0

Computer Science (UGC/NET)

Description: This paper consists of the questions important for NET-Computer Science paper II and III.
Number of Questions: 15
Created by:
Tags: NET-Computer Science UGC Programming in C and C++ Data Structures and Algorithms Computer Networks Current Trends and Technologies Layers-Transport, Network and Application
Attempted 0/15 Correct 0 Score 0

Which of the following problems is not considered to be in NP-complete?

  1. dominating set problem

  2. vertex cover decision problem

  3. Hamiltonian path problem

  4. subset sum problem

  5. graph isomorphism


Correct Option: E
Explanation:

The graph isomorphism problem is suspected to be neither in P nor NP-complete, though it is in NP. This is an example of a problem that is thought to be hard, but is not thought to be NP-complete.

Which of these is a schema which allows groups of people to describe social networks without the need for a centralised database?

  1. GFO

  2. BFO

  3. Swoogle

  4. FOAF

  5. Dublin Core


Correct Option: D
Explanation:

FOAF (an acronym of Friend of a friend) is a machine-readable ontology describing persons, their activities and their relations to other people and objects. Anyone can use FOAF to describe him- or herself. FOAF allows groups of people to describe social networks without the need for a centralised database.

Which of these may be programmed as an assertion?

  1. foreach loop

  2. while loop

  3. loop variant

  4. recursion

  5. loop invariant


Correct Option: E
Explanation:

In computer science, a loop is a programming language statement that allows code to be repeatedly executed; an invariant of a loop is a property that holds before (and after) each repetition. It is a logical assertion, sometimes programmed as an assertion. Knowing its invariant(s) is essential for understanding the effect of a loop.

Which of the following sorting techniques is the most efficient for small, almost sorted data sets?

  1. selection sort

  2. bubble sort

  3. insertion sort

  4. merge sort

  5. heap sort


Correct Option: C
Explanation:

Insertion sort provides several advantages such as simple implementation, efficient for (quite) small data sets, more efficient in practice than most other simple quadratic (i.e., O(n2)) algorithms such as selection sort or bubble sort, adaptive, i.e., efficient for data sets that are already substantially sorted: the time complexity is O(nk) when each element in the input is no more than k places away from its sorted position, stable; i.e. does not change the relative order of elements with equal keys, in-place; i.e., only requires a constant amount O(1) of additional memory space,online; i.e., can sort a list as it receives it.

Which of the following tree data structures has the property that recently accessed elements are quick to access again?

  1. link/cut tree

  2. AVL tree

  3. T-tree

  4. splay tree

  5. finger tree


Correct Option: D
Explanation:

A splay tree is a self-adjusting binary search tree with the additional property that recently accessed elements are quick to access again. It performs basic operations such as insertion, look-up and removal in O(log n) amortized time.

Which of the following is a protocol for starting a computer and booting from server through a network?

  1. RIPL

  2. TCP

  3. ARP

  4. RTSP

  5. RSVP


Correct Option: A
Explanation:

Remote Initial Program Load (RIPL or RPL) is a protocol for starting a computer and loading its operating system from server via a network. Such a server runs a network operating system such as LAN Manager, LAN Server, Windows NT Server, Novell NetWare, Solaris or Linux.

Which of the following statements is not true in context of red-black tree?

  1. A red–black tree is used to organize pieces of comparable data.

  2. All leaves (NIL) are black.

  3. Pre-order traversal of a red-black tree gives data in sorted order.

  4. Every red node must have two black child nodes.

  5. Red–black trees are particularly valuable in functional programming.


Correct Option: C
Explanation:

Red–black trees, like all binary search trees, allow efficient in-order traversal (that is: in the order Left–Root–Right) of their elements. The search-time results from the traversal from root to leaf, and therefore a balanced tree of n nodes, having the least possible tree height, results in O(log n) search time.

Which of the following is one of the most widely used method of conceptual analysis and knowledge representation?

  1. reification

  2. interpretation

  3. name binding

  4. modularization

  5. coupling


Correct Option: A
Explanation:

Reification is the process by which an abstract idea about a computer program is turned into an explicit data model or other object created in a programming language. A computable/addressable object — a resource — is created in a system as a proxy for a non computable/addressable object. By means of reification, something that was previously implicit, unexpressed, and possibly inexpressible is explicitly formulated and made available to conceptual (logical or computational) manipulation. Informally, reification is often referred to as making something a first-class citizen within the scope of a particular system. Some aspect of a system can be reified at language design time, which is related to reflection in programming languages. It can be applied as a stepwise refinement at system design time. Reification is one of the most frequently used techniques of conceptual analysis and knowledge representation.

Which of these is a protocol used to automatically assign an IP address to network devices?

  1. POP

  2. BGP

  3. BOOTP

  4. RIP

  5. DNS


Correct Option: C
Explanation:

The Bootstrap Protocol (BOOTP) is a computer networking protocol used in Internet Protocol networks to automatically assign an IP address to network devices from a configuration server.

In which of the following network types,nodes are classified as DNS-like domain names?

  1. clustered file system

  2. client–server networks

  3. structured peer-to-peer networks

  4. unstructured peer-to-peer networks

  5. semantic P2P networks


Correct Option: E
Explanation:

Semantic P2P networks are a new type of P2P network. It combines the advantages of unstructured P2P networks and structural P2P networks and avoids their disadvantages.In semantic P2P networks, nodes are classified as DNS-like domain names with semantic meanings such as Alice @Brittney.popular.music. Semantic P2P networks contains prerequisite virtual tree topology and net-like topology formed by cached nodes.

What contents does a factless fact table contain?

  1. numeric facts

  2. textual facts

  3. pseudo-factsSX

  4. dimesional keys

  5. E-R diagram


Correct Option: D
Explanation:

A factless fact table is fact table that does not contain fact.They contain only dimesional keys and it captures events that happen only at information level but not included in the calculations level.just an information about an event that happen over a period.

Which of the following is a resource retrieval mechanism to obtain a copy of the resource identified?

  1. unicode

  2. XML schema

  3. linked data

  4. dereferenceable URI

  5. DNS(Domain Name System)


Correct Option: D
Explanation:

A dereferenceable Uniform Resource Identifier or dereferenceable URI is a resource retrieval mechanism that uses any of the internet protocols (e.g. HTTP) to obtain a copy or representation of the resource it identifies.

ARQ protocols reside in which of the following layer of the OSI model?

  1. network layer

  2. transport Layer

  3. presentation layer

  4. application layer

  5. physical layer


Correct Option: B
Explanation:

Automatic Repeat reQuest (ARQ), also known as Automatic Repeat Query, is an error-control method for data transmission that uses acknowledgements (messages sent by the receiver indicating that it has correctly received a data frame or packet) and timeouts (specified periods of time allowed to elapse before an acknowledgment is to be received) to achieve reliable data transmission over an unreliable service. If the sender does not receive an acknowledgment before the timeout, it usually re-transmits the frame/packet until the sender receives an acknowledgment or exceeds a predefined number of re-transmissions.ARQ protocols reside in the Data Link or Transport Layers of the OSI model.

IEEE 1394 corresponds to which of the following?

  1. parallel port

  2. POSIX

  3. futurebus

  4. firewire

  5. LAN


Correct Option: D
Explanation:

IEEE 1394 is an interface standard for a serial bus for high-speed communications and isochronous real-time data transfer. It was developed in the late 1980s and early 1990s by Apple, that called it FireWire.

Which of these refers to the data stored in a data structure and which is not part of the structure of the data structure?

  1. satellite data

  2. pointer

  3. control tables

  4. lookup table

  5. hooks


Correct Option: A
Explanation:

Satellite data refers to any payload data which you want to store in your data structure and which is not part of the structure of the data structure. It can be anything you want. It can be a single value, a large collection of values or a pointer to some other location that holds the value.

- Hide questions