UGCNET Computer Science June 2013 Paper III
(A) ∀ x∃ y (succ(x, y) ∧ ( ∃ z succ(x, z) ⇒ equal (y, z)))
(B) ∀ x∃ y (succ(x, y) ∨ ( ∃ z succ(x, z) ⇒ equal (y, z)))
(C) ∃ y∀ x (succ(x, y) ∧ ( ∃ z succ(x, z) ⇒ equal (y, z)))
(D) ∀ x∃ y succ (x, y)
View Answer
Ans .
(A) ∀ x∃ y (succ(x, y) ∧ ( ∃ z succ(x, z) ⇒ equal (y, z)))
Explanation :
(A) Depth first search
(B) Best first search
(C) Minimax search
(D) Breadth first search
View Answer
Ans .
(C) Minimax search
Explanation :
(A) (i) and (iii)
(B) (i) and (iv)
(C) (ii) and (iii)
(D) (ii) and (iv)
View Answer
Ans .
(B) (i) and (iv)
Explanation :
(A) Knowledge Base
(B) Inference Engine
(C) Explanation Facility
(D) None of the above
View Answer
Ans .
(A) Knowledge Base
Explanation :
(A) Search technique
(B) Planning system
(C) Constraint satisfaction system
(D) Knowledge base system
View Answer
Ans .
(B) Planning system
Explanation :
(A) a forward search that can reduce the difference.
(B) a backward search that can reduce the difference.
(C) a bidirectional search that can reduce the difference.
(D) an operator that can reduce the difference.
View Answer
Ans .
(D) an operator that can reduce the difference.
Explanation :
(A) 0.05 second
(B) 0.1 second
(C) 0.2 second
(D) 2.0 second
View Answer
Ans .
(C) 0.2 second
Explanation :
(A) Network bits 7, Host bits 24
(B) Network bits 14, Host bits 16
(C) Network bits 15, Host bits 16
(D) Network bits 16, Host bits 16
View Answer
Ans .
(A) Network bits 7, Host bits 24
Explanation :
(A) TCP header length
(B) Window size
(C) Acknowledgement number
(D) Urgent pointer
View Answer
Ans .
(B) Window size
Explanation :
(A) 2500 bps
(B) 5000 bps
(C) 7500 bps
(D) 20000 bps
View Answer
Ans .
(C) 7500 bps
Explanation :
(A) (iii) (iv) (ii) (i)
(B) (iv) (iii) (ii) (i)
(C) (iv) (iii) (i) (ii)
(D) (iii) (iv) (i) (ii)
View Answer
Ans .
(C) (iv) (iii) (i) (ii)
Explanation :
(A) 201.14.78.32
(B) 201.14.78.64
(C) 201.14.78.65
(D) 201.14.78.224
View Answer
Ans .
(B) 201.14.78.64
Explanation :
(A) Alternative solution
(B) Infeasible solution
(C) Unbounded solution
(D) Degenerate solution
View Answer
Ans .
(B) Infeasible solution
Explanation :
(A) rows or columns
(B) rows + columns
(C) rows + columns – 1
(D) rows + columns + 1
View Answer
Ans .
(A) rows or columns
Explanation :
(A) 13
(B) 17
(C) 17
(D) 18
View Answer
Ans .
(C) 17
Explanation :
(A) S1 is correct and S2 is not correct.
(B) Both S1 and S2 are correct.
(C) Both S1 and S2 are not correct.
(D) S1 is not correct and S2 is correct.
View Answer
Ans .
(B) Both S1 and S2 are correct.
Explanation :
(A) S→aSb | S1; S1 → bS1a | λ
(B) S→aaS | S1; S1 → bSb | λ
(C) S→aSb | S1; S1 → S1ab | λ
(D) S→aaS | S1; S1 → bbS1 | λ
View Answer
Ans .
(D) S→aaS | S1; S1 → bbS1 | λ
Explanation :
(A) The language corresponding to the given grammar is a set of even number of a’s.
(B) The language corresponding to the given grammar is a set of odd number of a’s.
(C) The language corresponding to the given grammar is a set of even number of a’s followed by odd number of b’s.
(D) The language corresponding to the given grammar is a set of odd number of a’s followed by even number of b’s.
View Answer
Ans .
(B) The language corresponding to the given grammar is a set of odd number of a’s.
Explanation :
(A) L(abb*a)
(B) {a} U L(abb*a)
(C) L(ab*a)
(D) {a} U L(ab*a)
View Answer
Ans .
(B) {a} U L(abb*a)
Explanation :
(A) Context free but not linear
(B) Context free and linear
(C) Not Context free and not linear
(D) Not Context free but linear
View Answer
Ans .
(A) Context free but not linear
Explanation :
(A) S1 is correct and S2 is not correct.
(B) Both S1 and S2 are correct.
(C) Both S1 and S2 are not correct.
(D) S1 is not correct and S2 is correct.
View Answer
Ans .
(B) Both S1 and S2 are correct.
Explanation :
(A) δ(q0, λ, z) = { (q1, z)}; δ(q0, a, S) = { (q1, SS)}, (q1, B) } δ(q0, b, B) = { (q1, λ)}, δ(q1, λ, z) = { (qf, λ)}
(B) δ(q0, λ, z) = { (q1, Sz)}; δ(q0, a, S) = { (q1, SS)}, (q1, B) } δ(q0, b, B) = { (q1, λ)}, δ(q1, λ, z) = { (qf, λ)}
(C) δ(q0, λ, z) = { (q1, Sz)} δ(q0, a, S) = { (q1, S)}, (q1, B) } δ(q0, b, λ) = { (q1, B)}, δ(q1, λ, z) = { (qf, λ)}
(D) δ(q0, λ, z) = { (q1, z)}; δ(q0, a, S) = { (q1, SS)}, (q1, B) } (q0, b, λ) = { (q1, B)}, δ(q1, λ, z) = { (qf, λ)}
View Answer
Ans .
(B) δ(q0, λ, z) = { (q1, Sz)}; δ(q0, a, S) = { (q1, SS)}, (q1, B) } δ(q0, b, B) = { (q1, λ)}, δ(q1, λ, z) = { (qf, λ)}
Explanation :
(A) (iii) (iv) (ii) (i)
(B) (iv) (iii) (ii) (i)
(C) (iv) (iii) (i) (ii)
(D) (iii) (iv) (i) (ii)
View Answer
Ans .
(A) (iii) (iv) (ii) (i)
Explanation :
(A) Logical Integrity
(B) Referential Integrity
(C) Domain Integrity
(D) Data Integrity
View Answer
Ans .
(B) Referential Integrity
Explanation :
(A) All branches that have greater assets than some branch located in Mumbai.
(B) All branches that have greater assets than all branches in Mumbai.
(C) The branch that has greatest asset in Mumbai.
(D) Any branch that has greater assets than any branch in Mumbai.
View Answer
Ans .
(A) All branches that have greater assets than some branch located in Mumbai.
Explanation :
View Answer
Ans .
(A)
Explanation :
View Answer
Ans .
(D)
Explanation :
(A) w(n + 1)=w(n)+η[d(n)-y(n)]
(B) w(n + 1)=w(n)–η[d(n)-y(n)]
(C) w(n + 1)=w(n)+η[d(n)-y(n)]* x (n)
(D) w(n + 1)=w(n)–η[d(n)-y(n)]* x (n)
View Answer
Ans .
(C) w(n + 1)=w(n)+η[d(n)-y(n)]* x (n)
Explanation :
(A) Fault
(B) Failure
(C) Defect
(D) Error
View Answer
Ans .
(D) Error
Explanation :
(A) DTL
(B) TTL
(C) ECL
(D) CMOS
View Answer
Ans .
(D) CMOS
Explanation :
(A) Diode
(B) Resistor
(C) Transistor
(D) Inductor
View Answer
Ans .
(D) Inductor
Explanation :
(A) 28
(B) 214
(C) 26
(D) 212
View Answer
Ans .
(B) 214
Explanation :
(A) Based Relative
(B) Based Indexed
(C) Indexed Relative
(D) Register Indexed
View Answer
Ans .
(B) Based Indexed
Explanation :
(A) 34 mW
(B) 43 mW
(C) 4/3 mW
(D) 12 mW
View Answer
Ans .
(D) 12 mW
Explanation :
(A) RA = 40.4 KΩ, RB = 17.25 KΩ, C = 2000 pF
(B) RA = 17.25 KΩ, RB = 40.4 KΩ, C = 2000 pF
(C) RA = 40.4 KΩ, RB = 17.25 KΩ, C = 5000 pF
(D) RA = 17.25 KΩ, RB = 40.4 KΩ, C = 5000 pF
View Answer
Ans .
Marks given to all
Explanation :
(A) 16382
(B) 8191
(C) 512
(D) 14
View Answer
Ans .
(D) 14
Explanation :
(A) O(Ig n)
(B) O(n)
(C) O(n Ig n)
(D) O(n2 )
View Answer
Ans .
(C) O(n Ig n)
Explanation :
(A) At least 23
(B) At least 183
(C) At least 366
(D) At least 730
View Answer
Ans .
(A) At least 23
Explanation :
(A) O(n)
(B) θ(n Ig n)
(C) Ω(2n)
(D) None of the above
View Answer
Ans .
(C) Ω(2n)
Explanation :
(A) O(n)
(B) O(n Ig n)
(C) O(n2)
(D) None of the above
View Answer
Ans .
(B) O(n Ig n)
Explanation :
(A) 2.65
(B) 2.70
(C) 2.75
(D) 2.80
View Answer
Ans .
(C) 2.75
Explanation :
(A) S1 is correct and S2 is not correct.
(B) Both S1 and S2 are correct.
(C) Both S1 and S2 are not correct.
(D) S1 is not correct and S2 is correct.
View Answer
Ans .
(C) Both S1 and S2 are not correct.
Explanation :
(A) 10 per CPU hr.
(B) 0.1 per CPU hr.
(C) –0.1 per CPU hr.
(D) 90 per CPU hr
View Answer
Ans .
(C) –0.1 per CPU hr.
Explanation :
(A) Corrective maintenance
(B) Perfective maintenance
(C) Adaptive maintenance
(D) Code maintenance
View Answer
Ans .
(B) Perfective maintenance
Explanation :
(A) Data coupling
(B) Stamp coupling
(C) Control coupling
(D) Content coupling
View Answer
Ans .
(B) Stamp coupling
Explanation :
(A) {t(customer_name) | t∈ borrow[?] t[amount]>12000}
(B) {t |t(customer_name) | t∈ borrow[?] t[amount]>12000}
(C) {t |[?] ∈ borrow (t(customer_name=s(customer_ name))[?] [amount]>12000}
(D) {t |[?] ∈ borrow (t(customer_name)[?] s[amount] >12000}
View Answer
Ans .
(C) {t |[?] ∈ borrow (t(customer_name=s(customer_ name))[?] [amount]>12000}
Explanation :
(A) (iii) (iv) (i) (ii)
(B) (iv) (iii) (ii) (i)
(C) (iv) (iii) (i) (ii)
(D) (iii) (iv) (ii) (i)
View Answer
Ans .
(A) (iii) (iv) (i) (ii)
Explanation :
(A) (iii) (iv) (ii) (i)
(B) (iv) (iii) (ii) (i)
(C) (ii) (iii) (iv) (i)
(D) (iii) (iv) (i) (ii)
View Answer
Ans .
(C) (ii) (iii) (iv) (i)
Explanation :
(A) Rs 25,200
(B) Rs 20,160
(C) Rs 25,160
(D) Rs 20,400
View Answer
Ans .
(B) Rs 20,160
Explanation :
(A) Both are identical.
(B) The first is a correct declaration and the second is wrong.
(C) Both are different ways of declaring pointer to a function.
(D) The first declaration is a function returning a pointer to an integer and the second is a pointer to function returning integer.
View Answer
Ans .
(D) The first declaration is a function returning a pointer to an integer and the second is a pointer to function returning integer.
Explanation :
(A) Derived class constructor is followed by Base class constructor.
(B) Base class constructor is followed by Derived class constructor.
(C) Base class constructor is never called.
(D) Derived class constructor is never called.
View Answer
Ans .
(B) Base class constructor is followed by Derived class constructor.
Explanation :
(A) 15
(B) 25
(C) 45
(D) 20
View Answer
Ans .
(D) 20
Explanation :
(A) 2; 0.005; D
(B) 1; 0.005; D
(C) 2; 0.005; E
(D) 1; 0.005; e
View Answer
Ans .
(A) 2; 0.005; D
Explanation :
(A) Temporal
(B) Voice
(C) Spatial
(D) Redundant
View Answer
Ans .
(D) Redundant
Explanation :
(A) 1111110000
(B) 1111111010
(C) 111111000
(D) 111111
View Answer
Ans .
(C) 111111000
Explanation :
(A) Public Key of user A
(B) Public Key of user B
(C) Private Key of user A
(D) Private Key of user B
View Answer
Ans .
(B) Public Key of user B
Explanation :
(A) Proxy firewall
(B) Firewall
(C) Packet filter firewall
(D) Message digest firewall
View Answer
Ans .
(A) Proxy firewall
Explanation :
(A) (i) and (ii)
(B) (iii) and (iv)
(C) (i), (ii) and (iii)
(D) (i), (ii), (iii) and (iv)
View Answer
Ans .
(D) (i), (ii), (iii) and (iv)
Explanation :
(A) (i) and (ii)
(B) (ii) and (iii)
(C) (i) only
(D) (iii) only
View Answer
Ans .
(C) (i) only
Explanation :
(A) (i) and (ii)
(B) (ii) and (iii)
(C) (i) only
(D) (ii) only
View Answer
Ans .
(A) (i) and (ii)
Explanation :
(A) Hue, Saturation, Value and Hue, Lightness, Saturation.
(B) High, Standard, Value and High, Lightness, Saturation.
(C) Highly, Saturated, Value and Highly, Lightened, Saturation.
(D) Highly, Standard, Value and Hue, Lightness, Saturation.
View Answer
Ans .
(A) Hue, Saturation, Value and Hue, Lightness, Saturation.
Explanation :
(A) x(t)= 2+7t, y(t) = 3+7t 0 ≤ t ≤ ∝
(B) x(t)=2+10t, y(t) = 3+12t 0 ≤ t ≤ 1
(C) x(t)= 2+3t, y(t)=3+t 0 ≤ t ≤ 1
(D) t(x, y) = 14t 0 ≤ t ≤ 1
View Answer
Ans .
(C) x(t)= 2+3t, y(t)=3+t 0 ≤ t ≤ 1
Explanation :
(A) X-axis
(B) Y-axis
(C) Z-axis
(D) All of the above
View Answer
Ans .
(C) Z-axis
Explanation :
(A) p1 becomes a dangling pointer
(B) p2 becomes a dangling pointer
(C) Both p1 and p2 are now dangling pointers
(D) Neither p1 nor p2 is now a dangling pointer
View Answer
Ans .
(B) p2 becomes a dangling pointer
Explanation :
(A) Both C and C++ allow functions for which parameters are not type checked.
(B) Both C and C++ allow functions for which parameters are type checked.
(C) Both C and C++ allow functions for which parameters are not type checked and also the union types in these languages are not type checked.
(D) Union types in these (C and C++) languages are not type checked.
View Answer
Ans .
(C) Both C and C++ allow functions for which parameters are not type checked and also the union types in these languages are not type checked.
Explanation :
(A) call and exit
(B) call and fail
(C) call, exit and redo
(D) call, exit, redo and fail
View Answer
Ans .
(D) call, exit, redo and fail
Explanation :
(A) Distributed system represents a global view of the network and considers it as a virtual uni-processor system by controlling and managing resources across the network on all the sites.
(B) Distributed system is built on bare machine, not an add-on to the existing software.
(C) In a distributed system, kernel provides smallest possible set of services on which other services are built. This kernel is called microkernel. Open servers provide other services and access to shared resources.
(D) In a distributed system, if a user wants to run the program on other nodes or share the resources on remote sites due to their beneficial aspects, user has to log on to that site.
View Answer
Ans .
(D) In a distributed system, if a user wants to run the program on other nodes or share the resources on remote sites due to their beneficial aspects, user has to log on to that site.
Explanation :
(A) Only request (i)
(B) Only request (ii)
(C) Only request (iii)
(D) Request (i) and (ii)
View Answer
Ans .
(C) Only request (iii)
Explanation :
(A) 8.4 ms
(B) 12.4 ms
(C) 9.2 ms
(D) 9.4 ms
View Answer
Ans .
(A) 8.4 ms
Explanation :
(A) 8 and 9
(B) 10 and 11
(C) 7 and 9
(D) 9 and 8
View Answer
Ans .
(D) 9 and 8
Explanation :
(A) for i in my first script { echo –i $i}
(B) for my first script; do echo –n; done
(C) for i in my first script; do echo –i $i; done
(D) for n in my first script; do echo –i $i; done
View Answer
Ans .
(C) for i in my first script; do echo –i $i; done
Explanation :
(A) processor management
(B) user interface
(C) device management
(D) virtual memory management
View Answer
Ans .
(D) virtual memory management
Explanation :
(A) (i) (iii) (ii) (iv)
(B) (iv) (iii) (ii) (i)
(C) (ii) (iii) (iv) (i)
(D) (iii) (ii) (i) (iv)
View Answer
Ans .
(C) (ii) (iii) (iv) (i)
Explanation :
(A) Major strength of UNIX Operating System is its open standards which enabled large number of organizations ranging from academicia to industries to participate in its development.
(B) UNIX kernel uses modules with well specified interfaces and provides advantages like simplified testing and maintenance of kernel. It has better extensibility as the kernel is not monolithic.
(C) UNIX is kernel based operating system with two main components viz. process management subsystem and file management subsystem.
(D) All devices are represented as files which simplify the management of I/O devices and files. The directories structure used is directed acyclic graph.
View Answer
Ans .
(B) UNIX kernel uses modules with well specified interfaces and provides advantages like simplified testing and maintenance of kernel. It has better extensibility as the kernel is not monolithic.
Explanation :