#1
| |||
| |||
![]()
Will you please provide me the UGC NET previous year Computer Science and Applications Paper III??? Ok, as you want the question paper of Computer Science and Applications Paper III of UGC NET exam so here I am providing you. UGC NET Computer Science and Applications Paper III question paper 1. Beam-penetration and shadow-mask are the two basic techniques for producing color displays with a CRT. Which of the following is not true ? I. The beam-penetration is used with random scan monitors. II. Shadow-mask is used in rasterscan systems. III. Beam-penetration method is better than shadow-mask method. IV. Shadow-mask method is better than beam-penetration method. (A) I and II (B) II and III (C) III only (D) IV only 2. Line caps are used for adjusting the shape of the line ends to give them a better appearance. Various kinds of line caps used are (A) Butt cap and sharp cap (B) Butt cap and round cap (C) Butt cap, sharp cap and round cap (D) Butt cap, round cap and projecting square cap 3. Given below are certain output primitives and their associated attributes. Match each primitive with its corresponding attributes : List – I List – II a. Line i. Type, Size, Color b. Fill Area ii. Color, Size, Font c. Text iii. Style, Color, Pattern d. Marker iv. Type, Width, Color Codes : a b c d (A) i ii iii iv (B) ii i iii iv (C) iv iii ii i (D) iii i iv ii 4. Consider a window bounded by the lines : x = 0; y= 0; x = 5 and y = 3. The line segment joining (–1, 0) and (4, 5), if clipped against this window will connect the points (A) (0, 1) and (2, 3) (B) (0, 1) and (3, 3) (C) (0, 1) and (4, 3) (D) (0, 1) and (3, 2) 5. Which of the following color models are defined with three primary colors ? (A) RGB and HSV color models (B) CMY and HSV color models (C) HSV and HLS color models (D) RGB and CMY color models 6. In a digital transmission, the receiver clock is 0.1 percent faster than the sender clock. How many extra bits per second does the receiver receive if the data rate is 1 Mbps ? (A) 10 bps (B) 100 bps (C) 1000 bps (D) 10000 bps 7. Given U = {1, 2, 3, 4, 5, 6, 7} A = {(3, 0.7), (5, 1), (6, 0.8)} then ~A will be : ( where ~ ® complement) (A) {(4, 0.7), (2, 1), (1, 0.8)} (B) {(4, 0.3), (5, 0), (6, 0.2) } (C) {(1, 1), (2, 1), (3, 0.3), (4, 1), (6, 0.2), (7, 1)} (D) {(3, 0.3), (6.0.2)} 8. Consider a fuzzy set old as defined below Old = {(20, 0.1), (30, 0.2), (40, 0.4), (50, 0.6), (60, 0.8), (70, 1), (80, 1)} Then the alpha-cut for alpha = 0.4 for the set old will be (A) {(40, 0.4)} (B) {50, 60, 70, 80} (C) {(20, 0.1), (30, 0.2)} (D) {(20, 0), (30, 0), (40, 1), (50, 1), (60, 1), (70, 1), (80, 1)} UGC NET Computer Science and Applications Paper III question paper ![]() ![]() ![]() ![]() Half question paper is in pdf file atteched............... Last edited by GaganD; June 29th, 2019 at 10:33 AM. |
#2
| |||
| |||
![]()
This is the UGC NET previous year Computer Science and Applications Paper III: 5. Give deterministic finite automata accepting the set of strings of length five or more in which the fourth symbol from the right end is different from the left most symbol defined over the alphabet {a, b}. (15) Elective – II 3. Describe the construction of a typical parity check matrix for Hamming code over GF(2) give its code words and error correction capability. (15) 4. Explain different components of a typical image processing system with a diagram.(15) 5. Mention various techniques of video files and explain any one technique in detail. (15) Remaining questions are in the attachment, please click on it…………
__________________ Answered By StudyChaCha Member |
![]() |
|