SlideShare a Scribd company logo
1. Write your roll number in the space provided on the top of
this page.
2. This paper consists of fifty multiple-choice type of
questions.
3. At the commencement of examination, the question booklet
will be given to you. In the first 5 minutes, you are requested
to open the booklet and compulsorily examine it as below :
(i) To have access to the Question Booklet, tear off the
paper seal on the edge of this cover page. Do not accept
a booklet without sticker-seal and do not accept an
open booklet.
(ii) Tally the number of pages and number of questions
in the booklet with the information printed on the
cover page. Faulty booklets due to pages/questions
missing or duplicate or not in serial order or any
otherdiscrepancyshouldbegotreplacedimmediately
by a correct booklet from the invigilator within the
period of 5 minutes. Afterwards, neither the
Question Booklet will be replaced nor any extra
time will be given.
(iii) After this verification is over, the OMR Sheet Number
should be entered on this Test Booklet.
4. Each item has four alternative responses marked (A), (B),
(C) and (D).You have to darken the circle as indicated below
on the correct response against each item.
Example :
where (C) is the correct response.
5. Your responses to the items are to be indicated in the OMR
Sheet given inside the Paper I Booklet only. If you mark
at any place other than in the circle in the OMR Sheet, it will
not be evaluated.
6. Read instructions given inside carefully.
7. Rough Work is to be done in the end of this booklet.
8. If you write your Name, Roll Number, Phone Number or
put any mark on any part of the OMR Sheet, except for the
space allotted for the relevant entries, which may disclose
your identity, or use abusive language or employ any other
unfair means, you will render yourself liable to
disqualification.
9. You have to return the test question booklet and Original
OMR Sheet to the invigilators at the end of the examination
compulsorily and must not carry it with you outside the
Examination Hall. You are, however, allowed to carry
duplicate copy of OMR Sheet on conclusion of examination.
10. Use only Blue/Black Ball point pen.
11. Use of any calculator or log table etc., is prohibited.
12. There is no negative marks for incorrect answers.
Number of Pages in this Booklet : 8 Number of Questions in this Booklet : 50
Instructions for the Candidates ¯Ö¸üßõÖÖÙ£ÖµÖÖë Ûêú ×»Ö‹ ×®Ö¤ìü¿Ö
J-87-12 1 P.T.O.
1. ¯ÖÆü»Öê ¯Öéšü Ûêú ‰ú¯Ö¸ü ×®ÖµÖŸÖ Ã£ÖÖ®Ö ¯Ö¸ü †¯Ö®ÖÖ ¸üÖê»Ö ®Ö´²Ö¸ü ×»Ö×ÜÖ‹ …
2. ‡ÃÖ ¯ÖÏ¿®Ö-¯Ö¡Ö ´Öë ¯Ö“ÖÖÃÖ ²ÖÆãü×¾ÖÛú»¯ÖßµÖ ¯ÖÏ¿®Ö Æïü …
3. ¯Ö¸üßõÖÖ ¯ÖÏÖ¸ü´³Ö ÆüÖê®Öê ¯Ö¸ü, ¯ÖÏ¿®Ö-¯Öã×ßÖÛúÖ †Ö¯ÖÛúÖê ¤êü ¤üß •ÖÖµÖêÝÖß … ¯ÖÆü»Öê
¯ÖÖÑ“Ö ×´Ö®Ö™ü †Ö¯ÖÛúÖê ¯ÖÏ¿®Ö-¯Öã×ßÖÛúÖ ÜÖÖê»Ö®Öê ŸÖ£ÖÖ ˆÃÖÛúß ×®Ö´®Ö×»Ö×ÜÖŸÖ
•ÖÖÑ“Ö Ûêú ×»Ö‹ פüµÖê •ÖÖµÖëÝÖê, וÖÃÖÛúß •ÖÖÑ“Ö †Ö¯ÖÛúÖê †¾Ö¿µÖ Ûú¸ü®Öß Æîü :
(i) ¯ÖÏ¿®Ö-¯Öã×ßÖÛúÖ ÜÖÖê»Ö®Öê Ûêú ×»Ö‹ ˆÃÖÛêú Ûú¾Ö¸ü ¯Öê•Ö ¯Ö¸ü »ÖÝÖß ÛúÖÝÖ•Ö
Ûúß ÃÖᯙ ÛúÖê ±úÖ›Ìü »Öë … ÜÖã»Öß Æãü‡Ô µÖÖ ×²Ö®ÖÖ Ã™üßÛú¸ü-ÃÖᯙ Ûúß
¯Öã×ßÖÛúÖ Ã¾ÖßÛúÖ¸ü ®Ö Ûú¸ëü …
(ii) Ûú¾Ö¸ü ¯Öéšü ¯Ö¸ü ”û¯Öê ×®Ö¤ìü¿ÖÖ®ÖãÃÖÖ¸ü ¯ÖÏ¿®Ö-¯Öã×ßÖÛúÖ Ûêú ¯Öéšü ŸÖ£ÖÖ
¯ÖÏ¿®ÖÖë Ûúß ÃÖÓܵÖÖ ÛúÖê †“”ûß ŸÖ¸üÆü “ÖîÛú Ûú¸ü »Öë ×Ûú µÖê ¯Öæ¸êü
Æïü … ¤üÖêÂÖ¯ÖæÞÖÔ ¯Öã×ßÖÛúÖ ×•Ö®Ö´Öë ¯Öéšü/¯ÖÏ¿®Ö Ûú´Ö ÆüÖë µÖÖ ¤ãü²ÖÖ¸üÖ †Ö
ÝÖµÖê ÆüÖë µÖÖ ÃÖß׸üµÖ»Ö ´Öë ®Ö ÆüÖë †£ÖÖÔŸÖË ×ÛúÃÖß ³Öß ¯ÖÏÛúÖ¸ü Ûúß
¡Öã×™ü¯ÖæÞÖÔ ¯Öã×ßÖÛúÖ Ã¾ÖßÛúÖ¸ü ®Ö Ûú¸ëü ŸÖ£ÖÖ ˆÃÖß ÃÖ´ÖµÖ ˆÃÖê
»ÖÖî™üÖÛú¸ü ˆÃÖÛêú ãÖÖ®Ö ¯Ö¸ü ¤æüÃÖ¸üß ÃÖÆüß ¯ÖÏ¿®Ö-¯Öã×ßÖÛúÖ »Öê »Öë …
‡ÃÖÛêú ×»Ö‹ †Ö¯ÖÛúÖê ¯ÖÖÑ“Ö ×´Ö®Ö™ü פüµÖê •ÖÖµÖëÝÖê … ˆÃÖÛêú ²ÖÖ¤ü ®Ö
ŸÖÖê †Ö¯ÖÛúß ¯ÖÏ¿®Ö-¯Öã×ßÖÛúÖ ¾ÖÖ¯ÖÃÖ »Öß •ÖÖµÖêÝÖß †Öî¸ü ®Ö Æüß †Ö¯ÖÛúÖê
†×ŸÖ׸üŒŸÖ ÃÖ´ÖµÖ ×¤üµÖÖ •ÖÖµÖêÝÖÖ …
(iii) ‡ÃÖ •ÖÖÑ“Ö Ûêú ²ÖÖ¤ü OMR ¯Ö¡ÖÛú Ûúß ÛÎú´Ö ÃÖÓܵÖÖ ‡ÃÖ ¯ÖÏ¿®Ö-¯Öã×ßÖÛúÖ
¯Ö¸ü †Ó×ÛúŸÖ Ûú¸ü ¤ëü …
4. ¯ÖÏŸµÖêÛú ¯ÖÏ¿®Ö Ûêú ×»Ö‹ “ÖÖ¸ü ˆ¢Ö¸ü ×¾ÖÛú»¯Ö (A), (B), (C) ŸÖ£ÖÖ (D) פüµÖê
ÝÖµÖê Æïü … †Ö¯ÖÛúÖê ÃÖÆüß ˆ¢Ö¸ü Ûêú ¾Öé¢Ö ÛúÖê ¯Öê®Ö ÃÖê ³Ö¸üÛú¸ü ÛúÖ»ÖÖ Ûú¸ü®ÖÖ Æîü
•ÖîÃÖÖ ×Ûú ®Öß“Öê פüÜÖÖµÖÖ ÝÖµÖÖ Æîü …
ˆ¤üÖÆü¸üÞÖ :
•Ö²Ö×Ûúú(C) ÃÖÆüß ˆ¢Ö¸ü Æîü …
5. ¯ÖÏ¿®ÖÖë Ûêú ˆ¢Ö¸ü Ûêú¾Ö»Ö ¯ÖÏ¿®Ö ¯Ö¡Ö I Ûêú †®¤ü¸ü פüµÖê ÝÖµÖê OMR ¯Ö¡ÖÛú ¯Ö¸ü Æüß
†Ó×ÛúŸÖ Ûú¸ü®Öê Æïü … µÖפü †Ö¯Ö OMR ¯Ö¡ÖÛú ¯Ö¸ü פüµÖê ÝÖµÖê ¾Öé¢Ö Ûêú †»ÖÖ¾ÖÖ
×ÛúÃÖß †®µÖ ãÖÖ®Ö ¯Ö¸ü ˆ¢Ö¸ü דÖÅ®ÖÖÓ×ÛúŸÖ Ûú¸üŸÖê Æïü, ŸÖÖê ˆÃÖÛúÖ ´Ö滵ÖÖÓÛú®Ö
®ÖÆüà ÆüÖêÝÖÖ …
6. †®¤ü¸ü פüµÖê ÝÖµÖê ×®Ö¤ìü¿ÖÖë ÛúÖê ¬µÖÖ®Ö¯Öæ¾ÖÔÛú ¯ÖœÌëü …
7. Ûú““ÖÖ ÛúÖ´Ö (Rough Work) ‡ÃÖ ¯Öã×ßÖÛúÖ Ûêú †×®ŸÖ´Ö ¯Öéšü ¯Ö¸ü Ûú¸ëü …
8. µÖפü †Ö¯Ö OMR ¯Ö¡ÖÛú ¯Ö¸ü ×®ÖµÖŸÖ Ã£ÖÖ®Ö Ûêú †»ÖÖ¾ÖÖ †¯Ö®ÖÖ ®ÖÖ´Ö, ¸üÖê»Ö
®Ö´²Ö¸ü, ±úÖê®Ö ®Ö´²Ö¸ü µÖÖ ÛúÖê‡Ô ³Öß ‹êÃÖÖ ×“ÖÅ®Ö ×•ÖÃÖÃÖê †Ö¯ÖÛúß ¯ÖÆü“ÖÖ®Ö ÆüÖê
ÃÖÛêú, †Ó×ÛúŸÖ Ûú¸üŸÖê Æïü †£Ö¾ÖÖ †³Ö¦ü ³ÖÖÂÖÖ ÛúÖ ¯ÖϵÖÖêÝÖ Ûú¸üŸÖê Æïü, µÖÖ ÛúÖê‡Ô
†®µÖ †®Öã×“ÖŸÖ ÃÖÖ¬Ö®Ö ÛúÖ ¯ÖϵÖÖêÝÖ Ûú¸üŸÖê Æïü, ŸÖÖê ¯Ö¸üßõÖÖ Ûêú ×»ÖµÖê †µÖÖêݵÖ
‘ÖÖê×ÂÖŸÖ ×ÛúµÖê •ÖÖ ÃÖÛúŸÖê Æïü …
9. †Ö¯ÖÛúÖê ¯Ö¸üßõÖÖ ÃÖ´ÖÖ¯ŸÖ ÆüÖê®Öê ¯Ö¸ü ¯ÖÏ¿®Ö-¯Öã×ßÖÛúÖ ‹¾ÖÓ ´Öæ»Ö OMR ¯Ö¡ÖÛú
×®Ö¸üßõÖÛú ´ÖÆüÖê¤üµÖ ÛúÖê »ÖÖî™üÖ®ÖÖ †Ö¾Ö¿µÖÛú Æîü †Öî¸ü ¯Ö¸üßõÖÖ ÃÖ´ÖÖׯŸÖ Ûêú ²ÖÖ¤ü
ˆÃÖê †¯Ö®Öê ÃÖÖ£Ö ¯Ö¸üßõÖÖ ³Ö¾Ö®Ö ÃÖê ²ÖÖÆü¸ü ®Ö »ÖêÛú¸ü •ÖÖµÖë … ÆüÖ»ÖÖÓ×Ûú †Ö¯Ö
¯Ö¸üßõÖÖ ÃÖ´ÖÖׯŸÖ ¯Ö¸ü OMR ¯Ö¡ÖÛú Ûúß ›ãü¯»ÖßÛêú™ü ¯ÖÏ×ŸÖ †¯Ö®Öê ÃÖÖ£Ö »Öê •ÖÖ
ÃÖÛúŸÖê Æïü …
10. Ûêú¾Ö»Ö ®Öß»Öê/ÛúÖ»Öê ²ÖÖ»Ö ¯¾ÖÖ‡Õ™ü ¯Öê®Ö ÛúÖ Æüß ‡ÃŸÖê´ÖÖ»Ö Ûú¸ëü …
11. ×ÛúÃÖß ³Öß ¯ÖÏÛúÖ¸ü ÛúÖ ÃÖÓÝÖÞÖÛú (Ûîú»ÖÛãú»Öê™ü¸ü) µÖÖ »ÖÖÝÖ ™êü²Ö»Ö †Öפü ÛúÖ
¯ÖϵÖÖêÝÖ ¾ÖÙ•ÖŸÖ Æîü …
12. ÝÖ»ÖŸÖ ˆ¢Ö¸üÖë Ûêú ×»Ö‹ ÛúÖê‡Ô †ÓÛú ÛúÖ™êü ®ÖÆüà •ÖÖ‹ÑÝÖê …
[Maximum Marks : 100Time : 1 1
/4
hours]
PAPER-II
COMPUTER SCIENCE AND APPLICATIONS
(To be filled by the Candidate)
Signature and Name of Invigilator
OMR Sheet No. : ...............................................
Roll No.
(In words)
1. (Signature) __________________________
(Name) ____________________________
2. (Signature) __________________________
(Name) ____________________________
Roll No.________________________________
8 7
(In figures as per admission card)
J 1 2
UGC-NET-JUNE-2012-CS-PAPER-II
Paper-II 2 J-87-12
1. The postfix expression AB + CD – *
can be evaluated using a
(A) stack
(B) tree
(C) queue
(D) linked list
2. The post order traversal of a binary
tree is DEBFCA. Find out the pre-
order traversal.
(A) ABFCDE
(B) ADBFEC
(C) ABDECF
(D) None of the above
3. The branch logic that provides making
capabilities in the control unit is known
as
(A) Controlled transfer
(B) Conditional transfer
(C) Unconditional transfer
(D) None of the above
4. The number of colours required to
properly colour the vertices of every
planer graph is
(A) 2
(B) 3
(C) 4
(D) 5
5. Networks that use different
technologies can be connected by
using
(A) Packets
(B) Switches
(C) Bridges
(D) Routers
6. Both hosts and routers are TCP/IP
protocol software. However, routers do
not use protocol from all layers. The
layer for which protocol software is not
needed by a router is
(A) Layer – 5 (Application)
(B) Layer – 1 (Physical)
(C) Layer – 3 (Internet)
(D) Layer – 2 (Network Interface)
7. In multiuser database if two users wish
to update the same record at the same
time, they are prevented from doing so
by
(A) Jamming
(B) Password
(C) Documentation
(D) Record lock
8. A binary search tree is a binary tree :
(A) All items in the left subtree are
less than root
(B) All items in the right subtree are
greater than or equal to the root
(C) Each subtree is itself a binary
search tree
(D) All of the above
COMPUTER SCIENCE AND APPLICATIONS
Paper – II
Note : This paper contains fifty (50) objective type questions, each question carrying two (2)
marks. Attempt all the questions.
ANS
ANS
ANS
ANS
ANS
ANS
ANS
ANS
J-87-12 3 Paper-II
9. What deletes the entire file except the
file structure ?
(A) ERASE
(B) DELETE
(C) ZAP
(D) PACK
10. Which command is the fastest among
the following ?
(A) COPY TO <NEW FILE>
(B) COPY STRUCTURE TO <NEW
FILE>
(C) COPY FILE <FILE 1> <FILE 2>
(D) COPY TO MFILE-DAT
DELIMITED
11. B+ tree are preferred to binary tree in
Database because
(A) Disk capacity are greater than
memory capacities
(B) Disk access is much slower than
memory access
(C) Disk data transfer rates are much
less than memory data transfer
rate
(D) Disks are more reliable than
memory
12. A Transaction Manager is which of the
following ?
(A) Maintains a log of transactions
(B) Maintains before and after
database images
(C) Maintains appropriate concurrency
control
(D) All of the above
13. Leaves of which of the following trees
are at the same level ?
(A) Binary tree
(B) B-tree
(C) AVL-tree
(D) Expression tree
14. Which of the following TCP/IP
Internet protocol is diskless machine
uses to obtain its IP address from a
server ?
(A) RAP
(B) RIP
(C) ARP
(D) X.25
15. Decryption and encryption of data are
the responsibility of which of the
following layer ?
(A) Physical layer
(B) Data Link layer
(C) Presentation layer
(D) Session layer
16. In which circuit switching, delivery of
data is delayed because data must be
stored and retrieved from RAM ?
(A) Space division
(B) Time division
(C) Virtual
(D) Packet
ANS
ANS
ANS
ANS
ANS
ANS
ANS
ANS
Paper-II 4 J-87-12
17. In which Routing Method do all the
routers have a common database ?
(A) Distance vector
(B) Link state
(C) Link vector
(D) Dijkestra method
18. Page Shift Keying (PSK) Method is
used to modulate digital signal at
9600 bps using 16 level. Find the line
signals and speed (i.e. modulation
rate).
(A) 2400 bauds (B) 1200 bauds
(C) 4800 bauds (D) 9600 bauds
19. The station to hub distance in which it
is 2000 metres.
(A) 100 Base-Tx
(B) 100 Base-Fx
(C) 100 Base-T4
(D) 100 Base-T1
20. Main aim of software engineering is to
produce
(A) program
(B) software
(C) within budget
(D) software within budget in the
given schedule
21. Key process areas of CMM level 4 are
also classified by a process which is
(A) CMM level 2
(B) CMM level 3
(C) CMM level 5
(D) All of the above
22. Validation means
(A) are we building the product right
(B) are we building the right product
(C) verification of fields
(D) None of the above
23. If a process is under statistical control,
then it is
(A) Maintainable
(B) Measurable
(C) Predictable
(D) Verifiable
24. In a function oriented design, we
(A) minimize cohesion and maximize
coupling
(B) maximize cohesion and minimize
coupling
(C) maximize cohesion and
maximize coupling
(D) minimize cohesion and minimize
coupling
25. Which of the following metric does not
depend on the programming language
used ?
(A) Line of code
(B) Function count
(C) Member of token
(D) All of the above
26. A / B+ tree index is to be built on the
name attribute of the relation
STUDENT. Assume that all students
names are of length 8 bytes, disk block
are of size 512 bytes and index
pointers are of size 4 bytes. Given this
scenario what would be the best choice
of the degree (i.e. the number of
pointers per node) of the B+ tree ?
(A) 16 (B) 42
(C) 43 (D) 44
ANS
ANS
ANS
ANS
ANS
ANS
ANS
ANS
ANS
ANS
J-87-12 5 Paper-II
27. The Inorder traversal of the tree will
yield a sorted listing of elements of
tree in
(A) Binary tree
(B) Binary search tree
(C) Heaps
(D) None of the above
28. Mobile IP provides two basic
functions.
(A) Route discovery and registration
(B) Agent discovery and registration
(C) IP binding and registration
(D) None of the above
29. Pre-emptive scheduling is the strategy
of temporarily suspending a gunning
process
(A) before the CPU time slice expires
(B) to allow starving processes to run
(C) when it requests I/O
(D) to avoid collision
30. In round robin CPU scheduling as time
quantum is increased the average turn
around time
(A) increases
(B) decreases
(C) remains constant
(D) varies irregularly
31. Resources are allocated to the process
on non-sharable basis is
(A) mutual exclusion
(B) hold and wait
(C) no pre-emption
(D) circular wait
32. Cached and interleaved memories are
ways of speeding up memory access
between CPU’s and slower RAM.
Which memory models are best suited
(i.e. improves the performance most)
for which programs ?
(i) Cached memory is best suited for
small loops.
(ii) Interleaved memory is best
suited for small loops
(iii) Interleaved memory is best
suited for large sequential code.
(iv) Cached memory is best suited for
large sequential code.
(A) (i) and (ii) are true.
(B) (i) and (iii) are true.
(C) (iv) and (ii) are true.
(D) (iv) and (iii) are true.
33. Consider the following page trace :
4,3, 2, 1, 4, 3, 5, 4, 3, 2, 1, 5
Percentage of page fault that would
occur if FIFO page replacement
algorithm is used with number of
frames for the JOB m = 4 will be
(A) 8
(B) 9
(C) 10
(D) 12
34. Check sum used along with each
packet computes the sum of the data,
where data is treated as a sequence of
(A) Integer
(B) Character
(C) Real numbers
(D) Bits
ANS
ANS
ANS
ANS
ANS
ANS
ANS
ANS
Paper-II 6 J-87-12
35. If an integer needs two bytes of
storage, then the maximum value of a
signed integer is
(A) 216
– 1
(B) 215
– 1
(C) 216
(D) 215
36. Which of the following logic families
is well suited for high-speed operations ?
(A) TTL
(B) ECL
(C) MOS
(D) CMOS
37. Interrupts which are initiated by an
instruction are
(A) Internal
(B) External
(C) Hardware
(D) Software
38. printf(“%c”, 100);
(A) prints 100
(B) prints ASCII equivalent of 100
(C) prints garbage
(D) none of the above
39. For the transmission of the signal,
Bluetooth wireless technology uses
(A) time division multiplexing
(B) frequency division multiplexing
(C) time division duplex
(D) frequency division duplex
40. Consider the following statements :
I. Recursive languages are closed
under complementation.
II. Recursively enumerable languages
are closed under union.
III. Recursively enumerable languages
are closed under complementation.
Which of the above statements are true ?
(A) I only
(B) I and II
(C) I and III
(D) II and III
41. What is the routing algorithm used by
RIP and IGRP ?
(A) OSPF
(B) Link-state
(C) Dynamic
(D) Dijkestra vector
42. Identify the incorrect statement :
(A) The overall strategy drives the
E-Commerce data warehousing
strategy.
(B) Data warehousing in an
E-Commerce environment should
be done in a classical manner.
(C) E-Commerce opens up an
entirely new world of web
server.
(D) E-Commerce security threats can
be grouped into three major
categories.
ANS
ANS
ANS
ANS
ANS
ANS
ANS
ANS
J-87-12 7 Paper-II
43. Reliability of software is directly
dependent on
(A) quality of the design
(B) number of errors present
(C) software engineers experience
(D) user requirement
44. ______ is not an E-Commerce
application.
(A) House banking
(B) Buying stocks
(C) Conducting an auction
(D) Evaluating an employee
45. ______ is a satellite based tracking
system that enables the determination
of person’s position.
(A) Bluetooth
(B) WAP
(C) Short Message Service
(D) Global Positioning System
46. A complete microcomputer system
consists of
(A) Microprocessor
(B) Memory
(C) Peripheral equipment
(D) All of the above
47. Where does a computer add and
compare data ?
(A) Hard disk
(B) Floppy disk
(C) CPU chip
(D) Memory chip
48. Pipelining strategy is called implement
(A) instruction execution
(B) instruction prefetch
(C) instruction decoding
(D) instruction manipulation
49. Which of the following data structure
is linear type ?
(A) Strings
(B) Lists
(C) Queues
(D) All of the above
50. To represent hierarchical relationship
between elements, which data structure
is suitable ?
(A) Dequeue
(B) Priority
(C) Tree
(D) All of the above
ANS
ANS
ANS
ANS
ANS
ANS
ANS
ANS
Space For Rough Work
Paper-II 8 J-87-12

More Related Content

What's hot

11. ugc net commerce dec 2010 question paper
11. ugc net commerce dec 2010 question paper11. ugc net commerce dec 2010 question paper
11. ugc net commerce dec 2010 question paper
Kumar Nirmal Prasad
 
Economics learning question set in 6 years
Economics learning question set in 6 yearsEconomics learning question set in 6 years
Economics learning question set in 6 years
Kishor Vp
 
2014
 2014 2014
2014
meena109
 
UGC NET June 2014 Paper I
UGC NET June 2014 Paper IUGC NET June 2014 Paper I
UGC NET June 2014 Paper I
Bonala Kondal
 
4. ugc net commerce june 2007 question paper
4. ugc net commerce june 2007 question paper4. ugc net commerce june 2007 question paper
4. ugc net commerce june 2007 question paper
Kumar Nirmal Prasad
 
9. ugc net commerce dec 2009 question paper
9. ugc net commerce dec 2009 question paper9. ugc net commerce dec 2009 question paper
9. ugc net commerce dec 2009 question paper
Kumar Nirmal Prasad
 
UGC NET - DEC-2009- PAPER-I-SET-W
UGC NET - DEC-2009- PAPER-I-SET-WUGC NET - DEC-2009- PAPER-I-SET-W
UGC NET - DEC-2009- PAPER-I-SET-W
VIJAY TRIPATHI (DSS Basti)
 
2. ugc net commerce june 2006 question paper
2. ugc net commerce june 2006 question paper2. ugc net commerce june 2006 question paper
2. ugc net commerce june 2006 question paper
Kumar Nirmal Prasad
 
J 09-14-ii
J 09-14-iiJ 09-14-ii
J 09-14-ii
beniwalsushil
 
D 0009 set-x
D 0009 set-xD 0009 set-x
06.04.2014 f
06.04.2014 f06.04.2014 f
06.04.2014 f
j1232512m2009
 
5. ugc net commerce dec 2007 question paper
5. ugc net commerce dec 2007 question paper5. ugc net commerce dec 2007 question paper
5. ugc net commerce dec 2007 question paper
Kumar Nirmal Prasad
 
D 0009 set-z
D 0009 set-zD 0009 set-z
Net paper ii j 6310
Net paper ii j 6310Net paper ii j 6310
Net paper ii j 6310
satishosmania
 
D 0009 set-w
D 0009 set-wD 0009 set-w
04 apr 2015 c jee main exam JEE MAIN EXAM 2015 CODE -C QUESTION PAPER DT.04....
04 apr 2015 c  jee main exam JEE MAIN EXAM 2015 CODE -C QUESTION PAPER DT.04....04 apr 2015 c  jee main exam JEE MAIN EXAM 2015 CODE -C QUESTION PAPER DT.04....
04 apr 2015 c jee main exam JEE MAIN EXAM 2015 CODE -C QUESTION PAPER DT.04....
udhayam99
 
D 0009 set-y
D 0009 set-yD 0009 set-y

What's hot (17)

11. ugc net commerce dec 2010 question paper
11. ugc net commerce dec 2010 question paper11. ugc net commerce dec 2010 question paper
11. ugc net commerce dec 2010 question paper
 
Economics learning question set in 6 years
Economics learning question set in 6 yearsEconomics learning question set in 6 years
Economics learning question set in 6 years
 
2014
 2014 2014
2014
 
UGC NET June 2014 Paper I
UGC NET June 2014 Paper IUGC NET June 2014 Paper I
UGC NET June 2014 Paper I
 
4. ugc net commerce june 2007 question paper
4. ugc net commerce june 2007 question paper4. ugc net commerce june 2007 question paper
4. ugc net commerce june 2007 question paper
 
9. ugc net commerce dec 2009 question paper
9. ugc net commerce dec 2009 question paper9. ugc net commerce dec 2009 question paper
9. ugc net commerce dec 2009 question paper
 
UGC NET - DEC-2009- PAPER-I-SET-W
UGC NET - DEC-2009- PAPER-I-SET-WUGC NET - DEC-2009- PAPER-I-SET-W
UGC NET - DEC-2009- PAPER-I-SET-W
 
2. ugc net commerce june 2006 question paper
2. ugc net commerce june 2006 question paper2. ugc net commerce june 2006 question paper
2. ugc net commerce june 2006 question paper
 
J 09-14-ii
J 09-14-iiJ 09-14-ii
J 09-14-ii
 
D 0009 set-x
D 0009 set-xD 0009 set-x
D 0009 set-x
 
06.04.2014 f
06.04.2014 f06.04.2014 f
06.04.2014 f
 
5. ugc net commerce dec 2007 question paper
5. ugc net commerce dec 2007 question paper5. ugc net commerce dec 2007 question paper
5. ugc net commerce dec 2007 question paper
 
D 0009 set-z
D 0009 set-zD 0009 set-z
D 0009 set-z
 
Net paper ii j 6310
Net paper ii j 6310Net paper ii j 6310
Net paper ii j 6310
 
D 0009 set-w
D 0009 set-wD 0009 set-w
D 0009 set-w
 
04 apr 2015 c jee main exam JEE MAIN EXAM 2015 CODE -C QUESTION PAPER DT.04....
04 apr 2015 c  jee main exam JEE MAIN EXAM 2015 CODE -C QUESTION PAPER DT.04....04 apr 2015 c  jee main exam JEE MAIN EXAM 2015 CODE -C QUESTION PAPER DT.04....
04 apr 2015 c jee main exam JEE MAIN EXAM 2015 CODE -C QUESTION PAPER DT.04....
 
D 0009 set-y
D 0009 set-yD 0009 set-y
D 0009 set-y
 

Similar to NET-CS-JUNE-2012-PAPER-II

Cbse ugc-net-computer-science-paper-2-december-2014
Cbse ugc-net-computer-science-paper-2-december-2014Cbse ugc-net-computer-science-paper-2-december-2014
Cbse ugc-net-computer-science-paper-2-december-2014
Ashish Rai
 
NET-CS-DEC-2012-PAPER-III
NET-CS-DEC-2012-PAPER-IIINET-CS-DEC-2012-PAPER-III
NET-CS-DEC-2012-PAPER-III
VIJAY TRIPATHI (DSS Basti)
 
NET-CS-DEC-2010- PAPER-II
NET-CS-DEC-2010- PAPER-IINET-CS-DEC-2010- PAPER-II
NET-CS-DEC-2010- PAPER-II
VIJAY TRIPATHI (DSS Basti)
 
UGC NET COMPUTER SCIENCE JUNE 2009 PAPER-II
UGC NET COMPUTER SCIENCE JUNE 2009 PAPER-IIUGC NET COMPUTER SCIENCE JUNE 2009 PAPER-II
UGC NET COMPUTER SCIENCE JUNE 2009 PAPER-II
VIJAY TRIPATHI (DSS Basti)
 
NTA-NET-Computer-Science-Paper-2-July-2016.pdf
NTA-NET-Computer-Science-Paper-2-July-2016.pdfNTA-NET-Computer-Science-Paper-2-July-2016.pdf
NTA-NET-Computer-Science-Paper-2-July-2016.pdf
vicepy
 
UGC NET COMPUTER SCIENCE JUNE 2010 PAPER-II
UGC NET COMPUTER SCIENCE JUNE 2010 PAPER-IIUGC NET COMPUTER SCIENCE JUNE 2010 PAPER-II
UGC NET COMPUTER SCIENCE JUNE 2010 PAPER-II
VIJAY TRIPATHI (DSS Basti)
 
NTA-NET-Computer-Science-Paper-3-Jan-2017.pdf
NTA-NET-Computer-Science-Paper-3-Jan-2017.pdfNTA-NET-Computer-Science-Paper-3-Jan-2017.pdf
NTA-NET-Computer-Science-Paper-3-Jan-2017.pdf
vicepy
 
K 3215 (paper iii) (earth science) 0
K 3215 (paper iii) (earth science) 0K 3215 (paper iii) (earth science) 0
K 3215 (paper iii) (earth science) 0
Pramoda Raj
 
K 3215 (paper iii) (earth science) 0
K 3215 (paper iii) (earth science) 0K 3215 (paper iii) (earth science) 0
K 3215 (paper iii) (earth science) 0
Vinay c
 
3. ugc net commerce dec 2006 question paper
3. ugc net commerce dec 2006 question paper3. ugc net commerce dec 2006 question paper
3. ugc net commerce dec 2006 question paper
Kumar Nirmal Prasad
 
04 apr 2015 b jee main exam JEE MAIN EXAM 2015 CODE -B QUESTION PAPER DT.04....
04 apr 2015 b  jee main exam JEE MAIN EXAM 2015 CODE -B QUESTION PAPER DT.04....04 apr 2015 b  jee main exam JEE MAIN EXAM 2015 CODE -B QUESTION PAPER DT.04....
04 apr 2015 b jee main exam JEE MAIN EXAM 2015 CODE -B QUESTION PAPER DT.04....
udhayam99
 
IIT-JEE Mains 2015 Offline Previous Question Paper Set B
IIT-JEE Mains 2015 Offline Previous Question Paper Set BIIT-JEE Mains 2015 Offline Previous Question Paper Set B
IIT-JEE Mains 2015 Offline Previous Question Paper Set B
Eneutron
 
J2008p3
J2008p3J2008p3
UGC NET COMPUTER SCIENCE DEC- 2009 PAPER-II
UGC NET COMPUTER SCIENCE DEC- 2009 PAPER-IIUGC NET COMPUTER SCIENCE DEC- 2009 PAPER-II
UGC NET COMPUTER SCIENCE DEC- 2009 PAPER-II
VIJAY TRIPATHI (DSS Basti)
 
J 3108 paper ii
J 3108 paper iiJ 3108 paper ii
J 3108 paper ii
yogeshvksagar
 
J2005p2
J2005p2J2005p2
06.04.2014 f
06.04.2014 f06.04.2014 f
06.04.2014 f
j1232512m2009
 
06.04.2014 f
06.04.2014 f06.04.2014 f
06.04.2014 f
j1232512m2009
 
J 0010 set-x
J 0010 set-xJ 0010 set-x
J 0010 set-x
vaishali07
 
J 0010 set-x (1)
J 0010 set-x (1)J 0010 set-x (1)
J 0010 set-x (1)
Department Of Environment
 

Similar to NET-CS-JUNE-2012-PAPER-II (20)

Cbse ugc-net-computer-science-paper-2-december-2014
Cbse ugc-net-computer-science-paper-2-december-2014Cbse ugc-net-computer-science-paper-2-december-2014
Cbse ugc-net-computer-science-paper-2-december-2014
 
NET-CS-DEC-2012-PAPER-III
NET-CS-DEC-2012-PAPER-IIINET-CS-DEC-2012-PAPER-III
NET-CS-DEC-2012-PAPER-III
 
NET-CS-DEC-2010- PAPER-II
NET-CS-DEC-2010- PAPER-IINET-CS-DEC-2010- PAPER-II
NET-CS-DEC-2010- PAPER-II
 
UGC NET COMPUTER SCIENCE JUNE 2009 PAPER-II
UGC NET COMPUTER SCIENCE JUNE 2009 PAPER-IIUGC NET COMPUTER SCIENCE JUNE 2009 PAPER-II
UGC NET COMPUTER SCIENCE JUNE 2009 PAPER-II
 
NTA-NET-Computer-Science-Paper-2-July-2016.pdf
NTA-NET-Computer-Science-Paper-2-July-2016.pdfNTA-NET-Computer-Science-Paper-2-July-2016.pdf
NTA-NET-Computer-Science-Paper-2-July-2016.pdf
 
UGC NET COMPUTER SCIENCE JUNE 2010 PAPER-II
UGC NET COMPUTER SCIENCE JUNE 2010 PAPER-IIUGC NET COMPUTER SCIENCE JUNE 2010 PAPER-II
UGC NET COMPUTER SCIENCE JUNE 2010 PAPER-II
 
NTA-NET-Computer-Science-Paper-3-Jan-2017.pdf
NTA-NET-Computer-Science-Paper-3-Jan-2017.pdfNTA-NET-Computer-Science-Paper-3-Jan-2017.pdf
NTA-NET-Computer-Science-Paper-3-Jan-2017.pdf
 
K 3215 (paper iii) (earth science) 0
K 3215 (paper iii) (earth science) 0K 3215 (paper iii) (earth science) 0
K 3215 (paper iii) (earth science) 0
 
K 3215 (paper iii) (earth science) 0
K 3215 (paper iii) (earth science) 0K 3215 (paper iii) (earth science) 0
K 3215 (paper iii) (earth science) 0
 
3. ugc net commerce dec 2006 question paper
3. ugc net commerce dec 2006 question paper3. ugc net commerce dec 2006 question paper
3. ugc net commerce dec 2006 question paper
 
04 apr 2015 b jee main exam JEE MAIN EXAM 2015 CODE -B QUESTION PAPER DT.04....
04 apr 2015 b  jee main exam JEE MAIN EXAM 2015 CODE -B QUESTION PAPER DT.04....04 apr 2015 b  jee main exam JEE MAIN EXAM 2015 CODE -B QUESTION PAPER DT.04....
04 apr 2015 b jee main exam JEE MAIN EXAM 2015 CODE -B QUESTION PAPER DT.04....
 
IIT-JEE Mains 2015 Offline Previous Question Paper Set B
IIT-JEE Mains 2015 Offline Previous Question Paper Set BIIT-JEE Mains 2015 Offline Previous Question Paper Set B
IIT-JEE Mains 2015 Offline Previous Question Paper Set B
 
J2008p3
J2008p3J2008p3
J2008p3
 
UGC NET COMPUTER SCIENCE DEC- 2009 PAPER-II
UGC NET COMPUTER SCIENCE DEC- 2009 PAPER-IIUGC NET COMPUTER SCIENCE DEC- 2009 PAPER-II
UGC NET COMPUTER SCIENCE DEC- 2009 PAPER-II
 
J 3108 paper ii
J 3108 paper iiJ 3108 paper ii
J 3108 paper ii
 
J2005p2
J2005p2J2005p2
J2005p2
 
06.04.2014 f
06.04.2014 f06.04.2014 f
06.04.2014 f
 
06.04.2014 f
06.04.2014 f06.04.2014 f
06.04.2014 f
 
J 0010 set-x
J 0010 set-xJ 0010 set-x
J 0010 set-x
 
J 0010 set-x (1)
J 0010 set-x (1)J 0010 set-x (1)
J 0010 set-x (1)
 

More from VIJAY TRIPATHI (DSS Basti)

Presentation hotel
Presentation hotelPresentation hotel
Presentation hotel
VIJAY TRIPATHI (DSS Basti)
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
VIJAY TRIPATHI (DSS Basti)
 
VEHICULAR AD HOC NETWORKS
VEHICULAR AD HOC NETWORKSVEHICULAR AD HOC NETWORKS
VEHICULAR AD HOC NETWORKS
VIJAY TRIPATHI (DSS Basti)
 
AD HOC NETWORKS
AD HOC NETWORKSAD HOC NETWORKS
Dss e education project
Dss e education projectDss e education project
Dss e education project
VIJAY TRIPATHI (DSS Basti)
 
Computer networks--introduction computer-networking
Computer networks--introduction computer-networkingComputer networks--introduction computer-networking
Computer networks--introduction computer-networking
VIJAY TRIPATHI (DSS Basti)
 
UGC-NET-DEC-2012-PAPER-I-SET-W
UGC-NET-DEC-2012-PAPER-I-SET-WUGC-NET-DEC-2012-PAPER-I-SET-W
UGC-NET-DEC-2012-PAPER-I-SET-W
VIJAY TRIPATHI (DSS Basti)
 
UGC-NET-JUNE-2012-PAPER-I-SET-W
UGC-NET-JUNE-2012-PAPER-I-SET-WUGC-NET-JUNE-2012-PAPER-I-SET-W
UGC-NET-JUNE-2012-PAPER-I-SET-W
VIJAY TRIPATHI (DSS Basti)
 
UGC-NET-JUNE-2011-PAPER-I
UGC-NET-JUNE-2011-PAPER-IUGC-NET-JUNE-2011-PAPER-I
UGC-NET-JUNE-2011-PAPER-I
VIJAY TRIPATHI (DSS Basti)
 
NET-DEC-2010-PAPER-I-SET-W
NET-DEC-2010-PAPER-I-SET-WNET-DEC-2010-PAPER-I-SET-W
NET-DEC-2010-PAPER-I-SET-W
VIJAY TRIPATHI (DSS Basti)
 
UGC NET - JUNE-2010- PAPER-I-SET-W
UGC NET - JUNE-2010- PAPER-I-SET-WUGC NET - JUNE-2010- PAPER-I-SET-W
UGC NET - JUNE-2010- PAPER-I-SET-W
VIJAY TRIPATHI (DSS Basti)
 
UGC NET June 2009 PAPER I Solved
UGC NET June 2009 PAPER I SolvedUGC NET June 2009 PAPER I Solved
UGC NET June 2009 PAPER I Solved
VIJAY TRIPATHI (DSS Basti)
 

More from VIJAY TRIPATHI (DSS Basti) (12)

Presentation hotel
Presentation hotelPresentation hotel
Presentation hotel
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
VEHICULAR AD HOC NETWORKS
VEHICULAR AD HOC NETWORKSVEHICULAR AD HOC NETWORKS
VEHICULAR AD HOC NETWORKS
 
AD HOC NETWORKS
AD HOC NETWORKSAD HOC NETWORKS
AD HOC NETWORKS
 
Dss e education project
Dss e education projectDss e education project
Dss e education project
 
Computer networks--introduction computer-networking
Computer networks--introduction computer-networkingComputer networks--introduction computer-networking
Computer networks--introduction computer-networking
 
UGC-NET-DEC-2012-PAPER-I-SET-W
UGC-NET-DEC-2012-PAPER-I-SET-WUGC-NET-DEC-2012-PAPER-I-SET-W
UGC-NET-DEC-2012-PAPER-I-SET-W
 
UGC-NET-JUNE-2012-PAPER-I-SET-W
UGC-NET-JUNE-2012-PAPER-I-SET-WUGC-NET-JUNE-2012-PAPER-I-SET-W
UGC-NET-JUNE-2012-PAPER-I-SET-W
 
UGC-NET-JUNE-2011-PAPER-I
UGC-NET-JUNE-2011-PAPER-IUGC-NET-JUNE-2011-PAPER-I
UGC-NET-JUNE-2011-PAPER-I
 
NET-DEC-2010-PAPER-I-SET-W
NET-DEC-2010-PAPER-I-SET-WNET-DEC-2010-PAPER-I-SET-W
NET-DEC-2010-PAPER-I-SET-W
 
UGC NET - JUNE-2010- PAPER-I-SET-W
UGC NET - JUNE-2010- PAPER-I-SET-WUGC NET - JUNE-2010- PAPER-I-SET-W
UGC NET - JUNE-2010- PAPER-I-SET-W
 
UGC NET June 2009 PAPER I Solved
UGC NET June 2009 PAPER I SolvedUGC NET June 2009 PAPER I Solved
UGC NET June 2009 PAPER I Solved
 

Recently uploaded

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 

Recently uploaded (20)

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 

NET-CS-JUNE-2012-PAPER-II

  • 1. 1. Write your roll number in the space provided on the top of this page. 2. This paper consists of fifty multiple-choice type of questions. 3. At the commencement of examination, the question booklet will be given to you. In the first 5 minutes, you are requested to open the booklet and compulsorily examine it as below : (i) To have access to the Question Booklet, tear off the paper seal on the edge of this cover page. Do not accept a booklet without sticker-seal and do not accept an open booklet. (ii) Tally the number of pages and number of questions in the booklet with the information printed on the cover page. Faulty booklets due to pages/questions missing or duplicate or not in serial order or any otherdiscrepancyshouldbegotreplacedimmediately by a correct booklet from the invigilator within the period of 5 minutes. Afterwards, neither the Question Booklet will be replaced nor any extra time will be given. (iii) After this verification is over, the OMR Sheet Number should be entered on this Test Booklet. 4. Each item has four alternative responses marked (A), (B), (C) and (D).You have to darken the circle as indicated below on the correct response against each item. Example : where (C) is the correct response. 5. Your responses to the items are to be indicated in the OMR Sheet given inside the Paper I Booklet only. If you mark at any place other than in the circle in the OMR Sheet, it will not be evaluated. 6. Read instructions given inside carefully. 7. Rough Work is to be done in the end of this booklet. 8. If you write your Name, Roll Number, Phone Number or put any mark on any part of the OMR Sheet, except for the space allotted for the relevant entries, which may disclose your identity, or use abusive language or employ any other unfair means, you will render yourself liable to disqualification. 9. You have to return the test question booklet and Original OMR Sheet to the invigilators at the end of the examination compulsorily and must not carry it with you outside the Examination Hall. You are, however, allowed to carry duplicate copy of OMR Sheet on conclusion of examination. 10. Use only Blue/Black Ball point pen. 11. Use of any calculator or log table etc., is prohibited. 12. There is no negative marks for incorrect answers. Number of Pages in this Booklet : 8 Number of Questions in this Booklet : 50 Instructions for the Candidates ¯Ö¸üßõÖÖÙ£ÖµÖÖë Ûêú ×»Ö‹ ×®Ö¤ìü¿Ö J-87-12 1 P.T.O. 1. ¯ÖÆü»Öê ¯Öéšü Ûêú ‰ú¯Ö¸ü ×®ÖµÖŸÖ Ã£ÖÖ®Ö ¯Ö¸ü †¯Ö®ÖÖ ¸üÖê»Ö ®Ö´²Ö¸ü ×»Ö×ÜÖ‹ … 2. ‡ÃÖ ¯ÖÏ¿®Ö-¯Ö¡Ö ´Öë ¯Ö“ÖÖÃÖ ²ÖÆãü×¾ÖÛú»¯ÖßµÖ ¯ÖÏ¿®Ö Æïü … 3. ¯Ö¸üßõÖÖ ¯ÖÏÖ¸ü´³Ö ÆüÖê®Öê ¯Ö¸ü, ¯ÖÏ¿®Ö-¯Öã×ßÖÛúÖ †Ö¯ÖÛúÖê ¤êü ¤üß •ÖÖµÖêÝÖß … ¯ÖÆü»Öê ¯ÖÖÑ“Ö ×´Ö®Ö™ü †Ö¯ÖÛúÖê ¯ÖÏ¿®Ö-¯Öã×ßÖÛúÖ ÜÖÖê»Ö®Öê ŸÖ£ÖÖ ˆÃÖÛúß ×®Ö´®Ö×»Ö×ÜÖŸÖ •ÖÖÑ“Ö Ûêú ×»Ö‹ פüµÖê •ÖÖµÖëÝÖê, וÖÃÖÛúß •ÖÖÑ“Ö †Ö¯ÖÛúÖê †¾Ö¿µÖ Ûú¸ü®Öß Æîü : (i) ¯ÖÏ¿®Ö-¯Öã×ßÖÛúÖ ÜÖÖê»Ö®Öê Ûêú ×»Ö‹ ˆÃÖÛêú Ûú¾Ö¸ü ¯Öê•Ö ¯Ö¸ü »ÖÝÖß ÛúÖÝÖ•Ö Ûúß ÃÖᯙ ÛúÖê ±úÖ›Ìü »Öë … ÜÖã»Öß Æãü‡Ô µÖÖ ×²Ö®ÖÖ Ã™üßÛú¸ü-ÃÖᯙ Ûúß ¯Öã×ßÖÛúÖ Ã¾ÖßÛúÖ¸ü ®Ö Ûú¸ëü … (ii) Ûú¾Ö¸ü ¯Öéšü ¯Ö¸ü ”û¯Öê ×®Ö¤ìü¿ÖÖ®ÖãÃÖÖ¸ü ¯ÖÏ¿®Ö-¯Öã×ßÖÛúÖ Ûêú ¯Öéšü ŸÖ£ÖÖ ¯ÖÏ¿®ÖÖë Ûúß ÃÖÓܵÖÖ ÛúÖê †“”ûß ŸÖ¸üÆü “ÖîÛú Ûú¸ü »Öë ×Ûú µÖê ¯Öæ¸êü Æïü … ¤üÖêÂÖ¯ÖæÞÖÔ ¯Öã×ßÖÛúÖ ×•Ö®Ö´Öë ¯Öéšü/¯ÖÏ¿®Ö Ûú´Ö ÆüÖë µÖÖ ¤ãü²ÖÖ¸üÖ †Ö ÝÖµÖê ÆüÖë µÖÖ ÃÖß׸üµÖ»Ö ´Öë ®Ö ÆüÖë †£ÖÖÔŸÖË ×ÛúÃÖß ³Öß ¯ÖÏÛúÖ¸ü Ûúß ¡Öã×™ü¯ÖæÞÖÔ ¯Öã×ßÖÛúÖ Ã¾ÖßÛúÖ¸ü ®Ö Ûú¸ëü ŸÖ£ÖÖ ˆÃÖß ÃÖ´ÖµÖ ˆÃÖê »ÖÖî™üÖÛú¸ü ˆÃÖÛêú ãÖÖ®Ö ¯Ö¸ü ¤æüÃÖ¸üß ÃÖÆüß ¯ÖÏ¿®Ö-¯Öã×ßÖÛúÖ »Öê »Öë … ‡ÃÖÛêú ×»Ö‹ †Ö¯ÖÛúÖê ¯ÖÖÑ“Ö ×´Ö®Ö™ü פüµÖê •ÖÖµÖëÝÖê … ˆÃÖÛêú ²ÖÖ¤ü ®Ö ŸÖÖê †Ö¯ÖÛúß ¯ÖÏ¿®Ö-¯Öã×ßÖÛúÖ ¾ÖÖ¯ÖÃÖ »Öß •ÖÖµÖêÝÖß †Öî¸ü ®Ö Æüß †Ö¯ÖÛúÖê †×ŸÖ׸üŒŸÖ ÃÖ´ÖµÖ ×¤üµÖÖ •ÖÖµÖêÝÖÖ … (iii) ‡ÃÖ •ÖÖÑ“Ö Ûêú ²ÖÖ¤ü OMR ¯Ö¡ÖÛú Ûúß ÛÎú´Ö ÃÖÓܵÖÖ ‡ÃÖ ¯ÖÏ¿®Ö-¯Öã×ßÖÛúÖ ¯Ö¸ü †Ó×ÛúŸÖ Ûú¸ü ¤ëü … 4. ¯ÖÏŸµÖêÛú ¯ÖÏ¿®Ö Ûêú ×»Ö‹ “ÖÖ¸ü ˆ¢Ö¸ü ×¾ÖÛú»¯Ö (A), (B), (C) ŸÖ£ÖÖ (D) פüµÖê ÝÖµÖê Æïü … †Ö¯ÖÛúÖê ÃÖÆüß ˆ¢Ö¸ü Ûêú ¾Öé¢Ö ÛúÖê ¯Öê®Ö ÃÖê ³Ö¸üÛú¸ü ÛúÖ»ÖÖ Ûú¸ü®ÖÖ Æîü •ÖîÃÖÖ ×Ûú ®Öß“Öê פüÜÖÖµÖÖ ÝÖµÖÖ Æîü … ˆ¤üÖÆü¸üÞÖ : •Ö²Ö×Ûúú(C) ÃÖÆüß ˆ¢Ö¸ü Æîü … 5. ¯ÖÏ¿®ÖÖë Ûêú ˆ¢Ö¸ü Ûêú¾Ö»Ö ¯ÖÏ¿®Ö ¯Ö¡Ö I Ûêú †®¤ü¸ü פüµÖê ÝÖµÖê OMR ¯Ö¡ÖÛú ¯Ö¸ü Æüß †Ó×ÛúŸÖ Ûú¸ü®Öê Æïü … µÖפü †Ö¯Ö OMR ¯Ö¡ÖÛú ¯Ö¸ü פüµÖê ÝÖµÖê ¾Öé¢Ö Ûêú †»ÖÖ¾ÖÖ ×ÛúÃÖß †®µÖ ãÖÖ®Ö ¯Ö¸ü ˆ¢Ö¸ü דÖÅ®ÖÖÓ×ÛúŸÖ Ûú¸üŸÖê Æïü, ŸÖÖê ˆÃÖÛúÖ ´Ö滵ÖÖÓÛú®Ö ®ÖÆüà ÆüÖêÝÖÖ … 6. †®¤ü¸ü פüµÖê ÝÖµÖê ×®Ö¤ìü¿ÖÖë ÛúÖê ¬µÖÖ®Ö¯Öæ¾ÖÔÛú ¯ÖœÌëü … 7. Ûú““ÖÖ ÛúÖ´Ö (Rough Work) ‡ÃÖ ¯Öã×ßÖÛúÖ Ûêú †×®ŸÖ´Ö ¯Öéšü ¯Ö¸ü Ûú¸ëü … 8. µÖפü †Ö¯Ö OMR ¯Ö¡ÖÛú ¯Ö¸ü ×®ÖµÖŸÖ Ã£ÖÖ®Ö Ûêú †»ÖÖ¾ÖÖ †¯Ö®ÖÖ ®ÖÖ´Ö, ¸üÖê»Ö ®Ö´²Ö¸ü, ±úÖê®Ö ®Ö´²Ö¸ü µÖÖ ÛúÖê‡Ô ³Öß ‹êÃÖÖ ×“ÖÅ®Ö ×•ÖÃÖÃÖê †Ö¯ÖÛúß ¯ÖÆü“ÖÖ®Ö ÆüÖê ÃÖÛêú, †Ó×ÛúŸÖ Ûú¸üŸÖê Æïü †£Ö¾ÖÖ †³Ö¦ü ³ÖÖÂÖÖ ÛúÖ ¯ÖϵÖÖêÝÖ Ûú¸üŸÖê Æïü, µÖÖ ÛúÖê‡Ô †®µÖ †®Öã×“ÖŸÖ ÃÖÖ¬Ö®Ö ÛúÖ ¯ÖϵÖÖêÝÖ Ûú¸üŸÖê Æïü, ŸÖÖê ¯Ö¸üßõÖÖ Ûêú ×»ÖµÖê †µÖÖêÝµÖ ‘ÖÖê×ÂÖŸÖ ×ÛúµÖê •ÖÖ ÃÖÛúŸÖê Æïü … 9. †Ö¯ÖÛúÖê ¯Ö¸üßõÖÖ ÃÖ´ÖÖ¯ŸÖ ÆüÖê®Öê ¯Ö¸ü ¯ÖÏ¿®Ö-¯Öã×ßÖÛúÖ ‹¾ÖÓ ´Öæ»Ö OMR ¯Ö¡ÖÛú ×®Ö¸üßõÖÛú ´ÖÆüÖê¤üµÖ ÛúÖê »ÖÖî™üÖ®ÖÖ †Ö¾Ö¿µÖÛú Æîü †Öî¸ü ¯Ö¸üßõÖÖ ÃÖ´ÖÖׯŸÖ Ûêú ²ÖÖ¤ü ˆÃÖê †¯Ö®Öê ÃÖÖ£Ö ¯Ö¸üßõÖÖ ³Ö¾Ö®Ö ÃÖê ²ÖÖÆü¸ü ®Ö »ÖêÛú¸ü •ÖÖµÖë … ÆüÖ»ÖÖÓ×Ûú †Ö¯Ö ¯Ö¸üßõÖÖ ÃÖ´ÖÖׯŸÖ ¯Ö¸ü OMR ¯Ö¡ÖÛú Ûúß ›ãü¯»ÖßÛêú™ü ¯ÖÏ×ŸÖ †¯Ö®Öê ÃÖÖ£Ö »Öê •ÖÖ ÃÖÛúŸÖê Æïü … 10. Ûêú¾Ö»Ö ®Öß»Öê/ÛúÖ»Öê ²ÖÖ»Ö ¯¾ÖÖ‡Õ™ü ¯Öê®Ö ÛúÖ Æüß ‡ÃŸÖê´ÖÖ»Ö Ûú¸ëü … 11. ×ÛúÃÖß ³Öß ¯ÖÏÛúÖ¸ü ÛúÖ ÃÖÓÝÖÞÖÛú (Ûîú»ÖÛãú»Öê™ü¸ü) µÖÖ »ÖÖÝÖ ™êü²Ö»Ö †Öפü ÛúÖ ¯ÖϵÖÖêÝÖ ¾ÖÙ•ÖŸÖ Æîü … 12. ÝÖ»ÖŸÖ ˆ¢Ö¸üÖë Ûêú ×»Ö‹ ÛúÖê‡Ô †ÓÛú ÛúÖ™êü ®ÖÆüà •ÖÖ‹ÑÝÖê … [Maximum Marks : 100Time : 1 1 /4 hours] PAPER-II COMPUTER SCIENCE AND APPLICATIONS (To be filled by the Candidate) Signature and Name of Invigilator OMR Sheet No. : ............................................... Roll No. (In words) 1. (Signature) __________________________ (Name) ____________________________ 2. (Signature) __________________________ (Name) ____________________________ Roll No.________________________________ 8 7 (In figures as per admission card) J 1 2 UGC-NET-JUNE-2012-CS-PAPER-II
  • 2. Paper-II 2 J-87-12 1. The postfix expression AB + CD – * can be evaluated using a (A) stack (B) tree (C) queue (D) linked list 2. The post order traversal of a binary tree is DEBFCA. Find out the pre- order traversal. (A) ABFCDE (B) ADBFEC (C) ABDECF (D) None of the above 3. The branch logic that provides making capabilities in the control unit is known as (A) Controlled transfer (B) Conditional transfer (C) Unconditional transfer (D) None of the above 4. The number of colours required to properly colour the vertices of every planer graph is (A) 2 (B) 3 (C) 4 (D) 5 5. Networks that use different technologies can be connected by using (A) Packets (B) Switches (C) Bridges (D) Routers 6. Both hosts and routers are TCP/IP protocol software. However, routers do not use protocol from all layers. The layer for which protocol software is not needed by a router is (A) Layer – 5 (Application) (B) Layer – 1 (Physical) (C) Layer – 3 (Internet) (D) Layer – 2 (Network Interface) 7. In multiuser database if two users wish to update the same record at the same time, they are prevented from doing so by (A) Jamming (B) Password (C) Documentation (D) Record lock 8. A binary search tree is a binary tree : (A) All items in the left subtree are less than root (B) All items in the right subtree are greater than or equal to the root (C) Each subtree is itself a binary search tree (D) All of the above COMPUTER SCIENCE AND APPLICATIONS Paper – II Note : This paper contains fifty (50) objective type questions, each question carrying two (2) marks. Attempt all the questions. ANS ANS ANS ANS ANS ANS ANS ANS
  • 3. J-87-12 3 Paper-II 9. What deletes the entire file except the file structure ? (A) ERASE (B) DELETE (C) ZAP (D) PACK 10. Which command is the fastest among the following ? (A) COPY TO <NEW FILE> (B) COPY STRUCTURE TO <NEW FILE> (C) COPY FILE <FILE 1> <FILE 2> (D) COPY TO MFILE-DAT DELIMITED 11. B+ tree are preferred to binary tree in Database because (A) Disk capacity are greater than memory capacities (B) Disk access is much slower than memory access (C) Disk data transfer rates are much less than memory data transfer rate (D) Disks are more reliable than memory 12. A Transaction Manager is which of the following ? (A) Maintains a log of transactions (B) Maintains before and after database images (C) Maintains appropriate concurrency control (D) All of the above 13. Leaves of which of the following trees are at the same level ? (A) Binary tree (B) B-tree (C) AVL-tree (D) Expression tree 14. Which of the following TCP/IP Internet protocol is diskless machine uses to obtain its IP address from a server ? (A) RAP (B) RIP (C) ARP (D) X.25 15. Decryption and encryption of data are the responsibility of which of the following layer ? (A) Physical layer (B) Data Link layer (C) Presentation layer (D) Session layer 16. In which circuit switching, delivery of data is delayed because data must be stored and retrieved from RAM ? (A) Space division (B) Time division (C) Virtual (D) Packet ANS ANS ANS ANS ANS ANS ANS ANS
  • 4. Paper-II 4 J-87-12 17. In which Routing Method do all the routers have a common database ? (A) Distance vector (B) Link state (C) Link vector (D) Dijkestra method 18. Page Shift Keying (PSK) Method is used to modulate digital signal at 9600 bps using 16 level. Find the line signals and speed (i.e. modulation rate). (A) 2400 bauds (B) 1200 bauds (C) 4800 bauds (D) 9600 bauds 19. The station to hub distance in which it is 2000 metres. (A) 100 Base-Tx (B) 100 Base-Fx (C) 100 Base-T4 (D) 100 Base-T1 20. Main aim of software engineering is to produce (A) program (B) software (C) within budget (D) software within budget in the given schedule 21. Key process areas of CMM level 4 are also classified by a process which is (A) CMM level 2 (B) CMM level 3 (C) CMM level 5 (D) All of the above 22. Validation means (A) are we building the product right (B) are we building the right product (C) verification of fields (D) None of the above 23. If a process is under statistical control, then it is (A) Maintainable (B) Measurable (C) Predictable (D) Verifiable 24. In a function oriented design, we (A) minimize cohesion and maximize coupling (B) maximize cohesion and minimize coupling (C) maximize cohesion and maximize coupling (D) minimize cohesion and minimize coupling 25. Which of the following metric does not depend on the programming language used ? (A) Line of code (B) Function count (C) Member of token (D) All of the above 26. A / B+ tree index is to be built on the name attribute of the relation STUDENT. Assume that all students names are of length 8 bytes, disk block are of size 512 bytes and index pointers are of size 4 bytes. Given this scenario what would be the best choice of the degree (i.e. the number of pointers per node) of the B+ tree ? (A) 16 (B) 42 (C) 43 (D) 44 ANS ANS ANS ANS ANS ANS ANS ANS ANS ANS
  • 5. J-87-12 5 Paper-II 27. The Inorder traversal of the tree will yield a sorted listing of elements of tree in (A) Binary tree (B) Binary search tree (C) Heaps (D) None of the above 28. Mobile IP provides two basic functions. (A) Route discovery and registration (B) Agent discovery and registration (C) IP binding and registration (D) None of the above 29. Pre-emptive scheduling is the strategy of temporarily suspending a gunning process (A) before the CPU time slice expires (B) to allow starving processes to run (C) when it requests I/O (D) to avoid collision 30. In round robin CPU scheduling as time quantum is increased the average turn around time (A) increases (B) decreases (C) remains constant (D) varies irregularly 31. Resources are allocated to the process on non-sharable basis is (A) mutual exclusion (B) hold and wait (C) no pre-emption (D) circular wait 32. Cached and interleaved memories are ways of speeding up memory access between CPU’s and slower RAM. Which memory models are best suited (i.e. improves the performance most) for which programs ? (i) Cached memory is best suited for small loops. (ii) Interleaved memory is best suited for small loops (iii) Interleaved memory is best suited for large sequential code. (iv) Cached memory is best suited for large sequential code. (A) (i) and (ii) are true. (B) (i) and (iii) are true. (C) (iv) and (ii) are true. (D) (iv) and (iii) are true. 33. Consider the following page trace : 4,3, 2, 1, 4, 3, 5, 4, 3, 2, 1, 5 Percentage of page fault that would occur if FIFO page replacement algorithm is used with number of frames for the JOB m = 4 will be (A) 8 (B) 9 (C) 10 (D) 12 34. Check sum used along with each packet computes the sum of the data, where data is treated as a sequence of (A) Integer (B) Character (C) Real numbers (D) Bits ANS ANS ANS ANS ANS ANS ANS ANS
  • 6. Paper-II 6 J-87-12 35. If an integer needs two bytes of storage, then the maximum value of a signed integer is (A) 216 – 1 (B) 215 – 1 (C) 216 (D) 215 36. Which of the following logic families is well suited for high-speed operations ? (A) TTL (B) ECL (C) MOS (D) CMOS 37. Interrupts which are initiated by an instruction are (A) Internal (B) External (C) Hardware (D) Software 38. printf(“%c”, 100); (A) prints 100 (B) prints ASCII equivalent of 100 (C) prints garbage (D) none of the above 39. For the transmission of the signal, Bluetooth wireless technology uses (A) time division multiplexing (B) frequency division multiplexing (C) time division duplex (D) frequency division duplex 40. Consider the following statements : I. Recursive languages are closed under complementation. II. Recursively enumerable languages are closed under union. III. Recursively enumerable languages are closed under complementation. Which of the above statements are true ? (A) I only (B) I and II (C) I and III (D) II and III 41. What is the routing algorithm used by RIP and IGRP ? (A) OSPF (B) Link-state (C) Dynamic (D) Dijkestra vector 42. Identify the incorrect statement : (A) The overall strategy drives the E-Commerce data warehousing strategy. (B) Data warehousing in an E-Commerce environment should be done in a classical manner. (C) E-Commerce opens up an entirely new world of web server. (D) E-Commerce security threats can be grouped into three major categories. ANS ANS ANS ANS ANS ANS ANS ANS
  • 7. J-87-12 7 Paper-II 43. Reliability of software is directly dependent on (A) quality of the design (B) number of errors present (C) software engineers experience (D) user requirement 44. ______ is not an E-Commerce application. (A) House banking (B) Buying stocks (C) Conducting an auction (D) Evaluating an employee 45. ______ is a satellite based tracking system that enables the determination of person’s position. (A) Bluetooth (B) WAP (C) Short Message Service (D) Global Positioning System 46. A complete microcomputer system consists of (A) Microprocessor (B) Memory (C) Peripheral equipment (D) All of the above 47. Where does a computer add and compare data ? (A) Hard disk (B) Floppy disk (C) CPU chip (D) Memory chip 48. Pipelining strategy is called implement (A) instruction execution (B) instruction prefetch (C) instruction decoding (D) instruction manipulation 49. Which of the following data structure is linear type ? (A) Strings (B) Lists (C) Queues (D) All of the above 50. To represent hierarchical relationship between elements, which data structure is suitable ? (A) Dequeue (B) Priority (C) Tree (D) All of the above ANS ANS ANS ANS ANS ANS ANS ANS
  • 8. Space For Rough Work Paper-II 8 J-87-12