Go Back   StudyChaCha 2024 2025 > StudyChaCha Discussion Forum > General Topics

  #1  
Old February 8th, 2014, 11:25 AM
Super Moderator
 
Join Date: Jun 2013
Default

Will you please provide the solved question paper of NET Exam Paper I?

As you are looking for the solved question NET paper II, here I am providing list of few questions for your idea.


1. The distinct characteristic(s) of digital objects are
(A) Physical Medium
(B) Logical process
(C) Conceptual recognition and transaction
(D) All the above
Answer: (D)

2. Whos who in India an irregular publication is published by
(A) Business Press, Bombay
(B) Sterling, New Delhi
(C) Tradesman & Men Asia, Delhi
(D) Sahitya Samsad, Calcutta
Answer: (A)

3. Which department of the Government of India deals with Public Libraries?
(A) Department of Archaeology
(B) Department of Culture
(C) Department of Primary Education
(D) Department of Science and Technology
Answer: (B)

4. Information on Prime Minister of Bangladesh can be found in
(A) International Who’s Who
(B) Who’s Who in Bangladesh
(C) Current Biography
(D) Statesman’s Yearbook
Answer: (D)

5. ‘Eradication of Malaria in India 190-1999’ – a report can be categorized under
(A) Trend Report
(B) Review Report
(C) State of the Art Report
(D) Research Report
Answer: (A)

6. Which is not a reprographic service?
(A) Micro Copying
(B) Blue Printing
(C) Paper Printing
(D) Thermo Copying
Answer: (C)

7. ERIC is sponsored by
(A) US National Health Institute
(B) Health and Rehabilitation Services Division, A LA
(C) Department of Health Education & Welfare, Government of USA
(D) Health Science Information Centre, USA
Answer: No one is correct. The correct answer is: Institute of Education Sciences of the United States Department of Education

8. In the library hierarchy which level of management is responsible for execution of policies?
(A) Middle level
(B) Operational level
(C) Top level
(D) Lower level
Answer: (A)

9. METS stands for
(A) Machine Encoded Transmission System
(B) Metadata Encoded for Textual Standard
(C) Metadata Encoding Transmission Standard
Answer: (D)

10. Sector Device is an extension of
(A) Gap Device
(B) Empty Device
(C) Octave Device
(D) Group Notation Device
Answer: (C)

11. “Control, Disease, Malaria, Brain” indicates that it is
(A) Raw Title
(B) Expressive Title
(C) Kernel Title
(D) Transformed Title
Answer: (C)

12. A graphical representation using symbols to represent operations, data, flow, etc. is
(A) Logical Chart
(B) Flow Chart
(C) System Flow Chart
(D) Network Chart
Answer: (B)

13. The 12 rules for relational database were given by
(A) E.F. Codd
(B) Charles Babbage
(C) James Weyer
(D) Tim Berners Lee
Answer: (A)

14. A technique displaying graphic information on screen, pixel by pixel with bits held in main memory is
(A) Bit handling
(B) Bit mapping
(C) Bit pattern
(D) Bit matrix
Answer: (B)

15. ZOTERO is a –
(A) Content Management System
(B) Reference Management System
(C) Serials Management System
(D) Bibliographic Reference Management System
Answer: (D)

16. A network in which the host computer controls different nodes which further control other nodes, is known as
(A) Star Network
(B) Ring Network
(C) Hierarchical Network
(D) Multipoint Network
Answer: (C)

17. Impact factor is devised by
(A) Eugene Garfield
(B) Alan Pritchard
(C) David Hume
(D) Louis Brandeis
Answer: (A)

18. A skillful method of providing means, mechanism and structural elements to streamline organizational work is known as
(A) Role Analysis
(B) Strategic Planning
(C) Work Culture
(D) Autonomous Planning
Answer: (B)

19. Financial allocation made to a library for purchase of furniture and equipment’s usually comes under the budget head
(A) Recurring grant
(B) Endowments
(C) Non-recurring grant
(D) Annual grant
Answer: (C)

20. Historical/Government records related to an organization are maintained in
(i) Achieves
(ii) Museums
(iii) Repositories
(iv) Government libraries
Codes:
(A) (i) and (ii) are correct
(B) (ii) and (iii) are correct
(C) (i) and (iii) are correct
(D) (ii) and (iv) are correct
Answer: (C)

21. Major elements of a profession are
(i) Philosophy
(ii) Body of knowledge
(iii) Publicity
(iv) Status
Codes:
(A) (i), (ii), (iv) are correct
(B) (i), (ii), (iii) are correct
(C) (ii), (iii), (iv) are correct
(D) (i), (iii), (iv) are correct
Answer: (A)

22. Which of the following states don’t have library legislation?
(i) Haryana
(ii) Delhi
(iii) J & K
(iv) Manipur
Codes:
(A) (i) and (ii) are correct
(B) (ii) and (iii) are correct
(C) (i) and (iv) are correct
(D) (ii) and (iii) are correct
Answer: (B) and (D) Both

23. Which of the following principles are associated with library building planning?
(i) Principle of Uniformity
(ii) Principle of Comfort ability
(iii) Principle of Simplicity
(iv) Principle of Continuity
Codes:
(A) (i), (ii) and (iii) are correct
(B) (ii), (iii) and (iv) are correct
(C) (i), (ii) and (iv) are correct
(D) (iii), (iv) and (i) are correct
Answer: (B)

24. ETD database in India is maintained by
(i) Shodhgangotri
(ii) Vidyanidhi
(iii) Shodhganga
(iv) INDEST-AICTE consortium
Codes:
(A) (i) and (iii) are correct
(B) (ii), (iii) and (iv) are correct
(C) (ii) and (iii) are correct
(D) (iii) and (iv) are correct
Answer: (C)

25. Vocabulary in a database is controlled by
(i) Thesaurus files
(ii) Dictionary files
(iii) Standard files
(iv) Authority files
Codes:
(A) (i) and (ii) are correct
(B) (iii) and (iv) are correct
(C) (i) and (iii) are correct
(D) (i) and (iv) are correct
Answer: (B)

26. Limitations of Bibliometrics is/are
(i) Analyzing research and development trends
(ii) Describing text, not necessarily meaning and context
(iii) Identifying the active areas of research
(iv) Citation bias
Codes:
(A) (ii) and (iv) are correct
(B) (i) and (iii) are correct
(C) (i), (ii) and (iv) are correct
(D) (ii) and (iii) are correct
Answer: (A)

27. Identify the technique(s) to collect the data regarding the number of persons visited the periodical section of the library at different hours of the day.
(i) Questionnaire
(ii) Interview
(iii) Observation
(iv) Library records
Codes:
(A) (i) and (ii) are correct
(B) (ii) and (iii) are correct
(C) (iii) and (iv) are correct
(D) (ii) and (iv) are correct
Answer: (C)

28. Which of the following are prohibited under copyright?
(i) Downloading a document, printing multiple copies
(ii) Placing a copyright protected document on web-server
(iii) Downloading a document and save it in folder
(iv) Downloading a document with license to use and E-mailing it
Codes:
(A) (i), (iii) and (iv) are correct
(B) (i), (ii) and (iii) are correct
(C) (iii), (iv) and (ii) are correct
(D) (i), (ii) and (iv) are correct
Answer: (D)

29. The professional ethics help to –
(i) Get the right direction
(ii) Enhance image
(iii) Get more salaries
(iv) Resolve day to day issues
Codes:
(A) (ii) and (iii) are correct
(B) (i) and (iv) are correct
(C) (i) and (ii) are correct
(D) (ii) and (iv) are correct
Answer: (C)

30. Match the following
a. Systematic Bibliography i) List of macro/micro ideas of articles
b. Analytical or Critical ii) Investigation of physical nature of books
c. Historical Bibliography iii) Listing of items with minimum details
d. Documentary Bibliography iv) Concerned with art of writing, printing and binding
Codes:
a b c d
(A) i iv iii ii
(B) ii I iv iii
(C) iii ii iv i
(D) ii iv iii i
Answer: (C)

Last edited by Aakashd; October 14th, 2019 at 12:43 PM.
Reply With Quote
Other Discussions related to this topic
Thread
MSW Entrance Exam Solved Question Paper
NDA Exam Solved Question paper
LIC Agent Exam Solved Question Paper
VAO exam Solved Question paper
Previous VAO Exam Solved Question Paper
SBI Clerk Exam Solved question paper
MAT Exam Solved Question Paper
Solved Model question paper for JAO Exam
PNB Mains Exam solved question paper
NET Exam Solved Question Paper I
MP PET Entrance Exam Solved Question Paper
CAT Solved Exam Question Paper
ESIC Exam Solved Question Paper
CDS Exam Solved Question paper
Solved question paper of SBI PO exam
AFCAT Exam Solved Question Paper
Solved Question Paper for MAT Exam
Solved Question paper for NDA Exam
IBPS CWE Solved Exam Question Paper
IBPS PO Solved Exam Question Paper






  #2  
Old February 14th, 2015, 05:33 PM
Super Moderator
 
Join Date: Apr 2013
Default Re: NET Exam Solved Question Paper II

Here I am providing you the Solved Computer Science question paper which will help you in your studies:

NET Exam Solved Question Paper II

1. CSS stands for
(A) Cascading Style Sheets
(B) Collecting Style Sheets
(C) Comparative Style Sheets
(D) Comprehensive Style Sheets
Answer: (A)

2. MOOC stands for
(A) Media Online Open Course
(B) Massachusetts Open Online Course
(C) Massive Open Online Course
(D) Myrind Open Online Course
Answer: (C)

3. Binary equivalent of decimal number 35 is
(A) 100011
(B) 110001
(C) 110101
(D) 101011
Answer: (A)

4. gif, jpg, bmp, png are used as extensions for files which store
(A) Audio data
(B) Image data
(C) Video data
(D) Text data
Answer: (B)

5. Symbols A-F are used in which one of the following?
(A) Binary number system
(B) Decimal number system
(C) Hexadecimal number system
(D) Octal number system
Answer: (C)

6. Which one of the following is not a search engine?
(A) Google
(B) Chrome
(C) Yahoo
(D) Bing
Answer: (B)

7. In terms of total CO2 emissions from a country, identity the correct sequence:
(A) U.S.A. > China > India > Russia
(B) China > U.S.A. > India > Russia
(C) China > U.S.A. > Russia > India
(D) U.S.A. > China > Russia > India
Answer: (B)

8. Match List – I and List – II and identify the correct code:
a. World Health Day i.16th September
b. World Population Day ii. 1st December
c. World Ozone Day iii. 11th July
d. World AIDS Day iv. 7th April
Codes:
a b c d
(A) i ii iii iv
(B) iv iii i ii
(C) ii iii iv i
(D) iii iv ii i
Answer: (B)

9. Which of the anthropogenic activity accounts for more than 2/3rd of global water consumption?
(A) Agriculture
(B) Hydropower generation
(C) Industry
(D) Domestic and Municipal usage
Answer: (A)

10. One of the anthropogenic sources of gaseous pollutants chlorofluorocarbons (CFCs) in air is
(A) Cement Industry
(B) Fertiliser industry
(C) Foam industry
(D) Pesticide industry

Answer: (C)


11. The maximum number of fake institutions / universities as identified by the UGC in the year 2014 are in the State / Union territory of
(A) Bihar
(B) Uttar Pradesh
(C) Tamil Nadu
(D) Delhi
Answer: (B)

12. Which of the following institutions are empowered to confer or grant degrees under the UGC Act, 1956?
1. A university established by an Act of Parliament.
2. A university established by an Act of Legislature.
3. A university / institution established by a linguistic minority.
4. An institution which is a deemed to be university.
Select the correct answers from the codes given below:
(A) 1 and 2
(B) 1, 2 and 3
(C) 1, 2 and 4
(D) 1, 2, 3 and 4
Answer: (C)

13. Which of the following are the tools of good governance?
1. Social Audit
2. Separation of Powers
3. Citizen’s Charter
4. Right to Information
Select the correct answer from the codes given below:
(A) 1, 3 and 4
(B) 2, 3 and 4
(C) 1 and 4
(D) 1, 2, 3, and 4
Answer: (D)

14. The cyclone “Hudhud” hit the coast of which State?
(A) Andhra Pradesh
(B) Karnataka
(C) Kerala
(D) Gujarat
Answer: (A)

15. Which of the following is not a renewable natural resource?
(A) Clean air
(B) Fresh water
(C) Fertile soil
(D) Salt
Answer: (D)

16. Right to privacy as a Fundamental Right is implied in
(A) Right to Freedom
(B) Right to Life and Personal Liberty
(C) Right to Equality
(D) Right against Exploitation
Answer: (B)

17. Which of the following organizations deals with “capacity building programe” on Educational Planning?
(A) NCERT
(B) UGC
(C) NAAC
(D) NUEPA
Answer: (D)

18. Which of the following powers, the President has in relation to Lok Sabha?
1. Summoning
2 Adjournment- sine die
3. Prorogation
4. Dissolution
Select the correct answer from the codes given below:
(A) 1 and 4
(B) 1, 2 and 3
(C) 1, 3 and 4
(D) 1, 2, 3 and 4
Answer: (B)

19. The interval between two sessions of parliament must not exceed
(A) 3 months
(B) 6 months
(C) 4 months
(D) 100 days
Answer: (B)

20. Maximum participation of students during teaching is possible through
(A) Lecture method
(B) Demonstration method
(C) Inductive method
(D) Textbook method

Answer: (C)


21. Diagnostic evaluation ascertains
(A) Students performance at the beginning of instructions.
(B) Learning progress and failures during instructions.
(C) Degree of achievements of instructions at the end.
(D) Causes and remedies of persistent learning problems during instructions.
Answer: (D)

22. Instructional aides are used by the teacher to
(A) Glorify the class
(B) Attract the students
(C) Clarify the concepts
(D) Ensure discipline
Answer: (C)

23. Attitude of the teacher that affects teaching pertains to
(A) Affective domain
(B) Cognitive domain
(C) Connative domain
(D) Psychomotor domain
Answer: (A)

24. “Education is the manifestation of perfection already in man” was stated by
(A) M. K. Gandhi
(B) R. N. Tagore
(C) Swami Vivekanand
(D) Sri Aurobindo
Answer: (C)

25. Which of the following is not a prescribed level of teaching?
(A) Memory
(B) Understanding
(C) Reflective
(D) Differentiation
Answer: (D)

26. The core elements of dissertation are
(A) Introduction; Data Collection; Data Analysis; Conclusions and Recommendations
(B) Executive Summary; Literature review; Data gathered; Conclusions; Bibliography
(C) Research Plan; Research Data; Analysis; References
(D) Introduction; Literature Review; Research Methodology; Results; Discussion and Conclusion
Answer: (D)

27. What is a Research Design?
(A) A way of conducting research that is not grounded in theory.
(B) The choice between using qualitative or quantitative methods.
(C) The style in which you present your research findings e.g. a graph.
(D) A framework for every stage of the collection and analysis of data.
Answer: (D)

28. “Sampling Cases” means
(A) Sampling using a sampling frame
(B) Identifying people who are suitable for research
(C) Literally the researcher’s brief case
(D) Sampling of people, newspapers, television programmes etc.
Answer: (D)

29. The frequency distribution of a research data which is symmetrical in shape similar to a normal distribution but center peak is much higher, is
(A) Skewed
(B) Mesokurtic
(C) Leptokurtic
(D) Platykurtic
Answer: (C)

30. When planning to do a social research, it is better to
(A) Approach the topic with an open mind
(B) Do a pilot study before getting stuck into it
(C) Be familiar with literature on the topic
(D) Forget about theory because this is a very practical

Answer: (A)


31. When academicians are called to deliver lecture or presentations to an audience on certain topics or a set of topics of educational nature, it is called
(A) Training Program
(B) Seminar
(C) Workshop
(D) Symposium
Answer: (B)

32. Media is known as
(A) First Estate
(B) Second Estate
(C) Third Estate
(D) Fourth Estate
Answer: (D)

33. The mode of communication that involves a single source transmitting information to a large number of receivers simultaneously, is called
(A) Group Communication
(B) Mass Communication
(C) Intrapersonal Communication
(D) Interpersonal Communication
Answer: (B)

34. A smart classroom is a teaching space which has
(i) Smart portion with a touch panel control system.
(ii) PC/Laptop connection and DVD/VCR player.
(iii) Document camera and specialized software
(iv) Projector and screen
Select the correct answer from the codes given below:
(A) (i) and (ii) only
(B) (ii) and (iv) only
(C) (i), (ii) and (iii) only
(D) (i), (ii), (iii) and (iv)
Answer: (D)

35. The term “Yellow Journalism” refers to
(A) Sensational news about terrorism and violence
(B) Sensationalism and exaggeration to attract readers / viewers.
(C) Sensational news about arts and culture.
(D) Sensational news prints in yellow paper.
Answer: (B)

36. In the classroom, the teacher sends the message either as words or images. The students are really
(A) Encoders
(B) Decoders
(C) Agitators
(D) Propagators
Answer: (B)

37. The next term in the series: AB, ED, IH, NM, --- is
(A) TS
(B) ST
(C) TU
(D) SU
Answer: (A)

38. If STREAMERS is coded as UVTGALDQR, then KNOWLEDGE will be coded as
(A) MQPYLCDFD
(B) MPQYLDCFD
(C) PMYQLDFCD
(D) YMQPLDDFC
Answer: (B)

39. A is brother of B. B is the brother of C. C is the husband of D. E is the father of A. D is related to E as
(A) Daughter
(B) Daughter-in-law
(C) Sister-in-law
(D) Sister
Answer: (B)

40. Two numbers are in the ration 3:5. If 9 is subtracted from the numbers, the ratio becomes 12:23. The numbers are
(A) 30, 50
(B) 36, 60
(C) 33, 55
(D) 42, 70

Answer: (C)


41. The mean of the ages of father and his son is 27 years. After 18 years, father will be twice as old as his son. Their present ages are
(A) 42, 12
(B) 40, 14
(C) 30, 24
(D) 36, 18
Answer: (A)

42. Digital Empowerment means
(i) Universal digit literacy
(ii) Universal access to all digital resources
(iii) Collaborative digital platform for participative governance.
(iv) Probability of all entitlements for individuals through cloud.
Choose the correct answer from the codes given below:
(A) (i) and (ii) only
(B) (ii) and (iii) only
(C) (i), (ii) and (iii) only
(D) (i), (ii), (iii) and (iv)
Answer: (D)

43. The next term in the series: 2, 7, 28, 63, 126, --- is
(A) 215
(B) 245
(C) 276
(D) 296
Answer: (A)

Read the following passage carefully and answer questions 44 to 48:
The literary distaste for politics, however, seems to be focused not so much on the largely murky practice of politics in itself as a subject of literary representation but rather more on how it is often depicted in literature, i.e., on the very politics of such representation. A political novel often turns out to be not merely a novel about politics but a novel with a politics of its own, for it seeks not merely to show us how things are but has fairly definite ideas about how things should be, and precisely what one should think and do in order to make things move in that desired direction. In short, it seeks to convert and enlist the reader to a particular cause or ideology; it often is (in an only too familiar phrase) not literature but propaganda. This is said to violate the very spirit of literature which is to broaden our understanding of the world and the range of our sympathies rather than to narrow them down through partisan commitment. As John Keats said, ‘We hate poetry that has a palpable design upon us’.
Another reason why politics does not seem amenable to the highest kind of literary representation seems to arise from the fact that politics by its very nature is constituted of ideas and ideologies. If political situations do not lend themselves to happy literary treatment, political ideas present perhaps an even greater problem in this regard. Literature, it is argued, is about human experiences rather than about intellectual abstractions; it deals in what is called the ‘felt reality’ of human flesh and blood, and in sap and savour. (rasa) rather than in and lifeless ideas. In an extensive discussion of the matter in her book Ideas and the Novel, the American novelist Mary McCarthy observed that ‘ideas are still today felt to be unsightly in the novel’ though that was not so in ‘former days’, i.e., in the 18th and 19th centuries. Her formulation of the precise nature of the incompatibility between ideas on the one hand and the novel on the other betrays perhaps a divided conscience in the matter and a sense of dilemma shared by many writers and readers: ‘An idea cannot have loose ends, but a novel, I almost think, needs them. Nevertheless, there is enough in common for the novelists to feel… the attraction of ideas while taking up arms against them — most often with weapons of mockery.’

44. The constructs of politics by its nature is
(A) Prevalent political situation
(B) Ideas and Ideologies
(C) Political propaganda
(D) Understanding of human nature
Answer: (C)

45. Literature deals with
(A) Human experiences in politics
(B) Intellectual abstractions
(C) Dry and empty ideas
(D) Felt reality of human life
Answer: (D)

46. The observation of the novelist, May McCarthy reveals
(A) Unseen felt ideas of today in the novel
(B) Dichotomy of conscience on political ideas and novels
(C) Compatibility between idea and novel
(D) Endless idea and novels
Answer: (B)

47. According to the passage, a political novel often turns out to be a
(A) Literary distaste for politics
(B) Literary representation of politics
(C) Novels with its own politics
(D) Depiction of murky practice of politics
Answer: (C)

48. A political novel reveals
(A) Reality of the tings
(B) Writer’s perception
(C) Particular ideology of the readers
(D) The spirit of literature
Answer: (B)

49. Warrior is related to sword, carpenter is related to saw, farmer is related to plough. In the same way, the author is related to
(A) Book
(B) Fame
(C) Reader
(D) Pen
Answer: (D)

50. Given below is a diagram of three circles A, B and C over-lapping each other? The circle A represents the class of honest people, the circle B represent the class of sincere people and circle C represents the class of politicians. p, q, r, s, U, X, Y represent different regions. Select the code that represents the region indicating the class of honest politicians who are not sincere.
CBSE UGC NET 2014 December Question Paper I Answer Keys

(A) X
(B) q
(C) p
(D) s
Answer: (D)

51. “A man ought no more to value himself for being wiser than a woman if he owes his advantage to a better education, than he ought to boast of his courage for beating a man when his hands were tied.” The above passage is an instance of
(A) Deductive argument
(B) Hypothetical argument
(C) Analogical argument
(D) Factual argument
Answer: (C)

52. By which of the following proposition, the proposition “wise men are hardly afraid of death” is contradicted?
(A) Some wise men are afraid of death.
(B) All wise men are afraid of death.
(C) No wise men is afraid of death.
(D) Some wise men are not afraid of death.
Answer: (B)

53. When in a group of propositions, one proposition is claimed to follow from the others, that group of propositions is called
(A) An argument
(B) A valid argument
(C) An explanation
(D) An invalid argument
Answer: (A)

54. Namita and Samita are brilliant and studious. Anita and karabi are obedient and irregular. Babita and Namita are irregular but brilliant. Samita and Kabita are regular and obedient. Who among them is/are brilliant, obedient, regular and studious?
(A) Samita alone
(B) Namita and Samita
(C) Kabita alone
(D) Anita alone
Answer: (A)

For a county CO2 emissions (million metric tons) from various sectors are given in the following table. Answer the questions (55 to 60) base on the data given

55. By what percentage (%), the total emissions of CO2 have increased from 2005 to 2009?
(A) ~89.32%
(B) ~57.62%
(C) ~40.32%
(D) ~113.12%
Answer: (A)

56. What is the average annual growth rate of CO2 emission in power sector?
(A) ~12.57%
(B) ~16.87%
(C) ~30.81%
(D) ~50.25%
Answer: (A)

57. What is the percentage contribution of power sector to total CO2 emission in the year 2008?
(A) ~30.82%
(B) ~41.18%
(C) ~51.38%
(D) ~60.25%
Answer: (B)

58. In which year, the contribution (%) of industry to total sectoral CO2 emission was minimum?
(A) 2005
(B) 2006
(C) 2007
(D) 2008
Answer: (A)

59. What is the percentage (%) growth of CO2 emission from power sector during 2005 to 2009?
(A) 60
(B) 50
(C) 40
(D) 80
Answer: (A)

60. Which sector has recorded maximum growth in CO2 emission during 2005 to 2009?
(A) Power
(B) Industry
(C) Commercial
(D) Agriculture
Answer: (D)

NET Computer Science Exam Syllabus Question Paper II

1. Discrete Structures :

Sets, Relations, Functions. Pigeonhole Principle, Inclusion-Exclusion Principle, Equivalence and Partial Orderings, Elementary Counting Techniques, Probability. Measure ( s ) for information and Mutual information.

Computability : Models of computation-Finite Automata, Pushdown Automata, Non – determinism and NFA, DPDA and PDAs and Languages accepted by these structures. Grammars, Languages, Non – computability and Examples of non – computable problems.

Graph : Definition, walks, paths, trails, connected graphs, regular and bipartite graphs, cycles and circuits. Tree and rooted tree. Spanning trees. Eccentricity of a vertex radius and diameter of a graph. Central Graphs. Centres of a tree. Hamiltonian and Eulerian graphs, Planar graphs.

Groups : Finite fields and Error correcting / detecting codes.

2. Computer Arithmetic :

Propositional ( Boolean ) Logic, Predicate Logic, Well – formed – formulae ( WFF ), Satisfiability and Tautology.

Logic Families : TTL, ECL and C – MOS gates. Boolean algebra and Minimization of Boolean functions. Flip-flops – types, race condition and comparison. Design of combinational and sequential circuits.

Representation of Integers : Octal, Hex, Decimal, and Binary. 2′s complement and 1′s complement arithmetic. Floating point representation.

3. Programming in C and C++ :

Programming in C : Elements of C – Tokens, identifiers, data types in C. Control structures in C. Sequence, selection and iteration(s). Structured data types in C-arrays, struct, union, string, and pointers.

O – O Programming Concepts : Class, object, instantiation. Inheritance, polymorphism and overloading.

C++ Programming : Elements of C++ – Tokens, identifiers. Variables and constants, Datatypes, Operators, Control statements. Functions parameter passing. Class and objects. Constructors and destructors. Overloading, Inheritance, Templates, Exception handling.

4. Relational Database Design and SQL :

E-R diagrams and their transformation to relational design, normalization – INF, 2NF, 3NF, BCNF and 4NF. Limitations of 4NF and BCNF.

SQL : Data Definition Language ( DDL ), Data Manipulation Language ( DML ), Data Control Language ( DCL ) commands. Database objects like-Views, indexes, sequences, synonyms, data dictionary.

5. Data and File structures :

Data, Information, Definition of data structure. Arrays, stacks, queues, linked lists, trees, graphs, priority queues and heaps.

File Structures : Fields, records and files. Sequential, direct, index-sequential and relative files. Hashing, inverted lists and multi – lists. B trees and B+ trees.

6. Computer Networks :

Network fundamentals : Local Area Networks ( LAN ), Metropolitan Area Networks ( MAN ), Wide Area Networks ( WAN ), Wireless Networks, Inter Networks.

Reference Models : The OSI model, TCP / IP model.

Data Communication : Channel capacity. Transmission media-twisted pair, coaxial cables, fibre – optic cables, wireless transmission-radio, microwave, infrared and millimeter waves. Lightwave transmission. Thelephones – local loop, trunks, multiplexing, switching, narrowband ISDN, broadband ISDN, ATM, High speed LANS. Cellular Radio. Communication satellites-geosynchronous and low-orbit.

Internetworking : Switch / Hub, Bridge, Router, Gateways, Concatenated virtual circuits, Tunnelling, Fragmentation, Firewalls.

Routing : Virtual circuits and datagrams. Routing algorithms. Conjestion control.

Network Security : Cryptography-public key, secret key. Domain Name System ( DNS ) – Electronic Mail and Worldwide Web ( WWW ). The DNS, Resource Records, Name servers. E-mail-architecture and Serves.

7. System Software and Compilers :
Assembly language fundamentals ( 8085 based assembly language programming ). Assemblers-2-pass and single-pass. Macros and macroprocessors.
Loading, linking, relocation, program relocatability. Linkage editing.
Text editors. Programming Environments. Debuggers and program generators.
Compilation and Interpretation. Bootstrap compilers. Phases of compilation process. Lexical analysis. Lex package on Unix system.
Context free grammars. Parsing and parse trees. Representation of parse ( derivation ) trees as rightmost and leftmost derivations. Bottom up parsers-shift-reduce, operator precedence, and LR. YACC package on Unix system.
Topdown parsers-left recursion and its removal. Recursive descent parser. Predictive parser. Intermediate codes-Quadruples, Triples, Intermediate code generation, Code generation, Code optimization.

8. Operating Systems ( with Case Study of Unix ) :

Main functions of operating systems. Multiprogramming, multiprocessing, and multitasking.

Memory Management : Virtual memory, paging, fragmentation.

Concurrent Processing : Mutual exclusion. Critical regions, lock and unlock.

Scheduling : CPU scheduling, I / O scheduling, Resource scheduling. Deadlock and scheduling algorithms. Banker’s algorithm for deadlock handling.

UNIX :
The Unix System : File system, process management, bourne shell, shell variables, command line programming.
Filters and Commands : Pr, head, tail, cut, paste, sort, uniq, tr, join, etc., grep, egrep, fgrep, etc., sed, awk, etc.
System Calls ( like ) : Creat, open, close, read, write, iseek, link, unlink, stat, fstat, umask, chmod, exec, fork, wait, system.

9. Software Engineering :
System Development Life Cycle ( SDLC ) : Steps, Water fall model, Prototypes, Spiral model.
Software Metrics : Software Project Management.
Software Design : System design, detailed design, function oriented design, object oriented design, user interface design. Design level metrics.
Coding and Testing : Testing level metrics. Software quality and reliability. Clean room approach, software reengineering.


10. Current Trends and Technologies :

The topics of current interest in Computer Science and Computer Applications shall be covered. The experts shall use their judgement from time to time to include the topics of popular interest, which are expected to be known for an application development software professional, currently, they include :

Parallel Computing :

Parallel virtual machine ( pvm ) and message passing interface ( MPI ) libraries and calls. Advanced architectures. Today’s fastest computers.

Mobile Computing :

Mobile connectivity – Cells, Framework, wireless delivery technology and switching methods, mobile information access devices, mobile data internetworking standards, cellular data communication protocols, mobile computing applications. Mobile databases – protocols, scope, tools and technology. M-business.

E – Technologies :
Electronic Commerce : Framework, Media Convergence of Applications, Consumer Applications, Organisation Applications.
Electronic Payment Systems : Digital Token, Smart Cards, Credit Cards, Risks in Electronic Payment System, Designing Electronic Payment Systems.
Electronic Data Interchange ( EDI ) : Concepts, Applications, ( Legal, Security and Privacy ) issues, EDI and Electronic Commerce, Standardization and EDI, EDI Software Implementation, EDI Envelope for Message Transport, Internet – Based EDI.
Digital Libraries and Data Warehousing : Concepts, Types of Digital documents, Issues behind document Infrastructure, Corporate Data Warehouses.
Software Agents : Characteristics and Properties of Agents, Technology behind Software Agents ( Applets, Browsers and Software Agents ).
Broadband Telecommunications : Concepts, Frame Relay, Cell Relay, Switched Multimegabit Data Service, Asynchronous Transfer Mode.
Main concepts in Geographical Information System ( GIS ), E – cash, E – Business, ERP packages.
Data Warehousing : Data Warehouse environment, architecture of a data warehouse methodology, analysis, design, construction and administration.
Data Mining : Extracting models and patterns from large databases, data mining techniques, classification, regression, clustering, summarization, dependency modelling, link analysis, sequencing analysis, mining scientific and business data.

Windows Programming :

Introduction to Windows programming – Win32, Microsoft Foundation Classes ( MFC ), Documents and views, Resources, Message handling in windows.

Simple Applications ( in windows ) : Scrolling, splitting views, docking toolbars, status bars, common dialogs.

Advanced Windows Programming :

Multiple Document Interface ( MDI ), Multithreading. Object linking and Embedding ( OLE ). Active X controls. Active Template Library ( ATL ). Network programming.
__________________
Answered By StudyChaCha Member
Reply With Quote
  #3  
Old October 14th, 2019, 12:44 PM
Super Moderator
 
Join Date: Jun 2013
Default Re: NET Exam Solved Question Paper II

31. Match the following queries with their appropriate category of reference source:
a. Enrolment of students in a university i) Yearbook
b. Weather of Denmark ii) Statistical source
c. No. of foreigners visited World Book Fair in 2011 iii) Directory
d. No. of hospitals in China iv) Geographical Source
Codes:
a b c d
(A) iv iii i ii
(B) i iii ii iv
(C) ii iv i iii
(D) iii iv i ii
Answer: (D)

32. Match the following :
a. Last law of Library Science i) Real time access
b. 2nd Law of Library Science ii) Search engine & subject gateways
c. 3rd Law of Library Science iii) Web access to resources
d. 4th Law of Library Science iv) Open access initiatives
Codes:
a b c d
(A) iii iv ii i
(B) iv i ii iii
(C) ii iii ii iv
(D) ii iv i iii
Answer: (A)

33. Match the following :
a. Douglas McGregor i) Scientific Management School
b. Abraham Maslow ii) Theory of Authority Structure
c. F.W. Taylor iii) Self Actualization Needs
d. Max Weber iv) Theory X and Theory Y
Codes:
a b c d
(A) iv iii i ii
(B) ii iii i iv
(C) iii iv ii i
(D) i iv ii iii
Answer: (A)

34. Match the following DDC numbers :
a. Education i) 770
b. Medicine ii) 370
c. Photography iii) 610
d. Astronomy iv) 520
Codes:
a b c d
(A) iii i iv ii
(B) ii iii i iv
(C) i iv iii ii
(D) iv ii i iii
Answer: (B)

35. Match the following :
a. Key to a given collection i) Abstract
b. Key to literary sources on a subject ii) Index
c. Representation of subject concept iii) Catalogue
d. Condensation of a document iv) Bibliography
Codes:
a b c d
(A) iii iv ii i
(B) ii iii iv i
(C) i ii iii iv
(D) iv i ii iii
Answer: (A)

36. Match the following :
a. Unity of command i) Specialization
b. Unity of direction ii) strength in unity
c. Esprit de corps iii) Orders from only one person
d. Division of work iv) One boss, one plan
Codes:
a b c d
(A) iv iii ii i
(B) ii iv iii i
(C) iii iv ii i
(D) i iv iii ii
Answer: (C)

37. Give in sequence, the following in order of their origin :
i. National Library
ii. Calcutta Public Library
iii. Imperial Library Act
iv. Imperial Library
Codes:
(A) ii iii iv i
(B) i ii iii iv
(C) iii i iv ii
(D) ii iv iii i
Answer: (D)

38. Arrange the following according to year of publication :
i. Colon Classification
ii. Prolegomena to Classification
iii. Five Laws of Library Science
iv. Classified Catalogue Code
Codes:
(A) iii iv i ii
(B) iv ii i iii
(C) iii i iv ii
(D) i ii iv iii
Answer: (C)

39. Assertion (A): Digitization has proved to be possible for every format and medium held by library.
Reason (R): All libraries are making their text and visual collections digitized.
Codes:
(A) (A) is true, but (R) is false
(B) (A) is false, but (R) is true
(C) Both (A) and (R) are true
(D) Both (A) and (R) are false
Answer: (A)

40. Assertion (A): In spite of political, economic and technological support, the growth of Public Library System is lopsided.
Reason (R): The public libraries are totally depending on cess/tax amounts.
Codes:
(A) Both (A) and (R) are true
(B) Both (A) and (R) are false
(C) (A) is true, but (R) is false
(D) (A) is false, but (R) is true
Answer: (C)


41. Assertion (A): ‘Pay and Use’ concept has not been accepted in libraries of India.
Reason (R): Library staff does not possess the essential skills required for product development and promotion.
Codes:
(A) Both (A) and (R) are true
(B) (A) is true but (R) are false
(C) (R) is true, but (A) is false
(D) Both (A) and (R) are false
Answer: (A)

42. Assertion (A): Library Science profession in India enjoys the status at par with medical, legal and management professions.
Reason (R): S.R. Ranganathan’s contributions and teachings for Indian librarianship secured a status to the profession.
Codes:
(A) (A) is true, but (R) is false.
(B) (A) is false, but (R) is true.
(C) Both (A) and (R) are true.
(D) Both (A) and (R) are false.
Answer: (B)

43. Assertion (A): In conducting research, Social Sciences are not considered at par with natural sciences.
Reason (R): Research in Social Sciences can’t be performed so rigorously as can be in Natural Sciences.
Codes:
(A) Both (A) and (R) are true.
(B) Both (A) and (R) are false.
(C) (A) is true, but (R) is false.
(D) (A) is false, but (R) is true.
Answer: (A)

44. Assertion (A): Research starts in mind first and then in laboratories.
Reason (R): Systematically conducted research leas to generalization.
Codes:
(A) (A) is true, but (R) is false.
(B) (A) is false, but (R) is true.
(C) Both (A) and (R) are true.
(D) Both (A) and (R) are false.
Answer: (C)

45. Assertion (A): Systematic and efficient use of statistical tools in research helps in precise interpretation of research results.
Reason (R): Statistical tools cannot give specific explanations of the data.
Codes:
(A) Both (A) and (R) are true.
(B) (A) is true and (R) is false.
(C) Both (A) and (R) are false.
(D) (A) is false and (R) is true.
Answer: (A)

Read the following passage and answer the questions 46-50:
While Boyd allows that some people consider email or discussion lists to be Social Software, he makes an important distinction between traditional communication software and Social Software. He explains that traditional software places people into groups with a top-down approach; in other words, it assigns membership. However, Social Software takes a bottom-up approach, which enables people to organize themselves into a network based on their preferences. Therefore, with a bottom-up approach, people can sign up for a system and build communities using their personal preferences (Marenzi et al., 2008). In contrast, traditional communication software uses a top-down approach where people are assigned into a specific organization or groups. Social Software based on supporting individuals who interact socially with people who have similar interests (Marenzi et al., 2008). In addition, users typically enjoy Social Software itself and work with various Social Software applications voluntarily. For example, the authors of social media enjoy content that they have created themselves, content that is copied from other media, and mash-ups that contain a mix of content that could possibly be from several authors (Ahonen and Lietsala, 2007). The popularity of social technologies is attributed to the increase in low-cost tools and the critical mass of millions of people who are now connected to the Internet and to the people’s need to feel like part of a community (Avram, 2006). These users tend to rely more on their own personal social networks than on traditional business structures. (vinson 2005) describes additional features of Social Software tools: they allow people to easily participate (by both contributing and reading) in the activities; they provide opportunity for networking and allow for the self-forming of networks since people are usually both consumers and producers; and each individual can be a member on several networks simultaneously (Avram, 2006).

46. People are assigned into specific organization or groups in ----------- approach.
(A) Top-down approach
(B) Down-top approach
(C) Top-bottom system approach
(D) Down-top system approach
Answer: (A)

47. The basic feature(s) of social software is/are:
(A) Social interaction
(B) Personal interaction
(C) Enjoying social software
(D) (A) and (C) are correct.
Answer: (D)

48. Authors of social media enjoy ---------of contents.
(A) Self-created contents
(B) Contents from magazines
(C) Contents from many formats
(D) Contents from many languages
Answer: (A)

49. The reason/s attributed to the popularity of social networking is/are:
(A) Masses have started using internet.
(B) All have free access to internet.
(C) All are technology literates.
(D) Stimulation of on-line communities over the traditional communities.
Answer: (A)

50. The social software tools allow.
(A) Easy participation
(B) Quick networking
(C) Consumer networking
(D) Both (A) & (B)
Answer: (D)
__________________
Answered By StudyChaCha Member
Reply With Quote
Reply




All times are GMT +6. The time now is 01:33 PM.


Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2024, vBulletin Solutions Inc.
Search Engine Friendly URLs by vBSEO 3.6.0 PL2

1 2 3 4 5 6 7 8