UGC NET Exam  >  UGC NET Tests  >  UGC NET Mock Test Series  >  UGC NET Paper 2 Computer Science Mock Test - 4 - UGC NET MCQ

UGC NET Paper 2 Computer Science Mock Test - 4 - UGC NET MCQ


Test Description

30 Questions MCQ Test UGC NET Mock Test Series - UGC NET Paper 2 Computer Science Mock Test - 4

UGC NET Paper 2 Computer Science Mock Test - 4 for UGC NET 2025 is part of UGC NET Mock Test Series preparation. The UGC NET Paper 2 Computer Science Mock Test - 4 questions and answers have been prepared according to the UGC NET exam syllabus.The UGC NET Paper 2 Computer Science Mock Test - 4 MCQs are made for UGC NET 2025 Exam. Find important definitions, questions, notes, meanings, examples, exercises, MCQs and online tests for UGC NET Paper 2 Computer Science Mock Test - 4 below.
Solutions of UGC NET Paper 2 Computer Science Mock Test - 4 questions in English are available as part of our UGC NET Mock Test Series for UGC NET & UGC NET Paper 2 Computer Science Mock Test - 4 solutions in Hindi for UGC NET Mock Test Series course. Download more important topics, notes, lectures and mock test series for UGC NET Exam by signing up for free. Attempt UGC NET Paper 2 Computer Science Mock Test - 4 | 100 questions in 120 minutes | Mock test for UGC NET preparation | Free important questions MCQ to study UGC NET Mock Test Series for UGC NET Exam | Download free PDF with solutions
UGC NET Paper 2 Computer Science Mock Test - 4 - Question 1

Which of the following is/are restriction(s) in classless addressing?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 4 - Question 1
In classless addressing :
  • The number of addresses needs to be a power of 2
  • The mask needs to be included in the address to define the block
  • The starting address must be divisible by the number of addresses in the block
D is answer.
UGC NET Paper 2 Computer Science Mock Test - 4 - Question 2

The RST 7 instruction in 8085 microprocessor is equivalent to

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 4 - Question 2

So, option (C) is correct answer.

UGC NET Paper 2 Computer Science Mock Test - 4 - Question 3

Which of the following tags is an extension to HTML that can enclose any number of Javascript statements?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 4 - Question 3

ans must be 1)SCRIPT

<script> 

document.getElementById("demo").innerHTML = "Hello JavaScript!"; 

</script>

rest options are part of a normal HTML document

UGC NET Paper 2 Computer Science Mock Test - 4 - Question 4

This set of Microprocessor Multiple Choice Questions & Answers (MCQs) focuses on “Numeric Processor 8087 -1”.

1. The unit that executes all the numeric processor instructions in 8087 is

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 4 - Question 4

The 8087 is divided into two sections namely control unit and numeric extension unit in which the numeric extension unit executes all the numeric processor instructions.

Hence the correct option is (C).

UGC NET Paper 2 Computer Science Mock Test - 4 - Question 5

Match the following TCP/IP protocols with their uses.

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 4 - Question 5

Answer --> a - iii, b - iv, c - i, d - ii

Explanation -

FTP (File Transfer Protocol) -> File Transfer
FTP is a protocol that is used for transferring files over a network. It is a standard protocol that is used for uploading and downloading files from a server to a client or vice versa.

TFTP (Trivial File Transfer Protocol) -> Trivial File Transfer
TFTP is a simplified version of FTP that is used for transferring small files over a network. It is a lightweight protocol that does not provide authentication or encryption.

Telnet -> Remote Login
Telnet is a protocol that is used for remote login to a server or a networking device. It enables a user to access and control a remote computer over a network connection.

UDP (User Datagram Protocol) -> Send Datagram
UDP is a protocol that is used for sending datagrams over a network. It is a connectionless protocol that does not provide any reliability or error checking. It is commonly used for applications that require the fast transmission of data, such as online gaming and video streaming.

UGC NET Paper 2 Computer Science Mock Test - 4 - Question 6

The Boolean expression for the output f of the multiplexer shown below is

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 4 - Question 6

Concept:

The given circuit is Multiplexer.

Multiplexers:

It is a combinational circuit that has many data inputs and single output depending on control or select inputs.​ For N input lines, log n (base2) selection lines, or we can say that for 2n input lines, n selection lines are required. Multiplexers are also known as “Data n selector, parallel to serial convertor, many to one circuit, universal logic circuit​”.

Hence the correct answer is a⊙b⊙c.

UGC NET Paper 2 Computer Science Mock Test - 4 - Question 7
A signal of 5 kHz is used to modulate a carrier of frequency 1 MHz using amplitude modulation. The frequencies of side bands will be:
Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 4 - Question 7

Answer: Option 3

Explanation:

Fm = 5 kHz

carrier frequency Fc = 1 MHz ≡ 1000 kHz
(fc+fm) and(fc−fm) are called sideband frequencies.

(1000+ 5) and (1000 - 5 ) are sideband frequencies.

1005 kHz and 995 kHz

and 1.005 Mhz and 0.995 Mhz

UGC NET Paper 2 Computer Science Mock Test - 4 - Question 8
What is the process of determining whether the output of one phase of software development conforms to that of its previous phase?
Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 4 - Question 8
  • Verification and validation techniques are very similar since both these techniques are designed to help remove errors in a software
  • In spite of the apparent similarity between their objectives, the underlying principles of these two bug detection techniques and their applicability are very different
  • Verification is the process of determining whether the output of one phase of software development conforms to that of its previous phase
  • Validation is the process of determining whether a fully developed software conforms to its requirements specification
UGC NET Paper 2 Computer Science Mock Test - 4 - Question 9
Which of the following is an example of unsupervised neural network?
Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 4 - Question 9

A self-organizing map:

  • It is a type of artificial neural network (ANN) that is trained using unsupervised learning to produce a low-dimensional (typically two-dimensional), discretized representation of the input space of the training samples, called a map, and is therefore a method to do dimensionality reduction.
  • Self-organizing maps differ from other artificial neural networks as they apply competitive learning as opposed to error-correction learning (such as backpropagation with gradient descent), and in the sense that they use a neighbourhood function to preserve the topological properties of the input space.
UGC NET Paper 2 Computer Science Mock Test - 4 - Question 10

A local area network operates Ethernet with CSMA/CD mechanism and runs at a transmission rate of 8 Mbps and a one-way signal propagation time of 25 μs. How long (us) has a station to wait before trying to access the channel again, after experiencing 5 successively collisions?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 4 - Question 10

The correct answer is 1600

EXPLANATION:

In a CSMA/CD (Carrier Sense Multiple Access with Collision Detection) network, after a collision, the station needs to wait for a certain amount of time before attempting to transmit again. This waiting time is determined using the exponential backoff algorithm.

The formula for calculating the backoff time is as follows:

where

In Ethernet, the slot time is typically considered to be twice the maximum one-way signal propagation time.

Given:

  • Transmission rate = 8 Mbps
  • One-way signal propagation time = 25 μs

Let's calculate the slot time:

  • Slot time=2×25μs=50μs

Now, after 5 successive collisions, the value of K would be in the range of 0 to  (as per Ethernet standard).

So, the maximum backoff time would be :

Therefore, the answer is 4) 1600.

UGC NET Paper 2 Computer Science Mock Test - 4 - Question 11
Consider the schema R = (S T U V) and the dependencies S → T, T → U, U → V and V → S. Let R = (R1 and R2). be a decomposition such that R1 ∩ R2 = ϕ The decomposition is
Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 4 - Question 11

The correct answer is in both 2 NF and 3 NF

Key PointsIn the given schema R = (S, T, U, V) with dependencies S → T, T → U, U → V, and V → S, every attribute is functionally dependent on another, creating a cyclic dependency. This construct forms an unusual scenario not typically encountered in straight-forward normalization discussions.

  • Analysis Based on Normalization Forms:
    • 2NF (Second Normal Form) checks for partial dependencies, meaning that non-prime attributes (those not part of a candidate key) should not depend on just a part of any candidate key. In this case, since every attribute appears to depend on another in a circular manner, and no single attribute can be considered partially dependent on any candidate key (assuming each attribute by itself forms a single attribute candidate key due to the cyclic dependency), the schema by a strict interpretation could be considered in 2NF.
    • 3NF (Third Normal Form) concerns itself with transitive dependencies, where a non-prime attribute is dependent on another non-prime attribute. Given the direct dependency of each attribute on another in a cyclic form, there are no clear transitive dependencies in the traditional sense where one non-prime attribute depends on another non-prime attribute through a third attribute. Each attribute’s dependency is direct and not through another non-prime attribute.
  • Conclusion: In a simplified explanation, considering the unique cyclic dependency scenario provided, it can be reasonably argued that the schema is in both 2NF and 3NF because it does not exhibit the partial or transitive dependencies that 2NF and 3NF respectively seek to eliminate. Each attribute’s dependency is direct and forms a closed loop, not easily fitting into the typical scenarios of violation for these normalization forms.

Note: The assumption here is based on classical definitions of 2NF and 3NF, and the unique circular dependency pattern doesn't squarely fit traditional examples of normalization form violations, leading to the conclusion of being in both 2NF and 3NF (Option 4).

UGC NET Paper 2 Computer Science Mock Test - 4 - Question 12

If S = {a, b, c, d) and p = {(a, a), (b, b), (c, c), (d, d), (a, b), (b, a),(b, c), (c, b)}, then p is-

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 4 - Question 12

Reflexive Relation :A Relation R defined on set A is said to be reflexive, if (x, x) ∈ R, x ∈ A ,i.e xRx, ∀ x,y ∈ A

Here define Relation p = {(a, a), (b, b), (c, c), (d, d), (a, b), (b, a), (b, c), (c, b).

If a relation is reflexive, then (a, a) ∈ R for every a ∈ {a, b, c, d}

Since (a, a) ∈ R ,(b, b) ∈ R,(c, c) ∈ R, (d, d) ∈ R

So, R is reflexive.

Check Symmetric

Symmetric Relation: A Relation R is defined on set A is said to be symmetric, if (x, y)  R ⇒ (y, x)R

To check symmetric,

If (a, b) ∈ R, Then (b, a) ∈ R

Since(a, b) ∈ R and (b, a) ∈ R also (b ,c) ∈ R and (c, b) ∈ R

So, R is reflexive and symmetric.

Additional Information
Transitive Relation: A Relation R defined on set A is said to be transitive if (x, y) ∈ R , (y, z) ∈ R ⇒ (x, z) ∈ R ∀ x,y,z ∈ A.

If (a, b) ∈ R, (b, a) ∈ R since (a, c) ∉ R

so, R is not transitive Relation.

If R is satisifed all the condition of Equivalence then the R Relation be the Equivalence Otherwise not.

UGC NET Paper 2 Computer Science Mock Test - 4 - Question 13

Which of the following is Not a NP Complete problem?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 4 - Question 13

Key Points

NP-Complete problem:

Following are some NP-Complete problems, for which no polynomial-time algorithm is known. Determining whether a graph has a Hamiltonian cycle Determining whether a Boolean formula is satisfiable, etc.

  • Hamiltonian-Cycle problem
  • The Travelling Salesman Problem
  • The Clique problem

The above algorithms are not feasible under polynomial-time algorithm problems.

For Shortest Path Problem you can use Dijkstra's algorithm. With a normal binary heap, this gives you a time complexity of O((E + V) log V). With a Fibonacci heap, this can be improved to O(E + V log V), which is faster for dense graphs.

Hence the correct answer is Shortest Path Problem.

UGC NET Paper 2 Computer Science Mock Test - 4 - Question 14

Consider the following student relation.

Student relation has Name, Subject1_Marks, and Subject2_Marks attributes.

Query1:

Select count (*)

From student;

Query2:

Select count (10)

From student;

Query1 prints the Q1 and Query2 prints Q2. Which of the following condition is true?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 4 - Question 14

The correct answer is option 4.

Concept:

Count():

It takes one set of values and gives one output. The COUNT() function returns the number of records returned by a select query.

Note: NULL values are not counted.

Syntax:

COUNT(expression)

Explanation:

The given table is,

Consider the following student relation.

Student relation has Name, Subject1, and Subject2 attributes.

Query1:

Select count (*)

From student;

Explanation:

The query1 has count(*) prints the number of rows that are not null. Here no complete row is null. So it prints the 6 as output.

Query2:

Select count (10)

From student;

Explanation:

Note:

Count(constant) prints the number of rows in a relation.

The query2 has count(10) prints the number of rows that are not null. Here no complete row is null. So it prints the 6 as output.

Hence the correct answer is Q1=Q2.

UGC NET Paper 2 Computer Science Mock Test - 4 - Question 15

Consider the following relation.

Student(Rno, name, Branch, Year)

What is the output for the given query?

Query:

Select distinct branch

from student ;

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 4 - Question 15

The correct answer is option 1.

Concept:

Distinct Clause:

By default, SQL shows all the data retrieved through query as output. However, there can be duplicate values. The SELECT statement when combined with the DISTINCT clause returns records without repetition (distinct records).

The given data,

Student(Rno, name, Branch, Year)

Query:

Select distinct branch

from student ;

Step 1:

It selects all the rows in the student table.

Step 2:

DISTINCT clause returns records without repetition Which means distinct records in the attribute branch so it prints only CSE, IT, and ME as output.

Hence the correct answer is option 1.

UGC NET Paper 2 Computer Science Mock Test - 4 - Question 16

Relation R has eight attributes ABCDEFGH. Fields of R contain only atomic values.

F={CH→G, A→BC, B→CFH, E→A, F→EG} is a set of functional dependencies (FDs) so that F+ is

exactly the set of FDs that hold for R.

The relation R is

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 4 - Question 16

In R(ABCDEFGH), left-hand side of FD has attributes: {G, B, C, F, H, A, E, G}

Since it doesn't contain D we cannot derive it unless it is the present right-hand side.

(AD)+ = {A,D, B, C, F, H, G, E }

Since all the 8 attributes are present, AD is a candidate key

(BD)+ = {B, D, C, F, H, G, E, A }

Since all the 8 attributes are present, BD is a candidate key

(ED)+ = {E, D, A, B, C, F, H, G }

Since all the 8 attributes are present, ED is a candidate key

(FD)+ = {F, D, E, G, A, B, C, H }

Since all the 8 attributes are present, FD is a candidate key

The non-prime attributes are dependent on a partial candidate key.

A → BC ---(A → C)
B → CFH ---((B → H)
F → EG ----(F → G)

Therefore it is in 1NF but not in 2 NF

UGC NET Paper 2 Computer Science Mock Test - 4 - Question 17

The appropriate entries for E1 is

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 4 - Question 17

FIRST and FOLLOW:

Parsing Table:

Hence the answer is

E1: S → aAbB, S → ε

UGC NET Paper 2 Computer Science Mock Test - 4 - Question 18

Which of the following statements is False?

Statement 1: A single deque can support both stack and queue operations.

Statement 2: A single stack can support both deque and queue operations.

Statement 3: A single queue can support both stack and queue operations.

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 4 - Question 18

The correct answer is option 3.

Concept:

Statement 1: A single deque can support both stack and queue operations.

True, The word deque, usually pronounced deck, is short for double-ended queue. A deque is a list that supports insertion and removal at both ends. Thus, a deque can be used as a queue or as a stack.

  • A deque elements insertion and deletion are done from only one end so it follows the stack property(First in Last out).
  • A deque elements insertions are done from only one end and deletion is done from another end. so it follows the queue property(Last in first out).

Statement 2: A single stack can support both deque and queue operations.

False, A stack can not supports the deque and queue operations because it has the restriction that insertion and deletion are done from only one end.

Statement 3: A single queue can support both stack and queue operations.

False, A queue can not supports the deque operations because it has the restriction that insertion on one end and deletion is done from another end.

Hence the correct answer is only statement 2 and statement 3.

UGC NET Paper 2 Computer Science Mock Test - 4 - Question 19
600 characters per minute with 11­bit format has a transfer rate of ________.
Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 4 - Question 19

The correct answer is option 1.

Concept:

The given data,

The time taken for 600 characters = 1 minute.

i.e 60 seconds =600 characters.

1 second= 600/ 60 characters per second.

1 second =10 characters per second.

Note:

The baud rate is the rate at which information is transferred in a communication channel.

If one character stores in eleven bit then the transfer time of 11 bit is=?

11 bits = 11x time taken each bit

11 bits= 11 x 10 bauds

11 bits=110 bauds.

Hence the correct answer is 110 bauds.

UGC NET Paper 2 Computer Science Mock Test - 4 - Question 20

Consider a network with 5 routers A, B, C, D and E as shown below.

All the routers use the distance vector routing algorithm to update their routing tables. The cost of link D - E reduces to 1. After the next round of updates, what will be the new distance vector at router E?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 4 - Question 20

After reducing the cost of link D - E to 1, a routing table for Router E:

UGC NET Paper 2 Computer Science Mock Test - 4 - Question 21

The height of a tree is the length of the longest root-to-leaf path in it. The maximum and the minimum number of nodes in a binary tree of height 5 are:

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 4 - Question 21
The height of a tree is the length of the longest root-to-leaf path in it. The maximum and the minimum number of nodes in a binary tree of height 5 are respectively 64 and 5.

Calculating minimum and maximum number of nodes from height:

If binary search tree has height h, minimum number of nodes is h+1.

If binary search tree has height h, maximum number of nodes will be when all levels are completely full. Total number of nodes will be = 2(h+1) - 1.

Now,

maximum number of nodes = 2(h+1)-1 = 26-1 = 63

minimum number of nodes = h+1 = 5+1 = 6

So, the maximum and the minimum number of nodes in a binary tree of height 5 are respectively 63 and 6.

UGC NET Paper 2 Computer Science Mock Test - 4 - Question 22

What is an ‘agent’?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 4 - Question 22
An agent is anything that can be viewed as perceiving and acting upon the environment through the sensors and actuators. Mean it takes input from its environment through sensors, performs the operation and gives output through actuators. 

AI assistants, like Alexa and Siri, are examples of intelligent agents as they use sensors to perceive a request made by the user and automatically collect data from the internet without the user's help. They can be used to gather information about its perceived environment such as weather and time.

UGC NET Paper 2 Computer Science Mock Test - 4 - Question 23

Which of the following is page fault?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 4 - Question 23
Page fault occurs when a program accesses a page which is not present in main memory.

If the referred page is not present in the main memory, then there will be a miss, and the concept is called Page miss or page fault. The CPU has to access the missed page from the secondary memory. If the number of page fault is very high, then the effective access time of the system will become very high.

UGC NET Paper 2 Computer Science Mock Test - 4 - Question 24

If any intensity input value near 0.33 would be stored as the binary value 1 in the frame buffer, then it displays-

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 4 - Question 24
The intensity value is 0.0 and 1 for black white respectively, and it is 0.33 for dark gray and 0.67 for light gray.

  • Binary images are images whose pixels have only two possible intensity values. They are normally displayed as black and white. Numerically, the two values are often 0 for black, and either 1 or 255 for white.
  • Binary images are often produced by thresholding a grayscale or color image, in order to separate an object in the image from the background.
  • The color of the object (usually white) is referred to as the foreground color. The rest (usually black) is referred to as the background color.
  • However, depending on the image which is to be thresholded, this polarity might be inverted, in which case the object is displayed with 0 and the background is with a non-zero value.

UGC NET Paper 2 Computer Science Mock Test - 4 - Question 25

Which of the following is true in Statistical reasoning?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 4 - Question 25
Statistical reasoning is the representation is extended to allow some kind of numeric measure of certainty to be associated with each statement. Much of statistical reasoning combines ideas about data and chance, which leads to making inferences and interpreting statistical results. Underlying this reasoning is a conceptual understanding of important ideas, such as distribution, center, spread, association, uncertainty, randomness, and sampling.
UGC NET Paper 2 Computer Science Mock Test - 4 - Question 26

The "turn-around" time of a user job is the:

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 4 - Question 26
The "turn-around" time of a user job is the total time taken to execute the job. In computing, turnaround time is the total time taken between the submission of a program/process/thread/task (Linux) for execution and the return of the complete output to the customer/user. It may vary for various programming languages depending on the developer of the software or the program. Turnaround time may simply deal with the total time it takes for a program to provide the required output to the user after the program is started.
UGC NET Paper 2 Computer Science Mock Test - 4 - Question 27

If the angle between 2 connected line segments is very small then ________ can generate a long spike that distorts the appearance of the polyline.

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 4 - Question 27

If the angle between 2 connected line segments is very small then, Miter join can generate a long spike that distorts the appearance of the polyline. It causes the outside corner of the stroke to come to a sharp point. In computer graphics, a point of intersection between two strokes in which the joining comes to a point, but an angle is limited, as at the top of some typefaces, such as the capital letter "A" in Palatino: a

UGC NET Paper 2 Computer Science Mock Test - 4 - Question 28

The Flag ‘V’ is set to 1 indicates that _____________.

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 4 - Question 28

This is used to check the overflow that occurs in the operation. In computer processors, the overflow flag (sometimes called the V flag) is usually a single bit in a system status register used to indicate when an arithmetic overflow has occurred in an operation, indicating that the signed two's-complement result would not fit in the number of bits used for the result. Some architectures may be configured to automatically generate an exception on an operation resulting in overflow.

UGC NET Paper 2 Computer Science Mock Test - 4 - Question 29

Which algorithm is used to solve any kind of problem?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 4 - Question 29

Tree algorithm is used to solve any kind of problem because specific variants of the algorithm embed different strategies. Much of the work on search in artificial intelligence deals with trees. These are usually defined implicitly by a so-called problem representation, and the process of searching for a solution of the given problem can be represented by a search tree (more generally an acyclic graph, because of transpositions).

UGC NET Paper 2 Computer Science Mock Test - 4 - Question 30

Given an unsorted array. The array has this property that every element in array is at most k distance from its position in sorted array where k is a positive integer smaller than size of array. Which sorting algorithm can be easily modified for sorting this array and what is the obtainable time complexity?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 4 - Question 30

To sort the array firstly create a min-heap with first k+1 elements and a separate array as resultant array. 2) because elements are at most k distance apart from original position so, it is guranteed that the smallest element will be in this K+1 elements. 3) remove the smallest element from the min-heap(extract min) and put it in the result array. 4) Now,insert another element from the unsorted array into the mean-heap, now,the second smallest element will be in this, perform extract min and continue this process until no more elements are in the unsorted array.finally, use simple heap sort for the remaining elements Time Complexity ------------------------ 1) O(k) to build the initial min-heap 2) O((n-k)logk) for remaining elements... 3) 0(1) for extract min so overall O(k) + O((n-k)logk) + 0(1) = O(nlogk).

View more questions
92 docs|125 tests
Information about UGC NET Paper 2 Computer Science Mock Test - 4 Page
In this test you can find the Exam questions for UGC NET Paper 2 Computer Science Mock Test - 4 solved & explained in the simplest way possible. Besides giving Questions and answers for UGC NET Paper 2 Computer Science Mock Test - 4, EduRev gives you an ample number of Online tests for practice
Download as PDF