NEW**UGC NET Solved Papers Held On June 2015

Download Admit Card
                                Important Dates      Schedule Of Examination       Eligibility      
Showing posts with label ugc net previous year computer application solved paper-JUNE 2014. Show all posts
Showing posts with label ugc net previous year computer application solved paper-JUNE 2014. Show all posts

December 23, 2014

UGC NET Solved Paper-I June 2014

                                                                  SET-W                                     NEXT-->
1. Break-down in verbal communication is described as
(A) Short circuit (B) Contradiction (C) Unevenness (D) Entropy
2. The Telephone Model of Communication was first developed in the area of
(A) Technological theory    (B) Dispersion theory
(C) Minimal effects theory  (D) Information theory
3. The Dada Saheb Phalke Award for 2013 has been conferred on
(A) Karan Johar (B) Amir Khan (C) Asha Bhonsle (D) Gulzar
4. Photographs are not easy to
(A) publish (B) secure (C) decode (D) change
5. The grains that appear on television set when operated are also referred to as
(A) sparks (B) green dots (C) snow (D) rain drops
6. In circular communication, the encoder becomes a decoder when there is
(A) noise (B) audience (C) criticality (D) feedback
7. In a post-office, stamps of three different denominations of ` 7, ` 8, ` 10 are available. The exact amount for which one cannot buy stamps is
(A) 19 (B) 20 (C) 23 (D) 29
8. In certain coding method, the word QUESTION is encoded as DOMESTIC. In this coding, what is the code word for the word RESPONSE ?
(A) OMESUCEM      (B) OMESICSM        (C) OMESICEM        (D) OMESISCM
9. If the series 4, 5, 8, 13, 14, 17, 22, .... is continued in the same pattern, which one of the following is not a term of this series ?
(A) 31 (B) 32 (C) 33 (D) 35
10. Complete the series BB, FE, II, ML, PP, ...........by choosing one of the following option given :
(A) TS (B) ST (C) RS (D) SR
11. A man started walking from his house towards south. After walking 6 km, he turned to his left and walked 5 km. Then he walked further 3 km after turning left. He then turned to his left and continued his walk for 9 km. How far is he away from his house ?
(A) 3 km (B) 4 km (C) 5 km (D) 6 km
12. One writes all numbers from 50 to 99 without the digits 2 and 7. How many numbers have been written ?
(A) 32 (B) 36 (C) 40 (D) 38
13. “If a large diamond is cut up into little bits, it will lose its value just as an army is divided up into small units of soldiers, it loses its strength.” The argument put above may be called as
(A) Analogical (B) Deductive (C) Statistical (D) Causal
14. Given below are some characteristics of logical argument. Select the code which expresses a characteristic which is not of inductive in character.
(A) The conclusion is claimed to follow from its premises.
(B) The conclusion is based on causal relation.
(C) The conclusion conclusively follows from its premises.
(D) The conclusion is based on observation and experiment.
15. If two propositions having the same subject and predicate terms can both be true but can not both be false, the relation between those two propositions is called
(A) contradictory (B) contrary (C) subcontrary (D) subaltern
16. Given below are two premises and four conclusions drawn from those premises. Select the code that expresses conclusion drawn validly from the premises (separately or jointly).Premises :
(a) All dogs are mammals.  (b) No cats are dogs.
Conclusions :
(i) No cats are mammals.  (ii) Some cats are mammals.
(iii) No dogs are cats.        (iv) No dogs are non-mammals.
Codes :
(A) (i) only (B) (i) and (ii)
(C) (iii) and (iv) (D) (ii) and (iii)
17. Given below is a diagram of three circles A, B & C inter-related with each other. The circle A represents the class of Indians, the circle B represents the class of scientists and circle C represents the class of politicians. p, q, r, s ... represent different regions. Select the code containing the region that indicates the class of Indian scientists who are not politicians.
UGC NET Solved Paper-I June 2014

Codes :
(A) q and s only   (B) s only  (C) s and r only  (D) p, q and s only
Read the following table carefully.Based upon this table answer question from 18 to 22 :
Net Area under Irrigation by sources in a country (Thousand Hectares)
UGC NET Solved Paper-I June 2014

18. Which of the following sources of Irrigation has registered the largest percentage of decline in Net area under irrigation during 1997-98 and 2005-06 ?
(A) Government canals (B) Private canals (C) Tanks (D) Other sources
19. Find out the source of Irrigation that has registered the maximum improvement
in terms of percentage of Net irrigated area during 2002-03 and 2003-04.
(A) Government canals            (B) Tanks
(C) Tube wells and other wells (D) Other sources
20. In which of the following years, Net irrigation by tanks increased at the highest rate ?
(A) 1998-99 (B) 2000-01 (C) 2003-04 (D) 2005-06
21. Identify the source of Irrigation that has recorded the maximum incidence of negative growth in terms of Net irrigated area during the years given in the table.
(A) Government canals            (B) Private canals
(C) Tube wells and other wells (D) Other sources
22. In which of the following years, share of the tube wells and other wells in the total net irrigated area was the highest ?
(A) 1998-99 (B) 2000-01 (C) 2002-03 (D) 2004-05
23. The acronym FTP stands for
(A) File Transfer Protocol    (B) Fast Transfer Protocol
(C) File Tracking Protocol    (D) File Transfer Procedure
24. Which one of the following is not a/an image/graphic file format ?
(A) PNG (B) GIF (C) BMP (D) GUI
25. The first web browser is
(A) Internet Explorer (B) Netscape (C) World Wide Web (D) Firefox
26. When a computer is booting, BIOS is loaded to the memory by
(A) RAM (B) ROM (C) CD-ROM (D) TCP
27. Which one of the following is not the same as the other three ?
(A) MAC address (B) Hardware address
(C) Physical address (D) IP address
28. Identify the IP address from the following :
(A) 300 × 215 × 317 × 3   (B) 302 × 215@ 417 × 5
(C) 202 × 50 × 20 × 148   (D) 202 – 50 – 20 – 148

29. The population of India is about 1.2 billion. Take the average consumption of energy per person per year in India as 30 Mega Joules. If this consumption is met by carbon based fuels and the rate of carbon emissions per kilojoule is 15 × 106 kgs, the total carbon emissions per year from India will be
(A) 54 million metric tons      (B) 540 million metric tons
(C) 5400 million metric tons  (D) 2400 million metric tons
30. Which of the following cities has been worst affected by urban smog in recent time?

(A) Paris  (B) London  (C) Los Angeles  (D) Beijing

October 30, 2014

UGC NET Solved Paper-III June 2014


COMPUTER SCIENCE & APPLICATIONS
Paper – III
1. Beam-penetration and shadow-mask are the two basic techniques for producing color displays with a CRT. Which of the following is not true ?
I. The beam-penetration is used with random scan monitors.
II. Shadow-mask is used in rasterscan systems.
III. Beam-penetration method is better than shadow-mask method.
IV. Shadow-mask method is better than beam-penetration method.
(A) I and II      (B) II and III      (C) III only      (D) IV only
2. Line caps are used for adjusting the shape of the line ends to give them a better appearance. Various kinds of line caps used are
(A) Butt cap and sharp cap                  (B) Butt cap and round cap
(C) Butt cap, sharp cap and round cap (D) Butt cap, round cap and projecting square cap
3. Given below are certain output primitives and their associated attributes. Match each primitive with
its corresponding attributes :
     List – I                     List – II
a.  Line                      i. Type, Size, Color
b.  Fill Area               ii. Color, Size, Font
c.  Text                     iii. Style, Color, Pattern
d.  Marker                iv. Type, Width, Color
     Codes :
          a      b      c       d
(A)     i       ii      iii      iv
(B)     ii      i       iii      iv
(C)     iv     iii     ii       i
(D)     iii     i       iv      ii
4. Consider a window bounded by the lines : x = 0; y= 0; x = 5 and y = 3. The line segment joining (–1, 0) and (4, 5), if clipped against this window will connect the points
(A) (0, 1) and (2, 3)    (B) (0, 1) and (3, 3)    (C) (0, 1) and (4, 3)   (D) (0, 1) and (3, 2)
5. Which of the following color models are defined with three primary colors ?
(A) RGB and HSV color models   (B) CMY and HSV color models
(C) HSV and HLS color models   (D) RGB and CMY color models
6. In a digital transmission, the receiver clock is 0.1 percent faster than the sender clock. How many extra bits per second does the receiver receive if the data rate is 1 Mbps ?
(A) 10 bps       (B) 100 bps          (C) 1000 bps              (D) 10000 bps
7. Given U = {1, 2, 3, 4, 5, 6, 7}
A = {(3, 0.7), (5, 1), (6, 0.8)}  then ~A will be : (where ~ ® complement)
(A) {(4, 0.7), (2, 1), (1, 0.8)}                                 (B) {(4, 0.3), (5, 0), (6, 0.2) }
(C) {(1, 1), (2, 1), (3, 0.3), (4, 1), (6, 0.2), (7, 1)} (D) {(3, 0.3), (6.0.2)}
8. Consider a fuzzy set old as defined below
Old = {(20, 0.1), (30, 0.2), (40, 0.4),(50, 0.6), (60, 0.8), (70, 1), (80, 1)}
Then the alpha-cut for alpha = 0.4 for the set old will be
(A) {(40, 0.4)}                 (B) {50, 60, 70, 80}
(C) {(20, 0.1), (30, 0.2)}  (D) {(20, 0), (30, 0), (40, 1),(50, 1), (60, 1), (70, 1), (80, 1)}
9. Perceptron learning, Delta learning and LMS learning are learning methods which falls under the
category of
(A) Error correction learning – learning with a teacher
(B) Reinforcement learning – learning with a critic
(C) Hebbian learning
(D) Competitive learning – learning without a teacher
10. Code blocks allow many algorithms to be implemented with the following parameters :
(A) clarity, elegance, performance       (B) clarity, elegance, efficiency
(C) elegance, performance, execution  (D) execution, clarity, performance
11. Match the following with respect to the jump statements :
      List – I             List – II
a.   return            i. The conditional test and increment portions
b.   goto             ii. A value associated with it
c.   break           iii. Requires a label for operation
d.   continue       iv. An exit from only the innermost loop
       Codes :
       a      b      c      d
(A)  ii      iii      iv     i
(B)  iii      iv     i       ii
(C)  iv     iii      ii      i
(D)  iv     iii     i        ii
12. The control string in C++ consists of three important classifications of characters
(A) Escape sequence characters, Format specifiers and Whitespace characters
(B) Special characters, White-space characters and Non-white space characters
(C) Format specifiers, White-space characters and Non-white space characters
(D) Special characters, White-space characters and Format specifiers
13. Match the following with respect to I/O classes in object oriented programming :
         List – I              List – II
a.      fopen()           i. returns end of file
b.     fclose()           ii. return for any problem report
c.     ferror()           iii. returns 0
d.     feof()             iv. returns a file pointer
         Codes :
         a     b     c     d
(A)   iv     i      ii     iii
(B)   iii     i      iv    ii
(C)   ii     iii     iv    i
(D)   iv    iii     i      ii
14. Which one of the following describes the syntax of prolog program ?
I. Rules and facts are terminated by full stop (.)
II. Rules and facts are terminated by semicolon (;)
III. Variables names must start with upper case alphabets.
IV. Variables names must start with lower case alphabets.
       Codes :
(A) I, II         (B) III, IV     (C) I, III         (D) II, IV
15. Let L be any language. Define even  (W) as the strings obtained by extracting from W the letters in the
even-numbered positions and even(L) = {even (W) | W Î L}. We define another language Chop (L) by
removing the two leftmost symbols of every string in L given by Chop(L) = {W | n W Î L, with | n | = 2}.
If L is regular language then (A) even(L) is regular and Chop(L) is not regular.
(B) Both even(L) and Chop(L) are regular.
(C) even(L) is not regular and Chop(L) is regular.
(D) Both even(L) and Chop(L) are not regular.
16. Software testing is
(A) the process of establishing that errors are not present.
(B) the process of establishing confidence that a program does what it is supposed to do.
(C) the process of executing a program to show that it is working as per specifications.
(D) the process of executing a program with the intent of finding errors.
17. Assume that a program will experience 200 failures in infinite time. It has now experienced 100 failures. The initial failure intensity was 20 failures/CPU hr. Then the current failure intensity will be
(A) 5 failures/CPU hr  (B) 10 failures/CPU hr.  (C) 20 failures/CPU hr. (D) 40 failures/CPU hr.
18. Consider a project with the following functional units :
Number of user inputs = 50                Number of user outputs = 40
Number of user enquiries = 35            Number of user files = 06
Number of external interfaces = 04        
Assuming all complexity adjustment factors and weighing factors as average, the function points for the project will be
(A) 135         (B) 722          (C) 675         (D) 672
19. Match the following :
       List – I                      List – II
a.   Correctness             i. The extent to which a software tolerates the unexpected problems
b.   Accuracy                ii. The extent to which a software meets its specifications
c.   Robustness             iii. The extent to which a software has specified functions
d.  Completeness          iv. Meeting specifications with precision
      Codes :
        a      b       c        d
(A)   ii      iv       i         iii
(B)   i       ii        iii        iv
(C)   ii      i         iv        iii
(D)   iv     ii        i          iii
20. Which one of the following is not a definition of error ?
(A) It refers to the discrepancy between a computed, observed or measured value and the true, specified or theoretically correct value.
(B) It refers to the actual output of a software and the correct output.
(C) It refers to a condition that causes a system to fail.
(D) It refers to human action that results in software containing a defect or fault.
21. Which one of the following is not a key process area in CMM level 5 ?
(A) Defect prevention                          (B) Process change management
(C) Software product engineering         (D) Technology change management
22. Consider the following relational schemas for a library database : Book (Title, Author, Catalog_no,
Publisher, Year, Price) Collection(Title, Author, Catalog_no) with the following functional dependencies :
I. Title, Author ® Catalog_no
II. Catalog_no ® Title, Author,Publisher, Year
III. Publisher, Title, Year ® Price Assume (Author, Title) is the key for both schemas. Which one of the
following is true ?
(A) Both Book and Collection are in BCNF.  (B) Both Book and Collection are in 3NF.
(C) Book is in 2NF and Collection in 3NF.    (D) Both Book and Collection are in 2NF.
23. Specialization Lattice stands for
(A) An entity type can participate as a subclass in only one specialization.
(B) An entity type can participate as a subclass in more than one specialization.
(C) An entity type that can participate in one specialization.
(D) An entity type that can participate in one generalization.
24. Match the following :
    List – I                                       List – II
a. Timeout ordering protocol       i. Wait for graph
b. Deadlock prevention               ii. Roll back
c. Deadlock detection                 iii. Wait-die scheme
d. Deadlock recovery                 iv. Thomas Write Rule
Codes :
        a      b     c      d
(A)   iv     iii     i       ii
(B)   iii      ii     iv     i
(C)   ii       i     iv     iii
(D)   iii      i     iv     iii
25. Consider the schema R = {S, T, U, V} and the dependencies S-> T, T-> U, U -> V and V -> S
If R = (R1 and R2) be a decomposition such that R1 R2 = f  then the decomposition is
(A) not in 2NF                          (B) in 2NF but not in 3NF
(C) in 3NF but not in 2NF        (D) in both 2NF and 3NF

October 28, 2014

UGC NET Solved Previous Paper-II June 2014

<<Back
COMPUTER SCIENCE AND APPLICATIONS
Paper – II

26. Match the following with respect to the mobile computing technologies :
    List – I                                 List – II
a. GPRS                      i. An integrated digital radio standard
b. GSM                       ii. 3G wireless/Mobile technology
c. UMTS                     iii. Nine different schemes for modulation and error correction
d. EDGE                     iv. An emerging wireless service that offers a mobile data
    Codes :
       a        b        c        d
(A) iii       iv       ii        i
(B) iv        i        ii         iii
(C) ii         iii      iv        i
(D) ii         i        iv        iii
27. Object Request Broker (ORB) is
I. A software program that runs on the client as well as on the application server.
II. A software program that runs on the client side only.
III. A software program that runs on the application server, where most of the components reside.
(A) I, II & III (B) I & II  (C) II & III (D) I only
28. A software agent is defined as
I. A software developed for accomplishing a given task.
II. A computer program capable of acting on behalf of user in order to accomplish a given computational task.
III. An open source software for accomplishing a given task.
(A) I             (B) II             (C) III            (D) All of the above
29. Match the following :
    List – I                                List – II
a. Classification                  i. Principal component analysis
b. Clustering                       ii. Branch and Bound
c. Feature Extraction          iii. K-nearest neighbour
d. Feature Selection            iv. K-means
Codes :
         a      b    c    d
(A)    iii     iv    ii     i
(B)    iv     iii    i      ii
(C)    iii     iv    i      ii
(D)    iv     iii    ii      i
30. SET, an open encryption and security specification model that is designed for protecting credit card transactions on the internet, stands for
(A) Secure Electronic Transaction     (B) Secular Enterprise for Transaction
(C) Security Electronic Transmission (D) Secured Electronic Termination
31. In a paged memory management algorithm, the hit ratio is 70%. If it takes 30 nanoseconds to search Translation Look-aside Buffer (TLB) and 100 nanoseconds (ns) to access memory, the
effective memory access time is
(A) 91 ns (B) 69 ns  (C) 200 ns (D) 160 ns
32. Match the following :
    List – I                                            List – II
a. Multilevel feedback queue          i. Time-slicing
b. FCFS                                        ii. Criteria to move processes between queues
c. Shortest process next                 iii. Batch processing
d. Round robin scheduling             iv. Exponential smoothening
    Codes :
        a   b    c     d
(A)   i    iii    ii     iv
(B)   iv   iii    ii     i
(C)   iii   i     iv     i
(D)   ii    iii   iv     i
33. Consider a system with five processes P0 through P4 and three resource types R1, R2 and R3. Resource type R1 has 10 instances, R2 has 5 instances and R3 has 7 instances. Suppose that at time
T0, the following snapshot of the system has been taken :

Assume that now the process P1 requests one additional instance of type R1 and two instances of resource type R3. The state resulting after this allocation will be
(A) Ready state      (B) Safe state       (C) Blocked state      (D) Unsafe state
34. Match the following :
    List – I                                    List – II
a. Contiguous allocation  i. This scheme supports very large file sizes.
b. Linked allocation        ii. This allocation technique supports only sequential files.
c. Indexed allocation      iii. Number of disks required to access file is minimal.
d. Multi-level indexed    iv. This technique suffers from max wastage of space in storing pointers.
   Codes :
        a    b    c    d
(A)   iii   iv    ii     i
(B)   iii   ii     iv    i
(C)   i    ii     iv    iii
(D)   i    iv    ii     iii
35. Which of the following commands will output “one two three” ?
(A) for val; do echo-n $val; done < one two three
(B) for one two three; do echo-n-; done
(C) for n in one two three; do echo-n $n; done
(D) for n in one two three {echo –n $ n}
36. Mergesort makes two recursive calls. Which statement is true after these two recursive calls finish, but before the merge step ?
(A) The array elements form a heap.
(B) Elements in each half of the array are sorted amongst themselves.
(C) Elements in first half of the array are less than or equal to elements in second half of the array.
(D) All of the above
37. A text is made up of the characters a, b, g, d and s with the probability 0.12, 0.40, 0.15, 0.08 and 0.25 respectively. The optimal coding technique will have the average length of
(A) 1.7          (B) 2.15               (C) 3.4               (D) 3.8
38. Searching for an element in the hash table requires O(1) time for the ________ time, whereas for direct addressing it holds for the ________ time.
(A) worst-case, average  (B) worst-case, worst-case   (C) average, worst-case    (D) best, average
39. An algorithm is made up of 2 modules M1 and M2. If time complexity of modules M1 and M2 are h(n) and g(n) respectively, the time complexity of the algorithm is
(A) min (h(n), g(n))   (B) max (h(n), g(n))       (C) h(n) + g(n)           (D) h(n) * g(n)
40. What is the maximum number of parenthesis that will appear on the stack at any one time for parenthesis expression given by ( ( ) ( ( ) ) ( ( ) ) )
(A) 2 (B) 3 (C) 4 (D) 5
41. Match the following :
    List – I                               List – II
a. Automatic storage class  i. Scope of the variable is global.
b. Register storage class     ii. Value of the variable persists between different function calls.
c. Static storage class        iii. Value stored in memory& local to block in which variable is defined.
d. External storage class   iv. Value stored in CPU registers.
     Codes :
        a b c d
(A) iii iv i ii
(B) iii iv ii i
(C) iv iii ii i
(D) iv iii i ii
42. When we pass an array as an argument to a function, what actually gets passed ?
(A) Address of the array        (B) Values of the elements of the array
(C) Base address of the array (D) Number of elements of the array
43. While (87) printf(“computer”);
The above C statement will
(A) print “computer” 87 times (B) print “computer” 0 times
(C) print “computer” 1 times   (D) print “computer” infinite times
44. A friend function can be used to
(A) avoid arguments between classes. (B) allow access to classes whose source code is unavailable.
(C) allow one class to access an unrelated class.  (D) None of the above
45. Which of the following is the correct value returned to the operating system upon the successful completion of a program ?
(A) 0             (B) 1               (C) – 1     (D) Program do not return a value.
46. Manager’s salary details are hidden from the employee. This is called as
(A) Conceptual level data hiding (B) Physical level data hiding
(C) External level data hiding      (D) Local level data hiding
47. Which of the following statements is false ?
(A) Any relation with two attributes is in BCNF.
(B) A relation in which every key has only one attribute is in 2NF.
(C) A prime attribute can be transitively dependent on a key in 3NF relation.
(D) A prime attribute can be transitively dependent on a key in BCNF relation.
48. A clustering index is created when _______.
(A) primary key is declared and ordered (B) no key ordered
(C) foreign key ordered                            (D) there is no key and no order
49. Let R ={A, B, C, D, E, F} be a relation schema with the following dependencies C -> F, E -> A, EC -> D, A -> B
Which of the following is a key for R ?
(A) CD (B) EC (C) AE (D) AC
50. Match the following :
    List – I                              List – II
a. DDL                             i.   LOCK TABLE
b. DML                            ii.  COMMIT
c. TCL                              iii. Natural Difference
d. BINARY Operation     iv. REVOKE
     Codes :
        a     b    c     d
(A)   ii     i     iii     iv
(B)   i      ii    iv     iii
(C)   iii    ii    i       iv
(D)   iv    i    ii       iii