UGC – NET Computer Science December 2010 – Paper – II

UGC NET Computer Science December 2010 Paper II – Solved with Answers

Practice the complete solved paper for UGC NET Computer Science (December 2010, Paper II). This archive contains the original questions from the exam, now updated with the correct answers and explanations to help you prepare for the upcoming NTA UGC NET and SET exams.

Use the “View Solution” button under each question to check your answers instantly. This paper covers essential topics like Discrete Structures, Graph Theory, Computer Architecture, and Data Structures.

1. The number of integers between 1 and 250 that are divisible by 2, 5 and 7 is

  • (A) 2
  • (B) 3
  • (C) 5
  • (D) 8
View Solution

Correct Answer: (B) 3

Explanation: LCM(2, 5, 7) = 70. Integers <= 250 divisible by 70 are: 70, 140, 210.

2. An undirected graph possesses an Eulerian circuit if and only if it is connected and its vertices are

  • (A) all of even degree
  • (B) all of odd degree
  • (C) of any degree
  • (D) even in number
View Solution

Correct Answer: (A) all of even degree

3. A partially ordered set is said to be a lattice if every two elements in the set have

  • (A) a unique least upper bound
  • (B) a unique greatest lower bound
  • (C) both A and B
  • (D) none of the above
View Solution

Correct Answer: (C) both A and B

4. The minimum number of edges in a connected graph with ‘n’ vertices is equal to

  • (A) n(n-1)
  • (B) n(n-1)/2
  • (C) n^2
  • (D) n-1
View Solution

Correct Answer: (D) n-1

Explanation: A tree is the minimally connected graph, which has n-1 edges.

5. Consider the problem of connecting 19 lamps to a single electric outlet by using extension cords, each of which has four outlets. The number of extension cords required is

  • (A) 4
  • (B) 5
  • (C) 6
  • (D) 7
View Solution

Correct Answer: (C) 6

Explanation: Each cord provides 4 outlets but uses 1. Net gain = 3 outlets per cord. We need 19. 1 (wall) + 3*x >= 19. 3x >= 18. x=6.

6. The decimal number equivalent of (4057.06)8 is

  • (A) 2095.75
  • (B) 2095.075
  • (C) 2095.937
  • (D) 2095.0937
View Solution

Correct Answer: (D) 2095.0937

7. AB + (A + B)’ is equivalent to

  • (A) A ⊕ B
  • (B) A ⊙ B
  • (C) (A ⊕ B) ⊙ C
  • (D) (A ⊙ B) ⊕ C
View Solution

Correct Answer: (B) A ⊙ B (XNOR)

Explanation: (A+B)’ is A’B’. So the expression is AB + A’B’, which is XNOR.

8. An astable multivibrator has

  • (A) one stable state
  • (B) two stable states
  • (C) no stable states
  • (D) none of these
View Solution

Correct Answer: (C) no stable states

9. 12-bit 2’s complement of -73.75 is

  • (A) 01001001.1100
  • (B) 11001001.1100
  • (C) 10110110.0100
  • (D) 10110110.1100
View Solution

Correct Answer: (C) 10110110.0100

10. Encoding of data bits 0011 into 7-bit even Parity Hamming Code is

  • (A) 0011110
  • (B) 0101110
  • (C) 0010110
  • (D) 0011100
View Solution

Correct Answer: (A) 0011110

11. How many of the following declarations are correct?
int z = 7.0;
double void = 0.000;
short array[2] = {0,1,2};
char c = “\n”;

  • (A) None
  • (B) One is correct
  • (C) Two are correct
  • (D) All four are correct
View Solution

Correct Answer: (C) Two are correct

Explanation: ‘void’ is a keyword (Invalid). ‘char c = “\n”‘ uses double quotes which implies string (Invalid/Warning). The other two are valid (though int z=7.0 involves implicit conversion).

12. The value of the following expression (13/4*3)%5+1 is

  • (A) 5.75
  • (B) 2.95
  • (C) 1.4875
  • (D) 5
View Solution

Correct Answer: (A) 5.75

Note: In C integer arithmetic, 13/4 is 3. 3*3=9. 9%5=4. 4+1=5. However, if operands are floats, result is 5.75. Given the options, 5.75 is the intended answer.

13. Which one of the following will set the value of y to 5 if x has the value 3, but not otherwise?

  • (A) if (x = 3) y = 5
  • (B) if x = = 3 (y = 5)
  • (C) if (x = = 3); y = 5
  • (D) if (x = = 3) y = 5
View Solution

Correct Answer: (D) if (x == 3) y = 5

14. Which one of the following sentences is true?

  • (A) The body of a while loop is executed at least once.
  • (B) The body of a do … while loop is executed at least once.
  • (C) The body of a do … while loop is executed zero or more times.
  • (D) A for loop can never be used in place of a while loop.
View Solution

Correct Answer: (B) The body of a do … while loop is executed at least once.

15. “Black” refers in the “Black-box” testing means

  • (A) Characters of the movie “Black”
  • (B) I-O is hidden
  • (C) Design is hidden
  • (D) Users are hidden
View Solution

Correct Answer: (C) Design is hidden (Internal logic is hidden)

Note: Some keys accept “I-O is hidden” or “Design is hidden”. The core concept is internal structure is unknown.

16. In generalization, the differences between members of an entity is

  • (A) maximized
  • (B) minimized
  • (C) both 1 and 2
  • (D) None of these
View Solution

Correct Answer: (B) minimized

Explanation: Generalization combines similar entities, suppressing (minimizing) their differences.

17. The dependency preservation decomposition is a property to decompose database schema D… X -> Y specified in F…

  • (A) appeared directly in one of the relation schemas Ri
  • (B) could be inferred from dependencies that appear in some Ri
  • (C) both 1 and 2
  • (D) None of these
View Solution

Correct Answer: (C) both 1 and 2

18. Which of the following is an optimistic concurrency control method?

  • (A) Validation based
  • (B) Time stamp ordering
  • (C) Lock-based
  • (D) None of these
View Solution

Correct Answer: (A) Validation based

19. Optical storage is a

  • (A) high-speed direct access storage device
  • (B) low-speed direct access storage device
  • (C) medium-speed direct access storage device
  • (D) high-speed sequential access storage device
View Solution

Correct Answer: (B) low-speed direct access storage device

20. Which of the following is the process by which a user’s access to physical data in the application is limited, based on his privileges?

  • (A) Authorization
  • (B) Authentication
  • (C) Access Control
  • (D) All of these
View Solution

Correct Answer: (C) Access Control

21. What is the maximum number of nodes in a B-tree of order 10 of depth 3 (root at depth 0)?

  • (A) 111
  • (B) 999
  • (C) 9999
  • (D) None of the above
View Solution

Correct Answer: (A) 111 (or 1111 depending on depth definition)

Explanation: Assuming ‘Order 10’ means 10 children (m=10) and ‘Depth 3’ implies 3 levels total (0, 1, 2): 1 + 10 + 100 = 111.

22. A binary tree with 27 nodes has _____ null branches.

  • (A) 54
  • (B) 27
  • (C) 26
  • (D) None of the above
View Solution

Correct Answer: (D) None of the above (Correct is 28)

Explanation: Null branches = N + 1 = 27 + 1 = 28.

23. The time complexity to build a heap of n elements is

  • (A) O(1)
  • (B) O(logn)
  • (C) O(n)
  • (D) O(nlgn)
View Solution

Correct Answer: (C) O(n)

24. Linear probing suffers from a problem known as

  • (A) Secondary clustering
  • (B) Primary clustering
  • (C) Both 1 and 2
  • (D) None of these
View Solution

Correct Answer: (B) Primary clustering

25. Which of the following can be the sequence of nodes examined in binary search tree while searching for key 88? 90, 40, 65, 50, 88

  • (A) 90, 110, 80, 85, 88
  • (B) 190, 60, 90, 85, 88
  • (C) 65, 140, 80, 70, 88
  • (D) 90, 40, 65, 50, 88
View Solution

Correct Answer: (B) 190, 60, 90, 85, 88

Explanation: This path strictly follows the BST property (Left < Root < Right).

26. Frequency shift keying is used mostly in

  • (A) Radio transmission
  • (B) Telegraphy
  • (C) Telephone
  • (D) None of the above
View Solution

Correct Answer: (B) Telegraphy

27. The baud rate is

  • (A) always equal to the bit transfer rate
  • (B) equal to twice the bandwidth of an ideal channel
  • (C) not equal to the signaling rate
  • (D) equal to half of the bandwidth of an ideal channel
View Solution

Correct Answer: (B) equal to twice the bandwidth of an ideal channel

Explanation: Referring to the Nyquist theorem for a noiseless channel.

28. How much bandwidth is there in 1 micron of spectrum at a wavelength of 1 micron?

  • (A) 300 MHz
  • (B) 3 GHz
  • (C) 300 THz
  • (D) 30 KHz
View Solution

Correct Answer: (C) 300 THz

29. Which of the following file transfer protocols use TCP and established two virtual circuits between the local and remote server?

  • (A) FTP
  • (B) TFTP
  • (C) TELNET
  • (D) NFS
View Solution

Correct Answer: (A) FTP

Explanation: FTP uses port 21 (Control) and port 20 (Data).

30. The threshold effect in demodulator is

  • (A) exhibited by all demodulator, when the input signal to noise ratio is low
  • (B) the rapid fall on output signal to noise ratio when the input signal to noise ratio fall below a particular value
  • (C) the property exhibited by all A.M. suppressed carrier coherent demodulator
  • (D) the property exhibited by correlation receiver
View Solution

Correct Answer: (B) the rapid fall on output signal to noise ratio…

31. Object code is the output of ______

  • (A) Operating System
  • (B) Compiler or Assembler
  • (C) only assembler
  • (D) only Compiler
View Solution

Correct Answer: (B) Compiler or Assembler

32. ‘Macro’ in and assembly level program is ____.

  • (A) sub program
  • (B) a complete program
  • (C) a hardware portion
  • (D) relative coding
View Solution

Correct Answer: (A) sub program (or code segment substitution)

33. Grammar of the programming is checked at ______ phase of compiler.

  • (A) semantic analysis
  • (B) code generation
  • (C) syntax analysis
  • (D) code optimization
View Solution

Correct Answer: (C) syntax analysis

34. The register or main memory location which contains the effective address of the operand is known as

  • (A) pointer
  • (B) special location
  • (C) indexed register
  • (D) None of the above
View Solution

Correct Answer: (A) pointer

35. Macro-processors are______.

  • (A) Hardware
  • (B) Compiler
  • (C) Registers
  • (D) None of the above
View Solution

Correct Answer: (D) None of the above

Explanation: A macro-processor is a software tool, typically a pre-processor.

36. The dynamic allocation of storage areas with VSAM files is accomplished by

  • (A) Hashing
  • (B) Control splits
  • (C) Overflow areas
  • (D) Relative recoding
View Solution

Correct Answer: (B) Control splits

37. Which of the following command lists the file names in multiple columns?

  • (A) ls – x
  • (B) ls
  • (C) ls – 1
  • (D) ls – f – x
View Solution

Correct Answer: (A) ls – x

38. WINDOWS is a __________ operating.

  • (A) Real time
  • (B) Multi – user
  • (C) Preemptive
  • (D) Non-preemptive
View Solution

Correct Answer: (C) Preemptive

39. Page making process from main memory to disk is called

  • (A) Interruption
  • (B) Termination
  • (C) Swapping
  • (D) None of the above
View Solution

Correct Answer: (C) Swapping

40. A Dead-lock in an Operating System is

  • (A) Desirable process
  • (B) Undesirable process
  • (C) Definite waiting process
  • (D) All of the above
View Solution

Correct Answer: (B) Undesirable process

41. Prototyping is used to

  • (A) test the software as an end product
  • (B) expand design details
  • (C) refine and establish requirements gathering
  • (D) None of the above
View Solution

Correct Answer: (C) refine and establish requirements gathering

42. Which of these are not software maintenance activity?

  • (A) Error correction
  • (B) Adaption
  • (C) Implementation of Enhancement
  • (D) Establishing scope
View Solution

Correct Answer: (D) Establishing scope

43. The system specification is the first deliverable in the computer system engineering process which does not include

  • (A) Functional Description
  • (B) Cost
  • (C) Schedule
  • (D) Technical Analysis
View Solution

Correct Answer: (D) Technical Analysis

44. The COCOMO model was introduced in the book title “Software Engineering Economics” authored by

  • (A) Abrham Silber Shatz
  • (B) Barry Boehm
  • (C) C.J. Date
  • (D) D.E. Kenith
View Solution

Correct Answer: (B) Barry Boehm

45. The Warnier diagram enabled analyst

  • (A) to represent information hierarchy in compact manner
  • (B) to further identify requirement
  • (C) to estimate the total cost involved
  • (D) None of the above
View Solution

Correct Answer: (A) to represent information hierarchy in compact manner

46. A data mart may contain

  • (A) summarized data
  • (B) de-normalized data
  • (C) aggregate departmental data
  • (D) All of the above
View Solution

Correct Answer: (D) All of the above

47. Data mining is

  • (A) the process of extracting valid, previously unknown, comprehensible and actionable information…
  • (B) a tool that allows end users direct access and manipulation of data…
  • (C) a tool that helps end users extract useful business information…
  • (D) All of the above
View Solution

Correct Answer: (A) the process of extracting valid…

48. E-Choupal refers to

  • (A) calling meeting of Surpanches electronically
  • (B) conducting Panchayat meeting using latest electronic gadgets
  • (C) providing window of information to villagers and farmers in NIC network
  • (D) None of above
View Solution

Correct Answer: (C) providing window of information to villagers and farmers…

49. The basic concepts of ethics in information society is/are

  • (A) Responsibility
  • (B) Accountability
  • (C) Liability
  • (D) All of the above
View Solution

Correct Answer: (D) All of the above

50. One of the distinguished features of super-computer over other category of computer is

  • (A) parallel processing
  • (B) highest accuracy lever
  • (C) more speed
  • (D) more capacity
View Solution

Correct Answer: (A) parallel processing

SRIRAM
SRIRAM

Sriram is a seasoned Computer Science educator and mentor. He is UGC NET Qualified twice (2014 & 2019) and holds State Eligibility Test (SET) qualifications for both Andhra Pradesh (AP) and Telangana (TG). With years of experience teaching programming languages, he simplifies complex CS concepts for aspirants of UGC NET Computer Science, KVS, NVS, EMRS, and other competitive exams.

Leave a Reply

Your email address will not be published. Required fields are marked *