Saturday, October 18, 2014

 UGC NET COMPUTER SCIENCE


1. Shortest propagation delay is generated by 
Ans.: ECL (Emitter Control Logic)

2. In Unix, kernel is used during while
Ans.:*Reading a file
*Pressed key
*Resource allocation

3. Find out the post fix of the given pre fix expression
*+pq-rs
Ans.: pq+rs-*

4. The topology used in Campus Area Network(CAN) is
Ans.: FDDI ring.

5. Wi-Fi standard is
Ans.: 802.11a

6. A Destructor takes how many arguments.
Ans.:  Zero arguments.

7. Use of Digital Differential Analyzer(DDA) Algorithm in computer graphics.
Ans.: DDA is a Line drawing and scan conversion algorithm

8. What is a tree.
Ans.: A graph 'G' with n-1 edges is a tree.
A tree is generally connected, cycle free.

9. 2-D arrays are also called as
Ans.: Matrix/Table arrays.

10. What is the use of sniffer.
Ans.: Sniffer monitors data travel on a network.

11. The objects that are shared by application in Windows.
Ans.: COM (Component Object Model)

12. What is the difference between Random scan and Raster scan.
Ans.: Random scan draws a picture one line at a time.
Raster scan draws a picture on screen at a time.(Draws whole picture at a time)

13. Essential hazards generally occur in.
Ans.:  Toggle circuit and Asynchronous circuit 

14. Work of Session layer.
Ans.: Name Recognition, dialog control, synchronization, security.

15. Congestion controller in networking is 
Ans.: Network Layer

16. Problems in computer security is mostly caused by
Ans.: Ever increasing DOS attacks.

17. TTL token pole circuit is used for
Ans.: Voltage regulation

18. What are Network support layers
Ans.: Physical layer
Data link layer
Network layer
Transport layer

19. What are User support layers.
Ans.: Session layer
Presentation layer
Session layer

20. Logical Link Control(LLC) standard is
Ans.: 1EEE 802.2

21. Type 0 grammar also called as
Ans.: Unrestricted grammar

22. Verification and validation are components of
Ans.: Software Quality Assurance.

23. Application of function point analysis
Ans.: It is used to estimate and measure size of software.

24. Activity diagrams are used to 
Ans.: Express relation between systems and sub-system.

25. GSM (Global System for Mobile Communication) supports 
Ans.: TDMA (Time Division Multiplex Access).

26. Extract and Load data process in data warehousing is done by
Ans.: Load Manager

27. Line code is used to.
Ans.: Convert digital data into digital signal

28. Expand FURPS
Ans.: F-Functionality
U-Usability
R-Reliability
P-Performance
S-Support ability

29. Asynchronous Transfer MODE (ATM) has how many bytes.
Ans.: 53 bytes
Note: Header of ATM is 5 bytes.
Also called as cell relay.

30. Serial to parallel processing is done by
Ans.: De-multiplexer.

SOLVED EXPECTED MCQS FOR COMPUTER SCIENCE 

 

1. What is the difference between specialization and generalization.
Specialization is a top-down process.
Generalization is a bottom-up process.

2. Who is an identifying owner.
The entity type on which weak entity type depends is called as an identifying owner.

3. What are the rules of a completeness constraint.
Super type, sub type.

4. An embedded printer provides
An inserted index.

5. Analysis of large database to retrieve information is called as
OLAP (Online Analytical Processing)

6.. The end of a sql command is denoted by 
Semicolon(;)

7. A function that has no partial functional dependencies is in which normal form.
3NF

8. Highest noise margin is offered by
TTL (Transistor-transistor logic)

9. Parallel to serial processing is done by
Multiplexer

10. ANSI X.12 belongs to which standard.
EDI

11. Link analysis operation in data mining makes use of 
Association discovery technique

12. Bluetooth uses which transmission media.
Radio links.

13. What is meant by downflow in data warehouse
It is the process of archiving and backup of data in warehouse.

14. Which synchronizes critical resources to prevent deadlock.
Semaphores.

15. The memory allocation schema subjected to external fragmentation is
Segmentation.

16. Top down parsers are called as predictive parsers because
The next lower level of the parse tree is predicted.

17. Which level is called as "Managed" in capability maturity model
Level 2

Note: 
Level 1: Initial
Level 2: Managed
Level 3: Defined
Level 4: Quantitatively managed
Level 5: Optimizing

18. What is an external error.
An error whose cause cannot be identified anywhere within the software system.

19. The term "Black" in Black box testing denotes that
The design is hidden.

20. CASE tool and RAD tools are used during 
System analysis stage of System Development Life cycle.

No comments:

Post a Comment