NEW**UGC NET Solved Papers Held On June 2015

Download Admit Card
                                Important Dates      Schedule Of Examination       Eligibility      

December 26, 2013

UGC NET Solved Paper-III December 2011

<<<Back

Note : This paper is of two hundred (200) marks containing four (4) sections. Candidates are required to attempt the questions contained in these sections according to the detailed instructions given therein.
Answer to all questions must be written in English only.
SECTION – I
Note : This section consists of two essay type questions of twenty (20) marks each, to be answered in about five hundred (500) words each. (2 × 20 = 40 marks)
1. (a) Compare and contrast the TCP/IP Stack with the OSI model. What factor do you think will affect setting an appropriate TCP time out period before the sending host  performs a retransmission ?
(b) Briefly explain the major difference between Ethernet V2.0 and IEEE 802.3.
OR
(a) What are the necessary and sufficient conditions for Deadlock ? Explain in brief each of them.
(b) What is a semaphore and how it is used to prevent entry in the critical section ?
2. (a) What do you mean by a software process ? What is the difference between a
methodology and a process ? What problem will a Software Development house face if it does not follow any systematic process in its software development efforts ?
(b) Which are the major phases in the waterfall model of software development ?
Which phase consumes the maximum effort ?
OR
(a) Show that a static two phase locking schedule satisfies the condition for dynamic two phase locking. Is the converse true ?
(b) Propose a multi version protocol base on locking. Prove that the protocol is safe. Compare the performance of this protocol with the one based on time stemp ordering.
SECTION – II
Note : This section contains three (3) questions. From each of the electives/specializations, the candidate has to choose only one elective/specialization and answer all the three questions contained therein. Each question carries fifteen (15) marks and is to be answered in about three hundred (300) words. (3 × 15 = 45 Marks)

Elective – I
3. Suppose LCE* and for some positive integer n1 there are n strings in E* , any two of
which are distinguishable with respect to L. Prove that every FA reorganising L must
have at least n states.
4. If L1 & L2 are context free languages L1È L2, L1L2 and L1* are also CFLs.
5. If L1& L2 are recursively enumerable languages over _ , then L1È L2 and L1Ç L2
are also recursively enumerable.
OR
Elective – II
Image Processing
3. (a) What are the kinds of degradation that can be easily restored ? Explain inverse
filteration and wiener filteration method.
(b) A source emits 6 symbols with probabilities 1/2, 1/4, 1/8, 1/16, 1/32, 1/32.
Determine its Huffman code.
4. (a) State and prove Shannon channel capacity theorem.
(b) Explain sub band coding. What is the significance of down sampling and up
sampling in sub band coding ?
5. (a) What is image registration ? And explain image to image registration.
(b) Explain turbo and convulsional codes.
OR
Elective – III
3. Solve the following Linear Programming Problem by the Revised Simplex Method :
Maximize Z = 2x1+ 2x2
Subject to 3x1+ 4x2<= 6
      6x1+ x2<= 3
      x1, x2=> 0
4. Goods have to be transported from source S1, S2 and S3 to destination D1, D2 and D3.
The transportation cost per unit, capacities of the sources and requirements of the
destination are given in the following table.
D1          D2          D3          Supply
S1          8          5          6          120
S2          15        10        12        80
S3          3          9          10        8
Demand         150     80        50
What schedule to be used to minimize the transportation cost ?
5. Using the Bellman – Ford Algorithm, find the shortest path.
OR
Elective – IV
3. Compare solving XOR problem using RBF and multilayer perception with one
hidden layer which one would you prefer & why ?

4. A neuron j receives inputs from four other neurons whose activity levels are 10, –20,
4, –2. The respective synaptic weights of neuron j are 0.8, 0.2, –1.0 and –0.9.
Calculate the output of neuron j for the following two situations :
(a) The neuron is linear.
(b) The neuron is represented by a Mc Culloch – Pitts model.
5. Let x be a linguistic variable that measures a university’s academic excellence, which
takes values from the universe of discourse U = {1, 2, 3, 4, 5, 6, 7, 8, 9, 10}. Suppose
the term set of x includes Excellent, Good, Fair and Bad. The membership functions
of these linguistic labels are listed below :
_ μExcellent = {(8, 0.2), (9, 0.6), (10, 1)}
_ μGood = {(6, 0.1) (7, 0.5) (8, 0.9), (9,1), (10,1)}
_ μFair = {(2, 0.3) (3, 0.6) (4, 0.9) (5, 1) (6, 0.9) (7, 0.5) (8, 0.1)}
_ μBad = {(1, 1) (2, 0.7) (3, 0.4) (4, 0.1)}
Construct the membership functions of the following compound sets :
_ Not Bad but Not Very Good
_ Good but Not Excellent
OR
Elective – V
UNIX
3. (a) Explain terminal emulator under X windows and also explain X clip board.
(b) What are 3 modes of Vi editor and various commands used in them ?
4. (a) What is the use of ‘grep’, ‘egrep’, ‘fgrep’ Command ?
(b) How is client server environment created in X ? Explain 3 command line options handled by X client.
5. (a) Describe briefly six windows functions usually called while creating a window.
(b) What is the difference between UNIX and Windows Navigation and directory control commands ?

SECTION – III
Note : This section contains nine (9) questions of ten (10) marks each, each to be answered in about fifty (50) words. (9 × 10 = 90 Marks)
6. What is the difference between centralized routing and distributed routing ?
7. Can a system detect that some of its processes are starving ? If yes, then explain how it can ? If no, then explain how the system can deal with starvation problem.
8. Show how a Btree and B+ tree can be used to implement a priority queue. Also
show that any sequence of n insertion and minimum deletion can be performed in
o(nlogn) steps.
9. Obtain the logic diagram of a master-slave JK flip flop with AND and NOR Gates,
include provision for setting and clearing the flip flop asynchronously.
10. Two binary trees are similar if they are either empty or both non-empty and have
similar left and right sub trees. Write a function in C++ to decide whether two binary
trees are similar. What is the running time of your function ?
11. Find the Normalization transformation that maps a windows whose lower left is at
(1,1) and Upper right (3, 5) onto a view port that has lower left corner at (0, 0) and
Upper right corner at (½, ½).
12. Consider the following piece of Knowledge: Mary, Micky and John are members of
rotary club. Every rotary club member who is not a swimmer is a mountain climber. Mountain climber do not like rains. Any one who does not like water is not a swimmer. Micky dislikes whatever Mary likes and likes whatever Mary dislikes.
Mary likes rain and water.
(a) Represent this Knowledge as predicate statement.
(b) Answer the query. Is there a member of Rotary club who is not a mountain climber but a swimmer using resolution method.
13. Compare the relative advantages of using the iterative waterfall model and the spiral
model of software development. Explain with the help of few suitable examples, the types of problem for which you would adopt above models.
14. What is the basic difference between optimistic concurrency control and other
concurrency control technique. Describe the different phases of an optimistic
concurrency control scheme.
SECTION – IV
Note : This section contains five (5) questions of five (5) marks each. Each question should be answered in about thirty (30) words. (5 × 5 = 25 Marks)
15. An eight way set associative cache consists of a total of 256 Blocks. The main
memory contains 8192 blocks, each consisting of 128 words.
(a) How many bits are there in the main memory address ?
(b) How many bits are there in TAG, SET and WORD fields ?
16. Why does LAN tend to use Broadcast Network ? Why not use Networks consisting of multiplexer and switches ?
17. How would you improve a software design that displays very low cohesion and high
coupling ?
18. What are the types of collision resolution techniques and the method used in each of these types ?

19. Why are segmentation and paging sometimes combined into one scheme ?

UGC NET Solved Paper-II December 2011

<<<Back     
1.Which of the following data structure is Non-linear type ?
(A) Strings     (B) Lists          (C) Stacks      (D) None of the above
2. The total number of comparisons in a bubble sort is
(A) 0(log n)    (B) 0(n log n) (C) 0(n)          (D) None of the above
3. Which of the following is a bad example of recursion ?
(A) Factorial  (B) Fibonacci numbers (C) Tower of Hanai (D) Tree traversal
4. Domain and Range of the function Y = – –2x + 3 is
(A) x ³32, y ³ 0          (B) x >32, y £ 0
(C) x ³32, y £ 0         (D) x £32, y £ 0
5. Maximum number of edges in a n-Node undirected graph without self loop is
(A) n2 (B) n(n – 1)     (C) n(n + 1) (D)n(n – 1)2
6. A hash table has space for 75 records, then the probability of collision before the table is 6% full.
(A) .25 (B) .20            (C) .35 (D) .30
7. BCC in the internet refers to
(A) Black carbon copy         (B) Blind carbon copy
(C) Blank carbon copy        (D) Beautiful carbon copy
8. Hub is a term used with
(A) A Star Networks (B) A Ring Networks (C) A Router (D) A Bridge
9. The amount of uncertainty in a system of symbol is called
(A) Bandwidth (B) Entropy (C) Loss (D) Quantum
10. Which of the following network
access standard disassembler is used for connection station to a packet switched network ?
(A) X.3 (B) X.21(C) X.25 (D) X.75
11. A station in a network in a network forward incoming packets by placing them on its shortest output queue. What routing algorithm is being used ?
(A) Hot potato routing  (B) Flooding  (C) Static routing  (D) Delta routing
12. Start and stop bits are used in serial communications for
(A) Error detection   (B) Error correction 
(C) Synchronization  (D) Slowing down the communication
13. For a data entry project for office staff who have never used computers before (user interface and userfriendliness  are extremely important), one will use
(A) Spiral model       (B) Component based model
(C) Prototyping         (D) Waterfall model
14. An SRS
(A) establishes the basis for agreement between client and the supplier.
(B) provides a reference for validation of the final product.
(C) is a prerequisite to high quality software.
(D) all of the above.
15. McCabe’s cyclomatic metric V(G) of a graph G with n vertices, e edges and p connected component is
(A) e    (B) n   (C) e – n + p  (D) e – n + 2p
16. Emergency fixes known as patches are result of
(A) adaptive maintenance  (B) perfective maintenance
(C) corrective maintenance            (D) none of the above
17. Design recovery from source code is done during
(A) reverse engineering      (B) re-engineering
(C) reuse                               (D) all of the above
18. Following is used to demonstrate that the new release of software still performs the old one did by rerunning the old tests :
(A) Functional testing (B) Path testing (C) Stress testing (D) Regression testing
19. The post order traversal of a binary tree is DEBFCA. Find out the preorder traversal.
(A) ABFCDE (B) ADBFEC (C) ABDECF (D) ABDCEF
20. B + tree are preferred to binary tree in database because
(A) Disk capacities are greater than memory capacities
(B) Disk access much slower than memory access
(C) Disk data transfer rates are much less than memory data transfer rate
(D) Disk are more reliable than memory
21. What deletes the entire file except the file structure ?
(A) ERASE    (B) DELETE  (C) ZAP          (D) PACK
22. Which command classes text file, which has been created using “SET ALTERNATIVE” <FILE NAME> “Command” ?
(A) SET ALTERNATE OFF            (B) CLOSE DATABASE
(C) CLOSE ALTERNATE               (D) CLEAR ALL
23. Data security threats include
(A) privacy invasion                           (B) hardware failure
(C) fraudulent manipulation of data (D) encryption and decryption
24. Which of the following statements is true, when structure of database file with 20 records is modified ?
(A) ? EOF ( ) Prints. T          (B) ? BOF ( ) Prints F
(C) ? BOF ( ) Prints T           (D) ? EOF ( ) Prints F
25. The SQL Expression
Select distinct T. branch name from branch T, branch S where T. assets > S. assets and S. branch-city = DELHI, finds the name of
(A) all branches that have greater asset than any branch located in DELHI.
(B) all branches that have greater assets than allocated in DELHI.
(C) the branch that has the greatest asset in DELHI.
(D) any branch that has greater asset than any branch located in DELHI.
26. Dijkestra banking algorithm in an operating system, solves the problem of
(A) deadlock avoidance      (B) deadlock recovery
(C) mutual exclusion           (D) context switching
27. The multiuser operating system, 20 requests are made to use a particular resource per hour, on an average the probability that no request are made in 45 minutes is
(A) e–15 (B) e–5 (C) 1 – e–5 (D) 1 – e–10
28. On receiving an interrupt from an I/O device, the CPU
(A) halts for predetermined time.
(B) branches off to the interrupt service routine after completion of the current instruction.
(C) branches off to the interrupt service routine immediately.
(D) hands over control of address bus and data bus to the interrupting device.
29. The maximum amount of information that is available in one portion of the disk access arm for a removal disk pack (without further movement of the arm with multiple
heads)
(A) a plate of data     (B) a cylinder of data
(C) a track of data     (D) a block of data
30. Consider a logical address space of 8 pages of 1024 words mapped with memory of 32 frames. How many bits are there in the physical address ?
(A) 9 bits (B) 11 bits (C) 13 bits (D) 15 bits
31. CPU does not perform the operation
(A) data transfer  (B) logic operation  (C) arithmetic operation  (D) all of the above
32. A chip having 150 gates will be classified as
(A) SSI (B) MSI (C) LSI (D) VLSI
33. If an integer needs two bytes of storage, then the maximum value of unsigned integer is
(A) 216 – 1      (B) 215 – 1      (C) 216                (D) 215
34. Negative numbers cannot be represented in
(A) signed magnitude form            (B) 1’s complement form
(C) 2’s complement form    (D) none of the above
35. The cellular frequency reuse factor for the cluster size N is
(A) N               (B) N2                 (C)1N             (D)1N2
36. X – = Y + 1 means
(A) X = X – Y + 1       (B) X = –X – Y – 1
(C) X = –X + Y + 1    (D) = X – Y – 1
37. Handoff is the mechanism that
(A) transfer an ongoing call from one base station to another
(B) initiating a new call      
(C) dropping an ongoing call
(D) none of above
38. Which one of the following statement is false ?
(A) Context-free languages are closed under union.
(B) Context-free languages are closed under concatenation.
(C) Context-free languages are closed under intersection.
(D) Context-free languages are closed under Kleene closure.
39. All of the following are examples of real security and privacy risks except
(A) Hackers   (B) Spam       (C) Viruses    (D) Identify theft
40. Identify the incorrect statement :
(A) The ATM adoption layer is not service dependent.
(B) Logical connections in ATM are referred to as virtual channel connections.
(C) ATM is streamlined protocol with minimal error and flow control capabilities
(D) ATM is also known as cell delays.
41. Software risk estimation involves following two tasks :
(A) Risk magnitude and risk impact
(B) Risk probability and risk impact
(C) Risk maintenance and risk impact
(D) Risk development and risk impact
42. The number of bits required for an IPV6 address is
(A) 16 (B) 32(C) 64 (D) 128
43. The proposition ~qvp is equivalent to
(A) p ® q (B) q ® p(C) p « q (D) p Ú q
44. Enterprise Resource Planning (ERP)
(A) has existed for over a decade.
(B) does not integrate well with the functional areas other than operations.
(C) is inexpensive to implement.
(D) automate and integrates the majority of business processes.
45. Which of the following is false concerning Enterprise Resource Planning (ERP) ?
(A) It attempts to automate and integrate the majority of business processes.
(B) It shares common data and practices across the enterprise.
(C) It is inexpensive to implement.
(D) It provides and access information in a real-time environment.
46. To compare, overlay or cross analyze to maps in GIS
(A) both maps must be in digital form
(B) both maps must be at the same equivalent scale.
(C) both maps must be on the same coordinate system
(D) All of the above
47. Web Mining is not used in which of the following areas ?
(A) Information filtering                 (B) Crime fighting on the internet
(C) Online transaction processing (D) Click stream analysis.
48. A telephone conference call is an example of which type of communications ?
(A) same time / same place            (B) same time / different place
(C) different time / different place (D) different time / same place
49. What is the probability of choosing correctly an unknown integer between 0 and 9 with 3 chances ?
(A) 963 /1000
(B) 973/1000
(C) 983/1000
(D) 953/1000
50. The number of nodes in a complete binary tree of height h (with roots at level 0) is equal to
(A) 20 + 21 + ….. 2h                    (B) 20 + 21 + ….. 2h – 1
(C) 20 + 21 + ….. 2h + 1             (D) 21 + ….. 2h + 1                                                             

December 25, 2013

Question Paper of Ugc Net June 2013 Computer Science And Applications Paper-II

<<<BACK                                                  Answer Key
1.   COCOMO stand for
(a)  COmposite COst MOdel
(b)  COnstructive COst MOdel
(c)   COnstructive COmposite MOdel
(d)  COmprehensive COnstruction MOdel

2.   Match the following:
(a)  Good quality   (i)   Program does not fail for a specified time in a given environment
(b)  Correctness     (ii)  Meets the functional requirements
(c)  Predictable      (iii) Meets the functional and non functional requirements
(d)  Reliable           (iv) Process is under statistical control 

3.   While estimating the cost of software, lines Of Codes(LOC) and Functional Points(FP) are used    to measure which one of the following?
(a) Length of code
(b) Size of software
(c) Functionality of  software
(d) None of the above

4.   A good software design must have
(a)  High module coupling, High module cohesion
(b)  High module coupling, Low module cohesion
(c)  Low module coupling, Low module cohesion
(d)  Low module coupling, Low module cohesion

5.   Cyclometric complexity of a flow  graph with n vertices and e edges is:
(a)  V(G) = e+n-2     (b)  V(G) = e-n+2
(c)  V(G) = e+n+2    (d)  V(G) = e-n-2

6.   When the following code is executed what will be the value of x and y?
                int x=1,   y=0;
                     y= x++;
(a)   2,1       (b)   2,2        (c)   1,1      (d)   1,2

7.   How many values can be held by an array A(-1, m ; 1, m) ?
(a)   m         (b)   m2        (c)    m(m+1)    (d)    m(m+2)

8.   What is the result of the expression (1&2)+(3/4) ?
(a)   1       (b)     2         (c)    3        (d)     0

9.   How many times the word 'print' shall be printed by the following program segment?
          for(i =1 , i <= 2 , i++)
          for(j =1 , j <= 2 , j++)
          for(k =1 , k <= 2 , k++)
          printf("print/n")
(a)   1       (b)     3        (c)      6        (d)    8

10.  Which of the following is not a type of Database Management System?
(a)  Hierarchical           (b)   Network
(c) Relational               (d)   Sequential

11.   Managers salary details are to be hidden from Employee Table. This Technique is called as
(a)  Conceptual level Datahiding  (b)  Physical  level Datahiding
(c)  External  level Datahiding      (d)  Logical level Datahiding

12. A Network Schema
(a)  restricts to one to many relationship
(b)  permits many to many relationship
(c)  stores Data in a Database
(d)  store Data in a Realtion

13.   Which normal form is considered as adequate for usual database design?
(a)   2NF       (b)   3NF      (c)    4NF        (d)     5NF

14.   If    are domains in a relational model, then the relation is a table,which is a subset of
(a)

15.    Which of the following addresses is used to deliver a message to the correct application program running on a host?
(a)  Port          (b)  IP        (c)  Logical        (d)  Physical

16.   In _____________ substitution, a character in the plaintext is always changed to the same character in the ciphertaxt, regardless of its position in the text.
(a)  polyalphabetic     (b)  monoalphabetic
(c)  transalphabetic    (d)  multialphabetic

17.   In classful addressing, the IP address 190.255.254.254 belongs to
(a)  Class A      (b) Class B     (c)  Class C      (d)  Class D

18.   In hierarchical routing with 4800 routers ,what region and cluster sizes should be choosen to minimize the size of routing table for a three layer hierarchy ?
(a) 10 clusters , 24 regions and 20 routers
(b) 12 clusters , 20 regions and 20 routers
(c) 16 clusters , 12 regions and 25 routers
(d) 15 clusters , 16 regions and 20 routers

19.   In IPv4 header, the _________ field is needed to allow the destination host to determine which datagram a newly arrived fragments belongs to,
(a)   identification       (b)  fragment offset
(c)  time to live           (d)  header checksum

20.   Given L1 = L(a*baa*) and L2 = L(ab*). The regular expression corresponding to language  L3 = L1/L2 (right quotient) is given by
(a)  a*b        (b)  a*baa*    (c)  a*ba*    (d)  None of the above

21.   Given the production rules of a grammar G1 as
         S1  -->  AB | aaB
         A  --> a | Aa
         B -->  b
      and the  production rules of a grammar G2 as
         S2  --> aS2bS2 |
Which of the following is a correct statement ?
(a)  G1 is ambiguous and G2 is not ambiguous
(b)  G1 is ambiguous and G2 is  ambiguous
(c)  G1 is not ambiguous and G2 is ambiguous
(d)  G1 is not ambiguous and G2 is not ambiguous

22.  Given a grammar :S1 --> Sc, S--> SA |A, A-->aSb| ab, there is a rightmost derivation  S1--> Sc--> SAC--> SASbc  Thus , SaSbc is a right sequential form , and its handke is
(a)   SaS       (b)    bc      (c)     Sbc         (d)    aSb

23. The equivalent  production rules corrosponding rules

24.  Given a Non-deterministic Finite Automation (NFA) with statesp and r  as initial and final states respectively and transition table as given below :

The minimum number of states required in deterministic Finite Automation (DFA) equivalent to NFA is
(a)   5         (b)    4                (c)      3          (d)   2

25.   Which of the following is the correct statement  for Non Recursive predictive parser?
s1:

(a) Both statements S1 and S2 are incorrect
(b) S1 is incorrect and S2 is correct.
(c) S1 is correct and S2 is incorrect.
(d) Both statements S1 and S2 are correct.