APSET JULY 2012 QUESTION PAPER WITH ANSWER KEY COMPUTER SCIENCE

Recommend US on google

If you like the blog, Please click on recommend us on google button below

Followers

Thursday, June 7, 2012

June 2010


Please download the June 2010 paper Here

Please find the key for June 2010 question paper. Please leave a comment if you find any wrong answers.



 

1
2
3
4
5
6
7
8
9
10

1 to 10 

 

 

D

 

B

C

D

C

B

error

11to20

D

C

A

B

C

A

B

C

C

D

21 to30

D

A

B

 

B

B

B

C

 

A

31 to40 

D

A

D

B

D

C

C

A

B

C

41 to50 

C

B

A

A

C

B

A

A

B

 








Explanation:

1. “x1 is a clone of x” means x1 is identical to x in terms of the physical attributes namely,
 height, weight and complexion. Given, height, weight and complexion only form a
complete set of attributes for an entity, cloning is an equivalence
relation. What is your impression about this statement ?
(A) The statement is true
(B) The statement is false
(C) The truth value of the statement cannot be computed
(D) None of these


2. ‘R is a robot of M’ means R can perform some of the tasks that
otherwise M would do and R is unable to do anything else. Which of
the following is the most appropriate representation to model this situation ?
(A)
(B)
(C)
(D) None of these


3. “My Lafter Machin (MLM)
recognizes the following strings :
(i) a
(ii) aba
(iii) abaabaaba
(iv) abaabaabaabaabaabaabaabaaba
Using this as an information, how would you compare the following regular expressions ?
(i) (aba)3x
(ii) a.(baa)3x–1. ba
(iii) ab.(aab).3x–1.a
(A) (ii) and (iii) are same, (i) is different.
(B) (ii) and (iii) are not same.
(C) (i), (ii) and (iii) are different.
(D) (i), (ii) and (iii) are same.

4. S1 : I teach algorithms and maths.
S2 : My professor teaches maths, electronics and computer science.
S3 : I have a student of maths.
S4 : Algorithm is a part of computer science.
S5 : Maths students know computer science.

What would be the chromatic number of a graph, vertices of which
are the actors/entities that are involved in the sentences S1 to S5
and edges-to represent the associations/relationships amongst the entities/actors as
expressed in the sentences S1 to S5 above ?

(A) 2
(B) 3
(C) 4
(D) None of these


5. Four your ATM debit card, you have a 4-decimal-digit personal secret
code. In the absence of any clue, a brute-force attack takes time-‘t’ to
crack the code on an ATM terminal. Therefore ‘t’ is the secure-time for a
customer to report in case the card is misplaced. Your Bank has decided to
facilitate an increased secure-time. Out of the following, which option
should provide the largest rise in the value of ‘t’ ?

(A) Instead of 4-decimal-digits, maintain the personal secret code in 4-hexadecimal-digits.
(B) Instead of 4-decimal digits, maintain a 5-decimal-digit personal secret code.
(C) Reduce the processing speed of the ATM terminals to the half of their current speed.
(D) None of the above provides any improvement.

6. The logic expression for the output
of the circuit shown in the figure is


7. Advantage of synchronous sequential circuits over asynchronous ones is:


   (D) Better Noise immunity



8. What is the transitive voltage for the voltage input of a CMOS operating from 10V supply ?


(A) 1V (B) 2V
(C) 5V (D) 10 V




9. What is decimal equivalent of BCD 11011.1100 ?


    (B) 22.2


10. The function represented by the kmap

given below is
BC
A
1 0 0 1
1 0 0 1
(A) A × B
(B) AB + BC + CA
(C)
¾¾¾
B Å C
(D) A × B × C


11. The statement print f (“ % d”, 10 ? 0 ? 5 : 1 : 12); will print

(A) 10 (B) 0
(C) 12 (D) 1


12. What will be the output of the following c-code ?

void main ( )
{
char *P = "ayqm" ;
char c;
c = ++*p ;
printf ("%c", c);
}

(A) a (B) c
(C) b (D) q



13. Member of a class specified as _______ are accessible only to method of the class.


    (A) Private


Match the following :
(a) Garbage collection in                                    1. Java
(b) Nameless object                                          2. generic programming
(c) Template support                                         3. defines a class
(d) A forward reference                                    4. member function
(e) Derived class inherits from base class           5. within a statement

Codes :
(a) (b) (c) (d) (e)
(A) 1 5 4 2 3
(B) 1 5 2 3 4
(C) 5 1 2 3 4
(D) 5 4 3 1 2



15. The data type created by the data abstraction process is called


    (C) Abstract data type

16. An entity instance is a single occurrence of an ---------


   (A) Entity

17. Generalization is _______ process.


   (B) Bottom up

18.  Match the following :

I. 2 NF                                      (a) transitive dependencies eliminated
II. 3 NF                                     (b) multivalued attribute  removed
III. 4 NF                                    (c) contain no partial functional dependencies
IV. 5 NF                                    (d) contains no join dependency


(B) I-d, II-a , III-b, IV- c

19. Which data management language component enabled the DBA to define the schema components ?


(C) Schema DLL


20. The PROJECT Command will create new table that has

(A) more fields than the original table
(B) more rows than original table
(C) both (A) & (B)
(D) none of these


21. If we have six stack operationspushing and popping each of A, B and C-such that push
 (A) must occur before push (B) which must occur before push (C), then A, C, B is a possible 
order for the pop operations, since this could be our sequence : 
push (A), pop (A), push (B), push (C), pop (C), pop (B).
 Which one of the following orders could not be the order the pop operations are run, 
if we are to satisfy the requirements described above ?


 (D) CAB

22. What is the most appropriate data structure to implement a priority queue ?


 (A) Heap

23. In a complete binary tree of n nodes, how far are the two most distant nodes ? 
Assume each edge in the path counts as !


(B) About 2 log n


24. A chained hash table has an array size of 100. What is the maximum
number of entries that can be placed in the table ?

(A) 100
(B) 200
(C) 10000
(D) There is no upper limit

25. In a B tree of order 5, the following keys are inserted as follows :
7, 8, 1, 4, 13, 20, 2, 6 and 5 How many elements are present in he root of the tree ?

(A) 1 (B) 2
(C) 3 (D) 4


26. The ______ field is the SNMP PDV reports an error in a response message.


(A) Error Index

27. What does the URL  need to access documents ?


(B) pathname, DNS, Server port number

28. End-to-End connectivity is provided from Last-to-Last in


 (C) Trasnsport Layer



29. What services does the internet layer
provide ?
1. Quality of service
2. Routing
3. Addressing
4. Connection oriented delivery
5. Framing bits


(A) 1, 2, 3 (B) 2, 3, 4
(C) 1, 3, 4, 5 (D) 2, 3, 4, 5


30. What is the maximum operating rate of a wireless LAN using infrared communication ?


 (A) 1mbps

31. In an absolute loading scheme, which loader function is accomplished by a loader ?


 (D) Loading

32. Which of the following expression is represented by the parse tree ?


(A)

33. Consider the following left associative operators in decreasing order of precedence :
 – subtraction (highest precedence)
 *multiplication
 $ exponentiation (lowest precedence)
 What is the result of the following expression ?
  3 – 2 *4 $ | * 2**3


  (D) 4096

34. Which of the following is the most general phase structured grammar ?


  (B) Context - Sensitive


35. Which of the following is used for grouping of characters into tokens
(in a computer) ?

(A) A parser
(B) Code optimizer
(C) Code generator
(D) Scanner


36. Match the following :

(a) Disk scheduling                  1. Round-robin
(b) Batch processing               2. SCAN
(c) Time sharing                      3. LIFO
(d) Interrupt processing           4. FIFO

Codes :
(a) (b) (c) (d)
(A) 3 4 2 1
(B) 4 3 2 1
(C) 2 4 1 3
(D) 1 4 3 2


37. ________ synchronizes critical resources to prevent dead lock.


  (C) Semaphore

38. _______ is one of pre-emptive scheduling algorithm


  (A) RR

39. In order to allow only one process to enter its critical section, binary semaphore are initialized to


 (B) 1

40. Remote Computing Service involves the use of time sharing and _______.
  (C) Batch Processing

41. Software engineering primarily aims on


 (C) reliable and cost effective software

42. Top-down design does not require


  (B) Loop invariants

43. Which model is simplest model in Software Development ?


 (A) Waterfall Model

44. Design phase will usually be


  (A) Top down

45. Applications-software


 (C) performs a specific task for computer users.

46. The cost of the network is usually determined by


  (B) Switching Complexity

47. A leased special high-speed connection from the local telephone carrier for business users that
transmits at 1.544 mb is known as


 (A) T1 carrier

48. CDMA Cell uses ________ carriers of 1.25 MHz.


(A) 9

49. At any given time Parallel Virtual Machine (PVM) has ________ send
buffer and ________ receive buffer


(B) one - two


50. Data Mining uses ________, ________ and ________ to build
effective predictive model.

(i) Data set
(ii) Information set
(iii) Input set
(iv) Process set
(v) Output set
(vi) Test set

(A) (i), (ii) and (iv)
(B) (ii), (iv) and (v)
(C) (i), (v) and (vi)
(D) (ii), (iii) and (v)

----------------------------------------------------------------------------------------------------------
Description:
UGC NET Solved Sample Question Paper, ugc net solved question papers 2008, ugc net guide, ugc net papers, ugc net, ugc india, ugc payscale, ugc 6th pay comission, ugc pay revission, ugc syllabus, ugc exam, ugc result, ugc pay calculator, ugc india, ugc india website, ugc india new pay scale, ugc education, ugc net result, ugc net 2009, ugc net 2008, ugc net result, ugc net question papers, ugc net december 2008, ugc net june 2008 result, ugc net application form, ugc net result, ugc net application, ugc net in computer science, ugc net in india,


tags:


net solved papers computer science, net computer science question paper , ugc net computer science solved papers, free net solved papers computer science, net computer science study material, net computer science books, net computer science syllabus, net solved papers for computer science, net solved papers 2011, net solved papers free download, June 2010 solved paper,apset 2012, apset previous question papers, apset computer science question papers, previous question papers,apset previous question papers,apset previous question papers 2012, apset previous question papers 2011, previous question papers of apset, apset syllabus, apset syllabus 2012, apset syllabus 2012 paper 1, syllabus for apset 2012, apset computer science model papers, apset computer science material, apset syllabus for computer science
-------------------------------------------------------------------------------------------------------------------------------------------------------------------

10 comments:

  1. THANK YOU VERY MUCH SIR.

    ReplyDelete
    Replies
    1. Welcome ... you can find June 2012 question with solutions

      http://netcs2012.blogspot.in/2012/06/net-june-2012-computer-science.html

      will publish questions from finite automata theory soon

      Delete
    2. question no 12 answer would be (c) not (b)

      Delete
    3. question no 10 has no optiion of an error

      Delete
  2. This comment has been removed by the author.

    ReplyDelete
  3. ans to ques 50 is option iv ie information set ,input set and output set

    ReplyDelete
  4. ans to ques 50 is option iv ie information set ,input set and output set

    ReplyDelete
  5. Hello

    Answer for the Q No. 49 will be (A)
    Ref:
    http://public.enst-bretagne.fr/~kermarre/TPDIST/Cours/06-pvm-old.ppt (Slide no. 26)

    ReplyDelete
  6. answer of question 9 is not option B. According to my calculation answer will be 27.75 which is not in the option. So, Sir please reply me how you get this option B as answer. please somebody give me explanation. Thank you.

    ReplyDelete
  7. Q8. how 5V????...wht is d method of calculation of transitive voltage???.....

    ReplyDelete