2023 2024 Student Forum > Management Forum > Main Forum

 
  #2  
12th August 2014, 03:36 PM
Super Moderator
 
Join Date: Apr 2013
Re: NET Exam Preparation Study Material

Here I am giving you name of some best books for study material for national eligibility test examination for better preparation of below :

UGC University Grants Commission NET/SET for Lectureship Exam Paper I (Compulsory) - As per new syllabus by GKP
UGC NET/JRF/SLET Teaching & Research Aptitude (General Paper-I) by Lal Jain, K. C. Vashistha
UGC NET Digest Teaching and Research Aptitude (General Paper - I) by Dr. M. L. Kamlesh
UGC - JRF & Lectureship Paper I Teaching and Research Aptitude by Dr. M S Ansari
Discrete Mathematical Structures by Baker
Computer System Architecture by M.Morris Mano
Computer Organisation by Karl Hamachar,Zaky
DBMS by Raghu Rama Krishnan
Fundamental Of Databse System by Navathe
Database Concepts by Korth
Intro To Datastructures By Trembley
Fundamentals Of Data structure By A M Padmareddy
Data communication by Forouzan
Unix Programming by R.Stevensons
Theory Of Langauages by Aho Ullman
System Programming by Jhon J Donovan
Software Engineering Concepts by Pressman Or Somerville
Principles Of Compiler Design by Aho Ullman R.Sethi
Operating System Concepts by A.Galvin
Neural Network Fundamentals With Graphs ,Algorithms by N.K.Bose ,P.Liang
Introduction To Algorithms by Coreman
Fundamental Of Algorithms by Sahani & Others
Computer Networks by Leon Garcia,Widja
Computer Graphics C Version by H.Backer
Comipiler Construction by D M Dhamdhere
Finite Automata And Languages by Am Padmareddy

List of Books for UGC NET English
UGC NET/JRF/SLET English (Paper-III)
Author: Dr B B Jain

Trueman's UGC NET National Eligibility Test/SET State Eligibility Test English Literature 01 Edition
Author: B. P. Panigrahi

UGC NET/JRF/SET English Literature (Paper II & III)
Publisher: Upkar Prakashan

UGC-NET/JRF/SLET English (Paper - II) 1st Edition
Author: Surya Pal Yadav

UGC NET/JRF/SET English Literature (Paper - II)
Author: B. B. Jain



  #3  
21st March 2015, 03:33 PM
Unregistered
Guest
 
Re: NET Exam Preparation Study Material

hello sir I am preparing for UGC NET exam. Can you please provide me sample paper of computer science?
  #4  
21st March 2015, 04:00 PM
Super Moderator
 
Join Date: Mar 2013
Re: NET Exam Preparation Study Material

As per your request I am providing you the sample paper of computer science. Hope this will help you in your preparation.

Sample paper of computer science:
1. The rules which govern the formation of valid lexical units in the source program are
(a) Syntax rules
(b) Semantic rules
(c) Lexical rules
(d) Syntehesis phase
Ans.: A

2. Consider the following statement about kernel level thread and user level thread. Which one of the following is false?
(a) Context switch time is longer for kernel level threads than for user level threads
(b) User level threads do not need any hardware support
(c) Related kernel level thread can be scheduled on different processors in multiprocessor system
(d) Blocking one kernel level thread blocks all related thread
Ans.: D

3. Fuzzy Set theory defines fuzzy operators. Choose the fuzzy operators from the following.
(a) AND
(b) OR
(c) NOT
(d) All of the above
Ans.: D

4. There are also other operators, more linguistic in nature, called __________ that can be applied to fuzzy set theory.
(a) Hedges
(b) Lingual Variable
(c) Fuzz Variable
(d) None of the mentioned
Ans.: A

5. What’s the difference between servlets and applets?
(1) Servlets executes on Servers, where as Applets executes on Browser
(2) Servlets have no GUI, where as an Applet has GUI
(3) Servlets creates static web pages, where as Applets creates dynamic web pages
(4) Servlets can handle only a single request, where as Applet can handle multiple requests
(a) 1,2,3 are correct
(b) 1,2 are correct
(c) 1,3 are correct
(d) 1,2,3,4 are correct
Ans.: B

6. AppletViewer tool is available in which of the folder of JDK
(a) Bin
(b) Lib
(c) Source
(d) Class
Ans.: A

7. Which is the method that starts the applet?
(a) Main()
(b) Destroy()
(c) Init()
(d) Reprint()
Ans.: C

Click to buy Trueman's UGC NET Computer Sceince Book
8. Which of the following concepts means adding new concepts to a program as it runs ?
(a) Data hiding
(b) Dynamic loading
(c) Dynamic typing
(d) Dynamic binding
Ans.: B

9. Match the following with respect to programming languages :
List -1 List - II
(A) Structured Language (i) JAVA
(B) Non-structured Language (ii) BASIC
(C) Object Oriented Language (iii) PASCAL
(D) Interpreted Language (iv) FORTRAN
Language Codes :
A B C D
(a) iii iv i ii
(b) iv iii ii i
(c) ii iv i iii
(d) ii iii iv i
Ans.: A

10. Important advantage of using new and delete operators in C++ is
(a) Allocation of memory
(b) Frees the memory previously allocated
(c) Initialization of memory easily
(d) Allocation of memory and frees the memory previously allocated.
Ans.: D

11. Which LAN standard has the highest data rate?
(a) 10Base5
(b) 10Base-T
(c) Twisted Pair Token Ring
(d) FDDI
Ans.: D

12. Which of the following IP Network addresses is a reserved address?
(a) 127.0.0.0
(b) 130.50.0.0
(c) 197.65.10.0
(d) 4.0.0.0
Ans.: A

13. When installing an Ethernet 10BASE-T network, what type of cable is used?
(a) Fiber Optic
(b) Coaxial Cable
(c) Twisted Pair
(d) Wireless
Ans.: C

14. The key requirement/s for a routing function in packet-switching networks is/are:
(a) Efficiency
(b) Correctness, Simplicity and Fairness
(c) Optimality, Robustness and Stability
(d) All of the above
Ans.: A

15. In alternate routing scheme (circuit-switched networks), the responsibility to select the appropriate route for each call rests on the:
(a) End station
(b) Routing station or switch at mid-point
(c) Originating switch
(d) End station and the originating switch
Ans.: B

16. The length of a Hamiltonian path (if exists) in a connected graph of n vertices is
(a) n
(b) n – 1
(c) n + 1
(d) n/2
Ans.: B

17. A graph with n vertices and n – 1 edges that is not a tree, is
(a) Euler
(b) A circuit
(c) Disconnected
(d) Connected.
Ans.: C

18. The midpoint circle drawing algorithm also uses the __of the circle to generate?
(a) two-way symmetry
(b) four-way symmetry
(c) eight-way symmetry
(d) both (a) & (b)
Ans.: C

19. Consider the following two statements:
P: Every regular grammar is LL(1)
Q: Every regular set has a LR(1) grammar
Which of the following is TRUE?
(a) Both P and Q are true
(b) P is true and Q is false
(c) P is false and Q is true
(d) Both P and Q are false
Ans.: C

20. What is the appropriate pairing of items in the two columns listing various activities encountered in a software life cycle?
(P) Requirements capture (1) Module development and integration
(Q) Design (2) Domain analysis
(R) Implementation (3) Structural and behavioural modeling
(S) Maintenance (4) Performance tuning
(a) P-3, Q-2, R-4, S-1 (b) P-2, Q-3, R-1, S-4
(c) P-3, Q-2, R-1, S-4 (d) P-2, Q-3, R-4, S-1
Ans.: B

Another sample paper of computer science:

1. Consider a set A {1, 2, 3, . . . ., 1000}. How many members of A shall be divisible by 3 or by 5 or by both 3 and 5?
A. 533
B. 599
C. 467
D. 66

2. A certain tree has two vertices of degree 4, one vertex of degree 3 and one vertex of degree 2. If the other vertices have degree 1, how many vertices are there in the graph ?
A. 5
B. n-3
C. 20
D. 11

3. Consider the graph given below

The Graph is a ______
A. Complete Graph
B. Bipartite Graph
C. Hamiltonian Graph
D. All of the above

4. A computer program selects an integer in the set {k : 1 < k < 10,00,000} at random and prints out the result. This process is repeated 1 million times. What is the probability that the value k=1 appears in the printout at least once ?
A. 0.5
B. 0.704
C. .632121
D. .68

5. If we define the functions f,g and h that map R into R by :
f(x) = x4, g(x) = sqrt(x2 +1), h(x) = x2 + 72, then the value of the composite function ho(gof) and (hog)of are given as
A. x8 -71 and x8 -71
B. x8 -73 and x8 -73
C. x8 +71 and x8 +71
D. x8 + 73 and x8 +73

6. The BCD adder to add two decimal digits needs minimum of
A. 6 full adders and 2 half adders
B. 5 full adders and 3 half adders
C. 4 full adders and 3 half adders
D. 5 full adders and 2 half adders

7. The Excess-3 decimal code is a self complimenting code because
A. The binary sum of a code and its 9's compliment is equal to 9
B. it is a weighted code
C. Complement can be generated by inverting each bit pattern
D. The binary sum of a code and its 10's compliment is equal to 9

8. How many PUSH and POP operations will be needed to evaluate the following expression by reverse polish notation in a stack machine (A * B) + (C * D/E) ?
A. 4 PUSH and 3 POP instructions
B. 5 PUSH and 4 POP instructions
C. 6 PUSH and 2 POP instructions
D. 5 PUSH and 3 POP instructions

9. The range of represent-able normalized numbers in the floating point binary fractional representation in a 32-bit word with 1-bit sign, 8-bit excess 128 biased exponent and 23-bit mantissa is
A. 2-128 to (1-2-23) x 2 127
B. (1-2-23) x 2 -127 to 2128
C. (1-2-23) x 2 -127 to 223
D. 2-129 to (1-2-23) x 2 127

10. The size of the ROM required to build an 8-bit adder/subtractor with mode control, carry input, carry output and two's complement overflow output is given as
A. 216 x 8
B. 218 x 10
C. 216 x 10
D. 218 x 8


Quick Reply
Your Username: Click here to log in

Message:
Options

Thread Tools Search this Thread



All times are GMT +5. The time now is 05:01 PM.


Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2024, vBulletin Solutions Inc.
SEO by vBSEO 3.6.0 PL2

1 2 3 4