Wednesday 28 November 2018

NTA UGC-NET Computer Science July 2018 - Paper II

Question 1

1. The definitions in an XML document are said to be __________ when the tagging system and definitions in the DTD are all in compliance.
Options:
  1. (1) well-formed
  2. (2) reasonable
  3. (3) valid
  4. (4) logical
View Question 1 Explanation
Answer : ( 3 )


Question 2

2. Consider the JavaScript Code :

  var y= ’’12”;
  function f( ) {
      var y=’’6”;
      alert (this.y);
      function g( ) {alert (y); }
      g( );
  }
  f( );

If M is the number of alert dialog boxes generated by this JavaScript
code and D1, D2, ....,DM represents the content displayed in each of the M dialog boxes, then :
Options:
  1. (1) M=3; D1 displays ”12”; D2 displays ”6”; D3 displays ”12”.
  2. (2) M=3; D1 displays ”6”; D2 displays ”12”; D3 displays ”6”.
  3. (3) M=2; D1 displays ”6”; D2 displays ”12”.
  4. (4) M=2; D1 displays ”12”; D2 displays ”6”.
View Question 2 Explanation
Answer : ( 4 )


Question 3

3. What is the output of the following JAVA program ?
class simple
{
     public static void main(String[ ] args)
    {
         simple obj = new simple( );
         obj.start( );
    } 
   void start( ){
         long [ ] P= {3, 4, 5};
         long [ ] Q= method (P);
         System.out.print (P[0] + P[1] + P[2]+”:”);
         System.out.print (Q[0] + Q[1] + Q[2]);
   }
   long [ ] method (long [ ] R)
         {
         R [1]=7;
         return R;
   }
} //end of class

Options:
  1. (1) 12 : 15
  2. (2) 15 : 12
  3. (3) 12 : 12
  4. (4) 15 : 15
View Question 3 Explanation
Answer : ( 4 )


Question 4
4. What is the output of the following ‘C’ program ?
(Assuming little - endian representation of multi-byte data in which Least Significant Byte (LSB) is stored at the lowest memory address.)
#include <stdio.h>
#include <stdlib.h>
/* Assume short int occupies two bytes of storage */
int main ( )
{
         union saving
         {
         short int one;
         char two[2];
         };
         union saving m;
         m.two [0] = 5;
         m.two [1] = 2;
         printf(’’%d, %d, %d\n”, m.two [0], m.two [1], m.one);
}/* end of main */

Options:
  1. (1) 5, 2, 1282
  2. (2) 5, 2, 52
  3. (3) 5, 2, 25
  4. (4) 5, 2, 517
View Question 4 Explanation
Answer : ( 4 ) 5, 2, 517


Question 5
5. Given below are three implementations of the swap( ) function in C++ :
(a) (b) (c)
void swap(int a, int b) {
   int temp;
   temp = a;
   a = b;
   b = temp;
}

int main()
{
  int p = 0, q = 1;
  swap(p, q);
}
void swap(int &a, int &b) {
   int temp;
   temp = a;
   a = b;
   b = temp;
}

int main()
{
 int p = 0, q = 1;
 swap (p, q);
}
void swap(int *a, int *b) {
   int * temp;
   temp = a;
   a = b;
   b = temp;
}

int main()
{
 int p = 0, q = 1;
 swap (&p, &q);
}

Which of these would actually swap the contents of the two integer variables p and q ?
  1. (1) (a) only
  2. (2) (b) only
  3. (3) (c) only
  4. (4) (b) and (c) only
View Question 5 Explanation
Answer : (2) (b) only


Question 6
6. In Java, which of the following statements is/are True ?
S1 : The ‘final’ keyword applied to a class definition prevents the class from being extended through derivation.
S2 : A class can only inherit one class but can implement multiple interfaces.
S3 : Java permits a class to replace the implementation of a method that it has inherited. It is called method overloading.
Code :
  1. (1) S1 and S2 only
  2. (2) S1 and S3 only
  3. (3) S2 and S3 only
  4. (4) All of S1, S2 and S3
View Question 6 Explanation
Answer : (1) S1 and S2 only


Question 7
7. Which of the following statements is/are True ?
P : C programming language has a weak type system with static types.
Q : Java programming language has a strong type system with static types.
Code :
  1. (1) P only
  2. (2) Q only
  3. (3) Both P and Q
  4. (4) Neither P nor Q
View Question 7 Explanation
Answer : (3) Both P and Q


Question 8
A graphic display system has a frame buffer that is 640 pixels wide, 480 pixels high and 1 bit of color depth. If the access time for each pixel on the average is 200 nanoseconds, then the refresh rate of this frame buffer is approximately :
  1. (1) 16 frames per second
  2. (2) 19 frames per second
  3. (3) 21 frames per second
  4. (4) 23 frames per second
View Question 8 Explanation
Answer: (1) 16 frames per second


Question 9
9. Which of the following statements is/are True regarding the solution to the visibility problem in 3D graphics ?
S1 : The Painter’s algorithm sorts polygons by depth and then paints (scan - converts) each Polygon on to the screen starting with the most nearest polygon.
S2 : Backface Culling refers to eliminating geometry with backfacing normals.
Code :
  1. (1) S1 only
  2. (2) S2 only
  3. (3) Both S1 and S2
  4. (4) Neither S1 nor S2
View Question 9 Explanation
Answer : (2) S2 only


Question 10
10. Consider the matrix  M=
2 0 0
0 1 0
0 1 1

representing a set of planar (2D) geometric transformations in homogeneous coordinates. Which of the following statements about the matrix M is True ?
  1. (1) M represents first, a scaling of vector (2, 1) followed by
    translation of vector (1, 1)
  2. (2) M represents first, a translation of vector (1, 1) followed by
    scaling of vector (2, 1)
  3. (3) M represents first, a scaling of vector (3, 1) followed by
    shearing of parameters (−1, 1)
  4. (4) M represents first, a shearing of parameters (−1, 1) followed by
    scaling of vector (3, 1)
View Question 10 Explanation
Answer: (2) M represents first, a translation of vector (1, 1) followed by scaling of vector (2, 1)


Question 11
Assume the following regarding the development of a software system P :

- Estimated lines of code of P : 33, 480 LOC
- Average productivity for P : 620 LOC per person-month
- Number of software developers : 6
- Average salary of a software developer : ` 50,000 per month

If E, D and C are the estimated development effort (in person-months), estimated development time (in months), and estimated development cost (in ` Lac) respectively, then (E, D, C) =_________.

Options:
  1. (1) (48, 8, 24)
  2. (2) (54, 9, 27)
  3. (3) (60, 10, 30)
  4. (4) (42, 7, 21)
View Question 11 Explanation
Answer : (2) (54, 9, 27)


Question 12
12. Match the following in Software Engineering :

List - I List - II
(a) Product Complexity (i) Software Requirements Definition
(b) Structured System Analysis (ii) Software Design
(c) Coupling and Cohesion (iii) Validation Technique
(d) Symbolic Execution (iv) Software Cost Estimation

Code :
(a) (b) (c) (d)
(1) (ii) (iii) (iv) (i)
(2) (iii) (i) (iv) (ii)
(3) (iv) (i) (ii) (iii)
(4) (iii) (iv) (i) (ii)

Options:
  1. (1)
  2. (2)
  3. (3)
  4. (4)
View Question 12 Explanation
Answer: (3)


Question 13
13. Which one of the following is not typically provided by Source Code Management
Software ?

Options:
  1. (1) Synchronisation
  2. (2) Versioning and Revision history
  3. (3) Syntax highlighting
  4. (4) Project forking
View Question 13 Explanation
Answer : (3) Syntax highlighting


Question 14
14. A software system crashed 20 times in the year 2017 and for each crash, it took 2 minutes to restart. Approximately, what was the software availability in that year ?

Options:
  1. (1) 96.9924%
  2. (2) 97.9924%
  3. (3) 98.9924%
  4. (4) 99.9924%
View Question 14 Explanation
Answer : (4) 99.9924%


Question 15

Match the 5 CMM Maturity levels/CMMI staged representations in List- I with their
characterizations in List-II :

List - I List -II
(a) Initial (i) Processes are improved quantitatively and continually.
(b) Repeatable (ii) The plan for a project comes from a template for plans.
(c) Defined (iii) The plan uses processes that can be measured quantitatively.
(d) Managed (iv) There may not exist a plan or it may be abandoned.
(e) Optimizing (v) There’s a plan and people stick to it.

Code :
(a) (b) (c) (d) (e)
(1) (iv) (v) (i) (iii) (ii)
(2) (i) (ii) (iv) (v) (iii)
(3) (v) (iv) (ii) (iii) (i)
(4) (iv) (v) (ii) (iii) (i)

Options:
  1. (1)
  2. (2)
  3. (3)
  4. (4)
View Question 15 Explanation
Answer : (4)


Question 16
16. Coupling is a measure of the strength of the interconnections between software modules. Which of the following are correct statements with respect to module coupling ?

P : Common coupling occurs when one module controls the flow of another module by passing it information on what to do.

Q : In data coupling, the complete data structure is passed from one module to another through parameters.

R : Stamp coupling occurs when modules share a composite data structure and use only parts of it.
Code :
  1. (1) P and Q only
  2. (2) P and R only
  3. (3) Q and R only
  4. (4) All of P, Q and R
View Question 16 Explanation
Answer : (3) Q and R only


Question 17
17. A software design pattern often used to restrict access to an object is :

Options:
  1. (1) adapter
  2. (2) decorator
  3. (3) delegation
  4. (4) proxy
View Question 17 Explanation
Answer : (4) proxy


Question 18
18. Reasons to re-engineer a software include :
P : Allow legacy software to quickly adapt to the changing requirements
Q : Upgrade to newer technologies/platforms/paradigm (for example, object-oriented)
R : Improve software maintainability
S : Allow change in the functionality and architecture of the software
Code :
  1. (1) P, R and S only
  2. (2) P and R only
  3. (3) P, Q and S only
  4. (4) P, Q and R only
View Question 18 Explanation
Answer : (4) P, Q and R only


Question 19
19. Which of the following is not a key strategy followed by the clean room approach to software development ?

Options:
  1. (1) Formal specification
  2. (2) Dynamic verification
  3. (3) Incremental development
  4. (4) Statistical testing of the system
View Question 19 Explanation
Answer : (2) Dynamic verification


Question 20

Which of the following statements is/are True ?

P : Refactoring is the process of changing a software system in such a way that it does not alter the external behavior of the code yet improves the internal architecture.

Q : An example of refactoring is adding new features to satisfy a customer requirement discovered after a project is shipped.

Code :
  1. (1) P only
  2. (2) Q only
  3. (3) Both P and Q
  4. (4) Neither P nor Q
View Question 20 Explanation
Answer : (1) P only


Question 21
The solution of the recurrence relation
T(m) = T( 3m/4) + 1 is :

Options:
  1. (1) θ (lg m)
  2. (2) θ (m)
  3. (3) θ (mlg m)
  4. (4) θ (lglg m)
View Question 21 Explanation
Answer : (1) θ (lg m)


Question 22
22. Consider the array A=<4, 1, 3, 2, 16, 9, 10, 14, 8, 7>. After building heap from the array A, the depth of the heap and the right child of max-heap are _________ and _________ respectively. (Root is at level 0).

Options:
  1. (1) 3, 14
  2. (2) 3, 10
  3. (3) 4, 14
  4. (4) 4, 10
View Question 22 Explanation
Answer : (2) 3, 10


Question 23
A hash function h defined h(key)=key mod 7, with linear probing, is used to insert the keys 44, 45, 79, 55, 91, 18, 63 into a table indexed from 0 to 6. What will be the location of key 18 ?

Options:
  1. (1) 3
  2. (2) 4
  3. (3) 5
  4. (4) 6
View Question 23 Explanation
Answer : (3) 5


Question 24
24. Which of the following algorithms solves the single-source shortest paths ?

Options:
  1. (1) Prim’s algorithm
  2. (2) Floyd - Warshall algorithm
  3. (3) Johnson’s algorithm
  4. (4) Dijkstra’s algorithm
View Question 24 Explanation
Answer : (4) Dijkstra’s algorithm


Question 25
25. A text is made up of the characters A, B, C, D, E each occurring with the probability 0.08, 0.40, 0.25, 0.15 and 0.12 respectively. The optimal coding technique will have the average length of :

Options:
  1. (1) 2.4
  2. (2) 1.87
  3. (3) 3.0
  4. (4) 2.15
View Question 25 Explanation
Answer : (4) 2.15


Question 26
26. A binary search tree in which every non-leaf node has non-empty left and right subtrees is
called a strictly binary tree. Such a tree with 19 leaves :

Options:
  1. (1) cannot have more than 37 nodes
  2. (2) has exactly 37 nodes
  3. (3) has exactly 35 nodes
  4. (4) cannot have more than 35 nodes
Lets Discuss Question 26
Answer: (2) has exactly 37 nodes


Question 27
27. Match the following with respect to algorithm paradigms :
List - IList - II
(a) The 8-Queen’s problem(i) Dynamic programming
(b) Single-Source shortest paths(ii) Divide and conquer
(c) STRASSEN’s Matrix multiplication(iii) Greedy approach
(d) Optimal binary search trees (iv) Backtracking
Code :
(a)(b)(c)(d)
(1)(iv)(i)(iii)(ii)
(2)(iv)(iii)(i)(ii)
(3)(iii)(iv)(ii)(i)
(4)(iv)(iii)(ii)(i)

Options:
  1. (1)
  2. (2)
  3. (3)
  4. (4)
Lets Discuss Question 27
Answer: (4)


Question 28
28. The maximum number of comparisons needed to sort 9 items using radix sort is (assume each item is 5 digit octal number) :
Options:
  1. (1) 45
  2. (2) 72
  3. (3) 360
  4. (4) 450
Lets Discuss Question 28
Answer : (3) 360


Question 29
29. A 5-ary tree is tree in which every internal node has exactly 5 children. The number of left (leaf) nodes in such a tree with 8 internal nodes will be :

Options:
  1. (1) 30
  2. (2) 33
  3. (3) 45
  4. (4) 125
View Question 29 Explanation
Answer : (2) 33


Question 30
30. Consider a Boolean function of ‘n’ variables. The order of an algorithm that determines whether the Boolean function produces a output 1 is :

Options:
  1. (1) Logarithmic
  2. (2) Linear
  3. (3) Quadratic
  4. (4) Exponential
View Question 30 Explanation
Answer : (4) Exponential


Question 31
31. Two finite state machines are said to be equivalent if they :
  1. (1) Have the same number of edges
  2. (2) Have the same number of states
  3. (3) Recognize the same set of tokens
  4. (4) Have the same number of states and edges
View Question 31 Explanation
Answer : (3) Recognize the same set of tokens


Question 32
32. The finite state machine given in figure below recognizes :
Options:
  1. (1) any string of odd number of a’s
  2. (2) any string of odd number of b’s
  3. (3) any string of even number of a’s and odd number of b’s
  4. (4) any string of odd number of a’s and odd number of b’s
View Question 32 Explanation
Answer : (4) any string of odd number of a’s and odd number of b’s


Question 33
33. A pushdown automata behaves like a Turing machine when the number of auxiliary memory is :
  1. (1) 0
  2. (2) 1
  3. (3) 1 or more
  4. (4) 2 or more
View Question 33 Explanation
Answer : (4) 2 or more


Question 34
34. Pushdown automata can recognize language generated by ______ .
  1. (1) Only context free grammar
  2. (2) Only regular grammar
  3. (3) Context free grammar or regular grammar
  4. (4) Only context sensitive grammar
View Question 34 Explanation
Answer: (3) Context free grammar or regular grammar


Question 35
35. To obtain a string of n Terminals from a given Chomsky normal form grammar, the number of productions to be used is :
  1. (1) 2n−1
  2. (2) 2n
  3. (3) n+1
  4. (4) n2
Lets Discuss Question 35
(1) 2n−1


Question 36
Consider the following two Grammars :

G1 : S → SbS|a
G2 : S → aB|ab, A→GAB|a, B→ABb|b

Which of the following option is correct ?
  1. (1) Only G1 is ambiguous
  2. (2) Only G2 is ambiguous
  3. (3) Both G1 and G2 are ambiguous
  4. (4) Both G1 and G2 are not ambiguous
Lets Discuss Question 36
Answer : (3) Both G1 and G2 are ambiguous


Question 37
37. Context sensitive language can be recognized by a :
  1. (1) Finite state machine
  2. (2) Deterministic finite automata
  3. (3) Non-deterministic finite automata
  4. (4) Linear bounded automata
View Question 37 Explanation
Answer : (4) Linear bounded automata


Question 38
38. The set A={ 0n 1n 2n | n = 1, 2, 3,..... } is an example of a grammar that is :
  1. (1) Context sensitive
  2. (2) Context free
  3. (3) Regular
  4. (4) None of the above
View Question 38 Explanation
Answer : (1) Context sensitive


Question 39
39. A bottom-up parser generates :
  1. (1) Left-most derivation in reverse
  2. (2) Right-most derivation in reverse
  3. (3) Left-most derivation
  4. (4) Right-most derivation
Lets Discuss Question 39
Answer : (2) Right-most derivation in reverse


Question 40
40. Consider the following statements( ) :
S1 : There exists no algorithm for deciding if any two Turing machines M1 and M2 accept
the same language.
S2 : The problem of determining whether a Turing machine halts on any input is undecidable.
Which of the following options is correct ?
  1. (1) Both S1 and S2 are correct
  2. (2) Both S1 and S2 are not correct
  3. (3) Only S1 is correct
  4. (4) Only S2 is correct
Lets Discuss Question 40
Answer: (1) Both S1 and S2 are correct



Question 41
41. A slotted ALOHA network transmits 200-bit frames using a shared channel with a 200 Kbps bandwidth. Find the throughput of the system, if the system (all stations put together) produces 250 frames per second :
  1. (1) 49
  2. (2) 268
  3. (3) 149
  4. (4) 151
Lets Discuss Question 41
Answer : (1) 49


Question 42
42. The period of a signal is 100 ms. Its frequency is _________.
  1. (1) 1003 Hertz
  2. (2) 10-2 KHz
  3. (3) 10-3 KHz
  4. (4) 1055 Hertz
View Question 42 Explanation
Answer : (2) 10-2 KHz


Question 43
The dotted-decimal notation of the following IPV4 address in binary notation is _________.   10000001 00001011 00001011 11101111

Options:
  1. (1) 111.56.45.239
  2. (2) 129.11.10.238
  3. (3) 129.11.11.239
  4. (4) 111.56.11.239
View Question 43 Explanation
Answer : (3) 129.11.11.239


Question 44
44. Which of the following statements are true ? (a) Advanced Mobile Phone System (AMPS) is a second generation cellular phone system.
(b) IS - 95 is a second generation cellular phone system based on CDMA and DSSS.
(c) The Third generation cellular phone system will provide universal personnel
communication.
Code :
  1. (1) (a) and (b) only
  2. (2) (b) and (c) only
  3. (3) (a), (b) and (c)
  4. (4) (a) and (c) only
View Question 44 Explanation
Answer : (2) (b) and (c) only


Question 45
45. Match the following symmetric block ciphers with corresponding block and key sizes : 
List - IList - II
(a) DES(i) block size 64 and key size ranges between 32 and 448
(b) IDEA(ii) block size 64 and key size 64
(c) BLOW FISH(iii) block size 128 and key sizes 128, 192, 256
(d) AES(iv) block size 64 and key size 128

Code :
(a)(b) (c)(d)
(1)(iv)(ii)(i)(iii)
(2)(ii)(iv)(i)(iii)
(3)(ii)(iv)(iii)(i)
(4)(iv)(ii)(iii)(i)
  1. (1)
  2. (2)
  3. (3)
  4. (4)
View Question 45 Explanation
Answer : (2)


Question 46
46. Which of the following statements are true ?
(a) Three broad categories of Networks are
(i) Circuit Switched Networks
(ii) Packet Switched Networks
(iii) Message Switched Networks
(b) Circuit Switched Network resources need not be reserved during the set up phase.
(c) In packet switching there is no resource allocation for packets.
Code :
  1. (1) (a) and (b) only
  2. (2) (b) and (c) only
  3. (3) (a) and (c) only
  4. (4) (a), (b) and (c)
View Question 46 Explanation
Answer : (3) (a) and (c) only


Question 47
47. In Challenge-Response authentication the claimant ________.
  1. (1) Proves that she knows the secret without revealing it
  2. (2) Proves that she doesn’t know the secret
  3. (3) Reveals the secret
  4. (4) Gives a challenge
View Question 47 Explanation
Answer : (1) Proves that she knows the secret without revealing it


Question 48
48. Decrypt the message “WTAAD” using the Caesar Cipher with key = 15.
  1. (1) LIPPS
  2. (2) HELLO
  3. (3) OLLEH
  4. (4) DAATW
View Question 48 Explanation
Answer : (2) HELLO


Question 49
49. To guarantee correction of upto t errors, the minimum Hamming distance dmin in a block code must be ______ .
  1. (1) t+1
  2. (2) t-2
  3. (3) 2t-1
  4. (4) 2t+1
View Question 49 Explanation
Answer : (4) 2t+1


Question 50

Encrypt the Message “HELLO MY DEARZ” using Transposition Cipher with
Key{Plain Text    2 4 1 3
Cipher Text    1 2 3 4

Options:
  1. (1) HLLEO YM AEDRZ
  2. (2) EHOLL ZYM RAED
  3. (3) ELHL MDOY AZER
  4. (4) ELHL DOMY ZAER
View Question 50 Explanation
Answer: (3) ELHL MDOY AZER


Question 51
51. At a particular time of computation, the value of a counting semaphore is 10. Then 12 P operations and “x” V operations were performed on this semaphore. If the final value of semaphore is 7, x will be :
  1. (1) 8
  2. (2) 9
  3. (3) 10
  4. (4) 11
View Question 51 Explanation
Answer : (2) 9


Question 52
52. In a paged memory, the page hit ratio is 0.40. The time required to access a page in secondary memory is equal to 120 ns. The time required to access a page in primary memory is 15 ns. The average time required to access a page is ______ .
  1. (1) 105
  2. (2) 68
  3. (3) 75
  4. (4) 78
View Question 52 Explanation
Answer : (4) 78


Question 53
53. In a multi-user operating system, 30 requests are made to use a particular resource per hour, on an average. The probability that no requests are made in 40 minutes, when arrival pattern is a poisson distribution, is ______ .
  1. (1) e-15
  2. (2) 1 - e-15
  3. (3) 1 - e-20
  4. (4) e-20
View Question 53 Explanation
Answer : (4) e-20


Question 54
54. Normally user programs are prevented from handling I/O directly by I/O instructions in them. For CPUs having explicit I/O instructions, such I/O protection is ensured by having the I/O instructions privileged. In a CPU with memory mapped I/O, there is no explicit I/O instruction. Which one of the following is true for a CPU with memory mapped I/O ?
  1. (1) I/O protection is ensured by operating system routines.
  2. (2) I/O protection is ensured by a hardware trap.
  3. (3) I/O protection is ensured during system configuration.
  4. (4) I/O protection is not possible.
Lets Discuss Question 54
Answer : (1) I/O protection is ensured by operating system routines.


55. Which UNIX/Linux command is used to make all files and sub-directories in the directory
“progs” executable by all users ?
(1) chmod− R a+x progs (2) chmod −R 222 progs
(3) chmod−X a+x progs (4) chmod −X 222 progs

Answer: 3




56. Which of the following statements are true ?
(a) External Fragmentation exists when there is enough total memory space to satisfy a
request but the available space is contiguous.
(b) Memory Fragmentation can be internal as well as external.
(c) One solution to external Fragmentation is compaction.
Code :
(1) (a) and (b) only (2) (a) and (c) only
(3) (b) and (c) only (4) (a), (b) and (c)

Answer: 3




57. Page information in memory is also called as Page Table. The essential contents in each entry
of a page table is/are ______ .
(1) Page Access information
(2) Virtual Page number
(3) Page Frame number
(4) Both virtual page number and Page Frame Number

Answer: 3


58. Consider a virtual page reference string 1, 2, 3, 2, 4, 2, 5, 2, 3, 4. Suppose LRU page replacement
algorithm is implemented with 3 page frames in main memory. Then the number of page
faults are_________.
(1) 5 (2) 7 (3) 9 (4) 10

Answer: 3




59. Consider the following three processes with the arrival time and CPU burst time given in
milliseconds :
Process Arrival Time Burst Time
P1 0 7
P2 1 4
P3 2 8
The Gantt Chart for preemptive SJF scheduling algorithm is _________.
(1)
(2)
(3)
(4)

Answer: 3




60. In which of the following scheduling criteria, context switching will never take place ?
(1) ROUND ROBIN (2) Preemptive SJF
(3) Non-preemptive SJF (4) Preemptive priority

Answer: 3




61. In RDBMS, which type of Join returns all rows that satisfy the join condition ?
(1) Inner Join (2) Outer Join
(3) Semi Join (4) Anti Join

Answer: 3




62. Consider a relation book (title, price) which contains the titles and prices of different books.
Assuming that no two books have the same price, what does the following SQL query list ?
Select title
from book as B
where (select count (*)
from book as T
where T.price > B.price) < 7
(1) Titles of the six most expensive books.
(2) Title of the sixth most expensive books.
(3) Titles of the seven most expensive books.
(4) Title of the seventh most expensive books.

Answer: 3




63. In a Hierachical database, a hashing function is used to locate the ________.
(1) Collision (2) Root
(3) Foreign Key (4) Records

Answer: 3




64. Relations produced from E - R Model will always be in ________.
(1) 1 NF (2) 2 NF (3) 3 NF (4) 4 NF

Answer: 3




65. Consider the following schedules involving two transactions.
S1 : r1(X) ; r1(Y) ; r2(X) ; r2(Y) ; w2(Y) ; w1(X)
S2 : r1(X) ; r2(X) ; r2(Y) ; w2(Y) ; r1(Y) ; w1(X)
Which one of the following statements is correct with respect to above ?
(1) Both S1 and S2 are conflict serializable.
(2) Both S1 and S2 are not conflict serializable.
(3) S1 is conflict serializable and S2 is not conflict serializable.
(4) S1 is not conflict serializable and S2 is conflict serializable.

Answer: 3




66. For a database relation R(a, b, c, d) where the domains of a, b, c and d include only atomic
values, and only the following functional dependencies and those that can be inferred from
them hold :
a → c
b → d
The relation is in _________.
(1) First normal form but not in second normal form
(2) Second normal form but not in third normal form
(3) Third normal form
(4) BCNF

Answer: 3




67. A many-to-one relationship exists between entity sets r1 and r2. How will it be represented
using functional depedencies if Pk(r) denotes the primary key attribute of relation r ?
(1) Pk(r1) → Pk(r2)
(2) Pk(r2) → Pk(r1)
(3) Pk(r2) → Pk(r1) and Pk(r1) → Pk(r2)
(4) Pk(r2) → Pk(r1) or Pk(r1) → Pk(r2)

Answer: 3




68. Database systems that store each relation in a separate operating system file may use the
operating system’s authorization scheme, instead of defining a special scheme themselves.
In this case, which of the following is false ?
(1) The administrator enjoys more control on the grant option.
(2) It is difficult to differentiate among the update, delete and insert authorizations.
(3) Cannot store more than one relation in a file.
(4) Operations on the database are speeded up as the authorization procedure is carried
out at the operating system level.

Answer: 3




69. Let R1(a, b, c) and R2(x, y, z) be two relations in which a is the foreign key of R1 that refers to
the primary key of R2. Consider following four options.
(a) Insert into R1 (b) Insert into R2
(c) Delete from R1 (d) Delete from R2
Which of the following is correct about the referential integrity constraint with respect to
above ?
(1) Operations (a) and (b) will cause violation.
(2) Operations (b) and (c) will cause violation.
(3) Operations (c) and (d) will cause violation.
(4) Operations (d) and (a) will cause violation.

Answer: 3




70. Consider a hash table of size seven, with starting index zero, and a hash function (7x+3)
mod 4. Assuming the hash table is initially empty, which of the following is the contents of
the table when the sequence 1, 3, 8, 10 is inserted into the table using closed hashing ? Here
“__” denotes an empty location in the table.
(1) 3, 10, 1, 8, __ , __ , __
(2) 1, 3, 8, 10, __ , __ , __
(3) 1, __ , 3, __ , 8, __ , 10
(4) 3, 10, __ , __ , 8, __ , __

Answer: 3




71. In Artificial Intelligence (AI), an environment is uncertain if it is ________.
(1) Not fully observable and not deterministic
(2) Not fully observable or not deterministic
(3) Fully observable but not deterministic
(4) Not fully observable but deterministic

Answer: 3




72. In Artificial Intelligence (AI), a simple reflex agent selects actions on the basis of_________.
(1) current percept, completely ignoring rest of the percept history.
(2) rest of the percept history, completely ignoring current percept.
(3) both current percept and complete percept history.
(4) both current percept and just previous percept.

Answer: 3




73. In heuristic search algorithms in Artificial Intelligence (AI), if a collection of admissible
heuristics h1.......hm is available for a problem and none of them dominates any of the others,
which should we choose ?
(1) h(n)=max{h1(n),....,hm(n)}
(2) h(n)=min{h1(n),....,hm(n)}
(3) h(n)=avg{h1(n),....,hm(n)}
(4) h(n)=sum{h1(n),....,hm(n)}

Answer: 3




74. Consider following sentences regarding A*, an informed search strategy in Artificial
Intelligence (AI).
(a) A* expands all nodes with f(n) < C*.
(b) A* expands no nodes with f(n) /C*.
(c) Pruning is integral to A*.
Here, C* is the cost of the optimal solution path.
Which of the following is correct with respect to the above statements ?
(1) Both statement (a) and statement (b) are true.
(2) Both statement (a) and statement (c) are true.
(3) Both statement (b) and statement (c) are true.
(4) All the statements (a), (b) and (c) are true.

Answer: 3




75. Consider a vocabulary with only four propositions A, B, C and D. How many models are
there for the following sentence ?
B w C
(1) 10 (2) 12 (3) 15 (4) 16

Answer: 3




76. Consider the following statements :
(a) False ?=True
(b) If α ?=(β ∧ γ) then α ?=β and α ?=γ.
Which of the following is correct with respect to the above statements ?
(1) Both statement (a) and statement (b) are false.
(2) Statement (a) is true but statement (b) is false.
(3) Statement (a) is false but statement (b) is true.
(4) Both statement (a) and statement (b) are true.

Answer: 3




77. Consider the following English sentence :
“Agra and Gwalior are both in India”.
A student has written a logical sentence for the above English sentence in First-Order Logic
using predicate In(x, y), which means x is in y, as follows :
In(Agra, India) w In(Gwalior, India)
Which one of the following is correct with respect to the above logical sentence ?
(1) It is syntactically valid but does not express the meaning of the English sentence.
(2) It is syntactically valid and expresses the meaning of the English sentence also.
(3) It is syntactically invalid but expresses the meaning of the English sentence.
(4) It is syntactically invalid and does not express the meaning of the English sentence.

Answer: 3




78. Consider the following two sentences :
(a) The planning graph data structure can be used to give a better heuristic for a planning
problem.
(b) Dropping negative effects from every action schema in a planning problem results in a
relaxed problem.
Which of the following is correct with respect to the above sentences ?
(1) Both sentence (a) and sentence (b) are false.
(2) Both sentence (a) and sentence (b) are true.
(3) Sentence (a) is true but sentence (b) is false.
(4) Sentence (a) is false but sentence (b) is true.
J-08718 !J-08718-PAPER-II! 19 Paper-II

Answer: 3




79. A knowledge base contains just one sentence, ∃x AsHighAs (x, Everest). Consider the
following two sentences obtained after applying existential instantiation.
(a) AsHighAs (Everest, Everest)
(b) AsHighAs (Kilimanjaro, Everest)
Which of the following is correct with respect to the above sentences ?
(1) Both sentence (a) and sentence (b) are sound conclusions.
(2) Both sentence (a) and sentence (b) are unsound conclusions.
(3) Sentence (a) is sound but sentence (b) is unsound.
(4) Sentence (a) is unsound but sentence (b) is sound.

Answer: 3




80. Consider the set of all possible five-card poker hands dealt fairly from a standard deck of
fifty-two cards. How many atomic events are there in the joint probability distribution ?
(1) 2, 598, 960 (2) 3, 468, 960 (3) 3, 958, 590 (4) 2, 645, 590

Answer: 3




81. E is the number of edges in the graph and f is maximum flow in the graph. When the
capacities are integers, the runtime of Ford-Fulberson algorithm is bounded by :
(1) O (E∗f) (2) O (E2∗f)
(3) O (E∗f2) (4) O (E2∗f2)

Answer: 3




82. Which of the following statements is false about convex minimization problem ?
(1) If a local minimum exists, then it is a global minimum
(2) The set of all global minima is convex set
(3) The set of all global minima is concave set
(4) For each strictly convex function, if the function has a minimum, then the minimum is
unique

Answer: 3




83. The following LPP
Maximize z=100x1+2x2+5x3
Subject to
14x1+x2−6x3+3x4=7
32x1+x2−12x3≤10
3x1−x2−x3≤0
x1, x2, x3, x4/0
has
(1) Solution : x1=100, x2=0, x3=0 (2) Unbounded solution
(3) No solution (4) Solution : x1=50, x2=70, x3=60

Answer: 3




84. Digital data received from a sensor can fill up 0 to 32 buffers. Let the sample space be
S={0, 1, 2, .........., 32} where the sample j denote that j of the buffers are full and
1
p(i) (33 i)
561
= − . Let A denote the event that the even number of buffers are full. Then
p(A) is :
(1) 0.515 (2) 0.785 (3) 0.758 (4) 0.485

Answer: 3




85. The equivalence of
¬ ∃ x Q (x) is :
(1) ∃ x ¬ Q (x) (2) x ¬ Q (x) (3) ¬ ∃ x ¬ Q (x) (4) x Q (x)

Answer: 3




86. If Ai={−i, ... −2,−1, 0, 1, 2, . . . . . i}
then i
i 1
A

=
is :
(1) Z (2) Q (3) R (4) C

Answer: 3




87. Match the following in List - I and List - II, for a function f :
List - I List - II
(a) x y (f (x)=f (y) → x=y) (i) Constant
(b) y ∃ x (f (x)=y) (ii) Injective
(c) x f (x)=k (iii) Surjective
Code :
(a) (b) (c)
(1) (i) (ii) (iii)
(2) (iii) (ii) (i)
(3) (ii) (i) (iii)
(4) (ii) (iii) (i)

Answer: 3




88. Which of the relations on {0, 1, 2, 3} is an equivalence relation ?
(1) { (0, 0) (0, 2) (2, 0) (2, 2) (2, 3) (3, 2) (3, 3) }
(2) { (0, 0) (1, 1) (2, 2) (3, 3) }
(3) { (0, 0) (0, 1) (0, 2) (1, 0) (1, 1) (1, 2) (2, 0) }
(4) { (0, 0) (0, 2) (2, 3) (1, 1) (2, 2) }

Answer: 3




89. Which of the following is an equivalence relation on the set of all functions from Z to
Z ?
(1) { (f, g) ? f (x)−g (x)=1 x e Z }
(2) { (f, g) ? f (0)=g (0) or f (1)=g (1) }
(3) { (f, g) ? f (0)=g (1) and f (1)=g (0) }
(4) { (f, g) ? f (x)−g (x)=k for some k e Z }

Answer: 3




90. Which of the following statements is true ?
(1) (Z, ≤ ) is not totally ordered
(2) The set inclusion relation ⊆ is a partial ordering on the power set of a set S
(3) (Z, ≠ ) is a poset
(4) The directed graph is not a partial order

Answer: 3




91. CMOS is a Computer Chip on the motherboard, which is :
(1) RAM (2) ROM
(3) EPROM (4) Auxillary storage

Answer: 3




92. In RS flip-flop, the output of the flip-flop at time (t+1) is same as the output at time t, after
the occurance of a clock pulse if :
(1) S=R=1 (2) S=0, R=1
(3) S=1, R=0 (4) S=R=0

Answer: 3




93. Match the terms in List - I with the options given in List - II : List - I List - II
(a) Decoder (i) 1 line to 2n lines
(b) Multiplexer (ii) n lines to 2n lines
(c) De multiplexer (iii) 2n lines to 1 line
(iv) 2n lines to 2n−1 lines
Code :
(a) (b) (c)
(1) (ii) (i) (iii)
(2) (ii) (iii) (i)
(3) (ii) (i) (iv)
(4) (iv) (ii) (i)

Answer: 3




94. What does the following logic diagram represent ?
(1) Synchronous Counter (2) Ripple Counter
(3) Combinational Circuit (4) Mod 2 Counter

Answer: 3




95. The hexadecimal equivalent of the binary integer number 110101101 is :
(1) D24 (2) 1 B D (3) 1 A E (4) 1 A D

Answer: 3




96. Perform the following operation for the binary equivalent of the decimal numbers
(−14)10+(−15)10
The solution in 8 bit representation is :
(1) 11100011 (2) 00011101
(3) 10011101 (4) 11110011

Answer: 3




97. Match the items in List - I and List - II :
List - I List - II
(a) Interrupts which can be delayed when a much highest (i) Normal
priority interrupt has occurred
(b) Unplanned interrupts which occur while executing (ii) Synchronous
a program
(c) Source of interrupt is in phase with the system clock (iii) Maskable
(iv) Exception
Code :
(a) (b) (c)
(1) (ii) (i) (iv)
(2) (ii) (iv) (iii)
(3) (iii) (i) (ii)
(4) (iii) (iv) (ii)

Answer: 3




98. Which of the following mapping is not used for mapping process in cache memory ?
(1) Associative mapping (2) Direct mapping
(3) Set-Associative mapping (4) Segmented - page mapping

Answer: 3




99. Simplify the following using K-map :
F (A, B, C, D) = Σ (0, 1, 2, 8, 9, 12, 13)
d (A, B, C, D) = Σ (10, 11, 14, 15)
d stands for don’t care condition.
(1) A+B D + BC (2) A+B D + B C
(3) A+B C (4) A+B C+B D

Answer: 3




100. In 8085 microprocessor, what is the output of following program ?
LDA 8000H
MVI B, 30H
ADD B
STA 8001H
(1) Read a number from input port and store it in memory
(2) Read a number from input device with address 8000H and store it in memory at location 8001H
(3) Read a number from memory at location 8000H and store it in memory location 8001H
(4) Load A with data from input device with address 8000H and display it on the output
device with address 8001H

Answer: 3


Tuesday 27 November 2018

UGC NET paper 1 july 2018 solved

NTA UGC NET Paper 1 July 2018

UGC NET Paper 1 Question Paper July 2018 Set P solved

1. Which of the following set of statements best describes the nature and objectives of teaching?
(a) Teaching and learning are integrally related.
(b) There is no difference between teaching and training.
(c) Concern of all teaching is to ensure some kind of transformation in students.
(d) All good teaching is formal in nature.
(e) A teacher is a senior person.
(f) Teaching is a social act whereas learning is a personal act.
Code:
(1) (a), (b) and (d)
(2) (b), (c) and (e)
(3) (a), (c) and (f)
(4) (d), (e) and (f)

Answer: 3
Research aptitude question are theoretical questions, best way to solve is to see which options can be discarded.
code (b) is not true. So, options 1, 2 are discarded.
Now, (f) is common to both remaining (c) and (d)
From remaining (a), (c), (d) and (e).
code (e) is not related or not conveying any aspect of the teaching (showing only that teacher is senior), so discard it.
So, option with valid codes is 3
The below link has video which explains this topic and has question discussion in hindi at end of video lecture:
https://unacademy.com/lesson/teaching-and-learning-characteristics-with-mcqs-in-hindi/711W3XS0
2. Which of the following learner characteristics is highly related to effectiveness of teaching?
(1) Prior experience of the learner
(2) Educational status of the parents of the learners
(3) Peer groups of the learner
(4) Family size from which the learner comes.

Answer: 1
Here, education status of the learner, peer group of learner and family size not matter while learning. Experience of the learner is the most prior,
which leads to good understanding and effectiveness during learning process.
3. In the two sets given below Set –I indicates methods of teaching while Set –II provides the basic requirements for success/effectiveness. Match the two sets and indicate your answer by choosing from the code:
Set – I (Method of teaching) Set – II (Basic requirements for success/effectiveness)
(a) Lecturing (i) Small step presentation with feedback provided
(b) Discussion in groups (ii) Production of large number of ideas
(c) Brainstorming (iii) Content delivery in a lucid language
(d) Programmed Instructional procedure (iv) Use of teaching-aids
(v) Theme based interaction among participants
Codes:
 (a) (b) (c) (d)
(1) (i) (ii) (iii) (iv)
(2) (ii) (iii) (iv) (v)
(3) (iii) (v) (ii) (i)
(4) (iv) (ii) (i) (iiii)

Answer: 3
Best match here are
(b) Discussion in groups =(v) Theme based interaction among participants
(c) Brainstorming =>(ii) Production of large number of ideas
So, option (3) is correct with (a) and (d) matching correctly.

4. From the list of evaluation procedures given below identify those which will be called ‘formative evaluation’. Indicate your answer by choosing from the code :
(a) A teacher awards grades to students after having transacted the course work.
(b) During interaction with students in the classroom, the teacher provides corrective feedback.
(c) The teacher gives marks to students on a unit test.
(d) The teacher clarifies the doubts of students in the class itself.
(e) The overall performance of a students is reported to parents at every three months interval.
(f) The learner’s motivation is raised by the teacher through a question-answer session.
Code :
(1) (a), (b) and (c)
(2) (b), (c) and (d)
(3) (a), (c) and (e)
(4) (b), (d) and (f)

Answer: 4
Evaluation of the students during the teaching process like corrective feedback in class, question answer sessions, discussion of some important topics among students to make it more interesting  and doubt solving. Teachers do this kind of evaluations to find the level of understanding is at the current moment.
http://www.nwlink.com/~donclark/hrd/isd/types_of_evaluations.html
5. Assertion (A): All teaching should aim at ensuring learning.
Reason (R): All learning results from teaching.
Choose the correct answer from the following code:
(1) Both (A) and (R) are true, and (R) is the correct explanation of (A).
(2) Both (A) and (R) are true, but (R) is not the correct explanation of (A).
(3) (A) is true, but (R) is false.
(4) (A) is false, but (R) is true.

Answer: 3
Teaching is to make student learn. So, Assertion is correct. Learning can be without teaching or teacher. Ex. self-learning of new subject. So, reason is false (not correlated with assertion)
Option (3) is correct answer.

6. There are two sets given below.
Set – I specifies the types of research,
while Set –II indicates their characteristics.
Match the two and given your answer by selecting the appropriate code.
Set - I(Research types) Set - II(Characteristics)
(a) Fundamental research (i) Finding out the extent of perceived impact of an intervention
(b) Applied research (ii) Developing an effective explanation through theory building
(c) Action research (iii) Improving an existing situation through use of interventions
(d) Evaluative research (iv) Exploring the possibility of a theory for use in various situations
(v) Enriching technological resources
Codes:
      (a) (b) (c) (d)
(1)  (ii) (iv) (iii) (i)
(2)  (v) (iv) (iii) (ii)
(3)  (iii) (ii) (iii) (iv)
(4)  (ii) (iii) (iv) (v)

Answer: 1
Fundamental research => Theory building
Applied research => seeks to solve practical problems (use theory in various practical situations)
Evaluative research => Evaluate the algorithm or theorem based on set of inputs to find the validity of system. Analyse the output and evaluate it based on the considered parameters.
Action research => Cycle of (Plan,Act,Observe and Reflect) to make the results more accurate.
7. Which of the sets of activities best indicate the cyclic nature of action research strategy?
(1) Reflect, Observe, Plan, Act
(2) Observe, Act, Reflect, Plan
(3) Act, Plan, Observe, Reflect
(4) Plan, Act, Observe, Reflect

Answer: 4
Set of activities in cyclic nature of action research strategy:
1) Study and plan ( Plan)
2) Take action (Act)
3) Collect and analyse evidence(Observe)
4) Reflect
https://en.wikipedia.org/wiki/Action_research
8. Which of the following sequence of research steps is nearer to scientific method?
(1) Suggested solution of the problem, Deducing the consequences of the solution, Perceiving the problem situation, Location of the difficulty and testing the solutions.
(2) Perceiving the problem situation, Locating the actual problem and its definition, Hypothesizing, Deducing the consequences of the suggested solution and Testing the hypothesis in action.
(3) Defining a problem, Identifying the causes of the problem, Defining a population, Drawing a sample, Collecting data and Analysing results.
(4) Identifying the causal factors, Defining the problem, Developing a hypothesis, Selecting a sample, Collecting data and arriving at generalization and Conclusions.

Answer: 3
9. The problem of ‘research ethics’ is concerned with which aspect of research activities?
(1) Following the prescribed format of a thesis
(2) Data analysis through qualitative or quantitative technique
(3) Defining the population of research
(4) Evidence based research reporting

Answer: 4
Evidence based research reporting.
In research paper the improved results has some previous reference of result cited from the other research paper. Research paper has citations that make evidence about your paper has some unique definition that has not been yet explored.
10. In which of the following activities, potential for nurturing creative and critical thinking is relatively greater?
(1) Preparing research summary
(2) Presenting a seminar paper
(3) Participation in research conference
(4) Participation in a workshop

Answer: 4
Workshop gives you the practical idea and the possibilities of thinking problem in different ways.

Read the following passage carefully and answer questions from 11 to 15 :
     If India has to develop her internal strengths, the nation has to focus on the technological imperatives, keeping in mind three dynamic dimensions : the people, the overall economy and the strategic interests. These technological imperatives also take into account a ‘fourth’ dimension, time, an offshoot of modern day dynamism in business, trade, and technology that leads to continually shifting targets. We believe that technological strengths are especially crucial in dealing with this fourth dimension underlying continuous change in the aspirations of the people, the economy in the global context, and the strategic interests. The progress of technology lies at the heart of human history. Technological strengths are the key to creating more productive employment in an increasingly competitive market place and to continually upgrade human skills. Without a pervasive use of technologies, we cannot achieve overall development of our people in the years to come. The direct linkages of technology to the nation’s strategic strengths are becoming more and more clear, especially since 1990s. India’s own strength in a number of core areas still puts it in a position of reasonable strength in geo-political context. Any nation aspiring to become a developed one needs to have strengths in various strategic technologies and also the ability to continually upgrade them through its own creative strengths. For people-oriented actions as well, whether for the creation of large scale productive employment or for ensuring nutritional and health security for people, or for better living conditions, technology is the only vital input. The absence of greater technological impetus could lead to lower productivity and wastage of precious natural resources. Activities with low productivity or low value addition, in the final analysis hurt the poorest most. The technological imperatives to lift our people to a new life, and to a life they are entitled to is important. India, aspiring to become a major economic power in terms of trade and increase in GDP, cannot succeed on the strength of turnkey projects designed and built abroad or only through large-scale imports of plant machinery, equipment and know how. Even while being alive to the short-term realities, medium and long-term strategies to develop core technological strengths within our industry are vital for envisioning a developed India.
11. According to the above passage, which of the following are indicative of the fourth dimension ?
(a) Aspirations of people
(b) Modern day dynamism
(c) Economy in the global context
(d) Strategic interests
Code :
(1) (a), (b) and (c) only
(2) (b), (c) and (d) only
(3) (a), (c) and (d) only
(4) (a), (b) and (d) only

Answer: 3
We believe that technological strengths are especially crucial in dealing with this fourth dimension underlying continuous change in the aspirations of the people, the economy in the global context, and the strategic interests.
12. More productive employment demands :
(1) Pervasive use of technology
(2) Limiting competitive market place
(3) Geo-political considerations
(4) Large industries

Answer: 1
Technological strengths are the key to creating more productive employment in an increasingly competitive market place and to continually upgrade human skills. Without a pervasive use of technologies, we cannot achieve overall development of our people in the years to come.
13. Absence of technology would lead to : (a) Less pollution
(b) Wastage of precious natural resources
(c) Low value addition
(d) Hurting the poorest most
Code :
(1) (a), (b) and (c) only
(2) (b), (c) and (d) only
(3) (a), (b) and (d) only
(4) (a), (c) and (d) only

Answer: 2
The absence of greater technological impetus could lead to lower productivity and wastage of precious natural resources. Activities with low productivity or low value addition, in the final analysis hurt the poorest most.
14. The advantage of technological inputs would result in :
(1) Unbridled technological growth
(2) Importing plant machinery
(3) Sidelining environmental issues
(4) Lifting our people to a life of dignity

Answer: 4
The technological imperatives to lift our people to a new life, and to a life they are entitled to is important.
15. Envisioning a developed India requires :
(1) Aspiration to become a major economic player
(2) Dependence upon projects designed abroad
(3) Focus on short-term projects
(4) Development of core technological strengths

Answer: 4
Long-term strategies to develop core technological strengths within our industry are vital for envisioning a developed India.
16. Differentiation between acceptance and non-acceptance of certain stimuli in classroom communication is the basis of :
(1) selective expectation of performance
(2) selective affiliation to peer groups
(3) selective attention
(4) selective morality

Answer: 1
Selective expectation of performance from student based on the acceptance and non-acceptance of certain stimuli in classroom communication between teacher and student.
17. Assertion (A) : The initial messages to students in the classroom by a teacher need not be critical to establish interactions later.
Reason (R) : More control over the communication process means more control over what the students are learning. Code :
(1) Both (A) and (R) are true, and (R) is the correct explanation of (A).
(2) Both (A) and (R) are true, but (R) is not the correct explanation of (A).
(3) (A) is true, but (R) is false.
(4) (A) is false, but (R) is true.

Answer: 4
18. Assertion (A) : To communicate well in the classroom is a natural ability.
Reason (R) : Effective teaching in the classroom demands knowledge of the communication process. Code :
(1) Both (A) and (R) are true, and (R) is the correct explanation of (A).
(2) Both (A) and (R) are true, but (R) is not the correct explanation of (A).
(3) (A) is true, but (R) is false.
(4) (A) is false, but (R) is true.

Answer: 4
Here Assertion is false and Reason is true.
As good communication is not natural ability.
Effective teaching requires the knowledge of the communication process.
19. Assertion (A) : Classroom communication is a transactional process.
Reason (R) : A teacher does not operate under the assumption that students’ responses are purposive. Select the correct code for your answer :
(1) Both (A) and (R) are true, and (R) is the correct explanation of (A).
(2) Both (A) and (R) are true, but (R) is not the correct explanation of (A).
(3) (A) is true, but (R) is false.
(4) (A) is false, but (R) is true.

Answer: 3
Here Assertion is true and Reason is false.
because : A teacher operate under the assumption that students’ responses are purposive.
Classroom communication is a transactional process (interaction between people).
20. Which of the following set of statements is correct for describing the human communication process ? (a) Non-verbal communication can stimulate ideas.
(b) Communication is a learnt ability.
(c) Communication is not a universal panacea.
(d) Communication cannot break-down.
(e) More communication means more effective learning by students.
(f) Value of what is learnt through classroom communication is not an issue for students.
Code :
(1) (a), (c), (e) and (f)
(2) (b), (d), (e) and (f)
(3) (a), (b), (c) and (d)
(4) (a), (d), (e) and (f)

Answer: 3
code (e) is incorrect. So, the options without (e) is option 3 only.
21. The next term in the series −1, 5, 15, 29, ? , ... is :
(1) 36
(2) 47 (3) 59
(4) 63

Answer: 2
-1,(+6) 5,(+10) 15,(+14) 29,(+18) --> 47
Here, increments in numbers  +6, +10, +14, +18 forms an arithmetic progression(AP).

22. The next term in the series ABD, DGK, HMS, MTB, SBL, ? , ... is :
(1) ZKU
(2) ZCA (3) ZKW
(4) KZU

Answer: 3
ABD,(+3,+5,+7) DGK,(+4,+6,+8) HMS,(+5,+7,+9) MTB,(+6,+8,+10) SBL,(+7,+9,+11)--> ZKW 
23. If VARANASI is coded as WCUESGZQ, then the code of KOLKATA will be :
(1) LOQOZEH
(2) HLZEOOQ (3) ZELHOQO
(4) LQOOFZH

Answer: 4
VARANASI(+1,+2,+3,+4...)-> WCUESGZQ KOLKATA(+1,+2,+3,+4...) -->LQOOFZH
24. Introducing Rakesh to her husband a women said, “His brother’s father is the only son of my grandfather”. The woman is related to Rakesh as :
(1) Aunt
(2) Mother (3) Sister
(4) Daughter

Answer: 3
Women is sister of Rakesh
25. Two numbers are in the ratio 2 : 5. If 16 is added to both the numbers, their ratio becomes 1 : 2. The numbers are :
(1) 16, 40
(2) 20, 50 (3) 28, 70
(4) 32, 80

Answer: 4
Let  x : y = 2 : 5
then, (x+16) (y+16) = 1 : 2
So, y - 2x =16, which satisfied in option
(4) =>80 - (2*32) = 16

26. Superiority of intellect depends upon its power of concentration on one theme in the same way as a concave mirror collects all the rays that strike upon it into one point.
(1) Mathematical    
(2) Psychological    (3) Analogical   
(4) Deductive

Answer: 3
Analogy is a comparison between one thing and another, typically for the purpose of explanation or clarification
Here, To understand Superiority of intellect, the power concentration is compared to the concave mirro example
https://www.vocabulary.com/dictionary/analogical
27. Given below are two premises (A and B). Four conclusions are drawn from them. Select the code that states validity drawn conclusion (s) (taking the premises individually or jointly). Premises:
(A) Most of the dancers are physically fit.
(B) Most of the singers are dancers.
Conclusions:
(a) Most of the singers are physically fit.
(b) Most of the dancers are singers.
(c) Most of the physically fit persons are dancers.
(d) Most of the physically fit persons are singers.
Code:
(1) (a) and (b)
(2) (b) and (c)
(3) (c) and (d)
(4) (d) and (a)

Answer: 1
28. Which one among the following is a presupposition in inductive reasoning?
(1) Law of identity
(2) Unchangeability in nature
(3) Harmony in nature
(4) Uniformity of nature

Answer: 4
29. If the proposition ‘domestic animals are hardly ferocious’ is taken to be false, which of the following proposition/propositions can be claimed to be certainly true?
Select the correct code:
Propositions:
(a) All domestic animals are ferocious.
(b) Most of the domestic animals are ferocious.
(c) No domestic animal is ferocious.
(d) Some domestic animals are non-ferocious.
Code:
(1) (a) and (b)
(2) (a) only
(3) (c) and (d)
(4) (b) only

Answer: 3
30. Which one of the following statements is not correct in the context of Venn diagram method?
(1) It is a method of testing the validity of arguments.
(2) It represents both the premises of a syllogism in one diagram.
(3) It requires two overlapping circles for the two premises of a standard-form categorical syllogism.
(4) It can be used to represent classes as well as propositions.

The table below embodies data on the production, exports and per capita consumption of rice in country P for the five years from 2012 to 2016. Answer questions 31 - 35 based on the data contained in the table.
Year-wise Production, Exports and Per Capita Consumption of Rice
Year
Production (in million Kg)
Exports (in million kg)
Per Capita Consumption (in kg)
2012
186.5
114
36.25
2013
202
114
35.2
2014
238
130
38.7
2015
221
116
40.5
2016
215
88
42
Where, Per Capita Consumption=(Consumption in million kg) /(Population in million) and consumption (in million kg ) = Production - Exports
31. The Percentage increase in the consumption of rice over the previous year was the highest in which year?
(1) 2013
(2) 2014
(3) 2015
(4) 2016

Answer: 2
2013 (35.2 * 100 )/ 36.25 - 100 ==> -2.90
2014 (38.7 * 100 )/ 35.2 - 100 ==> +9.94
2015 (40.5 * 100 )/ 38.7 - 100 ==> +4.65
2016 (42 * 100 )/ 40.5 - 100 ==> +4.86
32. What is the population of the country in the year 2014 (in million)?
(1) 2.64
(2) 2.72
(3) 2.79
(4) 2.85

Answer: 3
Year 2014 Population (million)
= Consumption (million kg)/ Per Capita Consumption (in kg)
 = (Production - Exports)/ Per Capita Consumption (in kg)
 = 238-130 / 38.7 = 2.79
33. The ratio of exports to consumption in the given period was the highest in the year:
(1) 2012
(2) 2013
(3) 2014
(4) 2015

Answer: 1
consumption (in million kg )
= Production - Exports Export / consumption
2012: 114/(186.5-114) => 1.58
2013: 114/(202-114) => 1.29
2014: 130/(238-130) =>1.20
2015: 116/(221-116) =>1.10
2016: 88/(215-88) => 0.69
34. In which year, the population of country was the highest?
(1) 2013
(2) 2014
(3) 2015
(4) 2016

Answer: 4
Population (million)= (Production - Exports)/ Per Capita Consumption (in kg)
2012: => (186.5-114)/36.25 = 2
2013: => (202-114)/35.2 = 2.5
2014: => (238-130)/38.7 = 2.79
2015: => (221-116)/40.5 = 2.59
2016: => (215-88)/42 = 3.02
35. What is the average consumption of rice (in million kg) over the years 2012 - 2016?
(1) 104
(2) 102.1
(3) 108
(4) 100.1

Answer: 4
Average consumption = (total Production - total Exports) / 5
 = (1062.6 - 562) / 5
 = 100.1
36. Which of the following statements, regarding the term ICT is/are TRUE?
P: ICT is an acronym that stands for Indian Classical Technology.
Q: Converging technologies that exemplify ICT include the merging of audio-visual, telephone and computer networks through a common cabling system.
(1) P Only
(2) Q Only
(3) P and Q
(4) Neither P nor Q

Answer: 2
ICT: Information and communications technology
https://en.wikipedia.org/wiki/Information_and_communications_technology
37. A new Laptop has been produced that weighs less, is smaller and uses less power previous Laptop models. Which of the following technologies has been used to accomplish this?
(1) Universal Serial Bus Mouse
(2) Faster Random Access Memory
(3) Blu Ray Drive
(4) Solid State Hard Drive

Answer: 4
A solid-state drive (SSD) is a solid-state storage device that uses integrated circuit assemblies as memory to store data persistently. SSDs have no moving mechanical components. This distinguishes them from conventional hard disk drives (HDDs) or floppy disks (electromechanical drives).
https://en.wikipedia.org/wiki/Solid-state_drive
38. Given the following email fields, which of the email addresses will ‘swami’ be able to see when he receives the message?
To…
Cc…
raj@test.com; ravi@test.com
Bcc…
swami@test.com; rama@test.com
(1) ram@test.com
(2) ram@test.com; raj@test.com; ravi@test.com
(3) ram@test.com; rama@test.com
(4) ram@test.com; rama@test.com; raj@test.com; ravi@test.com

Answer: 2 BCC- blind carbon copy: BCC is similar to CC but To or Cc fields recipients will not know that a copy has also sent to BCC address Here swami@test.com is in BCC. Hence he will be able to see all To and CC recipients but they can't see the swami@test.com and rama@test.com
39. Put the following units of storage into the correct order, starting with the smallest unit first and going down to the largest unit:
(a) Kilobyte
(b) byte
(c) Megabyte
(d) Terabyte
(e) Gigabyte
(f) Bit
Give your answer from the following code:
(1) (f), (b), (a), (c), (d), (e)
(2) (f), (b), (a), (d), (e), (c)
(3) (f), (b), (a), (c), (e), (d)
(4) (f), (b), (a), (d), (c), (e)

Answer: 3
Bit < Byte(8 Bit) < Kilobyte(1024 Byte) < Megabyte(1024 Byte) < Gigabyte(1024 Byte) < Terabyte(1024 Byte)
40. With regard to computer memory, which of the following statement (s) is/are TRUE?
P: Read Only Memory (ROM) is ‘volatile’ memory.
Q: Random Access Memory (RAM) is ‘volatile’ memory.
R: Secondary Memory is ‘volatile’ memory.
(1) P only
(2) Q only
(3) P and Q only
(4) P and R only

Answer: 2
RAM is primary memory, which is much faster than any other memory type. RAM is volatile memory as its data gets wiped out when computer is shut off. Whereas non-volatile memory is memory which do not require any power to get retained e.g. Hard disk or memory card.
41. ‘Fly ash’ produced in thermal power plants is an ecofriendly resource for use in:
(a) agriculture as micro-nutrient
(b) wasteland development
(c) dam and water holding structures
(d) brick industry
Choose the correct answer from the code given below:
(1) (a), (b) and (d) only
(2) (b), (c) and (d) Only
(3) (a), (c) and (d) Only
(4) (a), (b), (c) and (d)

Answer: 4
Uses of fly ash in mine filling, construction of roads/ flyover embankments, hydraulic structures, raising of dykes, manufacture of several building components like bricks, blocks, tiles and use in agriculture.
Waste lands, degraded lands, saline alkaline soils, eroded soils etc., can be successfully reclaimed by fly ash.
http://www.wealthywaste.com/fly-ash-utilization-in-india
42. Which of the following types of natural disasters has no definite beginning and end?
(1) Earthquakes
(2) Landsides
(3) Hurricanes
(4) Droughts

Answer: 4
Drought is the correct answer for your question “which of the natural disaster has no definite beginning and end
https://brainly.in/question/4773333
43. Assertion (A): Indoor air pollution is serious hazard.
Reason (R): The dispersal of air pollutants is rather limited in indoor environment.
Choose the correct answer from the code given below:
(1) Both (A) and (R) are true and (R) is the correct explanation of (A)
(2) Both (A) and (R) are true and (R) is not the correct explanation of (A)
(3) (A) is true and (R) is false.
(4) Both (A) and (R) are false.

Answer: 1
Here, both A and R statements are correct. But the R doesn't explains anything related to the serious hazard due to Indoor air pollution.
44. In terms of their contribution to the total power generation in India, Identify the correct sequence of energy sources – Thermal Power Plants (TPP), Large Hydropower Projects (LHP), Nuclear Energy (NE) and Renewable Energy (RE) which includes solar energy, wind energy, biomass and small hydropower projects.
(1) TPP > RE > LHP > NE
(2) TPP > LHP > RE > NE
(3) LHP > TPP > RE > NE
(4) LHP > TPP > NE > RE

Answer: 1
Thermal 64.1%   
RES (Renewable Energy Sources) 20.8%
Hydro 13.1%
Nuclear 2.0%
https://powermin.nic.in/en/content/power-sector-glance-all-india
45. Which of the following is considered as major source of pollution in rivers of India?
(1) Unregulated small scale industry
(2) Untreated sewage
(3) Agricultural run-off
(4) Thermal power plants

Answer: 2
The largest source of water pollution in India is untreated sewage
Water bodies e.g. lake, river, ocean and ground water get contaminated due to discharge of pollutants in the water bodies without any treatment to remove harmful compounds.
https://www.commonfloor.com/guide/what-are-the-major-causes-of-water-pollution-in-india-27741.html
46. India has the largest Higher Education System in the World after:
(a) The United States of America
(b) Australia
(c) China
(d) United Kingdom (UK)
Select the correct answer from the code given below:
(1) (a), (b), (c) and (d)
(2) (a), (b) and (c) only
(3) (a), (c) and (d) only
(4) (a) and (c) only

Answer: 4
India's higher education system is the third largest in the world, next to the United States and China.
https://en.wikipedia.org/wiki/Higher_education_in_India
47. Prime Minister Research Fellowship is for students pursuing Ph. D programme in:
(1) State and Central Universities
(2) Central Universities, IISc, IITs, NITs, IISERs and IIITs
(3) IISc, IITs, NITs, IISERs, IIITs, State and Central Universities
(4) IITs and IISc

Answer:4
The Government of India is offering Prime Minister’s Research Fellowship Scheme for Doctoral Studies (PhD) in IITs and IISc aimed at attracting the best talent.
https://scholarship-positions.com/prime-minister-research-fellowship/2018/02/27/
48. Leader of the opposition is a member of committees which select:
(a) the central information Commissioner
(b) the Central Vigilance Commissioner
(c) the Chairperson of National Human Rights Commission
(d) the Chairperson of National Commission for women
Select the correct answer from the code given below:
(1) (a), (b), (c) and (d)
(2) (a), (b) and (c) only
(3) (a), (c) and (d) only
(4) (a), (b) and (d) only

Answer:2
49. Which of the following statements are correct about gender budgeting?
(a) It is separates budget addressing the specific needs of women.
(b) It assesses the impact of government budget on women.
(c) It is an accounting exercise.
(d) It is another budgeting innovation.
Select the correct answer from the code given below:
(1) (b) and (d) only
(2) (a) and (d) only
(3) (a), (c) and (d) only
(4) (a) and (b) only

Answer: 1
50. Which of the following are the barriers to citizen-centric administration in India?
(a) Wooden and inflexible attitude of the civil servants
(b) Ineffective implementation of laws and rules
(c) Awareness of rights and duties of citizens
(d) Lack of job opportunities for the youth
Select the correct answer from the code given below:
(1) (a), (b), (c) and (d)
(2) (a), (b) and (c) only
(3) (a), (b) and (d) only
(4) (a) and (b) only

Answer: 4

UGC NET Computer Science December 2019 | Question 16

Question 16 In a certain coding language. 'AEIOU' is written as 'TNHDZ'. Using the same coding language. 'BFJPV' wil...

Popular Posts