NTA UGC NET Computer Science and Applications Paper 3 Solved Question Paper 2013 September

NTA UGC NET Computer Science and Applications Paper 3 Solved Question Paper 2013 September: To score better marks in the NTA UGC NET Computer Science and Applications, you should have depth knowledge of the entire subject.

You can boost your preparation by referring to NTA UGC NET Computer Science and Applications Paper 3 Solved Question Paper 2013 September. It will give you information about the important chapters and concepts covered in all chapters.

You must have NTA UGC NET Computer Science and Applications Solved Question Papers along with the latest Computer Science and Applications Syllabus to enhance your semester exam preparation.

Here we have provided you with the complete guide on NTA UGC NET Computer Science and Applications Paper 3 Solved Question Paper 2013 September.

NTA UGC NET Computer Science and Applications Paper 3 Solved Question Paper 2013 September

NTA UGC NET Computer Science and Applications Paper 3 Solved Question Papers are the best study materials to score good marks in the Computer Science and Applications exam.

Practicing these NTA UGC NET Computer Science and Applications paper 3 Previous Year Question papers assist the students in getting a clear idea about the question paper pattern and types of questions asked in the exam.

You can check the complete NTA UGC NET Computer Science and Applications Paper 3 Solved Question Paper 2013 September.


1. Which of the following is a correct predicate logic statement for “Every Natural number has one successor”?

(A) ∀x∃y (succ(x, y) ∧ (∃z succ(x, z) ⇒ equal (y, z)))

(B) ∀x∃y (succ(x, y) ∨ (∃z succ(x, z) ⇒ equal (y, z)))

(C) ∃y∀x (succ(x, y) ∧ (∃z succ(x, z) ⇒ equal (y, z)))

(D) ∀x∃ysucc (x, y)

Answer: (A)

2. α – β cutoffs are applied to ______

(A) Depth first search

(B) Best first search

(C) Minimax search

(D) Breadth first search

Answer: (C)

3. Assume that each alphabet can have a value between 0 to 9 in a

CROSS

+ROADS

cryptoarithmetic problem        – – – – – – – –

DANGER

– – – – – – – – .

Which of the following statement is true?

(i) No two alphabets can have the same numeric value.

(ii) Any two alphabets may have the same numeric value.

(iii) D = 0

(iv) D = 1

(A) (i) and (iii)

(B) (i) and (iv)

(C) (ii) and (iii)

(D) (ii) and (iv)

Answer: (B)

4. Which of the following is not a part of an expert system shell?

(A) Knowledge Base

(B) Inference Engine

(C) Explanation Facility

(D) None of the above

Answer: (A)

 

5. The Blocks World Problem in Artificial Intelligence is normally discussed to explain a _______

(A) Search technique

(B) Planning system

(C) Constraint satisfaction system

(D) Knowledge base system

Answer: (B)

6. Means-Ends Analysis process centres on the detection of difference between the current state and the goal state. Once such a difference is found, and then to reduce the difference one applies ______

(A) A forward search that can reduce the difference.

(B) A backward search that can reduce the difference.

(C) A bidirectional search that can reduce the difference.

(D) An operator that can reduce the difference.

Answer: (D)

7. Suppose a file of 10,000 characters is to be sent over a line at 2400 bps. Assume that the data is sent in frames. Each frame consists of 1000 characters and an overhead of 48 bits per frame. Using synchronous transmission, the total overhead time is ______.

(A) 0.05 second

(B) 0.1 second

(C) 0.2 second

(D) 2.0 second

Answer: (C)

8. Which of the following is the size of Network bits and Host bits of Class Aof IP address?

(A) Network bits 7, Host bits 24

(B) Network bits 14, Host bits 16

(C) Network bits 15, Host bits 16

(D) Network bits 16, Host bits 16

Answer: (A)

9. Which of the following field of the TCP header tells how many bytes may be sent starting at the byte acknowledged?

(A) TCP header length

(B) Window size

(C) Acknowledgement number

(D) Urgent pointer

Answer: (B)

10. Which of the following is a bit rate of an 8-PSK signal having 2500 Hz bandwidth?

(A) 2500 bps

(B) 5000 bps

(C) 7500 bps

(D) 20000 bps

Answer: (C)

11. Match the following:

(a) UDP           (i) Message Transfer Protocol

(b) OSPF         (ii) Bit-oriented Protocol

(c) SMTP         (iii) Interior Gateway Routing Protocol

(d) HDLC       (iv) Connectionless Transport Protocol

Codes:

(a)        (b)        (c)        (d)

(A)       (iii)       (iv)       (ii)        (i)

(B)       (iv)       (iii)       (ii)        (i)

(C)       (iv)       (iii)       (i)         (ii)

(D)       (iii)       (iv)       (i)         (ii)

Answer: (C)

12. Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224. What is the subnet address?

(A) 201.14.78.32

(B) 201.14.78.64

(C) 201.14.78.65

(D) 201.14.78.224

Answer: (B)

13. If an artificial variable is present in the ‘basic variable’ of optimal simplex table then the solution is ______

(A) Alternative solution

(B) Infeasible solution

(C) Unbounded solution

(D) Degenerate solution

Answer: (B)

14. An optimal assignment requires that the minimum number of horizontal and vertical lines that can be drawn to cover all zeros be equal to the number of

(A) Rows or columns

(B) Rows + columns

(C) Rows + columns – 1

(D) Rows + columns + 1

Answer: (A)

15. Which of the following is the minimum cost for an assignment problem given below?

Jobs

A B C D
Workers I 5 3 2 8
II 7 9 2 6
III 6 4 5 7
IV 5 7 7 8

(A) 13

(B) 16

(C) 17

(D) 18

Answer: (C)

16. Assume, L is regular language. Let statements S1 and S2 are defined as:

S1: SQRT (L) = {x| for some y with |y| = |x|2, xy∈L}.

S2: LOG (L) = {x| for some y with |y| = 2|x|, xy∈ L}.

Which of the following is true?

(A) S1 is correct and S2 is not correct.

(B) Both S1 and S2 are correct.

(C) Both S1 and S2 are not correct.

(D) S1 is not correct and S2 is correct.

Answer: (B)

17. A regular grammar for the language L = {anbm | n is even and m is even} is given by

(A) S→aSb | S1; S1 → bS1a | λ

(B) S→aaS | S1; S1 → bSb | λ

(C) S→aSb | S1; S1 → S1ab | λ

(D) S→aaS | S1; S1 → bbS1 | λ

Answer: (D)

18. Given the following productions of a grammar:

S→ aA| aBB;

A→aaA |λ;

B→ bB| bbC;

C→ B

Which of the following is true?

(A) The language corresponding to the given grammar is a set of even number of a’s.

(B) The language corresponding to the given grammar is a set of odd number of a’s.

(C) The language corresponding to the given grammar is a set of even number of a’s followed by odd number of b’s.

(D) The language corresponding to the given grammar is a set of odd number ofa’s followed by even number of b’s.

Answer: (B)

19. The language accepted by the nondeterministic pushdown automaton

M= ({q0, q1, q2}, {a, b}, {a, b, z}, δ, q0, z, {q2}) with transitions

δ (q0 a, z) = { (q1 a), (q2 λ)};

δ (q1, b, a) = { (q1, b)}

δ (q1, b, b) ={ (q1 b)}, δ (q1, a, b) = { (q2, λ)} is

(A) L(abb*a)

(B) {a} U L(abb*a)

(C) L(ab*a)

(D) {a} U L(ab*a)

Answer: (B)

20. The language L = {an bn am bm | n ≥ 0, m ≥ 0} is

(A) Context free but not linear

(B) Context free and linear

(C) Not Context free and not linear

(D) Not Context free but linear

Answer: (A)

21. Assume statements S1 and S2 defined as:

S1: L2-L1 is recursive enumerable where L1 and L2 are recursive and recursive enumerable respectively.

S2: The set of all Turing machines is countable.

Which of the following is true?

(A) S1 is correct and S2 is not correct.

(B) Both S1 and S2 are correct.

(C) Both S1 and S2 are not correct.

(D) S1 is not correct and S2 is correct.

Answer: (B)

22. Non-deterministic pushdown automaton that accepts the language generated by the grammar: S→aSS | ab is

(A)       δ(q0, λ, z) = { (q1, z)};

δ(q0, a, S) = { (q1, SS)}, (q1, B) }

δ(q0, b, B) = { (q1, λ)},

δ(q1, λ, z) = { (qf, λ)}

(B)       δ(q0, λ, z) = { (q1, Sz)};

δ(q0, a, S) = { (q1, SS)}, (q1, B) }

δ(q0, b, B) = { (q1, λ)},

δ(q1, λ, z) = { (qf, λ)}

(C)       δ(q0, λ, z) = { (q1, Sz)};

δ(q0, a, S) = { (q1, S)}, (q1, B) }

δ(q0, b, λ) = { (q1, B)},

δ(q1, λ, z) = { (qf, λ)}

(D)       δ(q0, λ, z) = { (q1, z)};

δ(q0, a, S) = { (q1, SS)}, (q1, B) }

δ(q0, b, λ) = { (q1, B)},

δ(q1, λ, z) = { (qf, λ)}

Answer: (B)

23. Match the following:

(a) Dangling pointer                (i) Buffer replacement policy

(b) Page fault                          (ii) Variable length records

(c) List representation             (iii) Object identifier

(d) Toss immediate                 (iv) Pointer-swizzling

Codes:

(a)        (b)        (c)        (d)

(A)       (iii)       (iv)       (ii)        (i)

(B)       (iv)       (iii)       (ii)        (i)

(C)       (iv)       (iii)       (i)         (ii)

(D)       (iii)       (iv)       (i)         (ii)

Answer: (A)

24. _______ constraints ensure that a value that appears in one relation for a given set of attributes also appears for a certain set of attributes in another relation.

(A) Logical Integrity

(B) Referential Integrity

(C) Domain Integrity

(D) Data Integrity

Answer: (B)

25. The SQL expression

Select distinct T, branch_name from branch T, branch S

where T.assets>S.assets and S.branch_city=”Mumbai” finds the names of

(A) All branches that have greater assets than some branch located in Mumbai.

(B) All branches that have greater assets than all branches in Mumbai.

(C) The branch that has greatest asset in Mumbai.

(D) Any branch that has greater assets than any branch in Mumbai.

Answer: (A)

26. Let A be the set of comfortable houses given as

A = {x1/0.8, x2/0.9, x3/0.1, x4/0.7} and B be the set of affordable houses B = {x1/0.9, x2/0.8, x3/0.6, x4/0.2}

Then the set of comfortable and affordable houses is

(A) {x1/0.8, x2/0.8, x3/0.1, x4/0.2}

(B) {x1/0.9, x2/0.9, x3/0.6, x4/0.7}

(C) {x1/0.8, x2/0.8, x3/0.6, x4/0.7}

(D) {x1/0.7, x2/0.7, x3/0.7, x4/0.9}

Answer: (A)

27. Support of a fuzzy set

A = { x1/0.2, x2/0.15, x3/0.9, x4/0.95, x5/0.15} within a universal set X is given as

(A) {x1/0.15, x2/0.15, x3/0.15, x4/0.15, x5/0.15}

(B) {x1/0.95, x2/0.95, x3/0.95, x4/0.95, x5/0.95}

(C) {x3, x4}

(D) {x1, x2, x3, x4, x5}

Answer: (D)

28. In a single perceptron, the updation rule of weight vector is given by

(A) W(n + 1)=w(n)+η[d(n)-y(n)]

(B) W(n + 1) =w(n)–η[d(n)-y(n)]

(C) w(n + 1)=w(n)+η[d(n)-y(n)]* x (n)

(D) w(n + 1)=w(n)–η[d(n)-y(n)]* x (n)

Answer: (C)

29. ______ refers to the discrepancy among a computed, observed or measured value and the true specified or theoretically correct values.

(A) Fault

(B) Failure

(C) Defect

(D) Error

Answer: (D)

30. Which logic family dissipates the minimum power?

(A) DTL

(B) TTL

(C) ECL

(D) CMOS

Answer: (D)

31. Which of the following electronic component is not found in IC’s?

(A) Diode

(B) Resistor

(C) Transistor

(D) Inductor

Answer: (D)

32. A given memory chip has 14 address pins and 8 data pins. It has the following number of locations.

(A) 28

(B) 214

(C) 26

(D) 212

Answer: (B)

33. The instruction: MOV CL, [BX] [DI] + 8 represent the _____ addressing mode.

(A) Based Relative

(B) Based Indexed

(C) Indexed Relative

(D) Register Indexed

Answer: (B)

34. The power dissipation of a flip-flop is 3mW. The power dissipation of a digital system with 4 flip-flops is given by

(A) 34 mW

(B) 43 mW

(C) 4/3 mW

(D) 12 mW

Answer: (D)

35. An astable multivibrator using the 555 timer to generate a square wave of 5 KHz with 70% duty cycle will have

(A) RA = 40.4 KΩ, RB = 17.25 KΩ, C = 2000 pF

(B) RA = 17.25 KΩ, RB = 40.4 KΩ, C = 2000 pF

(C) RA = 40.4 KΩ, RB = 17.25 KΩ, C = 5000 pF

(D) RA = 17.25 KΩ, RB = 40.4 KΩ, C = 5000 pF

Answer: (Wrong question)

36. A binary ripple counter is required to count up to 16383. How many flip-flops are required?

(A) 16382

(B) 8191

(C) 512

(D) 14

Answer: (D)

37. The time complexity of recurrence relation

T(n) = T(n/3) + T(2n/3) + O(n) is

(A) O(Ig n)

(B) O(n)

(C) O(n Ig n)

(D) O(n2)

Answer: (C)

38. How many people must there be in a room before there is a 50% chance that two of them were born on the same day of the year?

(A) At least 23

(B) At least 183

(C) At least 366

(D) At least 730

Answer: (A)

39. The number of possible parenthesizations of a sequence of n matrices is

(A) O(n)

(B) θ(n Ig n)

(C) Ω(2n)

(D) None of the above

Answer: (C)

40. The time complexity of an efficient algorithm to find the longest monotonically increasing subsequence of n numbers is

(A) O(n)

(B) O(n Ig n)

(C) O(n2)

(D) None of the above

Answer: (B)

41. Given a binary search trees for a set of n=5 keys with the following probabilities:

i           0          1          2          3          4          5

pi         –          0.15     0.10     0.05     0.10     0.20

qi         0.05     0.10     0.05     0.05     0.05     0.10

The expected optimal cost of the search is

(A) 2.65

(B) 2.70

(C) 2.75

(D) 2.80

Answer: (C)

42. Given 0-1 knapsack problem and fractional knapsack problem and the following statements:

S1: 0-1 knapsack is efficiently solved using Greedy algorithm.

S2: Fractional knapsack is efficiently solved using Dynamic programming.

Which of the following is true?

(A) S1 is correct and S2 is not correct.

(B) Both S1 and S2 are correct.

(C) Both S1 and S2 are not correct.

(D) S1 is not correct and S2 is correct.

Answer: (C)

43. Equivalence class partitioning approach is used to divide the input domain into a set of equivalence classes, so that if a program works correctly for a value, then it will work correctly for all the other values in that class. This is used _____.

(A) To partition the program in the form of classes.

(B) To reduce the number of test cases required.

(C) For designing test cases in white box testing.

(D) all of the above.

Answer: (B)

44. The failure intensity for a basic model as a function of failures experienced is given as λ(μ)-λ0[1 – (μ)/(V0)] where λ0 is the initial failure intensity at the start of the execution, μ is the average or expected number of failures at a given point in time, the quantity V0 is the total number of failures that would occur in infinite time. Assume that a program will experience 100 failures in infinite time; the initial failure intensity was 10 failures/CPU hr. Then the decrement of failures intensity per failure will be

(A) 10 per CPU hr.

(B) 0.1 per CPU hr.

(C) –0.1 per CPU hr.

(D) 90 per CPU hr.

Answer: (C)

45. Improving processing efficiency or performance or restructuring of software to improve changeability is known as

(A) Corrective maintenance

(B) Perfective maintenance

(C) Adaptive maintenance

(D) Code maintenance

Answer: (B)

46. In ____, modules A and B make use of a common data type, but perhaps perform different operations on it.

(A) Data coupling

(B) Stamp coupling

(C) Control coupling

(D) Content coupling

Answer: (B)

47. Consider the following schemas:

Branch_Schema = (branch_name, assets, city)

Customer_Schema = (cutstomer_name, street, city)

Deposit_Schema = (branch_name,

account_number, customer_name, balance)

Borrow_Schema = (branch_name, loan_number, customer_name, amount)

This of the following tuple relational calculus finds all customers who have loan amount more than Rs. 12,000??

(A) {t(customer_name) | t∈borrow[?] t[amount]>12000}

(B) {t |t (customer_name) | t∈borrow[?] t[amount]>12000}

(C) {t |[?] ∈ borrow (t (customer_name=s (customer_ name))[?] [Amount]>12000}

(D) {t |[?] ∈ borrow (t (customer_name)[?] s[amount] >12000}

Answer: (C)

48. Match the following

(a) Create        (i) The E-R Model

(b) Select         (ii) Relationship Model

(c) Rectangle   (iii) DDL

(d) Record       (iv) DML

Codes:

(a)        (b)        (c)        (d)

(A)       (iii)       (iv)       (i)         (ii)

(B)       (iv)       (iii)       (ii)        (i)

(C)       (iv)       (iii)       (i)         (ii)

(D)       (iii)       (iv)       (ii)        (i)

Answer: (A)

49.

NTA UGC NET Computer Science and Applications Paper 3 Solved Question Paper 2012 June QN 49

Answer: (C)

50. Sixty (60) reusable components were available for an application. If only 70% of these components can be used, rest 30% would have to be developed from scratch. If average component is 100 LOC and cost of each LOC is Rs. 14, what will be the risk exposure if risk probability is 80%?

(A) Rs. 25,200

(B) Rs. 20,160

(C) Rs. 25,160

(D) Rs. 20,400

Answer: (B)

51. Consider the following two function declarations:

(i) int *f( )

(ii) int (*f)( )

Which of the following is true?

(A) Both are identical.

(B) The first is a correct declaration and the second is wrong.

(C) Both are different ways of declaring pointer to a function.

(D) The first declaration is a function returning a pointer to an integer and the second is a pointer to function returning integer.

Answer: (D)

52. Assume that we have constructor function for both Base and Derived classes. Now consider the declaration:

main ( )

Base *p = new Derived;

In what sequence, the constructor will be executed?

(A) Derived class constructor is followed by Base class constructor.

(B) Base class constructor is followed by Derived class constructor.

(C) Base class constructor is never called.

(D) Derived class constructor is never called.

Answer: (B)

53. What is the output of the following program?

#include<stdio.h>

main ( )

{

int a, b = 0;

static int c[10] = {1, 2, 3, 4, 5, 6, 7, 8, 9, 0};

for (a=0; a<10;++a);

if ((c[a]%2)= =0) b+=c[a];

printf(“%d”,b);

}

(A) 15

(B) 25

(C) 45

(D) 20

Answer: ()

54. A Program contains the following declarations and initial assignments

int i = 8, j = 5;

double x = 0.005, y = –0.01;

char c=’c’, d=’d’;

Determine the value of the following expressions which involve the use of library functions: abs(i-2*j) ; log(exp(x)) ; toupper(d)

(A) 2; 0.005; D

(B) 1; 0.005; D

(C) 2; 0.005; E

(D) 1; 0.005; e

Answer: (A)

55. MPEG involves both spatial compression and temporal compression. The spatial compression is similar to JPEG and temporal compression removes ______ frames.

(A) Temporal

(B) Voice

(C) Spatial

(D) Redundant

Answer: (D)

56. If the data unit is 111111 and the divisor is 1010. In CRC method, what is the dividend at the transmission before division?

(A) 1111110000

(B) 1111111010

(C) 111111000

(D) 111111

Answer: (C)

57. If user A wants to send an encrypted message to user B. The plain text of A is encrypted with the _______.

(A) Public Key of user A

(B) Public Key of user B

(C) Private Key of user A

(D) Private Key of user B

Answer: (B)

58. A _____ can forward or block packets based on the information in the network layer and transport layer header.

(A) Proxy firewall

(B) Firewall

(C) Packet filter firewall

(D) Message digests firewall

Answer: (A)

59. Which of the following graphics devices are known as active graphics devices?

(i) Alphanumeric devices

(ii) Thumb wheels

(iii) Digitizers

(iv) Joystics

(A) (i) and (ii)

(B) (iii) and (iv)

(C) (i), (ii) and (iii)

(D) (i), (ii), (iii) and (iv)

Answer: (D)

60. A diametric projection is said to be trimetric projection when

(i) Two of the three foreshortening factors are equal and third is arbitrary.

(ii) All of the three foreshortening factors are equal.

(iii) All of the three foreshortening factors are arbitrary.

Which of the above is true?

(A) (i) and (ii)

(B) (ii) and (iii)

(C) (i) only

(D) (iii) only

Answer: (C)

61. Which of the following is/are fundamental method(s) of antialiasing?

(i) Increase of sample rate.

(ii) Treating a pixel as a finite area rather than as a point.

(iii) Decrease of sample rate.

(A) (i) and (ii)

(B) (ii) and (iii)

(C) (i) only

(D) (ii) only

Answer: (A)

62. The two color systems – the HSV and HLS are

(A) Hue, Saturation, Value and Hue, Lightness, Saturation.

(B) High, Standard, Value and High, Lightness, Saturation.

(C) Highly, Saturated, Value and Highly, Lightened, Saturation.

(D) Highly, Standard, Value and Hue, Lightness, Saturation.

Answer: (A)

63. The parametric representation of the line segment between the position vectors P1(2, 3) and P2(5, 4) is given as

(A) x (t)= 2+7t, y(t) = 3+7t 0 ≤ t ≤ ∝

(B) x (t)=2+10t, y(t) = 3+12t 0 ≤ t ≤ 1

(C) x (t)= 2+3t, y(t)=3+t 0 ≤ t ≤ 1

(D) t(x, y) = 14t 0 ≤ t ≤ 1

Answer: (C)

64.

NTA UGC NET Computer Science and Applications Paper 3 Solved Question Paper 2012 June QN 64

Answer: ()

65. Consider the following sequence of operations:

(i) Pointer p1 is set to point at a new heap-dynamic variable.

(ii) Pointer p2 is assigned p1’s value.

(iii) The heap dynamic variable pointed to by p1 is explicitly de-allocated, but p2 is not changed by the operation.

This situation leads to which of the following:

(A) p1 becomes a dangling pointer

(B) p2 becomes a dangling pointer

(C) Both p1 and p2 are now dangling pointers

(D) Neither p1 nor p2 is now a dangling pointer

Answer: (B)

66. The programming languages C and C++ are not strongly typed languages because:

(A) Both C and C++ allow functions for which parameters are not type checked.

(B) Both C and C++ allow functions for which parameters are type checked.

(C) Both C and C++ allow functions for which parameters are not type checked and also the union types in these languages are not type checked.

(D) Union types in these (C and C++) languages are not type checked.

Answer: (C)

67. The tracing model in Prolog describes program execution in terms of certain events. These events are

(A) Call and exit

(B) Call and fail

(C) Call, exit and redo

(D) Call, exit, redo and fail

Answer: (D)

68. Which of the following statements is not correct with reference to distributed systems?

(A) Distributed system represents a global view of the network and considers it as a virtual uniprocessor system by controlling and managing resources across the network on all the sites.

(B) Distributed system is built on bare machine, not an add-on to the existing software.

(C) In a distributed system, kernel provides smallest possible set of services on which other services are built. This kernel is called microkernel. Open servers provide other services and access to shared resources.

(D) In a distributed system, if a user wants to run the program on other nodes or share the resources on remote sites due to their beneficial aspects, user has to log on to that site.

Answer: (D)

69. A system contains 10 units of resource of same type. The resource requirement and current allocation of these resources for three processes P, Q and R are as follows:

P Q R
Maximum requirement 8 7 5
Current allocation 4 1 3

Now, consider the following resource requests:

(i) P makes a request for 2 resource units.

(ii) Q makes request for 2 resources units.

(iii) R makes a request of 2 resource units.

For a safe state, which of the following options must be satisfied?

(A) Only request (i)

(B) Only request (ii)

(C) Only request (iii)

(D) Request (i) and (ii)

Answer: (C)

70. Consider the following set of processes with the length of CPU burst time in milliseconds (ms) :

Process A B C D E
Burst time 6 1 2 1 5
Priority 3 1 3 4 2

Assume that processes are stored in ready queue in following order :

A – B – C – D – E

Using round robin scheduling with time slice of 1 ms, the average turn around time is

(A) 8.4 ms

(B) 12.4 ms

(C) 9.2 ms

(D) 9.4 ms

Answer: (A)

71. Consider a main memory with 3 page frames for the following page reference string:

5, 4, 3, 2, 1, 4, 3, 5, 4, 3, 4, 1, 4

Assuming that the execution of process is initiated after loading page 5 in memory, the number of page faults in FIFO and second chance replacement respectively are

(A) 8 and 9

(B) 10 and 11

(C) 7 and 9

(D) 9 and 8

Answer: (D)

72. Which of the following shell scripts will produce the output “my first script”?

(A) For i in my first script {echo –i $i}

(B) For my first script; do echo –n; done

(C) For i in my first script; do echo –i $i; done

(D) For n in my first script; do echo –i $i; done

Answer: (C)

73. The portion of Windows 2000 operating system which is not portable is

(A) Processor management

(B) User interface

(C) Device management

(D) Virtual memory management

Answer: (D)

74. Match the following for Windows Operating System:

(a) Hardware abstraction layer (i) Starting all processes, emulation of different operating systems, security functions, transform character based applications to graphical representation.

(b) Kernel (ii) Export a virtual memory interface, support for symmetric multiprocessing administration, details of mapping memory, configuring I/O buses, setting up DMA.

(c) Executive (iii) Thread scheduling, interrupt and exception handling, recovery after power failure.

(d) Win32 subsystem (iv) Object manager, virtual memory manager, process manager, plug and- play and power manager.

Codes:

(a)        (b)        (c)        (d)

(A)       (i)         (iii)       (ii)        (iv)

(B)       (iv)       (iii)       (ii)        (i)

(C)       (ii)        (iii)       (iv)       (i)

(D)       (iii)       (ii)        (i)         (iv)

Answer: (C)

75. Which of the following statements is not true for UNIX Operating System?

(A) Major strength of UNIX Operating System is its open standards which enabled large number of organizations ranging from academician to industries to participate in its development.

(B) UNIX kernel uses modules with well specified interfaces and provides advantages like simplified testing and maintenance of kernel. It has better extensibility as the kernel is not monolithic.

(C) UNIX is kernel based operating system with two main components viz. process management subsystem and file management subsystem.

(D) All devices are represented as files which simplify the management of I/O devices and files. The directories structure used is directed acyclic graph.

Answer: (B)


Year Wise Solved UGC NET Computer Science and Applications Paper 3 Previous Year Question Papers

The old UGC NET Examination paper-3 in Computer Science and Applications was of descriptive type till December 2011.

paper-3 becomes objective type from June 2012 to November 2017. From July 2018 onward, paper-3 was stopped and becomes part of paper-2 itself.

So, the old questions for paper-3 from June 2012 to November 2017 which were of objective type (multiple choice questions) can be used by the UGC NET aspirants for their better preparation for paper 2.

Year Wise NTA UGC NET Computer Science and Applications Paper 3 Solved Question Papers are given below.

Download Year Wise NTA UGC NET Computer Science and Applications paper 3 Solved Paper
UGC NET Computer Science and Applications Paper 3 Solved Question Paper 2017 November
UGC NET Computer Science and Applications Paper 3 Solved Question Paper 2016 July
UGC NET Computer Science and Applications Paper 3 Solved Question Paper 2015 June
UGC NET Computer Science and Applications Paper 3 Solved Question Paper 2015 December
UGC NET Computer Science and Applications Paper 3 Solved Question Paper 2014 June
UGC NET Computer Science and Applications Paper 3 Solved Question Paper 2014 December
UGC NET Computer Science and Applications Paper 3 Solved Question Paper 2013 December
UGC NET Computer Science and Applications Paper 3 Solved Question Paper 2013 September
UGC NET Computer Science and Applications Paper 3 Solved Question Paper 2013 June
UGC NET Computer Science and Applications Paper 3 Solved Question Paper 2012 December
UGC NET Computer Science and Applications Paper 3 Solved Question Paper 2012 June

We have covered the NTA UGC NET Computer Science and Applications Paper 3 Solved Question Paper 2013 September.

If you have any questions about NTA UGC NET Computer Science and Applications Paper 3 Solved Question Papers, please let us know in the comment section.

Leave a Comment

Your email address will not be published. Required fields are marked *