## UGC NET June-2019 CS Paper-2

 Question 1
How many are there to place 8 indistinguishable balls into four distinguishable bins?
 A 70 B 165 C 8​ C​ 4 D 8​ P​ 4T
Question 1 Explanation:
This is precisely the problem we saw to solve the r-combination with repetition:
= C(8+4-1,8)
= 11 C​ 8
= 11! / (8!(11-8)!)
= 165
 Question 2
Match List-I with List-II:
List-I                                                                          List-II
(Software process Models)                             (Software System)
(a) Waterfall model                        (i) e-business that starts with only the basic functionality and then moves on to more advanced
features.
(b) Incremental development       (ii) An inventory control system for a supermarket to be developed in a highway
(c) Prototyping                              (iii) A virtual reality system for simulating vehicle navigation in a highway.
(d) RAD                              (iv) Automate the manual system for student record maintenance in a school
Choose the correct option from those given below:
 A (a)-(ii),(b)-(iv),(c)-(i),(d)-(iii) B (a)-(i),(b)-(iii),(c)-(iv),(d)-(ii) C (a)-(iii),(b)-(ii),(c)-(iv),(d)-(i) D (a)-(iv),(b)-(i),(c)-(iii),(d)-(ii)
Question 2 Explanation:
Waterfall model→ Automate the manual system for student record maintenance in a school
Incremental development→ e-business that starts with only the basic functionality and then moves on to more advanced features.
Prototyping→ A virtual reality system for simulating vehicle navigation in a highway.
RAD→ An inventory control system for a supermarket to be developed in a highway
 Question 3
A computer has six tapes drives with n processes competing for them. Each process may need two drives. What is the maximum value of n for the system to be deadlock free?
 A 5 B 4 C 3 D 6
Question 3 Explanation:
Each process needs 2 drives. So for deadlock just give each process one drive. So total 6 process can be given 1 drive each and can cause deadlock. So to break deadlock just reduce 1 process.
So maximum no. of process for the system to be deadlock free is 5.
 Question 4
In the context of 3D computer graphics, which of the following statements is/are TRUE?
P: Orthographics transformations keep parallel lines parallel
Q: Orthographic transformations are affine transformations
Select the correct answer from the options given below:
 A Both P and Q B Neither P and Q C Only P D Only Q
 Question 5
Which of the following statements are DMl statements?
(a) Update [tablename]
Set [ columnname] = VALUE
(b) Delete [tablename]
(c) Select * from [tablename]
 A (a) and (b) B (a) and (d) C (a), (b) and (c) D (b) and (c)
Question 5 Explanation:
 Question 6
What percentage(%) of the IPv4, IP address space do all class C addresses consume?
 A 12.5% B 25% C 37.5% D 50%
Question 6 Explanation:
Total possible IP numbers numbers of all classes 0 to 255.
Class-A: 0 to 127. It means 50%
Class-B: 128 to 191. It means 25%
Class-C: 192 to 223. It means 12.5 %
Class-D: 224 to 239. It means 6.25%
Class-E: 240 to 255. It means 6.25%
 Question 7
Which of the following key constraints is required for functioning of foreign key in the context of relational database?
 A Unique key B Primary key C candidate key D Check key
Question 7 Explanation:
Foreign key is a key whose values depends on the primary key of a relation. So for the functioning of a foreign key in the context of relational database we need a primary key.
 Question 8
Software Reuse is
 A The process of analysing software with the objective of recovering its design and specification B The process of existing software artifacts and knowledge to build new software C Concerned with reimplementing legacy system to make them more maintainable D The process of analysing software to create a representation of a higher level of abstraction and breaking software down into its parts to see how it works
Question 8 Explanation:
Software Reuse is the process of existing software artifacts and knowledge to build new software.
 Question 9
Which of the following is principal conjunctive normal form for [(pVq) ∧ ~p → ~q]?
 A pV~q B pVq C ~p Vq D ~p V ~q
Question 9 Explanation:
 Question 10
Match List-I with List-II
List-I                          List-II
(a) p → q                (i) ¬(q → ¬p)
(b) p v q                  (ii) p ∧ ¬q
(c) p ∧ q                  (iii) ¬p → q
(d) ¬(p → q)            (iv) ¬p v q
Choose the correct option from those given below:
 A (a)-(ii);(b)-(iii);(c)-(i);(d)-(iv) B (a)-(ii);(b)-(i);(c)-(iii);(d)-(iv) C (a)-(iv);(b)-(i);(c)-(iii);(d)-(ii) D (a)-(iv);(b)-(iii);(c)-(i);(d)-(ii)
Question 10 Explanation:
 Question 11
Consider the following methods:
M​ 1 ​ : mean of maximum
M​ 2​ : Centre of area
M​ 3​ : Height method
Which of the following is/are defuzzification method(s)?
 A Only M​ 1 B Only M​ 1​ and M​ 2 C Only M​ 2​and M​ 3 D M​ 1​ , M​ 2​ and M​ 3
Question 11 Explanation:
Defuzzication Methods: Following defuzzication methods are known to calculate crisp output → Maxima Methods
1.Height method
2.First of maxima (FoM)
3.Last of maxima (LoM)
4.Mean of maxima(MoM)
→ Centroid methods:
1. Center of gravity method (CoG)
2. Center of sum method (CoS)
3. Center of area method (CoA)
→ Weighted average method
 Question 12
Replacing the expression 4*2.14 by 8.56 is known as
 A Constant folding B Induction variable C Strength reduction D Code reduction
Question 12 Explanation:
Take variable i=4*2.14
We are simply folding the value into 8.56 because to avoid multiplication costly operation.
 Question 13
A fuzzy conjunction operator denoted as t(x,y) and fuzzy disjunction operator denoted as s(x,Y) form dual pair if they satisfy the condition:
 A t(x,y)= 1-s(x,y) B t(x,y)=s(1-x,1-y) C t(x,y)=1-s(1-x,1-y) D t(x,y)=s(1+x,1+y)
Question 13 Explanation:
 Question 14
Which data structure is used by the compiler for managing variables and their attributes?
 A Binary tree B link list C Symbol table D Parse table
Question 14 Explanation:
Symbol tables are data structures that are used by compilers to hold information about source-program constructs. The information is collected incrementally by the analysis phases of a compiler and used by the synthesis phases to generate the target code. Entries in the symbol table contains information about an identifier such as its character string (or lexeme) , its type,its position in storage, and any other relevant information.
 Question 15
Which type of addressing mode, less number of memory references are required?
 A Immediate B Implied C register D indexed E None of the above
Question 15 Explanation:
Excluded for evaluation
 Question 16
How many different Boolean functions of degree n are there?
 A 2​2n B (2​2​)​2 C 2​2n-1 D 2n
Question 16 Explanation:
There are 2​ n​ different n-tuples of 0s and 1s.
A Boolean function is an assignment of 0 or 1 to each of these 2​ n​ different n-tuples.
Therefore, there are 2​ 2^n different Boolean functions.
Example: How many different Boolean functions of degree 4 are there?
Solution: 16
 Question 17
Consider the equation (146)​ b​ + (313)​ b-2​ = (246)​ 8​ . Which of the following is the value of b?
 A 8 B 7 C 10 D 16
Question 17 Explanation:
(146)7+(317)7-2=(246)8
Substitute 7 in b,
(146)7+(317)7-2=(246)8
(146)7+(317)5=(246)8
(146)7=1*72+4*71+6*70
=49+28+6
=83
(317)5=3*52+1*51+7*50
=75+5+7
= 87
(246)8=2*82+4*81+6*80
=128+32+6
= 166
∴ (146)7+(317)5=(246)8
=83+87
=166
166=166
LHS = RHS equal only if b is 7.
 Question 18
Match List-I with List-II
List-I                                  List-II
(a) Disk                         (i) Thread
(b) CPU                         (ii) Signal
(c) Memory                  (iii) File System
(d) Interrupt                 (iv) Virtual address
Choose the correct option from those given below:
 A (a)-(i); (b)-(ii); (c)-(iii); (d)-(iv) B (a)-(iii); (b)-(i); (c)-(iv); (d)-(ii) C (a)-(ii); (b)-(i); (c)-(iv); (d)-(iii) D (a)-(ii); (b)-(iv); (c)-(iii);(d)-(i)
Question 18 Explanation:
Disk--> File system