# NTA UGC NET Previous Year Questions (PYQ)

Computer Science NTA UGC NET Previous Year Questions (PYQ). Previous Year Question Of NTA UGC NET/JRF

## December-2018, NTA UGC NET/JRF Exam. Computer Science Questions

NTA UGC NET/JRF COMPUTER SCIENCE DECEMBER-2018 Queations

In this quiz, we have covered all the questions of NTA UGC NET / JRF year 2018. When you finished the quiz or clicked on the right/wrong answer, we also provide the correct answer with the explanation.

Software products need perfective maintenance for which of the following resons?

Which one of the following is not typically provided by source code management software

The grammar S → (S) | SS | is not suitable for predictive parsing because the grammar is

In mathematical logic, which of the following are statements?

• (i) There will be snow in January.
• (ii) What is the time now?
• (iii) Today is Sunday.
• (iv) You must study Discrete Mathematics.

Choose the correct answer from the code given below :

Code :

Let r = a(a + b)*, s = aa*b and t = a*b be three regular expressions. Consider the following: (i) L(s) ⊆ L(r) and L(s) ⊆ L(t) (ii) L(r)⊆ L(s) and L(s) ⊆ L(t)

Choose the correct answer from the code given below :

Which of the following statements is/are true?

In PERT/CPM, the merge event represents ________ of two or more events.

The definitions in a XML document are said to be ................... when the tagging system and definitions in the DTD are all in compliance.

The boolean expression Ā.B+A.Β¯+A.B   is equivalent to

---------- command is used to remove a relation from an SQL database

A process residing in Main Memory and Ready and Waiting for execution, is kept on

Consider the C/C++ function f() given below:

Which of the following is the purpose of f()?

Dirty bit is used to show the

Consider the following pseudo-code fragment, where m is a non-negative integer that has been initialized :

Which of the following is a loop invariant for the while statement? (Note: a loop invariant for a while statement is an assertion that is true each time the guard is evaluated during the execution of the while statement).

Suppose that everyone in a group of N people wants to communicate secretly with (N-1) other people using symmetric key cryptographic system. The communication between any two persons should not be decodable by the others in the group. The number of keys required in the system as a whole to satisfy the confidentiality requirement is

A survey has been conducted on methods of commuter travel. Each respondent was asked to check Bus, Train or Automobile as a major method of travelling to work. More than one answer was permitted. The results reported were as follows: Bus 30 people; Train 35 people; Automobile 100 people; Bus and Train 15 people; Bus and Automobile 15 people, Train and Automobile 20 people; and all the tree methods 5 people. How many people completed the survey form?

Consider a system with 2 level cache. Access times of Level 1 cache, Level 2 cache and main memory are 0.5 ns, 5 ns and 100 ns respectively. The hit rates of Level 1 and Level 2 caches are 0.7 and 0.8, respectively. What is the average access time of the system ignoring the search time within the cache?

Software coupling involves dependencies among pieces of software called modules.

Which of the following are correct statements with respect to module coupling?

• P: Common coupling occurs when two modules share the same global data.
• Q: Control coupling occurs when modules share a composite data structure and use only parts of it.
• R : Content coupling occurs when one module modifies or relies on the internal working of another module.

Choose the correct answer from the code given below :

The second smallest of n elements can be found with _______ comparisons in the worst case.

0%

## June-2018, NTA UGC NET/JRF Exam. Computer Science Questions

COMMING SOON...

NTA UGC NET/JRF JUNE-2018 Queations

Suppose that everyone in a group of N people wants to communicate secretly with (N-1) other people using symmetric key cryptographic system. The communication between any two persons should not be decodable by the others in the group. The number of keys required in the system as a whole to satisfy the confidentiality requirement is

Which of the following statements is/are true?