Home - Ugc Net Computer Science - Previous Year Solved Papers - UGC NET COMPUTER SCIENCE SOLVED PAPERS 2014-16 - UGC NET Computer Science Paper 2 JULY 2016

UGC NET COMPUTER SCIENCE SOLVED PAPERS 2014-16 - UGC NET Computer Science Paper 2 JULY 2016 Online Exam Quiz

Important questions about UGC NET COMPUTER SCIENCE SOLVED PAPERS 2014-16 - UGC NET Computer Science Paper 2 JULY 2016. UGC NET COMPUTER SCIENCE SOLVED PAPERS 2014-16 - UGC NET Computer Science Paper 2 JULY 2016 MCQ questions with answers. UGC NET COMPUTER SCIENCE SOLVED PAPERS 2014-16 - UGC NET Computer Science Paper 2 JULY 2016 exam questions and answers for students and interviews.

1. How many different equivalence relations with exactly three different equivalence classes are there on a set with five elements?

Options

A : 10

B : 15

C : 25

D : 30

2. The number of different spanning trees in complete graph, K 4 and bipartite graph, K 2,2 have ______ and _______ respectively.

Options

A : 14, 14

B : 16, 14

C : 16, 4

D : 14, 4

3. Suppose that R 1 and R 2 are reflexive relations on a set A. Which of the following statements is correct ?

Options

A : R 1 ∩ R 2 is reflexive and R 1 ∪ R 2 is irreflexive.

B : R 1 ∩ R 2 is irreflexive and R 1 ∪ R 2 is reflexive.

C : Both R 1 ∩ R 2 and R 1 ∪ R 2 are reflexive.

D : Both R 1 ∩ R 2 and R 1 ∪ R 2 are irreflexive.

4. There are three cards in a box. Both sides of one card are black, both sides of one card are red, and the third card has one black side and one red side. We pick a card at random and observe only one side. What is the probability that the opposite side is the same colour as the one side we observed?

Options

A : 3/4

B : 2/3

C : 1/2

D : 1/3

5. A clique in a simple undirected graph is a complete subgraph that is not contained in any larger complete subgraph. How many cliques are there in the graph shown below?

Options

A : 2

B : 4

C : 5

D : 6

46. An attacker sits between customer and Banker, and captures the information from thecustomer and retransmits to the banker by altering the information. This attack is called as ______.

Options

A : Masquerade Attack

B : Replay Attack

C : Passive Attack

D : Denial of Service Attack

47. Consider the following two statements : (A) Business intelligence and Data warehousing is used for forecasting and Data mining. (B) Business intelligence and Data warehousing is used for analysis of large volumes of sales data. Which one of the following options is correct ?

Options

A : (A) is true, (B) is false.

B : Both (A) and (B) are true.

C : (A) is false, (B) is true.

D : Both (A) and (B) are false.

48. Pipelining improves performance by:

Options

A : decreasing instruction latency

B : eliminating data hazards

C : exploiting instruction level parallelism

D : decreasing the cache miss rate

49. Consider the following two statements: (A) Data scrubbing is a process to upgrade the quality of data before it is moved into Data warehouse. (B) Data scrubbing is a process of rejecting data from data warehouse to create indexes. Which one of the following options is correct?

Options

A : (A) is true, (B) is false.

B : (A) is false, (B) is true.

C : (A) is false, (B) is true.

D : Both (A) and (B) are true.

50. Given the following statements: (A) The Strategic value of data mining is timestamping. (B) Information collection is an expensive process in building an expert system. Which of the following options is correct?

Options

A : Both (A) and (B) are false.

B : Both (A) and (B) are true.

C : (A) is true, (B) is false.

D : (A) is false, (B) is true.

6. Which of the following logic expressions is incorrect?

Options

A : 1 ⊕ 0 = 1

B : 1 ⊕ 1 ⊕ 1 = 1

C : 1 ⊕ 1 ⊕ 0 = 1

D : 1 ⊕ 1 = 0

7. The IEEE-754 double-precision format to represent floating point numbers, has a length of _____ bits.

Options

A : 16

B : 32

C : 48

D : 64

8. Simplified Boolean equation for the following truth table is:

Options

A : F=yz'+ y'z

B : F=xy'+x'y

C : F=x'z+xz'

D : F=x'z+xz'+xyz

9. The simplified form of a Boolean equation(­­­­­­­­AB­'+AB­'C+AC) (A­'C­'+B­') is :

Options

A : AB­'

B : AB­'C

C : A'B

D : ABC

10. In a positive-edge-triggered JK flip-flop, if J and K both are high then the output will be _____ on the rising edge of the clock.

Options

A : No change

B : Set

C : Reset

D : Toggle

11. Given i = 0, j = 1, k = –1 x = 0.5, y = 0.0 What is the output of the following expression in C language ? x * y < i + j || k

Options

A : -1

B : 0

C : 1

D : 2

12. The following statement in ‘C’ int (*f())[ ]; declares

Options

A : a function returning a pointer to an array of integers.

B : a function returning an array of pointers to integers.

C : array of functions returning pointers to integers.

D : an illegal statement.

13. Which one of the following is correct, when a class grants friend status to another class?

Options

A : The member functions of the class generating friendship can access the members of the friend class.

B : All member functions of the class granted friendship have unrestricted access to the members of the class granting the friendship.

C : Class friendship is reciprocal to each other.

D : There is no such concept.

14. When a method in a subclass has the same name and type signatures as a method in the superclass, then the method in the subclass _____ the method in the superclass

Options

A : Overloads

B : Friendships

C : Inherits

D : Overrides

15. What is the value returned by the function f given below when n = 100? int f (int n) { if (n = = 0) then return n; else return n + f(n-2); }

Options

A : 2550

B : 2556

C : 5220

D : 5520

Ugc Net Computer Science - Previous Year Solved Papers more Online Exam Quiz

Copyright © 2021
Exam-GK-MCQ-Questions.Com | Contact Us | Privacy Policy | Terms of Use | Sitemap | 0.020289897918701