UGC NET Preparation
This is for those who are preparing for UGC NET Computer Science exam.
Wednesday, 1 July 2015
Thursday, 28 May 2015
UGC NET Preparation
Welcome to UGC NET Preparation
UGC NET COMPUTER SCIENCE MODEL SOLVED PAPER FOR JUNE 2015
1. Consider the following transaction involving two bank accounts x and y
read(x); x := x -50; write(x); read(y); y := y - 50; write(y)
The constraint that the sum of the accounts x and y should remain constant is that of
(A) Atomicity
(B) Consistency
(C) Isolation
(D) Durability
Ans : B
2. Consider the following two statements
S1:If a candidate is known to be corrupt, then he will not be elected.
S2:If a candidate is kind, he will be elected
Which one of the following statements follows from S1 and S2 as per sound inference
rules of logic?
(A) If a person is known to be corrupt, he is kind
(B) If a person is not known to be corrupt, he is not kind
(C) If a person is kind, he is not known to be corrupt.
(D) If a person is not kind, he is not known to be corrupt.
Ans : C
3. A software requirements specification (SRS) document should avoid discussing which
one of the following?
(A) User Interface issues
(B) Non-functional requirements
(C) Design Specification
(D) Interfaces with third party software
Ans : C
4. Which allows you to create a derived class that inherits properties from more than one base class?
(a) Multilevel inheritance
(b) Multiple inheritance
(c) Hybrid Inheritance
(d) Hierarchical Inheritance
Ans.: b
5. Unix operating system is based on
(a) Language structure
(b) Kernel approach
(c) Virtual machine
(d) Time sharing
Ans.: b
6. TLB is acronym for
(a) Translation Looking Buffer
(b) Translation Look aside Buffer
(c) Translation Left Buffer
(d) Translation Look Block
Ans.: b
7. The principle of ‘locality of references’ justify the use of
(a) DMA
(b) Polling
(c) Cache memory
(d) Virtual memory
Ans.: c
Subscribe to:
Comments (Atom)