NET Exam Computer Science Question Papers - 2018-2019 StudyChaCha

Go Back   2018-2019 StudyChaCha > StudyChaCha Discussion Forum > General Topics

Old May 7th, 2014, 06:55 PM
Posts: n/a
Default NET Exam Computer Science Question Papers

Will you please share the previous year question paper of NET Exam Computer Science Paper II???
Reply With Quote
Old May 9th, 2014, 10:56 AM
Super Moderator
Join Date: Dec 2011
Posts: 21,910
Default Re: NET Exam Computer Science Question Papers

As per your request here I am sharing the previous year question paper of NET Exam Computer Science Paper II

1. The postfix expression AB + CD – * can be evaluated using a
(A) stack
(B) tree
(C) queue
(D) linked list

2. The post order traversal of a binary tree is DEBFCA. Find out the preorder traversal.
(D) None of the above

3. The branch logic that provides making capabilities in the control unit is known
(A) Controlled transfer
(B) Conditional transfer
(C) Unconditional transfer
(D) None of the above

4. The number of colours required to properly colour the vertices of every planer graph is
(A) 2
(B) 3
(C) 4
(D) 5

5. Networks that use different technologies can be connected by using
(A) Packets
(B) Switches
(C) Bridges
(D) Routers

6. Both hosts and routers are TCP/IP protocol software. However, routers do
not use protocol from all layers. The layer for which protocol software is not
needed by a router is
(A) Layer – 5 (Application)
(B) Layer – 1 (Physical)
(C) Layer – 3 (Internet)
(D) Layer – 2 (Network Interface)

7. In multiuser database if two users wish to update the same record at the same
time, they are prevented from doing so by
(A) Jamming
(B) Password
(C) Documentation
(D) Record lock

8. A binary search tree is a binary tree :
(A) All items in the left subtree are less than root
(B) All items in the right subtree are greater than or equal to the root
(C) Each subtree is itself a binary search tree
(D) All of the above

Answered By StudyChaCha Member
Reply With Quote
Sponsored Links

Old October 7th, 2015, 04:33 PM
Posts: n/a
Default Re: NET Exam Computer Science Question Papers

Hello sir would you please give me UGC NET (National Eligibility Test) Computer Science Question Papers? Bcoz I am doing preparation for this exam…
Reply With Quote
Old October 7th, 2015, 04:34 PM
Super Moderator
Join Date: Dec 2011
Posts: 14,245
Default Re: NET Exam Computer Science Question Papers

Here I am giving you UGC NET (National Eligibility Test) Computer Science Question Papers, please have a look…..

1. Which of the following data structure is Non-linear type?
(A) Strings (B) Lists
(C) Stacks (D) None of the above
Answer: D
2. The total number of comparisons in a bubble sort is
(A) 0(log n)
(B) 0(n log n)
(C) 0(n)
(D) None of the above
Answer: B
3. Which of the following is a bad example of recursion?
(A) Factorial (B) Fibonacci numbers
(C) Tower of Hanai (D) Tree traversal
Answer: B
4. Domain and Range of the function
Y = –√(–2x + 3) is
(A) x≥3/2, y≥0 (B) x>3/2, y≤0
(C) x≥3/2, y≤0 (D) x≤3/2, y≤0
Answer: D
5. Maximum number of edges in a n-Node undirected graph without self loop is
(A) n2 (B) n(n – 1)
(C) n(n + 1) (D) n(n – 1)/2
Answer: D
6. A hash table has space for 75 records, then the probability of collision before the table is 6% full.
(A) .25 (B) .20
(C) .35 (D) .30
Answer: B
On .75th insertion probability of collision = 1/75
On 1.5th insertion probability of collision = 2/75
On 2.25th insertion probability of collision = 3/75
On 3th insertion probability of collision = 4/75
On 3.75th insertion probability of collision = 5/75
So the required probability is 1+2+3+4+5/75 = .20
7. BCC in the internet refers to
(A) Black carbon copy (B) Blind carbon copy
(C) Blank carbon copy (D) Beautiful carbon copy
Answer: B
8. Hub is a term used with
(A) A Star Networks (B) A Ring Networks
(C) A Router (D) A Bridge
Answer: A
9. The amount of uncertainty in a system of symbol is called
(A) Bandwidth (B) Entropy
(C) Loss (D) Quantum
Answer: B
10. Which of the following network access standard disassembler is used for connection station to a packet switched network?
(A) X.3 (B) X.21
(C) X.25 (D) X.75
Answer: C
11. A station in a network in a network forward incoming packets by placing them on its shortest output queue. What routing algorithm is being used?
(A) Hot potato routing (B) Flooding
(C) Static routing (D) Delta routing
Answer: A
12. Start and stop bits are used in serial communications for
(A) Error detection (B) Error correction
(C) Synchronization (D) Slowing down the communication
Answer: C
13. For a data entry project for office staff who have never used computers before (user interface and user-friendliness are extremely important), one will use
(A) Spiral model (B) Component based model
(C) Prototyping (D) Waterfall model
Answer: C
14. An SRS
(A) establishes the basis for agreement between client and the supplier.
(B) provides a reference for validation of the final product.
(C) is a prerequisite to high quality software.
(D) all of the above.
Answer: D
15. McCabe’s cyclomatic metric V(G) of a graph G with n vertices, e edges and p connected component is
(A) e
(B) n
(C) e – n + p
(D) e – n + 2p
Answer: C
16. Emergency fixes known as patches are result of
(A) adaptive maintenance
(B) perfective maintenance
(C) corrective maintenance
(D) none of the above
Answer: C
17. Design recovery from source code is done during
(A) reverse engineering (B) re-engineering
(C) reuse (D) all of the above
Answer: D
18. Following is used to demonstrate that the new release of software still performs the old one did by rerunning the old tests :
(A) Functional testing (B) Path testing
(C) Stress testing (D) Regression testing
Answer: D
19. The post order traversal of a binary tree is DEBFCA. Find out the preorder traversal.
Answer: C
20. B + tree are preferred to binary tree in database because
(A) Disk capacities are greater than memory capacities
(B) Disk access much slower than memory access
(C) Disk data transfer rates are much less than memory data transfer rate
(D) Disk are more reliable than memory
Answer: B
21. What deletes the entire file except the file structure?
Answer: C
22. Which command classes text file, which has been created using “SET ALTERNATIVE” “Command” ?
Answer: A
23. Data security threats include
(A) privacy invasion
(B) hardware failure
(C) fraudulent manipulation of data
(D) encryption and decryption
Answer: C
24. Which of the following statements is true, when structure of database file with 20 records is modified?
(A) ? EOF ( ) Prints T
(B) ? BOF ( ) Prints F
(C) ? BOF ( ) Prints T
(D) ? EOF ( ) Prints F
Answer: A
25. The SQL Expression
Select distinct T. branch name from branch T, branch S where T. assets > S. assets and S. branch-city = DELHI, finds the name of
(A) all branches that have greater asset than any branch located in DELHI.
(B) all branches that have greater assets than allocated in DELHI.
(C) the branch that has the greatest asset in DELHI.
(D) any branch that has greater asset than any branch located in DELHI.
Answer: A
26. Dijkestra banking algorithm in an operating system, solves the problem of
(A) deadlock avoidance (B) deadlock recovery
(C) mutual exclusion (D) context switching
Answer: A
27. The multiuser operating system, 20 requests are made to use a particular resource per hour, on an average the probability that no request are made in 45 minutes is
(A) e-15 (B) e-5
(C) 1 – e-5 (D) 1 – e-10
Answer: A
28. On receiving an interrupt from an I/O device, the CPU
(A) halts for predetermined time.
(B) branches off to the interrupt service routine after completion of the current instruction
(C) branches off to the interrupt service routine immediately.
(D) hands over control of address bus and data bus to the interrupting device.
Answer: B
29. The maximum amount of information that is available in one portion of the disk access arm for a removal disk pack (without further movement of the arm with multiple heads)
(A) a plate of data (B) a cylinder of data
(C) a track of data (D) a block of data
Answer: B
30. Consider a logical address space of 8 pages of 1024 words mapped with memory of 32 frames. How many bits are there in the physical address?
(A) 9 bits (B) 11 bits
(C) 13 bits (D) 15 bits
Answer: D

31. CPU does not perform the operation
(A) data transfer (B) logic operation
(C) arithmetic operation (D) all of the above
Answer: D
32. A chip having 150 gates will be classified as
Answer: B
33. If an integer needs two bytes of storage, then the maximum value of unsigned integer is
(A) 216 – 1
(B) 215 – 1
(C) 216
(D) 215
Answer: A
34. Negative numbers cannot be represented in
(A) signed magnitude form
(B) 1’s complement form
(C) 2’s complement form
(D) none of the above
Answer: D
35. The cellular frequency reuse factor for the cluster size N is
(A) N (B) N2
(C) 1/N (D) 1/N2
Answer: C
36. X – = Y + 1 means
(A) X = X – Y + 1
(B) X = –X – Y – 1
(C) X = –X + Y + 1
(D) = X – Y – 1
Answer: A
37. Handoff is the mechanism that
(A) transfer an ongoing call from one base station to another
(B) initiating a new call
(C) dropping an ongoing call
(D) none of above
Answer: A
38. Which one of the following statement is false?
(A) Context-free languages are closed under union.
(B) Context-free languages are closed under concatenation.
(C) Context-free languages are closed under intersection.
(D) Context-free languages are closed under Kleene closure.
Answer: D
39. All of the following are examples of real security and privacy risks except
(A) Hackers (B) Spam
(C) Viruses (D) Identify theft
Answer: B
40. Identify the incorrect statement :
(A) The ATM adoption layer is not service dependent.
(B) Logical connections in ATM are referred to as virtual channel connections.
(C) ATM is streamlined protocol with minimal error and flow control capabilities
(D) ATM is also known as cell delays.
Answer: A
41. Software risk estimation involves following two tasks :
(A) Risk magnitude and risk impact
(B) Risk probability and risk impact
(C) Risk maintenance and risk impact
(D) Risk development and risk impact
Answer: B
42. The number of bits required for an IPV6 address is
(A) 16 (B) 32
(C) 64 (D) 128
Answer: D
43. The proposition ~qvp is equivalent to
(A) p→q (B) q→p
(C) p↔q (D) p˅q
Answer: B
44. Enterprise Resource Planning (ERP)
(A) has existed for over a decade.
(B) does not integrate well with the functional areas other than operations.
(C) is inexpensive to implement.
(D) automate and integrates the majority of business processes.
Answer: D
45. Which of the following is false concerning Enterprise Resource Planning (ERP)?
(A) It attempts to automate and integrate the majority of business processes.
(B) It shares common data and practices across the enterprise.
(C) It is inexpensive to implement.
(D) It provides and access information in a real-time environment.
Answer: C
46. To compare, overlay or cross analyze to maps in GIS
(A) both maps must be in digital form
(B) both maps must be at the same equivalent scale.
(C) both maps must be on the same coordinate system
(D) All of the above
Answer: D
47. Web Mining is not used in which of the following areas?
(A) Information filtering
(B) Crime fighting on the internet
(C) Online transaction processing
(D) Click stream analysis.
Answer: B
48. A telephone conference call is an example of which type of communications?
(A) same time / same place
(B) same time / different place
(C) different time / different place
(D) different time / same place
Answer: B
49. What is the probability of choosing correctly an unknown integer between 0 and 9 with 3 chances?
(A) 963/1000
(B) 973/1000
(C) 983/1000
(D) 953/1000
Answer: A
50. The number of nodes in a complete binary tree of height h (with roots at level 0) is equal to
(A) 20 + 21 + ….. 2h
(B) 20 + 21 + ….. 2h-1
(C) 20 + 21 + ….. 2h+1
(D) 21 + ….. 2h+1
Answer: A

1. When data and acknowledgement are sent in the same frame, this is called as
(A) Piggy packing (B) Piggy backing
(C) Back packing (D) Good packing
Answer: B
2. Encryption and Decryption is the responsibility of ............... Layer.
(A) Physical (B) Network
(C) Application (D) Datalink
Answer: C
3. An analog signal carries 4 bits in each signal unit. If 1000 signal units are sent per second, then baud rate and bit rate of the signal are ............... and ..............
(A) 4000 bauds \ sec & 1000 bps
(B) 2000 bauds \ sec & 1000 bps
(C) 1000 bauds \ sec & 500 bps
(D) 1000 bauds \ sec & 4000 bps
Answer: D
Bit rate is the number of bits per second. Baud rate is the number of signal units per second. Baud rate is less than or equal to the bit rate.
Baud rate = 1000 bauds per second (baud/s)
Bit rate = 1000 x 4 = 4000 bps
4. The VLF and LF bauds use .............. propagation for communication.
(A) Ground (B) Sky
(C) Line of sight (D) Space
Answer: A
5. Using the RSA public key crypto system, if p=13, q=31 and d=7, then the value of e is
(A) 101 (B) 105
(C) 103 (D) 107
Answer: C
Basic RSA Algorithm:
1. Choose two primes, p & q.
2. Compute n=p*q and z=(p-1)*(q-1).
3. Choose a number relatively prime to z and call it d.
4. Find e such that e*d=1modz.
Given p=13, q=31 & d=7, e=?
7e=1mod360, then 7e must be 361, 721, 1081, 1441, etc. Dividing each of these in turn by 7 to see which is divisible by 7, we find that 721/7 = 103, hence e = 103.
6. FAN IN of a component A is defined as
(A) Number of components that can call or pass control to component A.
(B) Number of components that are called by component A.
(C) Number of components related to component A.
(D) Number of components dependent on component A.
Answer: A
7. The relationship of data elements in a module is called
(A) Coupling (B) Modularity
(C) Cohesion (D) Granularity
Answer: C
8. Software Configuration Management is the discipline for systematically controlling
(A) the changes due to the evolution of work products as the project proceeds.
(B) the changes due to defects (bugs) being found and then fixed.
(C) the changes due to requirement changes
(D) all of the above
Answer: D
9. Which one of the following is not a step of requirement engineering ?
(A) Requirement elicitation
(B) Requirement analysts
(C) Requirement design
(D) Requirement documentation
Answer: C
10. Testing of software with actual data and in actual environment is called
(A) Alpha testing (B) Beta testing
(C) Regression testing (D) None of the above
Answer: B
11. The student marks should not be greater than 100. This is
(A) Integrity constraint
(B) Referential constraint
(C) Over-defined constraint
(D) Feasible constraint
Answer: A
12. GO BOTTOM and SKIP-3 commands are given one after another in a database file of 30 records. It shifts the control to
(A) 28th record (B) 27th record
(C) 3rd record (D) 4th record
Answer: D
13. An ER Model includes
I. An ER diagram portraying entity types.
II. Attributes for each entity type
III. Relationships among entity types.
IV. Semantic integrity constraints that reflects the business rules about data not captured in the ER diagram.
(A) I, II, III & IV (B) I&IV
(C) I, II & IV (D) I & III
Answer: A
14. Based on the cardinality ratio and participation ............... associated with a relationship type, choose either the Foreign Key Design, the Cross Referencing Design or Mutual Referencing Design.
(A) Entity (B) Constraints
(C) Rules (D) Keys
Answer: B
15. Data Integrity control uses ................
(A) Upper and lower limits on numeric data.
(B) Passwords to prohibit unauthorised access to files.
(C) Data dictionary to keep the data
(D) Data dictionary to find last access of data
Answer: D
16. What does the following declaration mean ?
int (*ptr) [10];
(A) ptr is an array of pointers of 10 integers.
(B) ptr is a pointer to an array of 10 integers.
(C) ptr is an array of 10 integers.
(D) none of the above.
Answer: B
17. Which of the following has compilation error in C ?
(A) int n = 32;
(B) char ch = 65;
(C) float f= (float) 3.2;
(D) none of the above
Answer: D
18. Which of the following operators cannot be overloaded in C+ + ?
(A) * (B) +=
(C) == (D) ::
Answer: D
19. .................. allows to create classes which are derived from other classes, so that they automatically include some of its "parent's" members, plus its own members.
(A) Overloading (B) Inheritance
(C) Polymorphism (D) Encapsulation
Answer: B
20. The correct way to round off a floating number x to an integer value is
(A) y = (int)(x+0.5)
(B) y = int(x+0.5)
(C) y = (int)x+0.5
(D) y = (int)((int)x+0.5)
Answer: B
21. What is the value of the postfix expression ?
a b c d + - * (where a = 8, b = 4, c = 2 and d = 5)
(A) -3/8 (B) -8/3
(C) 24 (D) -24
Answer: D
22. If the queue is implemented with a linked list, keeping track of a front pointer and a rear pointer, which of these pointers will change during an insertion into a non-empty queue?
(A) Neither of the pointers change
(B) Only front pointer changes
(C) Only rear pointer changes
(D) Both of the pointers changes
Answer: C
23. ............... is often used to prove the correctness of a recursive function.
(A) Diagonalization
(B) Communitivity
(C) Mathematical Induction
(D) Matrix Multiplication
Answer: C
24. For any B-tree of minimum degree t ≥2, every node other than the root must have atleast ............... keys and every node can have at most .............. keys.
(A) t-1, 2t+1 (B) t+1, 2t+1
(C) t-1, 2t-1 (D) t+1, 2t-1
Answer: C
25. Given two sorted list of size 'm' and 'n' respectively. The number of comparison needed in the worst case by the merge sort algorithm will be
(A) m x n (B) max (m, n)
(C) min (m, n) (D) m + n – 1
Answer: C
Answered By StudyChaCha Member
Reply With Quote
Other Discussions related to this topic
Diploma in Computer Science Question Papers
PGT computer science kendriya vidyalaya entrance exam question papers
PH.D entrance exam in computer science and engineering Model question papers
GTU MCA I Sem Discreet Mathematics for Computer Science Exam Question Papers
ISRO question papers for computer science
GATE question papers of Computer Science
GATE Computer Science question papers
NET Computer Science Exam Solved Question Papers
12th Computer Science Question Papers
NET Computer Science Exam Question Papers
SAIL Management Trainee Exam Computer Science Question Papers
UGC NET Exam Question Papers for Computer Science
UGC NET JRF Computer Science Paper II Exam Solved Question Papers
Phd Entrance Question Papers In Computer Science
UGS NET solved question papers for computer science
NET exam for Computer Science question papers
NET exam (Computer Science) Solved Question Papers
Question Papers for NET Exam Computer Science with Solution
Data communication and computer network exam papers Department of computer science

Have a Facebook Account? Ask your Question Here


Forum Jump

All times are GMT +6.5. The time now is 08:36 AM.

Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2018, vBulletin Solutions, Inc.
Search Engine Friendly URLs by vBSEO 3.6.0 PL2

1 2 3 4 5 6 7 8 9