UGCNET Computer Science June 2015 Paper III



Ans .

(B) 00011001


  1. Explanation :

    Given 8 bit word 00111001. encoded in d8=0 d7=0 d6=1 d5=1 d4=1 d3=0 d2=0 d1=1.
    parity is calculated as 01111 which are written as p8p4p2p1.
    p1=1 p2=1 p4=1 p8=0
    encode the string as
    d8 d7 d6 d5 p8 d4 d3 d2 p4 d1 p2 p1.
    001101001111.
    check bit at other end is 1101.
    c1=1 c2=0 c4=1 c8=1.
    xor(1101,0111)=1010 . its decimal conversion is 10. so 10th bit is changed. 10th bit is d6.
    so we flip it. and we get 00011001





Ans .

(B) 4x106 bytes/sec


  1. Explanation :

    Minimum bus cycle duration = 4 clock cycle.
    maximum bus cycle rate= 8 MHZ/4= 2M/s where 1 MHZ= 1000000/sec.
    maximum data transferred per bus cycle rate= 2bytes.
    data transferred rate per second = data transferred per bus cycle* bus cycle rate.= 2bytes*2M/s





Ans .

(C) CALL 0038 H


  1. Explanation :

    smily face





Ans .

(C) ADOBE


  1. Explanation :

    010 for 2. 101 for 5 and similarly.
    so we organize every thing as.
    010101101000010111110.
    Now this binary representation is grouped in to 4 to get the Hexadecimal notation.
    0 1010 1101 0000 1011 1110 so after converting every group in HEX.
    we get ADOBE.





Ans .

(D) 250 Kbytes/sec


  1. Explanation :

    CPU speed 1MIPS=10^6 instruction per sec
    1 Cpu instruction =4 machine cycles(Avg)
    1 memory read/access = 1 machine cycle
    CPU utilization =90%
    Programmed I/O
    each byte transfer requires 4 cycles (instructions)
    in status
    check status
    Branch
    Read/Write data
    max data transfer rate CPU speed /4 = 10^6/4=250 kbytes/sec





Ans .

(B) 9


  1. Explanation :

    The number of flipflop required to design a Modulo 272 counter is Log2 272. 8 flips flops do the work up to 256. hence we need 9 flip flops to achieve the task.





Ans .

(B) 3


  1. Explanation :

    Let relation R1 is composed of table emp(ssn,name, Superssn). A query like this can be made from single table like. Find the employee ssn, name, super visor ssn, supervisor name from emp table. An ssn will map to a single supervisor and a supervisor can map to many employee.
    In many to many relationship like “a student can take many subjects and many students can take a subject”. it needs two table.eg. student(rollno,subject,name) where pk= roll no and subject. and fk = subject. Foreign key map to pk of subjet (Subjetid, Subjname, Roomno). Hence it required 3 tables





Ans .

(B) The average marks of male students is more than the average marks of the students in the University


  1. Explanation :





Ans .

(B) Lossless preserving decomposition into BCNF is always possible


  1. Explanation :

    Table 1(A,B,C) with FD AB->C and C->B cannot be preserved when decomposition is done





Ans .

(A) Non key attribute V_name is dependent on V_no which is part of composite key


  1. Explanation :

    for lossless decomposition .Atleast one of the following dependencies should be in F+.
    R1 intersction R2->R1. Eq. 1.
    or
    R1 intersection R2->R2. Eq2.
    when a decompostion satisfies eq 1. given above then that will solve the R1 intersection R2 –>>(R1-R2).
    when a decomposition satisfies eq2 given above then that will solve the R1 intersection R2 –>>(R2-R1).





Ans .

(C) (a) and (c) happens


  1. Explanation :





Ans .

(A) The number of blocks used for index, and the size of index


  1. Explanation :





Ans .

(A) Only one in the direction K


  1. Explanation :





Ans .

(C) A'=(-1, √2-1), B'=(-1, 2√2-1), C'=(3√2-1, (9/2)√2-1)


  1. Explanation :





Ans .

(D) Quantization


  1. Explanation :





Ans .

(B) POLYDRAW


  1. Explanation :

    Basic primitive of GKS are Polyline,polymarker, fillarea,text.





Ans .

(D) (d) only


  1. Explanation :

    In normalized device coordinate system lower left corner corresponds to (0,0) and upper rightcorner corresponds to (1,1).





Ans .

(A) (i) (ii) (iii) (iv) (v)


  1. Explanation :





Ans .

(D) 5 final states among 6 states


  1. Explanation :





Ans .

(C) (1 + 01)* (1 + 01)


  1. Explanation :

    Option A can yield string terminating with 0 hence it fails.
    Option D an yield string 1001. Hence it also fails.
    Option C. generates all string with length1,2,3,—– terminating with 1 and does not contain 00 substring.





Ans .

(D) q0 and q3 respectively


  1. Explanation :

    Accepted words are { ab, ba, aaab,abaa, aaba,bbba—–}
    A and b are of odd length. Hence from diagram from the above transitions. option D is correct.





Ans .

(A) A ∧ B ∧ C ⇒ D


  1. Explanation :

    ~Av(~Bv~C)vD.
    ~AV ~(B^C)VD.
    ~(A^B^C)VD.
    We know A-> B = ~AV B.
    So it turns out to be A^B^C->D.





Ans .

(B) PROLOG is a Strongly Typed Language.


  1. Explanation :





Ans .

(B) The resolvent of two Horn clauses is a Horn Clause.


  1. Explanation :





Ans .

(D) Circuit Switching


  1. Explanation :





Ans .

(A) FIN


  1. Explanation :





Ans .

(B) Transport and Tunnel


  1. Explanation :





Ans .

(C) OEWPNRCTTUEKMRO


  1. Explanation :

    smily face





Ans .

(C) 128 kbps


  1. Explanation :





Ans .

(C) 65,495


  1. Explanation :





Ans .

(D) Floyd-Warshall algorithm


  1. Explanation :





Ans .

(C) Exponential time using dynamic programming algorithm or branch-and-bound algorithm.


  1. Explanation :





Ans .

(A) lg(lg*n)


  1. Explanation :





Ans .

(C) 88


  1. Explanation :





Ans .

(D) θ(f(n) + g(n)) = max(f(n), g(n))


  1. Explanation :





Ans .

(D) ceil(n/zh+1)


  1. Explanation :





Ans .

(C) Public


  1. Explanation :





Ans .

(D) void setContextType(String Type)


  1. Explanation :





Ans .

(D) Applets are embedded in another applications.


  1. Explanation :





Ans .

(C) + * ?


  1. Explanation :

    + symbol for one or more time.
    * for 0 or more time.
    ? for zero or more time





Ans .

(A) Document Type Definition


  1. Explanation :





Ans .

(C) Encapsulation


  1. Explanation :

    The basic idea underlying modular design is to organize a complex system (such as a large program, an electronic circuit, or a mechanical device) as a set of distinct components that can be developed independently and then plugged together. Although this may appear a simple idea, experience shows that the effectiveness of the technique depends critically on the manner in which systems are divided into components and the mechanisms used to plug components together. The following design principles are particularly relevant to parallel programming. Ensure that modules hide information.
    related functions that can benefit from a common implementation or that are used in many parts of a system.
    functionality that is likely to change during later design or deployment.
    aspects of a problem that are particularly complex, and/or.
    code that is expected to be reused in other programs.
    The benefits of modularity do not follow automatically from the act of subdividing a program. The way in which a program is decomposed can make an enormous difference to how easily the program can be implemented and modified. Experience shows that each module should encapsulate information that is not available to the rest of a program. This information hiding reduces the cost of subsequent design changes.





Ans .

(D) both (A) and (B)


  1. Explanation :





Ans .

(B) Conciseness


  1. Explanation :





Ans .

(B) Requirements elicitation


  1. Explanation :





Ans .

(B) is carried out to port the existing software to a new environment.


  1. Explanation :





Ans .

(D) All of the above


  1. Explanation :





Ans .

(A) cohesion is functional and coupling is data type.


  1. Explanation :





Ans .

(B) (iii) (i) (iv) (ii)


  1. Explanation :





Ans .

(C) Processes are permanently assigned to a queue


  1. Explanation :





Ans .

(C) It is a chip to map virtual address to physical address


  1. Explanation :





Ans .

(B) Classical IPC problem


  1. Explanation :





Ans .

(B) Linked


  1. Explanation :





Ans .

(D) Any one of the above


  1. Explanation :





Ans .

(B) (iii) (i) (iv) (ii)


  1. Explanation :





Ans .

(A) (iii) (iv) (i) (ii)


  1. Explanation :





Ans .

(B) (~P ∨ Q) ∧ (~Q∨ P)


  1. Explanation :

    P<->Q= (P->Q)^(Q->P).
    We know A->B is ~AvB.





Ans .

(C) Dynamic programming principle can be used to discard redundant partial paths.


  1. Explanation :





Ans .

(B) (iv) (i) (ii) (iii)


  1. Explanation :





Ans .

(B) (iv) (iii) (i) (ii)


  1. Explanation :





Ans .

(C) S→0|0S|1SS|S1S|SS1


  1. Explanation :





Ans .

(D) Both S1 and S2 are correct


  1. Explanation :





Ans .

(C) Both G1 and G2 are ambiguous grammars


  1. Explanation :

    Let the string is aab.
    it can be derived by.
    S->AB->aAB->aaAB->aaεB->aaεbB->aaεbε.
    and
    we can derive in this way also.
    S->aaB->aabB->aabε.
    G1 is ambigious because we have two different tree structure.
    Similarly G2.
    let w=ab.
    then S->A->ab.
    and
    S->B->abB->abε.
    so we get two tree for a same string. so G2 is also ambigious.





Ans .

(C) 76/30


  1. Explanation :





Ans .

(B) pixel correlation


  1. Explanation :





Ans .

(B) 2r-r-1


  1. Explanation :





Ans .

(A) rows or columns


  1. Explanation :





Ans .

(B) is optimum solution


  1. Explanation :





Ans .

(D) S1, S2 and S2


  1. Explanation :





Ans .

(C) x1+1.5=0


  1. Explanation :





Ans .

(D) {(11,0.3), (12,0.5), (13,0.6), (14,1), (15,0.7), (16,0.5), (17,0.2)}


  1. Explanation :

    f(A+B)= ((1+10,min(.3,.5)),((1+11),min(.3,1)),(1+12)min(.3,.5).
    ((2+10, min(.6,.5)),((2+11),min(.6,1)),((2+12)min(.6,.5)),
    ((3+10, .5),(14,1),(15,.5).
    (4+10,.5),(4+11,.7),16(.5)
    (5+10,.2),(16,.2),(17,.2)}.
    after finding the minimum of A+B, find the max of duplicates.
    {(11,.3),(12,max(.3,.5)),(13,max(.3,.6,.5)),(14,max(.5,1,.5)),(15,max(.5,.7,.2)), (16,max(.5,.2)),(17,.2).
    so
    {(11..3),(12,.5),(13,.6),(14,1),(15,.7),(16..5),(17,.2).





Ans .

(C) {(2,0.6), (3,1), (6,0.6), (11,0.3)}


  1. Explanation :





Ans .

(A) (ii) (iii) (iv) (i)


  1. Explanation :





Ans .

(D) Special execution environment used to run 16 bit Windows applications on 32 bit machines.


  1. Explanation :





Ans .

(B) Both files i.e. file1 and file2 can be edited using ‘ex’ command to travel between files


  1. Explanation :