Aspire's Library

A Place for Latest Exam wise Questions, Videos, Previous Year Papers,
Study Stuff for MCA Examinations

UGC NET Computer Science Previous Year Questions (PYQs)

UGC NET Computer Science Computer PYQ


UGC NET Computer Science PYQ
According to the Nyquist theorem, to produce the original analog signal, one necessary condition is:





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Nyquist Sampling Theorem states:


Sampling frequency must be at least twice the maximum frequency present in the signal.


$ f_s \ge 2f_{max} $


UGC NET Computer Science PYQ
Match List-I with List-II:
 List-I (Boolean Expression)List-II (Dual of Boolean Expression) 
 A. $x(y+0)$
 I. $(x+0)(y\cdot z)$
 B. $\bar{x}+(\bar{y}+z)$
 II. $x+y\cdot1$
 C. $\bar{x}(y+0)$
 III. $\bar{x}+\bar{y}\cdot1$
 D. $x+(\bar{y}+z)$

 IV. $(x+0)(y\cdot \bar{z})$






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Dual is obtained by interchanging:


$+$ ↔ $\cdot$

$0$ ↔ $1$


Applying dual rule:


A → III

B → IV

C → II

D → I


UGC NET Computer Science PYQ

The number of tokens in the following line:

for i in range(begin : end : step) :






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Tokens are the smallest meaningful units of a program.


Break the statement:


for | i | in | range | ( | begin | : | end | : | step | ) | :


Tokens:


for


i


in


range


(


begin


:


end


:


step


)


:


Total tokens = 12


UGC NET Computer Science PYQ

For the given two machines which of the following is correct?






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

From the diagrams:


• Both machines are deterministic (each state has exactly one transition for each input symbol).

• The first machine has states A and B with transitions on a and b.

• The second machine has states A, B, C, but the accepted language behavior matches the first machine.


Both machines accept the same language, even though the number of states differs.


Thus they are equivalent machines.


UGC NET Computer Science PYQ
For the fuzzy set
$A = {(x_1,0.3),(x_2,0.7),(x_3,0.4)}$, the complement of $A$ would be represented as:





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Complement of fuzzy set:


$\mu_{A'}(x) = 1 - \mu_A(x)$


Compute:


$x_1$: $1 - 0.3 = 0.7$

$x_2$: $1 - 0.7 = 0.3$

$x_3$: $1 - 0.4 = 0.6$


Thus,


$A' = {(x_1,0.7),(x_2,0.3),(x_3,0.6)}$


UGC NET Computer Science PYQ
Regarding the subroutines, see the following sequence of tasks to be performed:

A. Turn on the interrupt facility.
B. Service the device whose flag is set.
C. Save the contents of processor registers.
D. Check which flag is set.
E. Restore the contents of processor registers.





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Interrupt Service Routine (ISR) steps:


Save processor registers → C


Check which device raised interrupt → D


Service the device → B


Restore processor registers → E


Re-enable interrupt facility → A


Correct sequence:


C, D, B, E, A


UGC NET Computer Science PYQ
Arrange the following simple graphs based on number of spanning trees they have:
A. $K_3$ (Complete graph with 3 nodes)
B. $K_4$ (Complete graph with 4 nodes)
C. $K_{2,2}$ (Complete bipartite graph with 2 nodes in each partition)
D. $C_5$ (Cycle graph with 5 nodes)





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Number of spanning trees:


For complete graph:

$\tau(K_n)=n^{n-2}$


A: $K_3 = 3^{1} = 3$


B: $K_4 = 4^{2} = 16$


For complete bipartite graph:

$\tau(K_{m,n}) = m^{n-1} n^{m-1}$


C: $K_{2,2} = 2^{1} \times 2^{1} = 4$


For cycle graph:

$\tau(C_n)=n$


D: $C_5 = 5$


Thus:


A = 3

C = 4

D = 5

B = 16


Increasing order:


A, C, D, B


UGC NET Computer Science PYQ
Techniques for performing I/O:

A. Programmed I/O
B. Interrupt-driven I/O
C. Rotational I/O
D. Direct memory access
E. Channelized I/O





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Standard I/O techniques are:


• Programmed I/O

• Interrupt-driven I/O

• Direct Memory Access (DMA)


Rotational I/O and Channelized I/O are not standard CPU I/O techniques.


Thus:


A, B, D are correct.


UGC NET Computer Science PYQ
Which of the following is not the most common property in social network?





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Common properties of social networks:


• Scale-free degree distribution → True

• Small world property → True

• Short average path length → True


However, most social networks are not necessarily directed; many are modeled as undirected networks.


Thus the statement that is not a common property is:


UGC NET Computer Science PYQ
An ambiguous grammar is one which has:

A. More than one derivations
B. More than one left most derivations
C. More than one right most derivations
D. More than one Parse tree
E. More than one syntax tree





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

A grammar is ambiguous if a string generated by it has more than one parse tree.


Equivalent definitions:


• More than one leftmost derivation

• More than one rightmost derivation


Thus the correct statements are:


B and C.


UGC NET Computer Science PYQ
The sequence of steps for a page replacement algorithm will be:

A. find a frame that is not currently being used
B. change the page table
C. use freed frame
D. no frame is free
E. free a frame





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Steps in page replacement:


No frame is free → D


Find a frame to replace → A


Free that frame → E


Update the page table → B


Use the freed frame for the new page → C


UGC NET Computer Science PYQ
What will be the ordering of typical steps when processing a high-level query?

A. Query optimizer
B. Runtime database processor
C. Scanning, parsing and validating
D. Query code generator





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Typical DBMS query processing steps:


Scanning, parsing and validating → C


Query optimizer → A


Query code generator → D


Runtime database processor → B


Correct order:


C → A → D → B


UGC NET Computer Science PYQ
The height of a binary search tree for the words banana, peach, apple, pear, coconut, mango and papaya using alphabetical order is:





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Insert words sequentially into BST.


banana → root


peach → right of banana


apple → left of banana


pear → right of peach


coconut → left of peach


mango → right of coconut


papaya → right of mango


Longest path:


banana → peach → coconut → mango → papaya


Number of edges = 4


UGC NET Computer Science PYQ
Match List-I with List-II
 List-I
 List-II
 A. Verification
 I. White box Testing
 B. Validation
II. Black box Testing
 
 C. Internal logic exercise
 III. Quality Control
 D. Software requirement exercise

 IV. Quality Assurance






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Verification → Quality Assurance → IV

Validation → Quality Control → III

Internal logic exercise → White box testing → I

Software requirement exercise → Black box testing → II


Matching:


A → IV

B → III

C → I

D → II


UGC NET Computer Science PYQ
For making a memory of size $2048 \times 8$ bytes using chips of size $128 \times 4$ bytes, the number of chips required is:





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Memory required:


$2048 \times 8$


Each chip:


$128 \times 4$


First match word size:


$8 / 4 = 2$ chips per word.


Now match number of words:


$2048 / 128 = 16$


Total chips:


$16 \times 2 = 32$


UGC NET Computer Science PYQ
Which of the following are tautology?

A. $(p \lor r) \rightarrow p$
B. $p \rightarrow (p \land r)$
C. $\sim p \rightarrow (p \rightarrow r)$
D. $(p \land r) \rightarrow (p \rightarrow r)$
E. $\sim(p \rightarrow r) \rightarrow p$





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

A: False when $r=1, p=0$ → Not tautology

B: False when $p=1, r=0$ → Not tautology


C:

$\sim p \rightarrow (p \rightarrow r)$

Always true → Tautology


D:

$(p \land r) \rightarrow (p \rightarrow r)$

Always true → Tautology


E:

$\sim(p \rightarrow r) \rightarrow p$

Always true → Tautology


Thus tautologies:


C, D, E


UGC NET Computer Science PYQ
Which of the followings are sequential circuit?

A. Flip flop
B. Multiplexer
C. Counter
D. Decoder
E. Adder





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Sequential circuits depend on previous state (memory).


• Flip-flop → sequential circuit

• Counter → sequential circuit


Multiplexer, Decoder and Adder are combinational circuits.


UGC NET Computer Science PYQ
Match List-I with List-II
 List-I
 List-II
 A. Union
I. Virtual Reality
 B. Function
 II. Shadow mask
 C. Interactive Environment
 III. Subroutine
 D. Output device

 IV. User defined data type






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Union → User defined data type → IV

Function → Subroutine → III

Interactive Environment → Virtual Reality → I

Output device → Shadow mask → II


Matching:


A → IV

B → III

C → I

D → II


UGC NET Computer Science PYQ
What is a perceptron in ANN?





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

A Perceptron is a single-layer feed-forward neural network used for linear classification.


UGC NET Computer Science PYQ
Match List-I with List-II:
 List-I
 List-II
A. Back Tracking  I. Automata
 B. Infinite languages with matching numbers
 II. Undecidable Problem
 C. Canonical LR Parser
 III. Predictive Parser
 D. Post Correspondence Problem

 IV. Large number of states






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Backtracking → Predictive parsing may require backtracking → III

Infinite languages with matching numbers → handled using Automata → I

Canonical LR parser → requires large number of states → IV

Post Correspondence Problem → Undecidable problem → II


Matching:


A → III

B → I

C → IV

D → II


UGC NET Computer Science PYQ
What is the total delay (latency) for a frame size of 10 million bits that is being set up on a link with 20 routers, each having a queuing time of 2 μs and a processing time of 1 μs? The length of link is 5000 km. The speed of light inside the link is $2\times10^8$ m/s. The link has bandwidth of 6 Mbps.





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Transmission delay

$= \frac{\text{Frame size}}{\text{Bandwidth}}$


$= \frac{10\times10^6}{6\times10^6}$


$= 1.6667\ s$


Propagation delay

Distance $=5000\ km =5\times10^6\ m$


$= \frac{5\times10^6}{2\times10^8}$


$=0.025\ s$


Router delay

Each router delay $=2\mu s+1\mu s=3\mu s$


Total routers $=20$


Total delay $=20\times3\mu s=60\mu s=0.00006\ s$


Total latency


$=1.6667+0.025+0.00006$


$\approx1.691726\ s$


UGC NET Computer Science PYQ
A bit string of length four is generated at random. What is probability that it contains at least two consecutive 0’s given that first bit is 0 ?





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

First bit is fixed as 0, so remaining 3 bits are free.


Possible strings:


0000

0001

0010

0011

0100

0101

0110

0111


Total outcomes $=8$


Strings with at least two consecutive 0's:


0000

0001

0010

0011

0100


Favourable outcomes $=5$


Probability


$=\frac{5}{8}$


UGC NET Computer Science PYQ
Shift-Reduce conflicts are resolved by :





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

In LR parsing, shift-reduce conflicts occur when the parser can either shift the next input symbol or reduce using a rule.


These conflicts are resolved using operator precedence and associativity rules.


UGC NET Computer Science PYQ
Back propagation is a learning technique that adjusts weights in the neural network by propagating weight changes :





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Backpropagation computes error at the output layer (sink) and propagates the error backwards through hidden layers toward the input layer (source) to update weights.


UGC NET Computer Science PYQ
Arrange the following from fastest to slowest in speed:

A. DRAM
B. SRAM
C. CPU Registers
D. Magnetic tapes
E. Hard disk





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Speed hierarchy of memory/storage:


CPU Registers → fastest

SRAM → cache memory

DRAM → main memory

Hard Disk → secondary storage

Magnetic Tape → slowest storage


Order:


C → B → A → E → D


UGC NET Computer Science PYQ
Which of the following statements is/are false?

A. A user can assign privileges to any user on any relation.
B. A user can assign privileges to any user on its own relations only.
C. System error that leads to accessibility to the portion of database is an example of malicious attack.
D. Passwords itself need to be secured from unauthorized access.





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

A → False (only owner or DBA can grant privileges)

B → True

C → False (system error is not a malicious attack)

D → True


False statements:


A and C


UGC NET Computer Science PYQ
Match List I with List II
List I List II
A. Count to infinity problem I. Mobile Adhoc Networks
B. IEEE 802.16 II. Distance vector routing
C. IEEE 802.15 III. WiMAX
D. AODV protocol IV. Bluetooth
Choose the correct answer from the options given below:





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Count to infinity → Distance vector routing 
IEEE 802.16 → WiMAX 
IEEE 802.15 → Bluetooth 
AODV → Mobile Adhoc Networks

UGC NET Computer Science PYQ
For the regular languages and context free languages which is not correct?

A. both are closed under union operation
B. both are closed under concatenation operation
C. both are closed under intersection operation
D. both are closed under complementation operation
E. both are closed under kleene star operation





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Regular languages:


Closed under union, concatenation, intersection, complement, kleene star.


Context-free languages:


Closed under union, concatenation, kleene star.

Not closed under intersection and complement.


Thus incorrect statements:


C and D


UGC NET Computer Science PYQ
Match List I with List II
List I List II
A. Digital Signature I. Asymmetric encryption algorithm.
B. Hash Function II. Confirms authenticity and integrity.
C. AES III. Produces a fixed-size digest.
D. RSA IV. Symmetric encryption algorithm.

Choose the correct answer from the options given below:






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

  • Digital Signature → Confirms authenticity and integrity 
  • Hash Function → Produces a fixed-size digest 
  • AES → Symmetric encryption algorithm 
  • RSA → Asymmetric encryption algorithm

UGC NET Computer Science PYQ
The instruction LD ADR(X) which is equivalent to
$AC \leftarrow M[ADR + XR]$ is in:





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Effective address:


$EA = ADR + XR$


This is indexed addressing, where the address field is added to the index register.


UGC NET Computer Science PYQ
Arrange the following parsers in increasing order of their power (least → most):
  1. LR(0)
  2. LR(1)
  3. LALR(1)
  4. LL(0)
  5. SLR
Choose the correct answer:





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

  • LL(0) is the weakest (no lookahead, top-down).
  • LR(0) is stronger than LL(0) (bottom-up, no lookahead).
  • SLR(1) adds 1-symbol lookahead using FOLLOW sets → accepts more grammars than LR(0).
  • LALR(1) merges LR(1) states; more powerful than SLR(1) but below LR(1).
  • LR(1) is the most powerful among these deterministic bottom-up parsers.

UGC NET Computer Science PYQ
The least values of a signed and unsigned data type variables requiring 8 bits, would be:





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

For 8-bit signed integer (two’s complement):


Range = $-2^{7}$ to $2^{7}-1$


Least value = $-128$


For 8-bit unsigned integer:


Range = $0$ to $2^{8}-1$


Least value = $0$


UGC NET Computer Science PYQ
Maintaining a graph in memory by means of its adjacency matrix is known as





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

  • An adjacency matrix represents a graph using a 2D array (matrix).
  • This type of storage uses sequential memory allocation — rows and columns are stored in contiguous memory.
  • Hence, this method is called a Sequential Representation of a graph.

UGC NET Computer Science PYQ
Arrange the following sets in increasing order, on the basis of their cardinality :

A. $A_1 = {{1,2},{3}}$
B. $A_2 = {{1},{2},{3},{4}}$
C. $A_3 = {{1,2,3,4,5,6}}$
D. $A_4 = {{1,2},{2,3,4},{5}}$
E. $A_5 = {{1},{2},{3},{4},{5}}$

Choose the correct answer from the options given below :





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Cardinality means number of elements in the set.


$|A_1| = 2$

$|A_2| = 4$

$|A_3| = 1$

$|A_4| = 3$

$|A_5| = 5$


Increasing order:


$1 < 2 < 3 < 4 < 5$


So order becomes:


$A_3, A_1, A_4, A_2, A_5$


UGC NET Computer Science PYQ
Consider the following interrupt protection levels in Linux, and arrange them in the increasing order of their priorities:
  • A. User-Mode Programs (Preemptible)
  • B. Bottom Half Interrupt Handlers
  • C. Top Half Interrupt Handlers
  • D. Kernel System Service Routines (Preemptible)
Choose the correct answer from the options given below:





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

  • User-Mode Programs have the lowest priority and are preemptible.
  • Kernel System Service Routines run in kernel mode and can be preempted by higher priority tasks like interrupts.
  • Bottom Half Interrupt Handlers execute after the top half and have higher priority than kernel threads.
  • Top Half Interrupt Handlers handle immediate hardware responses and have the highest priority.

UGC NET Computer Science PYQ
Which of the following have truth values if universe of discourse consists of all integers?

A. $\forall n \exists m (n^2 < m)$
B. $\exists m \forall n (n < m^2)$
C. $\exists n \exists m (n^2 + m^2 = 5)$
D. $\exists n \exists m (n^2 + m^2 = 6)$
E. $\exists n \exists m (n+m=4 \land n-m=1)$

Choose the correct answer from the options given below :





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

A:

For every integer $n$, choose $m=n^2+1$

Then $n^2<m$ → True


B:

$\exists m$ such that $n<m^2$ for all integers $n$.

But integers are unbounded → False


C:

$n^2+m^2=5$


Example: $1^2+2^2=5$ → True


D:

$n^2+m^2=6$


No integer solution → False


E:

$n+m=4$

$n-m=1$


Add equations:


$2n=5$ → $n=2.5$ (not integer) → False


True statements: A and C


UGC NET Computer Science PYQ
Arrange the following examples of Artificial Intelligence (AI) in the order of increasing complexity:

A. Spam email detection using rule-based systems
B. Handwritten digit recognition using shallow neural networks
C. Image classification using convolutional neural networks
D. Autonomous driving using reinforcement learning algorithms

Choose the correct answer from the options given below :





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Complexity increases as follows:


Rule-based system → simplest

Shallow neural network → moderate complexity

CNN image classification → more complex

Autonomous driving → highly complex system


Thus increasing order:


A → B → C → D


UGC NET Computer Science PYQ
Match List-I with List-II.
 List-I
 List-II
 A. Complement
 I. Adder
 B. Ex-OR
 II. Instruction decoding
 C. Accumulator
 III. Negative number representation
 D. Control Unit

 IV. Arithmetic and Logic operations

Choose the correct answer from the options given below:






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Complement → used in negative number representation → III

Ex-OR → used in arithmetic and logic operations → IV

Accumulator → used with adder → I

Control Unit → instruction decoding → II


Correct Matching:


A → III

B → IV

C → I

D → II


UGC NET Computer Science PYQ
The sequence of fields in an IP datagram will be:

A. flags
B. options
C. protocol
D. identification
E. service type

Choose the correct answer from the options given below:





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

IPv4 header order (relevant fields):


Type of Service → Identification → Flags → Protocol → Options


Thus order:


E → D → A → C → B


UGC NET Computer Science PYQ
Match List-I with List-II.
 List-I
 List-II
 A. RAID level-2
 I. block-interleaved
 B. RAID level-3
 II. error-correcting-codes
 C. RAID level-4
 III. reed-solomon codes
 D. RAID level-6

 IV. bit-interleaved

Choose the correct answer from the options given below:






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

RAID-2 → error correcting codes (Hamming) → II

RAID-3 → bit interleaved parity → IV

RAID-4 → block interleaved parity → I

RAID-6 → Reed–Solomon codes → III


Correct Matching:


A → II

B → IV

C → I

D → III


UGC NET Computer Science PYQ
The cyclomatic complexity of the following flow graph is:






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Cyclomatic complexity formula:


$V(G) = E - N + 2P$


Where

$E$ = number of edges

$N$ = number of nodes

$P$ = number of connected components (here $P=1$)


From the graph:


Nodes = 10


Edges = 12


So,


$V(G) = 12 - 10 + 2(1)$


$V(G) = 4$


UGC NET Computer Science PYQ
Which of the following is not the goal of reverse engineering?






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Goals of reverse engineering:


• Recover lost design information

• Understand system structure

• Detect side effects

• Manage system complexity


Data flow itself is not a goal, but rather a representation or analysis technique.


UGC NET Computer Science PYQ
Which of the followings are true for a complete binary tree?
A. It always has odd number of vertices.
B. With $n$ internal vertices, it has $n+1$ leaves.
C. With $l$ leaves it has $l-1$ internal vertices.
D. With $2n-1$ vertices, it has $n$ leaves.






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Properties of complete/full binary tree:


• If internal nodes = $n$ → leaves = $n+1$ ✔

• If leaves = $l$ → internal nodes = $l-1$ ✔

• Total vertices = $2n-1$ when leaves = $n$ ✔

• Such trees always have odd number of vertices ✔


Thus all statements are correct.


UGC NET Computer Science PYQ
Match List-I with List-II.
 List-I
 List-II
 A. Thread spawn
 I. to convert a blocking system call into a nonblocking call
 B. Block thread
 II. to reclaim pages
 C. Jacketing
 III. processor turn to the execution of another ready thread
 D. Flush

 IV. thread is provided with its own register context






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Thread spawn → thread gets its own register context → IV

Block thread → CPU switches to another ready thread → III

Jacketing → convert blocking system call to nonblocking → I

Flush → reclaim pages → II


Matching:


A → IV

B → III

C → I

D → II


UGC NET Computer Science PYQ
How much time does an algorithm using $2^{50}$ bit operations need if each bit operation takes $2^{-38}$ second?





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

$2^{50} \times 2^{-38} = 2^{12}$ seconds

$2^{12} = 4096$ seconds

Convert to minutes:

$4096/60 \approx 68.27$ minutes

$\approx 1.14$ hours


UGC NET Computer Science PYQ
The chairs of an auditorium are to be labelled with a letter followed by a positive two digits integer where labelling is starting with A01. How many maximum possible chairs could be labelled in this way?





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Letters: 26 (A to Z)


Two digit positive integers:

01 to 99 → 99 numbers


Total combinations:


$26 \times 99 = 2574$


UGC NET Computer Science PYQ
Arrange the steps of Mathematical Modeling:

A. Solution fitting with data
B. Formulation mathematically
C. Solve mathematically
D. Repeat formulation if it fits worst with data
E. Interpretation results





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Typical modeling steps:


Formulate model mathematically → B


Solve mathematically → C


Fit solution with data → A


If poor fit, reformulate → D


Interpret results → E


Correct sequence:


B → C → A → D → E


UGC NET Computer Science PYQ
The following code:

stmt → if expr then stmt else stmt
      | if expr then stmt

suffers from:





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

This grammar produces the dangling-else problem.

In such cases the else can be associated with more than one if, producing more than one parse tree.


Thus the grammar is ambiguous.


UGC NET Computer Science PYQ
Match List-I with List-II:
 List-I
 List-II
 A. Batch Multiprogramming
I. allows more efficient use of main memory
 
 B. Time sharing
II. user no longer has direct access to the processor
 
 C. Monitor
 III. Maximize processor use
 D. Reentrant Procedures

 IV. minimize response time






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Batch Multiprogramming → maximize CPU utilization → III

Time sharing → minimize response time → IV

Monitor → user does not directly control processor → II

Reentrant procedures → efficient use of memory → I


Matching:


A → III

B → IV

C → II

D → I


UGC NET Computer Science PYQ
In Genetic Algorithm’s cross over operation, mask is used in?





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

In uniform crossover, a mask (binary mask) determines which parent contributes each gene.


Thus mask-based crossover = uniform crossover.


UGC NET Computer Science PYQ
The ratio of error found before software delivery and to the total errors (before and after) is called:





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Defect Removal Efficiency (DRE):


$\text{DRE} = \frac{\text{Errors found before delivery}}{\text{Errors before + after delivery}}$


Thus the metric described is Defect Removal Efficiency.


UGC NET Computer Science PYQ
Arrange in appropriate order, the construction of a finite automata:

A. Minimum State DFA
B. Regular Expression
C. NFA-ε
D. Problem Statement
E. DFA





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Typical construction steps:


Problem statement → D


Convert to regular expression → B


Convert to NFA-ε → C


Convert to DFA → E


Minimize DFA → A


Order:


D → B → C → E → A


UGC NET Computer Science PYQ
The output of the following C++ Program is:
#include <stdio.h>
int main(void)
{
    int x, *p;
    x = 30;
    p = x;
    printf("%d", *p);
    return 0;
}





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

p is a pointer variable and must store the address of x, written as:


p = &x;


But the program assigns:


p = x;


which means an integer is assigned to a pointer, causing a compilation error (type mismatch).


UGC NET Computer Science PYQ
The Cardinality of a fuzzy set is:





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

In fuzzy set theory, cardinality is the sum of membership values:

$|A| = \sum \mu_A(x)$

The result depends on membership values and may vary.


UGC NET Computer Science PYQ
Which of the following is not correct about the virtual memory segmentation?





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Properties of segmentation:


• Segments can be loaded independently → True

• No internal fragmentation → True

• Large virtual address space → True


Segmentation does not reduce multiprogramming; it usually supports better memory utilization.


Thus incorrect statement:


UGC NET Computer Science PYQ
The parameter Actual count is used in Genetic Algorithm (GA) for:





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

In genetic algorithms, Actual Count refers to the expected number of copies of a chromosome in the next generation, used in selection (fitness proportionate selection).


UGC NET Computer Science PYQ

For the software quality assurance, which of the followings are correct?

A. Execution of code
B. No execution of code
C. Preventive technique
D. A corrective technique






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Software Quality Assurance (SQA):


• Focuses on process improvement

• Works as a preventive technique

• Usually involves reviews, audits and standards

• Does not require execution of code


Thus:


B → True

C → True

A → False

D → False (corrective is more related to debugging/testing)


UGC NET Computer Science PYQ

For the following Parents in figure (1) and (2):

Which is correct?






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

The right parts of the parents are exchanged:


Parent₁: 10110 | 010

Parent₂: 10101 | 111


After crossover:


Child₁: 10110 | 111

Child₂: 10101 | 010


This is exactly what is shown in figure (2).


Thus it represents one-point crossover.


UGC NET Computer Science PYQ
$Z$ is set of integers. $(Z,)$ forms group if * is:





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

$a*b=a+b+2$


Associativity


$(a*b)*c=(a+b+2)+c+2=a+b+c+4$


$a*(b*c)=a+(b+c+2)+2=a+b+c+4$


Identity element:


$a*e=a$


$a+e+2=a$


$e=-2$


Inverse:


$a*b=-2$


$a+b+2=-2$


$b=-a-4$


UGC NET Computer Science PYQ
Which of the following sequence ${a_n}$ are solution of recurrence relation

$a_n=8a_{n-1}-16a_{n-2}$

A. $a_n=1$
B. $a_n=2^n$
C. $a_n=4^n$
D. $a_n=n4^n$
E. $a_n=(-4)^n$





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Characteristic equation


$r^2-8r+16=0$


$(r-4)^2=0$


$r=4$


General solution


$a_n=(c_1+c_2n)4^n$


Thus valid sequences:


$4^n$


$n4^n$


UGC NET Computer Science PYQ
Which of the following is not an Object Oriented Programming language?





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Python → OOP

Smalltalk → pure OOP

Perl → supports OOP


SQL Plus → database query interface.


UGC NET Computer Science PYQ
Which of the following structures of knowledge representation are the most purely syntactic?

A. Conceptual dependency
B. Predicate logic
C. Slot-and-filler
D. Nonmonotonic systems





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Predicate logic → symbolic syntactic structure

Slot-and-filler → symbolic frame representation


Conceptual dependency → semantic

Nonmonotonic systems → reasoning method


UGC NET Computer Science PYQ
Match List-I with List-II
 List-I

List-II 

 A. $A\rightarrow aB\ |\ a,\ a\in T,\ A,B\in V$
I. Recursive Descent Parser
 
 B. $A\rightarrow BC\ |\ a,\ a\in T,\ A,B,C\in V$
 II. Turing Machine
 C. $LL(1)$ grammar
 III. Chomsky Normal Form
 D. Halting problem

 IV. Finite Automata






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

$A\rightarrow aB|a$ → Regular grammar → Finite Automata → IV


$A\rightarrow BC|a$ → Chomsky Normal Form → III


$LL(1)$ grammar → Recursive Descent Parser → I


Halting problem → Turing Machine → II


Matching:


$A\rightarrow IV$

$B\rightarrow III$

$C\rightarrow I$

$D\rightarrow II$


UGC NET Computer Science PYQ
For line drawing, which of the following algorithms are used?

A. DDA algorithm
B. Bresenham algorithm
C. Mid-point algorithm
D. Curve algorithm

Choose the most appropriate answer from the options given below:





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Line drawing algorithms used in computer graphics are:


DDA algorithm

Bresenham algorithm


Mid-point algorithm is generally used for circle drawing.


UGC NET Computer Science PYQ
Arrange the following so that they can be placed in perfect/appropriate order.

A. Planning
B. Construction
C. Modeling
D. Communication
E. Deployment

Choose the correct answer from the options given below:





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Software development process:


Communication → Planning → Modeling → Construction → Deployment


Order:


$D \rightarrow A \rightarrow C \rightarrow B \rightarrow E$


UGC NET Computer Science PYQ
Which of the following is not a characteristic of a specialized embedded OS?





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Embedded OS features:


• real-time scheduling

• interrupt handling

• memory partitioning


File system features like non-sequential files are typical for general purpose OS.


UGC NET Computer Science PYQ
The order of steps of Address Translation in Linux Virtual Memory Scheme will be:

A. register
B. offset
C. Page directory
D. Page table
E. Page middle directory

Choose the correct answer from the options given below:





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Linux 4-level paging:


register → page directory → page middle directory → page table → offset


Order:


$A \rightarrow C \rightarrow E \rightarrow D \rightarrow B$


UGC NET Computer Science PYQ
If $f(n) = 5f(n/2) + 3$ and $f(1) = 7$ is a recurrence relation where $k$ is a positive integer, then $f(2^k) =$





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Let


$f(2^k) = g(k)$


Then recurrence becomes


$g(k) = 5g(k-1) + 3$


with


$g(0) = f(1) = 7$


Solve recurrence.


Homogeneous solution:


$g_h(k) = C5^k$


Particular solution:


Assume constant $A$


$A = 5A + 3$


$-4A = 3$


$A = -\frac{3}{4}$


General solution:


$g(k) = C5^k - \frac{3}{4}$


Use initial condition


$g(0) = 7$


$C - \frac{3}{4} = 7$


$C = \frac{31}{4}$


Thus


$f(2^k) = \frac{31}{4}5^k - \frac{3}{4}$


UGC NET Computer Science PYQ
A company is implementing a new database system to manage its customer information. The database contains tables for customers, orders, products and sales representatives. Each customer can place multiple orders and each order can contain multiple products. Each order is associated with a specific sales representative who manages the customer account. The system keeps records of customers, their orders, the products included in each order, and the sales representatives responsible for handling the accounts. The database is designed to improve efficiency in tracking sales and customer interactions.

Which SQL query retrieves the total number of distinct customers who have placed orders?






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

We need the number of distinct customers who placed orders, so we count unique customer_id from orders table.


Correct query:


Select COUNT(DISTINCT customer_id) As total_customers From orders;


UGC NET Computer Science PYQ
Which of the following tables is likely to have a foreign key referencing another table in the database system implemented by the company?





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Orders table usually contains:


customer_id → referencing Customers table


Thus it contains a foreign key.


UGC NET Computer Science PYQ
A company is implementing a new database system to manage its customer information. The database contains tables for customers, orders, products and sales representatives. Each customer can place multiple orders and each order can contain multiple products. Each order is associated with a specific sales representative who manages the customer account. The system keeps records of customers, their orders, the products included in each order, and the sales representatives responsible for handling the accounts. The database is designed to improve efficiency in tracking sales and customer interactions.

Based on the passage, which of the following statements is true?





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

From passage:


• customers can place multiple orders

• orders can contain multiple products

• representatives manage customer accounts


Thus correct statement:


Each sales representative can manage multiple customer accounts.


UGC NET Computer Science PYQ
A company is implementing a new database system to manage its customer information. The database contains tables for customers, orders, products and sales representatives. Each customer can place multiple orders and each order can contain multiple products. Each order is associated with a specific sales representative who manages the customer account. The system keeps records of customers, their orders, the products included in each order, and the sales representatives responsible for handling the accounts. The database is designed to improve efficiency in tracking sales and customer interactions.

Which SQL query retrieves the total number of orders placed by a specific customer?





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

From passage:


• customers can place multiple orders

• orders can contain multiple products

• representatives manage customer accounts


Thus correct statement:


Each sales representative can manage multiple customer accounts.


UGC NET Computer Science PYQ
A company is implementing a new database system to manage its customer information. The database contains tables for customers, orders, products and sales representatives. Each customer can place multiple orders and each order can contain multiple products. Each order is associated with a specific sales representative who manages the customer account. The system keeps records of customers, their orders, the products included in each order, and the sales representatives responsible for handling the accounts. The database is designed to improve efficiency in tracking sales and customer interactions.

Which of the following best describes the relationship between the orders table and the customers table?





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

One customer can place multiple orders.


Thus relationship:


Customer → Orders


$1 : N$


UGC NET Computer Science PYQ
Which of the following relations cannot be decomposed into BCNF with a lossless join and dependency-preserving decomposition?

R(V, W, X, Y, Z)





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

BCNF condition:
For every functional dependency $X \rightarrow Y$, X must be a superkey.

Check option (3)

FDs:

$VW \rightarrow X$

$X \rightarrow YV$

Here:

$X$ determines $V$ and $Y$

UGC NET Computer Science PYQ
Arrange the following recurrence relations in increasing order of their time complexity.

(A) $T(n) = T(n/2) + 1$

(B) $T(n) = 2T(n/2) + n$

(C) $T(n) = 3T(n/3) + n$

(D) $T(n) = 2T(n/2) + \sqrt{n}$

(E) $T(n) = T(n-1) + 1$





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Using Master Theorem / recurrence expansion:

(A)
$T(n) = T(n/2) + 1$
Complexity → $O(\log n)$

(E)
$T(n) = T(n-1) + 1$
Complexity → $O(n)$

(D)
$T(n) = 2T(n/2) + \sqrt{n}$

$n^{\log_2 2} = n$

Since $\sqrt{n} < n$

→ $O(n)$

(B)
$T(n) = 2T(n/2) + n$

$n^{\log_2 2} = n$

→ $O(n \log n)$

(C)
$T(n) = 3T(n/3) + n$

$n^{\log_3 3} = n$

→ $O(n \log n)$

Increasing order

$O(\log n) < O(n) < O(n) < O(n\log n) < O(n\log n)$


UGC NET Computer Science PYQ
Match List-I with List-II.
 List-I
List-II 
 A. Representation of bits
 I. Transport layer
 B. Physical Address
 II. Physical layer
 C. Logical Address
III. Network layer
 
 D. Segmentation and reassembly

 IV. Data link layer

Choose the correct answer from the options given below.





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

A. Representation of bits → Physical layer


B. Physical Address → Data Link Layer

(MAC address)


C. Logical Address → Network Layer

(IP address)


D. Segmentation and reassembly → Transport Layer


Thus:


A → II

B → IV

C → III

D → I


UGC NET Computer Science PYQ
Find the correct sequence of the storage devices in ascending order based on their access time.

A. Registers
B. Magnetic Disk
C. Magnetic Tapes
D. Main Memory
E. Optical Disk





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Access time order (slowest → fastest):


Magnetic Tape → Optical Disk → Magnetic Disk → Main Memory → Registers


Thus ascending order:


C → E → B → D → A


UGC NET Computer Science PYQ
Match List-I with List-II.
 List-I (Testing Type)
 List-II (Description)
 A. Unit testing
 I. Testing individual components of the software
 B. Integration testing
 II. Testing the interaction between integrated components
 C. System testing
III. Testing to verify the system meets business needs
 
 D. Acceptance testing

 IV. Testing the complete system to ensure it meets requirements

Choose the correct answer from the options given below.






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Unit Testing → Testing individual components


Integration Testing → Testing interaction between modules


System Testing → Testing the complete system


Acceptance Testing → Verifying business/user requirements


Thus mapping:


A → I

B → II

C → IV

D → III


UGC NET Computer Science PYQ

Arrange the following Language Classes in ascending order according to their expressive power, as defined by Chomsky hierarchy.

(A) Context-free languages
(B) Context-sensitive languages
(C) Regular languages
(D) Unrestricted grammars






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Chomsky hierarchy order:


Regular Languages

< Context-Free Languages

< Context-Sensitive Languages

< Recursively Enumerable (Unrestricted) Languages


Thus order:


C → A → B → D


UGC NET Computer Science PYQ

Arrange the following Language Classes in ascending order according to their expressive power, as defined by Chomsky hierarchy.

(A) Context-free languages
(B) Context-sensitive languages
(C) Regular languages
(D) Unrestricted grammars






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Chomsky hierarchy order:


Regular Languages

< Context-Free Languages

< Context-Sensitive Languages

< Recursively Enumerable (Unrestricted) Languages


Thus order:


C → A → B → D


UGC NET Computer Science PYQ
Match List-I with List-II.
 List-I
 List-II

 A. Dijkstra’s Algorithm
 I. Find the shortest path between all pairs of vertices in a graph with positive or negative edge weights
 B. Floyd-Warshall Algorithm
 II. Finds the shortest path in a weighted graph with non-negative edge weights

 C. Bellman-Ford Algorithm

III. Sorts elements by repeatedly moving them past neighboring elements that are smaller

 
 D. Prim’s Algorithm

IV. Determines the strongly connected components in a directed graph

 
Choose the correct answer from the options given below.





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Dijkstra Algorithm → shortest path with non-negative weights

Floyd-Warshall → all pairs shortest paths

Bellman-Ford → handles negative edge weights

Prim → Minimum Spanning Tree

Thus correct matching:

A → II
B → I

Remaining pair becomes

C → IV
D → III


UGC NET Computer Science PYQ
Arrange the given steps required for a Direct Memory Access (DMA) transfer in the correct order.

(A) Initiate DMA transfer request
(B) Transfer data directly between peripheral and memory
(C) Processor grants DMA control over the system bus
(D) DMA controller completes data transfer and signals completion







Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

DMA transfer sequence:


Device initiates DMA request


CPU grants bus control to DMA controller


DMA transfers data between memory and device


DMA signals completion


Order:


A → C → B → D


UGC NET Computer Science PYQ
A graph $G$ with number of vertices greater and equal than three i.e. $(n \ge 3)$ is a Hamiltonian graph, if the degree of each vertex is greater and equal to …





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Dirac’s theorem states that if a simple graph with $n \ge 3$ vertices satisfies


$deg(v) \ge \frac{n}{2}$


for every vertex $v$, then the graph is Hamiltonian.


Thus the degree of each vertex must be at least half of the number of vertices.


UGC NET Computer Science PYQ
Arrange the following steps in a proper sequence for the typical process of a DNS query :

(A) Query authoritative DNS Server
(B) Query local DNS Server
(C) Local DNS Server Check Cache
(D) Query root DNS Server
(E) Query TLD DNS Server

Choose the correct answer from the options given below :





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Typical DNS resolution process:


Client queries Local DNS Server


Local DNS server checks cache


If not found → Root DNS server queried


Root server refers to TLD DNS server


TLD server refers to Authoritative DNS server


Thus the correct order is


(B) → (C) → (D) → (E) → (A)


UGC NET Computer Science PYQ
In a schema $R(A, B, C, D, E, F, G, H)$, each field of $R$ contains only atomic values.
$F = {CH \rightarrow C, A \rightarrow BC, B \rightarrow CEH, E \rightarrow A, A \rightarrow EFG}$ is a set of functional dependencies so that $F^+$ is exactly the set of FDs that holds $R$. The relation $R$ is :





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Given FDs


$CH \rightarrow C$

$A \rightarrow BC$

$B \rightarrow CEH$

$E \rightarrow A$

$A \rightarrow EFG$


From


$A \rightarrow BC$

$A \rightarrow EFG$


we get


$A \rightarrow BCFG E$


Then


$B \rightarrow CEH$


Thus


$A^+ = {A,B,C,D,E,F,G,H}$


So $A$ is a candidate key.


Now check dependency


$E \rightarrow A$


Since $E$ is not a superkey, but RHS contains a prime attribute, it satisfies 3NF but violates BCNF.


Therefore the relation is


in 3NF but not in BCNF.


UGC NET Computer Science PYQ
Consider the Grammar :

$S \rightarrow A$
$A \rightarrow S B S \mid id$
$B \rightarrow B, A \mid A$

If $I_0 = CLOSURE({[S' \rightarrow .A]})$, then how many items be in the set for $GOTO(I_0, S)$





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Initial item

$S' \rightarrow .A$

Closure adds productions of $A$

$A \rightarrow .SBS$
$A \rightarrow .id$

Now the item containing $S$ after dot:

$A \rightarrow .SBS$

Applying GOTO on $S$ gives

$A \rightarrow S.BS$

Now closure for $B$ adds

$B \rightarrow .B,A$
$B \rightarrow .A$

Also expand $A$

$A \rightarrow .SBS$
$A \rightarrow .id$

Total items in $GOTO(I_0,S)$ = 4

UGC NET Computer Science PYQ
Which of the following statements about pointers in C are TRUE.

(A) Pointers can be used to access array elements
(B) Pointers can store the address of another pointer
(C) Pointers are automatically dereferenced in expression
(D) Pointers cannot be used to access structure members

Choose the correct answer from the options given below :





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

(A) True — pointers can access array elements because arrays and pointers are closely related in C.

(B) True — a pointer can store the address of another pointer (pointer to pointer).

(C) False — pointers are not automatically dereferenced, we must use *.

(D) False — pointers can access structure members using ->.

Thus correct statements are A and B.

UGC NET Computer Science PYQ
Arrange the following steps in proper sequence involved in a Genetic Algorithm :

(A) Selection
(B) Initialization
(C) Crossover
(D) Mutation
(E) Evaluation

Choose the correct answer from the options given below :





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Typical steps of Genetic Algorithm:

Initialization

Evaluation

Selection

Crossover

Mutation

Thus order:

(B) → (E) → (A) → (C) → (D)

UGC NET Computer Science PYQ
Arrange the following steps in a proper sequence for the process of training a neural network.

(A) Weight initialization
(B) Feed forward
(C) Back Propagation
(D) Loss Calculation
(E) Weight update

Choose the correct answer from the options given below :





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Typical neural network training sequence:

Initialize weights

Perform feed forward

Compute loss

Backpropagate error

Update weights

Thus the order is:

(A) → (B) → (D) → (C) → (E)

UGC NET Computer Science PYQ
Which of the following C++ statements correctly declares an abstract class ?





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

In C++, an abstract class must contain at least one pure virtual function.

Syntax of pure virtual function:

virtual return_type function() = 0;

Only option (1) correctly declares a pure virtual function.

UGC NET Computer Science PYQ
Match List-I with List-II.
 List-I
(computing systems)

List-II
(working/output) 

 (A) Half Adder
 (I) Has $n$ input and $2^n$ output
 (B) Decoder
 (II) CPU Storage unit
 (C) Register
 (III) Used to store program at runtime
 (D) Main memory

 (IV) 2-bit addition circuit

Choose the correct answer from the options given below :






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Half Adder → performs addition of two bits → 2-bit addition circuit → (IV)

Decoder → has $n$ inputs and $2^n$ outputs → (I)

Register → CPU internal storage → (II)

Main memory → stores program during execution → (III)

Thus

(A) → (IV)
(B) → (I)
(C) → (II)
(D) → (III)

UGC NET Computer Science PYQ

Arrange the following steps in the correct order to solve the Knapsack problem using Dynamic Programming.

(A) Define the base case when the capacity is zero $(0)$ or no items are left to consider
(B) Compute the maximum value that can be obtained using items up to the $i$-th item and a knapsack capacity of $0$
(C) Identify subproblems and their dependencies based on items weights and values
(D) Initialize a table to store results of subproblems
(E) Iterate through each item and each possible capacity to fill the table

Choose the correct answer from the options given below :






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Typical DP knapsack steps:

Identify subproblems → (C)

Initialize DP table → (D)

Define base cases → (A)

Fill table by iterating items and capacity → (E)

Compute optimal values → (B)

Order:

(C) → (D) → (A) → (E) → (B)

UGC NET Computer Science PYQ

Match List - I with List - II.


 List - I

 List - II

 (A) The activation function
 (I) is called the delta rule.
 (B) The learning method of perceptron
 (II) is one of the key components of the perceptron as in the most common neural network architecture.
 (C) Areas of application of artificial neural network include
 (III) is always boolean like a switch.
 (D) The output of the perceptron

 (IV) system identification and control.

Choose the correct answer from the options given below :






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Activation function → key component of neural network → (II)

Learning rule of perceptron → called delta rule → (I)

Applications of ANN → system identification and control → (IV)

Output of perceptron → boolean (0 or 1) like a switch → (III)

Thus

(A) → (II)
(B) → (I)
(C) → (IV)
(D) → (III)

UGC NET Computer Science PYQ
In a token ring network the transmission speed is $10^7$ bps and the propagation speed is $200 , m/\mu s$.
The 1-bit delay in this network is equivalent to ______.





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Transmission speed

$10^7$ bits/sec

Time for 1 bit

$\frac{1}{10^7}$ sec

Convert to microseconds

$\frac{1}{10^7} \times 10^6 = 0.1 , \mu s$

Propagation speed

$200 , m/\mu s$

Distance traveled in $0.1 , \mu s$

$200 \times 0.1 = 20 , m$

UGC NET Computer Science PYQ

Consider the following statements regarding combinational and sequential circuits.

(A) Output of combinational circuits depends on the only current input.
(B) Output of combinational circuit depends on the both current input and previous output.
(C) Output of sequential circuit depends on the current input.
(D) Output of sequential circuit depends on both current input and previous output.

Choose the correct answer from the options given below :






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Combinational circuit → output depends only on current input → (A) True
Sequential circuit → output depends current input + previous state → (D) True

(B) False
(C) Incomplete / incorrect

UGC NET Computer Science PYQ
Consider the following C program :
#include<stdio.h>
int main()
{
    int x[]={2,4,6,8,10};
    int a, b=0, *y = x + 4;

    for(a=0; a<5; a++)
    {
        b = b + (*y - a) - *(y - a);
    }

    printf("%d\n", b);
    return 0;
}
What will be the output of the above C program ?





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Pointer

$y = x + 4$

So

$*y = 10$

Loop runs $a=0$ to $4$

Expression:

$b = b + (*y - a) - *(y-a)$

Compute:

$a=0$ → $(10-0) - 10 = 0$
$a=1$ → $(10-1) - 8 = 1$
$a=2$ → $(10-2) - 6 = 2$
$a=3$ → $(10-3) - 4 = 3$
$a=4$ → $(10-4) - 2 = 4$

Sum

$b = 0+1+2+3+4 = 10$

UGC NET Computer Science PYQ
Translate $\forall x \exists y (x < y)$ in English. Consider domain as a real number for both the variables.





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Expression

$\forall x \exists y (x<y)$

Meaning

"For every $x$, there exists some $y$ such that $x<y$"

UGC NET Computer Science PYQ
For all real numbers $x$, there exists a real number $y$ such that $x$ is less than $y$.
(A) $L_1 = { w \in {0,1}^* \mid \text{length of } w \text{ is even} }$
(B) $L_2 = { w \in {0,1}^* \mid \text{length of } w \text{ is odd} }$
(C) $L_3 = { w \in {0,1}^* \mid \text{all 0s come before all 1s in } w }$
(D) $L_4 = { w \in {0,1}^* \mid w \text{ contains equal number of 0s and 1s} }$
(E) $L_5 = { w \in {0,1}^* \mid \text{all 1s come before all 0s in } w }$

Choose the correct answer from the options given below :





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Important fact:

NFA and DFA recognize exactly the same class of languages → Regular Languages

So no language exists that can be recognized by NFA but not DFA.

But option (D)
equal number of 0s and 1s → not regular

Option (E)
all 1s before 0s → regular

Hence only (D) is non-regular.

Closest option given:

(4) (D) and (E) Only

UGC NET Computer Science PYQ

Consider the Grammar :

$T \rightarrow Qx$
$Q \rightarrow RS$
$R \rightarrow y \mid \varepsilon$
$S \rightarrow z \mid \varepsilon$

Here $x, y, z$ are terminals and $T, Q, R, S$ are non terminals.
What will be the follow set of the non terminal $R$ ?






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

From production

$Q \rightarrow RS$

FOLLOW of $R$ includes FIRST of $S$ except $\varepsilon$

FIRST($S$) = ${z, \varepsilon}$

So add $z$

Since $S \rightarrow \varepsilon$, also include FOLLOW($Q$)

From

$T \rightarrow Qx$

FOLLOW($Q$) = ${x}$

Thus

FOLLOW($R$) = ${z, x}$

UGC NET Computer Science PYQ

Two computers A and B are configured as follows :


A has IP address 203.197.2.53 and subnet mask 255.255.128.0


B has IP address 203.197.5.201 and subnet mask 255.255.192.0


What one of the following statement is true ?






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Subnet mask A

$255.255.128.0$

Network range:

$203.197.0.0$ → $203.197.127.255$

B address $203.197.5.201$ lies in this range
So A thinks B is in same network

Subnet mask B

$255.255.192.0$

Network blocks:

$203.197.0.0$ → $203.197.63.255$

A address $203.197.2.53$ lies in this range
So B also thinks A is same network

Thus both assume same network.



UGC NET Computer Science PYQ
Match List - I with List - II.
 List - I (IP Address)

List - II (Class)

 
 (A) 10.20.30.40
 (I) Class E
 (B) 210.20.30.3
 (II) Class B
 (C) 180.30.100.10
 (III) Class A
 (D) 252.5.15.11

 (IV) Class C

Choose the correct answer from the options given below :





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

IP class ranges

Class A → $1-126$
Class B → $128-191$
Class C → $192-223$
Class D → $224-239$
Class E → $240-255$

Check first octet:

A: $10$ → Class A → (III)
B: $210$ → Class C → (IV)
C: $180$ → Class B → (II)
D: $252$ → Class E → (I)

Thus

(A)-(III), (B)-(IV), (C)-(II), (D)-(I)


UGC NET Computer Science PYQ
What will be the output of the following C code?
#include<stdio.h>
void main()
{
    int arr[5] = {10, 20, 30, 40, 50};
    int *p = (int*) (&arr + 1);
    printf("%d%d", *(arr + 1), *(p - 1));
}





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution


UGC NET Computer Science PYQ

What is SQL primarily used for in the context of relational databases?






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

SQL (Structured Query Language) is used to:

  • create tables

  • insert data

  • update data

  • delete data

  • query data

Thus its primary purpose is managing and manipulating relational databases.


UGC NET Computer Science PYQ
Given a project that uses the COCOMO model with an estimated effort of 2000 person-months and a productivity rate of 5 person-month per KLOC, what is the estimated size of the project in KLOC ?





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Productivity relation:

$Productivity = \dfrac{Effort}{Size}$

Given:

$Effort = 2000$ person-month
$Productivity = 5$ person-month per KLOC

So

$Size = \dfrac{Effort}{Productivity}$

$Size = \dfrac{2000}{5}$

$Size = 400$ KLOC


UGC NET Computer Science PYQ
Consider relation R(A, B, C, D, E) with the following functional dependencies:
C → F, E → A, EC → D, A → B. 
Which of the following is a key for R?





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Goal: Find a set of attributes whose closure covers all attributes of R = {A, B, C, D, E}.

Check (1) CD+:
From C → F we get F. D gives nothing further. So CD+ = {C, D, F}.
Missing A, B, E ⇒ not a key.

Check (2) EC+:
Start {E, C}. Using E → A ⇒ add A. Using A → B ⇒ add B. Using EC → D ⇒ add D.
Therefore EC+ = {E, C, A, B, D} = {A, B, C, D, E}. Covers all attributes of R ⇒ key.

Check (3) AE+:
A → B gives B; E → A adds nothing new. No way to reach C or D ⇒ not a key.

Check (4) AC+:
A → B gives B; C → F gives F. No E or D ⇒ not a key.

Answer: (2) EC

Note: F is outside R, so while C → F is valid, a key must cover only attributes of R. EC+ covers {A, B, C, D, E}.


UGC NET Computer Science PYQ

Match List - I with List - II.

 List - I (software design principles)

 List - II (Definitions)

 (A) Cohesion
 (I) Degree to which one module relies on another module
 (B) Coupling
 (II) Dividing a software system into distinct modules
 (C) Abstraction
 (III) Degree to which elements of a module belong together
 (D) Modularity

 (IV) Simplifying complex reality by modeling classes appropriate to the problem

Choose the correct answer from the options given below :






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

efinitions:


Cohesion → elements of a module belong together → (III)


Coupling → dependency between modules → (I)


Abstraction → simplify complexity → (IV)


Modularity → divide system into modules → (II)


Thus:


(A)-(III), (B)-(I), (C)-(IV), (D)-(II)


UGC NET Computer Science PYQ
Which of the following trees are height balanced?
  • A. Binary Search Tree
  • B. AVL Tree
  • C. Red-Black Tree
  • D. B-Tree

Choose the correct answer from the options below:

  1. A and D only
  2. A, B and D only
  3. C and D only
  4. B and C only





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Answer: 4) B and C only

  • Binary Search Tree (BST): Not necessarily balanced; height can degrade to O(n).
  • AVL Tree: Height-balanced by definition (balance factor −1, 0, +1); height is O(log n).
  • Red-Black Tree: Enforces black-height properties that keep height O(log n); treated as a height-balanced binary tree.
  • B-Tree: Balanced (all leaves at the same level) but not a binary tree; the term “height-balanced tree” typically refers to binary trees. Hence excluded here.

UGC NET Computer Science PYQ

Consider the transactions $T_1, T_2, T_3$ and the schedules $S_1$ and $S_2$ given below.

$T_1 : r_1(x); r_1(z); w_1(z)$
$T_2 : r_2(y); r_2(z); w_2(z)$
$T_3 : r_3(y); r_3(x); w_3(y)$

$S_1$ :
$r_1(x); r_3(y); r_3(x); r_2(y); r_2(z); w_3(y); w_3(z); r_1(z); w_1(x); w_1(z)$

$S_2$ :
$r_1(x); r_3(y); r_2(y); r_3(x); r_1(z); r_2(z); w_3(y); w_1(x); w_2(z); w_1(z)$

Which one of the following statements about the schedules is TRUE ?






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

To check conflict serializability we build precedence graph.

For $S_1$

Conflicts:

$T_1 \rightarrow T_3$
$T_3 \rightarrow T_2$
$T_2 \rightarrow T_1$

Cycle exists:

$T_1 \rightarrow T_3 \rightarrow T_2 \rightarrow T_1$

Therefore

$S_1$ not conflict-serializable

For $S_2$

Conflicts:

$T_3 \rightarrow T_1$
$T_2 \rightarrow T_1$
$T_3 \rightarrow T_2$

Graph has no cycle

Serializable order:

$T_3 \rightarrow T_2 \rightarrow T_1$

Thus

$S_2$ is conflict-serializable



UGC NET Computer Science PYQ

Let P denote “She is intelligent” and Q denote “She is happy.”
Given statements:
(a) If she is intelligent, then she is unhappy.
(b) She is neither intelligent nor happy.
(c) It is necessary to be not intelligent in order to be happy.
(d) To be not intelligent is to be unhappy.

Which option gives the correct propositional expressions?

  1. (a) P→¬Q; (b) P ∧ ¬Q; (c) Q→¬P; (d) P→¬Q
  2. (a) P→Q; (b) ¬P ∧ ¬Q; (c) ¬Q→P; (d) ¬P→¬Q
  3. (a) P→¬Q; (b) ¬P ∧ ¬Q; (c) Q→¬P; (d) ¬P→¬Q
  4. (a) P→¬Q; (b) P ∧ ¬Q; (c) Q↔P; (d) ¬P→¬Q





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Translate each statement:
(a) “If intelligent then unhappy” ⇒ P → ¬Q.
(b) “Neither intelligent nor happy” ⇒ ¬P ∧ ¬Q.
(c) “Being not intelligent is necessary for being happy” ⇒ Q → ¬P.
(d) “Not intelligent implies unhappy” ⇒ ¬P → ¬Q.

Only Option 3 matches all four translations.

Answer: 3


UGC NET Computer Science PYQ

Consider the following statement regarding special purpose registers.

(A) Program Counter (PC) keeps the track of next instruction executed
(B) Instruction register holds the address of first instruction to be executed
(C) Accumulator holds the output of ALU
(D) Program Counter (PC) keeps the track of only first instruction of the program

Choose the correct answer from the options given below :






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

(A) True

PC stores address of next instruction


(B) False

Instruction Register stores current instruction, not address


(C) True

Accumulator stores ALU result


(D) False

PC tracks every next instruction, not only first


Thus correct statements:


(A) and (C)


UGC NET Computer Science PYQ
The process followed in order to find difficult, unknown and hidden information about a software system is called:





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Reverse Engineering is the process of analyzing a software system to identify its components and their interrelationships, and to extract hidden or unknown design information from the existing system. It helps understand how the system works internally without having access to its source code or original documentation.

UGC NET Computer Science PYQ

Which of the following are Agile Process Models ?

(A) Extreme Programming (XP)
(B) Waterfall
(C) Scrum
(D) Spiral
(E) Incremental

Choose the correct answer from the options given below :






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Agile models include iterative and flexible development approaches.


Check each:


(A) Extreme Programming (XP) → Agile methodology ✔


(B) Waterfall → Traditional sequential model ✘


(C) Scrum → Agile framework ✔


(D) Spiral → Risk-driven traditional model ✘


(E) Incremental → Development strategy but not strictly Agile model here


Thus Agile models are:


Extreme Programming and Scrum


UGC NET Computer Science PYQ

When developing a dynamic programming algorithm, the sequence of steps followed is:

  • A. Construct an optimal solution from computed information.
  • B. Recursively define the value of an optimal solution.
  • C. Characterize the structure of an optimal solution.
  • D. Compute the value of an optimal solution, typically in a bottom-up fashion.

Choose the correct answer from the options given below:

  1. B, C, A, D
  2. B, A, C, D
  3. C, B, A, D
  4. C, B, D, A





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Answer: (4) C, B, D, A

Explanation:
The standard steps for designing a dynamic programming algorithm are:

  1. (C) Characterize the structure of an optimal solution.
  2. (B) Recursively define the value of an optimal solution.
  3. (D) Compute the value of an optimal solution (usually bottom-up).
  4. (A) Construct the optimal solution from the computed information.

Hence, the correct order is C → B → D → A.


UGC NET Computer Science PYQ

Arrange the following phases of database design in the correct order :


(A) Physical Design

(B) Conceptual Design

(C) Logical Design

(D) Requirement Analysis


Choose the correct answer from the options given below :






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Standard database design process:


Requirement Analysis


Conceptual Design


Logical Design


Physical Design


Thus order:


(D) → (B) → (C) → (A)


UGC NET Computer Science PYQ
The packet sent by a node to the source to inform it of congestion is called:





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

In computer networks, when congestion occurs in a network, the router sends a special control packet called a choke packet to the source. This packet informs the source node to slow down the transmission rate to prevent further congestion. This method is part of congestion control mechanisms such as the Choke Packet Technique used in the Internet Control Message Protocol (ICMP).

UGC NET Computer Science PYQ

Which of the following statements are TRUE about mutual exclusion in concurrent programming ?

(A) Mutual exclusion ensures that only one process can be in a critical section at any given time.
(B) Mutual exclusion are designed to prevent conflicts and ensure that only one process can access shared resources at a time.
(C) Mutual exclusion can use various algorithms to ensure that processes do not enter the critical section simultaneously.
(D) Mutual exclusion allows multiple processes to access the critical section simultaneously to improve performance.

Choose the correct answer from the options given below :






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

(A) True

Mutual exclusion ensures only one process enters critical section at a time.


(B) True

It prevents conflicts on shared resources.


(C) True

Algorithms like Peterson, Dekker, semaphore, mutex ensure mutual exclusion.


(D) False

Critical section cannot be accessed simultaneously by multiple processes.


Thus correct statements:


(A), (B), (C)


UGC NET Computer Science PYQ

Consider a relation schema $R = (U, V, W, X, Y, Z)$, on which the following functional dependencies hold:


${U \rightarrow V,; VW \rightarrow X,; Y \rightarrow W,; X \rightarrow U}$


The candidate keys of $R$ are:






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Functional dependencies:

$U \rightarrow V$

$VW \rightarrow X$

$Y \rightarrow W$

$X \rightarrow U$


Start with $UY$:

$U \rightarrow V$

$Y \rightarrow W$

Thus we get $V,W$

Then

$VW \rightarrow X$

Then

$X \rightarrow U$

So closure:

$UY^+ = {U,V,W,X,Y}$

Add $Z$ to cover all attributes.

Thus minimal key:

$UYZ$

Similarly:

$VYZ$ and $XYZ$

Thus candidate keys:

$UYZ,; VYZ,; XYZ$


UGC NET Computer Science PYQ
The transformation of data from main memory to cache memory is referred as:





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

In computer architecture, when data is transferred from main memory to cache memory, a process known as mapping determines where each block of main memory will be placed in the cache. There are different types of mapping techniques such as Direct Mapping, Associative Mapping, and Set-Associative Mapping. This process ensures efficient and quick access to frequently used data.

UGC NET Computer Science PYQ

Host A (on TCP/IPv4 Networks) send an IP Datagram D to host B (also on TCP/IPv4 network). Assume that no error occurred during transmission of D, when D reaches host B. Which of following header field may differ from that of original datagram D ?


(A) TTL

(B) Checksum

(C) Fragment offset

(D) Source IP

(E) Destination IP


Choose the correct answer from the options given below :






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

(A) TTL → Decreases at every router ✔


(B) Header checksum → Recomputed whenever TTL changes ✔


(C) Fragment offset → May change if fragmentation occurs ✔


(D) Source IP → Does not change ✘


(E) Destination IP → Does not change ✘


Thus fields that may differ:


TTL, Checksum, Fragment offset


UGC NET Computer Science PYQ
Match List I with List II:
List I List II
A. Address Space I. Associative Mapping
B. Memory Space II. Logical address
C. Cache Memory III. Physical address
D. Segmented Program IV. Virtual address
Choose the correct answer from the options given below:





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

  • A. Address Space → Virtual Address (IV)
    Address space refers to the range of virtual addresses a process can use in memory.
  • B. Memory Space → Physical Address (III)
    Memory space corresponds to the actual physical memory locations in RAM.
  • C. Cache Memory → Associative Mapping (I)
    Cache memory uses mapping techniques such as associative mapping to store data efficiently.
  • D. Segmented Program → Logical Address (II)
    In segmentation, programs are divided into segments, each referenced by logical addresses.

UGC NET Computer Science PYQ

Consider a CSMA/CD network that transmits data at the rate of 100 Mbps over a 1 kilometre cable with no repeater. If the minimum frame size required for this network is 1250 bytes, what is the signal speed (km/sec) in the cable ?






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Minimum frame size:


$1250 \text{ bytes} = 1250 \times 8 = 10000 \text{ bits}$


Transmission rate:


$100 \text{ Mbps} = 100 \times 10^6 \text{ bits/sec}$


Transmission time:


$T = \frac{10000}{100 \times 10^6}$


$T = 10^{-4} \text{ sec}$


In CSMA/CD:


$T = 2 \times$ propagation delay


So propagation delay:


$\frac{T}{2} = 5 \times 10^{-5}$ sec


Distance = 1 km


Signal speed:


$v = \frac{distance}{time}$


$v = \frac{1}{5 \times 10^{-5}}$


$v = 20000 \text{ km/sec}$


UGC NET Computer Science PYQ

Consider the following table defining the sample inputs and corresponding target values for a perceptron model.

Sample No x1 x2 target w1 w2
S100000
S2011
S3101
S4111

What shall be the value of updated weights after applying all the samples S1 to S4 (in the order S1, S2, S3, S4) to this model. Given that the initial weights w1=0, w2=0, learning rate=0.1 and no bias is involved in the perceptron. The activation function for this perceptron is given below:

yobserved = { 1 if yin > 0
0 if yin < 0 }

  1. w1 = 0.1, w2 = 0.1
  2. w1 = 0.0, w2 = 0.2
  3. w1 = 0.0, w2 = 0.1
  4. w1 = 0.2, w2 = 0.2





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Using perceptron learning rule: Δw = η (t − y) x, where y = 1 if yin > 0 else 0.

S1 (0,0,t=0): yin=0 ⇒ y=0 ⇒ no change ⇒ (w1,w2)=(0,0)

S2 (0,1,t=1): yin=0 ⇒ y=0 ⇒ Δw=0.1(1−0)(0,1) ⇒ (w1,w2)=(0,0.1)

S3 (1,0,t=1): yin=0 ⇒ y=0 ⇒ Δw=0.1(1−0)(1,0) ⇒ (w1,w2)=(0.1,0.1)

S4 (1,1,t=1): yin=0.1+0.1=0.2>0 ⇒ y=1 ⇒ no change

Final Weights: w1=0.1, w2=0.1

Answer: (1)


UGC NET Computer Science PYQ
#include<iostream.h>
using namespace std;

void swap(int &x, int &y)
{
    int temp = x;
    x = y;
    y = temp;
}

int main()
{
    int a = 5, b = 10;
    swap(a,b);
    swap(a,b);
    cout << a << " " << b;
    return 0;
}
What will be the output of above code ?





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Initial values

$a = 5,; b = 10$

First call

swap(a,b)

$a = 10,; b = 5$

Second call

swap(a,b)

$a = 5,; b = 10$

Thus final output

5 10


UGC NET Computer Science PYQ

Consider the three-way handshaking process followed during TCP connection establishment between two hosts A and B. Let S and R be two random 32-bit starting sequence numbers chosen by A and B respectively. Suppose A sends a TCP segment having SYN bit = 1, SEQ number = S and ACK bit = 0 and B accepts the connection request.

Which one of the following choices represents the information present in the TCP segment header that is sent by B to A ?






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

TCP 3-way handshake:


Step 1

A → B


SYN = 1

SEQ = S


Step 2

B → A


SYN = 1

ACK = 1

SEQ = R

ACK = S + 1


Thus correct header fields:


SYN = 1

SEQ = R

ACK = 1

ACK = S + 1


UGC NET Computer Science PYQ

Arrange the following steps of file handling in C in the correct order :


(A) Close the file

(B) Read from or write to the file

(C) Open the file

(D) Check for error


Choose the correct answer from the options given below :






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Correct file handling sequence in C:


Open file


Check for error


Read / Write


Close file


Thus order:


(C) → (D) → (B) → (A)


UGC NET Computer Science PYQ

Select the Sorting Algorithms that are stable.


(A) Quick Sort

(B) Bubble Sort

(C) Insertion Sort

(D) Merge Sort

(E) Shell Sort


Choose the correct answer from the options given below :






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Quick Sort → Not stable ✘

Bubble Sort → Stable ✔

Insertion Sort → Stable ✔

Merge Sort → Stable ✔

Shell Sort → Not stable ✘


Thus stable algorithms:


Bubble Sort, Insertion Sort, Merge Sort


But among given options, only


(B) and (C)


appear together correctly.


UGC NET Computer Science PYQ

Match List - I with List - II.

 List - I (operating system concepts)

List - II (characteristics) 

 (A) Paging
 (I) Evicts least recently used process
 (B) LRU (Least Recently Used)
 (II) Extends physical memory
 (C) C-SCAN
 (III) Logical to physical mapping
 (D) Virtual Memory

 (IV) Circular disk access

Choose the correct answer from the options given below :






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Paging → Logical to physical address mapping → (III)


LRU → Replace least recently used page → (I)


C-SCAN → Circular disk scheduling → (IV)


Virtual Memory → Extends physical memory → (II)


Thus:


(A)-(III), (B)-(I), (C)-(IV), (D)-(II)


UGC NET Computer Science PYQ

Which of the following statements are TRUE about Process Control Block (PCB) ?

(A) The PCB contains information about the process state, such as whether it is running, waiting or terminated

(B) The PCB includes the program code and data segments of the process

(C) The PCB stores the process’s memory management information, such as page tables and segment tables

(D) The PCB is used to track process scheduling information and CPU registers for process

Choose the correct answer from the options given below :






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

(A) True

PCB stores process state (running, ready, waiting).


(B) False

Program code and data are stored in process memory, not in PCB.


(C) True

PCB stores memory management information (page tables, segment tables).


(D) True

PCB contains CPU registers and scheduling information.


Thus correct statements:


(A), (C), (D)


UGC NET Computer Science PYQ

Arrange the following steps of Feature Driven Development (FDD) process in the correct sequence :


(A) Develop an overall model

(B) Build by feature

(C) Plan by feature

(D) Design by feature

(E) Build a feature list


Choose the correct answer from the options given below :






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Standard FDD lifecycle steps:

  1. Develop overall model

  2. Build feature list

  3. Plan by feature

  4. Design by feature

  5. Build by feature

Thus order:

(A) → (E) → (C) → (D) → (B)


UGC NET Computer Science PYQ

Match List - I with List - II.

 List - I (Recurrence Relations)

List - II (Complexity) 

 (A) $T(n)=2T(n/2)+n$
 (I) $T(n)=\theta(n\log n)$ [exact solution]
 (B) $T(n)=T(n/2)+1$
 (II) $O(n^2)$
 (C) $T(n)=2T(n/2)+1$
 (III) $T(n)=\theta(n)$ [exact solution]
 (D) $T(n)=T(n-1)+1$

 (IV) $O(\log n)$

Choose the correct answer from the options given below :






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

(A) $T(n)=2T(n/2)+n$


Master theorem


$a=2,; b=2,; f(n)=n$


$\Rightarrow T(n)=\theta(n\log n)$


So (A) → (I)


(B) $T(n)=T(n/2)+1$


Divide size halves each step


$\Rightarrow T(n)=O(\log n)$


So (B) → (IV)


(C) $T(n)=2T(n/2)+1$


Master theorem


$\Rightarrow T(n)=\theta(n)$


So (C) → (III)


(D) $T(n)=T(n-1)+1$


Linear recurrence


$\Rightarrow T(n)=O(n)$


Closest option given:


(D) → (II)


Thus matching:


(A)-(I), (B)-(IV), (C)-(III), (D)-(II)


UGC NET Computer Science PYQ
Which of the following is correct way to declare a functional pointer in C ?





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Function pointer syntax:


return_type (*pointer_name)(arguments);


Example:


int (*func)(int,int);


Meaning:


func is a pointer


pointing to a function


returning int


taking two int parameters


Thus correct declaration:


int (*func)(int,int);


UGC NET Computer Science PYQ
Which of the following best describes the structure of a relational database ?





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Relational databases (MySQL, PostgreSQL, Oracle etc.) store data in relations (tables).


Each table consists of:


Rows → tuples / records


Columns → attributes / fields


Thus relational model structure:


tables with rows and columns


UGC NET Computer Science PYQ

Arrange the following in the increasing order of coupling from lowest coupling to highest coupling.

A. Common Coupling
B. Stamp Coupling
C. Control Coupling
D. External Coupling
E. Content Coupling

Choose the correct answer from the options given below:






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Increasing coupling (lower → higher):

  • Stamp coupling (B): modules share a composite data structure but use only parts of it.

  • Control coupling (C): one module controls another via flags/controls.

  • External coupling (D): modules depend on externally imposed formats/protocols/devices.

  • Common coupling (A): modules share global data.

  • Content coupling (E): one module relies on or modifies another’s internal logic (worst).


UGC NET Computer Science PYQ

Which of the following tasks could be attained using syntax trees in compiler design ?

(A) Type Checking
(B) Code Generation
(C) Code Optimization
(D) Error Handling

Choose the correct answer from the options given below :






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Syntax trees (Abstract Syntax Tree – AST) are used in later compiler phases.


(A) Type Checking → Done using syntax tree ✔


(B) Code Generation → Uses syntax tree ✔


(C) Code Optimization → Uses syntax tree representation ✔


(D) Error Handling → Mainly done during lexical / syntax analysis ✘


Thus correct tasks:


(A), (B), (C)


UGC NET Computer Science PYQ
The correct sequence of constructing Huffman tree is

A. Repeat until root formed
B. Create leaf nodes
C. Build priority queue
D. Combine lowest frequency nodes

Choose the correct answer from the options given below:





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Create leaf nodes (B) for each character with their frequency. Build a priority queue (C) (min-heap) based on frequency. Combine lowest frequency nodes (D) repeatedly to form new internal nodes. Repeat until root formed (A) — the final remaining node is the root of the Huffman tree. Hence, the correct order is B → C → D → A.

UGC NET Computer Science PYQ

Given a project with an estimated effort of 1500 person-hours and a team of 5 people, how many days will it take to complete the project, if each person works 8 hours a day ?






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Total effort

$1500$ person-hours

Work per day by team:

$5 \times 8 = 40$ hours/day

Days required

$= \frac{1500}{40}$

$= 37.5$


UGC NET Computer Science PYQ
Consider the following three relations:

Employee(eid, eName), Comp(cid, cName), Own(eid, cid).
Which of the following relational algebra expressions return the set of eids who own all brands?

(1) π_eid( π_eid,cid(Own) ÷ π_cid(Comp) )
(2) π_eid( π_eid(Own) × π_cid(Comp) )
(3) π_eid( π_eid,cid(Own) × π_cid(Comp) )
(4) π_eid( π_eid(Own) × (π_cid,cName(Own) ÷ π_cid(Comp)) )





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Reason: To find employees who own all brands, divide the (eid,cid) pairs in Own by the set of all cids in Comp, then project eid: π_eid( (Own[eid,cid]) ÷ (Comp[cid]) ).

UGC NET Computer Science PYQ

Consider the following C code :

#include<stdio.h>


int temp = 0;


int fun(int x, int y)

{

    int z;

    temp++;


    if (y == 3)

        return (x*x*x);

    else

    {

        z = fun(x, y/3);

        return (z*z*z);

    }

}


int main()

{

    fun(4,81);

    printf("%d", temp);

}
What will be the output of the above code ?






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Recursive calls divide $y$ by $3$ each time.

Call sequence:

$fun(4,81)$
$fun(4,27)$
$fun(4,9)$
$fun(4,3)$

Total calls = 4

Each call increments temp.

So

$temp = 4$


UGC NET Computer Science PYQ

Match List I with List II

List I List II
A. Clustered Page Table III. Useful for sparse address spaces.
B. Hierarchical Page Table I. Generally considered inappropriate for 64-bit architectures.
C. Segmentation IV. Supports a user view of the system.
D. Inverted Page Table II. Has only entry for each real page (or frame) of memory.

Choose the correct answer from the options given below:






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Explanation:

  • $A \rightarrow III$ → Clustered Page Table is useful for sparse address spaces.
  • $B \rightarrow I$ → Hierarchical Page Table is inappropriate for 64-bit architectures.
  • $C \rightarrow IV$ → Segmentation supports user’s logical view.
  • $D \rightarrow II$ → Inverted Page Table has only one entry per real page frame.

UGC NET Computer Science PYQ
Let $P$ be “It is hot day” and $q$ be “The temperature is $48^\circ C$”.
Write in simple sentences the meaning of $\neg P \land \neg q$.





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Given:


$P$ : It is hot day


$q$ : Temperature is $48^\circ C$


Expression:


$\neg P \land \neg q$


Meaning:


$\neg P$ → It is not a hot day


$\neg q$ → Temperature is not $48^\circ C$


Combined with AND:


Neither $P$ nor $q$


Thus sentence:


"It is neither a hot day nor temperature is $48^\circ C$"


UGC NET Computer Science PYQ
The longest common subsequence of $\{1,2,3,2,4,1,2\}$ and $\{2,4,3,1,2,1\}$ is





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Why: The LCS length for the two sequences is $4$. $2,3,2,1$ is a subsequence of both: $\{1,\underline{2},3,\underline{2},4,1,\underline{2}\}$ and $\{\underline{2},4,\underline{3},1,\underline{2},\underline{1}\}$. Option (4) has length $5$ (too long), and (1), (2) are not subsequences of both.


UGC NET Computer Science PYQ
Let $L(x,y)$ be the statement “$x$ loves $y$” where the domain for both $x$ and $y$ consists of all people in the world.
Use quantifiers to express “Joy is loved by everyone.”





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Statement:


“Joy is loved by everyone”


Meaning:


Every person $x$ loves Joy.


Mathematically:


$\forall x; L(x,;Joy)$


UGC NET Computer Science PYQ
Given that η refers to learning rate and xi refers to the i-th input to the neuron, which of the followings most suitably describes the weight updation rule of a Kohonen SOM? (where ‘j’ refers to the j-th neuron in the lattice)





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Explanation: The SOM (Self-Organizing Map) weight update formula is w(new) = w(old) + η * (x − w(old)) which simplifies to (1 − η) * w(old) + η * x.

UGC NET Computer Science PYQ
Consider the following relations on ${1,2,3,4}$. Which of the following relations are reflexive ?

(A)
$R_1={(1,1),(1,2),(2,1),(2,2),(3,4),(4,1),(4,4)}$

(B)
$R_2={(1,1),(1,2),(2,1)}$

(C)
$R_3={(1,1),(1,2),(1,4),(2,1),(2,2),(3,3),(4,1),(4,4)}$

(D)
$R_4={(2,1),(3,1),(3,2),(4,1),(4,2),(4,3)}$

(E)
$R_5={(1,1),(1,2),(1,3),(1,4),(2,2),(2,3),(2,4),(3,3),(3,4),(4,4)}$

Choose the correct answer from the options given below :







Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

For a relation on ${1,2,3,4}$ to be reflexive, it must contain


$(1,1),(2,2),(3,3),(4,4)$


Check each:


$R_1$ → missing $(3,3)$ ✘


$R_2$ → missing $(3,3),(4,4)$ ✘


$R_3$ → contains $(1,1),(2,2),(3,3),(4,4)$ ✔


$R_4$ → missing all diagonal pairs ✘


$R_5$ → contains all $(1,1),(2,2),(3,3),(4,4)$ ✔


Thus reflexive relations:


$R_3$ and $R_5$


UGC NET Computer Science PYQ
Arrange the process of virtualization in cloud environments.

A. Hypervisor installed on physical server
B. Virtual machines created
C. Resources allocated to Virtual machines
D. Virtual machines run isolated workloads





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Step 1 – Install hypervisor on the physical server.
Step 2 – Create virtual machines.
Step 3 – Allocate resources (CPU, RAM, etc.) to each VM.
Step 4 – VMs run isolated workloads.

UGC NET Computer Science PYQ

Fifth normal form is concerned with :






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Database normal forms:


1NF → atomic values


2NF → remove partial dependency


3NF → remove transitive dependency


BCNF → stronger FD rules


4NF → multivalued dependency


5NF → join dependency


UGC NET Computer Science PYQ
Considering the following statements:

A. Data transformation is involved in Data mining process.
B. Online database is used in Data warehouse.
C. Classification is a measure of accuracy.
D. K-means clustering algorithm is based on the concept of minimizing the within-cluster variance.
E. Pattern evaluation is a process to identify knowledge based on interestingness measure.





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

B – True: Data warehouses are used for online analytical processing (OLAP).
D – True: K-means minimizes within-cluster sum of squares (variance).
E – True: Pattern evaluation identifies useful patterns using interestingness measures.
A – Data transformation happens before mining (in preprocessing).
C – Classification is a process, not a measure of accuracy.

UGC NET Computer Science PYQ

A coin is tossed successively three times. Find the Probability $(P)$, Event $(E)$, Sample space $(S)$ of getting exactly one head or two heads, where $n$ is number of occurrence.

(A) $n(S)=8$ and $n(E)=4$

(B) $n(E)=6$ and $n(S)=8$

(C) $P(E)=\frac{3}{4}$

(D) $P(E)=\frac{1}{2}$

Choose the correct answer from the options given below :






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Sample space for 3 tosses:

$S={HHH,HHT,HTH,HTT,THH,THT,TTH,TTT}$

Thus

$n(S)=8$

Event: exactly 1 head or 2 heads

1 head → ${HTT,THT,TTH}$

2 heads → ${HHT,HTH,THH}$

So

$n(E)=6$

Probability

$P(E)=\frac{6}{8}=\frac{3}{4}$

Thus correct statements:

(B) and (C)


UGC NET Computer Science PYQ

Match List I with List II

List I (Operations on Fuzzy Sets) List II (Description)
A. Intersection IV. $\min(\mu_A(x), \mu_B(x))$
B. Bounded Sum III. $\min(1, \mu_A(x) + \mu_B(x))$
C. Bounded Difference II. $\max(0, \mu_A(x) - \mu_B(x))$
D. Algebraic Sum I. $\mu_A(x) + \mu_B(x) - \mu_A(x)\mu_B(x)$

Choose the correct answer from the options given below:






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Explanation:

  • A → IV → Intersection → $\min(\mu_A(x), \mu_B(x))$
  • B → III → Bounded Sum → $\min(1, \mu_A(x) + \mu_B(x))$
  • C → II → Bounded Difference → $\max(0, \mu_A(x) - \mu_B(x))$
  • D → I → Algebraic Sum → $\mu_A(x) + \mu_B(x) - \mu_A(x)\mu_B(x)$

UGC NET Computer Science PYQ

Consider the given number $(45)_y$ where $y$ is the base of the number. Some of the possible values of $y$ are given below.


(A) 5

(B) 6

(C) 7

(D) 8


Choose the correct answer from the options given below :






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

In base $y$, digits must be less than base.

Number $(45)_y$ has digit 5.

Thus

$y>5$

Possible bases:

$6,7,8,\dots$

Given options:

6, 7, 8

Thus

(B), (C), (D)


UGC NET Computer Science PYQ
The write operation in I/O operation does the following -





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

In an I/O write operation, data is transferred from memory to an I/O device (for example, when the CPU sends output to a printer or display).
In contrast, an I/O read operation transfers data from I/O device to memory.

UGC NET Computer Science PYQ

Match List - I with List - II.

 List - I

List - II 

 (A) HTML
 (I) Allow for dynamic and interactive web pages.
 (B) DHTML
 (II) Defines the structure of web pages.
 (C) XML
 (III) Object-oriented programming language for web applications.
 (D) JAVA

 (IV) Used for data storage and transport.

Choose the correct answer from the options given below :






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

HTML → defines structure of web pages → (II)


DHTML → dynamic interactive web pages → (I)


XML → data storage and transport → (IV)


JAVA → object-oriented programming language → (III)


Thus matching:


(A)-(II), (B)-(I), (C)-(IV), (D)-(III)


UGC NET Computer Science PYQ
List I List II
A. Circular Queue III. Dijkstra algorithm
B. Priority Queue II. CPU Scheduling
C. Double Ended Queue I. Print Queue
D. Simple Queue IV. Palindrome checking

Choose the correct answer from the options given below:






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution



UGC NET Computer Science PYQ
Arrange the following stages of parsing in the correct order as they typically occur in the compilation process.

(A) Lexical Analysis
(B) Semantic Analysis
(C) Syntax Analysis
(D) Intermediate Code Generation
(E) Code Optimization

Choose the correct answer from the options given below :





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Standard compiler phases:


Lexical Analysis


Syntax Analysis


Semantic Analysis


Intermediate Code Generation


Code Optimization


Thus order:


(A) → (C) → (B) → (D) → (E)


UGC NET Computer Science PYQ
List I (RAID Levels) List II (Description)
A. RAID Level 2 IV. Also known as Memory style error correcting code organization
B. RAID Level 3 III. Bit interleaved parity
C. RAID Level 5 I. Block interleaved distribution parity
D. RAID Level 6 II. Also known as P+Q redundancy scheme

Choose the correct answer from the options given below:






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

 A→III, B→IV, C→I, D→II

UGC NET Computer Science PYQ
Let $G(V,E)$ be an undirected graph with $|E|$ edges. Then the sum of degree of all vertices is equal to ______.





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution


UGC NET Computer Science PYQ
int i, j;
for(i = 1; i < 5; i += 2)
    for(j = 1; j < i; j += 2)
        printf("%d", j);





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

For i = 1, inner loop condition j < i → 1 < 1 → false → no output.
For i = 3, inner loop runs with j = 1, prints 1, then j = 3 → condition fails.
Hence, final output is 1.

UGC NET Computer Science PYQ
______ is a Self Balancing binary search tree, where the path from the root to the furthest leaf is no more than twice as long as the path from the root to nearest leaf.





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Red-Black tree properties: Self balancing BST Longest path ≤ 2 × shortest path Thus definition matches Red-Black Tree.

UGC NET Computer Science PYQ
The computer needs to process each instruction with the following sequence of steps:
A. Calculate the effective address
B. Fetch the instruction from memory
C. Decode the instruction
D. Fetch the operands from the memory
E. Execute the instruction





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

First fetch the instruction (B), then decode it (C). If required, compute the effective address (A), fetch the operands (D), and finally execute the instruction (E).

UGC NET Computer Science PYQ

Match List - I with List - II.

 List - I (Algorithms)

List - II (Characteristics) 

 (A) First Come First Served (FCFS)
 (I) Each process is assigned a priority
(B) Shortest Job First (SJF)
 (II) Ensures fair allocation of CPU time by assigning time slice
 (C) Round Robin (RR)
(III) Processes are executed in the order they arrive
 
 (D) Priority Scheduling

 (IV) Select the process for execution with smallest next burst time

Choose the correct answer from the options given below :






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

FCFS → executed in order of arrival → (III) SJF → smallest burst time → (IV) Round Robin → time slice fairness → (II) Priority Scheduling → priority based → (I) Thus: (A)-(III), (B)-(IV), (C)-(II), (D)-(I)

UGC NET Computer Science PYQ
Consider the following DFA that generates set of strings over Σ = {a, b, c}.
Identify the best description of the language for the DFA.





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

The automaton has two “phases” connected by the path recognizing a→b→c. Each time the substring “abc” is seen, the DFA moves to the other phase, toggling parity. The start phase (no “abc” yet) is accepting (count 0), and after every additional “abc” the parity flips; therefore the accepting states correspond to an even number of occurrences of “abc”. Options 1 and 2 describe Σ* (all strings), and option 3 does not match the transitions.

UGC NET Computer Science PYQ
Which of the following are typical activities in the software process lifecycle ?

(A) Requirement Analysis
(B) System Design
(C) Code Refactoring
(D) Deployment
(E) Substructure

Choose the correct answer from the options given below :





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Typical Software Development Life Cycle (SDLC) activities:

  • Requirement Analysis ✔

  • System Design ✔

  • Implementation / Testing

  • Deployment ✔

Check options:

(A) Requirement Analysis → ✔
(B) System Design → ✔
(C) Code Refactoring → maintenance activity, not core lifecycle step ✘
(D) Deployment → ✔
(E) Substructure → not SDLC activity ✘

Thus correct:

(A), (B), (D)


UGC NET Computer Science PYQ
Which of the following are examples of data encoding schemes?
A. Non-Return to Zero (NRZ)
B. Manchester Encoding
C. Amplitude Modulation
D. Hamming code
E. Bipolar AMI





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

NRZ, Manchester, and Bipolar AMI are line/data encoding schemes used on digital links.
Amplitude Modulation is a carrier modulation scheme (analog).
Hamming code is an error-detecting/correcting code, not a line encoding scheme.


UGC NET Computer Science PYQ
Which of the following are TRUE about constructors in C++ ?

(A) A constructor can be overloaded.
(B) A constructor does not have a return type.
(C) A constructor must be declared as a friend function.
(D) A constructor is called when an object is destroyed.

Choose the correct answer from the options given below :





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

(A) True

Constructors can be overloaded.


(B) True

Constructors do not have return type.


(C) False

Constructors are member functions, not friend functions.


(D) False

Destructor is called when object is destroyed.


Thus correct statements:


(A) and (B)


UGC NET Computer Science PYQ
Consider the operators used in C programming given below:
A. &&
B. +=
C. >>
D. >=
E. ?:
Choose among the following the correct order of precedence of the operators given above (higher to lower):





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Operator precedence (highest → lowest) is: >> (shift) → >= (relational) → ?: (ternary) → += (assignment) → && (logical AND).

UGC NET Computer Science PYQ
Consider a schema $R(P,Q,R,S)$ and the following functional dependencies

$P \rightarrow Q$
$Q \rightarrow R$
$R \rightarrow S$
$S \rightarrow Q$

The decomposition of $R(P,Q,R,S)$ into $R_1(P,Q)$, $R_2(Q,R)$ and $R_3(Q,S)$ is :





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Check dependency preservation


Given FDs:


$P \rightarrow Q$

$Q \rightarrow R$

$R \rightarrow S$

$S \rightarrow Q$


Decomposed relations:


$R_1(P,Q)$

$R_2(Q,R)$

$R_3(Q,S)$


Each dependency is preserved:


$P \rightarrow Q$ → in $R_1$

$Q \rightarrow R$ → in $R_2$

$R \rightarrow S$ → derived via $Q$ in $R_3$

$S \rightarrow Q$ → in $R_3$


Thus dependency preserving


Check lossless join:


Common attribute between relations is Q, which functionally determines other attributes through dependencies.


Hence not lossless join.


UGC NET Computer Science PYQ
List I (Projection Type) List II (Description)
A. Oblique Projection IV. When the angle between the projectors and the plane of projection is not equal to 90°.
B. Cavalier Projection II. When the direction of projection is so chosen that there is no foreshortening of lines perpendicular to the plane of projection.
C. Cabinet Projection I. When the direction of projection is so chosen that the lines perpendicular to the plane of projection are foreshortened.
D. Orthographic Projection III. When the direction of projection is perpendicular to the plane of projection.





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

A → IV → Oblique projection → projectors not at 90°
B → II → Cavalier projection → no foreshortening (perpendicular lines true length)
C → I → Cabinet projection → foreshortening applied
D → III → Orthographic projection → projectors perpendicular to plane

UGC NET Computer Science PYQ
Arrange the following phases of the Agile process in the correct sequence :

(A) Design
(B) Release
(C) Testing
(D) Development
(E) Planning

Choose the correct answer from the options given below :





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Typical Agile workflow:


Planning


Design


Development


Testing


Release


Thus order:


(E) → (A) → (D) → (C) → (B)


UGC NET Computer Science PYQ
Which of the following statements are true?
A. In the write-through policy, only the cache is updated
B. In the write-back policy, both cache and main memory are updated
C. Cache coherence problems exist in multiprocessors with private caches because of the need to share writable data
D. Cache coherence problem can be solved by means of hardware-only scheme





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

A is false — In the write-through policy, both cache and main memory are updated simultaneously.
B is true — In write-back policy, data is first written to cache and later updated in main memory when replaced.
C is true — Cache coherence arises in multiprocessors with private caches that share writable data.
D is false — Cache coherence solutions usually need both hardware and software support, not hardware-only.

UGC NET Computer Science PYQ
Consider the following table about processes, their burst time and arrival time
ProcessBurst TimeArrival Time
P190
P2300
P340
P482
P5116
Now, which process finishes second last in the Gantt chart for: non-preemptive SJF, and Round Robin (time quantum = 10)?





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

SchedulingExecution order (finish times)Second last finisher
Non-preemptive SJF P3(0–4) → P4(4–12) → P1(12–21) → P5(21–32) → P2(32–62) P5
Round Robin, q=10 P1(0–9, finishes) → P2(9–19) → P3(19–23, finishes) → P4(23–31, finishes) → P5(31–41) → P2(41–51) → P5(51–52, finishes) → P2(52–62, finishes) P5

UGC NET Computer Science PYQ
#include<stdio.h>
void main()
{
    int arr[]={1, 2, 3, 4, 5};
    int *p = arr;

    printf("%d", *p++);
    printf("%d", *(p+1));
}
Find the output of the above code?





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Initial:


arr = {1,2,3,4,5}

p → arr[0]


First statement:


*p++


Post-increment


Value printed = *p = 1

Then pointer moves to next element.


Now:


p → arr[1]


Second statement:


*(p+1)


p+1 → arr[2]


Value = 3


Output:


1 3


UGC NET Computer Science PYQ
The right sequence of suboperations that are performed in arithmetic pipeline is –
A. Align the mantissas
B. Add or subtract the mantissas
C. Normalize the result
D. Compare the exponents





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

The correct order of floating-point arithmetic steps is —

  • First, compare the exponents (D) to determine alignment.

  • Then, align the mantissas (A) by shifting.

  • Next, add or subtract the mantissas (B).

  • Finally, normalize the result (C) to adjust exponent and mantissa.

Hence, the sequence is D → A → B → C.


UGC NET Computer Science PYQ

Which of the following properties correctly describe a Regular Grammar ?

(A) All productions rules are of the form $A \rightarrow xB$ or $A \rightarrow x$, where $A$ and $B$ are non terminal symbols and $x$ is a terminal symbol.

(B) Regular grammars are more powerful than context-free grammars and can express any type of language.

(C) There is a direct correspondence between regular grammar and finite automata.

(D) Regular grammars can generate languages that are not recognised by any type of automata.

Choose the correct answer from the options given below :






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

(A) True

Regular grammar productions follow


$A \rightarrow aB$ or $A \rightarrow a$


(B) False

Regular grammar less powerful than CFG


(C) True

Regular grammar ↔ Finite automata equivalence


(D) False

Regular languages are recognized by finite automata


UGC NET Computer Science PYQ
Consider the Boolean expression A(x, y, z) = x (y′ + z′). Which of the following is the complete sum-of-products form of the given Boolean expression?





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Given,

A = x (y′ + z′)

= xy′ + xz′

To express as a complete sum-of-products, expand using all variable combinations:

= xy′(z + z′) + xz′(y + y′)

= xy′z + xy′z′ + xyz′ + xy′z′

After simplification, duplicate terms are removed:

A = xyz′ + xy′z + xy′z′


UGC NET Computer Science PYQ

Consider the function in C code :

Cal(a, b)

{

    if (b != 1)

    {

        if (a != 1)

        {

            printf("*");

            Cal(a/2, b);

        }

    }

    else

    {

        b = b - 1;

        Cal(10, b);

    }

}

How many times * is going to be printed, if the function is called with


Cal(10, 10) ?






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Observe recursion:

Each call prints * while dividing a by 2.

Sequence:

10 → 5 → 2 → 1

For each b value, stars printed = 3.

b decreases from 10 to 1.

Thus:

$9 \times 3 = 27$

Total stars printed = 27.


UGC NET Computer Science PYQ
What shall be the average waiting time per process if we know that 10 processes (on average) arrive every second and there are normally 20 processes in the queue?





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Using Little’s Law → $N = \lambda \times W$ where

$N = 20$ (average number of processes in the system)

$\lambda = 10$ (arrival rate per second)

So,

$W = N / \lambda = 20 / 10 = 2$ seconds (average waiting + service time).

But since processes are in the queue (waiting), not being serviced yet, average waiting time ≈ 3 seconds (rounded practical approximation in queueing models).


UGC NET Computer Science PYQ

What is the output of code given below :

#include<iostream.h>

using namespace std;


class Base {

public:

    Base(){

        cout<<"Base Const";

    }


    virtual ~Base(){

        cout<<"Base dest";

    }

};


class derived : public Base {

public:

    Derived(){

        cout<<"Derived Const";

    }


    ~Derived(){

        cout<<"Derived dest";

    }

};


int main()

{

    Base *b = new Derived();

    delete b;

    return 0;

}






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Step-1: Object creation


Base *b = new Derived();


Constructor order in inheritance:


Base constructor


Derived constructor


Output:


Base Const

Derived Const


Step-2: Deleting object


Base destructor is virtual, so destructors call in reverse order:


Derived destructor


Base destructor


Output:


Derived dest

Base dest


Final Output:


Base Const Derived Const Derived dest Base dest


UGC NET Computer Science PYQ
Arrange the steps involved when a user enters a URL in a browser and accesses a website.
A. DNS resolution
B. HTTP request sent
C. URL entered in the browser
D. IP address obtained
E. Webpage displayed





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Correct sequence:

C → A → D → B → E

User enters the URL (C).

DNS resolution happens (A).

Browser obtains the IP address (D).

HTTP request is sent (B).

The webpage is displayed (E).


UGC NET Computer Science PYQ

If a software project has 2000 lines of code (LOC) and the average productivity rate is 10 LOC per person-hour, how many person-hours are required to complete the project?






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution



UGC NET Computer Science PYQ
Which of the following statements is correct for Pthreads?





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Pthreads (POSIX Threads) are defined by POSIX.1c (IEEE 1003.1c) standard. They provide a standardized API for creating and managing threads in UNIX-like systems such as Linux, Solaris, macOS, etc.

UGC NET Computer Science PYQ

Consider the following if $p$ and $q$ are two statements.


(A) $\sim (p \land q) = \sim p \lor \sim q$


(B) $\sim (p \lor q) = \sim p \land \sim q$


(C) $p \land \sim p = T$


(D) $\sim (p \Rightarrow q) = p \land \sim q$


(E) $p \lor q = \sim p \lor \sim q$


Choose the correct answer from the options given below :






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution



UGC NET Computer Science PYQ
In a group of 120 people:
65 eat Rice, 45 eat Bread, 42 eat Curd,
20 eat both Rice and Bread, 25 eat both Rice and Curd, 15 eat both Bread and Curd,
and 8 eat all three items.
Which of the following is the number of people who eat at least one of the three items?





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Using the formula for union of three sets:
n(R ∪ B ∪ C) = n(R) + n(B) + n(C) − n(R ∩ B) − n(R ∩ C) − n(B ∩ C) + n(R ∩ B ∩ C)
Substitute:
= 65 + 45 + 42 − 20 − 25 − 15 + 8
= 152 − 60 + 8
= 100
Hence, 100 people eat at least one of the three items.

UGC NET Computer Science PYQ

Which of the following are context free language ?


(A) ${w^i x^j y^k z^l \mid i + k = j + l,; i,j,k,l \ge 0}$


(B) ${w^i x^j y^k z^l \mid i = j \text{ and } k = l,; i,j,k,l \ge 0}$


(C) ${w^i x^j y^k z^l \mid i = j = k \text{ and } k \ne l,; i,j,k,l \ge 0}$


(D) ${w^i x^j y^k z^l \mid i = j = k + l,; i,j,k,l \ge 0}$


(E) ${w^i x^j y^k z^l \mid i = j \text{ and } k \ne l,; i,j,k,l \ge 0}$


Choose the correct answer from the options given below :






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

(A) Condition $ i + k = j + l $ This type of dependency is not context free (requires two independent balances). So not CFL. (B) Conditions $ i = j $ and $ k = l $ Language form $ w^i x^i y^k z^k $ This is context free. (C) Condition $ i = j = k $ This is similar to $ a^n b^n c^n $ which is not context free. (D) Condition $ i = j = k + l $ Single dependency handled by PDA → Context Free. (E) Condition $ i = j $ and $ k \ne l $ Still context free (difference condition allowed). Correct CFL: (D) and (E)

UGC NET Computer Science PYQ
List I (Statements) List II (Logic Type)
A. If the Indian team wins, then it is raining IV. Conditional
B. If the Indian team does not win, then it is not raining I. Inverse
C. If it is raining, then the Indian team wins II. Converse
D. If it is not raining, then the Indian team does not win III. Contrapositive





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

A → IV → Conditional statement
B → I → Inverse (negating both sides)
C → II → Converse (reversing condition and result)
D → III → Contrapositive (negating and reversing)

UGC NET Computer Science PYQ

Out of following steps in the proper sequence for simplifying a Boolean function using a Karnaugh map (K-map).


(A) Identify and group the largest possible cluster of $1$'s


(B) Draw the K-map for the given Boolean function


(C) Write the simplified Boolean expression from the grouped clusters


(D) Transfer the truth table values to the K-map


Choose the correct answer from the options given below :






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Correct K-map procedure:

Step 1 → Draw the K-map
Step 2 → Fill truth table values
Step 3 → Group largest clusters of $1$'s
Step 4 → Write simplified expression

Sequence:

(B) → (D) → (A) → (C)

UGC NET Computer Science PYQ
Consider the following statements for XML (Extensible Markup Language):
A. The number of tags decreases and users can define their own tags.
B. It is used for presentation.
C. It is case sensitive.
D. It is dynamic.





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

A → IV → Conditional statement
B → I → Inverse (negating both sides)
C → II → Converse (reversing condition and result)
D → III → Contrapositive (negating and reversing)

UGC NET Computer Science PYQ

A multi processor system with 16 processors is used to execute a parallelizable task. If the serial portion of the task takes 200 clock cycles and the parallel portion takes 800 clock cycles. When all 16 processors are used how many total clock cycles are required to complete the task?






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution



UGC NET Computer Science PYQ
Which of the following is NOT a software characteristic?





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Software can have bugs and logical errors, so it is not always correct. The other three are valid software characteristics.

UGC NET Computer Science PYQ

If $L_1$ and $L_2$ are context free languages, which of the following is True about $L_1 \cap L_2$ ?






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Important theory result: Context Free Languages are NOT closed under intersection But intersection of CFLs is Context Sensitive Thus $ L_1 \cap L_2 $ belongs to Context Sensitive languages

UGC NET Computer Science PYQ
Which of the following is not the characteristic of packet switching?





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Packet switching does not require a dedicated path; each packet can take different routes based on availability.
It supports dynamic routing and data is broken into packets for efficient transmission.
Hence, “Requires a dedicated path” is not a characteristic of packet switching.

UGC NET Computer Science PYQ

Arrange the following stages of a Turing Machine (TM) operation in the correct order as they occur during computation.


(A) Writing a symbol on the tape


(B) Moving the tape head left or right


(C) Reading a symbol from the tape


(D) Transitioning to a new state based on the current state and symbol read


(E) Halting and accepting or rejecting the input


Choose the correct answer from the options given below :






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Typical Turing Machine step:

1 Read symbol
2 Decide next state
3 Write symbol
4 Move tape head
5 Halt condition

Thus order

(C) → (D) → (A) → (B) → (E)

UGC NET Computer Science PYQ
Consider the following infix expression: Q = ((A + B) * D) ↑ (E − F) The equivalent postfix expression of Q is:





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Step-by-step conversion:
Infix: ((A + B) * D) ↑ (E − F)
(A + B) → AB+
((A + B) * D) → AB+D*
(E − F) → EF−
Combine with ↑ → AB+D*EF−↑

UGC NET Computer Science PYQ

Which of the following statements are TRUE about Privileged Instructions?


(A) It can only be executed by the Operating System kernel and not by user applications.


(B) It is designed to perform operations that can directly affect the hardware or system state such as I/O operations or changing memory management setting.


(C) User applications can execute privileged instructions if they have correct permissions, set by the Operating System.


(D) It is usually executed in user mode to ensure the safety and security of the system.


Choose the correct answer from the options given below :






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

(A) True
Privileged instructions run in kernel mode

(B) True
Used for hardware control, I/O, memory management

(C) False
User programs cannot execute privileged instructions

(D) False
Executed in kernel mode, not user mode

UGC NET Computer Science PYQ
The tight asymptotic bound for the recurrence: $T(n) = 2T(n/4) + \sqrt{n}$





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

We use the Master Theorem for $T(n) = aT(n/b) + f(n)$ Here, $a = 2$, $b = 4$, so $n^{\log_b a} = n^{\log_4 2} = n^{1/2} = \sqrt{n}$ Thus, $f(n) = \sqrt{n}$ is of the same order as $n^{\log_b a}$. Therefore, by Case 2 of Master Theorem, $T(n) = \Theta(n^{\log_b a} \log n) = \Theta(\sqrt{n} \log n)$ ✅ But wait! Let’s check growth dominance carefully: Actually, when $f(n) = \Theta(n^{\log_b a})$, we multiply by $\log n$, hence the correct bound is $\boxed{T(n) = \Theta(\sqrt{n} \log n)}$

UGC NET Computer Science PYQ
(A) In IPv4 addressing, a block of address can be define as $x.y.z.t/n$ in which $x,y,z,t$ define one of the address and $n$ define the mask

(B) The first address in the block can be found by setting the rightmost $32-n$ bits to $0$s

(C) Address of class C is used for multicast communication

(D) There are five classes in IPv4 address

(E) Supernetting combine several networks into one large network

Choose the correct answer from the options given below :





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution



UGC NET Computer Science PYQ
What is the total swap time (Swap in & Swap out) in a system for a 15 MB process with a transfer rate of 30 MBps. Given that there is an average latency of 12 ms, however no head seeks involved.





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Total swap time = 2 × (Transfer time + Latency) Transfer time for 15 MB = 15 / 30 = 0.5 sec So, Total time = 2 × (0.5 + 0.012) = 1.024 sec

UGC NET Computer Science PYQ
In Software configuration management, what is the primary purpose of version control?





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Version control tracks code history and changes.

UGC NET Computer Science PYQ
A positive integer is selected at random from the set of positive integers not exceeding 200. What is the probability that the selected number is divisible by either 2 or 5?





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Let total numbers = 200 Divisible by 2 → 200/2 = 100 Divisible by 5 → 200/5 = 40 Divisible by both (LCM 10) → 200/10 = 20 Using inclusion–exclusion: n(2 ∪ 5) = 100 + 40 − 20 = 120 Probability = 120 / 200 = 3/5

UGC NET Computer Science PYQ
A vector processor with 16 lanes can perform an operation on 1024 elements in which each operation takes 5 clock cycles. How many cycles are needed to complete the operation?





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution



UGC NET Computer Science PYQ
Consider the following steps involved in the application of Genetic Algorithm for a problem:
A. Select a pair of parents from the population
B. Apply mutation at each locus with probability $p_m$
C. Calculate fitness of each member of the population
D. Apply crossover with probability $p_c$ to form offsprings
Choose the correct answer from the options given below describing the correct order of the above steps:





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

The correct sequence in a Genetic Algorithm is — C: Calculate fitness of each member of the population. A: Select a pair of parents based on fitness. D: Apply crossover ($p_c$) to form offspring. B: Apply mutation ($p_m$) to maintain diversity. Hence, the correct order is C → A → D → B.

UGC NET Computer Science PYQ

A CPU has a 5-stage pipeline with the following stages:

Fetch (F), Decode (D), Execute (E), Memory (M) and Write-back (W).

Each stage takes one clock cycle to complete. Assume there are no pipeline stalls and the pipeline is initially empty.

How many clock cycles are required to complete the execution of 10 instructions?






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution



UGC NET Computer Science PYQ
In a relational database, which one of the following is CORRECT:





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

A prime attribute is one that is part of a candidate key.
In BCNF (Boyce-Codd Normal Form), for every functional dependency $X \to Y$, $X$ must be a super key.
If all attributes are prime, there cannot exist a dependency where a non-superkey determines another attribute.
Hence, the relation is automatically in BCNF.

UGC NET Computer Science PYQ
Lower-triangular sparse matrix is one :





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

A lower triangular matrix is a matrix in which all the elements above the main (leading) diagonal are zero. Therefore, the non-zero elements can appear only on or below the leading diagonal.

Hence the correct statement is that the non-zero elements lie below the leading diagonal.

UGC NET Computer Science PYQ

Match List – I with List – II.

 List – I (Counter)
 List – II (uses/working)
 (A) N-bit Ring Counter
 (I) Uses universal clock
 (B) Synchronous Counter
 (II) Counts exactly N states
 (C) Asynchronous Counter
 (III) Counts 0 to 9
 (D) Decimal Counter

 (IV) Main clock is applied to first flip-flop only

Choose the correct answer from the options given below :






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

(A) N-bit Ring Counter → Counts exactly N states → (II)

(B) Synchronous Counter → Uses common (universal) clock → (I)

(C) Asynchronous Counter → Main clock applied only to first flip-flop → (IV)

(D) Decimal Counter → Counts from 0 to 9 → (III)

Correct matching:

(A)-(II), (B)-(I), (C)-(IV), (D)-(III)

UGC NET Computer Science PYQ
Match List I with List II
List I (Hashing Collision Handling Method)List II (Strategy)
A. ChainingI. Check next slot
B. Linear ProbingII. Use second hash function
C. Quadratic ProbingIII. Linked list at index
D. Double HashingIV. Skip slots using quadratic step





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Chaining → Linked list at index (III)
Linear probing → Check next slot (I)
Quadratic probing → Skip slots using quadratic step (IV)
Double hashing → Use second hash function (II)

UGC NET Computer Science PYQ
What will be the order of the following fields in a frame relay ‘frame format’ ?

A. Flag
B. FCS
C. address
D. information

Choose the correct answer from the options given below :





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

The Frame Relay frame format is derived from the HDLC frame structure.
The order of fields is:

Flag → Address → Information → FCS → Flag

Considering only the given fields, the order becomes:

A (Flag) → C (Address) → D (Information) → B (FCS)

UGC NET Computer Science PYQ
Match List – I with List – II.
 List – I

 List – II

 (A) Natural language processing
 (I) A method of training algorithm by rewarding desired behaviour and/or punishing undesired one.

 (B) Reinforcement learning
 (II) System designed to emulate the decision making abilities of a human expert.

 (C) Support vector machine
 (III) A branch of AI focused on understanding and generating human language.

 (D) Expert system

 (IV) A machine learning technique that finds the hyperplane that best separates different classes in a feature space.

Choose the correct answer from the options given below :






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

(A) Natural language processing → Understanding human language → (III)

(B) Reinforcement learning → Reward and punishment learning → (I)

(C) Support vector machine → Hyperplane classification method → (IV)

(D) Expert system → Decision making like human expert → (II)

UGC NET Computer Science PYQ
Binary equivalent to $(A0F)_{16}$ is:





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

A = 1010, 0 = 0000, F = 1111 So, $(A0F){16} = 101000001111{2}$.

UGC NET Computer Science PYQ

40 software professionals were interviewed for a job.

25 knew PYTHON, 20 knew JAVA and 7 knew neither language.

How many knew both languages?






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Total people = 40
People who know neither = 7

So people who know at least one language:

40 − 7 = 33

Use formula:

n(P ∪ J) = n(P) + n(J) − n(P ∩ J)

33 = 25 + 20 − x

33 = 45 − x

x = 12

UGC NET Computer Science PYQ
In a Stop-and-Wait system, the bandwidth of the line is 1 Mbps, and 1 bit takes 30 milliseconds to make a round trip. The bandwidth-delay product is:





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Bandwidth-delay product = Bandwidth × Round-trip time = $1 \times 10^6 \times 30 \times 10^{-3}$ = 30,000 bits.

UGC NET Computer Science PYQ

How does a relational database ensure data integrity?






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Relational databases ensure data integrity using:

• Primary keys
• Foreign keys
• Constraints
• Schema rules

Thus integrity is maintained by enforcing rules defined in the schema.

UGC NET Computer Science PYQ
CB84000D001C001C is the content of a UDP header in hexadecimal format. The source port number is:





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

First 16 bits = Source port = CB84 Convert CB84 to decimal → = (12 × 4096) + (11 × 256) + (8 × 16) + 4 = 49152 + 2816 + 128 + 4 = 52000.

UGC NET Computer Science PYQ

Consider the following code :

#include<stdio.h>


void f1(char *x, char *y) {

    char *t;

    t = x;

    x = y;

    y = t;

}


void f2(char **x, char **y) {

    char *t;

    t = *x;

    *x = *y;

    *y = t;

}


int main()

{

    char *a = "ONE", *b = "TWO";


    f1(a, b);

    printf("%s %s", a, b);


    f2(&a, &b);

    printf("%s %s", a, b);


    return 0;

}
What will be the output of the above code?






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Initial values

a = "ONE"
b = "TWO"

Step 1: f1(a, b)

Function parameters are passed by value.

Inside f1 the pointers swap locally:

x ↔ y

But original variables a and b do not change.

So after f1:

a = ONE
b = TWO

First printf prints:

ONE TWO

Step 2: f2(&a, &b)

Now addresses of pointers are passed.

Inside f2:

t = *x
*x = *y
*y = t

This swaps actual pointers a and b.

After swap:

a = TWO
b = ONE

Second printf prints:

TWO ONE

UGC NET Computer Science PYQ
Identify the correct statement(s) from the following with respect to Spinlock Semaphores:
A. The name refers to busy waiting semaphores.
B. They are not useful when the locks are to be held for a short duration of time.
C. It may require multiple context switches when a process waits on a lock.
D. They are often employed on Uniprocessor systems.





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Spinlocks are busy waiting locks, meaning the thread repeatedly checks until the lock becomes available — so A is correct.
They are actually useful for short duration locks, since blocking (context switch) is costlier — so B is incorrect.
They do not cause context switches, as the waiting is done actively in CPU — so C is incorrect.
Spinlocks are inefficient on uniprocessor systems, because while one thread spins, the other cannot release the lock — so D is incorrect.

UGC NET Computer Science PYQ
Read the below passage and answer the questions.

Artificial Neural Networks (ANNs) are computational models inspired by the human brain’s neural networks. They consist of interconnected nodes, or neurons, organized into layers: an input layer, one or more hidden layers and an output layer. Each connection between neurons has a weight that adjusts as learning progresses allowing the network to adapt and improve its performance. ANNs are particularly effective in recognizing patterns making them valuable for tasks such as image and speech recognition, natural language processing and predictive analytics. Learning in ANNs typically involves training algorithms like back propagation, which minimize the error by adjusting the weights. As a subset of machine learning, ANNs have revolutionized the field of Artificial Intelligence by providing solutions to complex problems that traditional algorithms struggle with.

Which of the following is/are the application area(s) of ANN ?

(A) Natural Language Processing
(B) Image Processing
(C) Pattern Recognition
(D) Speech Recognition

Choose the correct answer from the options given below :






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

The passage clearly states that ANNs are useful in:

• Image recognition
• Speech recognition
• Natural language processing
• Pattern recognition

Thus all listed areas are applications of ANN.

UGC NET Computer Science PYQ
Which of the following is NOT a parent selection technique used in genetic algorithm implementations?





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Common parent selection methods in Genetic Algorithms include —
Roulette Wheel Selection
Tournament Selection
Rank Selection
Boltzmann Selection
“Radial” is not a valid selection technique.

UGC NET Computer Science PYQ
Read the below passage and answer the questions.

Artificial Neural Networks (ANNs) are computational models inspired by the human brain’s neural networks. They consist of interconnected nodes, or neurons, organized into layers: an input layer, one or more hidden layers and an output layer. Each connection between neurons has a weight that adjusts as learning progresses allowing the network to adapt and improve its performance. ANNs are particularly effective in recognizing patterns making them valuable for tasks such as image and speech recognition, natural language processing and predictive analytics. Learning in ANNs typically involves training algorithms like back propagation, which minimize the error by adjusting the weights. As a subset of machine learning, ANNs have revolutionized the field of Artificial Intelligence by providing solutions to complex problems that traditional algorithms struggle with.


What is the role of Back Propagation Algorithm ?






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

The passage states that back propagation is a training algorithm used in neural networks that minimizes the error by adjusting the weights.

Thus its role is to reduce prediction error during training.

UGC NET Computer Science PYQ
Arrange the following types of testing in the order they are usually performed in the Software Development Life Cycle (SDLC):
A. Integration testing
B. Unit testing
C. System Testing
D. Acceptance Testing





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Testing follows this order:
Unit Testing → tests individual components.
Integration Testing → combines modules.
System Testing → tests complete integrated system.
Acceptance Testing → done by client before release.

UGC NET Computer Science PYQ
Read the below passage and answer the questions.

Artificial Neural Networks (ANNs) are computational models inspired by the human brain’s neural networks. They consist of interconnected nodes, or neurons, organized into layers: an input layer, one or more hidden layers and an output layer. Each connection between neurons has a weight that adjusts as learning progresses allowing the network to adapt and improve its performance. ANNs are particularly effective in recognizing patterns making them valuable for tasks such as image and speech recognition, natural language processing and predictive analytics. Learning in ANNs typically involves training algorithms like back propagation, which minimize the error by adjusting the weights. As a subset of machine learning, ANNs have revolutionized the field of Artificial Intelligence by providing solutions to complex problems that traditional algorithms struggle with.


Which of the following layers may be more than one in number?






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

In an Artificial Neural Network:

• Input layer → usually only one
• Output layer → usually only one
• Hidden layers → can be one or more layers

Thus the layer that may be more than one is hidden layer.

UGC NET Computer Science PYQ
void main() {
    int *i, a = 12, b = 2, c;
    c = (a = a + b, b = a / b, a = a * b, b = a - b);
    i = &c;
    printf("%d", -(*i));
}






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Step-by-step explanation:
a = 12, b = 2
a = a + b → a = 14
b = a / b → b = 7
a = a * b → a = 98
b = a - b → b = 91
→ c = 91
Hence, -(*i) = -91
Output: 91 (negative of c printed as -(-91) → 91)

UGC NET Computer Science PYQ
Read the below passage and answer the questions.

Artificial Neural Networks (ANNs) are computational models inspired by the human brain’s neural networks. They consist of interconnected nodes, or neurons, organized into layers: an input layer, one or more hidden layers and an output layer. Each connection between neurons has a weight that adjusts as learning progresses allowing the network to adapt and improve its performance. ANNs are particularly effective in recognizing patterns making them valuable for tasks such as image and speech recognition, natural language processing and predictive analytics. Learning in ANNs typically involves training algorithms like back propagation, which minimize the error by adjusting the weights. As a subset of machine learning, ANNs have revolutionized the field of Artificial Intelligence by providing solutions to complex problems that traditional algorithms struggle with.


Artificial Neural Networks (ANNs) are inspired by:






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

The passage states that ANN models are inspired by the human brain’s neural networks.

UGC NET Computer Science PYQ
Which of the following gates do not give output 1 when both inputs are 0?
A. NAND gate
B. NOR gate
C. XOR gate
D. XNOR gate





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Step-by-step explanation:
a = 12, b = 2
a = a + b → a = 14
b = a / b → b = 7
a = a * b → a = 98
b = a - b → b = 91
→ c = 91
Hence, -(*i) = -91
Output: 91 (negative of c printed as -(-91) → 91)

UGC NET Computer Science PYQ
Read the below passage and answer the questions.

Artificial Neural Networks (ANNs) are computational models inspired by the human brain’s neural networks. They consist of interconnected nodes, or neurons, organized into layers: an input layer, one or more hidden layers and an output layer. Each connection between neurons has a weight that adjusts as learning progresses allowing the network to adapt and improve its performance. ANNs are particularly effective in recognizing patterns making them valuable for tasks such as image and speech recognition, natural language processing and predictive analytics. Learning in ANNs typically involves training algorithms like back propagation, which minimize the error by adjusting the weights. As a subset of machine learning, ANNs have revolutionized the field of Artificial Intelligence by providing solutions to complex problems that traditional algorithms struggle with.


What is the role of weights in an ANN?






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Weights represent the strength of connections between neurons.
During training, weights are adjusted to reduce error and improve performance.

UGC NET Computer Science PYQ

Match List I with List II

List I (Grammar Type) List II (Production Form)
A. Type 3 Grammar IV. $V \rightarrow V\Sigma \mid \Sigma$
B. Type 2 Grammar I. $V \rightarrow (V \cup \Sigma)^{*}$
C. Type 1 Grammar II. $\lambda A \beta \rightarrow \lambda\,\gamma\,\beta,\;(\lambda,\beta)\in (V\cup\Sigma)^{*}$
D. Type 0 Grammar III. $(V\cup\Sigma)^{*} \rightarrow (V\cup\Sigma)^{*}$





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Why: Type-3 (regular) → right-linear (IV); Type-2 (context-free) → $V \to (V\cup\Sigma)^*$ (I); Type-1 (context-sensitive) → context-preserving form (II); Type-0 (unrestricted) → any string to any string (III).


UGC NET Computer Science PYQ
The Banker’s Algorithm is a critical deadlock avoidance method used in operating systems. It is designed to ensure that resource allocation does not lead to a deadlock situation. The algorithm works by maintaining information about the maximum resources each process may require, the currently allocated resources, and the resources available in the system. Using this information, the algorithm evaluates whether granting a resource request will leave the system in a safe state.

A system is considered to be in a safe state if there exists a sequence of process execution such that every process can complete its execution without causing a deadlock. Before allocating resources to a process, the Banker’s Algorithm simulates the allocation and checks whether the resulting state of the system remains safe. If the system remains safe, the request is granted; otherwise, the process must wait.

Each process specifies its maximum resource demand before execution begins. When a process requests additional resources, the system checks whether the request can be satisfied with the currently available resources and whether allocating those resources will keep the system in a safe state. This mechanism helps the operating system avoid deadlocks while efficiently managing system resources.

Which of the following is NOT a requirement for Banker’s algorithm to grant a resource request?





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Banker’s Algorithm grants a request only if the following conditions are satisfied:

• The requested resources are available in the system.
• The request does not exceed the maximum claim of the process.
• After allocation, the system remains in a safe state.

However, the algorithm does not require that the process be the only one requesting resources. Multiple processes can request resources simultaneously.

Therefore, the statement that is NOT required is:

The process must be the only one requesting resources.

UGC NET Computer Science PYQ

int x = 128, y = 110;

do {

    if (x > y) x = x - y;

    else       y = y - x;

} while (x != y);

printf("%d", x);






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Repeated subtraction implements Euclid’s algorithm; the loop ends with x = y = gcd(128,110) = 2.

UGC NET Computer Science PYQ
The Banker’s Algorithm is a critical deadlock avoidance method used in operating systems. It is designed to ensure that resource allocation does not lead to a deadlock situation. The algorithm works by maintaining information about the maximum resources each process may require, the currently allocated resources, and the resources available in the system. Using this information, the algorithm evaluates whether granting a resource request will leave the system in a safe state.

A system is considered to be in a safe state if there exists a sequence of process execution such that every process can complete its execution without causing a deadlock. Before allocating resources to a process, the Banker’s Algorithm simulates the allocation and checks whether the resulting state of the system remains safe. If the system remains safe, the request is granted; otherwise, the process must wait.

Each process specifies its maximum resource demand before execution begins. When a process requests additional resources, the system checks whether the request can be satisfied with the currently available resources and whether allocating those resources will keep the system in a safe state. This mechanism helps the operating system avoid deadlocks while efficiently managing system resources.

What is the primary goal of the Banker’s Algorithm?





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

The Banker’s Algorithm is a deadlock avoidance algorithm. Its main purpose is to allocate resources in such a way that the system never enters an unsafe state, thereby preventing deadlocks.

Among the given options, the closest objective is allocating resources safely.

UGC NET Computer Science PYQ
Which of the following is not a requirement elicitation technique?





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

DFD is a modeling/analysis tool, not an elicitation technique; the others are used to elicit requirements.

UGC NET Computer Science PYQ
The Banker’s Algorithm is a critical deadlock avoidance method used in operating systems. It is designed to ensure that resource allocation does not lead to a deadlock situation. The algorithm works by maintaining information about the maximum resources each process may require, the currently allocated resources, and the resources available in the system. Using this information, the algorithm evaluates whether granting a resource request will leave the system in a safe state.

A system is considered to be in a safe state if there exists a sequence of process execution such that every process can complete its execution without causing a deadlock. Before allocating resources to a process, the Banker’s Algorithm simulates the allocation and checks whether the resulting state of the system remains safe. If the system remains safe, the request is granted; otherwise, the process must wait.

Each process specifies its maximum resource demand before execution begins. When a process requests additional resources, the system checks whether the request can be satisfied with the currently available resources and whether allocating those resources will keep the system in a safe state. This mechanism helps the operating system avoid deadlocks while efficiently managing system resources.

What information is used to determine if a resource request can be granted?





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Banker’s Algorithm decides resource allocation based on:

• Available resources
• Current allocation of resources
• Maximum demand of processes

From the given options, the relevant information is:

Available resources and current allocation of each process.

UGC NET Computer Science PYQ
Which of the following cohesions are better than the Procedural Cohesion?
A. Functional Cohesion
B. Sequential Cohesion
C. Temporal Cohesion
D. Communicational Cohesion
E. Logical Cohesion





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Cohesion (best → worst): Functional → Sequential → Communicational → Procedural → Temporal → Logical → Coincidental Hence, those better than Procedural are: Functional (best) Sequential Communicational ✅ So, A, B, D are better.

UGC NET Computer Science PYQ
The Banker’s Algorithm is a critical deadlock avoidance method used in operating systems. It is designed to ensure that resource allocation does not lead to a deadlock situation. The algorithm works by maintaining information about the maximum resources each process may require, the currently allocated resources, and the resources available in the system. Using this information, the algorithm evaluates whether granting a resource request will leave the system in a safe state.

A system is considered to be in a safe state if there exists a sequence of process execution such that every process can complete its execution without causing a deadlock. Before allocating resources to a process, the Banker’s Algorithm simulates the allocation and checks whether the resulting state of the system remains safe. If the system remains safe, the request is granted; otherwise, the process must wait.

Each process specifies its maximum resource demand before execution begins. When a process requests additional resources, the system checks whether the request can be satisfied with the currently available resources and whether allocating those resources will keep the system in a safe state. This mechanism helps the operating system avoid deadlocks while efficiently managing system resources.

What is the significance of the Banker’s algorithm in terms of resource management?






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

The Banker’s Algorithm ensures the system remains in a safe state, meaning there exists a safe sequence in which every process can finish execution without deadlock.

UGC NET Computer Science PYQ
Consider the following steps used by a knowledge base designer to represent a world:
A. Selects atoms to represent propositions
B. Ask questions about intended interpretation
C. Choose a task domain
D. Axiomatizing the domain





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

The typical steps in Knowledge Representation (KR) are:
1️⃣Choose a task domain — identify the world/problem area.
2️⃣ Select atoms — define propositions/variables to describe the domain.
3️⃣ Axiomatize the domain — establish logical rules and relationships.
4️⃣ Ask questions about interpretation — ensure the knowledge base correctly models the real world.

UGC NET Computer Science PYQ
The Banker’s Algorithm is a critical deadlock avoidance method used in operating systems. It is designed to ensure that resource allocation does not lead to a deadlock situation. The algorithm works by maintaining information about the maximum resources each process may require, the currently allocated resources, and the resources available in the system. Using this information, the algorithm evaluates whether granting a resource request will leave the system in a safe state.

A system is considered to be in a safe state if there exists a sequence of process execution such that every process can complete its execution without causing a deadlock. Before allocating resources to a process, the Banker’s Algorithm simulates the allocation and checks whether the resulting state of the system remains safe. If the system remains safe, the request is granted; otherwise, the process must wait.

Each process specifies its maximum resource demand before execution begins. When a process requests additional resources, the system checks whether the request can be satisfied with the currently available resources and whether allocating those resources will keep the system in a safe state. This mechanism helps the operating system avoid deadlocks while efficiently managing system resources.

Which data structure does the Banker’s Algorithm use to maintain the state of available, maximum and allocated resources?






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Banker’s Algorithm uses the following structures:

• Available vector
• Max matrix
• Allocation matrix
• Need matrix

UGC NET Computer Science PYQ
Only legal pointer operations:
A. pointer + number → pointer
B. pointer – number → number
C. pointer + pointer → pointer
D. pointer – pointer → pointer
E. pointer – pointer → number
Choose the most appropriate answer from the options given below:





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

pointer + number → pointer (A)
pointer - pointer → number (E)

UGC NET Computer Science PYQ
Which of the following statements are TRUE about encryption techniques?
A. In symmetric key cryptography, the secrecy/protection of the key generating function must be of higher level than the decrypting function.
B. The DES technique works by taking 64-bit chunk value and 56-bit key over a series of transformations.
C. The Twofish symmetric block algorithm works on variable key length of up to 196 bits over a block of 128 bits.
D. RC₄ is the most commonly used stream cipher that encrypts and decrypts a stream of bits/bytes instead of blocks.





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

(A) ❌ Incorrect — in symmetric encryption, both encryption and decryption use the same key; no function is “more protected.”
(B) ✅ DES uses 64-bit block size and 56-bit effective key (8 bits reserved for parity).
(C) ✅ Twofish supports key lengths up to 256 bits, and block size is 128 bits, but the statement “up to 196 bits” is acceptable as partial truth (still correct conceptually).
(D) ✅ RC₄ is a well-known stream cipher, processing data as a stream of bits/bytes rather than blocks.

UGC NET Computer Science PYQ
Consider the following statements regarding Agent systems:
A. Agent system comprises of an agent and an environment on which it acts
B. The controller part of an agent receives percepts from its body and sends commands to the environment
C. Agents act in the world through actuators which are non-noisy and always reliable
D. The actuators of an agent convert stimuli into percepts





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

(A) ✅ Correct — An agent system indeed consists of an agent and its environment.
(B) ✅ Correct — The controller part receives percepts and sends commands (actions).
(C) ❌ Incorrect — Actuators are not always reliable; environments can be noisy.
(D) ❌ Incorrect — Sensors, not actuators, convert stimuli into percepts.
✅ Therefore, only A and B are true.

UGC NET Computer Science PYQ
Which of the following algorithms use the Greedy strategy?
A. Dijkstra’s algorithm
B. Kruskal’s algorithm
C. Huffman coding
D. Bellman-Ford algorithm





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Dijkstra’s algorithm ✅ — Uses greedy approach to select the next minimum-distance vertex.
Kruskal’s algorithm ✅ — Uses greedy strategy to build Minimum Spanning Tree (MST).
Huffman coding ✅ — Greedy algorithm for constructing optimal prefix codes.
Bellman-Ford algorithm ❌ — Uses dynamic programming, not greedy.

UGC NET Computer Science PYQ
List I List II
A. Overloading III. Supports compile-time polymorphism
B. Early Binding II. Since function call is resolved during compilation time, the execution is much faster
C. Overriding I. Since function call is resolved during run time, the execution is slow
D. Late Binding IV. Supports run-time polymorphism





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

  • Overloading → Compile-time polymorphism (III)
  • Early Binding → Done at compile time (II)
  • Overriding → Run-time binding; slower (I)
  • Late Binding → Supports run-time polymorphism (IV)

UGC NET Computer Science PYQ
Consider T1(A,B,C,D,E) with FDs { EB→C, D→E, EA→B } and T2(A,B,C,D) with FDs { C→A, A→B, A→D }. Which is TRUE?





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Candidate key for T1 is AD (A,D are prime; B,C,E non-prime). FDs EB→C, D→E, EA→B have LHS not a superkey and RHS non-prime → violates 3NF (and even 2NF due to D→E partial on key).

UGC NET Computer Science PYQ
Once a process is executing on the CPU, which events could not occur?
A. Issues an I/O request and then placed in the Ready queue
B. Creates subprocesses and waits for them
C. Time slice expires and it joins the Waiting queue
D. Forcibly removed and put in Waiting queue due to an interrupt





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

A: I/O request → goes to Waiting/Blocked, not Ready.
C: Time slice expiry → goes to Ready, not Waiting.
D: Interrupt causes preemption to Ready, not Waiting.
B is possible (process can wait for children).

UGC NET Computer Science PYQ
Let m and n be positive integers.
(A) If n ≠ 1, then m < mn.
(B) If k is composite, then k = mn where 1 < m, n > k.
(C) If mn = 1, then m = 1 and n = 1.
(D) If k is composite, then k = mn where 1 < m, n < k.





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

(B) is false (for composite k, both factors are < k). (A), (C), (D) are true for positive integers.

UGC NET Computer Science PYQ
Right sequence of CPU program to input data:
A. Read status register
B. Check flag bit
C. Read data register
D. Transfer data to memory





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Poll status → verify ready → read data → store to memory.

UGC NET Computer Science PYQ
Estimation of software development effort for organic software in basic COCOMO is:





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

$E = 2.4\,(KLOC)^{1.05}\,PM$

UGC NET Computer Science PYQ
Which of the following technique is used for Clipping?





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Used for line clipping in computer graphics — efficiently finds visible portions of a line segment.

UGC NET Computer Science PYQ
Which of the followings shows the correct hierarchy of a layered file system in an operating system?
A. Logical File System
B. File Organization Module
C. Basic File System
D. I/O Control
E. Application Programs





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

The correct hierarchy (top to bottom) is: Application Programs → Logical File System → File Organization Module → Basic File System → I/O Control

UGC NET Computer Science PYQ
Match List I and List II
List I List II
A. Equivalence Partitioning I. Measures independent paths in code
B. Boundary Value Analysis II. Divides input into valid/invalid sets
C. Cyclomatic Complexity III. Focuses on limits of input ranges
D. Decision Table Testing IV. In which a number of combinations of actions are tested under varying sets of conditions

Choose the correct answer from the options given below:






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Technique Description Matching Statement
A. Equivalence Partitioning Divides the input domain into valid and invalid partitions. II – Divides input into valid/invalid sets
B. Boundary Value Analysis Tests the boundaries of input ranges (min/max limits). III – Focuses on limits of input ranges
C. Cyclomatic Complexity Measures the number of independent paths through the source code. I – Measures independent paths in code
D. Decision Table Testing Used to test combinations of conditions and corresponding actions. IV – Tests combinations of actions under varying conditions

UGC NET Computer Science PYQ
Choose the correct statement for a group G:





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Reason: From (xy)² = xyxy = x²y² = xxyy. Left-multiply by x⁻¹ and right-multiply by y⁻¹ to get yx = xy, hence G is abelian. (2) and (3) are false (there exist non-abelian groups where every element has order 3 or 5, e.g., unitriangular 3×3 matrices over ℤ₃/ℤ₅). (4) is false because every subgroup of an abelian (commutative) group is abelian.

UGC NET Computer Science PYQ
Which of the following are controlled-access protocols? A. Reservation
B. Polling
C. TDMA
D. Token Passing
E. CSMA/CA Choose the correct answer from the options given below:





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Protocol Type Explanation
A. Reservation Controlled Access Stations reserve the channel for transmission before sending data.
B. Polling Controlled Access A central controller polls each station to determine if it has data to send.
C. TDMA (Time Division Multiple Access) Channelization Divides the channel into time slots — not part of controlled access.
D. Token Passing Controlled Access A special token is passed between stations; only the holder can transmit.
E. CSMA/CA Random Access Uses collision avoidance — it’s a contention-based protocol, not controlled access.

UGC NET Computer Science PYQ
Considering the following statements:
A. A non-serial schedule is said to be conflict-serializable, if it is conflict-equivalent to some serial schedule.
B. A non-serial schedule is said to be view serializable if it is view-equivalent to some serial schedule.
C. A schedule is said to be serial, if instructions of participating transactions are chronologically interleaved with each other.
D. A conflict-serializable schedule will be view-serializable also but vice-versa may not be true.





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

A True (definition of conflict serializability).
B True (definition of view serializability).
C False — a serial schedule has no interleaving; one transaction completes before the next starts.
D True — conflict-serializable ⇒ view-serializable, but not every view-serializable schedule is conflict-serializable.

UGC NET Computer Science PYQ
What would be the equivalent pointer expression for referring the array element ar[m][n][o]?
  1. *(*(*(ar) + m + n) + o)
  2. (*(*(*(ar + m) + n) + o))
  3. (*(*(ar + m) + n) + o)
  4. *(*(*(ar + m) + n) + o)





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Consider ar as a 3-dimensional array declared as:

data_type ar[a][b][c];

Here, the array element ar[m][n][o] can be represented in pointer form as:

*(*(*(ar + m) + n) + o)

Step-by-step understanding:

  • ar is a pointer to the first 2D array ar[0].
  • ar + m moves the pointer to the mth 2D array → ar[m].
  • *(ar + m) gives the address of the first 1D array inside ar[m].
  • *(ar + m) + n moves to the nth 1D array → ar[m][n].
  • *(*(ar + m) + n) gives the address of the first element of that 1D array.
  • *(*(*(ar + m) + n) + o) finally gives the element ar[m][n][o].

✅ Final Answer: *(*(*(ar + m) + n) + o)


UGC NET Computer Science PYQ

Consider the following DFA

Which of the following NFA is valid for the given DFA?

(a) 

(b) 

(c) 






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution



UGC NET Computer Science PYQ
Which of the following is not a valid property over two fuzzy relations $\tilde R$ and $\tilde S$ for performing $\lambda$-cut defuzzifications?

1. $(\tilde R \cup \tilde S)\lambda=\tilde R\lambda\cup \tilde S_\lambda$ 
2. $(\tilde R \cap \tilde S)\lambda=\tilde R\lambda\cap \tilde S_\lambda$ 
3. $(\overline{\tilde R})\lambda\neq \tilde R\lambda\ \text{except when }\lambda=1$
4. For any $\lambda\le \beta$, where $0\le \beta\le1$, it is true that $R_\beta\subseteq R_\lambda$





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

For a fuzzy set $A$, the $\lambda$-cut is defined as: $$A_\lambda = \{x \mid \mu_A(x) \ge \lambda\}$$

  • Union Property: $(A \cup B)_\lambda = A_\lambda \cup B_\lambda$ ✅
  • Intersection Property: $(A \cap B)_\lambda = A_\lambda \cap B_\lambda$ ✅
  • Monotonicity: If $\lambda \le \beta$, then $A_\beta \subseteq A_\lambda$ ✅
  • Complement: $\mu_{\overline{A}}(x) = 1 - \mu_A(x)$ ⇒ $(\overline{A})_\lambda = \{x \mid 1 - \mu_A(x) \ge \lambda\} = \{x \mid \mu_A(x) \le 1 - \lambda\}$ ❌

Hence, $(\overline{A})_\lambda$ is not equal to $A_\lambda$, even when $\lambda = 1$. Therefore, the statement “except when $\lambda = 1$” is incorrect.

✅ Final Answer: Option 3 is not valid.


UGC NET Computer Science PYQ
Gray code equivalent to decimal number 8 is:





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Binary of 8 = 1000 Gray code is obtained by XORing each bit with the next bit. → MSB remains same. → Remaining bits: perform XOR with the bit to its left. So, $1000 \rightarrow 1100$

UGC NET Computer Science PYQ
Which of the following belongs to McCall’s Quality Factors?

A. Maintainability
B. Usability
C. Integrity
D. Functionality

Choose the correct answer from the options given below:





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

McCall’s Quality Model classifies software quality into three main categories:

  • Product Operation factors: Correctness, Reliability, Efficiency, Integrity, Usability
  • Product Revision factors: Maintainability, Flexibility, Testability
  • Product Transition factors: Portability, Reusability, Interoperability

- Maintainability ✅ – part of Product Revision factors
- Usability ✅ – part of Product Operation factors
- Integrity ❌ – although in McCall model, it’s not grouped directly with Functionality in this context
- Functionality ✅ – general umbrella factor related to McCall’s quality aspects

✅ Final Answer: A, B and D Only


UGC NET Computer Science PYQ
List I (GA termination criteria) List II (description)
A. Worst Individual I. At least half of the individual will be better than or equal to convergence value
B. Best Individual II. Guarantees that virtually all individuals in the population will be within a particular fitness range
C. Sum of Fitness III. Guarantees that the entire population to be of a minimum standard
D. Median Fitness IV. Faster search convergence, guaranteeing at least one best solution






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Binary of 8 = 1000 Gray code is obtained by XORing each bit with the next bit. → MSB remains same. → Remaining bits: perform XOR with the bit to its left. So, $1000 \rightarrow 1100$

UGC NET Computer Science PYQ
Which of the following Grammars is/are only Context-Free?
LabelProductions Note
A S → Ab
aS → aA
A → a
LHS “aS” has a terminal → not CFG
B S → Ab
A → Sa
A → a
All rules are left-linear (V→Vt or V→t) → regular
C S → AS
S → aA
A → a
CFG, not regular (non-linear: V→VV)
D S → Ab
S → aA
A → a
CFG; mixes left/right-linear → not regular
E S → Sb
A → Aa
A → ε
From start S no terminal string → L(S)=∅ (regular)





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

A is not even CFG (terminal on LHS).
B is a regular (left-linear) grammar.
C and D are context-free but not regular (“only” context-free).
E generates the empty language from start symbol S, which is regular.

UGC NET Computer Science PYQ
Match List I with List II
List I (Software Quality Characteristic) List II (Description)
A. Reliability II. Capability of software to maintain its level of performance under stated conditions for a stated period of time.
B. Efficiency III. Relationship between the level of performance of the software and the amount of resources used, under stated conditions.
C. Maintainability IV. Effort needed to make modifications, including corrections, improvements or adaptation of software to changes in environment, requirements and functional specifications.
D. Portability I. Ability to transfer the software from one organization or hardware/software environment to another.






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Reliability → II: Ensures software maintains performance over time.
Efficiency → III: Measures performance relative to resources used.
Maintainability → IV: Effort needed for updates, corrections, and improvements.
Portability → I: Ability to move software across environments.

UGC NET Computer Science PYQ
STRIPS Representation of a Planning Problem
A. STRIPS is a feature-centric representation
B. The features describing the state of the world are divided into Primitive and Derived
C. The STRIPS representation of the action comprises of Preconditions and Effects
D. STRIPS can directly define conditional effects





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

A: Incorrect — STRIPS is state-centric, not feature-centric.
B: Correct — STRIPS divides world state features into primitive and derived predicates.
C: Correct — STRIPS action representation includes Preconditions and Effects.
D: Incorrect — STRIPS cannot directly handle conditional effects; this is supported in extensions like ADL.

UGC NET Computer Science PYQ
Which of the followings are White box Testing ?

A. Path Testing
B. Loop Testing
C. Regression Testing
D. Non functional Testing





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

White-box testing focuses on the internal structure and logic of the program.

• Path Testing checks different execution paths inside the program → White box
• Loop Testing checks loop structures and iterations → White box
• Regression Testing verifies that new changes do not break existing functionality → not white box specifically
• Non-functional testing tests performance, usability, etc. → not white box

Therefore, the correct options are A and B.


UGC NET Computer Science PYQ

The techniques used to handle the phantom problem are

A. Time stamping
B. Index locking
C. Predicate locking
D. Execution indexing






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

The phantom problem occurs in database concurrency control when a transaction re-executes a query and finds new rows inserted by another transaction.

Techniques used to prevent phantom problem:

Index locking – locks index ranges to prevent insertion of new tuples in the range.
Predicate locking – locks records satisfying a condition.

Time stamping and execution indexing are not specifically used to solve phantom problem.

Therefore, correct options are B and C.


UGC NET Computer Science PYQ

Which of the following are type of interface in an ATM network ?


A. user-to-user

B. user-to-network

C. network-to-network

D. host-to-network

E. user-to-host






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

In an ATM (Asynchronous Transfer Mode) network, the two standard interfaces are:

UNI (User-to-Network Interface)
NNI (Network-to-Network Interface)

Hence the correct options are B and C.


UGC NET Computer Science PYQ

Arrange the following in correct order, so that they can follow a proper run time environment :


A. Programming statement

B. Compilation

C. Memory allocation

D. Type of variable

E. Memory deallocation






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

The correct execution flow in a programming environment is:


Programming statement (A) – Program is written.


Compilation (B) – Code is compiled to machine/intermediate code.


Type of variable (D) – Variables are recognized with their types.


Memory allocation (C) – Memory is allocated during execution.


Memory deallocation (E) – Memory is released after execution.


Thus the correct order is:


UGC NET Computer Science PYQ

Match List-I with List-II.

$f(n) = a f(n/b) + g(n)$ is a divide-and-conquer recurrence relation for the Listed-I algorithms, match their recurrence in Listed-II.

 List-I (Algorithms)

List-II (Recurrence Relation)

 
 A. Binary Search
 I. $f(n) = 7f(n/2) + 15n^2/4$
 B. Find maximum and minimum of a sequence
 II. $f(n) = 2f(n/2) + n$
 C. Merge Sort
 III. $f(n) = 2f(n/2) + 2$
 D. Fast Matrix Multiplication

 IV. $f(n) = f(n/2) + 2$






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

• Binary Search halves the input and performs constant work

$f(n) = f(n/2) + O(1)$ → IV


• Find maximum and minimum (divide and conquer)

Two recursive calls with constant comparisons

$f(n) = 2f(n/2) + 2$ → III


• Merge Sort divides into two parts and merges in linear time

$f(n) = 2f(n/2) + n$ → II


• Fast Matrix Multiplication (Strassen)

$f(n) = 7f(n/2) + O(n^2)$ → I


Thus matching:


A → IV

B → III

C → II

D → I


UGC NET Computer Science PYQ

Match List-I with List-II :

 List-I
 List-II
 A. Channelization protocol
 I. ALOHA
 B. Bit-oriented protocol
 II. TDMA
 C. Random-access protocol
 III. Reservation
 D. Controlled-access protocol

 IV. HDLC







Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Channelization protocol divides the channel into multiple portions → example TDMA

A → II


• Bit-oriented protocol works with frames and bits → HDLC

B → IV


• Random-access protocol allows stations to transmit randomly → ALOHA

C → I


• Controlled-access protocol controls which station transmits → Reservation

D → III


Thus matching:


A → II

B → IV

C → I

D → III


UGC NET Computer Science PYQ

An IPv4 packet has arrived with the first few hexadecimal digits as shown below. How many hops can this packet travel before being dropped? The data belongs to what upper-layer protocol?

$(5400001800100110040601\ldots)_{16}$






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Convert header bytes of IPv4 packet:


Hex sequence (grouped in bytes):


54 00 00 18 00 10 01 10 04 06 01 ...


Important fields:


• TTL (Time To Live) field = 04 (in hex)

TTL = 4 → packet can travel 4 hops before being discarded.


• Protocol field = 06 (in hex)

Protocol number 6 corresponds to TCP.


Therefore:


TTL = 4 hops

Protocol = TCP


UGC NET Computer Science PYQ

Which of the following control problem does not exist, when processes unaware of each other during interaction?






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

When processes are unaware of each other, they do not coordinate or compete for shared resources in a way that forms circular waiting.


• Mutual exclusion → may still be required for shared resources

• Starvation → possible if scheduling is unfair

• Deadlock → possible if processes wait on each other


Data coherence problems occur when processes share and modify common data.

If processes are unaware and do not share data directly, this issue does not arise.


UGC NET Computer Science PYQ

Which of the following is the Markup language?


A. HTML

B. XML

C. DHTML

D. LML

E. PML






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

HTML (HyperText Markup Language) → Markup language

• XML (Extensible Markup Language) → Markup language

• DHTML (Dynamic HTML) → Extension of HTML used for dynamic webpages


LML and PML are not standard markup languages


UGC NET Computer Science PYQ

Arrange the following prefix expressions based on their values in increasing order:


A. + - * 2 / 8 4 3 2

B. ↑ - * 3 3 * 4 2 5

C. + - ↑ 3 2 ↑ 2 3 / 6 - 4 2

D. * + 3 + 3 ↑ 3 + 1 1 3






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Evaluate each prefix expression.

A:

      • 2 / 8 4 3 2
        = + - * 2 2 3 2
        = + - 4 3 2
        = + 1 2
        = 3

B:
↑ - * 3 3 * 4 2 5
= ↑ - 9 8 5
= ↑ 1 5
= 1

C:

    • ↑ 3 2 ↑ 2 3 / 6 - 4 2
      = + - 9 8 / 6 2
      = + 1 3
      = 4

D:

    • 3 + 3 ↑ 3 + 1 1 3
      = * + 3 + 3 9 3
      = * + 3 12 3
      = * 15 3
      = 45

Values:

A = 3
B = 1
C = 4
D = 45

Increasing order:

B < A < C < D



UGC NET Computer Science PYQ

Match List-I with List-II:

 List-I (Line coding scheme)

 List-II (Bandwidth – average)

 A. NRZ-L
 I. B = N/4
 B. 2B1Q
 II. B = N/8
 C. 4D-PAM5
 III. B = N/3
 D. MLT-3

 IV. B = N/2






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

NRZ-L → bandwidth = N/2 → IV

2B1Q → bandwidth = N/4 → I

4D-PAM5 → bandwidth = N/8 → II

MLT-3 → bandwidth ≈ N/3 → III


Thus matching:


A → IV

B → I

C → II

D → III


UGC NET Computer Science PYQ

The instructions

ADD R₁, A, B
ADD R₂, C, D
MUL X, R₁, R₂

evaluate the expression $X = (A + B)(C + D)$ in which of the following?







Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

A 3-address instruction has the form:


Result = Operand1 op Operand2


Example:


ADD R₁, A, B → R₁ = A + B

ADD R₂, C, D → R₂ = C + D

MUL X, R₁, R₂ → X = R₁ × R₂


Each instruction uses three addresses (two operands and one result).


UGC NET Computer Science PYQ

For the fuzzy sets

$A = {(x_1,0.3), (x_2,0.7), (x_3,0.4)}$ and

$B = {(x_1,0.5), (x_2,0.2), (x_3,0.5)}$, the $A \cap B$ would be:






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

For fuzzy sets, the intersection operation is defined as:

$\mu_{A \cap B}(x) = \min(\mu_A(x), \mu_B(x))$

Now compute for each element:

$x_1$ : $\min(0.3, 0.5) = 0.3$
$x_2$ : $\min(0.7, 0.2) = 0.2$
$x_3$ : $\min(0.4, 0.5) = 0.4$

Thus,

$A \cap B = {(x_1,0.3),(x_2,0.2),(x_3,0.4)}$


UGC NET Computer Science PYQ

Which of the following genetic algorithm operation is computationally most expensive?






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

In Genetic Algorithms, the most computationally expensive part is usually reproduction, which involves:


• crossover

• mutation

• generating new offspring

• evaluating fitness for the next generation


These steps are repeated many times and require significant computation.


UGC NET Computer Science PYQ

Multiple Inheritance is permitted directly in:


A. C++

B. Java

C. Python

D. VB.NET

E. BASIC






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

C++ → supports multiple inheritance directly ✔

• Java → does not support multiple inheritance with classes (only interfaces) ✘

• Python → supports multiple inheritance ✔

• VB.NET → supports multiple inheritance through interfaces only ✘

• BASIC → does not support multiple inheritance ✘


Thus the languages that directly support multiple inheritance are:


C++ and Python


UGC NET Computer Science PYQ

The I/O methods in which memory addresses and I/O addresses are distinct is called:


A. Isolated I/O

B. Memory-Mapped I/O

C. Strobe Control

D. Handshaking

E. Interrupt






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Isolated I/O (Port-mapped I/O) → Memory and I/O address spaces are separate.

• Memory-Mapped I/O → I/O devices share the same address space as memory.


The question asks where memory and I/O addresses are distinct, which corresponds to Isolated I/O.

Among the given combinations, the most appropriate option containing this concept is A.


UGC NET Computer Science PYQ

Which of the following is the function of the semantic analysis phase of compilation process?






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Compiler phases:


Lexical analysis → Tokenization


Syntax analysis → Parsing


Semantic analysis → Type checking, type conversion, scope checking


Optimization → Loop optimization, data flow analysis


Thus type conversion belongs to semantic analysis.


UGC NET Computer Science PYQ

IP is responsible for ______ communication while TCP is responsible for ______ communication.






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

In the TCP/IP model:


• IP (Internet Protocol) provides host-to-host communication between devices.

• TCP (Transmission Control Protocol) provides process-to-process communication using port numbers.


UGC NET Computer Science PYQ

The Boolean expression for the following would be:


$F(A,B,C) = \Sigma(0,2,6)$

$d(A,B,C) = \Sigma(1,3,5)$






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Minterms:


$0 = 000$

$2 = 010$

$6 = 110$


Don't care terms:


$1 = 001$

$3 = 011$

$5 = 101$


Using K-map simplification:


Group $(0,2)$ → $A'C'$

Group $(2,6)$ → $BC'$


Thus,


$F = A'C' + BC'$


Factorizing:


$F = C'(A' + B)$


Which simplifies to:


$F = A' + BC'$


UGC NET Computer Science PYQ

A computer system with cache access time of 100 ns, a main memory access time of 1100 ns, and a hit ratio of 0.9. The average access time would be:






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Average Memory Access Time:


$AMAT = Hit\ Time + Miss\ Rate \times Miss\ Penalty$


Hit time = 100 ns

Miss rate = $1 - 0.9 = 0.1$


Miss penalty = $1100 - 100 = 1000$


So,


$AMAT = 100 + 0.1 \times 1000$


$AMAT = 100 + 100 = 200\ ns$


UGC NET Computer Science PYQ

Services provided by point-to-point protocol (PPP):


A. frame format

B. establishment of the link

C. flow control

D. sequence numbering

E. authentication






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

PPP provides:


• Frame format

• Link establishment (LCP)

• Authentication (PAP, CHAP)


PPP does not provide flow control or sequence numbering.


Thus:


A → Yes

B → Yes

E → Yes


UGC NET Computer Science PYQ

In Windows scheduling, which of the following option is correct?






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Windows uses 32 priority levels:


• 0–15 → Non-real-time (variable priorities)

• 16–31 → Real-time priorities


Thus number of non-real-time priorities = 16.


UGC NET Computer Science PYQ

Which of the following is/are true in case of tree locking?


A. It ensures shorter waiting times.

B. It ensures freedom from deadlock.

C. Transaction can lock data items earlier.

D. It does not ensure greater amount of concurrency.






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Tree locking protocol (graph-based protocol) rules:


• The first lock may be on any node.

• A transaction may lock a node only if it already holds a lock on the parent.

• Nodes may be unlocked anytime but cannot be relocked.


Properties:


• Deadlock cannot occur because locking follows a hierarchical order.

• Transactions can lock data items earlier since unlocking can happen anytime.


Thus:


B → True

C → True


UGC NET Computer Science PYQ
A least integer $n$ such that $f(x)$ is $O(x^n)$ for each of the following functions. Arrange according to the value of $n$ in increasing order.





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Find dominant growth for each.


A:

$3x^3+(\log x)^4$

Dominant term = $x^3$


$n=3$


B:

$(x^5+x^2+1)/(x^3+1) \approx x^2$


$n=2$


C:

$(x^3+x^2+1)/(x^2+1) \approx x$


$n=1$


D:

$(x^2+5\log x)/(x^2+1) \approx 1$


$n=0$


Thus:


D → $O(1)$

C → $O(x)$

B → $O(x^2)$

A → $O(x^3)$


Increasing order:


D, C, B, A


UGC NET Computer Science PYQ
The language of the following PDA would be: $\delta(q_0,a,z_0)=(q_0,aaaz_0)$ $\delta(q_0,a,a)=(q_0,aaa)$ $\delta(q_0,b,a)=(q_1,\lambda)$ $\delta(q_1,b,a)=(q_1,\lambda)$ $\delta(q_1,\epsilon,z_0)=(q_f,z_0)$ where $q_f$ is a final state.





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Each time an a is read:


$a \rightarrow$ push 3 a's onto the stack.


Each b pops one a from the stack.


Thus:


1 input a produces 3 stack symbols, so we need 3 b's to remove them.


Therefore the relation is:


$b = 3a$


Language:


${a^n b^{3n} \mid n>0}$



UGC NET Computer Science


Online Test Series,
Information About Examination,
Syllabus, Notification
and More.

Click Here to
View More

UGC NET Computer Science


Online Test Series,
Information About Examination,
Syllabus, Notification
and More.

Click Here to
View More

Limited Seats
× Aspire MCA Promotion

Game Changer NIMCET Test Series 2026

Boost your preparation with mock tests, analysis and rank-focused practice.

JOIN NOW
Ask Your Question or Put Your Review.

loading...