UGC NET Exam  >  UGC NET Tests  >  UGC NET Mock Test Series 2024  >  UGC NET Paper 2 Computer Science Mock Test - 3 - UGC NET MCQ

UGC NET Paper 2 Computer Science Mock Test - 3 - UGC NET MCQ


Test Description

30 Questions MCQ Test UGC NET Mock Test Series 2024 - UGC NET Paper 2 Computer Science Mock Test - 3

UGC NET Paper 2 Computer Science Mock Test - 3 for UGC NET 2024 is part of UGC NET Mock Test Series 2024 preparation. The UGC NET Paper 2 Computer Science Mock Test - 3 questions and answers have been prepared according to the UGC NET exam syllabus.The UGC NET Paper 2 Computer Science Mock Test - 3 MCQs are made for UGC NET 2024 Exam. Find important definitions, questions, notes, meanings, examples, exercises, MCQs and online tests for UGC NET Paper 2 Computer Science Mock Test - 3 below.
Solutions of UGC NET Paper 2 Computer Science Mock Test - 3 questions in English are available as part of our UGC NET Mock Test Series 2024 for UGC NET & UGC NET Paper 2 Computer Science Mock Test - 3 solutions in Hindi for UGC NET Mock Test Series 2024 course. Download more important topics, notes, lectures and mock test series for UGC NET Exam by signing up for free. Attempt UGC NET Paper 2 Computer Science Mock Test - 3 | 100 questions in 120 minutes | Mock test for UGC NET preparation | Free important questions MCQ to study UGC NET Mock Test Series 2024 for UGC NET Exam | Download free PDF with solutions
UGC NET Paper 2 Computer Science Mock Test - 3 - Question 1

Postfix to infix operations is performed on the following expression. Using stack we need to perform the set of PUSH and POP operations depending upon the operator or operand in the expression. At a certain point, the top of the stack is " s - t"

How many push and pop operations are performed till that moment.

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 3 - Question 1

When there is an operand PUSH it on the stack, when there is an operator, POP top two operands from the stack and perform the operation and push the result back.

Here are the steps followed:

Total push operations = 8
Total Pop operations = 6

UGC NET Paper 2 Computer Science Mock Test - 3 - Question 2

Which of the following logic families is well suited for high-speed operations?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 3 - Question 2

ECL remains for Emitter-Coupled Logic. It is intended for greatly fast application. It is appropriate for substantial centralized server PC that requires high number of operation every second.

1 Crore+ students have signed up on EduRev. Have you? Download the App
UGC NET Paper 2 Computer Science Mock Test - 3 - Question 3

Which of the following is true?

I. ¬ (P ↔ Q) ≡ P ↔ ¬ Q

II. (P ↔ Q) ≡ (P ∧ Q) ∨ (¬ P ∧ ¬ Q)

III. (P ↔ Q) ≡ ¬ P ↔ ¬ Q

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 3 - Question 3

TRUTH TABLE:

I, II and III are all true.

UGC NET Paper 2 Computer Science Mock Test - 3 - Question 4

Consider the following:

Matching A, B, C, D in the same order gives:

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 3 - Question 4

Condition coverage test:

Each one of the Boolean expression with values TRUE and FALSE. For this, tester should know the code. Hence it is White box testing.

Equivalence class partitioning:

It divides the input test data into each partition at least once of equivalent data from which test cases can be derived. Only input values are needed, not the code. Hence it is black-box testing.

Volume testing:

Check system performance with increasing volumes of data in the database.

Beta Testing:

It is a kind of system testing done at the customer site to validate the usability, functionality.

UGC NET Paper 2 Computer Science Mock Test - 3 - Question 5

Which of the following properties of the circuits of a graph are correct?

1. The minimum number of branches possible in a circuit will be equal to the number of elements in a circuit.

2. There are exactly two paths between any pair of vertices in a circuit.

3. There are at least two branches in a circuit.

Select the correct answer using the code given below.

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 3 - Question 5

The number of nodes present in a graph will be equal to the number of principal nodes present in an electric circuit.

The number of branches present in a graph will be less than or equal to the number of branches present in an electric circuit.

In a graph there is one and only one path between every pair of vertices.

Branches are the connections between nodes. A branch is an element(resistor, capacitor, source).

The number of branches in a circuit is equal to the number of elements.

UGC NET Paper 2 Computer Science Mock Test - 3 - Question 6

Consider a counting Semaphore variable 'S'. Following are the semaphore operations performed: 18P, 3V, 7V, 2P, 6V. What can be the largest initial value of S to keep one process in suspended list?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 3 - Question 6

Semaphore: it is an integer variable which is used by different processes in a mutually exclusive manner so as to achieve synchronization.

There are two types of Semaphores:

  1. Counting Semaphores: The integer values in this type of semaphore can range over more than 0s and 1s
  2. Binary Semaphores: The integer values in this type of semaphore can only be binary in nature, that is, 0s and 1s.

There are two types of operations that are atomic and mutually exclusive in nature:

  1. Wait (S) or P: If the semaphore value is greater than 0, decrement it. If it is less than 0, then wait for the semaphore to become greater than 0 and then decrement it.
  2. Signal (S) or V: Increment the value of the semaphore. If the semaphore is of binary type, and is already 1, then again replace the value by 1.

Calculations:

Let's start by analyzing the semaphore operations one by one:

18P: This operation decrements the semaphore value by 18.
3V: This operation increments the semaphore value by 3.
7V: This operation increments the semaphore value by 7.
2P: This operation decrements the semaphore value by 2.
6V: This operation increments the semaphore value by 6.
Now, let's apply these operations in sequence starting from an initial value of S:

After 18P: S - 18
After 3V: S - 15
After 7V: S - 8
After 2P: S - 10
After 6V: S - 4.

The final value of the semaphore is S - 4.

To ensure that one process is in the suspended list, the final value of the semaphore should be negative. Therefore, we need S - 4 to be less than 0.

S - 4 < 0
S < 4

The largest initial value of S that would satisfy this condition is 3.

Therefore, the largest initial value of S to keep one process in the suspended list is 3.

UGC NET Paper 2 Computer Science Mock Test - 3 - Question 7

Match the following:

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 3 - Question 7

The correct option is (2)

A → III, B → I, C → IV, D → II

Concept:-

Match the following:

A: Modem → III: The device used for conversion between electric signals and digital bits.

B: Ethernet card → I: A network adapter is used to set up a wired network.

C: Repeater → IV: Regenerate the signals.

D: Switch → II: Connect multiple computers.

Key Points

  • Modem stands for "modulator Demodulator". It refers to a device used for conversion between analog signals and digital bits.
  • An Ethernet card, also known as a Network interface card (NIC card in short) is a network adapter used to set up a wired network. It acts as an interface between a computer and the network.
  • A repeater is an analog device that works with signals on the cables to which it is connected. The weakened signal appearing on the cable is regenerated and put back on the cable by a repeater.
  • A switch is a networking device that plays a central role in local area network.
UGC NET Paper 2 Computer Science Mock Test - 3 - Question 8
Let G be a simple undirected planar graph on 10 vertices with 15 edges. If G is a connected graph, then the number of bounded faces in any embedding of G on the plane is equal to
Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 3 - Question 8

The correct answer is "option 4".

CONCEPT:

A planar graph is a graph that can be drawn on the plane in such a way that its edges must intersect only at their endpoints.

In a planar graph, the graph is drawn in such a way that no edges must cross each other.

The graph whose edges overlap or cross each other is known as a Non-planar graph.

A graph to be planar must satisfy the following Euler’s formula:

v - e + f = 2

where

v is the number of vertices

e is the number of edges

f is the number of faces

CALCULATION

v = 10, e = 15

According to Euler’s formula:

v - e + f = 2

10 – 15 + f = 2

f = 2 – 10 + 15

f = 7

Out of 7, there will be always one unbounded face.

So, the number of faces is 6.

Hence, the correct answer is "option 4".

UGC NET Paper 2 Computer Science Mock Test - 3 - Question 9

Consider the following statements related to AND-OR Search algorithm.

S​1​: A solution is a subtree that has a goal node at every leaf.

S​2​: OR nodes are analogous to the branching in a deterministic environment

S​3​: AND nodes are analogous to the branching in a non-deterministic environment.

Which one of the following is true referencing the above statements?

Choose the correct answer from the code given below:

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 3 - Question 9

AND- OR search algorithm:

AND OR search algorithm is different from other algorithms in the way that it finds goal node at each state in order to reach the final goal state. It works in non-deterministic environment.

And OR search algorithm works in the following way:

1) It has to find a solution tree of subtrees.

2) Solution tree contains the root of the subtrees.

3) If a non-terminal AND node is in subtree and solution tree then all its children are in solution tree.

4) If a non-terminal OR node is in subtree and solution tree then exactly one of its children are in solution tree.

AND OR search tree may contain nodes that root identical subtrees (sub problems with identical optimal solutions) which can be unified. When unifiable nodes are merged, search tree becomes a graph and its size becomes smaller.
UGC NET Paper 2 Computer Science Mock Test - 3 - Question 10
Let A = {0, 1} × {0, 1} × {0, 1} and B = {a, b, c} × {a, b, c} × {a, b, c}. Suppose A is listed in lexicographic order based on 0 < 1 and B is listed in lexicographic order based on a < b < c. If A × B × A is listed in lexicographic order, then the next element after ((1, 0, 0), (c, c, c), (1, 1, 1)) is
Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 3 - Question 10

The correct answer is ((1, 0, 1), (a, a, a), (0, 0, 0))

Key PointsThe sets A and B are defined as follows:

  1. A = {0, 1} × {0, 1} × {0, 1}, which produces all possible combinations of three digits where each digit can be either 0 or 1.
  2. B = {a, b, c} × {a, b, c} × {a, b, c}, which produces all possible combinations of three letters where each letter can be either a, b, or c.

Given the order of elements, A × B × A in lexicographic order means:

  • First, we order by the first element of A,
  • Then, by elements of B,
  • Finally, by the second element of A.

Given the current element ((1, 0, 0), (c, c, c), (1, 1, 1)), we need to find the next element.

For the first A, "(1, 0, 0)" is fixed in this step because to move to the next element in the sequence, we look into B first as it can vary next before the second A gets incremented. Since "(c, c, c)" is the last possibility in B's lexicographic order, we need to move to the next possibility in the second A and then cycle B back to its first.

For the second A, "(1, 1, 1)" is already at the last possibility. So, we increment the first A from "(1, 0, 0)" to "(1, 0, 1)" as the next logical step, given that the elements of A and B are considered in a combined lexicographic progression.

Since the element from B was "(c, c, c)" and we're rolling over, B should reset to its first element "(a, a, a)".

Then, the final component (the second A) should also reset back to the beginning, "(0, 0, 0)", as you effectively cycle through every combination of B with each element of A before moving to the next element of A.

Therefore, the correct answer is: ((1, 0, 1), (a, a, a), (0, 0, 0))

UGC NET Paper 2 Computer Science Mock Test - 3 - Question 11

How many bytes of data can be sent in 33 seconds over a serial link with baud rate of 6000 in asynchronous mode with odd parity and two stop bits in the frame?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 3 - Question 11

Baud rate = 6000 bits/sec

Number of bits needed to send 1 byte of data

= 1(start bit) + 8(data) + 1 (parity) + 2 (stop) = 12 bits

1 second → 500 byte

∴ 33 seconds → 16500 bytes

UGC NET Paper 2 Computer Science Mock Test - 3 - Question 12

Which is true about conditional statement (a ∨ (¬ a ∧ b)) ↔ ¬ (b ∨ a)?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 3 - Question 12

(a ∨ (¬ a ∧ b)) ↔ ¬ (b ∨ a)

≡ (a ∨ ¬ a) ∧ (a ∨ b) ↔ ¬ (a ∨ b)

≡ (T ∧ (a ∨ b)) ↔ ¬ (a ∨ b)

≡ (a ∨ b)) ↔ ¬ (a ∨ b)

Let a ∨ b = p

≡ p ↔ ¬ p

≡ F

Truth Table of p ↔ q:

∴ Conditional statement is contradiction

Important Points:

Satisfiable: If there exist at least one true result for the given logical statement

UGC NET Paper 2 Computer Science Mock Test - 3 - Question 13

What is the smallest number of A’s that might be printed when this set of processes runs?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 3 - Question 13

Since wait(R) can pass 3 time without blocking which will make 6 signal(R), but if P3 process will consume all 6 signal(R) then P2 wouldn’t get the chance to unblock wait(R) and printf(“A”) wouldn’t able to execute.

UGC NET Paper 2 Computer Science Mock Test - 3 - Question 14
The value of primary key can't be null. Which of the following defines this constraint?
Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 3 - Question 14

Concept:-

Entity integrity constraint:- The entity integrity rule is designed to assure that every relation has a primary key and that the data values for that primary key are all valid. Entity integrity guarantees that every primary key attribute is non-null.

Key Points

  • The primary key performs the unique identification function in a relational model.
  • An entity that cannot be identified is a contradiction in terms, hence the name entity integrity.
  • A null is a value that is assigned to an attribute when no other value applies, or when the applicable value is unknown.

Additional InformationReferential integrity constraint:- A referential integrity constraint is a rule that maintains consistency among the rows of two tables(relations). The rule states that if there is a foreign key in one relation, either each foreign key value must match a primary key value in the other table, or else the foreign key must be null.

Domain constraint:- All the values that appear in a column of a relation (table) must be taken from the same domain. A domain is a set of values that may be assigned to an attribute.

Key constraints:- The term 'key' has too many meanings in the database world. In the relational model alone, there are candidate keys, primary keys, alternate keys, foreign keys, search keys, and so on.

UGC NET Paper 2 Computer Science Mock Test - 3 - Question 15

The Adjacency matrix of a directed graph G is given below.

Which of the following is a valid topological sort of G?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 3 - Question 15

The correct answer is option 2.

Concept:

A topological sort:

Topological sorting for Directed Acyclic Graph (DAG) is a linear ordering of vertices such that for every directed edge u v, vertex u comes before v in the ordering. A topological ordering is possible if and only if the graph has no directed cycles, that is if it is a directed acyclic graph (DAG).

The given adjacency matrix graph is,

Option 1: (h, c, a, e, f, d, i, g, b)

False, Here node e was visited before node d. Hence not a topological sort.

Option 2: (c, h, a, d, e, f, i, g, b)

True, It is one of the topological sorts of the above graph.

Option 3: (c, a, d, e, f, g, h, i, b)

False, Here node g was visited before node i. Hence not a topological sort.

Option 4: (h, e, l, f, c, d, a, b, g)

False, Here node e was visited before node d. Hence not a topological sort.

Hence the correct answer is (c, h, a, d, e, f, i, g, b).

UGC NET Paper 2 Computer Science Mock Test - 3 - Question 16

A network with a ring topology having link bandwidths of 100 Mbps and propagation speed 2×108 m/sec. If packet size is 12000 bits, considering nodes do not introduce delay, then what would be the circumference if there was a node every 100 m and each node introduced 10 bits of delay?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 3 - Question 16

Data:

Packet size = 1500 bytes = 12000 bits

Bandwidth = 100 Mbps

Propagation speed = 2 × 108 m/s

Calculation:

Transmission time =

Length of cable needed to exactly contain packet = 120 × 2 × 108

= 24000 m

In 24000 m, bits are = 12000

1 m = 12000/24000 = ½

100 m = 50 bits

But it is given that there is an delay of 10 bits in each 100 m, so we have total 60 bits/100 m or 0.6 bits/m.

So, 12000-bit packet can fill =

UGC NET Paper 2 Computer Science Mock Test - 3 - Question 17

Read the given program in C and answer the following question.

main()

{

int x,y;

clrscr();

printf("Read the integer from keyboard(x):")

scanf("%d",&x);

x>>2;

y=x;

printf("OutputA=%d",y);

}

If 'Read the integer from keyboard (x) = 8 then what would be the value of Output A?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 3 - Question 17

scanf("%d",&x);

will take input 8 from console and store in variable x.

x>>2;

This statement will return right-shifted bits in x by 2 positions but does not change the bits stored in variable x.

But here no assignment exists to hold that shifted bits. and x contains 8 only ( no change )

y=x;

now y also contains 8 only.

printf("OutputA=%d",y);

this statement will print OutputA=8.

Hence None of the given options are correct.

UGC NET Paper 2 Computer Science Mock Test - 3 - Question 18
If A is a subset of B and B is a subset of C, then the cardinality of A ∪ B ∪ C is equal to:
Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 3 - Question 18

Concept:

  • The cardinality of a set A is the measure of the "number of elements" of the set. It is denoted by n(A).
    For example, a set containing 3 elements has a cardinality of 3.
  • If A ⊂ B, then A ∪ B = B.

Calculations:

Since, A ⊂ B and B ⊂ C, therefore A ∪ B ∪ C = C.

⇒ n(A ∪ B ∪ C) = n(C).

∴ The cardinality (number of elements) of A ∪ B ∪ C = cardinality (number of elements) of C.

UGC NET Paper 2 Computer Science Mock Test - 3 - Question 19
Which of the following statements is FALSE?
Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 3 - Question 19

The correct answer is option 2.

Concept:

A regular language is a language that can be expressed with a regular expression or deterministic or non-deterministic finite automata or state machines.

Option 1:If L is a regular language, then L2 is also a regular language.

True, If L is a regular language, then L2 means L.L is also regular. Regular languages are closed under concatenation. Hence it L2 is also a regular language.

Option 2: The language L = {an: n ≥ 4} is NOT regular.

False, The language L = {an : n ≥ 4} is regular. It accepts the strings like {a4, a5,a6,a7, a8,....}.

Here minimum length string is "aaaa" So only 5 states are sufficient to construct DFA. Hence The language L = {an:: n ≥ 4} is regular.

Option 3: A language L is regular if and only if there exists a corresponding DFA to accept it.

True, A Regular expression by definition is the language accepted by a nondeterministic finite automaton (NFA) or deterministic finite automaton (DFA) it can be generated by a regular grammar.

Regular language = Type-3 language = Regular expressions = Regular grammar = DFA =NFA = ε-NFA = Right linear grammar = Left linear grammar

Option 4: If L is regular, then L- {λ} is also regular.

True, A language is regular, by definition, if you can create a DFA for it. Then I need to prove that if L is regular, then so is L− {λ} for any λ ∈ L.

Here L − {λ} λ ∈ L.

λ ∈ L means it accepts by the given regular language Hence λ is also regular.

= L− {Regular}

= L {Regular}c { By set rule A - B = A∩Bc}

=L ∩ {Regular} {By closed properties Complement of regular is regular}

= Regular ∩ Regular {By closed properties intersetion of regular is regular }

= Regular

Hence the correct answer is The language L = {an:: n ≥ 4} is NOT regular.

UGC NET Paper 2 Computer Science Mock Test - 3 - Question 20
Which of the following is Uninformed Search in AI
Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 3 - Question 20

Correct answer is Option3Key Points

  • Informed Search algorithms have information on the goal state which helps in more efficient searching.
  • Uninformed Search algorithms have no additional information on the goal node.

Uninformed Search

  • Breath first search
  • Depth First Search
  • Uniform Cost Search
  • Depth First Iterative Deepening search

Informed Search

  • Hill climbing
  • Best first search
  • Greedy search
  • Beam Search
  • Algorithm A
UGC NET Paper 2 Computer Science Mock Test - 3 - Question 21

Which of the following statements are logically equivalent?

A. No S is P

B. No P is S

C. All S are non-P

D. All non-P are non-S

E, No S is non-P

Choose the correct answer from the options given below:

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 3 - Question 21

The correct answer is A, B and C only.

As per the question,

Statement A:- No S is P.

Converse of statement A - No P is S

Obverse of statement A - All S are non-P

Hence, among the above statements, statements A, B, and C are logically equivalent.

Hence, the correct answer is A, B, and C only.

Additional InformationLogical argument:- A logical argument is a process of creating a new statement from the existing statements. It comes to a conclusion from a set of premises by means of logical implications via logical inference.

  • A categorical proposition is a simple proposition containing two terms, subject(S) and predicate (P), in which the predicate is either asserted or denied of the subject.
  • Every categorical proposition can be reduced to one of four logical forms, named A, E, I and O.
  • The 'A' proposition, is the universal affirmative usually translated as 'All S is P'.
  • In the 'E' proposition, is the universal negative is usually 'No S is P'.
  • The 'I' proposition, is the particular affirmative usually translated as 'Some S are P'.
  • In the 'O' proposition, is the particular negative is usually translated as 'Some S are not P'
  • Obversion is the inference in which the quality of the proposition is changed and the predicate is interchanged with its complement. It is valid for all four forms. The obverse is logically equivalent to the original proposition.
  • Conversion is the inference in which the subject and predicate are interchanged. In modern logic, it is only valid for the E and I propositions. The valid converse is logically equivalent to the original proposition.
UGC NET Paper 2 Computer Science Mock Test - 3 - Question 22
Which of the following describes the purpose of the recovery testing?
Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 3 - Question 22

Many computer-based systems must recover from faults and resume processing within a prespecified time.

If recovery is automatic reinitialization, check pointing mechanisms, data recovery, and restart are evaluated for correctness.

If recovery requires human intervention, the mean-time-to-repair (MTTR) is evaluated to determine whether it is within acceptable limits.
UGC NET Paper 2 Computer Science Mock Test - 3 - Question 23

Entities having a primary key are called?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 3 - Question 23
The strong entity has a primary key. Weak entities are dependent on strong entities. Its existence is not dependent on any other entity. An entity set that does not possess sufficient attributes to form a primary key is called a weak entity set. One that does have a primary key is called a strong entity set. A strong entity is represented by a single rectangle.
UGC NET Paper 2 Computer Science Mock Test - 3 - Question 24

Which of the following is system software?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 3 - Question 24
The system software is a type of computer program designed to run hardware and software programs on a computer. According to some definitions, system software also includes system utilities, system restore, development tools, compilers, operating system and debuggers.
UGC NET Paper 2 Computer Science Mock Test - 3 - Question 25

Which search is complete and optimal when h(n) is consistent?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 3 - Question 25
A* search is a combination of lowest-cost-first and best-first searches that considers both path cost and heuristic information in its selection of which path to expand. It uses cost(p), the cost of the path found, as well as the heuristic function h(p), the estimated path cost from the end of p to the goal.
UGC NET Paper 2 Computer Science Mock Test - 3 - Question 26

The limitation of dynamic programming is that it does not allow itself for __________.

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 3 - Question 26

The limitation of dynamic programming is that it does not allow itself for machine design. The limitation of dynamic programming is that it does not allow itself to the construction of general-purpose computer programs suitable for a wide range of distinct problems and dynamic programming has been used for optimizing the shape of pin-jointed structures and for the optimal design of transmission towers by palmer and Sheppard.

UGC NET Paper 2 Computer Science Mock Test - 3 - Question 27

In 1985, the famous chess player David Levy beat a world champion chess program in four straight games by using orthodox moves that confused the program. What was the name of the chess program?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 3 - Question 27

CRAY BLITZ was a computer chess program written by Robert Hyatt, Harry L. Nelson, and Albert Gower to run on the Cray supercomputer. It was derived from "Blitz" a program that Hyatt started to work on as an undergraduate. "Blitz" played its first move in the fall of 1968 and was developed continuously from that time until roughly 1980 when Cray Research chose to sponsor the program. Cray Blitz participated in computer chess events from 1980 through 1994 when the last North American Computer Chess Championship was held in Cape May, New Jersey. Cray Blitz won several ACM computer chess events, and two consecutive World Computer Chess Championships, the first in 1983 in New York City, and the second in 1986 in Cologne, Germany.

UGC NET Paper 2 Computer Science Mock Test - 3 - Question 28

Which of the following does not represents the given language?

Language: {0,01}

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 3 - Question 28

The given option represents {0, 01} in different forms using set operations and Regular Expressions. The operator like ^, v, etc. are logical operation and they form invalid regular expressions when used.

UGC NET Paper 2 Computer Science Mock Test - 3 - Question 29

A full binary tree can be generated using __________.

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 3 - Question 29

Every node in a full binary tree has either 0 or 2 children. A binary tree can be generated by two traversals if one of them is in-order. But, we can generate a full binary tree using post-order and pre-order traversals.

UGC NET Paper 2 Computer Science Mock Test - 3 - Question 30

A series of statements explaining how the data is to be processed is called _________.

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 3 - Question 30

A series of statements explaining how the data is to be processed is called program. A program is a sequence of instructions, written to perform a task by computer. It requires programs to function, typically executing the program’s instructions in a central processor. A program is usually written by a computer programmer in a programming language. From the program in its human-readable form of source code, a compiler or assembler can derive machine code a form consisting of instructions that the computer can directly execute.

View more questions
16 docs|120 tests
Information about UGC NET Paper 2 Computer Science Mock Test - 3 Page
In this test you can find the Exam questions for UGC NET Paper 2 Computer Science Mock Test - 3 solved & explained in the simplest way possible. Besides giving Questions and answers for UGC NET Paper 2 Computer Science Mock Test - 3, EduRev gives you an ample number of Online tests for practice

Top Courses for UGC NET

Download as PDF

Top Courses for UGC NET