NTA UGC NET Dec 2024 Paper-2
Question 1 |
Which are often needed to evaluate the cache performance?
Hit Ratio | |
Latency | |
Cache Traces | |
Transfer Rate |
Question 2 |
If x and y are elements in a group G and if x5 = y3= e, where e is the identity of G, then the
inverse of x2yx4y2 must be
y2xy2x4 | |
yxy2x3 | |
yx6y6x3 | |
x4y2x2y |
Question 3 |
Consider a noiseless channel with a bandwidth of 5000Hz transmitting a signal with two signal
levels. The maximum bit rate is
2500 bps | |
10000 bps | |
5000 bps | |
20000 bps |
Question 4 |
Arrange the 2-D viewing transformation pipeline.
A. Convert to viewing coordinates
B. Map viewing coordinates to normalized viewing coordinates using window - viewpoint specifications
C. Construct world - coordinates scene using modeling - coordinates transformations
D. Map normalized viewpoint to device coordinates
Choose the correct answer from the options given below:
A. Convert to viewing coordinates
B. Map viewing coordinates to normalized viewing coordinates using window - viewpoint specifications
C. Construct world - coordinates scene using modeling - coordinates transformations
D. Map normalized viewpoint to device coordinates
Choose the correct answer from the options given below:
D,C,B,A
| |
D,C,A,B
| |
D,A,B,C | |
B,C,A,D |
Question 5 |
Which of the following uses only increment operations for adding and removing element at either end?
Queues | |
Stacks | |
Priority Queues | |
Deques |
Question 6 |
Identify the correct statements from the following regarding spiral model.
A. Spiral model is an incremental process model.
B. Spiral model is a risk - driven process mode.
C. Spiral model is an acyclic balancing approach.
D. Spiral model involves a set of anchor point milestone.
Choose the correct answer from the options given below:
A. Spiral model is an incremental process model.
B. Spiral model is a risk - driven process mode.
C. Spiral model is an acyclic balancing approach.
D. Spiral model involves a set of anchor point milestone.
Choose the correct answer from the options given below:
A & B only | |
B & C only | |
A & D only | |
B & D only |
Question 7 |
The kind of symbols for basic syntactic elements of first-order logic are
A. Constant
B. Domain
C. Predicate
D. Temporal
E. Function
Choose the correct answer from the options given below:
A. Constant
B. Domain
C. Predicate
D. Temporal
E. Function
Choose the correct answer from the options given below:
B, D only
| |
A, B, C only | |
A, C, E only
| |
C, D only |
Question 8 |
What will be the right sequence of the phases of database design-
A. Physical Design,br> B. Conceptual Design
C. Logical Design
D. Requirement collection and analysis
Choose the correct answer from the options given below:
A. Physical Design,br> B. Conceptual Design
C. Logical Design
D. Requirement collection and analysis
Choose the correct answer from the options given below:
D,A,B,C
| |
D,B,C,A | |
D,B,A,C | |
D,A,C,B |
Question 9 |
Which of the following is TRUE about the Pumping Lemma for regular language?
It applies to all regular language | |
It applies only to infinite regular languages | |
It applies to all context - free languages | |
It applies to all recursively enumerable languages |
Question 10 |
Arrange the following steps of the DHCP (Dynamic Host Control Protocol) process in the correct
- sequence.
A. DHC PACK
B. DHCP DISCOVER
C, DHCP OFFER
D, DHCP REQUEST
E. Client receives IP configuration
Choose the correct answer from the options given below:
A. DHC PACK
B. DHCP DISCOVER
C, DHCP OFFER
D, DHCP REQUEST
E. Client receives IP configuration
Choose the correct answer from the options given below:
A,B,C,D,E | |
B,C,D,A,E | |
C,B,A,E,D | |
D,A,E,C,B
|
Question 11 |
Match the LIST-I with LIST-II
Choose the correct answer from the options given below:
LIST-I | LIST-II | ||
A | Predictable Risk | I | Strategic Risk |
B | Business Risk | II | Staffing and organisation |
C | Project Risk | III | Implementation |
D | Past Project | IV | Past Project Experience |
Choose the correct answer from the options given below:
A-IV, B-III, C-I, D-II
| |
A-III, B-II, C-I, D-lV | |
A-I, B-lV, C-III, D-II | |
A-IV, B-I, C-ll, D-III |
Question 12 |
In concurrency control, phantom problem may occur, when-
records are inserted | |
records are deleted | |
records are modified | |
records are indexed |
Question 13 |
Which of the following statement is not True?
A data member of a class can be declared as static and is normally used to maintain values
common to the entire class. | |
A friend function can be invoked like a normal function without the help of any object. | |
The scope resolution operator (::) can overloaded like normal operators | |
Multiple may lead to duplication of inherited members from a "Grandparent"
base class. This may be avoided by making the common base class a virtual base class.
|
Question 14 |
Which table for a dynamic pipeline become more interesting when a nonlinear pattern is follows?
Reservation Table | |
Confusion Table | |
Inverted Table | |
Greedy Table
|
Question 15 |
Regarding the code optimization, choose the correct sequence
A. Algebraic Simplification
B. Use of machine idioms
C. Redundant - instruction elimination
D. Flow of control optimization
E. Improved target code
Choose the correct answer from the options given below:
A. Algebraic Simplification
B. Use of machine idioms
C. Redundant - instruction elimination
D. Flow of control optimization
E. Improved target code
Choose the correct answer from the options given below:
A,C,B,D,E
| |
B,C,D,A,E | |
C,D,A,B,E
| |
D,B,A,C,E |
Question 16 |
Consider the following statements regarding multiple access techniques & identify the
CORRECT ones.
A. ALOHA is used for multiple access on a shared medium
B, TDMA uses WALSH TABLES for time slot allocation
C. CSMA/CD was invented for wireless networks
D. CDMA codes are sequence of number generated by orthogonal codes
Choose the correct answer from the options given below:
A. ALOHA is used for multiple access on a shared medium
B, TDMA uses WALSH TABLES for time slot allocation
C. CSMA/CD was invented for wireless networks
D. CDMA codes are sequence of number generated by orthogonal codes
Choose the correct answer from the options given below:
A & B only | |
B & C only | |
C & D only | |
A & D only |
Question 17 |
INSERT command is used to
A. add a single tuple to a relation
B. add multiple tuples to a relation
C. add values to specific attributes
D. insert new table
Choose the correct answer from the options given below:
A. add a single tuple to a relation
B. add multiple tuples to a relation
C. add values to specific attributes
D. insert new table
Choose the correct answer from the options given below:
A only
| |
A, B only | |
A, B, C only | |
B, C, D only |
Question 18 |
Consider a pipeline unit for fixed - point multiplication of 8-bit integers.
Arrange the following stages in a correct sequence,
Stage A : Consists of two CSAs and it merges four numbers from previous stage.
Stage B : is a CPA, which adds up the two numbers
Stage C : is made upto two level of four CSAs.
Stage D : Generates eight partial products.
Choose the correct answer from the options given below.
Arrange the following stages in a correct sequence,
Stage A : Consists of two CSAs and it merges four numbers from previous stage.
Stage B : is a CPA, which adds up the two numbers
Stage C : is made upto two level of four CSAs.
Stage D : Generates eight partial products.
Choose the correct answer from the options given below.
C,A,B,D
| |
D,C,A,B | |
B,D,C,A | |
A,C,D,B |
Question 19 |
Choose the correct statements from the following
A. In connection-oriented service, the destination address is to be specified only during the setup
B. Packet sequencing is not guaranteed in connection-oriented service
C. Flooding is method in which every incoming packet is sent out on every outgoing Line except the one by which it arrived.
D. Presentation layer performs detection and recovery from errors in the transmitted data
Choose the correct answer from the options given below:
A. In connection-oriented service, the destination address is to be specified only during the setup
B. Packet sequencing is not guaranteed in connection-oriented service
C. Flooding is method in which every incoming packet is sent out on every outgoing Line except the one by which it arrived.
D. Presentation layer performs detection and recovery from errors in the transmitted data
Choose the correct answer from the options given below:
A, B & C only
| |
B, C & D only | |
A & C only | |
A, C & D only
|
Question 20 |
Which of the following algorithms are based on the Breadth First Search (BFS) ?
A. Prim's algorithms
B. Kruskal algorithms
C. Dijkstra algorithms
D. Greedy algorithms
E. Dynamic Programming
Choose the correct answer from the options given below:
A. Prim's algorithms
B. Kruskal algorithms
C. Dijkstra algorithms
D. Greedy algorithms
E. Dynamic Programming
Choose the correct answer from the options given below:
A & B only
| |
A, C & D only | |
D & E only | |
A & C only
|
Question 21 |
Match the LIST-I with LIST-II
Choose the correct answer from the options given below:
LIST-I | LIST-II | ||
A | Breadth First Search | I | LISP |
B | Depth First Search | II | Syntax tree |
C | Prefix | III | Stack |
D | Infix | IV | Queue |
Choose the correct answer from the options given below:
A-III, B-IV,C-I, D-II
| |
A-III, B-lV, C-II, D-l | |
A-IV, B-II, C-III, D-l | |
A-IV, B-III, C-I, D-II |
Question 22 |
Match the LIST-I with LIST-II
Match the logical equivalence propositions
Match the logical equivalence propositions
LIST-I | LIST-II | ||
A | p -> q | I | (p^q)V(~p^~q) |
B | ~(p V (~p^q)) | II | ~pVq |
C | (p < – > q) | III | ~(pVq) |
D | ~(p < – > q) | IV | ~p <-> q |
A-I, B-III, C-II, D-lV
| |
A-I, B-II, C-III, D-lV | |
A-II, B-III, C-I, D-lV | |
A-II, B-III, C-IV, D-l
|
Question 23 |
What is the correct sequence of steps used by knowledge base designing?
A. Ask questions about the intended interpretation.
B, Chose task domain or world to represent.
C. Select atoms to represent propositions of Interest.
D. Tells the system propositions that are true in the intended interpretation/axiomatizing the domain.
Choose the correct answer from the options given below:
A. Ask questions about the intended interpretation.
B, Chose task domain or world to represent.
C. Select atoms to represent propositions of Interest.
D. Tells the system propositions that are true in the intended interpretation/axiomatizing the domain.
Choose the correct answer from the options given below:
A,B,C,D | |
B,C,D,A | |
C,D,A,B | |
D,A,B,C
|
Question 24 |
Choose the correct statement(s)
A. A problem which is NP-Complete will have the property that it can be solved in polynomial time iff all other NP-complete problems can also be solved in polynomial time.
B. All NP-complete problem are NP-hard problems.
C. If an NP-hard problem can be solved in polynomial time, then all NP-complete problem can be solved in polynomial time
D. All NP-hard-problems are not NP-complete.
Choose the correct answer from the options given below:
A. A problem which is NP-Complete will have the property that it can be solved in polynomial time iff all other NP-complete problems can also be solved in polynomial time.
B. All NP-complete problem are NP-hard problems.
C. If an NP-hard problem can be solved in polynomial time, then all NP-complete problem can be solved in polynomial time
D. All NP-hard-problems are not NP-complete.
Choose the correct answer from the options given below:
A, C only | |
B, D only | |
A, B, C only | |
A,B,C,D
|
Question 25 |
The characteristics of modern programming are :
A. Each module should do only one thing.
B. Communication between modules is allowed only by a calling module
C. Communication can take place directly between modules that do not have calling - called relationship.
D. All modules are designed as single-entry, single exit systems using control structure.
Chose the correct answer from the options given below:
A. Each module should do only one thing.
B. Communication between modules is allowed only by a calling module
C. Communication can take place directly between modules that do not have calling - called relationship.
D. All modules are designed as single-entry, single exit systems using control structure.
Chose the correct answer from the options given below:
A, B & C only
| |
A, B & D only | |
A, C & D only | |
C & D only
|