UGC NET COMPUTER SCIENCE: JUNE 2013 PAPER 3
1. Match the following:
a. Watson- Felix model intensity i. Failure
b. Quick-Fix model ii. Cost estimation
c. Putnam resource allocation model iii. Project planning
d. Logarithmetic- Poisson Model iv. Maintenance
Codes:
a b c d
(A) ii i iv iii
(B) i ii iv iii
(C) ii i iii iv (D) ii iv iii i
Ans. D.)
Frequently aked software engineering question.
2. Equivalence partitioning is a ______ method that divides the input domain of a program into classes of data from which test cases can be derived.
(A) White-box testing (B) Black-box testing
(C) Orthogonal amIy testing
(D) Stress testing
(B) Spiral model (C) Clean room software engineering
(D) Agile model
Ans.:C)
(B) Software quality assurance
(C) Software cost estimation
(D) Defect removal efficiency
(B) 100
(C) 6/600
(D) None of the above
Tip: baudrate * bit =bit rate
7. The ______ measures the relative strengths of two signals or a signal at two different points.
(A) frequency
(B) attenuation
(C) throughput (D) decibel
(B) Internal interrupt
(C) External interrupt
(D) All ofthe above
(B) Single or multiple atomic proposition on left side.
(C) A single atomic proposition on left side and a single atomic proposition on right side.
(D) A single atomic proposition on left side or an empty left side.
(ii) Reduce the user's memory load
(iii) Make the interface consistent are for
(A) User satisfaction
(B) Good interface design
(C) Saving system's resources
(D) None of these
(B) Principal of Locality
(C) Segmentation
(D) Thrashing
(B) Frames
(C) Scripts
(D) Conceptual Dependency
a. Watson- Felix model intensity i. Failure
b. Quick-Fix model ii. Cost estimation
c. Putnam resource allocation model iii. Project planning
d. Logarithmetic- Poisson Model iv. Maintenance
Codes:
a b c d
(A) ii i iv iii
(B) i ii iv iii
(C) ii i iii iv (D) ii iv iii i
Ans. D.)
Frequently aked software engineering question.
2. Equivalence partitioning is a ______ method that divides the input domain of a program into classes of data from which test cases can be derived.
(A) White-box testing (B) Black-box testing
(C) Orthogonal amIy testing
(D) Stress testing
Ans.: B.)
Very simple question from software testing.
3. ________is a process model that removes defects before they can precipitate serious hazards.
(A) Incremental model(B) Spiral model (C) Clean room software engineering
(D) Agile model
Ans.:C)
4. Software safety is a __________ activity that focuses on the identification and assessment of potential hazards that may affect software negatively and cause an entire system to fail.
(A) Risk mitigation, monitoring and management(B) Software quality assurance
(C) Software cost estimation
(D) Defect removal efficiency
Ans.: A.)
5. The baud rate of a signal is 600 baud/second. If each signal unit carries 6 bits, then the bit rate of a signal is __________
(A) 3600(B) 100
(C) 6/600
(D) None of the above
Ans.: A.)
Tip: baudrate * bit =bit rate
Explanation:
Bit rate=600*6=3600
6. Match the following:
a. Data link layer i. Flow control
b. Network layer ii. Node to node delivery
c. Transport layer iii. Mail services
d. Application layer iv Routing
Codes:
a b c d
(A) ii i iv iii (B) ii iv i iii
(C) ii i iii iv
(D) ii iv iii i
Ans.: B.)
a. Data link layer i. Flow control
b. Network layer ii. Node to node delivery
c. Transport layer iii. Mail services
d. Application layer iv Routing
Codes:
a b c d
(A) ii i iv iii (B) ii iv i iii
(C) ii i iii iv
(D) ii iv iii i
Ans.: B.)
7. The ______ measures the relative strengths of two signals or a signal at two different points.
(A) frequency
(B) attenuation
(C) throughput (D) decibel
Ans.: D.)
8. . An actor in an animation is a small program invoked _______ per frame to detennine the characteristics of some object in the animation.
(A) once
(B) twice
(C) 30 times
(D) 60 times
Ans.: A.)
9. . The statements s1 and s2 are given as :
s1 : Context sensitive languages are closed under intersection. concatenation, substitution and inverse homomorphism.
s2 Context free languages are closed under complementation. substitution and homomorphism.
Which of the following is correct statement?
(A) Both s1 and s2 are correct.
(B) s1 is correct and s2 is not correct.
(C) s1 is not correct and s2 is correct.
(D) Both s1 and s2 are not correct.
Ans.: D.)
s1 : Context sensitive languages are closed under intersection. concatenation, substitution and inverse homomorphism.
s2 Context free languages are closed under complementation. substitution and homomorphism.
Which of the following is correct statement?
(A) Both s1 and s2 are correct.
(B) s1 is correct and s2 is not correct.
(C) s1 is not correct and s2 is correct.
(D) Both s1 and s2 are not correct.
Ans.: D.)
10. Which one of the following is not an addressing mode?
(A) Register indirect
(B) Autoincrement
(C) Relative indexed
(D) Immediate operandAns.: D.)
(A) Register indirect
(B) Autoincrement
(C) Relative indexed
(D) Immediate operandAns.: D.)
11. Which is not a typical program control instruction?
(A) BR
(A) BR
(B) JMP
(C) SHL
(D) TST
Ans.: C.)
Tip: SHL means Shift Left which is a logical instruction.
12. Match the following:
a. Foreign keys i. Domain constraint
b. Private key ii. Referential integrity
c. Event control action model iii. Encryption
d. Data security iv. Trigger
b. Private key ii. Referential integrity
c. Event control action model iii. Encryption
d. Data security iv. Trigger
codes:
a b c d
(A) iii ii i iv
(B) ii i iv iii
(C) iii iv i ii
(D) i ii iii iv
Ans.: B.)
13. Match the following:
a. calloc() i. Frees previously allocated space
b. free() ii. Modifies previously allocated space
c. malloc() iii. Allocates space for array
d. realloc() iv. Allocates requested size of space
b. free() ii. Modifies previously allocated space
c. malloc() iii. Allocates space for array
d. realloc() iv. Allocates requested size of space
codes:
a b c d
(A) iii i iv ii
(B) iii ii i iv
(C) iii iv i ii
(D) iv ii iii iAns.: A.)
14. Interrupt which arises from illegal or erroneous use of an instruction or data is
(A) Software interrupt(B) Internal interrupt
(C) External interrupt
(D) All ofthe above
Ans.: B.)
15. Hom clauses are special kinds of propositions which can be described as
(A) Single atomic proposition on left side.(B) Single or multiple atomic proposition on left side.
(C) A single atomic proposition on left side and a single atomic proposition on right side.
(D) A single atomic proposition on left side or an empty left side.
Ans.: D.)
16. The following three golden rules
(i) Place the user in control(ii) Reduce the user's memory load
(iii) Make the interface consistent are for
(A) User satisfaction
(B) Good interface design
(C) Saving system's resources
(D) None of these
Ans.: B.)
17. Working set model is used in memory management to implement the concept of
(A) Swapping(B) Principal of Locality
(C) Segmentation
(D) Thrashing
Ans.: B.)
18. Which of the following is a knowledge representation technique used to represent knowledge about stereotype situation?
(A) Semantic network(B) Frames
(C) Scripts
(D) Conceptual Dependency
Ans.: D.)
No comments:
Post a Comment