UGC NET June-2019 CS Paper-2

Question 1
How many are there to place 8 indistinguishable balls into four distinguishable bins?
A
70
B
165
C
8​ C​ 4
D
8​ P​ 4T
Question 1 Explanation: 
This is precisely the problem we saw to solve the r-combination with repetition:
= C(8+4-1,8)
= 11 C​ 8
= 11! / (8!(11-8)!)
= 165
Question 2
Match List-I with List-II:
List-I                                                                          List-II
(Software process Models)                             (Software System)
(a) Waterfall model                        (i) e-business that starts with only the basic functionality and then moves on to more advanced
                                                                  features.
(b) Incremental development       (ii) An inventory control system for a supermarket to be developed in a highway
(c) Prototyping                              (iii) A virtual reality system for simulating vehicle navigation in a highway.
(d) RAD                              (iv) Automate the manual system for student record maintenance in a school
Choose the correct option from those given below:
A
(a)-(ii),(b)-(iv),(c)-(i),(d)-(iii)
B
(a)-(i),(b)-(iii),(c)-(iv),(d)-(ii)
C
(a)-(iii),(b)-(ii),(c)-(iv),(d)-(i)
D
(a)-(iv),(b)-(i),(c)-(iii),(d)-(ii)
Question 2 Explanation: 
Waterfall model→ Automate the manual system for student record maintenance in a school
Incremental development→ e-business that starts with only the basic functionality and then moves on to more advanced features.
Prototyping→ A virtual reality system for simulating vehicle navigation in a highway.
RAD→ An inventory control system for a supermarket to be developed in a highway
Question 3
A computer has six tapes drives with n processes competing for them. Each process may need two drives. What is the maximum value of n for the system to be deadlock free?
A
5
B
4
C
3
D
6
Question 3 Explanation: 
Each process needs 2 drives. So for deadlock just give each process one drive. So total 6 process can be given 1 drive each and can cause deadlock. So to break deadlock just reduce 1 process.
So maximum no. of process for the system to be deadlock free is 5.
Question 4
In the context of 3D computer graphics, which of the following statements is/are TRUE?
P: Orthographics transformations keep parallel lines parallel
Q: Orthographic transformations are affine transformations
Select the correct answer from the options given below:
A
Both P and Q
B
Neither P and Q
C
Only P
D
Only Q
Question 5
Which of the following statements are DMl statements?
(a) Update [tablename]
Set [ columnname] = VALUE
(b) Delete [tablename]
(c) Select * from [tablename]
A
(a) and (b)
B
(a) and (d)
C
(a), (b) and (c)
D
(b) and (c)
Question 5 Explanation: 
Question 6
What percentage(%) of the IPv4, IP address space do all class C addresses consume?
A
12.5%
B
25%
C
37.5%
D
50%
Question 6 Explanation: 
Total possible IP numbers numbers of all classes 0 to 255.
Class-A: 0 to 127. It means 50%
Class-B: 128 to 191. It means 25%
Class-C: 192 to 223. It means 12.5 %
Class-D: 224 to 239. It means 6.25%
Class-E: 240 to 255. It means 6.25%
Question 7
Which of the following key constraints is required for functioning of foreign key in the context of relational database?
A
Unique key
B
Primary key
C
candidate key
D
Check key
Question 7 Explanation: 
Foreign key is a key whose values depends on the primary key of a relation. So for the functioning of a foreign key in the context of relational database we need a primary key.
Question 8
Software Reuse is
A
The process of analysing software with the objective of recovering its design and specification
B
The process of existing software artifacts and knowledge to build new software
C
Concerned with reimplementing legacy system to make them more maintainable
D
The process of analysing software to create a representation of a higher level of abstraction and breaking software down into its parts to see how it works
Question 8 Explanation: 
Software Reuse is the process of existing software artifacts and knowledge to build new software.
Question 9
Which of the following is principal conjunctive normal form for [(pVq) ∧ ~p → ~q]?
A
pV~q
B
pVq
C
~p Vq
D
~p V ~q
Question 9 Explanation: 
Question 10
Match List-I with List-II
List-I                          List-II
(a) p → q                (i) ¬(q → ¬p)
(b) p v q                  (ii) p ∧ ¬q
(c) p ∧ q                  (iii) ¬p → q
(d) ¬(p → q)            (iv) ¬p v q
Choose the correct option from those given below:
A
(a)-(ii);(b)-(iii);(c)-(i);(d)-(iv)
B
(a)-(ii);(b)-(i);(c)-(iii);(d)-(iv)
C
(a)-(iv);(b)-(i);(c)-(iii);(d)-(ii)
D
(a)-(iv);(b)-(iii);(c)-(i);(d)-(ii)
Question 10 Explanation: 
Question 11
Consider the following methods:
M​ 1 ​ : mean of maximum
M​ 2​ : Centre of area
M​ 3​ : Height method
Which of the following is/are defuzzification method(s)?
A
Only M​ 1
B
Only M​ 1​ and M​ 2
C
Only M​ 2​and M​ 3
D
M​ 1​ , M​ 2​ and M​ 3
Question 11 Explanation: 
Defuzzication Methods: Following defuzzication methods are known to calculate crisp output → Maxima Methods
1.Height method
2.First of maxima (FoM)
3.Last of maxima (LoM)
4.Mean of maxima(MoM)
→ Centroid methods:
1. Center of gravity method (CoG)
2. Center of sum method (CoS)
3. Center of area method (CoA)
→ Weighted average method
Question 12
Replacing the expression 4*2.14 by 8.56 is known as
A
Constant folding
B
Induction variable
C
Strength reduction
D
Code reduction
Question 12 Explanation: 
Take variable i=4*2.14
We are simply folding the value into 8.56 because to avoid multiplication costly operation.
Question 13
A fuzzy conjunction operator denoted as t(x,y) and fuzzy disjunction operator denoted as s(x,Y) form dual pair if they satisfy the condition:
A
t(x,y)= 1-s(x,y)
B
t(x,y)=s(1-x,1-y)
C
t(x,y)=1-s(1-x,1-y)
D
t(x,y)=s(1+x,1+y)
Question 13 Explanation: 
Question 14
Which data structure is used by the compiler for managing variables and their attributes?
A
Binary tree
B
link list
C
Symbol table
D
Parse table
Question 14 Explanation: 
Symbol tables are data structures that are used by compilers to hold information about source-program constructs. The information is collected incrementally by the analysis phases of a compiler and used by the synthesis phases to generate the target code. Entries in the symbol table contains information about an identifier such as its character string (or lexeme) , its type,its position in storage, and any other relevant information.
Question 15
Which type of addressing mode, less number of memory references are required?
A
Immediate
B
Implied
C
register
D
indexed
E
None of the above
Question 15 Explanation: 
Excluded for evaluation
Question 16
How many different Boolean functions of degree n are there?
A
2​2n
B
(2​2​)​2
C
2​2n-1
D
2n
Question 16 Explanation: 
There are 2​ n​ different n-tuples of 0s and 1s.
A Boolean function is an assignment of 0 or 1 to each of these 2​ n​ different n-tuples.
Therefore, there are 2​ 2^n different Boolean functions.
Example: How many different Boolean functions of degree 4 are there?
Solution: 16
Question 17
Consider the equation (146)​ b​ + (313)​ b-2​ = (246)​ 8​ . Which of the following is the value of b?
A
8
B
7
C
10
D
16
Question 17 Explanation: 
(146)7+(317)7-2=(246)8
Substitute 7 in b,
(146)7+(317)7-2=(246)8
(146)7+(317)5=(246)8
(146)7=1*72+4*71+6*70
=49+28+6
=83
(317)5=3*52+1*51+7*50
=75+5+7
= 87
(246)8=2*82+4*81+6*80
=128+32+6
= 166
∴ (146)7+(317)5=(246)8
=83+87
=166
166=166
LHS = RHS equal only if b is 7.
Question 18
Match List-I with List-II
List-I                                  List-II
(a) Disk                         (i) Thread
(b) CPU                         (ii) Signal
(c) Memory                  (iii) File System
(d) Interrupt                 (iv) Virtual address
Choose the correct option from those given below:
A
(a)-(i); (b)-(ii); (c)-(iii); (d)-(iv)
B
(a)-(iii); (b)-(i); (c)-(iv); (d)-(ii)
C
(a)-(ii); (b)-(i); (c)-(iv); (d)-(iii)
D
(a)-(ii); (b)-(iv); (c)-(iii);(d)-(i)
Question 18 Explanation: 
Disk--> File system
CPU → Thread
memory → Virtual address space
Interrupt → Signal
Question 19
In the TCP/IP model, encryption and decryption are functions of ____ layer
A
data link
B
network
C
Transport
D
Application
Question 19 Explanation: 
encryption and decryption are functions of presentation layer in the OSI reference model. Here, they were given TCP/IP model. It combines Session, presentation and Application layers into Application layer.
Question 20
Suppose that a connected planar graph has six vertices, each of degrees four. Into how many regions is the plane divided by a planar representation of this graph?
A
6
B
8
C
12
D
10
Question 20 Explanation: 
We apply Euler’s formula where r = e−v + 2.
Since each vertex has degree 4, the sum of the degrees is 24.
By the handshaking theorem, 2e = 24 .
so, e = 12.
r = 12−6 + 2
r = 8
Thus we have 8 regions in this planar graph.
Question 21
Consider a disk system with 100 cylinders. The requests to access the cylinders occur in the following sequence:
4,34,10,7,19,73,2,15,6,20
Assuming that the head is current at cylinder 50, what is the time taken to satisfy all requests if it takes 1ms to move from the cylinder to adjacent one and the shortest seek time first policy is used?
A
357 ms
B
238 ms
C
276 ms
D
119 ms
Question 21 Explanation: 
Question 22
Which of the following problems is/are decidable problem(s) (recursively enumerable) on a Turing machine M?
(a) G is a CFG with L(G)=∅
(b) There exist two TMs M​1​ and M2​ such that L(M) ⊆{L(M​1​)UL(M​2​)}= language of all TMs
(c) M is a TM that accepts w using a most 2​|w|​ cells of tape
A
(a) and (b) only
B
(a) only
C
(a), (b) and (c)
D
(c) only
Question 22 Explanation: 
(a): L(G)=∅ is a emptiness problem and emptiness problem for context free languages is decidable.

(b): Recursive: The reason is we can assume L(M2)=∑* and hence any TM (M1) will be definitely subset of L(M2). So we only need to see that M1 is a valid Turing machine and no need to check whether it is subset of L(M2) as it is obviously subset of L(M2)=∑*. Checking validity of Turing machine is always a halting process, hence it is recursive.

(c): L={(M,w)|M is a TM that accepts w using at most 2|w| squares of its tape}.
Recursive: Let m be he number of states in M, and k be the size of the alphabet that M uses, and r=|w|. If M uses at most 2r squares of its tape, then there are at most Alpha=mK2r 2r configurations(why?). If M runs on w for more than α steps, and does not use more than 2r squares of its tape, then M must be in the one configuration at least twice(pigeonhole principle), in which case M would enter an infinite loop on input w. Based on this, we design a machine M* that decides L that works as follows:
M* runs M on w for at most α+1 steps.
If M accepts w which steps with using at most 2r squares, M* halts and accepts.
If M rejects w within α steps with using at most 2r squares, M* halts and rejects.
If M goes beyond 2r squares, M* halts and rejects.
If M does not halt and does not go beyond 2r squares, M* rejects.
Note: To know the definition of configurations and the details, reader may refer to "Introduction to theory of computation Michael Sipser, Chapter 8 Space complexity)
Question 23
Consider Euler's Φ function given by
Φ(n)=nπp|n(1-(1/p))
Where p runs over all the primes dividing n. What is the value of Φ(45)?
A
3
B
12
C
6
D
24
Question 23 Explanation: 
Φ(45) → Φ(9*5)
→ Φ(32 * 5)
→ Φ(32) * Φ(5)
→ Φ(32 - 3,(2-1)) * (5-1)
= 24
Remember Formula:
If p is prime then Φ(p) = (p-1)
and if p is not prime and it's in prime power k from then Φ(pk) = pk - p(k-1)
Question 24
Consider double hashing of the form
h(k,i)=(h​ 1​ (k)+ih​ 2​ (k)) mod m
Where h​ 1​ (k)=k mod m
h​ 2​ (k)=1+(k mod n)
Where n=m-1and m=701
for k=123456, what is the difference between first and second probes in terms of slots?
A
255
B
256
C
257
D
258
Question 24 Explanation: 
Given h(k,i)=h1(k)+ih2(k)
where h1(k)=k mod m
h2(k)=1+k mod n
where n=m-1 and m=701. For k=123456
h1(k)=123456 mod 701
h1(k)=80
h2(k)=1+(123456 mod 700)
h2(k)=1+256=257
1st probe: i=1
h(k,i)=h1(k)+ih2(k)
h(k,1)=h1(k)+ih2(k)
h(k,1)=80+257=337
h(k,1)=337
2nd probe: i=2
h(k,2)=80+2257
h(k,2)=80+514
h(k,2)=594
∴ Difference h(k,2)-h(k,1)
594-337
257
There are 24 questions to complete.

Access quiz wise question and answers by becoming as a solutions adda PRO SUBSCRIBER with Ad-Free content

Register Now

If you have registered and made your payment please contact solutionsadda.in@gmail.com to get access