NTA UGC NET Previous Year Questions

NTA UGC NET Previous Year Questions (PYQ)

Computer Science NTA UGC NET Previous Year Questions (PYQ). Previous Year Question Of NTA UGC NET/JRF

December-2018, NTA UGC NET/JRF Exam. Computer Science Questions

NTA UGC NET/JRF COMPUTER SCIENCE DECEMBER-2018 Queations

In this quiz, we have covered all the questions of NTA UGC NET / JRF year 2018. When you finished the quiz or clicked on the right/wrong answer, we also provide the correct answer with the explanation.

---------- command is used to remove a relation from an SQL database

A process residing in Main Memory and Ready and Waiting for execution, is kept on

Software coupling involves dependencies among pieces of software called modules.

Which of the following are correct statements with respect to module coupling?

  • P: Common coupling occurs when two modules share the same global data.
  • Q: Control coupling occurs when modules share a composite data structure and use only parts of it.
  • R : Content coupling occurs when one module modifies or relies on the internal working of another module.

Choose the correct answer from the code given below :

A survey has been conducted on methods of commuter travel. Each respondent was asked to check Bus, Train or Automobile as a major method of travelling to work. More than one answer was permitted. The results reported were as follows: Bus 30 people; Train 35 people; Automobile 100 people; Bus and Train 15 people; Bus and Automobile 15 people, Train and Automobile 20 people; and all the tree methods 5 people. How many people completed the survey form?

Let r = a(a + b)*, s = aa*b and t = a*b be three regular expressions. Consider the following: (i) L(s) ⊆ L(r) and L(s) ⊆ L(t) (ii) L(r)⊆ L(s) and L(s) ⊆ L(t)

Choose the correct answer from the code given below :

The boolean expression Ā.B+A.Β¯+A.B   is equivalent to

Which one of the following is not typically provided by source code management software

Which of the following statements is/are true?

In PERT/CPM, the merge event represents ________ of two or more events.

Consider the C/C++ function f() given below:

c question

Which of the following is the purpose of f()?

The definitions in a XML document are said to be ................... when the tagging system and definitions in the DTD are all in compliance.

Consider the following pseudo-code fragment, where m is a non-negative integer that has been initialized :

nta ugc net 2018

Which of the following is a loop invariant for the while statement? (Note: a loop invariant for a while statement is an assertion that is true each time the guard is evaluated during the execution of the while statement).

The grammar S → (S) | SS | is not suitable for predictive parsing because the grammar is

Dirty bit is used to show the

Consider a system with 2 level cache. Access times of Level 1 cache, Level 2 cache and main memory are 0.5 ns, 5 ns and 100 ns respectively. The hit rates of Level 1 and Level 2 caches are 0.7 and 0.8, respectively. What is the average access time of the system ignoring the search time within the cache?

In mathematical logic, which of the following are statements?

  • (i) There will be snow in January.
  • (ii) What is the time now?
  • (iii) Today is Sunday.
  • (iv) You must study Discrete Mathematics.

Choose the correct answer from the code given below :

Code :

Software products need perfective maintenance for which of the following resons?

The second smallest of n elements can be found with _______ comparisons in the worst case.

Suppose that everyone in a group of N people wants to communicate secretly with (N-1) other people using symmetric key cryptographic system. The communication between any two persons should not be decodable by the others in the group. The number of keys required in the system as a whole to satisfy the confidentiality requirement is

Your score is

0%

June-2018, NTA UGC NET/JRF Exam. Computer Science Questions

COMMING SOON...

NTA UGC NET/JRF JUNE-2018 Queations

Suppose that everyone in a group of N people wants to communicate secretly with (N-1) other people using symmetric key cryptographic system. The communication between any two persons should not be decodable by the others in the group. The number of keys required in the system as a whole to satisfy the confidentiality requirement is

Which of the following statements is/are true?

Your score is

0%

Leave a Comment

Your email address will not be published. Required fields are marked *

PYQ of History UGC NET UGC NET Mathematical Reasoning and Aptitude ICT (Digital Initiatives) | UGC NET | paper – 1 The Scope of Information and Communication Technology(ICT) PYQ of People, Development, and Environment Top 30 PYQ of HINDI | UGC NET – 2023 Top 30 PYQ of Teaching Aptitude PYQ of Research Aptitude | NTA UGC NET | Paper 1 | Part 1 UGC NET Paper 1 Syllabus | Updated | 2023 Types of Research | Research Aptitude | nta ugc net | UGC NET 2023