Exam-GK-MCQ-Questions.Com

Home - Ugc Net Computer Science - Previous Year Solved Papers - UGC NET COMPUTER SCIENCE SOLVED PAPERS 2014-16 - UGC NET Computer Science Paper 2 August 2016

UGC NET COMPUTER SCIENCE SOLVED PAPERS 2014-16 - UGC NET Computer Science Paper 2 August 2016 Online Exam Quiz

Important questions about UGC NET COMPUTER SCIENCE SOLVED PAPERS 2014-16 - UGC NET Computer Science Paper 2 August 2016. UGC NET COMPUTER SCIENCE SOLVED PAPERS 2014-16 - UGC NET Computer Science Paper 2 August 2016 MCQ questions with answers. UGC NET COMPUTER SCIENCE SOLVED PAPERS 2014-16 - UGC NET Computer Science Paper 2 August 2016 exam questions and answers for students and interviews.

Options

A : q

B : p ∧ r

C : p ∨ q

D : p

2. Let us assume that you construct ordered tree to represent the compound proposition (~ (p ∧ q)) ↔ (~ p ∨ ~ q). Then, the prefix expression and post-fix expression determined using this ordered tree are pgiven as ____ and _____ respectively.

Options

A : ↔~∧pq∨ ~ ~ pq, pq∧~p~q~∨↔

B : ↔~∧pq∨ ~ p~q, pq∧~p~q~∨↔

C : ↔~∧pq∨ ~ ~ pq, pq∧~p~~q∨↔

D : ↔~∧pq∨ ~ p~ q, pq∧~p~ ~q∨↔

3. Let A and B be sets in a finite universal set U. Given the following: |A – B|, |A ⊕ B|, |A| + |B| and |A ∪ B| Which of the following is in order of increasing size ?

Options

A : |A – B| < |A ⊕ B| < |A| + |B| < |A ∪ B|

B : |A ⊕ B| < |A – B| < |A ∪ B| < |A| + |B|

C : |A ⊕ B| < |A| + |B| < |A – B| < |A ∪ B|

D : |A – B| < |A ⊕ B| < |A ∪ B| < |A| + |B|

Options

A : 1/64

B : 1/32

C : 1/8

D : 1/4

5. Given the following graphs: Which of the following is correct?

Options

A : G 1 contains Euler circuit and G 2 does not contain Euler circuit.

B : G 1 does not contain Euler circuit and G 2 contains Euler circuit.

C : Both G 1 and G 2 do not contain Euler circuit.

D : Both G 1 and G 2 contain Euler circuit.

46. An attacker sits between the sender and receiver and captures the information and retransmits to the receiver after some time without altering the information. This attack is called as _____.

Options

A : Denial of service attack

C : Simple attack

D : Complex attack

47. _______ is subject oriented, integrated, time variant, nonvolatile collection of data in support of management decisions.

Options

A : Data mining

B : Web mining

C : Data warehouse

D : Database Management System

48. In Data mining, classification rules are extracted from _______.

Options

A : Data

B : Information

C : Decision Tree

D : Database

49. Discovery of cross sales opportunities is called as _____.

Options

A : Association

B : Visualization

C : Correlation

D : Segmentation

Options

A : STRING

B : COBWEB

C : CORBA

6. The octal number 326.4 is equivalent to

Options

A : (214.2) 10 and (D6.8) 16

B : (212.5) 10 and (D6.8) 16

C : (214.5) 10 and (D6.8) 16

D : (214.5) 10 and (D6.4) 16

7. Which of the following is the most efficient to perform arithmetic operations on the numbers?

Options

A : Sign-magnitude

B : 1’s complement

C : 2’s complement

D : 9’s complement

8. The Karnaugh map for a Boolean function is given as

Options

A : AB + CD + A`B + AD

B : AB + AC + AD + BCD

C : AB + AD + BC + ACD

D : AB + AC + BC + BCD

9. Which of the following logic operations is performed by the following given combinational circuit?

Options

A : EXCLUSIVE-OR

B : EXCLUSIVE-NOR

C : NAND

D : NOR

Options

A : -1

B : 0

C : 1

D : 2

12. The following ‘C’ statement : int * f [ ] ( ); declares:

Options

A : A function returning a pointer to an array of integers.

B : Array of functions returning pointers to integers.

C : A function returning an array of pointers to integers.

D : An illegal statement.

13. If a function is friend of a class, which one of the following is wrong?

Options

A : A function can only be declared a friend by a class itself.

B : Friend functions are not members of a class, they are associated with it.

C : Friend functions are members of a class.

D : It can have access to all members of the class, even private ones.

14. In C++, polymorphism requires:

Options

A : Inheritance only

B : Virtual functions only

C : References only

D : Inheritance, Virtual functions and references

Options

A : 4

B : 3

C : 2

D : 1

Options

A : DDL

B : DML

C : DBA

D : Schema