Tuesday, January 1, 2013

UGC NET COMPUTER SCIENCE AND APPLICATIONS PAPER-II KEY HELD AT DECEMBER 30 2012

SOME SAMPLE COMPUTE SCIENCE  AND APPLICATIONS QUESTIONS WITH KEY OF UGC NET EXAM HELD AT DECEMBER 30 2012

                         PAPER-II

(UGCNET EXAM PAPER KEY,UGCNET DECEMBER 30 KEY,UGCNET COMPUTER SCIENCE KEY 2012,UGC NET COMPUTER SCIENCE AND APPLICATION KEY,UGCNET PAPER-2 KEY,UGCNET DEC 30 KEY, UGCNET PAPER -II KEY,UGC NET KEY RELEASED,UGCNET DECEMBER 30,2012 KEY,FIRST KEY RELEASE OF UGCNET DECEMBER 30 2012,UGCENT KEY RELEASED,UGC NET PAPER1,PAPER 2,PAPER-3,UGCNET COMPUTERS PAPER -3 KEY)



7)THE C LANGUAGE IS -------       ANSWER: CONTEXT SENSITIVE GRAMMAR(B)

8)THE MOBILE APPLICATION PROTOCOL(MAP) TYPICALLY RUNS ON TOP OF WHICH PROTOCOL-------------------------------ANSWER: SS7(SIGNALLING SYSTEM 7)  (C)

11)IN COMPILER DESIGN "REDUCING THE STRENGTH" REFERS TO ------ANSWER:CODE OPTIMIZATION USING CHEAPER MACHINE INSTRUCTIONS(B)

13)WHICH OF THE FOLLOWING IS TRUE?---ANSWER:A RELATION IS  BCNF IS ALWAYS IN 3NF(A)

16)IN WHICH TREE FOR EVERY NODE THE HEIGHT OF ITS LEFT AND RIGHT SUBTREE DIFFER ALMOST BY 1--------------ANSWER: AVL TREE(B)

17)THE DESIGN ISSUE OF DATALINK LAYER IN OSI REFERENCE MODEL IS -----ANSWER: FRAMING(A)

20)THE PROBLEM OF INDEFINITE BLOCKAGE OF LOW-PRIORITY JOBS IN GENERAL PRIORITY SCHEDULING ALGORITHM CAN BE SOLVED USING ----- ANSWER AGING(B)

21)WHICH API IS USED TO DRAW A CIRCLE    ----- ANSWER: CIRCLE(A)(NOT SURE)

26)A HASH FUNCTION F DEFINED AS F(KEY)=KEY MOD 13,WITH LINEAR PROBING IS USED TO INSERT KEYS 55,55,68,91,27,145. WHAT WILL BE THE LOCATION OF 79?....................ANSWER 4(D)

30)WHICH OF THE FOLLOWING MEMORY ALLOCATION SUFFERS FROM EXTERNAL FRAGMENTATION?........................... ANSWER:  SEGMENTATION(A)


35)WHICH OF THE FOLLOWING IS THE MOST POWERFUL PARSING METHOD?
ANSWER: CANONICAL LR(B)

36)IN UNIX WHICH OF THE FOLLOWING IS COMMAND IS USED TO SET THE TASK PRIORITY?...................ANSWER NICE(B)

39)MATCH THE FOLLOWING WITH RESPECT TO C++ DATATYPES:

A.USER DEFINED TYPE     1  QUALIFIER
B BUILT IN TYPE                2 UNION
C DERIVED TYPE               3  VOID
D LONG DOUBLE               4 POINTER
......................................
ANSWER:     A-2,B-3,C-4,D-1    (1)

40)GIVEN AN EMPTY STACK,AFTER PERFORMING PUSH(1),PUSH(2),POP,PUSH(3),POP,POP,PUSH(5),POP, WHAT IS THE VALUE OF THE TOP OF STACK...................ANSWER: 1(D)

42)WHICH OF THE FOLLOWING MODE DECLARATION IS USED IN C++ TO OPEN FILE FOR INPUT?....................ANSWER:  IOS::IN(D)

43)DATA ENCRYPTION TECHNIQUES ARE PARTICULARLY ARE USED FOR ............ANSWER: PROTECTING DATA IN DATA COMMUNICATION SYSTEM(A)

49)IDENTIFY THE OPERATION WHICH IS COMMUTATIVE BUT NOT ASSOCIATIVE?...
ANSWER: NAND (D)