UGC NTA NET JANUARY II 2017

UGC NTA NET JANUARY II 2017

Q1➡ | Engineering Mathematics
Consider a sequence F 00 defined as : F00 (0) = 1, F00 (1) = 1
F00 (n) = ((10 ∗ F00 (n – 1) + 100)/ F00 (n – 2)) for n ≥ 2
Then what shall be the set of values of the sequence F00 ?
i ➥ (1, 110, 1200)
ii ➥ (1, 110, 600, 1200)
iii ➥ (1, 2, 55, 110, 600, 1200)
iv ➥ (1, 55, 110, 600, 1200)

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeCombinatoricsHelp-Line

Q2➡ | Engineering Mathematics
Match the following :
Ugcnet_jan2017_que_5_Ambiguous_Capable-of-more-than-one-interpretation-or-meaning..png
i ➥ a-i, b-ii, c-iii, d-iv
ii ➥ a-i, b-iii, c-iv, d-ii
iii ➥ a-ii, b-iii, c-iv, d-i
iv ➥ a-ii, b-ii, c-iii, d-iv

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubePropositional LogicHelp-Line

Q3➡ | Engineering Mathematics
The functions mapping R into R are defined as : f(x) = x3 – 4x, g(x) = 1/(x 2 + 1) and h(x) = x4 . Then find the value of the following composite functions : hog(x) and hogof(x)
i ➥ (x2 + 1)4 and [(x3 – 4x)2 + 1]4
ii ➥ (x2 + 1)4 and [(x3 – 4x)2 + 1]-4
iii ➥ (x2 + 1)-4 and [(x3 – 4x)2 + 1]4
iv ➥ (x2 + 1)-4 and [(x3 – 4x)2 + 1]-4

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q4➡ | Engineering Mathematics
How many multiples of 6 are there between the following pairs of numbers ?
0 and 100 and –6 and 34
i ➥ 16 and 6
ii ➥ 17 and 6
iii ➥ 17 and 7
iv ➥ 16 and 7

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeCombinatorics Help-Line

Q5➡ | Engineering Mathematics
Consider a Hamiltonian Graph G with no loops or parallel edges and with |V(G)| = n ≥ 3. Then which of the following is true ?
i ➥ deg(v) ≥n/2 for each vertex v.
ii ➥ |E(G)| ≥1/2(n – 1) (n – 2) + 2
iii ➥ deg (v) + deg(w) ≥ n whenever v and w are not connected by an edge
iv ➥ All of the above

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeGraph Theory Help-Line

Q6➡ | Engineering Mathematics
In propositional logic if (P → Q) ∧ (R → S) and (P ∨ R) are two premises such that

Y is the premise:
i ➥ P ∨ R
ii ➥ P ∨ S
iii ➥ Q ∨ R
iv ➥ Q ∨ S

Show Answer With Best Explanation

Answer: None of the above
Explanation: Upload Soon

More DiscussionExplanation On YouTubePropositional LogicHelp-Line

Q7➡ | Digital Logic Design
ECL is the fastest of all logic families. High speed in ECL is possible because transistors are used in difference amplifier configuration, in which they are never driven into __.
i ➥ Race condition
ii ➥ Saturation
iii ➥ Delay
iv ➥ High impedance

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeSequential Circuits Help-Line

Q8➡ | Digital Logic Design
A binary 3 bit down counter uses J-K flip-flops, FFi with inputs Ji , Ki and outputs Qi , i=0,1,2 respectively. The minimized expression for the input from following, is
I. J0 = K0 = 0
II. J0 = K0 = 1
III. J1 = K1 = Q0
IV. J1 = K1 =Q’0
V. J2 = K2 = Q1 Q0
VI. J2 = K2 = Q’1 Q’0
i ➥ I,III,V
ii ➥ I,IV,VI
iii ➥ II,III,V
iv ➥ II,IV,VI

Show Answer With Best Explanation

Answer: IV
Explanation: Upload soon

More DiscussionExplanation On YouTube Sequential Circuits Help-Line

Q9➡ | Digital Logic Design
Convert the octal number 0.4051 into its equivalent decimal number.
i ➥ 0.5100098
ii ➥ 0.2096
iii ➥ 0.52
iv ➥ 0.4192

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeNumber System Help-Line

Q10➡ | Digital Logic Design
The hexadecimal equivalent of the octal number 2357 is :
i ➥ 2EE
ii ➥ 2FF
iii ➥ 4EF
iv ➥ 4FE

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeNumber System Help-Line

Q11➡ | Programming
Which of the following cannot be passed to a function in C++ ?
i ➥ Constant
ii ➥ Structure
iii ➥ Array
iv ➥ Header file

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeFunction Help-Line

Q12➡ | Programming
Which one of the following is correct for overloaded functions in C++ ?
i ➥ Compiler sets up a separate function for every definition of function.
ii ➥ Compiler does not set up a separate function for every definition of function.
iii ➥ Overloaded functions cannot handle different types of objects.
iv ➥ Overloaded functions cannot have same number of arguments.

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeFunction Help-Line

Q13➡ | Programming
Which of the following storage classes have global visibility in C/C++ ?
i ➥ Auto
ii ➥ Extern
iii ➥ Static
iv ➥ Register

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeStorage Classes Help-Line

Q14➡ | Programming
Which of the following operators cannot be overloaded in C/C++ ?
i ➥ Bitwise right shift assignment
ii ➥ Address of
iii ➥ Indirection
iv ➥ Structure reference

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeOperator OverloadHelp-Line

Q15➡ | Digital Logic Design
If X is a binary number which is power of 2, then the value of X & (X – 1) is :
i ➥ 11….11
ii ➥ 00…..00
iii ➥ 100…..0
iv ➥ 000……1

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeNumber System Help-Line

Q16➡ | Database Management System
An attribute A of data type varchar (20) has value ‘Ram’ and the attribute B of data type char (20) has value ‘Sita’ in oracle. The attribute A has memory spaces and B has memory spaces.
i ➥ 20,20
ii ➥ 3,20
iii ➥ 3,4
iv ➥ 20,4

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeSQL Help-Line

Q17➡ | Database Management System
Integrity constraints ensure that changes made to the database by authorized users do not result into loss of data consistency. Which of the following statement(s) is (are) true w.r.t. the examples of integrity constraints ?
(A) An instructor Id. No. cannot be null, provided Instructor Id No. being primary key.
(B) No two citizens have same Adhar-Id.
(C) Budget of a company must be zero.
i ➥ (A), (B) and (C) are true.
ii ➥ (A) false, (B) and (C) are true.
iii ➥ (A) and (B) are true; (C) false.
iv ➥ (A), (B) and (C) are false

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeRelational ConstraintsHelp-Line

Q18➡ | Database Management System
Let M and N be two entities in an E-R diagram with simple single value attributes.
R1 and R2 are two relationship between M and N, where as
R1 is one-to-many and R2 is many-to-many.
The minimum number of tables required to represent M, N, R1 and R2 in the relational model are ________.
i ➥ 4
ii ➥ 6
iii ➥ 7
iv ➥ 3

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeER model Help-Line

Q19➡ | Database Management System
Consider a schema R(MNPQ) and functional dependencies M → N, P → Q. Then the decomposition of R into R1(MN) and R2(PQ) is________.
i ➥ Dependency preserving but not lossless join
ii ➥ Dependency preserving and lossless join
iii ➥ Lossless join but not dependency preserving
iv ➥ Neither dependency preserving nor lossless join.

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeNormalization Help-Line

Q20➡ | Database Management System
The order of a leaf node in a B+ tree is the maximum number of children it can have. Suppose that block size is 1 kilobytes, the child pointer takes 7 bytes long and search field value takes 14 bytes long. The order of the leaf node is ____________.
i ➥ 16
ii ➥ 63
iii ➥ 64
iv ➥ 68

Show Answer With Best Explanation

Answer: None of the above
Explanation: Upload Soon

More DiscussionExplanation On YouTubeFile Structure Help-Line

Q21➡ | Data Structure
Which of the following is true for computation time in insertion, deletion and finding maximum and minimum element in a sorted array ?
i ➥ Insertion – 0(1), Deletion – 0(1), Maximum – 0(1), Minimum – 0(l)
ii ➥ Insertion – 0(1), Deletion – 0(1), Maximum – 0(n), Minimum – 0(n)
iii ➥ Insertion – 0(n), Deletion – 0(n), Maximum – 0(1), Minimum – 0(1)
iv ➥ Insertion – 0(n), Deletion – 0(n), Maximum – 0(n), Minimum – 0(n)

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeArrays Help-Line

Q22➡ | Data Structure
The seven elements A, B, C, D, E, F and G are pushed onto a stack in reverse order, i.e., starting from G. The stack is popped five times and each element is inserted into a queue.Two elements are deleted from the queue and pushed back onto the stack. Now, one element is popped from the stack. The popped item is __.
i ➥ A
ii ➥ B
iii ➥ F
iv ➥ G

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeQueues and StacksHelp-Line

Q23➡ | Data Structure
Which of the following is a valid heap ?
i ➥ A
ii ➥ B
iii ➥ C
iv ➥ D

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeHeap Tree Help-Line

Q24➡ | Data Structure
If h is chosen from a universal collection of hash functions and is used to hash n keys into a table of size m, where n ≤ m, the expected number of collisions involving a particular key x is less than _________.
i ➥ 1
ii ➥ 1/n
iii ➥ 1/m
iv ➥ n/m

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeHashing Help-Line

Q25➡ | Data Structure
Which of the following statements is false ?
(A) Optimal binary search tree construction can be performed efficiently using dynamic programming.
(B) Breadth-first search cannot be used to find connected components of a graph.
(C) Given the prefix and postfix walks of a binary tree, the tree cannot be re-constructed uniquely.
(D) Depth-first-search can be used to find the connected components of a graph.
i ➥ A
ii ➥ B
iii ➥ C
iv ➥ D

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeGraph Help-Line

Q26➡ | Computer Network
Match the following Layers and Protocols for a user browsing with SSL :
i ➥ a-(iv), b-(i), c-(ii), d-(iii)
ii ➥ a-(iii), b-(ii), c-(i), d-(iv)
iii ➥ a-(ii), b-(iii), c-(iv), d-(i)
iv ➥ a-(iii), b-(i), c-(iv), d-(ii)

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeProtocols Help-Line

Q27➡ | Computer Network
The maximum size of the data that the application layer can pass on to the TCP layer below is _________.
i ➥ 216 bytes
ii ➥ 216 bytes + TCP header length
iii ➥ 216 bytes – TCP header length
iv ➥ 215 byte.

Show Answer With Best Explanation

Answer: None of the above
Explanation: Upload Soon

More DiscussionExplanation On YouTubeTCP Help-Line

Q28➡ | Computer Network
A packet whose destination is outside the local TCP/IP network segment is sent to _________.
i ➥ File server
ii ➥ DNS server
iii ➥ DHCP server
iv ➥ Default gateway

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeHardware Devices Help-Line

Q29➡ | Computer Network
Distance vector routing algorithm is a dynamic routing algorithm. The routing tables in distance vector routing algorithm are updated _______.
i ➥ Automatically
ii ➥ by server
iii ➥ by exchanging information with neighbour nodes
iv ➥ with backup database

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeRouting Algorithms Help-Line

Q30➡ | Computer Network
In link state routing algorithm after construction of link state packets, new routes are computed using:
i ➥ DES algorithm
ii ➥ Dijkstra’s algorithm
iii ➥ RSA algorithm
iv ➥ Packets

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeRouting Algorithms Help-Line

Q31➡ | Theory of Computation
Which of the following strings would match the regular expression : p+ [3 – 5]∗ [xyz]?
I. p443y
II. p6y
III. 3xyz
IV. p35z
V. p353535x
VI. ppp5
i ➥ I, III and VI only
ii ➥ IV, V and VI only
iii ➥ II, IV and V only
iv ➥ I, IV and V only

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeRegular Language Help-Line

Q32➡ | Computer Architecture
Consider the following assembly language instructions :
mov al, 15
mov ah, 15
xor al, al
mov cl, 3
shr ax, cl
add al, 90H
adc ah, 0
What is the value in ax register after execution of above instructions ?
i ➥ 0270H
ii ➥ 0170H
iii ➥ 01E0H
iv ➥ 0370H

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeMachine Instructions Help-Line

Q33➡ | Theory of Computation, Complier Design
Consider the following statements related to compiler construction :
I. Lexical Analysis is specified by context-free grammars and implemented by pushdown automata.
II. Syntax Analysis is specified by regular expressions and implemented by finite-state machine.
Which of the above statement(s) is/are correct ?
i ➥ Only I
ii ➥ Only II
iii ➥ Both I and II
iv ➥ Neither I nor II

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeRegular and Context free languageHelp-Line

Q34➡ | Computer Architecture
The contents of Register (BL) and Register (AL) of 8085 microprocessor are 49H and 3AH respectively. The contents of AL, the status of carry flag (CF) and sign flag (SF) after executing ‘SUB AL, BL’ assembly language instruction, are
i ➥ AL = 0FH; CF = 1; SF = 1
ii ➥ AL = F0H; CF = 0; SF = 0
iii ➥ AL = F1H; CF = 1; SF = 1
iv ➥ AL = 1FH; CF = 1; SF = 1

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTube Microprocessor Help-Line

Q35➡ | Compiler Design
Which of the following statement(s) regarding a linker software is/are true ?
I A function of a linker is to combine several object modules into a single load module.
II A function of a linker is to replace absolute references in an object module by symbolic references to locations in other modules.
i ➥ Only I
ii ➥ Only II
iii ➥ Both I and II
iv ➥ Neither I nor II

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLinker Help-Line

Q36➡ | Operating System
There are three processes P1 , P2 and P3 sharing a semaphore for synchronizing a variable. Initial value of semaphore is one. Assume that negative value of semaphore tells us how many processes are waiting in queue. Processes access the semaphore in following order :
(a) P2 needs to access
(b) P1 needs to access
(c) P3 needs to access
(d) P2 exits critical section
(e) P1 exits critical section
The final value of semaphore will be :
i ➥ 0
ii ➥ 1
iii ➥ -1
iv ➥ -2

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeProcess SynchronizationHelp-Line

Q37➡ | Computer Architecture
In a paging system, it takes 30 ns to search translation Lookaside Buffer (TLB) and 90 ns to access the main memory. If the TLB hit ratio is 70%, the effective memory access time is :
i ➥ 48ns
ii ➥ 147ns
iii ➥ 120ns
iv ➥ 84ns

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeMemory Hierarchy Help-Line

Q38➡ | Computer Architecture
Match the following w.r.t. Input/Output management :
i ➥ a-iii, b-iv, c-i, d-ii
ii ➥ a-ii, b-i, c-iv, d-iii
iii ➥ a-iv, b-i, c-ii, d-iii
iv ➥ a-i, b-iii, c-iv, d-ii

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q39➡ | Operating System
Which of the following scheduling algorithms may cause starvation ?
a. First-come-first-served
b. Round Robin
c. Priority
d. Shortest process next
e. Shortest remaining time first
i ➥ a, c and e
ii ➥ c, d and e
iii ➥ b, d and e
iv ➥ b, c and d

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeCPU Scheduling Help-Line

Q40➡ | Operating System
Distributed operating systems consist of:
i ➥ Loosely coupled O.S. software on a loosely coupled hardware.
ii ➥ Loosely coupled O.S. software on a tightly coupled hardware.
iii ➥ Tightly coupled O.S. software on a loosely coupled hardware.
iv ➥ Tightly coupled O.S. software on a tightly coupled hardware.

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeDistributed Operating SystemHelp-Line

Q41➡ | Software Engineering
Software Engineering is an engineering discipline that is concerned with:
i ➥ how computer systems work
ii ➥ theories and methods that underlie computers and software systems.
iii ➥ all aspects of software production
iv ➥ all aspects of computer-based systems development, including hardware, software and process engineering.

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeSoftware EngineeringHelp-Line

Q42➡ | Software Engineering
Which of the following is not one of three software product aspects addressed by McCall’s software quality factors ?
i ➥ Ability to undergo change
ii ➥ Adaptability to new environments
iii ➥ Operational characteristics
iv ➥ Production costs and scheduling

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeSoftware Quality Help-Line

Q43➡ | Software Engineering
Which of the following statement(s) is/are true with respect to software architecture ?
S1 : Coupling is a measure of how well the things grouped together in a module belong together logically.
S2 : Cohesion is a measure of the degree of interaction between software modules.
S3 : If coupling is low and cohesion is high then it is easier to change one module without affecting others.
i ➥ Only S1 and S2
ii ➥ Only S3
iii ➥ All of S1, S2 and S3
iv ➥ Only S1

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeCoupling Cohesion Help-Line

Q44➡ | Software Engineering
The prototyping model of software development is:
i ➥ a reasonable approach when requirements are well-defined
ii ➥ a useful approach when a customer cannot define requirements clearly.
iii ➥ the best approach to use for projects with large development teams.
iv ➥ a risky model that rarely produces a meaningful product.

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeSDLC Model Help-Line

Q45➡ | Software Engineering
A software design pattern used to enhance the functionality of an object at run-time is:
i ➥ Adapter
ii ➥ Decorator
iii ➥ Delegation
iv ➥ Proxy

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeSoftware Design Help-Line

Q46➡ | Artificial Intelligence
Match the following:
UGCNET-2017-Jan-Que_46_a.-Affiliate-Marketing-i.-Vendors-ask-partners-to-place-Logos-on-partners-site.-If-customers-click-come-to-vendors-and-buy.
i ➥ a-i, b-ii, c-iii, d-iv
ii ➥ a-i, b-iii, c-ii, d-iv
iii ➥ a-iii, b-ii, c-iv, d-i
iv ➥ a-ii, b-iii, c-i, d-iv

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeMulti agent System Help-Line

Q47➡ | Database Management System
_________ refers loosely to the process of semi-automatically analyzing large databases to find useful patterns.
i ➥ Datamining
ii ➥ Data warehousing
iii ➥ DBMS
iv ➥ Data mirroring

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeDatabase Help-Line

Q48➡ | Computer Network
Which of the following is/are true w.r.t. applications of mobile computing ?
(A) Travelling of salesman
(B) Location awareness services
i ➥ (A) true; (B) false.
ii ➥ Both (A) and (B) are true.
iii ➥ Both (A) and (B) are false.
iv ➥ (A) false; (B) true.

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeMobile Computing Help-Line

Q49➡ | Computer Network
In 3G network, W-CDMA is also known as UMTS. The minimum spectrum allocation required for W-CDMA is _.
i ➥ 2 MHz
ii ➥ 20 KHz
iii ➥ 5 KHz
iv ➥ 5 MHz

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTube3G Network Help-Line

Q50➡ | Database Management System
Which of the following statements is/are true w.r.t. Enterprise Resource Planning (ERP) ?
(A) ERP automates and integrates majority of business processes.
(B) ERP provides access to information in a Real Time Environment.
(C) ERP is inexpensive to implement
i ➥ (A), (B) and (C) are false.
ii ➥ (A) and (B) false; (C) true.
iii ➥ (A) and (B) true; (C) false.
iv ➥ (A) true ; (B) and (C) are false.

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTube Enterprise Resource Planning Help-Line

error: Content is protected !!
Open chat
1
Hi,how Can We Help You ?