NTA UGC NET Previous Year Questions (PYQ)

NTA UGC NET Previous Year Questions

Computer Science NTA UGC NET Previous Year Questions (PYQ). Previous Year Question Of NTA UGC NET/JRF

December-2018, NTA UGC NET/JRF Exam. Computer Science Questions

NTA UGC NET/JRF COMPUTER SCIENCE DECEMBER-2018 Queations

In this quiz, we have covered all the questions of NTA UGC NET / JRF year 2018. When you finished the quiz or clicked on the right/wrong answer, we also provide the correct answer with the explanation.

A process residing in Main Memory and Ready and Waiting for execution, is kept on

In PERT/CPM, the merge event represents ________ of two or more events.

Which of the following statements is/are true?

Let r = a(a + b)*, s = aa*b and t = a*b be three regular expressions. Consider the following: (i) L(s) ⊆ L(r) and L(s) ⊆ L(t) (ii) L(r)⊆ L(s) and L(s) ⊆ L(t)

Choose the correct answer from the code given below :

Dirty bit is used to show the

Which one of the following is not typically provided by source code management software

A survey has been conducted on methods of commuter travel. Each respondent was asked to check Bus, Train or Automobile as a major method of travelling to work. More than one answer was permitted. The results reported were as follows: Bus 30 people; Train 35 people; Automobile 100 people; Bus and Train 15 people; Bus and Automobile 15 people, Train and Automobile 20 people; and all the tree methods 5 people. How many people completed the survey form?

The second smallest of n elements can be found with _______ comparisons in the worst case.

Consider the C/C++ function f() given below:

c question

Which of the following is the purpose of f()?

Consider a system with 2 level cache. Access times of Level 1 cache, Level 2 cache and main memory are 0.5 ns, 5 ns and 100 ns respectively. The hit rates of Level 1 and Level 2 caches are 0.7 and 0.8, respectively. What is the average access time of the system ignoring the search time within the cache?

---------- command is used to remove a relation from an SQL database

Software coupling involves dependencies among pieces of software called modules.

Which of the following are correct statements with respect to module coupling?

  • P: Common coupling occurs when two modules share the same global data.
  • Q: Control coupling occurs when modules share a composite data structure and use only parts of it.
  • R : Content coupling occurs when one module modifies or relies on the internal working of another module.

Choose the correct answer from the code given below :

The definitions in a XML document are said to be ................... when the tagging system and definitions in the DTD are all in compliance.

The boolean expression Ā.B+A.Β¯+A.B   is equivalent to

The grammar S → (S) | SS | is not suitable for predictive parsing because the grammar is

Suppose that everyone in a group of N people wants to communicate secretly with (N-1) other people using symmetric key cryptographic system. The communication between any two persons should not be decodable by the others in the group. The number of keys required in the system as a whole to satisfy the confidentiality requirement is

Consider the following pseudo-code fragment, where m is a non-negative integer that has been initialized :

nta ugc net 2018

Which of the following is a loop invariant for the while statement? (Note: a loop invariant for a while statement is an assertion that is true each time the guard is evaluated during the execution of the while statement).

In mathematical logic, which of the following are statements?

  • (i) There will be snow in January.
  • (ii) What is the time now?
  • (iii) Today is Sunday.
  • (iv) You must study Discrete Mathematics.

Choose the correct answer from the code given below :

Code :

Software products need perfective maintenance for which of the following resons?

Your score is

0%

June-2018, NTA UGC NET/JRF Exam. Computer Science Questions

COMMING SOON...

NTA UGC NET/JRF JUNE-2018 Queations

Suppose that everyone in a group of N people wants to communicate secretly with (N-1) other people using symmetric key cryptographic system. The communication between any two persons should not be decodable by the others in the group. The number of keys required in the system as a whole to satisfy the confidentiality requirement is

Which of the following statements is/are true?

Your score is

0%

Leave a Reply

Your email address will not be published. Required fields are marked *