NTA UGC NET Computer Science and Applications Paper 2 Solved Question Paper 2012 June: To score better marks in the NTA UGC NET Computer Science and Applications, you should have depth knowledge of the entire subject.
You can boost your preparation by referring to NTA UGC NET Computer Science and Applications Question Paper 2 2012 June. It will give you information about the important chapters and concepts covered in all chapters.
You must have NTA UGC NET Computer Science and Applications Solved Question Papers along with the latest Computer Science and Applications Syllabus to enhance your semester exam preparation.
Here we have provided you with the complete guide on NTA UGC NET Computer Science and Applications Paper 2 Solved Question Paper 2012 June.
NTA UGC NET Computer Science and Applications Paper 2 Solved Question Paper 2012 June
NTA UGC NET Computer Science and Applications Solved Question Papers are the best study materials to score good marks in the Computer Science and Applications exam.
Practicing these NTA UGC NET Computer Science and Applications previous year question papers assist the students in getting a clear idea about the question paper pattern and types of questions asked in the exam.
You can check the complete NTA UGC NET Computer Science and Applications Paper 2 Solved Question Paper 2012 June.
1. The postfix expression AB + CD – * can be evaluated using a
(A) Stack
(B) Tree
(C) Queue
(D) Linked list
Answer: (A)
2. The post order traversal of a binary tree is DEBFCA. Find out the preorder traversal.
(A) ABFCDE
(B) ADBFEC
(C) ABDECF
(D) None of the above
Answer: (C)
3. The branch logic that provides making capabilities in the control unit is known as
(A) Controlled transfer
(B) Conditional transfer
(C) Unconditional transfer
(D) None of the above
Answer: (A)
4. The number of colours required to properly colour the vertices of every planer graph is
(A) 2
(B) 3
(C) 4
(D) 5
Answer: (A)
5. Networks that use different technologies can be connected by using
(A) Packets
(B) Switches
(C) Bridges
(D) Routers
Answer: (D)
6. Both hosts and routers are TCP/IP protocol software. However, routers do not use protocol from all layers. The layer for which protocol software is not needed by a router is
(A) Layer – 5 (Application)
(B) Layer – 1 (Physical)
(C) Layer – 3 (Internet)
(D) Layer – 2 (Network Interface)
Answer: (A)
7. In multiuser database if two users wish to update the same record at the same time, they are prevented from doing so by
(A) Jamming
(B) Password
(C) Documentation
(D) Record lock
Answer: (D)
8. A binary search tree is a binary tree :
(A) All items in the left subtree are less than root
(B) All items in the right subtree are greater than or equal to the root
(C) Each subtree is itself a binary search tree
(D) All of the above
Answer: (D)
9. What deletes the entire file except the file structure ?
(A) ERASE
(B) DELETE
(C) ZAP
(D) PACK
Answer: (C)
10. Which command is the fastest among the following ?
(A) COPY TO <NEW FILE>
(B) COPY STRUCTURE TO <NEW FILE>
(C) COPY FILE <FILE 1> <FILE 2>
(D) COPY TO MFILE-DAT DELIMITED
Answer: (B)
11. B+ tree are preferred to binary tree in Database because
(A) Disk capacity are greater than memory capacities
(B) Disk access is much slower than memory access
(C) Disk data transfer rates are much less than memory data transfer rate
(D) Disks are more reliable than memory
Answer: (B)
12. A Transaction Manager is which of the following ?
(A) Maintains a log of transactions
(B) Maintains before and after database images
(C) Maintains appropriate concurrency control
(D) All of the above
Answer: (D)
13. Leaves of which of the following trees are at the same level ?
(A) Binary tree
(B) B-tree
(C) AVL-tree
(D) Expression tree
Answer: (B)
14. Which of the following TCP/IP Internet protocol is diskless machine uses to obtain its IP address from a server ?
(A) RAP
(B) RIP
(C) ARP
(D) X.25
Answer: (C)
15. Decryption and encryption of data are the responsibility of which of the following layer ?
(A) Physical layer
(B) Data Link layer
(C) Presentation layer
(D) Session layer
Answer: (C)
16. In which circuit switching, delivery of data is delayed because data must be stored and retrieved from RAM ?
(A) Space division
(B) Time division
(C) Virtual
(D) Packet
Answer: (B)
17. In which Routing Method do all the routers have a common database ?
(A) Distance vector
(B) Link state
(C) Link vector
(D) Dijkestra method
Answer: (B)
18. Page Shift Keying (PSK) Method is used to modulate digital signal at 9600 bps using 16 level. Find the line signals and speed (i.e. modulation rate).
(A) 2400 bauds
(B) 1200 bauds
(C) 4800 bauds
(D) 9600 bauds
Answer: (A)
19. The station to hub distance in which it is 2000 metres.
(A) 100 Base-Tx
(B) 100 Base-Fx
(C) 100 Base-T4
(D) 100 Base-T1
Answer: (B)
20. Main aim of software engineering is to produce
(A) Program
(B) Software
(C) Within budget
(D) Software within budget in the given schedule
Answer: (D)
21. Key process areas of CMM level 4 are also classified by a process which is
(A) CMM level 2
(B) CMM level 3
(C) CMM level 5
(D) All of the above
Answer: (C)
22. Validation means
(A) Are we building the product right
(B) Are we building the right product
(C) Verification of fields
(D) None of the above
Answer: (B)
23. If a process is under statistical control, then it is
(A) Maintainable
(B) Measurable
(C) Predictable
(D) Verifiable
Answer: (C)
24. In a function oriented design, we
(A) Minimize cohesion and maximize coupling
(B) Maximize cohesion and minimize coupling
(C) Maximize cohesion and maximize coupling
(D) Minimize cohesion and minimize coupling
Answer: (B)
25. Which of the following metric does not depend on the programming language used ?
(A) Line of code
(B) Function count
(C) Member of token
(D) All of the above
Answer: (B)
26. A / B+ tree index is to be built on the name attribute of the relation STUDENT. Assume that all students names are of length 8 bytes, disk block are of size 512 bytes and index pointers are of size 4 bytes. Given this scenario what would be the best choice of the degree (i.e. the number of pointers per node) of the B+ tree?
(A) 16
(B) 42
(C) 43
(D) 44
Answer: (A)
27. The Inorder traversal of the tree will yield a sorted listing of elements of tree in
(A) Binary tree
(B) Binary search tree
(C) Heaps
(D) None of the above
Answer: (B)
28. Mobile IP provides two basic functions.
(A) Route discovery and registration
(B) Agent discovery and registration
(C) IP binding and registration
(D) None of the above
Answer: (B)
29. Pre-emptive scheduling is the strategy of temporarily suspending a gunning process
(A) Before the CPU time slice expires
(B) To allow starving processes to run
(C) When it requests I/O
(D) To avoid collision
Answer: (A)
30. In round robin CPU scheduling as time quantum is increased the average turn around time
(A) Increases
(B) Decreases
(C) Remains constant
(D) Varies irregularly
Answer: (D)
31. Resources are allocated to the process on non-sharable basis is
(A) Mutual exclusion
(B) Hold and wait
(C) No pre-emption
(D) Circular wait
Answer: (A)
32. Cached and interleaved memories are ways of speeding up memory access between CPU’s and slower RAM. Which memory models are best suited (i.e. improves the performance most) for which programs ?
(i) Cached memory is best suited for small loops.
(ii) Interleaved memory is best suited for small loops
(iii) Interleaved memory is best suited for large sequential code.
(iv) Cached memory is best suited for large sequential code.
(A) (i) and (ii) are true.
(B) (i) and (iii) are true.
(C) (iv) and (ii) are true.
(D) (iv) and (iii) are true.
Answer: (B)
33. Consider the following page trace :
4,3, 2, 1, 4, 3, 5, 4, 3, 2, 1, 5
Percentage of page fault that would occur if FIFO page replacement algorithm is used with number of frames for the JOB m = 4 will be
(A) 8
(B) 9
(C) 10
(D) 12
Answer: (C)
34. Check sum used along with each packet computes the sum of the data, where data is treated as a sequence of
(A) Integer
(B) Character
(C) Real numbers
(D) Bits
Answer: (B)
35. If an integer needs two bytes of storage, then the maximum value of a signed integer is
(A) 216 – 1
(B) 215 – 1
(C) 216
(D) 215
Answer: (B)
36. Which of the following logic families is well suited for high-speed operations ?
(A) TTL
(B) ECL
(C) MOS
(D) CMOS
Answer: (B)
37. Interrupts which are initiated by an instruction are
(A) Internal
(B) External
(C) Hardware
(D) Software
Answer: (C)
38. printf(“%c”, 100);
(A) Prints 100
(B) Prints ASCII equivalent of 100
(C) Prints garbage
(D) None of the above
Answer: (B)
39. For the transmission of the signal, Bluetooth wireless technology uses
(A) Time division multiplexing
(B) Frequency division multiplexing
(C) Time division duplex
(D) Frequency division duplex
Answer: (C)
40. Consider the following statements:
I. Recursive languages are closed under complementation.
II. Recursively enumerable languages are closed under union.
III. Recursively enumerable languages are closed under complementation.
Which of the above statements are true ?
(A) I only
(B) I and II
(C) I and III
(D) II and III
Answer: (B)
41. What is the routing algorithm used by RIP and IGRP ?
(A) OSPF
(B) Link-state
(C) Dynamic
(D) Dijkestra vector
Answer: (D)
42. Identify the incorrect statement :
(A) The overall strategy drives the E-Commerce data warehousing strategy.
(B) Data warehousing in an E-Commerce environment should be done in a classical manner.
(C) E-Commerce opens up an entirely new world of web server.
(D) E-Commerce security threats can be grouped into three major categories.
Answer: (D)
43. Reliability of software is directly dependent on
(A) Quality of the design
(B) Number of errors present
(C) Software engineers experience
(D) User requirement
Answer: (B)
44. ______ is not an E-Commerce application.
(A) House banking
(B) Buying stocks
(C) Conducting an auction
(D) Evaluating an employee
Answer: (D)
45. ______ is a satellite based tracking system that enables the determination of person’s position.
(A) Bluetooth
(B) WAP
(C) Short Message Service
(D) Global Positioning System
Answer: (D)
46. A complete microcomputer system consists of
(A) Microprocessor
(B) Memory
(C) Peripheral equipment
(D) All of the above
Answer: (D)
47. Where does a computer add and compare data ?
(A) Hard disk
(B) Floppy disk
(C) CPU chip
(D) Memory chip
Answer: (C)
48. Pipelining strategy is called implement
(A) Instruction execution
(B) Instruction prefetch
(C) Instruction decoding
(D) Instruction manipulation
Answer: (B)
49. Which of the following data structure is linear type ?
(A) Strings
(B) Lists
(C) Queues
(D) All of the above
Answer: (D)
50. To represent hierarchical relationship between elements, which data structure is suitable ?
(A) Dequeue
(B) Priority
(C) Tree
(D) All of the above
Answer: (C)
Year Wise Solved UGC NET Computer Science and Applications Paper 2 Previous Year Question Papers
Year Wise NTA UGC NET Computer Science and Applications Solved question Papers from June 2006 till today are given below.
Download Year Wise NTA UGC NET Computer Science and Applications Paper 2 Solved Paper |
UGC NET Computer Science and Applications Paper 2 Solved Question Paper 2020 June |
UGC NET Computer Science and Applications Paper 2 Solved Question Paper 2019 December |
UGC NET Computer Science and Applications Paper 2 Solved Question Paper 2019 June |
UGC NET Computer Science and Applications Paper 2 Solved Question Paper 2018 December |
UGC NET Computer Science and Applications Paper 2 Solved Question Paper 2018 July |
UGC NET Computer Science and Applications Paper 2 Solved Question Paper 2017 November |
UGC NET Computer Science and Applications Paper 2 Solved Question Paper 2016 July |
UGC NET Computer Science and Applications Paper 2 Solved Question Paper 2015 June |
UGC NET Computer Science and Applications Paper 2 Solved Question Paper 2015 December |
UGC NET Computer Science and Applications Paper 2 Solved Question Paper 2014 June |
UGC NET Computer Science and Applications Paper 2 Solved Question Paper 2014 December |
UGC NET Computer Science and Applications Paper 2 Solved Question Paper 2013 December |
UGC NET Computer Science and Applications Paper 2 Solved Question Paper 2013 September |
UGC NET Computer Science and Applications Paper 2 Solved Question Paper 2013 June |
UGC NET Computer Science and Applications Paper 2 Solved Question Paper 2012 December |
UGC NET Computer Science and Applications Paper 2 Solved Question Paper 2012 June |
UGC NET Computer Science and Applications Paper 2 Solved Question Paper 2011 June |
UGC NET Computer Science and Applications Paper 2 Solved Question Paper 2011 December |
UGC NET Computer Science and Applications Paper 2 Solved Question Paper 2010 June |
UGC NET Computer Science and Applications Paper 2 Solved Question Paper 2010 December |
UGC NET Computer Science and Applications Paper 2 Solved Question Paper 2009 June |
UGC NET Computer Science and Applications Paper 2 Solved Question Paper 2009 December |
UGC NET Computer Science and Applications Paper 2 Solved Question Paper 2008 June |
UGC NET Computer Science and Applications Paper 2 Solved Question Paper 2008 December |
UGC NET Computer Science and Applications Paper 2 Solved Question Paper 2007 June |
UGC NET Computer Science and Applications Paper 2 Solved Question Paper 2007 December |
UGC NET Computer Science and Applications Paper 2 Solved Question Paper 2006 June |
UGC NET Computer Science and Applications Paper 2 Solved Question Paper 2006 December |
UGC NET Computer Science and Applications Paper 2 Solved Question Paper 2005 June |
UGC NET Computer Science and Applications Paper 2 Solved Question Paper 2005 December |
UGC NET Computer Science and Applications Paper 2 Solved Question Paper 2004 December |
We have covered the NTA UGC NET Computer Science and Applications Paper 2 Solved Question Paper 2012 June.
If you have any questions about NTA UGC NET Computer Science and Applications Solved Question Papers, please let us know in the comment section.