UGC NET Exam  >  UGC NET Tests  >  UGC NET Mock Test Series  >  UGC NET Paper 2 Computer Science Mock Test - 9 - UGC NET MCQ

UGC NET Paper 2 Computer Science Mock Test - 9 - UGC NET MCQ


Test Description

30 Questions MCQ Test UGC NET Mock Test Series - UGC NET Paper 2 Computer Science Mock Test - 9

UGC NET Paper 2 Computer Science Mock Test - 9 for UGC NET 2025 is part of UGC NET Mock Test Series preparation. The UGC NET Paper 2 Computer Science Mock Test - 9 questions and answers have been prepared according to the UGC NET exam syllabus.The UGC NET Paper 2 Computer Science Mock Test - 9 MCQs are made for UGC NET 2025 Exam. Find important definitions, questions, notes, meanings, examples, exercises, MCQs and online tests for UGC NET Paper 2 Computer Science Mock Test - 9 below.
Solutions of UGC NET Paper 2 Computer Science Mock Test - 9 questions in English are available as part of our UGC NET Mock Test Series for UGC NET & UGC NET Paper 2 Computer Science Mock Test - 9 solutions in Hindi for UGC NET Mock Test Series course. Download more important topics, notes, lectures and mock test series for UGC NET Exam by signing up for free. Attempt UGC NET Paper 2 Computer Science Mock Test - 9 | 100 questions in 120 minutes | Mock test for UGC NET preparation | Free important questions MCQ to study UGC NET Mock Test Series for UGC NET Exam | Download free PDF with solutions
UGC NET Paper 2 Computer Science Mock Test - 9 - Question 1

Consider the following statements related to compiler construction.

I. Lexical analysis is specified by context free grammar and implemented by pushdown automata.

II. Syntax analysis is specified by regular expressions and implemented by finite-state machine.

Which of the above statements is/are correct?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 9 - Question 1

Both statement are wrong becoz lexical analyser uses finite autometa so it uses regular grammer ,whose expression will be for example letter(letter + digit )*  , where as syntax tree uses context free grammer which uses pda.

UGC NET Paper 2 Computer Science Mock Test - 9 - Question 2

Which of the following things are considered to be very important to design the algorithm.

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 9 - Question 2

Modularity of program,Maintainability, Security are important to design the algorithm.

UGC NET Paper 2 Computer Science Mock Test - 9 - Question 3

Match the following.

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 9 - Question 3

(X’)’ = X involution law.

X + Y)’=X’.Y’ De Morgan Law

X(X+Y) = X + XY = X Absorption law

X + YZ = (X +Y) (X+Z) Distributive law

UGC NET Paper 2 Computer Science Mock Test - 9 - Question 4

If an image has a height of 4 inches and an aspect ratio of 3 : 2, then what will be the width of the image?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 9 - Question 4

Key Points
3 : 2 aspect ratio means that for every 3 units of width, there are 2 units of height.

The same applies to the 6 : 4 aspect ratio - for every 6 units of width, there are 4 units of height.

The formula for finding aspect ratio is:

AR = W / H

Where:

AR is the aspect ratio

W is the width of the displayed image

H is the height of the displayed image

Note that W and H are measured in inches or millimeters.

Hence the correct answer is 6 inches.

UGC NET Paper 2 Computer Science Mock Test - 9 - Question 5
Consider a triangle with co-ordinates points: A(0, 0), B(3, 3) and C(2, 5). When scaling parameter is 2 towards x-axis and 4 towards y-axis, then what are the new co-ordinates of triangle?
Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 9 - Question 5

The correct answer is A(0, 0), B(6, 12), C(4, 20)

Key Points

  • We know that to scale a point in the x-axis direction, we multiply its x-coordinate by the scaling factor, and to scale a point in the y-axis direction, we multiply its y-coordinate by the scaling factor. So, to find the new coordinates of the triangle after scaling it by a factor of 2 in the x-axis direction and 4 in the y-axis direction, we can apply these transformations to each point:
  • For point A(0, 0):
    • Scaling in x-axis direction: 0 * 2 = 0
    • Scaling in y-axis direction: 0 * 4 = 0
    • The new coordinates of point A are (0, 0).
  • For point B(3, 3):
    • Scaling in x-axis direction: 3 * 2 = 6
    • Scaling in y-axis direction: 3 * 4 = 12
    • The new coordinates of point B are (6, 12).
  • For point C(2, 5):
    • Scaling in x-axis direction: 2 * 2 = 4
    • Scaling in y-axis direction: 5 * 4 = 20
    • The new coordinates of point C are (4, 20).
  • Hence, the new coordinates of the triangle after scaling are A(0, 0), B(6, 12), and C(4, 20).
UGC NET Paper 2 Computer Science Mock Test - 9 - Question 6
Let E1 and E2 be two entities in an E/R diagram with simple single-valued attributes. R1 and R2 are two relationships between E1 and E2, where R1 is one-to-many and R2 is many-to-many. R1 and R2 do not have any attributes of their own. What is the minimum number of tables required to represent this situation in the relational model?
Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 9 - Question 6

The correct answer is option 1.

Concept:

ER Diagram stands for Entity Relationship Diagram, also known as ERD is a diagram that displays the relationship of entity sets stored in a database. In other words, ER diagrams help to explain the logical structure of databases. ER diagrams are created based on three basic concepts: entities, attributes and relationships.

Note:

Minimum number of tables between two entities. Suppose R is relation between two entities E1 and E2 with some cardinality ratio like,

cardinality ratio one to one:

2 tables,

  • E1R, E2 or
  • E1, E2R

cardinality ratio one to many:

2 tables,

  • E1, E2R

cardinality ratio many to one:

2 tables,

  • E1R, E2

cardinality ratio many to many:

3 tables,

  • E1, E2, R

Given data,

Only three table are requried,

  • E2 R1
  • E1
  • R2

Hence the correct answer is 3.

UGC NET Paper 2 Computer Science Mock Test - 9 - Question 7

Which of the following basic steps are needed in order to perform a memory read operation?

1. The address of the location from which the word is to be read is loaded into the memory address register (MAR).

2. A signal, called read (issued by the CPU indicating that the word whose address is in the MAR) is to be read into the MDR.

3. Corresponding to the memory delay in reading the specified word, the required word will be loaded by the memory into the MDR ready for use by the CPU.

Select the correct answer using the code given below.

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 9 - Question 7

Memory Address Register:

  • Memory Address Register is the CPU register that either stores the memory address from which data will be fetched to the CPU or the address to which data will be sent and stored. (statement 1 is correct)
  • In other words, MAR holds the memory location of data that needs to be accessed.
  • MAR holds the address of the current instruction that is to be fetched from memory or the address in the memory to which data is to be transferred.

Memory Data Register:

  • Memory Data Register is the register in a computer's CPU that stores the data being transferred to and from the immediate access storage.
  • In other words, MDR is the register used for holding information that is in the process of being transferred from the memory to the central processor or vice versa.
  • MDR holds the contents found at the address held in the MAR or data which is to be transferred to primary memory.
UGC NET Paper 2 Computer Science Mock Test - 9 - Question 8

How many minimum number of states will be there in the DFA (over the alphabet {a, b}) accepting all the strings with the number of a’S divisible by 4 and number of b’S divisible by 5?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 9 - Question 8

This question can be solved using Generalization, in your high school mathematics u must have studied AND resemble to *, same thing happens with DFA ,

if a's divisible by x and b's divisible by y , then DFA will have minimum xy states , but REMEMBER , this is not valid in case of NFA .
In Theory of computation it can be proved by "MYHILL NERODE THEORAM", but that is time consuming to do in the exam.
If in case of 'AND " , OR is given in the question , then draw the two DFA and check , do not apply the + logic for OR .
So, here 5*4=20 (option a will be the answer )

UGC NET Paper 2 Computer Science Mock Test - 9 - Question 9
Which of the following is INCORRECT with respect to a primary key in an RDBMS?
Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 9 - Question 9

Concept

A primary key is a special relational database table column (or combination of columns) designated to uniquely identify each table record.

A primary key is used as a unique identifier to quickly parse data within the table. A table cannot have more than one primary key.

A primary key’s main features are:

  • It must contain a unique value for each row of data.
  • It cannot contain null values.
  • Every row must have a primary key value.
UGC NET Paper 2 Computer Science Mock Test - 9 - Question 10

Mark is interviewing for the role of a database developer. To help with the revisions, he made himself a quiz. Help him answer the questions.

The default format for the DATE datatype in MySQL is:

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 9 - Question 10

Correct answer: Option 4

Explanation:

  • The DATE data type is used for storing a date in database tables. The supported dates range from 1000-01-01 to 9999-12-31.
  • The default format of this data type is the 4-digit year, followed by 2-digit month and 2-digit day. The 3 values are separated by hyphens (-).

Important points:

  • The default format can be changed using the date_format method. The first parameter in this function is the date value and the second parameter is a string specifying the required format.
  • For example, select date_format(curdate(), ‘%d.%m.%Y’); prints the current date in a DD.MM.YYYY format.

UGC NET Paper 2 Computer Science Mock Test - 9 - Question 11
The multiplicative group {1, -1, i, -i} is a cyclic group, its generators are
Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 9 - Question 11

Given:

G = {1, -1, i, -i} is a cyclic group of order 4.

⇒ o(a) = o(G)

Evidently;

⇒ i = i, i2 = -1, i3 = -i, i4 = 1

Here identity element e of G is 1.

Thus, i4 = 1and -14 = 1 i.e ir ≠ 1 for Any r < 1.

This → o(i) = 4 = o(G)

⇒ i and -i are the generator of G.

UGC NET Paper 2 Computer Science Mock Test - 9 - Question 12

There are n jobs are waiting in the ready queue and the CPU uses a non-preemptive shortest job first scheduling algorithm. what is the time complexity of the shortest job first algorithm when jobs are non-preemptive in nature?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 9 - Question 12

Concept:

Shortest Job First (SJF):

Shortest Job First (SJF) is an algorithm in which the process having the smallest execution time is chosen for the next execution. This scheduling method can be preemptive or non-preemptive. It significantly reduces the average waiting time for other processes awaiting execution. The full form of SJF is Shortest Job First.

Non-Preemptive SJF:

In non-preemptive scheduling, once the CPU cycle is allocated to process, the process holds it till it reaches a waiting state or is terminated.

Algorithm:

  • Start with sorting all the processes based on their time of arrival at the processor.
  • Then select the earliest arriving process with the shortest burst time.
  • While executing the current process, all the waiting processes are pushed in the waiting queue, and when the current process ends, choose the process with the shortest burst time among the waiting processes.

Analysis:

Shortest Job First uses Insert and Extract-Min operations. Both the Insert and the Extract-Min operations have a running time of O(log n). There are n tasks and each task has to be inserted into the heap and later extracted from the heap, resulting in a running time of O(n 2 log n).

Insert has an O(log n) running time because we first add the new job to the heap's final position when inserting.

  • This does not guarantee that the heap property is preserved, because the priority of the new task may be higher than the priority of its parent. This is why the Insert operation includes the Heapify-Up method, which restores heap order. The Heapify-Up operation takes O minutes to complete (log n).

The Extract-Min operation takes O(log n) time because it deletes the heap's root first and then moves the final task to the first slot.

  • The Extract-Min process includes the execution of the Heapify-Down procedure, which may violate the heap property. The Heapify-Down operation takes O seconds to complete (log n).

The time complexity of this algorithm is O(N* 2* log(N)).

Hence the correct answer is O(n log n).

UGC NET Paper 2 Computer Science Mock Test - 9 - Question 13
Let R is a relation schema and X, Y ⊆ R. "If Y ⊆ X, then X → Y" represents which of the following inference rules?
Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 9 - Question 13

The correct answer is option 2.

Concept:

Let us consider X, Y, and Z are sets of attributes in a relation to R.

Reflexive Functional Dependencies:

Let R be a relation scheme and let X ⊆ R and Y ⊆ R. We say that a relation instance r(R) satisfies a functional dependency X → Y if for every pair of tuples t1 ∈ r and t2 ∈ r if t1[X] = t2[X] then t1[Y ] = t2[Y ]. (or)

Reflexivity:

If X is a set of attributes, and Y is a set of attributes that are completely contained in X, then X implies Y.

If Y is a subset of X, then X → Y

Example:

Mobile, Name →Name

Augmentation:

If X implies Y, and Z is a set of attributes, then if X implies Y, then XZ implies YZ.

If X → Y, then XZ → YZ

Example:

Id→Name then Id, address→Name, address

Transitivity:

If X implies Y and Y imply Z, then X implies Z.

If X → Y and Y → Z, then X → Z

Example:

Id→contact_number and Contact_number→ state then Id→Contact_number, state.

Hence the correct answer is Reflexive.

UGC NET Paper 2 Computer Science Mock Test - 9 - Question 14

The simplified SOP (Sum of Product) form of the Boolean expression

(P + Q̅ + R̅)⋅(P + Q̅ + R)⋅(P + Q + R̅) is

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 9 - Question 14

The correct answer is option 2

Some laws of Boolean Algebra:

Distributive Law:

Inverse Law:

EXPLANATION:

F = (P + Q̅ + R̅)⋅(P + Q̅ + R)⋅(P + Q + R̅)

F= ((P + Q̅) + R̅.R)(P + Q + R̅)

F = (P + Q̅)(P + Q + R̅)

F = P + Q̅.(Q + R̅)

F = P + Q̅R̅

UGC NET Paper 2 Computer Science Mock Test - 9 - Question 15
Let 'S' sends a message 'M' to 'R' in an ecommerce transaction . Security aspect nonrepudiation in this transaction means
Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 9 - Question 15
Key Points

Non-repudiation is the assurance that someone cannot deny the validity of something. Non-repudiation is a legal concept that is widely used in information security and refers to a service, which provides proof of the origin of data and the integrity of the data. In other words, non-repudiation makes it very difficult to successfully deny who/where a message came from as well as the authenticity and integrity of that message.

Let 'S' sends a message 'M' to 'R' in an e-commerce transaction. Non-repudiation typically involves using methods designed to ensure that a sender can't deny having sent a particular message, or that a message recipient can't deny having received it. So preventing 'S' from denial, being the sender of M.

Hence the correct answer is preventing 'S' from denial, being the sender of M.

UGC NET Paper 2 Computer Science Mock Test - 9 - Question 16
When TRAP interrupt is triggered in an Intel 8085A, the program control is transferred to which one of the following location
Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 9 - Question 16

TRAP is a vectored interrupt also known as RST 4.5

The address of various vectored interrupts are given as:

For 8085 the interrupt service routine address is given as:

RST 4.5 (TRAP)

ISR address: 4.5 x 8 = (36)10 = (0024) H

RST 5.5

ISR address: 5.5 x 8 = (44)10 = (002C) H

RST 6.5

ISR address: 6.5 x 8 = (52)10 = (0034) H

RST 7.5

ISR address: 7.5 x 8 = (60)10 = (003C) H

When TRAP interrupt is triggered in an Intel 8085A, the program control is transferred to 0024 H

UGC NET Paper 2 Computer Science Mock Test - 9 - Question 17

The reason for software bugs and failures is due to ____________.

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 9 - Question 17
The reason for software bugs and failures is due to Software Developers and Software companies.

Software companies are responsible for making policies and providing working atmosphere for the software development, so in turn these companies become a part of software development process. Bugs from developers side is no new thing, even the slightest mistake in the program causes a bug.

UGC NET Paper 2 Computer Science Mock Test - 9 - Question 18

What is a constraint?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 9 - Question 18
A constraint is a limitation or restriction imposed directly on a variable or group of variables in order that the design is acceptable and they are expressed in the equality or inequality from and are divided into two groups and they are side constraints and behavior constraints.
UGC NET Paper 2 Computer Science Mock Test - 9 - Question 19

Which action sequences are used to achieve the agent’s goal?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 9 - Question 19
Action sequences are used to achieve the agent’s goal are search and plan. When the environment becomes more tricky means, the agent needs to plan and search action sequence to achieve the goal. Search is the process of navigating from a starting state to a goal state by transitioning through intermediate states. Almost any AI problem can be defined in these terms. Planning is a long-standing sub-area of Artificial Intelligence (AI). Planning is the task of finding a procedural course of action for a declaratively described system to reach its goals while optimizing overall performance measures.
UGC NET Paper 2 Computer Science Mock Test - 9 - Question 20

The assembler stores all the names and their corresponding values in ______.

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 9 - Question 20
The table where the assembler stores the variable names along with their corresponding memory locations and values is Symbol Table. The symbol table contains information to locate and relocate symbolic definitions and references. The assembler creates the symbol table section for the object file. It makes an entry in the symbol table for each symbol that is defined or referenced in the input file and is needed during linking.
UGC NET Paper 2 Computer Science Mock Test - 9 - Question 21

Which tool is used for structured designing?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 9 - Question 21
A Structure Chart (SC) is used for structured designing. Structure Chart represent hierarchical structure of modules. It breaks down the entire system into lowest functional modules, describe functions and sub-functions of each module of a system to a greater detail. Structure Chart partitions the system into black boxes.
UGC NET Paper 2 Computer Science Mock Test - 9 - Question 22

The computer architecture aimed at reducing the time of execution of instructions is ________.

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 9 - Question 22
The computer architecture aimed at reducing the time of execution of instructions is RISC. The RISC stands for Reduced Instruction Set Computer. A Reduced Instruction Set Computer is a type of microprocessor architecture that utilizes a small, highly-optimized set of instructions rather than the highly-specialized set of instructions typically found in other architectures. RISC processors can be designed more quickly than CISC processors due to its simple architecture.
UGC NET Paper 2 Computer Science Mock Test - 9 - Question 23

The primary aim of structural optimization is to determine the __________.

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 9 - Question 23
The primary aim of structural optimization is to determine the most suitable combination of design variables, so as to achieve the satisfactory performance of the structures subjected to the behavior and geometric constraints imposed with the goal of optimality being defined by the conditions and the three basic features of the structural optimization problem are:
  • The design variables
  • The objective function
  • The constraints
UGC NET Paper 2 Computer Science Mock Test - 9 - Question 24

Which is interpreted language?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 9 - Question 24
MATLAB is an interpreted language. All the other languages are compiled languages. In the case of Interpreted language, the translation to machine-language is performed incrementally at run-time. MATLAB is a proprietary multi-paradigm programming language and numeric computing environment developed by MathWorks. MATLAB allows matrix manipulations, plotting of functions and data, implementation of algorithms, creation of user interfaces, and interfacing with programs written in other languages.
UGC NET Paper 2 Computer Science Mock Test - 9 - Question 25

Which of the following is not of the same group?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 9 - Question 25

Apple talk is not of the same group. Apple talk is a discontinued proprietary suite of networking protocols developed by Apple Inc. for their Macintosh computers. AppleTalk includes a number of features that allow local area networks to be connected with no prior setup or the need for a centralized router or server of any sort.

Bus topology uses one main cable to which all nodes are directly connected. The main cable acts as a backbone for the network.

Ring topology, the computers in the network are connected in a circular fashion, and the data travels in one direction.

The Internet is a vast network that connects computers all over the world.

UGC NET Paper 2 Computer Science Mock Test - 9 - Question 26

A line drawn in the background color is:

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 9 - Question 26

A line drawn in the background color is always invisible because both are the same color. Because white lines are nearly invisible against the pale yellow background. The background can be any color, but typically is white or black. If you want to change the background color, use the dialog box to access the options, display, color menu sequence.

UGC NET Paper 2 Computer Science Mock Test - 9 - Question 27

Which search strategy is also called as blind search?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 9 - Question 27

Uninformed search strategy is also called as blind search. In blind search, you can search the states without having any additional information. So, the uninformed search method is blind search.

In Artificial Intelligence, Uninformed search is a type of search algorithm that operated in a brute force way. Uninformed search algorithms are also called as blind search algorithms because they do not have any domain-specific knowledge other than how to traverse a tree.

UGC NET Paper 2 Computer Science Mock Test - 9 - Question 28

What is another name for the circular queue among the following options?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 9 - Question 28

The circular queue is also known as a ring buffer. A circular queue is similar to a linear queue as it is also based on the FIFO (First In First Out) principle except that the last position is connected to the first position in a circular queue that forms a circle. Therefore, the structure of a circular queue is also known as a ring structure.

UGC NET Paper 2 Computer Science Mock Test - 9 - Question 29

Does the Load instruction do the following operation/s?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 9 - Question 29

The load instruction is basically used to load the contents of a memory location onto a register. Load instructions move data from memory into a register. The address for the load is the sum of a register specified in the instruction and a constant value that is coded into the instruction. LOAD is used to load data from memory to the accumulator. STORE is used to store the accumulator result in memory.

UGC NET Paper 2 Computer Science Mock Test - 9 - Question 30

Entries in the bundle table for line attributes are set using the function:

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 9 - Question 30

Entries in the bundle table for line attributes are set using the function setPolylineRepresentation (ws, li, lt, lc). Parameter ws is the workstation identifier, and line index parameter li defines the bundle table position. Parameters It, lw, and lc are then bundled and as signed values to set the line type, line width, and line color specifications, respectively, for the designated table index.

View more questions
92 docs|125 tests
Information about UGC NET Paper 2 Computer Science Mock Test - 9 Page
In this test you can find the Exam questions for UGC NET Paper 2 Computer Science Mock Test - 9 solved & explained in the simplest way possible. Besides giving Questions and answers for UGC NET Paper 2 Computer Science Mock Test - 9, EduRev gives you an ample number of Online tests for practice
Download as PDF