Thursday, 8 January 2015

2014 Computer Science UGC NET Answer

UGC NET Computer Science Paper-III Set No.D8714 of December 2014

6. Specify the contents of the accumulator and the status of the S, Z and CY flags when 8085 microprocessor performs addition of 87 H and 79 H.
Ans. B- 10, 0, 1, 0

7. Location transparency allows:
I) Users to treat the data as if it is done at one location.
II) Programmers to treat the data as if it is at one location.
III) Managers to treat the data as if it is at one location.
Ans. A- I, II and III

10. Let R = ABCDE is a relational scheme with functional dependency set F = {AàB, BàC, ACàD}. The attribute closures of A and E are
Ans. B- ABCD, E

12. Which of the following is false?
Ans. A- Every binary relation is never be in BCNF.

15. A technique used to approximate halftones without reducing spatial resolution is known as ___.
Ans. B- Dithering

19. Consider the following statements S1, S2 and S3.
S1: In call-by-value, anything that is passed into a function call is unchanged in the caller’s scope when the function returns.
S2: In call-by-reference, a function receives implicit reference to a variable used as argument.
S3: In call-by-reference, caller is unable to see the modified variable used as argument.
Ans. C- S2 and S1 are true

20. How many tokens will be generated by the scanner for the following statement?
x = x * (a+b) – 5;
Ans. B- 11

23. Given two languages:
L1 = {(ab)n ak | n > k, k > 0}
L2 = {an bm | n ≠m}
Using pumping lemma for regular language, it can be shown that
Ans. D- L1 is not regular and L2 is not regular.

25. For n devices in a network, ____ number of duplex-mode links are required for a mesh topology
Ans. D- n(n – 1)/2

26. How many characters per second (7 bits + 1 parity) can be transmitted over a 3200 bps line if the transfer is asynchronous? (Assuming 1 start bit and I stop bit and I stop bit)
Ans. B- 320

27. Which of the following is not a field in TCP header?
Ans. B- Fragment offset

29. _____ is a bit-oriented protocol for communication over point-to-point and multipoint links.
Ans. B- HDLC

30. Which one of the following is true for asymmetric key cryptography?
Ans. A- Private key is kept by the receiver and public key is announced to the public.

32. Match the following:
List-I
a) Bucket sort
b) Matrix chain multiplication
c) Huffman codes
d) All pairs shortest paths

List-II
i) O(n3/gn
ii) O(n3)
iii) O(n/gn)
iv) O(n)
Ans. C


The above questions came in the UGC NET Examination which was held on 28th December 2014. We have provided the answer keys for some of the questions. The answer keys for the rest of the questions of UGC NET Computer Science shall be provided very soon.


For the expertised coaching of UGC NET Computer Science Paper I, II and III, join Mantram Study Group.

No comments:

Post a Comment