UGC NET Exam  >  UGC NET Tests  >  UGC NET Paper 2 Computer Science Mock Test - 1 - UGC NET MCQ

UGC NET Paper 2 Computer Science Mock Test - 1 - UGC NET MCQ


Test Description

30 Questions MCQ Test - UGC NET Paper 2 Computer Science Mock Test - 1

UGC NET Paper 2 Computer Science Mock Test - 1 for UGC NET 2024 is part of UGC NET preparation. The UGC NET Paper 2 Computer Science Mock Test - 1 questions and answers have been prepared according to the UGC NET exam syllabus.The UGC NET Paper 2 Computer Science Mock Test - 1 MCQs are made for UGC NET 2024 Exam. Find important definitions, questions, notes, meanings, examples, exercises, MCQs and online tests for UGC NET Paper 2 Computer Science Mock Test - 1 below.
Solutions of UGC NET Paper 2 Computer Science Mock Test - 1 questions in English are available as part of our course for UGC NET & UGC NET Paper 2 Computer Science Mock Test - 1 solutions in Hindi for UGC NET course. Download more important topics, notes, lectures and mock test series for UGC NET Exam by signing up for free. Attempt UGC NET Paper 2 Computer Science Mock Test - 1 | 100 questions in 120 minutes | Mock test for UGC NET preparation | Free important questions MCQ to study for UGC NET Exam | Download free PDF with solutions
UGC NET Paper 2 Computer Science Mock Test - 1 - Question 1

Directions: Match the following.

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 1 - Question 1

a-iii    is directly implied

b-i    function oriented metrics measuring the following parameters:- 

Number of user inputs:  Each user input that provides distinct application oriented data to the software is counted.  

Number of user outputs: Each user output that provides application oriented information to the user is counted. In this context output refers to reports, screens, error messages, etc.  

Number of user inquiries: An inquiry is defined as an on-line input that 

Results in the generation of some immediate software response in the form of an on-line output. Each distinct inquiry is counted. 

Number of files: Each logical master file (i.e., a logical grouping of data that may be one part of a large database or a separate file) is counted. 

Number of external interfaces: All machine readable interfaces (e.g., data files on storage media) that are used to transmit information to another system.

c-iv: A function point extension called feature points, is a superset of the function point measure that can be applied to systems and engineering software applications.The feature point measure accommodates applications in which algorithmic complexity is high. Real-time, process control and embedded software applications tend to have high algorithmic complexity and are therefore amenable to the feature point.

d-ii: A function point is a "unit of measurement" to express the amount of business functionality an information system (as a product) provides to a user. Function points are used to compute a functional size measurement (FSM) of software. The cost (in dollars or hours) of a single unit is calculated from past projects.

UGC NET Paper 2 Computer Science Mock Test - 1 - Question 2

Requirements established during requirements analysis are validated against developed software in

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 1 - Question 2

According to the Capability Maturity Model (CMMI-SW v1.1),

Software Verification: The process of evaluating software to determine whether the products of a given development phase satisfy the conditions imposed at the start of that phase. [IEEE-STD-610]

Software Validation: The process of evaluating software during or at the end of the development process to determine whether it satisfies specified requirements.

1 Crore+ students have signed up on EduRev. Have you? Download the App
UGC NET Paper 2 Computer Science Mock Test - 1 - Question 3

Which of the following statements are useful for the Internet of Things to Grow Ecommerce Businesses?

Statement 1:Better tracking and logistics

Statement 2: Automated management of inventory

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 1 - Question 3

The correct answer is option 1.

Concept:

Better tracking and logistics:

IoT technology allows eCommerce companies to track consumer orders from the minute they are placed to the moment they arrive at the customer's door. It also aids in the automation of shipping and delivery to avoid missing goods while optimizing vehicle routes.

Hence the given statement is useful for Ecommerce Businesses.

Automated management of inventory:

To know what is in and out of stock, eCommerce companies like to have control over the products leaving and entering their warehouses. With IoT sensors and RFID tags implemented in inventory systems, corporate processes may be greatly simplified, and merchants no longer need to engage store managers to physically inspect items because they have real-time information on their stock.

In this approach, IoT enhances eCommerce by collecting and transmitting new and relevant data about goods to ERP systems.

Hence the given statement is useful for Ecommerce Businesses.

Hence the correct answer is Both statement 1 and statement 2 are true.

UGC NET Paper 2 Computer Science Mock Test - 1 - Question 4

Taking into account the provided weighted graph, the Bellman-Ford algorithm is applied with vertex P serving as the source. The minimum distance from the starting point P to the target vertex T is determined as _______.

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 1 - Question 4

The correct answer is 2

EXPLANATION:

  • The Bellman-Ford algorithm solves the single-source shortest-paths problem in the general case in which edge weights may be negative.
  • Initialize all distance from the source to itself as 0 and to remaining vertices as infinite.

Process remaining edges.​

UGC NET Paper 2 Computer Science Mock Test - 1 - Question 5

Which of the following statements are False for cache misses?

I. Larger blocks reduce compulsory misses by improving temporal locality.

II. A direct mapped cache of size N has the miss rate of half of the 2-way cache of size N/2.

III. Victim cache does not affect cycle time or miss penalty.

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 1 - Question 5

I. Compulsory miss can be reduced by increasing the cache block size. Larger blocks reduce compulsory misses by improving spatial locality.

II. Higher associativity reduces conflict misses but increases hit time. A direct mapped cache of size N has the same miss rate as a 2-way cache of size N/2.

III. A small cache of “victim” blocks, which were thrown out recently reduces conflict misses. It does not affect cycle time or miss penalty.

UGC NET Paper 2 Computer Science Mock Test - 1 - Question 6
The maximum number of spanning tree possible for graph K5 is _____.
Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 1 - Question 6

Data:

K5 is a complete graph with 5 vertex, that is, n = 5

Formula:

maximum number of spanning tree possible = nn - 2

Calculation:

maximum number of spanning tree = 55-2 = 125

UGC NET Paper 2 Computer Science Mock Test - 1 - Question 7

Consider the following C program:

int main() {

int x = 50, y, z;

y = &x;

printf("Address is: %d", y);

}

Count the number of tokens in the above program.

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 1 - Question 7

Tokens: It is a collection of characters having some meaning which is separated by a lexical analyser and is passed to a parser.

Counting:​

UGC NET Paper 2 Computer Science Mock Test - 1 - Question 8
______ is a line drawing algorithm based only on integer calculation.
Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 1 - Question 8

Concept:

Digital Differential Analyzer (DDA) line drawing algorithm

DDA stands for Digital Differential Analyzer. It is an incremental method of scan conversion of line. In this method calculation is performed at each step but by using results of previous steps.

Bresenham’s line drawing algorithm

This algorithm is used for scan converting a line. It was developed by Bresenham. It is an efficient method because it involves only integer addition, subtractions, and multiplication operations. These operations can be performed very rapidly so lines can be generated quickly. In this method, next pixel selected is that one who has the least distance from true line.

Important Points

Bresenham's Algorithm is faster than DDA Algorithm in line because it involves only addition & subtraction in its calculation and uses only integer arithmetic.

Hence Correct answer is Option 2

Additional Information

Caman’s line drawing algorithm Is not a type of line drawing algorithm.

UGC NET Paper 2 Computer Science Mock Test - 1 - Question 9

Which of the following is true?

(i) On average, neural networks have higher computational rates than conventional computers.

(ii) Neural networks learn by example.

(iii) Neural networks mimic the way the human brain works.
Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 1 - Question 9

Neural networks have the following advantages compared to conventional computers.

  • Neural networks have higher computational rates than conventional computers because a lot of the operation is done in parallel.
  • The idea behind neural nets is based on the way the human brain works. Neural nets cannot be programmed, they can only learn by examples.
  • They are always able to respond and small changes in the input do not normally cause a change in the output. Hence, they are more fault tolerant.
UGC NET Paper 2 Computer Science Mock Test - 1 - Question 10

Consider the following graph:

i) Minimum spanning tree is unique with weight 7.

ii) Second best minimum spanning tree is unique with weight 8.

iii) Maximum spanning tree is unique with weight 15.

Which of the above statements is/are TRUE?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 1 - Question 10

i) If the graph has distinct edge weights, minimum spanning tree is always unique.

ii) There exist two second best spanning trees.

iii) A maximum spanning tree is also unique for a graph with distinct edge weights

UGC NET Paper 2 Computer Science Mock Test - 1 - Question 11

Maximal matching of a wheel graph W4 is W, chromatic number of cycle graph C4 is X, vertex connetivity of bipartite graph K2,3 is Y and Edge connectivity of bipartite graph K2,3 is Z. Then W+X+Y+Z= _________?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 1 - Question 11

Key Points

Maximal matching of graph G is a matching to which no other edges of the graph G can be added.

Maximal matching of a wheel graph with n vertices = ⌊n/2 ⌋

For the W4 graph is Maximal matching is =2=W

The chromatic number of a graph is the smallest number of colors needed to color the vertices of so that no two adjacent vertices share the same color

The chromatic number of cycle graph C4 is = 2 colours are sufficient.=X

Vertex connectivity is the smallest number of vertices whose deletion causes a connected graph to not be connected.

Vertex connectivity of bipartite graph K2,3 is = minimum of {2,3}=2= Y

Edge connectivity is the minimum number of edges whose deletion from a graph disconnects. , also called line connectivity.

Edge connectivity of bipartite graph K2,3 is= Maximum of {2,3} =2= Z

So W+X+Y+Z= 2+2+2+2=8

Hence the correct answer is 8.

UGC NET Paper 2 Computer Science Mock Test - 1 - Question 12

MergeSort algorithm given with (n × k) sorted subarrays, where each subarray is having size of , What is the time complexity for finding single sorted array?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 1 - Question 12

Merging two (n3)/k subarray takes [2× (n3)]/k moves most (worst case) And total we have to combine n.k subarray.

Finding single sorted array takes (n4) log(n.k).

UGC NET Paper 2 Computer Science Mock Test - 1 - Question 13
In asymmetric key cryptography, the private key to decrypt an encrypted message is kept by
Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 1 - Question 13
In asymmetric key cryptography each node has 2 keys private key and public key public key is as the name suggests is public that is known to sender while the private key held by the receiver which decrypts the data encrypted by sender using public key of receiver.
UGC NET Paper 2 Computer Science Mock Test - 1 - Question 14

Assume that p and q are non-zero positive integers, the following program segment will perform -

While (p! = 0)

{

If (p>q)

p=p-q;

else,

q=q-p;

printf("%d",p);

}

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 1 - Question 14

The correct answer is option 4.

Concept:

The given program is,

While (p! = 0)

{

If (p>q)

p=p-q;

else,

q=q-p;

printf("%d",p);

}

Explanation:

Scenario 1:

Consider p= 10 and q=5

While loop checks the p is not zero and p is greater than q. So

p updates the 10-5.

p=5 and q=5.

Again checks the while loop condition p is not zero and p is not greater than q. q updates q=5-5

So p=5 and q=0.

Again checks the while loop condition p is not zero and p is greater than q. So p updates the 5-0.

p=5 and q=0.

The above step repeats again and again. And prints the q i.e for the above p=10 and q=5 values it prints 5 5 5 5 infinitely.

Hence the above program runs infinitely.

Scenario 2:

Consider p= 5 and q=10

While loop checks the p is not zero and p is less than q. So else the loop executes

p=5, q=10-5

p=5 and q=5

Again checks the while loop condition p is not zero and p is not greater than q. q updates q=5-5

So p=5 and q=0.

Again checks the while loop condition p is not zero and p is greater than q. So p updates the 5-0.

p=5 and q=0.

The above step repeats again and again. And prints the q i.e for the above p=10 and q=5 values it prints 5 5 5 5 infinitely.

Hence the above program runs infinitely.

Scenario 3:

Consider p= 5 and q=5

While loop

checks the while loop condition p is not zero and p is not greater than q. q updates q=5-5

So p=5 and q=0.

Again checks the while loop condition p is not zero and p is greater than q. So p updates the 5-0.

p=5 and q=0.

The above step repeats again and again. And prints the q i.e for the above p=10 and q=5 values it prints 5 5 5 5 infinitely.

Hence the above program runs infinitely.

Hence the correct answer is the loop will run infinitely.

Note:

The answer given in the answer key is not satisfying the given code. For the three scenarios p and q, one of them should be there so the correct answer is option 4. I.e The loop will run infinitely.

UGC NET Paper 2 Computer Science Mock Test - 1 - Question 15
A disk has tracks from 0 to 179. Currently the head is at track 40. The R/W requests for tracks are in the following order- 80, 102, 26, 160, 35, 10, 135. What is the total head movement when SSTF algorithm is used?
Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 1 - Question 15

Concepts:

Sequence: 80, 102, 26, 160, 35, 10, 135

Algorithm: shortest seek time first

Arrange in ascending order: 10, 26, 35, 80, 102, 135, 160

Head is at cylinder: 40

Diagram:

Calculation:

Total Head movements= (40 - 35) + (35 - 26) + (26 - 10) + (80 - 10) + (102 - 80) + (135 - 102) + (160 - 135)

Total Head movements to serve all request = 5 + 9 + 16 + 70 + 22 + 33 + 25 = 180

Tips and Tricks:

Since the direction changes only once:

Total Head movements to serve all request = (40 – 10) + (160 – 10) = 180

UGC NET Paper 2 Computer Science Mock Test - 1 - Question 16
Zero address instruction format is used for
Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 1 - Question 16

The correct answer is option 4:

Key Points

In stack organized architecture push and pop instruction is needs a address field to specify the location of data for pushing into the stack and destination location during pop operation but for logic and arithmetic operation the instruction does not need any address field as it operates on the top two data available in the stack.

UGC NET Paper 2 Computer Science Mock Test - 1 - Question 17

Name the database that must be independent of the application that uses it.

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 1 - Question 17
A database must be independent of the application that uses it. All its integrity constraints can be independently modified without the need for any change in the application. This rule makes a database-independent of the front-end application and its interface.
UGC NET Paper 2 Computer Science Mock Test - 1 - Question 18

The translator which perform macro expansion is called a-

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 1 - Question 18
A translator that does macro expansion is called a macro pre-processor. The macro preprocessor accepts an assembly program that contains definitions and calls and is translated into an assembly program that does not count. A general-purpose macro processor or general-purpose preprocessor is a macro processor that is not tied to or integrated with a particular language or piece of software. A macro processor is a program that copies a stream of text from one location to another, creating an organized set of substitutions.
UGC NET Paper 2 Computer Science Mock Test - 1 - Question 19

While using the iterative construct (Branching) in execution _____________ instruction is used to check the condition.

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 1 - Question 19
While using the iterative construct (Branching) in execution branch instruction is used to check the condition. A branch is an instruction in a computer program that may, when executed by a computer, cause the computer to begin execution of a different instruction sequence. Branch instruction is used to check the test condition and to perform the memory jump with the help of offset.
UGC NET Paper 2 Computer Science Mock Test - 1 - Question 20

Name the database object in MS Access that stores a question about the data in the database?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 1 - Question 20
Query in the database object in MS Access stores a question about the data in the database. Databases in MS Access are composed of four objects that is tables, queries, forms, and reports. Together, these objects allow you to enter, store, analyze, and compile your data however you want.
UGC NET Paper 2 Computer Science Mock Test - 1 - Question 21

“Sharding” a database across many server instances can be achieved with _______________.

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 1 - Question 21
“Sharding” a database across many server instances can be achieved with SQL databases, but usually is accomplished through SANs and other complex arrangements for making hardware act as a single server. Sharding is a method for distributing a single dataset across multiple databases, which can then be stored on multiple machines. This allows for larger datasets to be split in smaller chunks and stored in multiple data nodes, increasing the total storage capacity of the system.
UGC NET Paper 2 Computer Science Mock Test - 1 - Question 22

The maximum number of nodes in a binary tree of depth 10 is:

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 1 - Question 22

The maximum number of nodes in a binary tree of depth K is 2K - 1.

Where K is the depth of binary tree, K > 1.

Given, K = 10

So, maximum number of nodes = 210 - 1 .

= 1023.

UGC NET Paper 2 Computer Science Mock Test - 1 - Question 23

Determine the value of x, where y = 7, e = 12 and n = 566 using modular exponentiation method (x ≡ ye (mod n)).

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 1 - Question 23

Given: y = 7, e = 12, and n = 566.

So, x ≡ 512 (mod 566).

Now 512 comes out to 244140625 and taking this value modulo 566, x is determined to be 487.

UGC NET Paper 2 Computer Science Mock Test - 1 - Question 24

Dynamic programming developed in optimization techniques are widely applied in __________.

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 1 - Question 24

Dynamic programming developed in optimization techniques by Bellman in the early 1950s and widely applied in operations research and economics is basically a mathematical approach for multi-stage decision problems and this approach is well suited to the optimal design of certain kinds of structure, in general, those in which the interaction between different parts is rather simple.

UGC NET Paper 2 Computer Science Mock Test - 1 - Question 25

Direction:- A binary search tree is constructed by inserting the following numbers in order:

60, 25, 72, 15, 30, 68, 101, 13, 18, 47, 70, 34

The number of nodes in the left subtree is:

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 1 - Question 25

Given:

It is Binary search tree but note that it doesn't said it is balanced.

So, First insertion element is ROOT, in the left sub tree of ROOT, we have all elements which are less than ROOT.

Given Sequence of insertion is 60,25,72,15,30,68,101,13,18,47,70,34,

∴ In the inserting elements 25,15,30,13,18,47,34 are less than 60 and 72,68,101,70 are grater than 60 .

No. of Nodes in the left subtree of ROOT = number of nodes less than ROOT =7.

According to the given numbers, and the algorithm, we construct a binary tree i.e.

So, the number of nodes in the left subtree is 7 (13,15,18,25,30,34,47).

UGC NET Paper 2 Computer Science Mock Test - 1 - Question 26

Which transformation distorts the shape of an object such that the transformed shape appears as if the object were composed of internal layers that had been caused to slide over each other?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 1 - Question 26

Shearing transformation distorts the shape of an object such that the transformed shape appears as if the object were composed of internal layers that had been caused to slide over each other. Two common shearing transformations are the type of transformations that shift coordinate x values coordinate y values. In shear transformation, the transformed shape appears as if the object were composed of internal layers that had been caused to slide over each other.

UGC NET Paper 2 Computer Science Mock Test - 1 - Question 27

The assembler stores the object code in ___________.

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 1 - Question 27

The assembler stores the object code in Magnetic disk. After compiling the object code, the assembler stores it in the magnetic disk and waits for further execution. A magnetic disk is a storage device that uses a magnetization process to write, rewrite and access data. It is covered with a magnetic coating and stores data in the form of tracks, spots and sectors. Hard disks, zip disks and floppy disks are common examples of magnetic disks.

UGC NET Paper 2 Computer Science Mock Test - 1 - Question 28

What field type is best to store serial numbers?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 1 - Question 28

AutoNumber field type is best to store serial numbers. AutoNumber is a type of data used in Microsoft Access tables to generate an automatically incremented numeric counter. The serial data type stores a sequential integer, of the int data type, that is automatically assigned by the database server when a new row is inserted. The default serial starting number is 1, but you can assign an initial value, n when you create or alter the table.

UGC NET Paper 2 Computer Science Mock Test - 1 - Question 29

Which of the following is not a component of relational database?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 1 - Question 29

Except, hierarchy all other, are components of relational database. The traditional storage of data that is organized by customer, stored in separate folders in filing cabinets is an example of hierarchy type of 'database' system.

UGC NET Paper 2 Computer Science Mock Test - 1 - Question 30

The language used in application programs to request data from the DBMS is referred to as __________.

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 1 - Question 30

A data manipulation language (DML) is a computer programming language used for adding (inserting), deleting, and modifying (updating) data in a database. And it is the language used in application programs to request data from the DBMS. A DML is often a sub-language of a broader database language such as SQL, with the DML comprising some of the operators in the language.

View more questions
Information about UGC NET Paper 2 Computer Science Mock Test - 1 Page
In this test you can find the Exam questions for UGC NET Paper 2 Computer Science Mock Test - 1 solved & explained in the simplest way possible. Besides giving Questions and answers for UGC NET Paper 2 Computer Science Mock Test - 1, EduRev gives you an ample number of Online tests for practice

Top Courses for UGC NET

Download as PDF

Top Courses for UGC NET