UGC NET COMPUTER SCIENCE MODEL EXPECTED SOLVED MCQS FOR DECEMBER 2013
1. Shortest propagation delay is generated by
Ans.: ECL (Emitter Control Logic)
2. In Unix, kernel is used during while
Ans.:*Reading a file
*Pressed key
*Resource allocation
3. Find out the post fix of the given pre fix expression
*+pq-rs
Ans.: pq+rs-*
4. The topology used in Campus Area Network(CAN) is
Ans.: FDDI ring.
5. Wi-Fi standard is
Ans.: 802.11a
6. A Destructor takes how many arguments.
Ans.: Zero arguments.
7. Use of Digital Differential Analyzer(DDA) Algorithm in computer graphics.
Ans.: DDA is a Line drawing and scan conversion algorithm
8. What is a tree.
Ans.: A graph 'G' with n-1 edges is a tree.
A tree is generally connected, cycle free.
9. 2-D arrays are also called as
Ans.: Matrix/Table arrays.
10. What is the use of sniffer.
Ans.: Sniffer monitors data travel on a network.
11. The objects that are shared by application in Windows.
Ans.: COM (Component Object Model)
12. What is the difference between Random scan and Raster scan.
Ans.: Random scan draws a picture one line at a time.
Raster scan draws a picture on screen at a time.(Draws whole picture at a time)
13. Essential hazards generally occur in.
Ans.: Toggle circuit and Asynchronous circuit
14. Work of Session layer.
Ans.: Name Recognition, dialog control, synchronization, security.
15. Congestion controller in networking is
Ans.: Network Layer
16. Problems in computer security is mostly caused by
Ans.: Ever increasing DOS attacks.
17. TTL token pole circuit is used for
Ans.: Voltage regulation
18. What are Network support layers
Ans.: Physical layer
Data link layer
Network layer
Transport layer
19. What are User support layers.
Ans.: Session layer
Presentation layer
Session layer
20. Logical Link Control(LLC) standard is
Ans.: 1EEE 802.2
21. Type 0 grammar also called as
Ans.: Unrestricted grammar
22. Verification and validation are components of
Ans.: Software Quality Assurance.
23. Application of function point analysis
Ans.: It is used to estimate and measure size of software.
24. Activity diagrams are used to
Ans.: Express relation between systems and sub-system.
25. GSM (Global System for Mobile Communication) supports
Ans.: TDMA (Time Division Multiplex Access).
26. Extract and Load data process in data warehousing is done by
Ans.: Load Manager
27. Line code is used to.
Ans.: Convert digital data into digital signal
28. Expand FURPS
Ans.: F-Functionality
U-Usability
R-Reliability
P-Performance
S-Support ability
29. Asynchronous Transfer MODE (ATM) has how many bytes.
Ans.: 53 bytes
Note: Header of ATM is 5 bytes.
Also called as cell relay.
30. Serial to parallel processing is done by
Ans.: De-multiplexer.
No comments:
Post a Comment