📚 Question Bank UGC NET Paper 2: Computer Science 7th Dec 2023 Shift 2
Tags
100
Questions
13
Subjects
Algorithms 5
Q#QuestionAnswerMarks
Q58 Which of the following is not a palindromic subsequence of the string “ababcdabba” ?&nbs 4 +2.0
Q62 Which of the following is TRUE ?  1 +2.0
Q74 Consider the following functions :  f(n) = 3n √n g(n) = \(2^{\Gamma n}\)   4 +2.0
Q75 2-3-4 trees are B - trees of order 4. They are isometric of _____ trees. 4 +2.0
Q78 Which collision resolution technique involves maintaining a linked list of collided keys ?  3 +2.0
View all “Algorithms” questions across papers →
Artificial Intelligence 9
Q#QuestionAnswerMarks
Q4 What is the generic structure of Multi Agent System (MAS) ?  3 +2.0
Q9 Match List-I with List-II List I List II 1 +2.0
Q13 Arrange the following steps in the correct sequence for applying an unsupervised learning technique 1 +2.0
Q14 Match List-I with List-II List I List II 1 +2.0
Q36 In a genetic algorithm optimization problem the fitness function is defined as f(x) = x 2 - 4x + 4 4 +2.0
Q41 In the content of Alpha Beta pruning in game trees which of the following statements are correct re 3 +2.0
Q69 Arrange the following encoding strategies used in Genetic Algorithms (GAS) in the correct sequence 3 +2.0
Q93 In a feed forward neural network with the following specifications: Input layer has 4 neurons, h 1 +2.0
Q94 A ______ point of fuzzy set A is a point x ∈ X at which μA(x) = 0.5  3 +2.0
View all “Artificial Intelligence” questions across papers →
Compiler Design 7
Q#QuestionAnswerMarks
Q8 One of the purposes of using intermediate code in compilers is to : 3 +2.0
Q15 Which of the following symbol table implementation is best suited if access time is to be minimum ?& 3 +2.0
Q71 Which of the following are commonly used parsing techniques in NLP (Natural Language Processing) fo 3 +2.0
Q79 Match List-I with List-II according to input to the compiler phase that process it: 2 +2.0
Q85 Consider a Grammar E → E + n|E x n|n for a sentence n + n x n, the handles in the right-se 4 +2.0
Q96 Three address codes can be represented in special structures known as: (A) Quadruples (B) Tri 2 +2.0
Q100 Arrange the following phases of a compiler as per their order of execution (start to end) (A) Ta 3 +2.0
View all “Compiler Design” questions across papers →
Computer Graphics 3
Q#QuestionAnswerMarks
Q11 Consider a triangle PQR with coordinates as P(0,0), Q(2,2) and R(10,4). If this triangle is to be ma 2 +2.0
Q68 Consider the three points P1(1, 2, 0), P2(3, 6, 20) and P3(2, 4, 6) and a view point C(0, 0, -10). 2 +2.0
Q70 Match List-I with List-II List I  List II 3 +2.0
View all “Computer Graphics” questions across papers →
Computer Networks 12
Q#QuestionAnswerMarks
Q1 Given below are two statements: Statement (I):  In datagram networks - routers hold state 4 +2.0
Q12 Which of the following are example of CSMA channel sensing methods? (A) 1-persistent (B) 2-pe 2 +2.0
Q18 The Hue of a colour is related to its :  4 +2.0
Q23 A multiplexes combines four 100 Kbps channels using a time slot of 2 bits. What is the bit rate ?&nb 3 +2.0
Q37 In “bit stuffing”, each frame begins and ends with a bit pattern in hexadecimal ?  4 +2.0
Q61 Arrange the following steps in the correct order for a DHCP Client to renew its IP lease with a DHC 4 +2.0
Q73 Match List-I with List-II List I List II 1 +2.0
Q84 Which of the following statement/s are CORRECT? (A) NRZ is a bipolar scheme in which the positiv 3 +2.0
Q87 Which of the following statement/s is/are NOT CORRECT? (A) OSPF is based on distance-vector rout 1 +2.0
Q89 The work done by UDP is/are: (A) Congestion control (B) Flow control (C) Retransmission 3 +2.0
Q91 Which of the following is not a field in TCP header ?  3 +2.0
Q98 Hash functions are used to produce the message digests which are then encrypted with a private key t 2 +2.0
View all “Computer Networks” questions across papers →
Computer Organization and Architecture 10
Q#QuestionAnswerMarks
Q2 An Address in main memory is called :  4 +2.0
Q16 Which of the following(s) are main memory? (A) Virtual memory (B) Cache memory (C) RAM 2 +2.0
Q24 Arrange the following levels of interrupt protection within the Linux Kernel, in the order of incre 2 +2.0
Q29 A program that is used by other routines to accomplish a particular task, is called :  4 +2.0
Q32 The interface(s) that provide(s) I/O transfer of data directly to and from the memory unit peripher 3 +2.0
Q34 In most general case, the computer needs to process each instruction with the following sequence of 3 +2.0
Q35 Indexed/grouped allocation is useful as : (A) It supports both sequential and direct access. 4 +2.0
Q38 Which of the following statements is/are NOT CORRECT about NUMA? (A) LOAD and STORE instructions 4 +2.0
Q39 A system bus in which each data item is transferred during a time slice known in advance to both uni 4 +2.0
Q40 Match List-I with List-II List I List II 2 +2.0
View all “Computer Organization and Architecture” questions across papers →
DBMS 9
Q#QuestionAnswerMarks
Q44 Which of the following is/are NOT CORRECT statement? (A) The first record in each block of the d 2 +2.0
Q45 📄 Result of X ⟖  x.s   = y.s Y  is 2 +2.0
Q46 📄 Number of tuples by applying right outer join on relation X and Y is/are :  4 +2.0
Q47 📄 Find the number of tuples by applying the operation X⟕ X.s = y.s Y 3 +2.0
Q48 📄 Number of tuples obtained by applying cartesian product over X and Y are :  1 +2.0
Q49 📄 Which of the following join is used to get all the tuples of relation X and Y with Null values of co 4 +2.0
Q72 Match List-I with List-II List I List II 2 +2.0
Q95 “CREATE TABLE T” in SQL is an example of :  3 +2.0
Q99 Which one of the following statements are CORRECT? (A) Granularity is the size of data item in a 2 +2.0
View all “DBMS” questions across papers →
Digital Logic 3
Q#QuestionAnswerMarks
Q10 Which of the following circuit is used to store one bit of data ?  3 +2.0
Q17 The microoperation which divides a signed binary number by 2 is :   3 +2.0
Q20 Identify the code sequence :  1010 1011 1001 1000 3 +2.0
View all “Digital Logic” questions across papers →
Engineering Mathematics 17
Q#QuestionAnswerMarks
Q3 If universe of disclosure are all real numbers, then which of the following are true? (A) &exist 4 +2.0
Q7 The statement P(x): "x=x 2 ". If the universe of disclosure consists of integers, what ar 3 +2.0
Q22 Given below are two statements: Statement (I): If H is non empty finite subset of a group G an 3 +2.0
Q27 Which of the following are tautology? (A) (P → (P ∧ Q)) → (P → 3 +2.0
Q42 Arrange the following in ascending order: (A) Remainder of 49 16 when divided by 17 (B) Rema 3 +2.0
Q43 If the universe of disclosure is set of integers, then which of the followings are TRUE? (A) &fo 1 +2.0
Q50 Match List-I with List-II List I Propositions List II 2 +2.0
Q51 📄 The dual of the formulated LPP is : 1 +2.0
Q52 📄 Which of the following are quantities (in grams) of food X and Y respectively when the cost of food 2 +2.0
Q53 📄 Which of the following constrains when formulating the LPP ?  4 +2.0
Q54 📄 The minimum cost of food is:   1 +2.0
Q55 📄 The cost funtion of total food is :  3 +2.0
Q56 What is the probability that a positive integer selected at random from the set of positive integer 2 +2.0
Q66 Which of the following statement are truth statements if universe of disclosure is set of integers 4 +2.0
Q77 Match List-I with List-II List I List II 4 +2.0
Q86 Which of the following graphs are trees ?  A.  B.  C.  D.  1 +2.0
Q88 If N 2 = N × N, N is set of natural numbers and R is relation on N 2 , s.t. RC N 2 &nbs 4 +2.0
View all “Engineering Mathematics” questions across papers →
Operating Systems 7
Q#QuestionAnswerMarks
Q21 The head of a moving head disk with 200 tracks, numbered 0 to 199, has just finished a request at tr 2 +2.0
Q28 The average time required to search a storage location in memory and obtain its contents is called : 1 +2.0
Q30 In Linux, where is the user password stored ? 3 +2.0
Q63 Match List-I with List-II List I List II 2 +2.0
Q76 Which of the following statements are CORRECT? (A) A process always check state of currently exe 3 +2.0
Q81 Given below are two statements: Statement (I): A thread is a dispatchable unit of work that do 2 +2.0
Q97 Given as 4 GB (= 4.3 × 10 9 bytes) of virtual space and typical page size of 4 KB and ea 4 +2.0
View all “Operating Systems” questions across papers →
Programming and Data Structure 8
Q#QuestionAnswerMarks
Q5 What is the result of evaluating the postfix expression “43*25* + 8 -” ?  2 +2.0
Q25 What is the output of the following program? #include<stdio.h > int main() { int i=3 3 +2.0
Q31 What is the output of the following program? #include <stdio.h > # define SQR(x) (x*x) 2 +2.0
Q33 Given below are two statements: Statement (I): The friend function and the member functions of 3 +2.0
Q60 Consider the following code segment: int arr[ ] = {0, 1, 2, 3, 4}; int i=1, *ptr; ptr=arr 2 +2.0
Q64 Which data structure is typically used to implement hash table ?  2 +2.0
Q90 Which of the statement are CORRECT? (A) Constructors are invoked automatically when the objects 2 +2.0
Q92 Which of the following statements is TRUE ?  3 +2.0
View all “Programming and Data Structure” questions across papers →
Software Engineering 6
Q#QuestionAnswerMarks
Q6 Given below are two statements: Statement (I) : In Reuse Oriented Model, Modification of the o 3 +2.0
Q59 The selection of Spiral Model based on characteristics of requirements: (A) Are requirements eas 3 +2.0
Q65 Level - 0 DFD is also called as:  3 +2.0
Q67 The prototyping model has the sequence: (A) Customer Evaluation (B) Quick design (C) Requi 3 +2.0
Q80 The steps for analysis and design of object oriented system. (A) Draw interaction diagrams (B 4 +2.0
Q82 Test suite is consist of :  3 +2.0
View all “Software Engineering” questions across papers →
Theory of Computation 4
Q#QuestionAnswerMarks
Q19 Let L={ab, aa, baa}. Which of the following strings are not in L*.  3 +2.0
Q26 Let A= {a, b} and L = A*. Let x = {a n b n , n > 0}. The languages L ∪ X and X are respe 3 +2.0
Q57 The sum of minimum and maximum number of final states for a Deterministic Finite Automata (DFA) 1 +2.0
Q83 Which of the statement is/are CORRECT? (A) Moore and Mealy machines are finite state machines wi 2 +2.0
View all “Theory of Computation” questions across papers →