UGC NET JULY 2016 Paper II

UGC NET JULY 2016 Paper II

Q1➡ |
How many different equivalence relations with exactly three different equivalence classes are there on a set with five elements?
i ➥ 10
ii ➥ 15
iii ➥ 25
iv ➥ 30

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q2➡ |
The number of different spanning trees in complete graph, K 4 and bipartite graph, K2,2 have _______ and _______ respectively.
i ➥ 14,14
ii ➥ 16,14
iii ➥ 16,14
iv ➥ 14,4

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q3➡ |
Suppose that R 1 and R 2 are reflexive relations on a set A. Which of the following statements is correct ?
i ➥ R 1 ∩ R 2 is reflexive and R 1 ∪ R 2 is irreflexive.
ii ➥ R 1 ∩ R 2 is irreflexive and R 1 ∪ R 2 is reflexive.
iii ➥ Both R 1 ∩ R 2 and R 1 ∪ R 2 are reflexive.
iv ➥ Both R 1 ∩ R 2 and R 1 ∪ R 2 are irreflexive.

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q4➡ |
There are three cards in a box. Both sides of one card are black, both sides of one card are red, and the third card has one black side and one red side. We pick a card at random and observe only one side. What is the probability that the opposite side is the same colour as the one side we observed?
i ➥ 3/4
ii ➥ 2/3
iii ➥ 1/2
iv ➥ 1/3

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q5➡ |
A clique in a simple undirected graph is a complete subgraph that is not contained in any larger complete subgraph. How many cliques are there in the graph shown below?
i ➥ 2
ii ➥ 4
iii ➥ 5
iv ➥ 6

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q6➡ |
Which of the following logic expressions is incorrect?
i ➥ 1 ⊕ 0 = 1
ii ➥ 1 ⊕ 1 ⊕ 1 = 1
iii ➥ 1 ⊕ 1 ⊕ 0 = 1
iv ➥ 1 ⊕ 1 = 0

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q7➡ |
The IEEE-754 double-precision format to represent floating point numbers, has a length of _ bits.
i ➥ 16
ii ➥ 32
iii ➥ 48
iv ➥ 64

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q8➡ |
Simplified Boolean equation for the following truth table is:
i ➥ F = yz’ + y’z
ii ➥ F = xy’ + x’y
iii ➥ F = x’z + xz’
iv ➥ F = x’z + xz’ + xyz

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q9➡ |
The simplified form of a Boolean equation (AB’ + AB’C + AC) (A’C’ + B’) is :
i ➥ AB’
ii ➥ AB’C
iii ➥ A’B
iv ➥ ABC

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q10➡ |
In a positive-edge-triggered JK flip-flop, if J and K both are high then the output will be _ on the rising edge of the clock.
i ➥ No change
ii ➥ Set
iii ➥ Reset
iv ➥ Toggle

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q11➡ |
Given i = 0, j = 1, k = –1 x = 0.5, y = 0.0 What is the output of the following expression in C language ?
x * y < i + j || k
i ➥ -1
ii ➥ 0
iii ➥ 1
iv ➥ 2

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q12➡ |
The following statement in ‘C’
int (*f())[ ];
declares
i ➥ a function returning a pointer to an array of integers.
ii ➥ a function returning an array of pointers to integers.
iii ➥ array of functions returning pointers to integers.
iv ➥ an illegal statement.

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q13➡ |
Which one of the following is correct, when a class grants friend status to another class?
i ➥ The member functions of the class generating friendship can access the members of the friend class.
ii ➥ All member functions of the class granted friendship have unrestricted access to the members of the class granting the friendship.
iii ➥ Class friendship is reciprocal to each other.
iv ➥ There is no such concept.

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q14➡ |
When a method in a subclass has the same name and type signatures as a method in the super class, then the method in the subclass _ the method in the super class.
i ➥ Overloads
ii ➥ Friendships
iii ➥ Inherits
iv ➥ Overrides

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q15➡ |
What is the value returned by the function f given below when n = 100?
int f (int n)
{
if (n = = 0) then return n;
else return n + f(n-2);
}
i ➥ 2550
ii ➥ 2556
iii ➥ 5220
iv ➥ 5520

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q16➡ |
In RDBMS, the constraint that no key attribute (column) may be NULL is referred to as:
i ➥ Referential integrity
ii ➥ Multi-valued dependency
iii ➥ Entity Integrity
iv ➥ Functional dependency

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q17➡ |
Which of the following statement(s) is/are FALSE in the context of Relational DBMS ?
I. Views in a database system are important because they help with access control by allowing users to see only a particular subset of the data in the database.
II. E-R diagrams are useful to logically model concepts.
III. An update anomaly is when it is not possible to store information unless some other, unrelated information is stored as well.
IV. SQL is a procedural language.
i ➥ I and IV only
ii ➥ III and IV only
iii ➥ I, II and III only
iv ➥ II, III and IV only

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q18➡ |
In a relational database model, NULL values can be used for all but which one of the following ?
i ➥ To allow duplicate tuples in the table by filling the primary key column(s) with NULL.
ii ➥ To avoid confusion with actual legitimate data values like 0 (zero) for integer columns and ’’ (the empty string) for string columns.
iii ➥ To leave columns in a tuple marked as ’’unknown’’ when the actual value is unknown.
iv ➥ To fill a column in a tuple when that column does not really ”exist” for that particular tuple.

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q19➡ |
Consider the following two commands C1 and C2 on the relation R from an SQL database:
C1 : drop table R;
C2 : delete from R;
Which of the following statements is TRUE ?
I. Both C1 and C2 delete the schema for R.
II. C2 retains relation R, but deletes all tuples in R.
III. C1 deletes not only all tuples of R, but also the schema for R.
i ➥ I only
ii ➥ I and II only
iii ➥ II and III only
iv ➥ I, II and III

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q20➡ |
Consider the following database table having A, B, C and D as its four attributes and four possible candidate keys (I, II,III and IV) for this table :

I : {B}
II : {B, C}
III : {A, D}
IV : {C, D}
If different symbols stand for different values in the table (e.g., d1 is definitely not equal to d2 ), then which of the above could not be the candidate key for the database table ?
i ➥ I and III only
ii ➥ III and IV only
iii ➥ II only
iv ➥ I only

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q21➡ |
Consider the following binary search tree:

If we remove the root node, which of the node from the left subtree will be the new root?
i ➥ 11
ii ➥ 12
iii ➥ 13
iv ➥ 16

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q22➡ |
Consider the following operations performed on a stack of size 5 : Push (a); Pop() ; Push(b); Push(c); Pop(); Push(d); Pop();Pop(); Push (e) Which of the following statements is correct?
i ➥ Underflow occurs
ii ➥ Stack operations are performed smoothly
iii ➥ Overflow occurs
iv ➥ None of the above

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q23➡ |
Suppose you are given a binary tree with n nodes, such that each node has exactly either zero or two children. The maximum height of the tree will be
i ➥ (n/2) -1
ii ➥ (n/2) +1
iii ➥ (n–1) / 2
iv ➥ (n+1) / 2

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q24➡ |
Which of the following is not an inherent application of stack?
i ➥ Implementation of recursion
ii ➥ Evaluation of a postfix expression
iii ➥ Job scheduling
iv ➥ Reverse a string

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q25➡ |
In how many ways can the string A ∩ B – A ∩ B – A be fully parenthesized to yield an infix expression?
i ➥ 15
ii ➥ 14
iii ➥ 13
iv ➥ 12

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q26➡ |
A multiplexer combines four 100-Kbps channels using a time slot of 2 bits. What is the bit rate?
i ➥ 100 Kbps
ii ➥ 200 Kbps
iii ➥ 400 Kbps
iv ➥ 1000 Kbps

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q27➡ |
In a fully-connected mesh network with 10 computers, total _____ number of cables are required and______ number of ports are required for each device.
i ➥ 40, 9
ii ➥ 45, 10
iii ➥ 45, 9
iv ➥ 50, 10

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q28➡ |
In TCP/IP Reference model, the job of _______layer is to permit hosts to inject packets into any network and travel them independently to the destination.
i ➥ Physical
ii ➥ Transport
iii ➥ Host-to-network
iv ➥ None of the above

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q29➡ |
If there are N people in the world and are using secret key encryption/decryption for privacy purpose, then number of secret keys required will be:
i ➥ N
ii ➥ (N-1)
iii ➥ N(N – 1) / 2
iv ➥ N(N + 1) / 2

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q30➡ |
Optical fiber uses reflection to guide light through a channel, in which angle of incidence is __ the critical angle.
i ➥ equal to
ii ➥ less than
iii ➥ greater than
iv ➥ less than or equal to

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q31➡ |
The number of strings of length 4 that are generated by the regular expression (0|∈)1 + 2* (3|∈), where | is an alternation character, {+, *} are quantification characters, and ∈ is the null string, is :
i ➥ 08
ii ➥ 10
iii ➥ 11
iv ➥ 12

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q32➡ |
The content of the accumulator after the execution of the following 8085 assembly language program, is: MVI A, 42H MVI B, 05H UGC: ADD B DCR B JNZ UGC ADI 25H HLT
i ➥ 82 H
ii ➥ 78 H
iii ➥ 76 H
iv ➥ 47 H

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q33➡ |
In ______, the bodies of the two loops are merged together to form a single loop provided that they do not make any references to each other.
i ➥ Loop unrolling
ii ➥ Strength reduction
iii ➥ Loop concatenation
iv ➥ Loop jamming

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q34➡ |
Which of the following is not typically a benefit of dynamic linking?
I. Reduction in overall program execution time.
II. Reduction in overall space consumption in memory.
III. Reduction in overall space consumption on disk.
IV. Reduction in the cost of software updates.
i ➥ I and IV
ii ➥ I only
iii ➥ II and III
iv ➥ IV only

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q35➡ |
Which of the following is FALSE?
i ➥ The grammar S → a Sb |bSa|SS|∈, where S is the only non-terminal symbol and ∈ is the null string, is ambiguous.
ii ➥ SLR is powerful than LALR.
iii ➥ An LL(1) parser is a top-down parser.
iv ➥ YACC tool is an LALR(1) parser generator.

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q36➡ |
Consider the reference string
0 1 2 3 0 1 4 0 1 2 3 4
If FIFO page replacement algorithm is used, then the number of page faults with three page frames and four page frames are and ______ respectively.
i ➥ 10, 9
ii ➥ 9, 9
iii ➥ 10, 10
iv ➥ 9, 10

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q37➡ |
Suppose there are four processes in execution with 12 instances of a Resource R in a system. The maximum need of each process and current allocation are given below:

With reference to current allocation, is system safe ? If so, what is the safe sequence ?
i ➥ No
ii ➥ Yes, P 1 P 2 P 3 P 4
iii ➥ Yes, P 4 P 3 P 1 P 2
iv ➥ Yes, P 2 P 1 P 3 P 4

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q38➡ |
If the Disk head is located initially at track 32, find the number of disk moves required with FCFS scheduling criteria if the disk queue of I/O blocks requests are: 98, 37, 14, 124, 65, 67
i ➥ 320
ii ➥ 322
iii ➥ 321
iv ➥ 319

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q39➡ |
In UNIX, _________ creates three subdirectories : ‘PIS’ and two subdirectories ‘progs’ and ‘data’ from just created subdirectory ‘PIS’.
i ➥ mkdir PIS/progs PIS/data PIS
ii ➥ mkdir PIS progs data
iii ➥ mkdir PIS PIS/progs PIS/data
iv ➥ mkdir PIS/progs data

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q40➡ |
A scheduling Algorithm assigns priority proportional to the waiting time of a process. Every process starts with priority zero (lowest priority). The scheduler reevaluates the process priority for every ‘T’ time units and decides next process to be scheduled. If the process have no I/O operations and all arrive at time zero, then the scheduler implements ________ criteria.
i ➥ Priority scheduling
ii ➥ Round Robin Scheduling
iii ➥ Shortest Job First
iv ➥ FCFS

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q41➡ |
If S 1 is total number of modules defined in the program architecture, S 3 is the number of modules whose correct function depends on prior processing then the number of modules not dependent on prior processing is :
i ➥ 1 + (S 3 / S 1 )
ii ➥ 1 – (S 3 / S 1 )
iii ➥ 1 + (S 1 / S 3 )
iv ➥ 1 – (S 1 / S 3 )

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q42➡ |
The _______model is preferred for software development when the requirements are not clear.
i ➥ Rapid Application Development
ii ➥ Rational Unified Process
iii ➥ Evolutionary Model
iv ➥ Waterfall Model

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q43➡ |
Which of the following is not included in waterfall model?
i ➥ Requirement analysis
ii ➥ Risk analysis
iii ➥ Design
iv ➥ Coding

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q44➡ |
The cyclomatic complexity of a flow graph V(G), in terms of predicate nodes is: [Where P is number of predicate nodes in flow graph V(G).]
i ➥ P+1
ii ➥ P-1
iii ➥ P-2
iv ➥ P+2

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q45➡ |
The extent to which a software tolerates the unexpected problems, is termed as:
i ➥ Accuracy
ii ➥ Reliability
iii ➥ Correctness
iv ➥ Robustness

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q46➡ |
An attacker sits between customer and Banker, and captures the information from the customer and retransmits to the banker by altering the information. This attack is called as ___________.
i ➥ Masquerade Attack
ii ➥ Replay Attack
iii ➥ Passive Attack
iv ➥ Denial of Service Attack

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q47➡ |
Consider the following two statements :
(A) Business intelligence and Data warehousing is used for forecasting and Data mining.
(B) Business intelligence and Data warehousing is used for analysis of large volumes of sales data.
Which one of the following options is correct ?
i ➥ (A) is true, (B) is false.
ii ➥ Both (A) and (B) are true.
iii ➥ (A) is false, (B) is true.
iv ➥ Both (A) and (B) are false.

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q48➡ |
Pipelining improves performance by:
i ➥ decreasing instruction latency
ii ➥ eliminating data hazards
iii ➥ exploiting instruction level parallelism
iv ➥ decreasing the cache miss rate

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q49➡ |
Consider the following two statements :
(A) Data scrubling is a process to upgrade the quality of data, before it is moved into Data warehouse.
(B) Data scrubling is a process of rejecting data from data warehouse to create indexes.
Which one of the following options is correct ?
i ➥ (A) is true, (B) is false.
ii ➥ (A) is false, (B) is true.
iii ➥ Both (A) and (B) are false.
iv ➥ Both (A) and (B) are true.

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q50➡ |
Given the following statements:
(A) Strategic value of data mining is timestamping.
(B) Information collection is an expensive process in building an expert system.
Which of the following options is correct?
i ➥ Both (A) and (B) are false.
ii ➥ Both (A) and (B) are true.
iii ➥ (A) is true, (B) is false.
iv ➥ (A) is false, (B) is true.

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

error: Content is protected !!
Open chat
1
Hi,how Can We Help You ?
Exit mobile version