ComputerSciencePaperIIDec2011

UGC NET Previous Year Papers

Computer Science Paper II

December 2011

 1.   Which of the following data structure is Non-linear type?

(A) Strings        

(B) Lists

(C) Stacks        

(D) None of the above

Ans: (D)

 

2. The total number of comparisons in a bubble sort is

(A) 0(log n)

(B) 0(n log n)

(C) 0(n)

(D) None of the above

Ans: (B)

 

3. Which of the following is a bad example of recursion?

(A) Factorial                 

(B) Fibonacci numbers

(C) Tower of Hanai     

(D) Tree traversal

Ans: (B)

 

4. Domain and Range of the function

Y =-\sqrt{-2x + 3}/ugc-net-previous-year-papers-computer-science-paper-ii-dec-2011 is

(A) \frac{3}{2}, y ≥ 0  

(B) > \frac{3}{2}, y ≤ 0

(C) ≥ \frac{3}{2}, y ≤ 0

(D) ≤ \frac{3}{2}, y ≤ 0

Ans: (D)

 

5. Maximum number of edges in a n-Node undirected graph without self loop is

(A) n2                

(B) n(n – 1)

(C) n(n + 1)      

(D) \frac{n(n -1)}{2}/ugc-net-previous-year-papers-computer-science-applications-paper-ii-dec-2011

Ans: (D)

 

6. A hash table has space for 75 records, then the probability of collision before the table is 6% full.

(A) .25               

(B) .20

(C) .35               

(D) .30

Ans: (B)

 

7. BCC in the internet refers to

(A) Black carbon copy                       

(B) Blind carbon copy

(C) Blank carbon copy                       

(D) Beautiful carbon copy

Ans: (B)

 

8. Hub is a term used with

(A) A Star Networks    

(B) A Ring Networks

(C) A Router                

(D) A Bridge

Ans: (A)

 

9. The amount of uncertainty in a system of symbol is called

(A) Bandwidth             

(B) Entropy

(C) Loss                        

(D) Quantum

Ans: (B)

 

10. Which of the following network access standard disassembler is used for connection station to a packet switched network?

(A) X.3              

(B) X.21

(C) X.25            

(D) X.75

Ans: (C)

 

Pages: 1 2 3 4 5