UGC NET Computer Science December 2010 Paper II – Solved with Answers
Practice the complete solved paper for UGC NET Computer Science (December 2010, Paper II). This archive contains the original questions from the exam, now updated with the correct answers and explanations to help you prepare for the upcoming NTA UGC NET and SET exams.
Use the “View Solution” button under each question to check your answers instantly. This paper covers essential topics like Discrete Structures, Graph Theory, Computer Architecture, and Data Structures.
1. The number of integers between 1 and 250 that are divisible by 2, 5 and 7 is
View Solution
Correct Answer: (B) 3
Explanation: LCM(2, 5, 7) = 70. Integers <= 250 divisible by 70 are: 70, 140, 210.
2. An undirected graph possesses an Eulerian circuit if and only if it is connected and its vertices are
View Solution
Correct Answer: (A) all of even degree
3. A partially ordered set is said to be a lattice if every two elements in the set have
View Solution
Correct Answer: (C) both A and B
4. The minimum number of edges in a connected graph with ‘n’ vertices is equal to
View Solution
Correct Answer: (D) n-1
Explanation: A tree is the minimally connected graph, which has n-1 edges.
5. Consider the problem of connecting 19 lamps to a single electric outlet by using extension cords, each of which has four outlets. The number of extension cords required is
View Solution
Correct Answer: (C) 6
Explanation: Each cord provides 4 outlets but uses 1. Net gain = 3 outlets per cord. We need 19. 1 (wall) + 3*x >= 19. 3x >= 18. x=6.
6. The decimal number equivalent of (4057.06)8 is
View Solution
Correct Answer: (D) 2095.0937
7. AB + (A + B)’ is equivalent to
View Solution
Correct Answer: (B) A ⊙ B (XNOR)
Explanation: (A+B)’ is A’B’. So the expression is AB + A’B’, which is XNOR.
8. An astable multivibrator has
View Solution
Correct Answer: (C) no stable states
9. 12-bit 2’s complement of -73.75 is
View Solution
Correct Answer: (C) 10110110.0100
10. Encoding of data bits 0011 into 7-bit even Parity Hamming Code is
View Solution
Correct Answer: (A) 0011110
11. How many of the following declarations are correct?
int z = 7.0;
double void = 0.000;
short array[2] = {0,1,2};
char c = “\n”;
View Solution
Correct Answer: (C) Two are correct
Explanation: ‘void’ is a keyword (Invalid). ‘char c = “\n”‘ uses double quotes which implies string (Invalid/Warning). The other two are valid (though int z=7.0 involves implicit conversion).
12. The value of the following expression (13/4*3)%5+1 is
View Solution
Correct Answer: (A) 5.75
Note: In C integer arithmetic, 13/4 is 3. 3*3=9. 9%5=4. 4+1=5. However, if operands are floats, result is 5.75. Given the options, 5.75 is the intended answer.
13. Which one of the following will set the value of y to 5 if x has the value 3, but not otherwise?
View Solution
Correct Answer: (D) if (x == 3) y = 5
14. Which one of the following sentences is true?
View Solution
Correct Answer: (B) The body of a do … while loop is executed at least once.
15. “Black” refers in the “Black-box” testing means
View Solution
Correct Answer: (C) Design is hidden (Internal logic is hidden)
Note: Some keys accept “I-O is hidden” or “Design is hidden”. The core concept is internal structure is unknown.
16. In generalization, the differences between members of an entity is
View Solution
Correct Answer: (B) minimized
Explanation: Generalization combines similar entities, suppressing (minimizing) their differences.
17. The dependency preservation decomposition is a property to decompose database schema D… X -> Y specified in F…
View Solution
Correct Answer: (C) both 1 and 2
18. Which of the following is an optimistic concurrency control method?
View Solution
Correct Answer: (A) Validation based
19. Optical storage is a
View Solution
Correct Answer: (B) low-speed direct access storage device
20. Which of the following is the process by which a user’s access to physical data in the application is limited, based on his privileges?
View Solution
Correct Answer: (C) Access Control
21. What is the maximum number of nodes in a B-tree of order 10 of depth 3 (root at depth 0)?
View Solution
Correct Answer: (A) 111 (or 1111 depending on depth definition)
Explanation: Assuming ‘Order 10’ means 10 children (m=10) and ‘Depth 3’ implies 3 levels total (0, 1, 2): 1 + 10 + 100 = 111.
22. A binary tree with 27 nodes has _____ null branches.
View Solution
Correct Answer: (D) None of the above (Correct is 28)
Explanation: Null branches = N + 1 = 27 + 1 = 28.
23. The time complexity to build a heap of n elements is
View Solution
Correct Answer: (C) O(n)
24. Linear probing suffers from a problem known as
View Solution
Correct Answer: (B) Primary clustering
25. Which of the following can be the sequence of nodes examined in binary search tree while searching for key 88? 90, 40, 65, 50, 88
View Solution
Correct Answer: (B) 190, 60, 90, 85, 88
Explanation: This path strictly follows the BST property (Left < Root < Right).
26. Frequency shift keying is used mostly in
View Solution
Correct Answer: (B) Telegraphy
27. The baud rate is
View Solution
Correct Answer: (B) equal to twice the bandwidth of an ideal channel
Explanation: Referring to the Nyquist theorem for a noiseless channel.
28. How much bandwidth is there in 1 micron of spectrum at a wavelength of 1 micron?
View Solution
Correct Answer: (C) 300 THz
29. Which of the following file transfer protocols use TCP and established two virtual circuits between the local and remote server?
View Solution
Correct Answer: (A) FTP
Explanation: FTP uses port 21 (Control) and port 20 (Data).
30. The threshold effect in demodulator is
View Solution
Correct Answer: (B) the rapid fall on output signal to noise ratio…
31. Object code is the output of ______
View Solution
Correct Answer: (B) Compiler or Assembler
32. ‘Macro’ in and assembly level program is ____.
View Solution
Correct Answer: (A) sub program (or code segment substitution)
33. Grammar of the programming is checked at ______ phase of compiler.
View Solution
Correct Answer: (C) syntax analysis
34. The register or main memory location which contains the effective address of the operand is known as
View Solution
Correct Answer: (A) pointer
35. Macro-processors are______.
View Solution
Correct Answer: (D) None of the above
Explanation: A macro-processor is a software tool, typically a pre-processor.
36. The dynamic allocation of storage areas with VSAM files is accomplished by
View Solution
Correct Answer: (B) Control splits
37. Which of the following command lists the file names in multiple columns?
View Solution
Correct Answer: (A) ls – x
38. WINDOWS is a __________ operating.
View Solution
Correct Answer: (C) Preemptive
39. Page making process from main memory to disk is called
View Solution
Correct Answer: (C) Swapping
40. A Dead-lock in an Operating System is
View Solution
Correct Answer: (B) Undesirable process
41. Prototyping is used to
View Solution
Correct Answer: (C) refine and establish requirements gathering
42. Which of these are not software maintenance activity?
View Solution
Correct Answer: (D) Establishing scope
43. The system specification is the first deliverable in the computer system engineering process which does not include
View Solution
Correct Answer: (D) Technical Analysis
44. The COCOMO model was introduced in the book title “Software Engineering Economics” authored by
View Solution
Correct Answer: (B) Barry Boehm
45. The Warnier diagram enabled analyst
View Solution
Correct Answer: (A) to represent information hierarchy in compact manner
46. A data mart may contain
View Solution
Correct Answer: (D) All of the above
47. Data mining is
View Solution
Correct Answer: (A) the process of extracting valid…
48. E-Choupal refers to
View Solution
Correct Answer: (C) providing window of information to villagers and farmers…
49. The basic concepts of ethics in information society is/are
View Solution
Correct Answer: (D) All of the above
50. One of the distinguished features of super-computer over other category of computer is
View Solution
Correct Answer: (A) parallel processing
