1 / n 2
ii ➥ n 2 / n 1
iii ➥ n 1 + n 2
iv ➥ n 1 – n 2

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q42➡ |
The major shortcoming of waterfall model is
i ➥ The difficulty in accommodating changes after requirement analysis.
ii ➥ The difficult in accommodating changes after feasibility analysis.
iii ➥ The system testing
iv ➥The maintenance of system.

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q43➡ |
The quick design of a software that is visible to end users leads to _.
i ➥ iterative model
ii ➥ prototype model
iii ➥ spiral model
iv ➥ waterfall model

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q44➡ |
For a program of k variables, boundary value analysis yields ______test cases.
i ➥ 4k – 1
ii ➥ 4k
iii ➥ 4k + 1
iv ➥ 2 K – 1

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q45➡ |
The extent to which a software performs its intended functions without failures, is termed as__
i ➥ Robustness
ii ➥ Correctness
iii ➥ Reliability
iv ➥ Accuracy

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q46➡ |
An attacker sits between the sender and receiver and captures the information and retransmits to the receiver after some time without altering the information. This attack is called as _______.
i ➥ Denial of service attack
ii ➥ Masquerade attack
iii ➥ Simple attack
iv ➥ Complex attack

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q47➡ |
______is subject oriented, integrated, time variant, nonvolatile collection of data in support of management decisions.
i ➥ Data mining
ii ➥ Web mining
iii ➥ Data warehouse
iv ➥ Database Management System

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q48➡ |
In Data mining, classification rules are extracted from _.
i ➥ Data
ii ➥ Information
iii ➥ Decision Tree
iv ➥ Database

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q49➡ |
Discovery of cross sales opportunities is called as ______.
i ➥ Association
ii ➥ Visualization
iii ➥ Correlation
iv ➥ Segmentation

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q50➡ |
In Data mining, __ is a method of incremental conceptual clustering.
i ➥ STRING
ii ➥ COBWEB
iii ➥ CORBA
iv ➥ OLAD

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

error: Content is protected !!
Open chat
1
Hi,how Can We Help You ?