## Exam-GK-MCQ-Questions.Com

Home - Ugc Net Computer Science - Previous Year Solved Papers - UGC NET COMPUTER SCIENCE SOLVED PAPERS 2014-16 - UGC NET Computer Science Paper 2 August 2016

# UGC NET COMPUTER SCIENCE SOLVED PAPERS 2014-16 - UGC NET Computer Science Paper 2 August 2016 Online Exam Quiz

Important questions about UGC NET COMPUTER SCIENCE SOLVED PAPERS 2014-16 - UGC NET Computer Science Paper 2 August 2016. UGC NET COMPUTER SCIENCE SOLVED PAPERS 2014-16 - UGC NET Computer Science Paper 2 August 2016 MCQ questions with answers. UGC NET COMPUTER SCIENCE SOLVED PAPERS 2014-16 - UGC NET Computer Science Paper 2 August 2016 exam questions and answers for students and interviews.

Options

A : q

B : p ∧ r

C : p ∨ q

D : p

### 2. Let us assume that you construct ordered tree to represent the compound proposition (~ (p ∧ q)) ↔ (~ p ∨ ~ q). Then, the prefix expression and post-fix expression determined using this ordered tree are pgiven as ____ and _____ respectively.

Options

A : ↔~∧pq∨ ~ ~ pq, pq∧~p~q~∨↔

B : ↔~∧pq∨ ~ p~q, pq∧~p~q~∨↔

C : ↔~∧pq∨ ~ ~ pq, pq∧~p~~q∨↔

D : ↔~∧pq∨ ~ p~ q, pq∧~p~ ~q∨↔

### 3. Let A and B be sets in a finite universal set U. Given the following: |A – B|, |A ⊕ B|, |A| + |B| and |A ∪ B| Which of the following is in order of increasing size ?

Options

A : |A – B| < |A ⊕ B| < |A| + |B| < |A ∪ B|

B : |A ⊕ B| < |A – B| < |A ∪ B| < |A| + |B|

C : |A ⊕ B| < |A| + |B| < |A – B| < |A ∪ B|

D : |A – B| < |A ⊕ B| < |A ∪ B| < |A| + |B|

Options

A : 1/64

B : 1/32

C : 1/8

D : 1/4

### 5. Given the following graphs: Which of the following is correct?

Options

A : G 1 contains Euler circuit and G 2 does not contain Euler circuit.

B : G 1 does not contain Euler circuit and G 2 contains Euler circuit.

C : Both G 1 and G 2 do not contain Euler circuit.

D : Both G 1 and G 2 contain Euler circuit.

### 46. An attacker sits between the sender and receiver and captures the information and retransmits to the receiver after some time without altering the information. This attack is called as _____.

Options

A : Denial of service attack

B : Masquarade attack

C : Simple attack

D : Complex attack

### 47. _______ is subject oriented, integrated, time variant, nonvolatile collection of data in support of management decisions.

Options

A : Data mining

B : Web mining

C : Data warehouse

D : Database Management System

### 48. In Data mining, classification rules are extracted from _______.

Options

A : Data

B : Information

C : Decision Tree

D : Database

### 49. Discovery of cross sales opportunities is called as _____.

Options

A : Association

B : Visualization

C : Correlation

D : Segmentation

Options

A : STRING

B : COBWEB

C : CORBA

D : OLAD

### 6. The octal number 326.4 is equivalent to

Options

A : (214.2) 10 and (D6.8) 16

B : (212.5) 10 and (D6.8) 16

C : (214.5) 10 and (D6.8) 16

D : (214.5) 10 and (D6.4) 16

### 7. Which of the following is the most efficient to perform arithmetic operations on the numbers?

Options

A : Sign-magnitude

B : 1’s complement

C : 2’s complement

D : 9’s complement

### 8. The Karnaugh map for a Boolean function is given as

Options

A : AB + CD + A`B + AD

B : AB + AC + AD + BCD

C : AB + AD + BC + ACD

D : AB + AC + BC + BCD

### 9. Which of the following logic operations is performed by the following given combinational circuit?

Options

A : EXCLUSIVE-OR

B : EXCLUSIVE-NOR

C : NAND

D : NOR

Options

A : -1

B : 0

C : 1

D : 2

### 12. The following ‘C’ statement : int * f [ ] ( ); declares:

Options

A : A function returning a pointer to an array of integers.

B : Array of functions returning pointers to integers.

C : A function returning an array of pointers to integers.

D : An illegal statement.

### 13. If a function is friend of a class, which one of the following is wrong?

Options

A : A function can only be declared a friend by a class itself.

B : Friend functions are not members of a class, they are associated with it.

C : Friend functions are members of a class.

D : It can have access to all members of the class, even private ones.

### 14. In C++, polymorphism requires:

Options

A : Inheritance only

B : Virtual functions only

C : References only

D : Inheritance, Virtual functions and references

Options

A : 4

B : 3

C : 2

D : 1

Options

A : DDL

B : DML

C : DBA

D : Schema

### Ugc Net Computer Science - Previous Year Solved Papers more Online Exam Quiz

Copyright © 2021
Exam-GK-MCQ-Questions.Com | Contact Us | Privacy Policy | Terms of Use | Sitemap | 0.022215127944946