📚 Question Bank UGC NET Paper 2: Computer Sc 6th Jan 2025 Shift 1
Tags
100
Questions
13
Subjects
Algorithms 4
Q#QuestionAnswerMarks
Q5 Which of the following is not a divide and conquer method 4 +2.0
Q15 Match the LIST-I with LIST-II LIST - I Algorithm LIST 1 +2.0
Q65 Which one of the following is not related to the feed forward networks on the Backpropagation A 4 +2.0
Q75 Match the LIST-I with LIST-II LIST - I LIST - II 4 +2.0
View all “Algorithms” questions across papers →
Artificial Intelligence 6
Q#QuestionAnswerMarks
Q12 Match the LIST-I with LIST-II LIST - I LIST - II 3 +2.0
Q19 Definition's of ________ organized into following four categories namely, Thinking Humanly, 3 +2.0
Q33 Which of the following is not a component of the classic Planning Definition? 2 +2.0
Q37 What is the correct sequence of steps used by knowledge base designing? A. Ask questions about t 2 +2.0
Q74 The kind of symbols for basic syntactic elements of first-order logic are A. Constant B. Doma 3 +2.0
Q84 Which of the following are correct for the neural network? A. The training time depends upon the 2 +2.0
View all “Artificial Intelligence” questions across papers →
Compiler Design 3
Q#QuestionAnswerMarks
Q22 Y acc  is which of the following parsers? 4 +2.0
Q35 Match the LIST-I with LIST-II LIST - I LIST - II 2 +2.0
Q39 Regarding the code optimization, choose the correct sequence A. Algebraic Simplification B. U 3 +2.0
View all “Compiler Design” questions across papers →
Computer Graphics 3
Q#QuestionAnswerMarks
Q26 The light given off by the phosphor during exposure to the electron beam is known as 1 +2.0
Q59 Arrange the 2-D viewing transformation pipeline. A. Convert world-coordinates to viewing coordin 3 +2.0
Q62 The major adverse side effects of scan conversion are ;- A. Staircase appearance B. Unequal b 2 +2.0
View all “Computer Graphics” questions across papers →
Computer Networks 12
Q#QuestionAnswerMarks
Q8 The network using CSMA/CD has a bandwidth of 20 mbps. If the maximum propagation time is 25μ sec 2 +2.0
Q25 Sequence the following stages of the sliding window protocol for flow control. A. Sender move th 4 +2.0
Q38 Match the LIST-I with LIST-II LIST - I LIST - II 2 +2.0
Q43 Consider a noiseless channel with a bandwidth of 5000Hz transmitting a signal with two signal levels 2 +2.0
Q50 The primary function of firewall in network security is 3 +2.0
Q55 Consider the following statements regarding multiple access techniques & identify the CORRECT o 4 +2.0
Q69 Arrange the following steps of the DHCP (Dynamic Host Control Protocol) process in the correct - se 2 +2.0
Q72 The hamming distance between 10101 and 11110 is 2 +2.0
Q73 Match the LIST-I with LIST-II LIST - I LIST - II 1 +2.0
Q76 Match the LIST-I with LIST-II LIST - I (Process) LIST 3 +2.0
Q86 Which of the following are key features of Mobile Adhoc Networks (MANETs) A. Self-Organizing and 3 +2.0
Q87 Choose the correct statements from the following A. In connection oriented service, the destinat 3 +2.0
View all “Computer Networks” questions across papers →
Computer Organization and Architecture 11
Q#QuestionAnswerMarks
Q4 Arrange the following in the increasing order with respect to access time. A. Solid State Drive 4 +2.0
Q11 Match the LIST-I with LIST-II LIST - I LIST - II 2 +2.0
Q20 Which table for a dynamic pipeline become more interesting when a nonlinear pattern is follows? 1 +2.0
Q28 Which are often needed to evaluate the cache performance? 1 +2.0
Q41 Which of the following do not represent memory reference instruction. A. 2 +2.0
Q45 Consider a pipeline unit for fixed - point multiplication of 8-bit integers. Arrange the following& 2 +2.0
Q46 The entire set of parameters, including return address that is stored for a procedure invocation is 1 +2.0
Q53 Correct the order of instruction cycle: A. Read the effective address B. Fetch the informatio 2 +2.0
Q54 Which of the following is the correct sequence with regard to service routine? A. Save contents 4 +2.0
Q58 Which of the following are not data manipulation instructions? A. Call B. Loud C. And D 2 +2.0
Q61 If the virtual memory size is 32 MB and a physical memory size is 4MB with a page size of 2KB, Calcu 2 +2.0
View all “Computer Organization and Architecture” questions across papers →
DBMS 9
Q#QuestionAnswerMarks
Q7 INSERT command is used to A. add a single tuple to a relation B. add multiple tuples to a rel 3 +2.0
Q16 What will be the right sequence of the phases of database design- A. Physical Design B. Conce 2 +2.0
Q34 In concurrency control, phantom problem may occur, when- 1 +2.0
Q42 Which of the following command can be used to modify data in an SQL Table? A. INSERT B. DELET 4 +2.0
Q44 Which of the following/s is/are FALSE statement? A. An all key relation is always in BCNF since 3 +2.0
Q60 An alternate key in database table is also called 2 +2.0
Q63 Match the LIST-I with LIST-II LIST - I LIST - II 3 +2.0
Q67 Which of the following table contains the primary information in the data warehouse? 2 +2.0
Q83 The degree of a relation in database is 2 +2.0
View all “DBMS” questions across papers →
Digital Logic 3
Q#QuestionAnswerMarks
Q47 Match the LIST-I with LIST-II LIST - I Boolean Algebra Law 1 +2.0
Q51 Which of the following is the simplified form of the given function. f(A, B, C) = ∑m(0, 1, 3 3 +2.0
Q85 Which of the following is the complement of the boolean function. A'B + CD' + A'B + 3 +2.0
View all “Digital Logic” questions across papers →
Engineering Mathematics 10
Q#QuestionAnswerMarks
Q6 Which of the following is the solution of the following recurrence relation T(n) = T(2n/3) + 1? 2 +2.0
Q9 The mathematical notation to describe logical entailment of a scentence "α entails anothe 1 +2.0
Q13 Match the LIST-I with LIST-II: Match the logical equivalence propositions LIST 3 +2.0
Q14 A linear programming problem (LPP) is as follows: Min z = 30x - 18y, subject to the constraints; 1 +2.0
Q31 Which of the following statements are true about the sets. A. 0 EØ B. Ø E {0} 4 +2.0
Q52 Arrange the following graph on the basis of number of edges in increasing order [for n > 3] A 1 +2.0
Q78 If x and y are elements in a group G and if x 5  = y 3  = e, where e is the identity of G, 2 +2.0
Q79 Which one of the following is not a basic solution of system of linear equation x 1  + 2x 2 1 +2.0
Q80 The probability that A hits a target is  \(\frac{1}{4}\) , and the probability that B hits the 4 +2.0
Q89 Which of the following Graph is/are planer? Choose the most appropriate answer from the opt 4 +2.0
View all “Engineering Mathematics” questions across papers →
Operating Systems 9
Q#QuestionAnswerMarks
Q40 Which of the following does not interrupt a running process? 3 +2.0
Q57 Match the LIST-I with LIST-II LIST - I LIST - II 2 +2.0
Q71 Consider the following Graph of disk scheduling and identify the disk scheduling algorithm represen 4 +2.0
Q82 Given the following processes with their times and priority (lower number indicates higher priority 4 +2.0
Q96 📄 Find the average weighted turnaround time for these process using Highest Response Ratio Next (HRN) 2 +2.0
Q97 📄 What is the average turnaround time for these Processes with First Come First Serve (FCFS) schedulin 3 +2.0
Q98 📄 What is the average waiting time for these processes with non-preemptive Shortest Job First (SJF) sc 4 +2.0
Q99 📄 When we apply Shortest Job First (SJF) scheduling Policy/algorithm, Process (P 2 ) faces partial sta 3 +2.0
Q100 📄  Calculate the average response time for these processes with a nonpreemptive priority Scheduling al 1 +2.0
View all “Operating Systems” questions across papers →
Programming and Data Structure 10
Q#QuestionAnswerMarks
Q1 Consider following conditional statements if (m == 20 - 10 || n > 10). The order of execution of 3 +2.0
Q17 Which of the following is not true about Global Variables: 4 +2.0
Q21 Match the LIST-I with LIST-II LIST - I (FUNCTIONS) LI 2 +2.0
Q24 Which of the following description(s) is/are true: A. Red Black Tree - Guarantees worst case of 4 +2.0
Q27 Considering above binary tree, what will be the inorder traversal 1 +2.0
Q29 Which of the following uses only increment operations for adding and removing element at either&nbsp 4 +2.0
Q36 Consider the following statements int x = 10, y = 15; x = ((x = y) ? (y + x) : (y - x)); W 4 +2.0
Q49 Which of the following algorithms are based on the Breadth First Search (BFS)? A. Prim's alg 4 +2.0
Q66 Which of the following statement is not True? 3 +2.0
Q68 Arrange the following steps of the Inorder Traversal of Binary Tree in the correct order. A. Vis 3 +2.0
View all “Programming and Data Structure” questions across papers →
Software Engineering 10
Q#QuestionAnswerMarks
Q2 The characteristics of modern programming are: A. Each module should do only one thing. B. Co 2 +2.0
Q10 Software Testability is simply how easily a software program can be tested. Which one characteristic 3 +2.0
Q18 In Software Engineering Jackson's Principle based on A. Designation B. Definitions C. 1 +2.0
Q23 Match the LIST-I with LIST-II LIST - I (Software Risk) 4 +2.0
Q48 Which one of the following is not the part of requirement management? 4 +2.0
Q56 Find the correct sequence of prototype software development model. A. Start B. Develop Protot 2 +2.0
Q64 Identify the correct statements from the following regarding spiral model. A. Spiral model is an 4 +2.0
Q70 Which one of the following is the correct estimation model based on software equation? 2 +2.0
Q77 Collaborative document inspection technique used for? 1 +2.0
Q90 As per the Software Engineering Institute (SEI), the correct sequence is A. Initial B. Repeat 2 +2.0
View all “Software Engineering” questions across papers →
Theory of Computation 10
Q#QuestionAnswerMarks
Q3 Which of the folowing CFG(s) is/are in chomsky Normal form (All capital letters are variables & 2 +2.0
Q30 Which of the following is TRUE about the Pumping Lemma for regular language? 1 +2.0
Q32 Choose the correct statement(s) A. A problem which is NP-Complete will have the property that it 4 +2.0
Q81 Which of the following represents the output of the transition function(δ) δ(q 0 ,a) 2 +2.0
Q88 Match the LIST-I with LIST-II LIST - I LIST - II 4 +2.0
Q91 📄 For the above specified passage, which of the following is DFA for the language represented/accepete 3 +2.0
Q92 📄 For the above specified passage, which of the following represents the regular expression? 4 +2.0
Q93 📄 For the above mentioned passage which of the following is correct? 3 +2.0
Q94 📄 For the above specified passage, which of the following represent the grammar for the language accep 3 +2.0
Q95 📄 Which of the following represented the minimum state DFA for the above specified passage? 1 +2.0
View all “Theory of Computation” questions across papers →