📚 Question Bank UGC NET Paper 2: Computer Science and Application 26th June 2025 Shift 1
Tags
100
Questions
13
Subjects
Algorithms 4
Q#QuestionAnswerMarks
Q20 When developing a dynamic programming algorithm, the sequence of steps followed is: A. Constr 4 +2.0
Q36 Which of the following algorithms use Greedy strategy? A. Dijkstra's algorithm B. Kr 2 +2.0
Q43 The longest common subsequence of {1,2,3,2,4,1,2} and {2,4,3,1,2,1} is 3 +2.0
Q77 The tight asymptotic bound for the recurrence T(n) = 2T(n / 4) + sqrt(n) is 3 +2.0
View all “Algorithms” questions across papers →
Artificial Intelligence 11
Q#QuestionAnswerMarks
Q5 Given that n refers to learning rate and x_{i} refers to the ith input to the neuron, Which of the 1 +2.0
Q10 Consider the following steps used by a knowledge base designer to represent a world A. Select 1 +2.0
Q12 Considering the following statements: A. Data transformation is involved in Datamining proces 2 +2.0
Q17 Which of the followings is not a valid property over two fuzzy relations 𝑅̃ and 𝑆̃ which must be ob 3 +2.0
Q41 Consider the following table defining the sample inputs and corresponding target values for a perc 1 +2.0
Q51 Consider the following statements regarding Agent systems A. Agent system comprises of an age 1 +2.0
Q54 Consider the following steps involved in the application of Genetic algorithm for a problem A 2 +2.0
Q66 Match List I with List II List I (GA termination criteria) List II (descrip 1 +2.0
Q70 Match List I with List II List I (Operations on Fuzzy Sets) List II (Descri 3 +2.0
Q80 Which of the followings is Not a parent selection technique used in genetic algorithm implementa 1 +2.0
Q84 Consider the following statements regarding STRIPS representation of a Planning problem A. ST 2 +2.0
View all “Artificial Intelligence” questions across papers →
Compiler Design 7
Q#QuestionAnswerMarks
Q57 Arrange the following parsers in increasing order of their power of handling grammars i.e. from th 3 +2.0
Q79 Which of the following Grammars is/are only Context Free?   A)      &nbs 2 +2.0
Q91 📄  What all blocks does Block 3 & Block 5 dominate in the Flow graph for the TAC given in the pas 1 +2.0
Q92 📄 Which of the followings is the correct Flow graph for the TAC given in the passage? 1 +2.0
Q93 📄  What are the various LEADERS (leading statements) for the TAC given in the passage? 4 +2.0
Q94 📄  Which of the following is the Optimized version for the given TAC in the passage 1 +2.0
Q95 📄  Which of the following is the correct High level code for the given TAC in the passage 4 +2.0
View all “Compiler Design” questions across papers →
Computer Graphics 2
Q#QuestionAnswerMarks
Q29 Match List I with List II List I List II A. Oblique Projection 2 +2.0
Q68 Which of the following technique is used for Clipping? 3 +2.0
View all “Computer Graphics” questions across papers →
Computer Networks 11
Q#QuestionAnswerMarks
Q6 Match List I with List II List I List II A. Count to infinity 2 +2.0
Q9 Arrange the steps involved when a user enters a URL in a browser and accesses a website. A. D 4 +2.0
Q38 The packet sent by a node to the source to inform it of congestion is called 3 +2.0
Q50 Which of the following are examples of data encoding schemes? A. Non-Return to Zero (NRZ) 4 +2.0
Q55 Which of the following are controlled-access protocols A. Reservation B. Polling C. 2 +2.0
Q63 In a Stop-and-wait system, the bandwidth of the line is 1 Mbps, and 1 bit takes 30 milliseconds to 3 +2.0
Q67 Which of the following is not the characteristics of packet switching? 3 +2.0
Q71 Arrange the process of virtualization in cloud environments. A. Hypervisor installed on physi 2 +2.0
Q74 CB84000D001C001C is the content of a UDP header in hexadecimal format. The source port number is 1 +2.0
Q78 Match List I with List II List I List II A. Digital Signature 2 +2.0
Q85 Which of the following statements is/are TRUE about encryptions techniques? A. In symmetric k 4 +2.0
View all “Computer Networks” questions across papers →
Computer Organization and Architecture 8
Q#QuestionAnswerMarks
Q7 The right sequence of suboperations that are performed in arithmetic pipeline is- A. Align th 1 +2.0
Q22 The right sequence of CPU program to input data will be: A. Read status register B. Chec 3 +2.0
Q33 The write operation in I/O operation does the following-   2 +2.0
Q53 Which of the followings shows the correct hierarchy of a layered file system in an operating syste 3 +2.0
Q58 The transformation of data from main memory to cache memory is referred as: 3 +2.0
Q73 The computer needs to process each instruction with the following sequence of steps: A. Calcu 3 +2.0
Q75 Consider the following interrupt protection levels in Linux, and arrange them in the increasing or 4 +2.0
Q86 Which of the following statements are true? A. In the write-through policy, only the cache is 3 +2.0
View all “Computer Organization and Architecture” questions across papers →
DBMS 5
Q#QuestionAnswerMarks
Q21 Consider the relation T1(A,B,C,D,E) with the dependencies {EB ->C,D ->E, EA->B} and T2(A, 3 +2.0
Q35 Consider R (A,B,C,D,E) be relation with following dependencies: C->F, E-> A, EC->D, 2 +2.0
Q42 In a relational database, which one of the following is CORRECT: 2 +2.0
Q83 Considering the following statements: A. A non-serial schedule is said to be conflict seriali 3 +2.0
Q87 Consider the following three relations Employee (eid, eName), Comp(cid, cName), Own(eid, cid) 1 +2.0
View all “DBMS” questions across papers →
Digital Logic 4
Q#QuestionAnswerMarks
Q4 Which of the following gates do not give output 1 when both the inputs are 0- A. NAND gate 4 +2.0
Q26 Consider the Boolean expression A(x, y, z) = x (y' z)'. Which of the following is complete 4 +2.0
Q60 Gray code equivalent to decimal number 8 is: 2 +2.0
Q88 Binary equivalent to (AOF) 16 is: 1. 111000111 2. 101001111 3. 101000001111 4. 3 +2.0
View all “Digital Logic” questions across papers →
Engineering Mathematics 8
Q#QuestionAnswerMarks
Q1 In a group of 120 people: 65 eat Rice, 45 eat bread, 42 eat curd, 20 eat both Rice and bread, 25 e 2 +2.0
Q3 Maintaining a graph in memory by means of its adjacency matrix is known as 4 +2.0
Q16 Let P denote "She is intelligent" and let Q denote "She is happy." Given 3 +2.0
Q49 A positive integer selected at random from the set of positive integers not exceeding 200. Which o 2 +2.0
Q52 Let m and n are positive integers. Then (A) If n ≠ 1, then m < mn. (B) If k is com 1 +2.0
Q59 Choose the correct statement for a group G: 1 +2.0
Q65 Match List I with List II List I List II A. If the Indian team 3 +2.0
Q89 In a pack of 42 cards, 3 cards are chosen one after the other. Find the number of ways this can be 3 +2.0
View all “Engineering Mathematics” questions across papers →
Operating Systems 14
Q#QuestionAnswerMarks
Q11 Identify the correct statement(s) from the followings with respect to Spinlock Semaphores A. 1 +2.0
Q13 Match List I with List II List I List II A. Clustered Page Tab 2 +2.0
Q15 Consider the following table about processes, their burst time and arrival time 4 +2.0
Q40 What is the total swap time (Swap in & Swap out) in a system for a 15 MB process with a transf 1 +2.0
Q44 Which of the following statement is correct for Pthreads? 3 +2.0
Q56 Match List I with List II List I List II A. RAID Level 2 1 +2.0
Q62 Once the process is allocated CPU and executing which of the following events could not occur? 4 +2.0
Q76 What shall be the average waiting time per process if we know that 10 processes (on average) arriv 2 +2.0
Q90 Match List I with List II List I List II A. Address Space 1 +2.0
Q96 📄  What will be the total head movement of cylinders for the SSTF disc Scheduling technique? 3 +2.0
Q97 📄  What shall be the 2nd request being processed by SCAN (LEFT) disc Scheduling technique for the alr 3 +2.0
Q98 📄  What shall be the total head movement of cylinders if the FCFS disc scheduling method is used? 3 +2.0
Q99 📄  What shall be the 2nd request being processed by C-LOOK (Right) disc Scheduling technique for the 1 +2.0
Q100 📄  What shall be the total head movement of cylinders for the C-SCAN disc Scheduling technique if the 4 +2.0
View all “Operating Systems” questions across papers →
Programming and Data Structure 13
Q#QuestionAnswerMarks
Q2 Match List I with List II List I List II A. Overloading I 1 +2.0
Q8 The correct sequence of constructing Huffman tree is A. Repeat until root formed B. Crea 3 +2.0
Q14 Which of the following trees are height balanced? A. Binary Search Tree B. AVL Tree 3 +2.0
Q24 Consider the following infix expression Q: ((A+B) *D) ↑ (E-F). The equivalent postfix express 4 +2.0
Q25 What would be the equivalent pointer expression for referring the array element ar[m][n][o] 4 +2.0
Q28 What will be the output of the following C programming code: int i, j;   for(i 1 +2.0
Q31 Match List I with List II List I (Hashing Collison Handling Method) List II 3 +2.0
Q32 What will be the output of the following C Programming code: void main () { int *i, 2 +2.0
Q34 Match List I with List II List I List II A. Circular Queue 2 +2.0
Q39 Only legal pointer operations: A. pointer + number pointer B. pointer - number number 4 +2.0
Q47 Consider the following statements for XML (Extensible Markup Language): A. The number of tags 3 +2.0
Q64 Consider the following piece of C programming code: int x = 128, y = 110 ; do { 2 +2.0
Q72 Consider the operators used in C Programming given below: A. && B. += C. &g 3 +2.0
View all “Programming and Data Structure” questions across papers →
Software Engineering 10
Q#QuestionAnswerMarks
Q18 Estimation of software development effort for organic software in basic COCOMO is 1 +2.0
Q19 Match List I with List II List I (Software Quality Characteristic) List II (De 2 +2.0
Q27 Match List I with List II List I List II A. Equivalence Partit 1 +2.0
Q30 The process followed in order to find difficult, unknown and hidden information about a software s 3 +2.0
Q37 Arrange the following in the increasing order of coupling from lowest coupling to highest coupling 3 +2.0
Q45 Which of the following is not a requirement elicitation Technique 4 +2.0
Q46 Which of the following cohesions are better than the Procedural Cohesion A. Functional Cohesi 2 +2.0
Q69 Which of the followings is NOT a software characteristic? 4 +2.0
Q81 Which of the followings belongs to MaCall's quality factors? A. Maintainability B. U 4 +2.0
Q82 Arrange the following types of testing in the order they are usually performed in the software Devel 2 +2.0
View all “Software Engineering” questions across papers →
Theory of Computation 3
Q#QuestionAnswerMarks
Q23 Consider the following DFA that generates set of strings over ∑={a, b, c)   & 4 +2.0
Q48 Match List I with List II List I List II A. Type 3 Grammar 3 +2.0
Q61 Consider the following DFA     Which of the following NFA is valid for t 4 +2.0
View all “Theory of Computation” questions across papers →