0

Computer Applications

Description: This test covers topics important for UGC NET exam in computer science and applications
Number of Questions: 17
Created by:
Tags: UGC NET Computer Science Computer Graphics Discrete Structures Compiler Design Current Trends and Technologies Computer Arithmetic Digital Systems and Microprocessors Relational Database Design and SQL Computer Networks Operating Systems with Case Study of Unix
Attempted 0/17 Correct 0 Score 0

Which of these is a technique that simulates continuous tone imagery through the use of dots, varying either in size, shape or spacing?

  1. Dither

  2. Halftone

  3. Convolution

  4. Edge Detection

  5. Color grading


Correct Option: B
Explanation:

Halftone is the reprographic technique that simulates continuous tone imagery through the use of dots, varying either in size, shape or spacing.

Which of the following operations is done by a macro processor?

  1. Breaks source program instructions into parts

  2. Textual search-and-replace

  3. Checks if all necessary input has been provided

  4. Combines object modules

  5. Copies programs from a storage device to main memory


Correct Option: B
Explanation:

Languages such as C and assembly language have rudimentary macro systems, implemented as preprocessors to the compiler or assembler. C preprocessor macros work by simple textual search-and-replace at the token, rather than the character, level.

Which of the following statements is false?

  1. An Euler path is a path that uses every edge of a graph exactly once.

  2. An Euler circuit is a circuit that uses every edge of a graphexactly once.

  3. An Euler path has exactly two odd vertices.

  4. If a graph G has an Euler circuit, then all of its vertices must be odd vertices.

  5. If a graph G has an Euler circuit, then all of its vertices must be even vertices.


Correct Option: D
Explanation:

This statement is false. If a graph G has an Euler circuit, then all of its vertices must be even vertices. In Eulerian path, each time we visit a vertex v, we walk through two unvisited edges with one end point as v. Therefore, all middle vertices in Eulerian Path must have even degree. For Eulerian Cycle, any vertex can be middle vertex, therefore all vertices must have even degree.

Shadow mask technology is used in the manufacturing of which device?

  1. LCD

  2. CRT

  3. Light Pen

  4. Plotter

  5. Plasma Display


Correct Option: B
Explanation:

The shadow mask is one of the technologies used to manufacture cathode ray tube (CRT) televisions and computer displays that produce color images

Which of the following statements is incorrect regarding pipelining?

  1. Multiple instructions are overlapped in execution.

  2. The time required for the slowest pipe stage determines the length of the machine cycle.

  3. Pipelining does not have any effect on instruction throughput.

  4. A pipelined processor may deal with hazards by stalling.

  5. Parallel processing and pipelining techniques are duals each other.


Correct Option: C
Explanation:

An instruction pipeline is a technique used in the design of computers to increase their instruction throughput (the number of instructions that can be executed in a unit of time). Pipelining does not reduce the time to complete an instruction, but increases instruction throughput by performing multiple operations in parallel.

What is the structure of a data base called?

  1. Data Dictionary

  2. Schema

  3. Table

  4. DBMS

  5. Database Abstraction Layer


Correct Option: B
Explanation:

Schema is the structure of a database system, described in a formal language supported by the database management system (DBMS). In a relational database, the schema defines the tables, the fields in each table, and the relationships between fields and tables.

The IP address 224.113.112.14 belongs to which class?

  1. Class A

  2. Class B

  3. Class C

  4. Class D

  5. Class E


Correct Option: D
Explanation:

The range of Class D addresses is from 224.0.0.0 - 239.255.255.255. Hence, this address belongs to this class.

What is the data unit at the presentation layer of the TCP/IP protocol suite called?

  1. Message

  2. Segment

  3. Datagram

  4. Frame

  5. Jumbogram


Correct Option: A
Explanation:

The data unit created at the application layer is called a message.

Which of the following is the distributive law used in boolean algebra?

  1. (A + B) + C = A + (B + C)

  2. A(B + C) = AB + AC

  3. A + AB = A

  4. A + B = B + A

  5. (a) A + A = A


Correct Option: B
Explanation:

This is the distributive law.

Which algorithm associates with each process the length of the process's next CPU burst?

  1. LRU Page replacement

  2. Round-robin (RR) scheduling

  3. Multilevel Queue Scheduling

  4. SJF

  5. FCFS


Correct Option: D
Explanation:

A different approach to CPU scheduling is the shortest-job-first (SJF) scheduling algorithm. This algorithm associates with each process the length of the process's next CPU burst. The real difficulty with the SJF algorithm is knowing the length of the next CPU request. For long-term (job) scheduling in a batch system, we can use as the length the process time limit that a user specifies when he submits the job.

Which of these is the Redundance Law used in boolean algebra?

  1. (A + B) + C = A + (B + C)

  2. A + A = A

  3. A + B = B + A

  4. A + A B = A

  5. A (B + C) = A B + A C


Correct Option: D
Explanation:

This is the Redundance Law in boolean algebra : (a) A + A B = A (b) A (A + B) = A

Which of these is a deadlock avoidance strategy?

  1. Bakery Algorithm

  2. Banker's Algorithm

  3. Belady's Anomaly

  4. Demand Paging

  5. Resource-Allocation graph


Correct Option: B
Explanation:

The Banker's algorithm is a resource allocation and deadlock avoidance algorithm developed by Edsger Dijkstra that tests for safety by simulating the allocation of pre-determined maximum possible amounts of all resources, and then makes a safe-state check to test for possible deadlock conditions for all other pending activities, before deciding whether allocation should be allowed to continue.

What does the 'Z' state of a 3-state buffer represent?

  1. Logic “0″

  2. Logic “1″

  3. High Impedance

  4. High Voltage

  5. High Current


Correct Option: C
Explanation:

Tri-state buffers, also known as 3-state buffers, are combinatorial elements that in addition to providing the two standard logic “0″ and logic “1″ states, can be made to provide a high impedance third state. This third state occurs when the gates output is effectively switched “OFF” or disconnected. This third state is often referred to as an “High-impedance”, “hi-Z“, or just “Z” state.

Which of these binary numbers is same as its 2's compliment?

  1. 11111110

  2. 11111111

  3. 10000000

  4. 10101001

  5. 10101010


Correct Option: C
Explanation:

The 1's complement of 10000000 is 01111111, adding 1 to it, gives 10000000 as its 2's complement. This is the same as the given number.

Which of these techniques used in database transactions is also called UNDO/REDO technique?

  1. Deferred update

  2. Immediate update

  3. Rollback

  4. Commit

  5. Phantom reads


Correct Option: B
Explanation:

Immediate update also called UNDO/REDO, is also another technique used to recover/support transaction failures that occur due to operating system, power, memory or machine failures. When a transaction runs, any of the updates or alterations made by the transaction are written directly in to the database.

Which of these statements is not true regarding data mining?

  1. Market basket analysis is used to discover interesting associations between attribute.

  2. Decision Trees are often used to find appropriate groupings of elements.

  3. Data mining extracts knowledge hidden from large volumes of raw data.

  4. Data mining discovers implicit patterns in the given data.

  5. Predictive models use data with known results.


Correct Option: B
Explanation:

Clustering is often used to find appropriate groupings of elements for a set of data. Unlike decision trees we discuss above, clustering is a kind of undirected knowledge discovery or unsupervised learning; that is, there is no target field, and the relationship among the data is identified by bottom-up approach.

Which of these properties do not characterize a data warehouse?

  1. Subject Oriented

  2. Integrated

  3. Nonvolatile

  4. Time Invariant

  5. Ad hoc queries


Correct Option: D
Explanation:

In order to discover trends in business, analysts need large amounts of data. A data warehouse is time variant. A data warehouse's focus on change over time is what is meant by the term time variant.

- Hide questions