Saturday, October 18, 2014

UGC NET COMPUTER SCIENCE MODEL EXPECTED SOLVED MCQS FOR DECEMBER 2013

 

1. Shortest propagation delay is generated by 
Ans.: ECL (Emitter Control Logic)

2. In Unix, kernel is used during while
Ans.:*Reading a file
*Pressed key
*Resource allocation

3. Find out the post fix of the given pre fix expression
*+pq-rs
Ans.: pq+rs-*

4. The topology used in Campus Area Network(CAN) is
Ans.: FDDI ring.

5. Wi-Fi standard is
Ans.: 802.11a

6. A Destructor takes how many arguments.
Ans.:  Zero arguments.

7. Use of Digital Differential Analyzer(DDA) Algorithm in computer graphics.
Ans.: DDA is a Line drawing and scan conversion algorithm

8. What is a tree.
Ans.: A graph 'G' with n-1 edges is a tree.
A tree is generally connected, cycle free.

9. 2-D arrays are also called as
Ans.: Matrix/Table arrays.

10. What is the use of sniffer.
Ans.: Sniffer monitors data travel on a network.

11. The objects that are shared by application in Windows.
Ans.: COM (Component Object Model)

12. What is the difference between Random scan and Raster scan.
Ans.: Random scan draws a picture one line at a time.
Raster scan draws a picture on screen at a time.(Draws whole picture at a time)

13. Essential hazards generally occur in.
Ans.:  Toggle circuit and Asynchronous circuit 

14. Work of Session layer.
Ans.: Name Recognition, dialog control, synchronization, security.

15. Congestion controller in networking is 
Ans.: Network Layer

16. Problems in computer security is mostly caused by
Ans.: Ever increasing DOS attacks.

17. TTL token pole circuit is used for
Ans.: Voltage regulation

18. What are Network support layers
Ans.: Physical layer
Data link layer
Network layer
Transport layer

19. What are User support layers.
Ans.: Session layer
Presentation layer
Session layer

20. Logical Link Control(LLC) standard is
Ans.: 1EEE 802.2

21. Type 0 grammar also called as
Ans.: Unrestricted grammar

22. Verification and validation are components of
Ans.: Software Quality Assurance.

23. Application of function point analysis
Ans.: It is used to estimate and measure size of software.

24. Activity diagrams are used to 
Ans.: Express relation between systems and sub-system.

25. GSM (Global System for Mobile Communication) supports 
Ans.: TDMA (Time Division Multiplex Access).

26. Extract and Load data process in data warehousing is done by
Ans.: Load Manager

27. Line code is used to.
Ans.: Convert digital data into digital signal

28. Expand FURPS
Ans.: F-Functionality
U-Usability
R-Reliability
P-Performance
S-Support ability

29. Asynchronous Transfer MODE (ATM) has how many bytes.
Ans.: 53 bytes
Note: Header of ATM is 5 bytes.
Also called as cell relay.

30. Serial to parallel processing is done by
Ans.: De-multiplexer.

No comments:

Post a Comment