June 2009
Explanation:
2. In order that a code is 't' error correcting, the minimum hamming distance should be :
(D) 2t+1
4. Characteristic equation of JK Flip-flop is :
(B) Q(n+1)=JQ'+K'Q
5. In order to implement a n variable switching function, a MUX must have :
(A) 2 power n
6. The throughput of pure ALOHA is given by :
(D) Ge power -2g
7. The fiber distributed Data interface uses:
(B) Multimode fibres and LED's
8. To employ multi-access in GSM, users are given different :
(D) frequency bands
9. With a four programs in memory, and with 80% average I/O wait, the CPU utilization is :
(A) 60%
CPU utilization is given by 1-p to power n. Here n=4 and p=80%=0.8.
10. Assume N segments in memory and a page size of P bytes. The wastage on account of internal fragmentation is :
(A) NP/2 bytes
12. The complete graph with four vertices has k edges , where k is :
(D) 6
k=n(n-1)/2
13. The octal equivalent of hexadecimal (A.B) is:
(B)12.54
In hexa decimal A=10 and B=11, now A.B means1010.1011 =>
001 010.101 100 = > 1 2. 5 4 = > 12.54
15. What is the value of 'b' after execution of following code statements:
c = 10;
b = ++c + ++c;
(D) None (bcoz, if a variable comes twice or more in one statement the answer is compiler dependent)
16 Which of the following does not represent a valid storage class in 'C'?
(C) Union
18. DML includes a query language based on both relational algebra and tuple calculus. True
19. Suppose it takes 100ns to access a page table, and 20 ns to access associative memory, with a 90% hit rate, the average access time equals
(B) 28 ns
access time = associative memory * hit ratio + time for main memory (1-hit ratio)
20. There exist a construct which returns a value 'true'if the argument subquery is :
(B) Non - Empty
21. Which construct in SQL is used to test whether a subquery has tuples in its result?
(A) Unique
23. Which two of the following are equivalent for undirected graph G?
(D)
24. In a B tree of order m with p nodes the average number of splits is atmost :
(B) m/2 - 1
26. Queue is a ------- list.
(A) LIFO
28. A binary tree is said to have heap property if the elements along any path :
(D) from root to leaf are non increasing
31. Usually information in a network is achieved by :
(B) Cryptography
33. In which addressing mode the operand is given explicitly in the instruction itself :
(B) Immediate mode
34. A compiler that runs on one machine and produces code for a different machine is called:
(A) Cross compilation
37. Which of the following changes permissions to deny write permission to group and others?
(A) chmod go -w filex
39. Capability maturity model is meant for :
(B) Process
40. In the light of software engineering software consists of :
(D) All (Programs , data and documentation)
41. Which one of the following ISO Stamdard is used for software process?
(C) ISO 9003
42. Which of the following is used for test data generation?
(C) Boundary value Analysis
43.Reverse Engineering is the process which deals with :
(C) Design Recovery
44. The spacing between character pairs is called :
(A) Kerning
46. E-commerce includes :
(D) All (b2b, b2c, c2c)
47. A clustering technique that permits a convenient graphical display is :
(C) Hierarchical Clustering
48. After sending a message,the sender should not be able to , at a later date , deny having sent the message is referred to as:
(B) Non-Repudiability
50.We cannot delete the ------ icon but make it invisible :
(A) Recycle
----------------------------------------------------------------------------------------------------------
Description:
UGC NET Solved Sample Question Paper, ugc net solved question papers 2008, ugc net guide, ugc net papers, ugc net, ugc india, ugc payscale, ugc 6th pay comission, ugc pay revission, ugc syllabus, ugc exam, ugc result, ugc pay calculator, ugc india, ugc india website, ugc india new pay scale, ugc education, ugc net result, ugc net 2009, ugc net 2008, ugc net result, ugc net question papers, ugc net december 2008, ugc net june 2008 result, ugc net application form, ugc net result, ugc net application, ugc net in computer science, ugc net in india,
tags:
net solved papers computer science, net computer science question paper , ugc net computer science solved papers, free net solved papers computer science, net computer science study material, net computer science books, net computer science syllabus, net solved papers for computer science, net solved papers 2011, net solved papers free download, June 2009 solved paper,apset 2012, apset previous question papers, apset computer science question papers, previous question papers,apset previous question papers,apset previous question papers 2012, apset previous question papers 2011, previous question papers of apset, apset syllabus, apset syllabus 2012, apset syllabus 2012 paper 1, syllabus for apset 2012, apset computer science model papers, apset computer science material, apset syllabus for computer science
-------------------------------------------------------------------------------------------------------------------------------------------------------------------
1
|
2
|
3
|
4
|
5
|
6
|
7
|
8
|
9
|
10
|
|
1 to 10
|
D
|
C
|
B
|
C
|
D
|
B
|
B
|
A
|
A
|
|
11 to20
|
A
|
D
|
B
|
C
|
D
|
C
|
C
|
A
|
B
|
B
|
21 to30
|
B
|
B
|
B
|
C
|
D
|
A
|
D
|
C
|
||
31 to40
|
B
|
C
|
B
|
A
|
C
|
C
|
A
|
A
|
B
|
D
|
41 to50
|
B
|
C
|
C
|
A
|
C
|
D
|
C
|
B
|
C
|
A
|
Explanation:
2. In order that a code is 't' error correcting, the minimum hamming distance should be :
(D) 2t+1
4. Characteristic equation of JK Flip-flop is :
(B) Q(n+1)=JQ'+K'Q
5. In order to implement a n variable switching function, a MUX must have :
(A) 2 power n
6. The throughput of pure ALOHA is given by :
(D) Ge power -2g
7. The fiber distributed Data interface uses:
(B) Multimode fibres and LED's
8. To employ multi-access in GSM, users are given different :
(D) frequency bands
9. With a four programs in memory, and with 80% average I/O wait, the CPU utilization is :
(A) 60%
CPU utilization is given by 1-p to power n. Here n=4 and p=80%=0.8.
10. Assume N segments in memory and a page size of P bytes. The wastage on account of internal fragmentation is :
(A) NP/2 bytes
12. The complete graph with four vertices has k edges , where k is :
(D) 6
k=n(n-1)/2
13. The octal equivalent of hexadecimal (A.B) is:
(B)12.54
In hexa decimal A=10 and B=11, now A.B means1010.1011 =>
001 010.101 100 = > 1 2. 5 4 = > 12.54
15. What is the value of 'b' after execution of following code statements:
c = 10;
b = ++c + ++c;
(D) None (bcoz, if a variable comes twice or more in one statement the answer is compiler dependent)
16 Which of the following does not represent a valid storage class in 'C'?
(C) Union
18. DML includes a query language based on both relational algebra and tuple calculus. True
19. Suppose it takes 100ns to access a page table, and 20 ns to access associative memory, with a 90% hit rate, the average access time equals
(B) 28 ns
access time = associative memory * hit ratio + time for main memory (1-hit ratio)
20. There exist a construct which returns a value 'true'if the argument subquery is :
(B) Non - Empty
21. Which construct in SQL is used to test whether a subquery has tuples in its result?
(A) Unique
23. Which two of the following are equivalent for undirected graph G?
(D)
24. In a B tree of order m with p nodes the average number of splits is atmost :
(B) m/2 - 1
26. Queue is a ------- list.
(A) LIFO
28. A binary tree is said to have heap property if the elements along any path :
(D) from root to leaf are non increasing
31. Usually information in a network is achieved by :
(B) Cryptography
33. In which addressing mode the operand is given explicitly in the instruction itself :
(B) Immediate mode
34. A compiler that runs on one machine and produces code for a different machine is called:
(A) Cross compilation
37. Which of the following changes permissions to deny write permission to group and others?
(A) chmod go -w filex
39. Capability maturity model is meant for :
(B) Process
40. In the light of software engineering software consists of :
(D) All (Programs , data and documentation)
41. Which one of the following ISO Stamdard is used for software process?
(C) ISO 9003
42. Which of the following is used for test data generation?
(C) Boundary value Analysis
43.Reverse Engineering is the process which deals with :
(C) Design Recovery
44. The spacing between character pairs is called :
(A) Kerning
46. E-commerce includes :
(D) All (b2b, b2c, c2c)
47. A clustering technique that permits a convenient graphical display is :
(C) Hierarchical Clustering
48. After sending a message,the sender should not be able to , at a later date , deny having sent the message is referred to as:
(B) Non-Repudiability
50.We cannot delete the ------ icon but make it invisible :
(A) Recycle
----------------------------------------------------------------------------------------------------------
Description:
UGC NET Solved Sample Question Paper, ugc net solved question papers 2008, ugc net guide, ugc net papers, ugc net, ugc india, ugc payscale, ugc 6th pay comission, ugc pay revission, ugc syllabus, ugc exam, ugc result, ugc pay calculator, ugc india, ugc india website, ugc india new pay scale, ugc education, ugc net result, ugc net 2009, ugc net 2008, ugc net result, ugc net question papers, ugc net december 2008, ugc net june 2008 result, ugc net application form, ugc net result, ugc net application, ugc net in computer science, ugc net in india,
tags:
net solved papers computer science, net computer science question paper , ugc net computer science solved papers, free net solved papers computer science, net computer science study material, net computer science books, net computer science syllabus, net solved papers for computer science, net solved papers 2011, net solved papers free download, June 2009 solved paper,apset 2012, apset previous question papers, apset computer science question papers, previous question papers,apset previous question papers,apset previous question papers 2012, apset previous question papers 2011, previous question papers of apset, apset syllabus, apset syllabus 2012, apset syllabus 2012 paper 1, syllabus for apset 2012, apset computer science model papers, apset computer science material, apset syllabus for computer science
-------------------------------------------------------------------------------------------------------------------------------------------------------------------
ANSWERS IN TABLE and IN EXPLANATIONS ARE DIFFERENT !!
ReplyDeleteWHY SO?
41 answer is 4-ISO-9000-3
ReplyDeleteQueue is a FIFO list. Please change the answer.
ReplyDelete