Saturday, October 18, 2014



TEACHING & RESEARCH APTITUDE UGC NET GENERAL PAPER - 1


1. Effective teaching  is the result of
Clear and factual communication.

2. Man has attained success in various fields of life including education due to
Man's learning capacity.

3. State the reason for becoming a teacher.
It is a reputable job.


4. The best method to teach in class is by
Using audio-visual aids.

5. How to control students in the classroom.
By identifying the cause for restlessness.

6. Who is a teacher.
A teacher is a friend, philosopher, guide to students.

7. One will be an effective communicator if
One is clear about what one communicates.
Use of audio visual aids.

8. The best way to understand the students aptitude is by
Speaking with them freely and identify the aptitude.

9. A teacher in a classroom should be like
A leader.

10. A good research involves
A penetrating and analytical mind.

11. A competent teacher is one who
Creates interest in the subject amongst students.

12. Quality of research depends on
Proper guidance.

13. Moral teachings of teacher would give
Moral values to students.

14. Teachers need to study educational psychology because 
It helps the teacher to handle the students in a more progressive way.

15. According to Plato, the main goal of education is to
Develop the power of thought.

16. Aim of modern education should aim for 
Harmonious development of personality of the student.

17. The main advantage of educational values are
To develop healthy and balanced personality.
Generate capacity to earn livelihood
Develop vocational efficiency.

18. Operation BlackBoard is related to
Primary education.

19. Evaluation is useful to assess
Knowledge and skill.
Attitudes and study habits.
Interest and appreciations.

20. The degree of brightness possessed by an individual is termed as
Intelligent Quotient.

UGC NET COMPUTER SCIENCE MOBILE COMUPTING


1.   Mobile IP uses how many types of address.
Two adresses namely:
* A fixed home address
* A care of address

2. What are the special features of IPV6 (Internet Protocol version 6)
# Stateless Address Auto Configuration
# Neighbour discoverys
# Nodes implement strong authentication and encryption techniques to ensure internet security.


3. Expand the following terms.
GSM - Global System for Mobile Communication
CDMA - Code Division Multiplex Access
PDA - Personal Digital Assistant
GPRS - General Packet Radio Service
ATM - Asynchronous Transfer Mode

TDMA - Time Division Multiplex Access
FDMA - Frequency Division Multiplex Access
MS - Mobile Station
BSS Base Station Subsystem
IMEI - International Mobile Equipment Identity
LOS - Line of Sight
MH - Mobile Host
OSI - Open System Interconnection
WWAN - Wireless Wide Area Network

4. The ATM layer in ATM technology deals with
Cell Transport

5. What is WMAN
WMAN stands for Wireless Metropolitan Area Network.
It is a type of wireless network that connects several wireless LANS.

Example: Wi-Max.

6. What is Wi-Max.
Wi-Max is a type of WMAN which is described by IEEE 802.16 standard.

7. What is piconet.
Piconet is a collection of bluetooth devices which are synchronized to the same hopping sequence.
It has four major components namely:
Master(M)- A bluetooth device can be the master of other bluetooth devices.
Slave(S) - The slaves are those bluetooth devices which are dependent on the master bluetooth device.
Parked(P) - They are not active presently but can be reactivated within some time.
Standby(SB) - They do not participate in piconet.

8. What are the ways in which Electronic payments are made.
Digital token
Credit card
Smart card

9. Expand E-commerce ERP, EFT and EDI
E-commerce- Electronic commerce
EDI- Electronic Data Interchange
ERP- Enterprise Resource Planning
EFT- Electronic Fund Transfer

10. The threats to electronic payment systems involves
Trojan horse
Computer virus
Computer worm

11. Activex controls can be developed using
Visual Basic, Java, Visual C++

12. When a bad frame is received, what does the frame relay does
It discards the frame.

13. ALOHA  is used for
Channel allocation problem

14. What are the applications of Slotted ALOHA.
Slotted Aloha divides time in to discrete intervals
It requires global time synchronization.

15. CGI stands for
Common Gateway Interface.

16. OLE growth curve involves
Activex, DirectX, OLE controls

17. A key verifier machine is used to
Control transaction entry.

18. System integrity involves
Accuracy, security, appropriateness

19. What is a session
A session is the period of time that a unique user interacts with a web application.

20. List out the functions of GIS
Designing
Planning
Spatial imaging
Decision modeling

UGC NET COMPUTER SCIENCE:DISCRETE STRUCTURES,NETWORKS,DIGITAL LOGICS


1. What is a set.
A set can be defined as an unordered collection of distinct objects.

Example: A={3,6,2,8,7} can be called as a "set"

2. What is the difference between a partial order relation and equivalence relation.
A relation that is Reflexive, Antisymmetric, Transitive is said to be a Partial order  relation.
A relation which is Reflexive, Symmetric and Transitive is called as an Equivalence relation.
 Shortcut: RAT=Partial order
                     RST=Equivalence

3. What is meant by negation.
Negation means the opposite of the given preposition.
Example:
The negation of the preposition 'A' is ~A.
The negation of True is False
The negation of False is True





4. What is the difference between Tautology,Contradiction,satisfactory.
Tautology: Tautology means all the resulting outputs are always True.
Contradiction: Contradiction happens when all the results are always False
Satisfactory: Satisfactory means outputs may be True or False

5. What is an Eulerian graph.
An Eulerian graph is one which should be connected and each of its vertices should be of even degree.

6. State the formulas for complete graph and connected graph.
Complete graph=n(n-1)/2
Connected graph=n-1

7. Mention the basic laws of boolean algebra.
1. Commutative law.
2. Associative law.
3. Distributive law.
Let A=1, B=2, C=3

1. Commutative law: 
A+B=B+A
Example: 1+2=2+1
A*B=B*A
Example: 1*2=2*1

2.  Associative law:
A+(B+C)=(A+B)+C
Example: 1+(2+3)=(1+2)+3
A*(B*C)=(A*B)*C
Example: 1*(2*3)=(1*2)*3

3. Distributive law:

A*(B+C)=(A*B)+(A*C)
Example: 1*(2+3)=(1*2)+(1*3)

8. Name the two de-morgan's theorems.
___    _ _
A+B=A.B
___   _  _ 
A.B=A+B

9. What is the difference between a latch and a flipflop
A latch has no clock signal and it is asynchronous.
A flipflop has a clock signal and it is synchronous (it has time frame).
Note: Latches and flipflops are basic building blocks of sequential circuits.

10. What is a register and what is the use of shift register.
A register consists of a set of flipflops used to store binary information.
A register which is able to shift the binary information either to the left or right is alled as shift register.

11. What is the application of Watson-Felix model in software engineering.
It is used to determine the effort, staff size and total cost based on LOC (Lines of Code) needed to develop a software.

12. State the port numbers used in HTTP, FTP, SMTP, POP3, TELNET.
HTTP: 80
FTP: 20 and 21
SMTP: 25
POP3: 110
TELNET: 23

Note: Both SMTP & POP3 are used in email technology but there is a difference between the two.
SMTP is used to send a mail.
POP3 is used to receive the mail.

13. Give two examples of WAN.
Asynchronous Transfer Mode(ATM)
Integrated Services Digital Network(ISDN)

Tip: WAN is based on packet switching technology.

14. How many layers are used in OSI and TCP/IP model.
7 layers in OSI and 4 layers in TCP/IP model.
OSI- Open System Interconnection (7 layers)
Physical layer - Defines physical characterstics of network(ex. electronic circuits)
Data link layer - Data encapsulation (ex. packets)
Network layer - Packet transmission
Transport layer - Delivery of packets from source to destination
Session layer - Manges network access
Presentation layer - Determines format of data (ex. data compress, decompress, encryption,etc.)
Application layer - Consists of the applications used by end user(ex. java, word, notepad,etc)

Shortcut: PDNTSPA 

TCP/IP MODEL (4 Layers)
Network layer - Mapping between IP addresses and network physical address
Internet layer - Makes datagrams and handles data routingm Makes use of IP.
Transport layer - Makes use of TCP and UDP,ensures data delivery services.
Application layer - HTTP,FTP, SMTP, etc are used here.

Shortcut: NITA

15. Explain the truth tables of basic gates.
                                                                                                  AND GATE
A
B
A.B
0
0
0
0
1
0
1
0
0
1
1
1


  

OR GATE
A
B
A+B
0
0
0
0
1
1
1
0
1
1
1
1


NOT GATE

A
_
A
0
1
1
0

NAND GATE

A

B
___
A.B
0
0
1
0
1
1
1
0
1
1
1
0

NOR GATE

A

B
___
A+B
0
0
1
0
1
0
1
0
0
1
1
0 

COMMENTS ARE MOST WELCOME.

No comments:

Post a Comment