2023 2024 Student Forum > Management Forum > Main Forum

 
  #1  
6th October 2014, 01:39 PM
Unregistered
Guest
 
NET Exam in Computer Applications Previous year Question Papers

I am searching for the NET Exam in Computer Applications Previous year Question Papers? Please tell me from where I can get the NET Exam in Computer Applications Previous year Question Papers?
Similar Threads
Thread
IAS Exam Previous Year Question Papers Pdf
Last year question papers of UGC NET Exam in Computer Science & Applications
Previous Year Papers of SAIL Management Trainee Exam for Computer Science
Last year question papers of UGC NET of Computer Science & Applications
LIC AAO Exam Previous Year Question Papers Pdf
Previous year question papers of UGC NET of Computer Science and Applications
UGC NET Exam in Computer Applications Question Paper
Previous year computer science solved question papers?
SET/NET Computer Science And Applications Exam Question Paper
Computer Science and Applications Exam Question Paper
SET Exam Model Papers for Computer Science and Applications
Previous year question papers of University Grants Commission NET of Computer Science
Previous year question papers of Computer Science Paper II practical of ISC board
Previous year question papers of CBSE class 12th of Computer Science
ARS NET exam previous year question papers
GATE previous year question papers of Computer Science and Information Technology
TNOU B.COM 3rd year Computer Applications Question Paper
Andhra Pradesh PGECET Computer Science previous year question papers in PDF format
Computer Science and Information Technology GATE previous year question papers
ISRO Computer Science (IT) previous year question papers
  #2  
6th October 2014, 01:53 PM
Super Moderator
 
Join Date: Apr 2013
Re: NET Exam in Computer Applications Previous year Question Papers

The National Eligibility Test (NET) to be conducted by University Grants Commission (UGC), New Delhi. The applicant Candidates who have secured at least 55% marks (without rounding off) in Master’s Degree OR equivalent examination from universities/institutions recognised by UGC in Humanities (including languages) and Social Science, Computer Science & Applications, Electronic Science etc. are eligible for this Test.

The list of NET subjects is as follows:



Economics
Political Science
Philosophy
Psychology
Sociology
History
Anthropology
Commerce
Education
Social Work
Defence and Strategic Studies
Home Science
Public Administration
Population Studies
Music
Management
Maithili
Bengali
Hindi
Kannada
Malayalam
Odia
Punjabi
Sanskrit
Tamil
Telugu
Urdu
Arabic
English
Linguistics
Chinese
Dogri
Nepali
Manipuri
Assamese
Gujarati
Marathi
French
Spanish
Russian
Persian
Rajasthani
German
Japanese
Adult Education/ Continuing Education/ Andragogy/ Non Formal Education
Physical Education
Arab Culture and Islamic Studies
Indian Culture
Labour Welfare/Personnel Management/Industrial Relations/ Labour and Social Welfare/Human Resource Management
Law
Library and Information Science
Buddhist, Jaina, Gandhian and Peace Studies
Comparative Study of Religions
Mass Communication and Journalism
Performing Arts – Dance/Drama/Theatre
Museology & Conservation
Archaeology
Criminology
Tribal and Regional Language/Literature
Folk Literature
Comparative Literature
Sanskrit Traditional Subjects (including Jyotisha/Sidhanta Jyotisha/ Navya Vyakarna/ Vyakarna/ Mimamsa/ Navya Nyaya/ Sankhya Yoga/ Tulanatmaka Darsana/ Shukla Yajurveda/ Madhva Vedanta/ Dharma Sastra/ Sahitya/ Purana-itihasa/Agama/Advaita Vedanta)
Women Studies
Visual Arts (including Drawing & Painting/Sculpture/ Graphics/Applied Art/History of Art)
Geography
Social Medicine & Community Health
Forensic Science
Pali
Kashmiri
Konkani
Computer Science and Applications
Electronic Science
Environmental Sciences
International and Area Studies
Prakrit
Human Rights and Duties
Tourism Administration and Management

Bodo
Santali


You are asking for the NET Exam in Computer Applications Previous year Question Papers. This is as follows:

1. When data and acknowledgement are
sent in the same frame, this is called
as
(A) Piggy packing
(B) Piggy backing
(C) Back packing
(D) Good packing

2. Encryption and Decryption is the
responsibility of _______ Layer.
(A) Physical
(B) Network
(C) Application
(D) Datalink


NET Exam in Computer Applications Previous year Question Papers II

1. A file is downloaded in a home
computer using a 56 kbps MODEM
connected to an Internet Service
Provider. If the download of file
completes in 2 minutes, what is the
maximum size of data downloaded ?
(A) 112 Mbits (B) 6.72 Mbits
(C) 67.20 Mbits (D) 672 Mbits
2. In ______ CSMA protocol, after the
station finds the line idle, it sends or
refrains from sending based on the
outcome of a random number generator.
(A) Non-persistent
(B) 0-persistent
(C) 1-persistent
(D) p-persistent
3. Which of the following substitution
technique have the relationship
between a character in the plaintext
and a character in the ciphertext as
one-to-many ?
(A) Monoalphabetic
(B) Polyalphabetic
(C) Transpositional
(D) None of the above
4. What is the maximum length of
CAT-5 UTP cable in Fast Ethernet
network ?
(A) 100 meters (B) 200 meters
(C) 1000 meters (D) 2000 meters
5. The ______ is a set of standards that
defines how a dynamic web document
should be written, how input data
should be supplied to the program, and
how the output result should be used.
(A) Hyper Text Markup Language
(B) File Transfer Protocol
(C) Hyper Text Transfer Protocol
(D) Common Gateway Interface
6. The count-to-infinity problem is
associated with
(A) Flooding algorithm
(B) Hierarchical routing algorithm
(C) Distance vector routing
algorithm
(D) Link state routing algorithm
7. The IEEE single-precision and
double-precision format to represent
floating-point numbers, has a length
of ______ and ______ respectively.
(A) 8 bits and 16 bits
(B) 16 bits and 32 bits
(C) 32 bits and 64 bits
(D) 64 bits and 128 bits
8. Consider an undirected graph G with
100 nodes. The maximum number of
edges to be included in G so that the
graph is not connected is
(A) 2451 (B) 4950
(C) 4851 (D) 9900
9. The amortized time complexity to
perform ______ operation(s) in Splay
trees is O(Ig n).
(A) Search
(B) Search and Insert
(C) Search and Delete
(D) Search, Insert and Delete
10. Suppose that the splits at every level of
Quicksort are in proportion 1-β to β,
where 0 < β ≤ 0.5 is a constant. The
number of elements in an array is n.
The maximum depth is approximately
(A) 0.5 β Ig n
(B) 0.5 (1 – β) Ig n
(C) – (Ig n)/(Ig β)

11. The minimum number of nodes in a
binary tree of depth d (root is at level 0)
is
(A) 2d – 1 (B) 2d + 1 – 1
(C) d + 1 (D) d
12. The efficient data structure to
insert/delete a number in a stored set
of numbers is
(A) Queue
(B) Linked list
(C) Doubly linked list
(D) Binary tree
13. The number of states in a minimal
deterministic finite automaton
corresponding to the language
L = { an | n≥4 } is
(A) 3 (B) 4
(C) 5 (D) 6
14. Regular expression for the language
L = { w ∈ {0, 1}* | w has no pair of
consecutive zeros} is
(A) (1 + 010)*
(B) (01 + 10)*
(C) (1 + 010)* (0 + λ)
(D) (1 + 01)* (0 + λ)
15. Consider the following two
languages :
L1 = {an bl ak | n + l +k>5 }
L2 = {an bl ak |n>5, l >3, k≤ l }
Which of the following is true ?
(A) L1 is regular language and L2 is
not regular language.
(B) Both L1 and L2 are regular
languages.
(C) Both L1 and L2 are not regular
languages.
(D) L1 is not regular language and
L2 is regular language.
16. LL grammar for the language
L = {an bm cn+m | m≥0, n≥0} is
(A) S → aSc | S1 ; S1 → bS1c | λ
(B) S → aSc | S1| λ ; S1 → bS1c
(C) S → aSc | S1| λ ; S1 → bS1c| λ
(D) S → aSc | λ ; S1 → bS1c| λ
17. Assume the statements S1 and S2
given as :
S1 : Given a context free grammar
G, there exists an algorithm for
determining whether L(G) is
infinite.
S2 : There exists an algorithm to
determine whether two context
free grammars generate the
same language.
Which of the following is true ?
(A) S1 is correct and S2 is not
correct.
(B) Both S1 and S2 are correct.
(C) Both S1 and S2 are not correct.
(D) S1 is not correct and S2 is
correct.
18. The number of eight-bit strings
beginning with either 111 or 101 is
______.
(A) 64
(B) 128
(C) 265
(D) None of the above
19. Find the number of ways to paint 12
offices so that 3 of them will be
green, 2 of them pink, 2 of them
yellow and the rest ones white.
(A) 55,440 (B) 1,66,320
(C) 4.790E+08 (D) 39,91,680

20. Consider the following statements :
(i) A graph in which there is a
unique path between every pair
of vertices is a tree.
(ii) A connected graph with e = v – 1
is a tree.
(iii) A graph with e = v – 1 that has
no circuit is a tree.
Which of the above statements is/are
true ?
(A) (i) & (iii)
(B) (ii) & (iii)
(C) (i) & (ii)
(D) All of the above
21. Consider the In-order and Post-order
traversals of a tree as given below :
In-order : j e n k o p b f a c l g m d h i
Post-order : j n o p k e f b c l m g h i d a
The Pre-order traversal of the tree
shall be
(A) a b f e j k n o p c d g l m h i
(B) a b c d e f j k n o p g l m h i
(C) a b e j k n o p f c d g l m h i
(D) j e n o p k f b c l m g h i d a
22. A simple graph G with n-vertices is
connected if the graph has
(A) (n – 1) (n – 2)/2 edges
(B) more than (n – 1) (n – 2)/2
edges
(C) less than (n – 1) (n – 2)/2 edges
(D) ∑k
i=1 C(ni, 2) edges
23. Which one of the following set of
gates is best suited for ‘parity’
checking and ‘parity’ generation ?
(A) AND, OR, NOT
(B) NAND, NOR
(C) EX-OR, EX-NOR
(D) None of the above
24. The quantification ∃!x P(x) denotes
the proposition “There exists a
unique x such that P(x) is true”,
express the quantification using
universal and existential
quantifications and logical operators :
(A) ∃x P(x) ∨ ∀x∀y ((P(x) ∨ P(y))
→ x = y)
(B) ∀ x P(x) ∧ ∀x∀y ((P(x) ∨ P(y))
→ x = y)
(C) ∃x P(x) ∧ ∀x∀y ((P(x) ∧ P(y))
→ x = y)
(D) ∃x P(x) ∧ ∃x∃y ((P(x) ∨ P(y))
→ x = y)
25. If F and G are Boolean functions of
degree n. Then, which of the
following is true ?
(A) F ≤ F + G and F G ≤ F
(B) G ≤ F + G and F G ≥ G
(C) F ≥ F + G and F G ≤ F
(D) G ≥ F + G and F G ≤ F
26. Match the following identities/laws
to their corresponding name :
(a) x + x = x
x • x = x
i. Dominance
(b) x + 0 = x
x • 1 = x
ii. Absorption
(c) x + 1 = 1
x • 0 = 0
iii. Idempotent
(d) x • (x + y) = x iv. Identity
Codes :
(a) (b) (c) (d)
(A) iii iv i ii
(B) iv iii i ii
(C) iv iii ii i
(D) iii iv ii i
27. In which one of the following,
continuous process improvement is
done ?
(A) ISO9001
(B) RMMM
(C) CMM
(D) None of the above

28. The ______ of a program or
computing system is the structure or
structures of the system, which
comprise software components, the
externally visible properties of these
components, and the relationship
among them.
(A) E-R diagram
(B) Data flow diagram
(C) Software architecture
(D) Software design
29. Working software is not available
until late in the process in
(A) Waterfall model
(B) Prototyping model
(C) Incremental model
(D) Evolutionary Development
model
30. Equivalence partitioning is a ______
testing method that divides the input
domain of a program into classes of
data from which test cases can be
derived.
(A) White box (B) Black box
(C) Regression (D) Smoke
31. Consider the following characteristics :
(i) Correct and unambiguous
(ii) Complete and consistent
(iii) Ranked for importance and/or
stability and verifiable
(iv) Modifiable and Traceable
Which of the following is true for a
good SRS ?
(A) (i), (ii) and (iii)
(B) (i), (iii) and (iv)
(C) (ii), (iii) and (iv)
(D) (i), (ii), (iii) and (iv)
32. Linked Lists are not suitable for
_____.
(A) Binary Search
(B) Polynomial Manipulation
(C) Insertion
(D) Radix Sort
33. What is the size of the following
Union ? Assume that the size of
int = 2, size of float = 4, size of
char = 1
union tag {
int a;
float b;
char c;
};
(A) 2 (B) 4
(C) 1 (D) 7
34. What is the output of the following
program segment ?
sum(n)
{
if ( n < 1 ) return n;
else return (n + sum(n–1));
}
main()
{
printf(“%d”, sum(5));
}
(A) 10 (B) 16
(C) 15 (D) 14
35. Assume that x and y are non-zero
positive integers. What does the
following program segment perform ?
while (x!=0)
{
if (x>y)
x = x-y
else
y=y-x;
printf(“%d”,x);
(A) Computes LCM of two
numbers
(B) Computes GCD of two
numbers
(C) Divides large number with
small number
(D) Subtracts smaller number from
large number

36. Consider the following program
segment :
d=0;
for(i=1; i<31, ++i)
for(j=1; j<31, ++j)
for(k=1; k<31, ++k)
if ((i+j+k)%3)= = 0);
d = d + 1;
printf(“%d”, d);
The output will be
(A) 9000 (B) 3000
(C) 90 (D) 2700
37. Usage of Preemption and Transaction
Rollback prevents ______.
(A) Unauthorised usage of data file
(B) Deadlock situation
(C) Data manipulation
(D) File preemption
38. The _____ language was originally
designed as the Transformation
Language for Style Sheet facility.
(A) XSTL (B) XML
(C) XQuery (D) XPath
39. Views are useful for _____ unwanted
information, and for collecting
together information from more than
one relation into a single view.
(A) Hiding
(B) Deleting
(C) Highlighting
(D) All of the above
40. The decision tree classifier is a
widely used technique for ______.
(A) Classification (B) Association
(C) Partition (D) Clustering
41. Cross_tab displays permit users to
view ______ of multidimensional
data at a time.
(A) One dimension
(B) Two dimensions
(C) Three dimensions
(D) Multidimensions
42. A method to provide secure
transmission of email is called ____.
(A) TLS (B) SA
(C) IPSec (D) PGP
43. Thoma’s-write rule is ______.
(A) Two phase locking protocol
(B) Timestamp ordering protocol
(C) One phase locking protocol
(D) Sliding window protocol
44. Match the following :
List – I List - II
Process state
transition
Reason for
transition
a Ready→
Running
i. Request made
by the process
is satisfied or
an event for
which it was
waiting occurs.
b Blocked→
Ready
ii. Process wishes
to wait for
some action by
another
process.
c Running→
Blocked
iii. The process is
dispatched.
d Running→
Ready
iv. The process is
preempted.
Codes :
a b c d
(A) iii i ii iv
(B) iv i iii ii
(C) iv iii i ii
(D) iii iii ii i
45. The hit ratio of a Translation Look
Aside Buffer (TLAB) is 80%. It
takes 20 nanoseconds (ns) to search
TLAB and 100 ns to access main
memory. The effective memory
access time is ______.
(A) 36 ns (B) 140 ns
(C) 122 ns (D) 40 ns

46. Consider the input/output (I/O)
requests made at different instants of
time directed at a hypothetical disk
having 200 tracks as given in the
following table :
Serial
No.
1 2 3 4 5
Track
No.
12 85 40 100 75
Time of
arrival
65 80 110 100 175
Assume that :
Current head position is at track no.
65
Direction of last movement is
towards higher numbered tracks
Current clock time is 160
milliseconds
Head movement time per track is
1 millisecond.
“look” is a variant of “SCAN” diskarm
scheduling algorithm. In this
algorithm, if no more I/O requests
are left in current direction, the disk
head reverses its direction. The seek
times in Shortest Seek First (SSF)
and “look” disk-arm scheduling
algorithms respectively are :
(A) 144 and 123 milliseconds
(B) 143 and 123 milliseconds
(C) 149 and 124 milliseconds
(D) 256 and 186 milliseconds
47. Assume that an implementation of
Unix operating system uses i-nodes
to keep track of data blocks allocated
to a file. It supports 12 direct block
addresses, one indirect block address
and one double indirect block
address. The file system has 256
bytes block size and 2 bytes for disk
block address. The maximum
possible size of a file in this system is
(A) 16 MB (B) 16 KB
(C) 70 KB (D) 71 KB
48. Which of the following set of Unix
commands will always display
“WELCOME” ?
(A) export title=WELCOME; Echo
$title
(B) title = WELCOME; export $
title ; sh –c “echo $title”
(C) title = WELCOME; export title ;
sh –c “echo $title”
(D) title = WELCOME; echo $title
49. What type of logic circuit is
represented by the figure shown
below ?
(A) XOR (B) XNOR
(C) XAND (D) XNAND
50. The speed up of a pipeline processing
over an equivalent non-pipeline
processing is defined by the ratio :
(A) S =
n tn
(k + n – 1)tp
(B) S =
n tn
(k + n + 1)tp
(C) S =
n tn
(k – n + 1)tp
(D) S =
(k + n – 1)tp
n tn
Where n → no. of tasks
tn
→ time of completion of
each task
k → no. of segments of
pipeline
tp
→ clock cycle time
S → speed up ratio
  #3  
16th May 2015, 01:55 PM
Unregistered
Guest
 
Re: NET Exam in Computer Applications Previous year Question Papers

I should get question papers of UGC NET Computer Applications Examination. So any one provides me previous years question papers of UGC NET Computer Applications?
  #4  
16th May 2015, 02:00 PM
Super Moderator
 
Join Date: Apr 2013
Re: NET Exam in Computer Applications Previous year Question Papers

Here you should get previous years question papers of UGC NET Computer Applications Exam, so I am giving following question papers:

UGC NET Computer Applications Question Paper II
1. The postfix expression AB + CD – *
can be evaluated using a
(A) stack
(B) tree
(C) queue
(D) linked list
2. The post order traversal of a binary
tree is DEBFCA. Find out the preorder
traversal.
(A) ABFCDE
(B) ADBFEC
(C) ABDECF
(D) None of the above
3. The branch logic that provides making
capabilities in the control unit is known
as
(A) Controlled transfer
(B) Conditional transfer
(C) Unconditional transfer
(D) None of the above
4. The number of colours required to
properly colour the vertices of every
planer graph is
(A) 2
(B) 3
(C) 4
(D) 5
5. Networks that use different
technologies can be connected by
using
(A) Packets
(B) Switches
(C) Bridges
(D) Routers
6. Both hosts and routers are TCP/IP
protocol software. However, routers do
not use protocol from all layers. The
layer for which protocol software is not
needed by a router is
(A) Layer – 5 (Application)
(B) Layer – 1 (Physical)
(C) Layer – 3 (Internet)
(D) Layer – 2 (Network Interface)
7. In multiuser database if two users wish
to update the same record at the same
time, they are prevented from doing so
by
(A) Jamming
(B) Password
(C) Documentation
(D) Record lock
8. A binary search tree is a binary tree :
(A) All items in the left subtree are
less than root
(B) All items in the right subtree are
greater than or equal to the root
(C) Each subtree is itself a binary
search tree
(D) All of the above
COMPUTER SCIENCE AND APPLICATIONS
Paper – II
marks. Attempt all the questions.
9. What deletes the entire file except the
file structure ?
(A) ERASE
(B) DELETE
(C) ZAP
(D) PACK
10. Which command is the fastest among
the following ?
(A) COPY TO <NEW FILE>
(B) COPY STRUCTURE TO <NEW
FILE>
(C) COPY FILE <FILE 1> <FILE 2>
(D) COPY TO MFILE-DAT
DELIMITED
11. B+ tree are preferred to binary tree in
Database because
(A) Disk capacity are greater than
memory capacities
(B) Disk access is much slower than
memory access
(C) Disk data transfer rates are much
less than memory data transfer
rate
(D) Disks are more reliable than
memory
12. A Transaction Manager is which of the
following ?
(A) Maintains a log of transactions
(B) Maintains before and after
database images
(C) Maintains appropriate concurrency
control
(D) All of the above
13. Leaves of which of the following trees
are at the same level ?
(A) Binary tree
(B) B-tree
(C) AVL-tree
(D) Expression tree
14. Which of the following TCP/IP
Internet protocol is diskless machine
uses to obtain its IP address from a
server ?
(A) RAP
(B) RIP
(C) ARP
(D) X.25
15. Decryption and encryption of data are
the responsibility of which of the
following layer ?
(A) Physical layer
(B) Data Link layer
(C) Presentation layer
(D) Session layer
16. In which circuit switching, delivery of
data is delayed because data must be
stored and retrieved from RAM ?
(A) Space division
(B) Time division
(C) Virtual
(D) Packet
17. In which Routing Method do all the
routers have a common database ?
(A) Distance vector
(B) Link state
(C) Link vector
(D) Dijkestra method
18. Page Shift Keying (PSK) Method is
used to modulate digital signal at
9600 bps using 16 level. Find the line
signals and speed (i.e. modulation
rate).
(A) 2400 bauds (B) 1200 bauds
(C) 4800 bauds (D) 9600 bauds
19. The station to hub distance in which it
is 2000 metres.
(A) 100 Base-Tx
(B) 100 Base-Fx
(C) 100 Base-T4
(D) 100 Base-T1
20. Main aim of software engineering is to
produce
(A) program
(B) software
(C) within budget
(D) software within budget in the
given schedule
21. Key process areas of CMM level 4 are
also classified by a process which is
(A) CMM level 2
(B) CMM level 3
(C) CMM level 5
(D) All of the above
22. Validation means
(A) are we building the product right
(B) are we building the right product
(C) verification of fields
(D) None of the above
23. If a process is under statistical control,
then it is
(A) Maintainable
(B) Measurable
(C) Predictable
(D) Verifiable
24. In a function oriented design, we
(A) minimize cohesion and maximize
coupling
(B) maximize cohesion and minimize
coupling
(C) maximize cohesion and
maximize coupling
(D) minimize cohesion and minimize
coupling
25. Which of the following metric does not
depend on the programming language
used ?
(A) Line of code
(B) Function count
(C) Member of token
(D) All of the above
26. A / B+ tree index is to be built on the
name attribute of the relation
STUDENT. Assume that all students
names are of length 8 bytes, disk block
are of size 512 bytes and index
pointers are of size 4 bytes. Given this
scenario what would be the best choice
of the degree (i.e. the number of
pointers per node) of the B+ tree ?
(A) 16 (B) 42
(C) 43 (D) 44
27. The Inorder traversal of the tree will
yield a sorted listing of elements of
tree in
(A) Binary tree
(B) Binary search tree
(C) Heaps
(D) None of the above
28. Mobile IP provides two basic
functions.
(A) Route discovery and registration
(B) Agent discovery and registration
(C) IP binding and registration
(D) None of the above
29. Pre-emptive scheduling is the strategy
of temporarily suspending a gunning
process
(A) before the CPU time slice expires
(B) to allow starving processes to run
(C) when it requests I/O
(D) to avoid collision
30. In round robin CPU scheduling as time
quantum is increased the average turn
around time
(A) increases
(B) decreases
(C) remains constant
(D) varies irregularly
31. Resources are allocated to the process
on non-sharable basis is
(A) mutual exclusion
(B) hold and wait
(C) no pre-emption
(D) circular wait
32. Cached and interleaved memories are
ways of speeding up memory access
between CPU’s and slower RAM.
Which memory models are best suited
(i.e. improves the performance most)
for which programs ?
(i) Cached memory is best suited for
small loops.
(ii) Interleaved memory is best
suited for small loops
(iii) Interleaved memory is best
suited for large sequential code.
(iv) Cached memory is best suited for
large sequential code.
(A) (i) and (ii) are true.
(B) (i) and (iii) are true.
(C) (iv) and (ii) are true.
(D) (iv) and (iii) are true.
33. Consider the following page trace :
4,3, 2, 1, 4, 3, 5, 4, 3, 2, 1, 5
Percentage of page fault that would
occur if FIFO page replacement
algorithm is used with number of
frames for the JOB m = 4 will be
(A) 8
(B) 9
(C) 10
(D) 12
34. Check sum used along with each
packet computes the sum of the data,
where data is treated as a sequence of
(A) Integer
(B) Character
(C) Real numbers
(D) Bits
35. If an integer needs two bytes of
storage, then the maximum value of a
signed integer is
(A) 216 – 1
(B) 215 – 1
(C) 216
(D) 215
36. Which of the following logic families
is well suited for high-speed operations ?
(A) TTL
(B) ECL
(C) MOS
(D) CMOS
37. Interrupts which are initiated by an
instruction are
(A) Internal
(B) External
(C) Hardware
(D) Software
38. printf(“%c”, 100);
(A) prints 100
(B) prints ASCII equivalent of 100
(C) prints garbage
(D) none of the above
39. For the transmission of the signal,
Bluetooth wireless technology uses
(A) time division multiplexing
(B) frequency division multiplexing
(C) time division duplex
(D) frequency division duplex
40. Consider the following statements :
I. Recursive languages are closed
under complementation.
II. Recursively enumerable languages
are closed under union.
III. Recursively enumerable languages
are closed under complementation.
Which of the above statements are true ?
(A) I only
(B) I and II
(C) I and III
(D) II and III
41. What is the routing algorithm used by
RIP and IGRP ?
(A) OSPF
(B) Link-state
(C) Dynamic
(D) Dijkestra vector
42. Identify the incorrect statement :
(A) The overall strategy drives the
E-Commerce data warehousing
strategy.
(B) Data warehousing in an
E-Commerce environment should
be done in a classical manner.
(C) E-Commerce opens up an
entirely new world of web
server.
(D) E-Commerce security threats can
be grouped into three major
categories.
43. Reliability of software is directly
dependent on
(A) quality of the design
(B) number of errors present
(C) software engineers experience
(D) user requirement
44. ______ is not an E-Commerce
application.
(A) House banking
(B) Buying stocks
(C) Conducting an auction
(D) Evaluating an employee
45. ______ is a satellite based tracking
system that enables the determination
of person’s position.
(A) Bluetooth
(B) WAP
(C) Short Message Service
(D) Global Positioning System
46. A complete microcomputer system
consists of
(A) Microprocessor
(B) Memory
(C) Peripheral equipment
(D) All of the above
47. Where does a computer add and
compare data ?
(A) Hard disk
(B) Floppy disk
(C) CPU chip
(D) Memory chip
48. Pipelining strategy is called implement
(A) instruction execution
(B) instruction prefetch
(C) instruction decoding
(D) instruction manipulation
49. Which of the following data structure
is linear type ?
(A) Strings
(B) Lists
(C) Queues
(D) All of the above
50. To represent hierarchical relationship
between elements, which data structure
is suitable ?
(A) Dequeue
(B) Priority
(C) Tree
(D) All of the above
more paper detail to attached pdf file;
Attached Files
File Type: pdf NET Exam in Computer Applications.pdf (107.6 KB, 68 views)


Quick Reply
Your Username: Click here to log in

Message:
Options




All times are GMT +5. The time now is 06:39 AM.


Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2024, vBulletin Solutions Inc.
SEO by vBSEO 3.6.0 PL2

1 2 3 4