UGC NET Exam  >  UGC NET Tests  >  UGC NET Paper 2 Computer Science Mock Test - 8 - UGC NET MCQ

UGC NET Paper 2 Computer Science Mock Test - 8 - UGC NET MCQ


Test Description

30 Questions MCQ Test - UGC NET Paper 2 Computer Science Mock Test - 8

UGC NET Paper 2 Computer Science Mock Test - 8 for UGC NET 2024 is part of UGC NET preparation. The UGC NET Paper 2 Computer Science Mock Test - 8 questions and answers have been prepared according to the UGC NET exam syllabus.The UGC NET Paper 2 Computer Science Mock Test - 8 MCQs are made for UGC NET 2024 Exam. Find important definitions, questions, notes, meanings, examples, exercises, MCQs and online tests for UGC NET Paper 2 Computer Science Mock Test - 8 below.
Solutions of UGC NET Paper 2 Computer Science Mock Test - 8 questions in English are available as part of our course for UGC NET & UGC NET Paper 2 Computer Science Mock Test - 8 solutions in Hindi for UGC NET course. Download more important topics, notes, lectures and mock test series for UGC NET Exam by signing up for free. Attempt UGC NET Paper 2 Computer Science Mock Test - 8 | 100 questions in 120 minutes | Mock test for UGC NET preparation | Free important questions MCQ to study for UGC NET Exam | Download free PDF with solutions
UGC NET Paper 2 Computer Science Mock Test - 8 - Question 1

In C++, which of the following system-provided functions is called when no handler is provided to deal with an exception?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 8 - Question 1

This function is automatically called when no catch handler can be found for a thrown exception, or for some other exceptional circumstance that makes impossible to continue the exception handling process.

UGC NET Paper 2 Computer Science Mock Test - 8 - Question 2

Consider a schema R(ABCD) and functional dependencies A → B, C → D. The decomposition of R into R1(AB) and R2(CD) is

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 8 - Question 2

Dependency Preserving Decomposition:

Decomposition of R into R1 and R2 is a dependency preserving decomposition if closure of functional dependencies after decomposition is same as closure of of FDs before decomposition.

A simple way is to just check whether we can derive all the original FDs from the FDs present after decomposition.

In the above question R(A, B, C, D) is decomposed into R1 (A, B) and R2(C, D) and there are only two FDs A -> B and C -> D. So, the decomposition is dependency preserving

Lossless-Join Decomposition:

Decomposition of R into R1 and R2 is a lossless-join decomposition if at least one of the following functional dependencies are in F+ (Closure of functional dependencies)

R1 ∩ R2 → R1

OR

R1 ∩ R2 → R2

In the above question R(A, B, C, D) is decomposed into R1(A, B) and R2(C, D), and R1 ∩ R2 is empty. So, the decomposition is not lossless.

1 Crore+ students have signed up on EduRev. Have you? Download the App
UGC NET Paper 2 Computer Science Mock Test - 8 - Question 3

The following figure represents access graphs of two modules M1 and M2. The filled circles represent methods and the unfilled circles represent attributes. If method m is moved to module M2 keeping the attributes where they are, what can we say about the average cohesion and coupling between modules in the system of two modules?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 8 - Question 3

The correct answer is option 1.

Key Points

  • The degree to which the elements within a module belong together is referred to as cohesion.
  • The degree of interdependence between software modules is referred to as coupling. A measure of how closely two routines or modules are linked.

Coupling between M1 and M2 =

The cohesion of M1 =

After moving method m to M2, we get the following graph as


Hence the correct answer is There is no change.

UGC NET Paper 2 Computer Science Mock Test - 8 - Question 4

Which of the following statement are true?

Statement 1: Depth First Search uses the stack data structure.

Statement 2: Breadth First Search uses the queue data structure.

Statement 3: Depth First Search uses a backtracking technique.

Statement 4: Breadth-first search uses the Branch-and-Bound traverse technique.

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 8 - Question 4

The correct answer is option 4.

Concept:

Statement 1: Depth First Search uses the stack data structure.

True, When a dead end occurs in any iteration, the Depth First Search (DFS) method traverses a graph in a depth ward motion and utilizes a stack to remember to acquire the next vertex to start a search.

Statement 2: Breadth First Search uses the queue data structure.

True, When a dead end occurs during any iteration, the Breadth First Search (BFS) algorithm uses a queue to keep track of where to get the next vertex to begin a search.

Statement 3: Depth First Search uses a backtracking technique.

True, Depth First Search uses a backtracking technique. Backtracking is a method for problem-solving based on an algorithm. It constructs a solution step by step, increasing values over time, and then employs recursive calling to discover the answer. Based on the limitations provided to answer the problem, it eliminates solutions that don't lead to the solution.

Statement 4: Breadth-first search uses the Branch-and-Bound traverse technique.

True, Breadth-first search uses the Branch-and-Bound traverse technique. Branch and bound is an algorithm design paradigm that is generally used for solving combinatorial optimization problems.

Hence the correct answer is only 1, 2, 3, and 4.

UGC NET Paper 2 Computer Science Mock Test - 8 - Question 5

Consider the given three address code table given below:

Which of the following expression represents the above given three address code?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 8 - Question 5

Three address code: In this a type of intermediate code which is easy to generate and can be easily converted to machine code uses at most three addresses and one operator to represent an expression and the value computed at each instruction is stored in temporary variable generated by compiler.

Calculation:

UGC NET Paper 2 Computer Science Mock Test - 8 - Question 6

Consider the following Statements

S1: Regular languages are a subset of the set of languages accepted by TMs which do not write anything on the tape.

S2: The set of languages accepted by halting TMs with a bidirectional infinite tape is a proper superset of decidable language.

S3: Every decidable language can be accepted by a DFA with a priority queue.

Which of the statements are not true?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 8 - Question 6

The correct answer is option 4.

Key Points

S1: Regular languages are a subset of the set of languages accepted by TMs which do not write anything on the tape.

True, Regular languages are a subset of the set of languages accepted by TMs Which do not write anything on the tape. The subset of regular languages is not closed under regular grammar.

S2: The set of languages accepted by halting TMs with a bidirectional infinite tape is a proper superset of decidable language.

False, The set of languages accepted by halting TMs with a bidirectional infinite tape is a proper superset of decidable language. Halting Turing machine accepts recursive languages. Proper superset of recursive languages is an undecidable language.

S3: Every decidable language can be accepted by a DFA with a priority queue.

True, Every decidable language can be accepted by a DFA with a priority queue.

UGC NET Paper 2 Computer Science Mock Test - 8 - Question 7

Given F(A,B,C,D) = Σm (0, 1, 2, 5, 10, 15)

d(A, B, C, D) = Σm (6, 7, 8, 13)

Then Number of prime implicants and essential prime implicants respectively are__________:

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 8 - Question 7

Essential prime implicant means implicant which can not be replaced by any another implicant.

UGC NET Paper 2 Computer Science Mock Test - 8 - Question 8

A participant uses two prime numbers p and q are 5 and 13 in an RSA cryptosystem, to create public and private keys. If the participant's public key is 11 and the ciphertext (C) is 8, what is the original message (M)?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 8 - Question 8

Key Points

In RSA encryption, the ciphertext (C) is computed using the public key (e, n) and the original message (M) as follows:

Here, e is the public exponent, and n is the product of the two prime numbers (p and q) used to generate the keys.

Given that the participant's public key is e = 11, and the product of the two prime numbers n = pq = 5 times 13 = 65, and the ciphertext C = 8, we can set up the equation:

Now, we need to find the value of M.

To solve this equation, we can use the Chinese Remainder Theorem or simply try different values of M until we find one that satisfies the congruence.

Let's check each option:

1)
2)
3)
4)

Therefore, the correct answer is 4) 57.

UGC NET Paper 2 Computer Science Mock Test - 8 - Question 9

Consider the following strings:

S1 = PQPTSR

S2 = QPRQPS

Find the length of the longest common subsequence by using dynamic programming.

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 8 - Question 9

Here, longest common subsequence is PQPS.

UGC NET Paper 2 Computer Science Mock Test - 8 - Question 10

Consider a system with a logical address of 23 bits, a physical address of 128 MB, and a page size of 8 KB. Calculate the page table size in bytes.

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 8 - Question 10

The correct answer is 2 KB.

The steps to find the page table size are:

UGC NET Paper 2 Computer Science Mock Test - 8 - Question 11
For a sphere, “Euler Characteristic or Property is _______
Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 8 - Question 11

Euler formula:-

It is written F + V - E = 2, where F is the number of faces, V the number of vertices, and E the number of edges.

This formula is true for sphere as well.

If we create one latitude and one longitude on a sphere. We'll get 2 vertices, 4 edges and 4 faces.

Here we can take any number of longitude and latitudes, it will satisfy the euler formula.

UGC NET Paper 2 Computer Science Mock Test - 8 - Question 12
If |A| = 50, |A ∩ B| = 45 and |B| = 48, then what is |P(A − B)|?
Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 8 - Question 12

Concept Used:

P(A) represents the Powerset of A i.e., the set of all subsets of A.

|P(A)| = 2|A|

A - B = {x| x ∈ A and x ∉ B}

Calculation:

|A| = 50, |A ∩ B| = 45 and |B| = 48

⇒ A and B have 45 elements in common.

Hence, A - B must have only 5 elements i.e., |A - B| = 5

Hence, |P(A − B)| = 2|(A − B)| = 25

UGC NET Paper 2 Computer Science Mock Test - 8 - Question 13

HART is a digital communication protocol for sending and receiving information. It uses which of the following current loop standards?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 8 - Question 13

The correct answer is 4 - 20 mA

Concept:

HART Protocol

There are several reasons for using HART Communication to increase data flow between hosts and field devices. These include reconfiguration, diagnostic and troubleshooting instruments, reading the additional measurements provided by the device, and much more.

  • It can provide many benefits, including playing a key role in improving plant performance, increasing asset availability, reducing maintenance costs.
  • The HART Protocol provides two simultaneous communication channels on the same wire: 4-20mA “current loop” analog and a HART digital signal.
  • The analog signal continues to provide primary values to and from field instruments, the digital signal provides additional device information.
  • This is originally superimposed a digital communication signal “on top of” the 4-20mA current loop to bring Caller ID technology to the field of telephony.

Communication data

There are many ways to integrate HART data and leverage intelligence in your smart field devices.

  • Point-to-Point Integration is the most common method, enabling users to interrogate a device using a remote host by connecting anywhere on the current loop.
  • The next step is HART-to-Analog Integration, which replaces analog control components with HART protocol signal extractors to convert real-time instrument data 4-20 mA signals for input into an existing analog control system.
  • Next, HART-plus – Analog Integration employs HART technology multiplexers to replace existing I/O termination panels.

Conclusion:

Option 3 is correct.

UGC NET Paper 2 Computer Science Mock Test - 8 - Question 14

Classless Inter-domain Routing (CIDR) receives a packet with address 182.25.110.68. The router’s routing table has the following entries:

The identifier of the output interface on which this packet will be forwarded is ______.
Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 8 - Question 14

A)182.25.110.68 -> 10110110.00011001.1101110.1000100

For 182.20.0.0/ 13 MASK is (first 13 bits are 1 and remaining are 0) 11111111 11111000 00000000 00000000

Bitwise AND result -> 10110110.00011000.0.0 -> 182.24.0.0

B) 182.25.110.68 -> 10110110.00011001.1101110.1000100

For 182.22.0.0/ 12 MASK is (first 12 bits are 1 and remaining are 0) 11111111 11110000 00000000 00000000

Bitwise AND result -> 10110110.00010000.0.0 -> 182.16.0.0

C) 182.25.110.68 -> 10110110.00011001.1101110.1000100

For 182.24.0.0/ 14 MASK is (first 14 bits are 1 and remaining are 0) 11111111 11111100 00000000 00000000

Bitwise AND result -> 10110110.00011000.0.0 -> 182.24.0.0

Longest prefix matching will be used to decide among interface 2 and 4.

The interface 2 has the longest matching prefix with the input IP address.

UGC NET Paper 2 Computer Science Mock Test - 8 - Question 15

For any three sets A, B and C the set

(A U B U C) ∩ (A ∩ B' ∩ C')' ∩ C' is equal to

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 8 - Question 15

Calculation:

(A ∩ B' ∩ C')' = A' U B U C

∴ (A U B U C) ∩ (A ∩ B' ∩ C')'

= (A U B U C) ∩ (A' U B U C)

= (A ∩ A') U (B U C) [By distributivity of U over ∩]

= ϕ U (B U C) = B U C

Hence,

(A U B U C) ∩ (A ∩ B' ∩ C')' U C'

⇒ (B U C) ∩ C' = (B ∩ C') U (C ∩ C') = B ∩ C'

∴ Correct answer is option 1.

UGC NET Paper 2 Computer Science Mock Test - 8 - Question 16

Consider the following Statements

Statement 1: Greedy technique solves the problem correctly and always provides an optimized solution to the problem.

Statement 2: Bellman ford, Floyd-warshal, and Prim’s algorithms use the Dynamic Programming technique to solve the Path problems.

Which of the following is true?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 8 - Question 16

Statement 1: Greedy technique solves the problem correctly and always provides an optimized solution to the problem.

This Statement is False. Since the Greedy technique does not always solve a problem correctly.

Statement 2: Bellman ford, Floyd-warshal, and Prim’s algorithms use the Dynamic Programming technique to solve the Path problems.

This Statement is also False Since Prim's algorithm does not use the Dynamic Programming technique.

Prim's algorithm is a greedy algorithm that finds a minimum spanning tree for a weighted undirected graph.

UGC NET Paper 2 Computer Science Mock Test - 8 - Question 17

Let the following is the sub-image 3 x 3, where each pixel is represented with 4-bits. Obtain all the bit plane slicing images of this.

Which of the following is not a valid bit plan slicing?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 8 - Question 17

Key Points

Bit plane slicing is a method of representing an image with one or more bits of the byte used for each pixel. One can use only MSB to represent the pixel, which reduces the original gray level to a binary image. The three main goals of bit plane slicing are:

  • Converting a gray level image to a binary image.
  • Representing an image with fewer bits and corresponding the image to a smaller size.
  • Enhancing the image by focussing.

The given image is,

And each pixel is represented with 4-bits means 4-bit plans come,

So,

  • 0 can represent 0000,
  • 1 can represent 0001,
  • 6 can represent 0110,
  • 7 can represent 0111,
  • 2 can represent 0010,
  • 4 can represent 0100,
  • 6 can represent 0110,
  • 5 can represent 0101,
  • 3 can represent 0011.

MSB plan 0 =

plan 1 =

plan 2 =

plan 3 =

Option 4 is not bit plan among 4-bit plan because the third row can't be 1 1 1.

Hence the correct answer is

UGC NET Paper 2 Computer Science Mock Test - 8 - Question 18
Identify the wrong output stack permutation for the Input sequence in 1, 2, 3, 4, 5 and pop can occur at any time in stack.
Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 8 - Question 18

for a)

for b)

So, 2 3 5 4 1

for c)

so, 4 3 5 2 1

for d)

So, the permutation 3, 4, 1, 5, 2 is invalid

UGC NET Paper 2 Computer Science Mock Test - 8 - Question 19
Which design concept implies a program control mechanism without specifying internal details?
Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 8 - Question 19

A procedural abstraction is a named sequence of instructions that has a specific and limited function.

A data abstraction is a named collection of data that describes a data object.

Control abstraction is the third form of abstraction used in software design. Like procedural and data abstraction, control abstraction implies a program control mechanism without specifying internal details. An example of a control abstraction is the synchronization semaphore used to coordinate activities in an operating system.
UGC NET Paper 2 Computer Science Mock Test - 8 - Question 20

Consider the following segment of codes related to process creation. How many times the message “child process created” will be printed?

#include<stdio.h>

void main() {

fork(); fork(); fork();

printf(“child process created”);

}
Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 8 - Question 20

Concept:

Fork system call is used to create a new process also called as child processes.

Formula:

With n fork system calls, number of child processes created are 2n – 1.

Printf statement will be executed 2n times with n system calls.

Explanation:

Here there are 3 fork system calls in the given program.

So, 23 times printf statement will be executed.

i.e. 8 times “child process created” will be printed.
UGC NET Paper 2 Computer Science Mock Test - 8 - Question 21
Up to isomorphism, the number of abelian groups of order 108 is
Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 8 - Question 21

Given:

abelian groups of order 108

Concept:

the number of abelian groups of order n is p(n) ( no of partition of n )

Calculation:

108 = 22⋅33.

Now, p(2) = 2 because 2 = 2 and 2 = 1 + 1,

whereas p(3) = 3 because 3 = 3, 3 = 1 + 2, and 3 = 1 + 1 + 1.

Hence, the number of abelian groups of order 108 up to isomorphism is p(2) × p(3) = 2 × 3 = 6.

Hence the option (3) is correct.

UGC NET Paper 2 Computer Science Mock Test - 8 - Question 22

What is the minimum number of nodes that must be examined in order to find the minimum value in an AVL tree of height 5?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 8 - Question 22
The minimum number of nodes in an AVL tree can be calculated as follows:

Minimum number of nodes of height h, N(h) = N(h-1) + N(h-2) + 1

Where, N(0) = 1 and N(1) = 2

So,

N(2) = N(1) + N(0) + 1 = 2 + 1 + 1 = 4,

N(3) = N(2) + N(1) + 1 = 4 + 2 + 1 = 7,

N(4) = N(3) + N(2) + 1 = 7 + 4 + 1 = 12,

N(5) = N(4) + N(3) + 1 = 12 + 7 + 1 = 20.

Therefore, to find the minimum number of nodes of an AVL tree of height 5, the values of N(2), N(3) and N(4) must be found. So, the values of 3 nodes have to be found.

UGC NET Paper 2 Computer Science Mock Test - 8 - Question 23

______ structure is usually used to connect I/O devices.

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 8 - Question 23
Single bus structure is usually used to connect I/O devices. BUS is a bunch of wires which carry addresses, control signals and data. It is used to connect various components of the computer. In a single bus structure, one common bus is used to communicate between peripherals and microprocessors
UGC NET Paper 2 Computer Science Mock Test - 8 - Question 24

A heavy line on a video monitor could be displayed as:

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 8 - Question 24
A heavy line could be displayed as adjacent parallel lines on a video monitor, while a pen plotter might require pen changes to draw a thick line. Implementation of line-width options depends on the capabilities of the output device. Thicker lines are displayed as positive integer multiples of the standard line by plotting additional pixels along adjacent parallel lines paths.
UGC NET Paper 2 Computer Science Mock Test - 8 - Question 25

The processes that are residing in main memory and are ready and waiting to execute are kept on a list called _____________.

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 8 - Question 25
The processes that are residing in main memory and are ready and waiting to execute are kept on a list called ready queue. The ready queue is a simplified version of a kernel data structure consisting of a queue with one entry per priority. Each entry in turn consists of another queue of the threads that are READY at the priority. Any threads that aren't READY aren't in any of the queues but they will be when they become READY.
UGC NET Paper 2 Computer Science Mock Test - 8 - Question 26

The importance of software design can be summarized in a single word which is:

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 8 - Question 26
The importance of software design can be summarized in a single word which is quality. The quality of functional software, functional depicts how well it can conform with or adapts to a given design based on functional requirements or specifications.
UGC NET Paper 2 Computer Science Mock Test - 8 - Question 27

Direction:- Consider the following postfix expression with single digit operands:

623∗/42∗+68∗−

The top two elements of the stack after the second ∗ is evaluated, are:

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 8 - Question 27

Push 6 into the stack, Push 2 into the stack, Push 3 into the stack.

Now we encounter an operator. So, pop top 2 elements and apply the operator between them, it should be like:

( second_pop operator first_pop ) ==> 2 * 3 but not 3 * 2

result is 6 ==> push into the stack.

Now we encounter an operator. So, pop top 2 elements and apply the operator between them, it should be like:

( second_pop operator first_pop ) ==> 6 / 6

result is 1 ==> push into the stack.

Push 4 into the stack, Push 2 into the stack.

Now we encounter an operator. So, pop top 2 elements and apply the operator between them, it should be like:

( second_pop operator first_pop ) ==> 4 * 2

result is 8 ==> push into the stack.

question is asking about till evaluate up to 2nd * evaluated, ==> our task complete.

The top of the two elements of our stacks is 8,1 in the order from top to bottom.

UGC NET Paper 2 Computer Science Mock Test - 8 - Question 28

Which is the best way to solve game playing problem?

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 8 - Question 28

The best way to solve game playing problem is Heuristic approach. You use a Heuristic approach, as it will find out brute force computation, looking at hundreds of thousands of positions. e.g Chess competition between Human and AI-based Computers. A heuristic, or a heuristic technique, is an approach to problem-solving that uses a practical method or various shortcuts in order to produce solutions that may not be optimal but are sufficient given a limited timeframe or deadline.

UGC NET Paper 2 Computer Science Mock Test - 8 - Question 29

A language can be generated from simple primitive language in a simple way if and only if:

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 8 - Question 29

A language is regular if and only if it can be accepted by a finite automaton. Secondly, It supports no concept of auxiliary memory as it loses the data as soon as the device is shut down.

UGC NET Paper 2 Computer Science Mock Test - 8 - Question 30

Hasse diagrams are first made by _________.

Detailed Solution for UGC NET Paper 2 Computer Science Mock Test - 8 - Question 30

Hasse diagrams can be described as the transitive reduction as an abstract directed acyclic graph. This graph drawing techniques are constructed by Helmut Hasse(1948). The diagrams are named after Helmut Hasse (1898–1979); according to Garrett Birkhoff (1948), they are so-called because of the effective use Hasse made of them.

View more questions
Information about UGC NET Paper 2 Computer Science Mock Test - 8 Page
In this test you can find the Exam questions for UGC NET Paper 2 Computer Science Mock Test - 8 solved & explained in the simplest way possible. Besides giving Questions and answers for UGC NET Paper 2 Computer Science Mock Test - 8, EduRev gives you an ample number of Online tests for practice

Top Courses for UGC NET

Download as PDF

Top Courses for UGC NET