Qus : 1
UGC NET Computer Science PYQ
1
According to the Nyquist theorem, to produce the original analog signal, one necessary condition is:
1
Sampling rate must be at least 2 times the highest frequency contained in the signal. 2
Sampling rate must be at least 2 times the lowest frequency contained in the signal. 3
Sampling rate must be at least $\frac{1}{2}$ times the highest frequency contained in the signal. 4
Sampling rate must be at least $\frac{1}{2}$ times the lowest frequency contained in the signal. Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ
Solution Nyquist Sampling Theorem states:
Sampling frequency must be at least twice the maximum frequency present in the signal.
$ f_s \ge 2f_{max} $
Qus : 2
UGC NET Computer Science PYQ
1
Match List-I with List-II:
List-I (Boolean Expression) List-II (Dual of Boolean Expression) A. $x(y+0)$ I. $(x+0)(y\cdot z)$ B. $\bar{x}+(\bar{y}+z)$ II. $x+y\cdot1$ C. $\bar{x}(y+0)$ III. $\bar{x}+\bar{y}\cdot1$ D. $x+(\bar{y}+z)$
IV. $(x+0)(y\cdot \bar{z})$
1
A-III, B-IV, C-II, D-I 2
A-III, B-IV, C-I, D-II 3
A-II, B-I, C-III, D-IV 4
A-II, B-I, C-IV, D-III Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ
Solution Dual is obtained by interchanging:
$+$ ↔ $\cdot$
$0$ ↔ $1$
Applying dual rule:
A → III
B → IV
C → II
D → I
Qus : 5
UGC NET Computer Science PYQ
3
For the fuzzy set
$A = {(x_1,0.3),(x_2,0.7),(x_3,0.4)}$, the complement of $A$ would be represented as:
1
${(x_1,0.4),(x_2,0.3),(x_3,0.1)}$ 2
${(x_1,0.3),(x_2,0.7),(x_3,0.4)}$ 3
${(x_1,0.7),(x_2,0.3),(x_3,0.6)}$ 4
${(x_1,0.21),(x_2,0.28),(x_3,0.12)}$ Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ
Solution Complement of fuzzy set:
$\mu_{A'}(x) = 1 - \mu_A(x)$
Compute:
$x_1$: $1 - 0.3 = 0.7$
$x_2$: $1 - 0.7 = 0.3$
$x_3$: $1 - 0.4 = 0.6$
Thus,
$A' = {(x_1,0.7),(x_2,0.3),(x_3,0.6)}$
Qus : 6
UGC NET Computer Science PYQ
3
Regarding the subroutines, see the following sequence of tasks to be performed:
A. Turn on the interrupt facility.
B. Service the device whose flag is set.
C. Save the contents of processor registers.
D. Check which flag is set.
E. Restore the contents of processor registers.
1
A, D, C, B, E 2
D, A, B, C, E 3
C, D, B, E, A 4
B, D, A, C, E Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ
Solution Interrupt Service Routine (ISR) steps:
Save processor registers → C
Check which device raised interrupt → D
Service the device → B
Restore processor registers → E
Re-enable interrupt facility → A
Correct sequence:
C, D, B, E, A
Qus : 7
UGC NET Computer Science PYQ
3
Arrange the following simple graphs based on number of spanning trees they have:
A. $K_3$ (Complete graph with 3 nodes)
B. $K_4$ (Complete graph with 4 nodes)
C. $K_{2,2}$ (Complete bipartite graph with 2 nodes in each partition)
D. $C_5$ (Cycle graph with 5 nodes)
1
A, B, C, D 2
A, C, B, D 3
A, C, D, B 4
D, B, C, A Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ
Solution Number of spanning trees:
For complete graph:
$\tau(K_n)=n^{n-2}$
A: $K_3 = 3^{1} = 3$
B: $K_4 = 4^{2} = 16$
For complete bipartite graph:
$\tau(K_{m,n}) = m^{n-1} n^{m-1}$
C: $K_{2,2} = 2^{1} \times 2^{1} = 4$
For cycle graph:
$\tau(C_n)=n$
D: $C_5 = 5$
Thus:
A = 3
C = 4
D = 5
B = 16
Increasing order:
A, C, D, B
Qus : 11
UGC NET Computer Science PYQ
1
The sequence of steps for a page replacement algorithm will be:
A. find a frame that is not currently being used
B. change the page table
C. use freed frame
D. no frame is free
E. free a frame
1
D, A, E, B, C 2
E, B, A, C, D 3
B, E, A, D, C 4
D, E, B, A, C Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ
Solution Steps in page replacement:
No frame is free → D
Find a frame to replace → A
Free that frame → E
Update the page table → B
Use the freed frame for the new page → C
Qus : 12
UGC NET Computer Science PYQ
2
What will be the ordering of typical steps when processing a high-level query?
A. Query optimizer
B. Runtime database processor
C. Scanning, parsing and validating
D. Query code generator
1
D, A, C, B 2
C, A, D, B 3
C, D, B, A 4
D, C, B, A Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ
Solution Typical DBMS query processing steps:
Scanning, parsing and validating → C
Query optimizer → A
Query code generator → D
Runtime database processor → B
Correct order:
C → A → D → B
Qus : 14
UGC NET Computer Science PYQ
1
Match List-I with List-II
List-I List-II A. Verification I. White box Testing B. Validation II. Black box Testing C. Internal logic exercise III. Quality Control D. Software requirement exercise
IV. Quality Assurance
1
A-IV, B-III, C-I, D-II 2
A-I, B-II, C-III, D-IV 3
A-IV, B-III, C-II, D-I 4
A-III, B-IV, C-I, D-II Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ
Solution Verification → Quality Assurance → IV
Validation → Quality Control → III
Internal logic exercise → White box testing → I
Software requirement exercise → Black box testing → II
Matching:
A → IV
B → III
C → I
D → II
Qus : 16
UGC NET Computer Science PYQ
4
Which of the following are tautology?
A. $(p \lor r) \rightarrow p$
B. $p \rightarrow (p \land r)$
C. $\sim p \rightarrow (p \rightarrow r)$
D. $(p \land r) \rightarrow (p \rightarrow r)$
E. $\sim(p \rightarrow r) \rightarrow p$
1
A, B Only 2
A, B, C Only 3
B, C, D Only 4
C, D, E Only Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ
Solution A: False when $r=1, p=0$ → Not tautology
B: False when $p=1, r=0$ → Not tautology
C:
$\sim p \rightarrow (p \rightarrow r)$
Always true → Tautology
D:
$(p \land r) \rightarrow (p \rightarrow r)$
Always true → Tautology
E:
$\sim(p \rightarrow r) \rightarrow p$
Always true → Tautology
Thus tautologies:
C, D, E
Qus : 18
UGC NET Computer Science PYQ
1
Match List-I with List-II
List-I List-II A. Union I. Virtual Reality B. Function II. Shadow mask C. Interactive Environment III. Subroutine D. Output device
IV. User defined data type
1
A-IV, B-III, C-I, D-II 2
A-IV, B-II, C-III, D-I 3
A-II, B-IV, C-I, D-III 4
A-I, B-III, C-IV, D-II Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ
Solution Union → User defined data type → IV
Function → Subroutine → III
Interactive Environment → Virtual Reality → I
Output device → Shadow mask → II
Matching:
A → IV
B → III
C → I
D → II
Qus : 20
UGC NET Computer Science PYQ
4
Match List-I with List-II:
List-I List-II A. Back Tracking I. Automata B. Infinite languages with matching numbers II. Undecidable Problem C. Canonical LR Parser III. Predictive Parser D. Post Correspondence Problem
IV. Large number of states
1
A-I, B-II, C-III, D-IV 2
A-II, B-IV, C-I, D-III 3
A-IV, B-III, C-II, D-I 4
A-III, B-I, C-IV, D-II Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ
Solution Backtracking → Predictive parsing may require backtracking → III
Infinite languages with matching numbers → handled using Automata → I
Canonical LR parser → requires large number of states → IV
Post Correspondence Problem → Undecidable problem → II
Matching:
A → III
B → I
C → IV
D → II
Qus : 21
UGC NET Computer Science PYQ
2
What is the total delay (latency) for a frame size of 10 million bits that is being set up on a link with 20 routers, each having a queuing time of 2 μs and a processing time of 1 μs? The length of link is 5000 km. The speed of light inside the link is $2\times10^8$ m/s. The link has bandwidth of 6 Mbps.
1
0.624050 s 2
1.691726 s 3
2.425080 s 4
1.714030 s Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ
Solution Transmission delay
$= \frac{\text{Frame size}}{\text{Bandwidth}}$
$= \frac{10\times10^6}{6\times10^6}$
$= 1.6667\ s$
Propagation delay
Distance $=5000\ km =5\times10^6\ m$
$= \frac{5\times10^6}{2\times10^8}$
$=0.025\ s$
Router delay
Each router delay $=2\mu s+1\mu s=3\mu s$
Total routers $=20$
Total delay $=20\times3\mu s=60\mu s=0.00006\ s$
Total latency
$=1.6667+0.025+0.00006$
$\approx1.691726\ s$
Qus : 25
UGC NET Computer Science PYQ
2
Arrange the following from fastest to slowest in speed:
A. DRAM
B. SRAM
C. CPU Registers
D. Magnetic tapes
E. Hard disk
1
A, B, C, D, E 2
C, B, A, D, E 3
C, D, B, A, E 4
B, C, D, A, E Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ
Solution Speed hierarchy of memory/storage:
CPU Registers → fastest
SRAM → cache memory
DRAM → main memory
Hard Disk → secondary storage
Magnetic Tape → slowest storage
Order:
C → B → A → E → D
Qus : 27
UGC NET Computer Science PYQ
2
Match List I with List II
List I
List II
A. Count to infinity problem
I. Mobile Adhoc Networks
B. IEEE 802.16
II. Distance vector routing
C. IEEE 802.15
III. WiMAX
D. AODV protocol
IV. Bluetooth
Choose the correct answer from the options given below:
1
A-II, B-III, C-I, D-IV 2
A-II, B-III, C-IV, D-I 3
A-II, B-IV, C-III, D-I 4
A-IV, B-III, C-I, D-II Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution Count to infinity → Distance vector routing
IEEE 802.16 → WiMAX
IEEE 802.15 → Bluetooth
AODV → Mobile Adhoc Networks
Qus : 28
UGC NET Computer Science PYQ
3
For the regular languages and context free languages which is not correct?
A. both are closed under union operation
B. both are closed under concatenation operation
C. both are closed under intersection operation
D. both are closed under complementation operation
E. both are closed under kleene star operation
1
A and B Only 2
B and C Only 3
C and D Only 4
D and E Only Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ
Solution Regular languages:
Closed under union, concatenation, intersection, complement, kleene star.
Context-free languages:
Closed under union, concatenation, kleene star.
Not closed under intersection and complement.
Thus incorrect statements:
C and D
Qus : 29
UGC NET Computer Science PYQ
2
Match List I with List II
List I
List II
A. Digital Signature
I. Asymmetric encryption algorithm.
B. Hash Function
II. Confirms authenticity and integrity.
C. AES
III. Produces a fixed-size digest.
D. RSA
IV. Symmetric encryption algorithm.
Choose the correct answer from the options given below:
1
A-II, B-III, C-I, D-IV 2
A-II, B-III, C-IV, D-I 3
A-III, B-II, C-I, D-IV 4
A-IV, B-II, C-I, D-III Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution Digital Signature → Confirms authenticity and integrity Hash Function → Produces a fixed-size digest AES → Symmetric encryption algorithm RSA → Asymmetric encryption algorithm
Qus : 31
UGC NET Computer Science PYQ
3
Arrange the following parsers in increasing order of their power (least → most):
LR(0)
LR(1)
LALR(1)
LL(0)
SLR
Choose the correct answer: 1
LL(0) → LR(0) → SLR → LR(1) → LALR(1) 2
SLR → LR(0) → LL(0) → LR(1) → LALR(1) 3
LL(0) → LR(0) → SLR → LALR(1) → LR(1) 4
LR(0) → LL(0) → SLR → LR(1) → LALR(1) Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution
LL(0) is the weakest (no lookahead, top-down).
LR(0) is stronger than LL(0) (bottom-up, no lookahead).
SLR(1) adds 1-symbol lookahead using FOLLOW sets → accepts more grammars than LR(0).
LALR(1) merges LR(1) states; more powerful than SLR(1) but below LR(1).
LR(1) is the most powerful among these deterministic bottom-up parsers.
Qus : 34
UGC NET Computer Science PYQ
4
Arrange the following sets in increasing order, on the basis of their cardinality :
A. $A_1 = {{1,2},{3}}$
B. $A_2 = {{1},{2},{3},{4}}$
C. $A_3 = {{1,2,3,4,5,6}}$
D. $A_4 = {{1,2},{2,3,4},{5}}$
E. $A_5 = {{1},{2},{3},{4},{5}}$
Choose the correct answer from the options given below :
1
A, B, D, E, C 2
A, B, E, D, C 3
A, C, D, B, E 4
C, A, D, B, E Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ
Solution Cardinality means number of elements in the set.
$|A_1| = 2$
$|A_2| = 4$
$|A_3| = 1$
$|A_4| = 3$
$|A_5| = 5$
Increasing order:
$1 < 2 < 3 < 4 < 5$
So order becomes:
$A_3, A_1, A_4, A_2, A_5$
Qus : 35
UGC NET Computer Science PYQ
4
Consider the following interrupt protection levels in Linux, and arrange them in the increasing order of their priorities:
A. User-Mode Programs (Preemptible )
B. Bottom Half Interrupt Handlers
C. Top Half Interrupt Handlers
D. Kernel System Service Routines (Preemptible )
Choose the correct answer from the options given below: 1
B → A → C → D 2
C → B → A → D 3
C → A → B → D 4
A → D → B → C Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution
User-Mode Programs have the lowest priority and are preemptible.
Kernel System Service Routines run in kernel mode and can be preempted by higher priority tasks like interrupts.
Bottom Half Interrupt Handlers execute after the top half and have higher priority than kernel threads.
Top Half Interrupt Handlers handle immediate hardware responses and have the highest priority.
Qus : 36
UGC NET Computer Science PYQ
1
Which of the following have truth values if universe of discourse consists of all integers?
A. $\forall n \exists m (n^2 < m)$
B. $\exists m \forall n (n < m^2)$
C. $\exists n \exists m (n^2 + m^2 = 5)$
D. $\exists n \exists m (n^2 + m^2 = 6)$
E. $\exists n \exists m (n+m=4 \land n-m=1)$
Choose the correct answer from the options given below :
1
A, ,C Only 2
B, C, E Only 3
C, D, E Only 4
B, D Only Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ
Solution A:
For every integer $n$, choose $m=n^2+1$
Then $n^2<m$ → True
B:
$\exists m$ such that $n<m^2$ for all integers $n$.
But integers are unbounded → False
C:
$n^2+m^2=5$
Example: $1^2+2^2=5$ → True
D:
$n^2+m^2=6$
No integer solution → False
E:
$n+m=4$
$n-m=1$
Add equations:
$2n=5$ → $n=2.5$ (not integer) → False
True statements: A and C
Qus : 37
UGC NET Computer Science PYQ
1
Arrange the following examples of Artificial Intelligence (AI) in the order of increasing complexity:
A. Spam email detection using rule-based systems
B. Handwritten digit recognition using shallow neural networks
C. Image classification using convolutional neural networks
D. Autonomous driving using reinforcement learning algorithms
Choose the correct answer from the options given below :
1
A, B, C, D 2
B, A, C, D 3
A, B, D, C 4
B, C, A, D Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ
Solution Complexity increases as follows:
Rule-based system → simplest
Shallow neural network → moderate complexity
CNN image classification → more complex
Autonomous driving → highly complex system
Thus increasing order:
A → B → C → D
Qus : 38
UGC NET Computer Science PYQ
2
Match List-I with List-II.
List-I List-II A. Complement I. Adder B. Ex-OR II. Instruction decoding C. Accumulator III. Negative number representation D. Control Unit
IV. Arithmetic and Logic operations
Choose the correct answer from the options given below:
1
A-I, B-II, C-III, D-IV 2
A-III, B-IV, C-I, D-II 3
A-III, B-I, C-IV, D-II 4
A-IV, B-II, C-III, D-I Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ
Solution Complement → used in negative number representation → III
Ex-OR → used in arithmetic and logic operations → IV
Accumulator → used with adder → I
Control Unit → instruction decoding → II
Correct Matching:
A → III
B → IV
C → I
D → II
Qus : 39
UGC NET Computer Science PYQ
1
The sequence of fields in an IP datagram will be:
A. flags
B. options
C. protocol
D. identification
E. service type
Choose the correct answer from the options given below:
1
E, D, A, C, B 2
D, A, B, C, E 3
D, E, C, B, A 4
E, C, D, A, B Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ
Solution IPv4 header order (relevant fields):
Type of Service → Identification → Flags → Protocol → Options
Thus order:
E → D → A → C → B
Qus : 40
UGC NET Computer Science PYQ
2
Match List-I with List-II.
List-I List-II A. RAID level-2 I. block-interleaved B. RAID level-3 II. error-correcting-codes C. RAID level-4 III. reed-solomon codes D. RAID level-6
IV. bit-interleaved
Choose the correct answer from the options given below:
1
A-I, B-III, C-IV, D-II 2
A-II, B-IV, C-I, D-III 3
A-IV, B-I, C-II, D-III 4
A-II, B-III, C-IV, D-I Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ
Solution RAID-2 → error correcting codes (Hamming) → II
RAID-3 → bit interleaved parity → IV
RAID-4 → block interleaved parity → I
RAID-6 → Reed–Solomon codes → III
Correct Matching:
A → II
B → IV
C → I
D → III
Qus : 44
UGC NET Computer Science PYQ
3
Match List-I with List-II.
List-I List-II A. Thread spawn I. to convert a blocking system call into a nonblocking call B. Block thread II. to reclaim pages C. Jacketing III. processor turn to the execution of another ready thread D. Flush
IV. thread is provided with its own register context
1
A-I, B-III, C-IV, D-II 2
A-IV, B-III, C-II, D-I 3
A-IV, B-II, C-I, D-III 4
A-II, B-I, C-IV, D-III Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ
Solution Thread spawn → thread gets its own register context → IV
Block thread → CPU switches to another ready thread → III
Jacketing → convert blocking system call to nonblocking → I
Flush → reclaim pages → II
Matching:
A → IV
B → III
C → I
D → II
Qus : 47
UGC NET Computer Science PYQ
1
Arrange the steps of Mathematical Modeling:
A. Solution fitting with data
B. Formulation mathematically
C. Solve mathematically
D. Repeat formulation if it fits worst with data
E. Interpretation results
1
B, C, A, D, E 2
B, A, D, C, E 3
D, A, B, C, E 4
E, D, C, A, B Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ
Solution Typical modeling steps:
Formulate model mathematically → B
Solve mathematically → C
Fit solution with data → A
If poor fit, reformulate → D
Interpret results → E
Correct sequence:
B → C → A → D → E
Qus : 49
UGC NET Computer Science PYQ
2
Match List-I with List-II:
List-I List-II A. Batch Multiprogramming I. allows more efficient use of main memory B. Time sharing II. user no longer has direct access to the processor C. Monitor III. Maximize processor use D. Reentrant Procedures
IV. minimize response time
1
A-III, B-II, C-IV, D-I 2
A-III, B-IV, C-II, D-I 3
A-I, B-III, C-IV, D-II 4
A-II, B-I, C-IV, D-III Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ
Solution Batch Multiprogramming → maximize CPU utilization → III
Time sharing → minimize response time → IV
Monitor → user does not directly control processor → II
Reentrant procedures → efficient use of memory → I
Matching:
A → III
B → IV
C → II
D → I
Qus : 52
UGC NET Computer Science PYQ
2
Arrange in appropriate order, the construction of a finite automata:
A. Minimum State DFA
B. Regular Expression
C. NFA-ε
D. Problem Statement
E. DFA
1
B, C, E, A, D 2
D, B, C, E, A 3
C, E, B, A, D 4
A, D, C, B, E Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ
Solution Typical construction steps:
Problem statement → D
Convert to regular expression → B
Convert to NFA-ε → C
Convert to DFA → E
Minimize DFA → A
Order:
D → B → C → E → A
Qus : 63
UGC NET Computer Science PYQ
1
Match List-I with List-II
List-I List-II
A. $A\rightarrow aB\ |\ a,\ a\in T,\ A,B\in V$ I. Recursive Descent Parser B. $A\rightarrow BC\ |\ a,\ a\in T,\ A,B,C\in V$ II. Turing Machine C. $LL(1)$ grammar III. Chomsky Normal Form D. Halting problem
IV. Finite Automata
1
A-IV, B-III, C-I, D-II 2
A-III, B-I, C-II, D-IV 3
A-II, B-IV, C-III, D-I 4
A-IV, B-III, C-II, D-I Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ
Solution $A\rightarrow aB|a$ → Regular grammar → Finite Automata → IV
$A\rightarrow BC|a$ → Chomsky Normal Form → III
$LL(1)$ grammar → Recursive Descent Parser → I
Halting problem → Turing Machine → II
Matching:
$A\rightarrow IV$
$B\rightarrow III$
$C\rightarrow I$
$D\rightarrow II$
Qus : 65
UGC NET Computer Science PYQ
2
Arrange the following so that they can be placed in perfect/appropriate order.
A. Planning
B. Construction
C. Modeling
D. Communication
E. Deployment
Choose the correct answer from the options given below:
1
A, B, C, D, E 2
D, A, C, B, E 3
A, D, B, C, E 4
B, C, D, A, E Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ
Solution Software development process:
Communication → Planning → Modeling → Construction → Deployment
Order:
$D \rightarrow A \rightarrow C \rightarrow B \rightarrow E$
Qus : 67
UGC NET Computer Science PYQ
2
The order of steps of Address Translation in Linux Virtual Memory Scheme will be:
A. register
B. offset
C. Page directory
D. Page table
E. Page middle directory
Choose the correct answer from the options given below:
1
B, A, D, E, C 2
A, C, E, D, B 3
D, C, A, B, E 4
C, A, D, E, B Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ
Solution Linux 4-level paging:
register → page directory → page middle directory → page table → offset
Order:
$A \rightarrow C \rightarrow E \rightarrow D \rightarrow B$
Qus : 68
UGC NET Computer Science PYQ
1
If $f(n) = 5f(n/2) + 3$ and $f(1) = 7$ is a recurrence relation where $k$ is a positive integer, then $f(2^k) =$
1
$5^k\left(\frac{31}{4}\right) - \frac{3}{4}$ 2
$5^k\left(\frac{29}{4}\right)$ 3
$2^k\left(\frac{31}{4}\right) - \frac{3}{4}$ 4
$2^k\left(\frac{29}{4}\right)$ Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ
Solution Let
$f(2^k) = g(k)$
Then recurrence becomes
$g(k) = 5g(k-1) + 3$
with
$g(0) = f(1) = 7$
Solve recurrence.
Homogeneous solution:
$g_h(k) = C5^k$
Particular solution:
Assume constant $A$
$A = 5A + 3$
$-4A = 3$
$A = -\frac{3}{4}$
General solution:
$g(k) = C5^k - \frac{3}{4}$
Use initial condition
$g(0) = 7$
$C - \frac{3}{4} = 7$
$C = \frac{31}{4}$
Thus
$f(2^k) = \frac{31}{4}5^k - \frac{3}{4}$
Qus : 69
UGC NET Computer Science PYQ
1
A company is implementing a new database system to manage its customer information. The database contains tables for customers, orders, products and sales representatives. Each customer can place multiple orders and each order can contain multiple products. Each order is associated with a specific sales representative who manages the customer account. The system keeps records of customers, their orders, the products included in each order, and the sales representatives responsible for handling the accounts. The database is designed to improve efficiency in tracking sales and customer interactions. Which SQL query retrieves the total number of distinct customers who have placed orders?
1
Select COUNT(DISTINCT customer_id) As total_customers From orders; 2
Select COUNT(*) As total_customers from customers; 3
Select COUNT(DISTINCT order_id) As total_customers from orders; 4
Select COUNT(DISTINCT customer_id) As total_customers from customers; Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ
Solution We need the number of distinct customers who placed orders, so we count unique customer_id from orders table.
Correct query:
Select COUNT(DISTINCT customer_id) As total_customers From orders;
Qus : 71
UGC NET Computer Science PYQ
2
A company is implementing a new database system to manage its customer information. The database contains tables for customers, orders, products and sales representatives. Each customer can place multiple orders and each order can contain multiple products. Each order is associated with a specific sales representative who manages the customer account. The system keeps records of customers, their orders, the products included in each order, and the sales representatives responsible for handling the accounts. The database is designed to improve efficiency in tracking sales and customer interactions. Based on the passage, which of the following statements is true?
1
Each customer can place only one order. 2
Each sales representative can manage multiple customer accounts. 3
Each order can be associated with only one product. 4
The database does not include a table for products. Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ
Solution From passage:
• customers can place multiple orders
• orders can contain multiple products
• representatives manage customer accounts
Thus correct statement:
Each sales representative can manage multiple customer accounts.
Qus : 72
UGC NET Computer Science PYQ
1
A company is implementing a new database system to manage its customer information. The database contains tables for customers, orders, products and sales representatives. Each customer can place multiple orders and each order can contain multiple products. Each order is associated with a specific sales representative who manages the customer account. The system keeps records of customers, their orders, the products included in each order, and the sales representatives responsible for handling the accounts. The database is designed to improve efficiency in tracking sales and customer interactions. Which SQL query retrieves the total number of orders placed by a specific customer?
1
Select COUNT(*) As total_orders
from orders where customer_id = [Customer_ID]; 2
Select COUNT(order_id) As total_orders
from orders where customer_id = [Customer_ID]; 3
Select COUNT(DISTINCT order_id) As total_orders
from orders where customer_id = [Customer_ID]; 4
Select SUM(order_id) As total_orders
from orders where customer_id = [Customer_ID]; Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ
Solution From passage:
• customers can place multiple orders
• orders can contain multiple products
• representatives manage customer accounts
Thus correct statement:
Each sales representative can manage multiple customer accounts.
Qus : 73
UGC NET Computer Science PYQ
2
A company is implementing a new database system to manage its customer information. The database contains tables for customers, orders, products and sales representatives. Each customer can place multiple orders and each order can contain multiple products. Each order is associated with a specific sales representative who manages the customer account. The system keeps records of customers, their orders, the products included in each order, and the sales representatives responsible for handling the accounts. The database is designed to improve efficiency in tracking sales and customer interactions. Which of the following best describes the relationship between the orders table and the customers table?
1
One-to-One 2
One-to-Many 3
Many-to-One 4
Many-to-Many Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ
Solution One customer can place multiple orders.
Thus relationship:
Customer → Orders
$1 : N$
Qus : 74
UGC NET Computer Science PYQ
3
Which of the following relations cannot be decomposed into BCNF with a lossless join and dependency-preserving decomposition?
R(V, W, X, Y, Z)
1
R(V, W, X, Y, Z) | VW→X, WX→V, VX→W, W→Y, Y→Z 2
R(V, W, X, Y) | VW→X, X→Y
3
R(V, W, X, Y) | VW→X, X→YV
4
R(V, W, X, Y, Z) | VW→X, X→Y, Y→Z, Z→V Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution BCNF condition:
For every functional dependency $X \rightarrow Y$, X must be a superkey.
Check option (3)
FDs:
$VW \rightarrow X$
$X \rightarrow YV$
Here:
$X$ determines $V$ and $Y$
Qus : 75
UGC NET Computer Science PYQ
2
Arrange the following recurrence relations in increasing order of their time complexity.
(A) $T(n) = T(n/2) + 1$
(B) $T(n) = 2T(n/2) + n$
(C) $T(n) = 3T(n/3) + n$
(D) $T(n) = 2T(n/2) + \sqrt{n}$
(E) $T(n) = T(n-1) + 1$
1
(E), (A), (B), (D), (C) 2
(A), (E), (D), (B), (C)
3
(E), (A), (D), (B), (C)
4
(A), (B), (D), (E), (C) Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution Using Master Theorem / recurrence expansion:
(A)
$T(n) = T(n/2) + 1$
Complexity → $O(\log n)$
(E)
$T(n) = T(n-1) + 1$
Complexity → $O(n)$
(D)
$T(n) = 2T(n/2) + \sqrt{n}$
$n^{\log_2 2} = n$
Since $\sqrt{n} < n$
→ $O(n)$
(B)
$T(n) = 2T(n/2) + n$
$n^{\log_2 2} = n$
→ $O(n \log n)$
(C)
$T(n) = 3T(n/3) + n$
$n^{\log_3 3} = n$
→ $O(n \log n)$
Increasing order
$O(\log n) < O(n) < O(n) < O(n\log n) < O(n\log n)$
Qus : 76
UGC NET Computer Science PYQ
2
Match List-I with List-II.
List-I List-II A. Representation of bits I. Transport layer B. Physical Address II. Physical layer C. Logical Address III. Network layer D. Segmentation and reassembly
IV. Data link layer
Choose the correct answer from the options given below.
1
A-I, B-II, C-III, D-IV 2
A-II, B-IV, C-III, D-I
3
A-III, B-II, C-IV, D-I
4
A-I, B-IV, C-III, D-II Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution A. Representation of bits → Physical layer
B. Physical Address → Data Link Layer
(MAC address)
C. Logical Address → Network Layer
(IP address)
D. Segmentation and reassembly → Transport Layer
Thus:
A → II
B → IV
C → III
D → I
Qus : 77
UGC NET Computer Science PYQ
4
Find the correct sequence of the storage devices in ascending order based on their access time.
A. Registers
B. Magnetic Disk
C. Magnetic Tapes
D. Main Memory
E. Optical Disk
1
B, A, D, C, E 2
B, A, E, D, C
3
C, B, A, E, D
4
C, E, B, D, A Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution Access time order (slowest → fastest):
Magnetic Tape → Optical Disk → Magnetic Disk → Main Memory → Registers
Thus ascending order:
C → E → B → D → A
Qus : 78
UGC NET Computer Science PYQ
2
Match List-I with List-II.
List-I (Testing Type) List-II (Description) A. Unit testing I. Testing individual components of the software B. Integration testing II. Testing the interaction between integrated components C. System testing III. Testing to verify the system meets business needs D. Acceptance testing
IV. Testing the complete system to ensure it meets requirements
Choose the correct answer from the options given below.
1
A-IV, B-II, C-I, D-III
2
A-I, B-II, C-IV, D-III
3
A-I, B-III, C-IV, D-II
4
A-I, B-IV, C-II, D-III Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution Unit Testing → Testing individual components
Integration Testing → Testing interaction between modules
System Testing → Testing the complete system
Acceptance Testing → Verifying business/user requirements
Thus mapping:
A → I
B → II
C → IV
D → III
Qus : 79
UGC NET Computer Science PYQ
1
Arrange the following Language Classes in ascending order according to their expressive power, as defined by Chomsky hierarchy .
(A) Context-free languages
(B) Context-sensitive languages
(C) Regular languages
(D) Unrestricted grammars
1
C, A, B, D
2
C, A, D, B
3
A, C, B, D
4
A, D, B, C Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution Chomsky hierarchy order:
Regular Languages
< Context-Free Languages
< Context-Sensitive Languages
< Recursively Enumerable (Unrestricted) Languages
Thus order:
C → A → B → D
Qus : 80
UGC NET Computer Science PYQ
1
Arrange the following Language Classes in ascending order according to their expressive power, as defined by Chomsky hierarchy .
(A) Context-free languages
(B) Context-sensitive languages
(C) Regular languages
(D) Unrestricted grammars
1
C, A, B, D
2
C, A, D, B
3
A, C, B, D
4
A, D, B, C Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution Chomsky hierarchy order:
Regular Languages
< Context-Free Languages
< Context-Sensitive Languages
< Recursively Enumerable (Unrestricted) Languages
Thus order:
C → A → B → D
Qus : 81
UGC NET Computer Science PYQ
2
Match List-I with List-II.
List-I List-II
A. Dijkstra’s Algorithm I. Find the shortest path between all pairs of vertices in a graph with positive or negative edge weights B. Floyd-Warshall Algorithm II. Finds the shortest path in a weighted graph with non-negative edge weights
C. Bellman-Ford Algorithm III. Sorts elements by repeatedly moving them past neighboring elements that are smaller
D. Prim’s Algorithm
IV. Determines the strongly connected components in a directed graph
Choose the correct answer from the options given below.
1
A-II, B-I, C-III, D-IV
2
A-II, B-I, C-IV, D-III
3
A-II, B-I, C-III, D-IV
4
A-II, B-III, C-IV, D-I Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution Dijkstra Algorithm → shortest path with non-negative weights
Floyd-Warshall → all pairs shortest paths
Bellman-Ford → handles negative edge weights
Prim → Minimum Spanning Tree
Thus correct matching:
A → II
B → I
Remaining pair becomes
C → IV
D → III
Qus : 82
UGC NET Computer Science PYQ
2
Arrange the given steps required for a
Direct Memory Access (DMA) transfer in the correct order.
(A) Initiate DMA transfer request
(B) Transfer data directly between peripheral and memory
(C) Processor grants DMA control over the system bus
(D) DMA controller completes data transfer and signals completion
1
C, A, B, D
2
A, C, B, D
3
A, B, C, D
4
C, B, A, D Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution DMA transfer sequence:
Device initiates DMA request
CPU grants bus control to DMA controller
DMA transfers data between memory and device
DMA signals completion
Order:
A → C → B → D
Qus : 84
UGC NET Computer Science PYQ
4
Arrange the following steps in a proper sequence for the typical process of a DNS query :
(A) Query authoritative DNS Server
(B) Query local DNS Server
(C) Local DNS Server Check Cache
(D) Query root DNS Server
(E) Query TLD DNS Server
Choose the correct answer from the options given below :
1
(A), (C), (E), (B), (D)
2
(E), (A), (C), (B), (D)
3
(A), (B), (C), (D), (E)
4
(B), (C), (D), (E), (A) Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution Typical DNS resolution process:
Client queries Local DNS Server
Local DNS server checks cache
If not found → Root DNS server queried
Root server refers to TLD DNS server
TLD server refers to Authoritative DNS server
Thus the correct order is
(B) → (C) → (D) → (E) → (A)
Qus : 85
UGC NET Computer Science PYQ
3
In a schema $R(A, B, C, D, E, F, G, H)$, each field of $R$ contains only atomic values.
$F = {CH \rightarrow C, A \rightarrow BC, B \rightarrow CEH, E \rightarrow A, A \rightarrow EFG}$ is a set of functional dependencies so that $F^+$ is exactly the set of FDs that holds $R$. The relation $R$ is :
1
In 1NF, but not in 2NF
2
In 2NF, but not in 3NF
3
In 3NF, but not in BCNF
4
In BCNF Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution Given FDs
$CH \rightarrow C$
$A \rightarrow BC$
$B \rightarrow CEH$
$E \rightarrow A$
$A \rightarrow EFG$
From
$A \rightarrow BC$
$A \rightarrow EFG$
we get
$A \rightarrow BCFG E$
Then
$B \rightarrow CEH$
Thus
$A^+ = {A,B,C,D,E,F,G,H}$
So $A$ is a candidate key.
Now check dependency
$E \rightarrow A$
Since $E$ is not a superkey, but RHS contains a prime attribute, it satisfies 3NF but violates BCNF.
Therefore the relation is
in 3NF but not in BCNF.
Qus : 87
UGC NET Computer Science PYQ
2
Which of the following statements about pointers in C are TRUE.
(A) Pointers can be used to access array elements
(B) Pointers can store the address of another pointer
(C) Pointers are automatically dereferenced in expression
(D) Pointers cannot be used to access structure members
Choose the correct answer from the options given below :
1
(A) and (C) Only 2
(A) and (B) Only 3
(B) and (C) Only 4
(C) and (D) Only Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution (A) True — pointers can access array elements because arrays and pointers are closely related in C.
(B) True — a pointer can store the address of another pointer (pointer to pointer).
(C) False — pointers are not automatically dereferenced, we must use *.
(D) False — pointers can access structure members using ->.
Thus correct statements are A and B.
Qus : 88
UGC NET Computer Science PYQ
3
Arrange the following steps in proper sequence involved in a Genetic Algorithm :
(A) Selection
(B) Initialization
(C) Crossover
(D) Mutation
(E) Evaluation
Choose the correct answer from the options given below :
1
(A), (B), (C), (D), (E) 2
(E), (A), (B), (D), (C) 3
(B), (E), (A), (C), (D) 4
(A), (C), (B), (D), (E) Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution Typical steps of Genetic Algorithm:
Initialization
Evaluation
Selection
Crossover
Mutation
Thus order:
(B) → (E) → (A) → (C) → (D)
Qus : 89
UGC NET Computer Science PYQ
1
Arrange the following steps in a proper sequence for the process of training a neural network.
(A) Weight initialization
(B) Feed forward
(C) Back Propagation
(D) Loss Calculation
(E) Weight update
Choose the correct answer from the options given below :
1
(A), (B), (D), (C), (E) 2
(D), (B), (A), (C), (E) 3
(A), (C), (D), (B), (E) 4
(E), (C), (B), (D), (A) Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution Typical neural network training sequence:
Initialize weights
Perform feed forward
Compute loss
Backpropagate error
Update weights
Thus the order is:
(A) → (B) → (D) → (C) → (E)
Qus : 91
UGC NET Computer Science PYQ
3
Match List-I with List-II.
List-I
(computing systems) List-II
(working/output)
(A) Half Adder (I) Has $n$ input and $2^n$ output (B) Decoder (II) CPU Storage unit (C) Register (III) Used to store program at runtime (D) Main memory
(IV) 2-bit addition circuit
Choose the correct answer from the options given below :
1
(A)-(II), (B)-(III), (C)-(IV), (D)-(I) 2
(A)-(IV), (B)-(II), (C)-(III), (D)-(I) 3
(A)-(IV), (B)-(I), (C)-(II), (D)-(III) 4
(A)-(II), (B)-(IV), (C)-(III), (D)-(I) Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution Half Adder → performs addition of two bits → 2-bit addition circuit → (IV)
Decoder → has $n$ inputs and $2^n$ outputs → (I)
Register → CPU internal storage → (II)
Main memory → stores program during execution → (III)
Thus
(A) → (IV)
(B) → (I)
(C) → (II)
(D) → (III)
Qus : 92
UGC NET Computer Science PYQ
1
Arrange the following steps in the correct order to solve the Knapsack problem using Dynamic Programming.
(A) Define the base case when the capacity is zero $(0)$ or no items are left to consider
(B) Compute the maximum value that can be obtained using items up to the $i$-th item and a knapsack capacity of $0$
(C) Identify subproblems and their dependencies based on items weights and values
(D) Initialize a table to store results of subproblems
(E) Iterate through each item and each possible capacity to fill the table
Choose the correct answer from the options given below :
1
(C), (D), (A), (E), (B) 2
(D), (C), (A), (E), (B) 3
(A), (C), (D), (E), (B) 4
(D), (A), (C), (E), (B) Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution Typical DP knapsack steps:
Identify subproblems → (C)
Initialize DP table → (D)
Define base cases → (A)
Fill table by iterating items and capacity → (E)
Compute optimal values → (B)
Order:
(C) → (D) → (A) → (E) → (B)
Qus : 93
UGC NET Computer Science PYQ
3
Match List - I with List - II.
List - I
List - II
(A) The activation function (I) is called the delta rule. (B) The learning method of perceptron (II) is one of the key components of the perceptron as in the most common neural network architecture. (C) Areas of application of artificial neural network include (III) is always boolean like a switch. (D) The output of the perceptron
(IV) system identification and control.
Choose the correct answer from the options given below :
1
(A)-(II), (B)-(IV), (C)-(III), (D)-(I) 2
(A)-(IV), (B)-(III), (C)-(II), (D)-(I) 3
(A)-(II), (B)-(I), (C)-(IV), (D)-(III) 4
(A)-(III), (B)-(I), (C)-(IV), (D)-(II) Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution Activation function → key component of neural network → (II)
Learning rule of perceptron → called delta rule → (I)
Applications of ANN → system identification and control → (IV)
Output of perceptron → boolean (0 or 1) like a switch → (III)
Thus
(A) → (II)
(B) → (I)
(C) → (IV)
(D) → (III)
Qus : 95
UGC NET Computer Science PYQ
2
Consider the following statements regarding combinational and sequential circuits.
(A) Output of combinational circuits depends on the only current input.
(B) Output of combinational circuit depends on the both current input and previous output.
(C) Output of sequential circuit depends on the current input.
(D) Output of sequential circuit depends on both current input and previous output.
Choose the correct answer from the options given below :
1
(A) and (C) Only 2
(A) and (D) Only 3
(B) and (D) Only 4
(B) and (C) Only Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution Combinational circuit → output depends only on current input → (A) True
Sequential circuit → output depends current input + previous state → (D) True
(B) False
(C) Incomplete / incorrect
Qus : 98
UGC NET Computer Science PYQ
4
For all real numbers $x$, there exists a real number $y$ such that $x$ is less than $y$.
(A) $L_1 = { w \in {0,1}^* \mid \text{length of } w \text{ is even} }$
(B) $L_2 = { w \in {0,1}^* \mid \text{length of } w \text{ is odd} }$
(C) $L_3 = { w \in {0,1}^* \mid \text{all 0s come before all 1s in } w }$
(D) $L_4 = { w \in {0,1}^* \mid w \text{ contains equal number of 0s and 1s} }$
(E) $L_5 = { w \in {0,1}^* \mid \text{all 1s come before all 0s in } w }$
Choose the correct answer from the options given below :
1
(A) and (B) Only 2
(B) and (C) Only 3
(C) and (D) Only 4
(D) and (E) Only Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution Important fact:
NFA and DFA recognize exactly the same class of languages → Regular Languages
So no language exists that can be recognized by NFA but not DFA.
But option (D)
equal number of 0s and 1s → not regular
Option (E)
all 1s before 0s → regular
Hence only (D) is non-regular.
Closest option given:
(4) (D) and (E) Only
Qus : 99
UGC NET Computer Science PYQ
3
Consider the Grammar :
$T \rightarrow Qx$
$Q \rightarrow RS$
$R \rightarrow y \mid \varepsilon$
$S \rightarrow z \mid \varepsilon$
Here $x, y, z$ are terminals and $T, Q, R, S$ are non terminals.
What will be the follow set of the non terminal $R$ ?
1
${x, y}$ 2
${y, z}$ 3
${z, x}$ 4
${\varepsilon}$ Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution From production
$Q \rightarrow RS$
FOLLOW of $R$ includes FIRST of $S$ except $\varepsilon$
FIRST($S$) = ${z, \varepsilon}$
So add $z$
Since $S \rightarrow \varepsilon$, also include FOLLOW($Q$)
From
$T \rightarrow Qx$
FOLLOW($Q$) = ${x}$
Thus
FOLLOW($R$) = ${z, x}$
Qus : 100
UGC NET Computer Science PYQ
1
Two computers A and B are configured as follows :
A has IP address 203.197.2.53 and subnet mask 255.255.128.0
B has IP address 203.197.5.201 and subnet mask 255.255.192.0
What one of the following statement is true ?
1
A and B both assume they are on the same network 2
B assumes A is on same network, but A assumes B is on different network 3
A assumes B is on same network, but B assumes A is on a different network 4
A and B both assume they are on different network Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution Subnet mask A
$255.255.128.0$
Network range:
$203.197.0.0$ → $203.197.127.255$
B address $203.197.5.201$ lies in this range
So A thinks B is in same network
Subnet mask B
$255.255.192.0$
Network blocks:
$203.197.0.0$ → $203.197.63.255$
A address $203.197.2.53$ lies in this range
So B also thinks A is same network
Thus both assume same network.
Qus : 101
UGC NET Computer Science PYQ
4
Match List - I with List - II.
List - I (IP Address)
List - II (Class)
(A) 10.20.30.40 (I) Class E (B) 210.20.30.3 (II) Class B (C) 180.30.100.10 (III) Class A (D) 252.5.15.11
(IV) Class C
Choose the correct answer from the options given below :
1
(A)-(II), (B)-(III), (C)-(I), (D)-(IV) 2
(A)-(I), (B)-(IV), (C)-(II), (D)-(III) 3
(A)-(I), (B)-(II), (C)-(IV), (D)-(III) 4
(A)-(III), (B)-(IV), (C)-(II), (D)-(I) Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution IP class ranges
Class A → $1-126$
Class B → $128-191$
Class C → $192-223$
Class D → $224-239$
Class E → $240-255$
Check first octet:
A: $10$ → Class A → (III)
B: $210$ → Class C → (IV)
C: $180$ → Class B → (II)
D: $252$ → Class E → (I)
Thus
(A)-(III), (B)-(IV), (C)-(II), (D)-(I)
Qus : 105
UGC NET Computer Science PYQ
2
Consider relation R(A, B, C, D, E) with the following functional dependencies:
C → F, E → A, EC → D, A → B.
Which of the following is a key for R?
1
CD 2
EC 3
AE 4
AC Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution Goal: Find a set of attributes whose closure covers all attributes of R = {A, B, C, D, E}.
Check (1) CD+ :
From C → F we get F. D gives nothing further. So CD+ = {C, D, F}.
Missing A, B, E ⇒ not a key.
Check (2) EC+ :
Start {E, C}. Using E → A ⇒ add A. Using A → B ⇒ add B. Using EC → D ⇒ add D.
Therefore EC+ = {E, C, A, B, D} = {A, B, C, D, E}. Covers all attributes of R ⇒ key .
Check (3) AE+ :
A → B gives B; E → A adds nothing new. No way to reach C or D ⇒ not a key.
Check (4) AC+ :
A → B gives B; C → F gives F. No E or D ⇒ not a key.
Answer: (2) EC
Note: F is outside R, so while C → F is valid, a key must cover only attributes of R. EC+ covers {A, B, C, D, E}.
Qus : 106
UGC NET Computer Science PYQ
3
Match List - I with List - II.
List - I (software design principles)
List - II (Definitions)
(A) Cohesion (I) Degree to which one module relies on another module (B) Coupling (II) Dividing a software system into distinct modules (C) Abstraction (III) Degree to which elements of a module belong together (D) Modularity
(IV) Simplifying complex reality by modeling classes appropriate to the problem
Choose the correct answer from the options given below :
1
(A)-(I), (B)-(III), (C)-(II), (D)-(IV) 2
(A)-(II), (B)-(III), (C)-(IV), (D)-(I) 3
(A)-(III), (B)-(I), (C)-(IV), (D)-(II) 4
(A)-(III), (B)-(IV), (C)-(II), (D)-(I) Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution efinitions:
Cohesion → elements of a module belong together → (III)
Coupling → dependency between modules → (I)
Abstraction → simplify complexity → (IV)
Modularity → divide system into modules → (II)
Thus:
(A)-(III), (B)-(I), (C)-(IV), (D)-(II)
Qus : 107
UGC NET Computer Science PYQ
4
Which of the following trees are height balanced?
A. Binary Search Tree
B. AVL Tree
C. Red-Black Tree
D. B-Tree
Choose the correct answer from the options below:
A and D only
A, B and D only
C and D only
B and C only
1
1 2
2 3
3 4
4 Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution Answer: 4) B and C only
Binary Search Tree (BST): Not necessarily balanced; height can degrade to O(n).
AVL Tree: Height-balanced by definition (balance factor −1, 0, +1); height is O(log n).
Red-Black Tree: Enforces black-height properties that keep height O(log n); treated as a height-balanced binary tree.
B-Tree: Balanced (all leaves at the same level) but not a binary tree; the term “height-balanced tree” typically refers to binary trees. Hence excluded here.
Qus : 108
UGC NET Computer Science PYQ
2
Consider the transactions $T_1, T_2, T_3$ and the schedules $S_1$ and $S_2$ given below.
$T_1 : r_1(x); r_1(z); w_1(z)$
$T_2 : r_2(y); r_2(z); w_2(z)$
$T_3 : r_3(y); r_3(x); w_3(y)$
$S_1$ :
$r_1(x); r_3(y); r_3(x); r_2(y); r_2(z); w_3(y); w_3(z); r_1(z); w_1(x); w_1(z)$
$S_2$ :
$r_1(x); r_3(y); r_2(y); r_3(x); r_1(z); r_2(z); w_3(y); w_1(x); w_2(z); w_1(z)$
Which one of the following statements about the schedules is TRUE ?
1
Only $S_1$ is conflict-serializable 2
Only $S_2$ is conflict-serializable 3
Both $S_1$ and $S_2$ are conflict-serializable 4
Neither $S_1$ nor $S_2$ is conflict-serializable Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution To check conflict serializability we build precedence graph .
For $S_1$
Conflicts:
$T_1 \rightarrow T_3$
$T_3 \rightarrow T_2$
$T_2 \rightarrow T_1$
Cycle exists:
$T_1 \rightarrow T_3 \rightarrow T_2 \rightarrow T_1$
Therefore
$S_1$ not conflict-serializable
For $S_2$ Conflicts:
$T_3 \rightarrow T_1$
$T_2 \rightarrow T_1$
$T_3 \rightarrow T_2$
Graph has no cycle
Serializable order:
$T_3 \rightarrow T_2 \rightarrow T_1$
Thus
$S_2$ is conflict-serializable
Qus : 109
UGC NET Computer Science PYQ
3
Let P denote “She is intelligent” and Q denote “She is happy.”
Given statements:
(a) If she is intelligent, then she is unhappy.
(b) She is neither intelligent nor happy.
(c) It is necessary to be not intelligent in order to be happy.
(d) To be not intelligent is to be unhappy.
Which option gives the correct propositional expressions?
(a) P→¬Q; (b) P ∧ ¬Q; (c) Q→¬P; (d) P→¬Q
(a) P→Q; (b) ¬P ∧ ¬Q; (c) ¬Q→P; (d) ¬P→¬Q
(a) P→¬Q; (b) ¬P ∧ ¬Q; (c) Q→¬P; (d) ¬P→¬Q
(a) P→¬Q; (b) P ∧ ¬Q; (c) Q↔P; (d) ¬P→¬Q
1
1 2
2 3
3 4
4 Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution
Translate each statement:
(a) “If intelligent then unhappy” ⇒ P → ¬Q.
(b) “Neither intelligent nor happy” ⇒ ¬P ∧ ¬Q.
(c) “Being not intelligent is necessary for being happy” ⇒ Q → ¬P.
(d) “Not intelligent implies unhappy” ⇒ ¬P → ¬Q.
Only Option 3 matches all four translations.
Answer: 3
Qus : 110
UGC NET Computer Science PYQ
1
Consider the following statement regarding special purpose registers.
(A) Program Counter (PC) keeps the track of next instruction executed
(B) Instruction register holds the address of first instruction to be executed
(C) Accumulator holds the output of ALU
(D) Program Counter (PC) keeps the track of only first instruction of the program
Choose the correct answer from the options given below :
1
(A) and (C) Only 2
(A) and (D) Only 3
(B) and (D) Only 4
(A), (B) and (C) Only Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution (A) True
PC stores address of next instruction
(B) False
Instruction Register stores current instruction, not address
(C) True
Accumulator stores ALU result
(D) False
PC tracks every next instruction, not only first
Thus correct statements:
(A) and (C)
Qus : 112
UGC NET Computer Science PYQ
1
Which of the following are Agile Process Models ?
(A) Extreme Programming (XP)
(B) Waterfall
(C) Scrum
(D) Spiral
(E) Incremental
Choose the correct answer from the options given below :
1
(A) and (C) Only 2
(B) and (C) Only 3
(A) and (D) Only 4
(B) and (E) Only Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution Agile models include iterative and flexible development approaches.
Check each:
(A) Extreme Programming (XP) → Agile methodology ✔
(B) Waterfall → Traditional sequential model ✘
(C) Scrum → Agile framework ✔
(D) Spiral → Risk-driven traditional model ✘
(E) Incremental → Development strategy but not strictly Agile model here
Thus Agile models are:
Extreme Programming and Scrum
Qus : 113
UGC NET Computer Science PYQ
4
When developing a dynamic programming algorithm, the sequence of steps followed is:
A. Construct an optimal solution from computed information.
B. Recursively define the value of an optimal solution.
C. Characterize the structure of an optimal solution.
D. Compute the value of an optimal solution, typically in a bottom-up fashion.
Choose the correct answer from the options given below:
B, C, A, D
B, A, C, D
C, B, A, D
C, B, D, A
1
1 2
2 3
3 4
4 Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution Answer: (4) C, B, D, A
Explanation:
The standard steps for designing a dynamic programming algorithm are:
(C) Characterize the structure of an optimal solution.
(B) Recursively define the value of an optimal solution.
(D) Compute the value of an optimal solution (usually bottom-up).
(A) Construct the optimal solution from the computed information.
Hence, the correct order is C → B → D → A .
Qus : 114
UGC NET Computer Science PYQ
3
Arrange the following phases of database design in the correct order :
(A) Physical Design
(B) Conceptual Design
(C) Logical Design
(D) Requirement Analysis
Choose the correct answer from the options given below :
1
(B), (D), (A), (C) 2
(C), (A), (B), (D) 3
(D), (B), (C), (A) 4
(A), (D), (C), (B) Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution Standard database design process:
Requirement Analysis
Conceptual Design
Logical Design
Physical Design
Thus order:
(D) → (B) → (C) → (A)
Qus : 116
UGC NET Computer Science PYQ
1
Which of the following statements are TRUE about mutual exclusion in concurrent programming ?
(A) Mutual exclusion ensures that only one process can be in a critical section at any given time.
(B) Mutual exclusion are designed to prevent conflicts and ensure that only one process can access shared resources at a time.
(C) Mutual exclusion can use various algorithms to ensure that processes do not enter the critical section simultaneously.
(D) Mutual exclusion allows multiple processes to access the critical section simultaneously to improve performance.
Choose the correct answer from the options given below :
1
(A), (B), (C) Only 2
(B), (C), (D) Only 3
(A), (C), (D) Only 4
(A), (C), (D) Only Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution (A) True
Mutual exclusion ensures only one process enters critical section at a time.
(B) True
It prevents conflicts on shared resources.
(C) True
Algorithms like Peterson, Dekker, semaphore, mutex ensure mutual exclusion.
(D) False
Critical section cannot be accessed simultaneously by multiple processes.
Thus correct statements:
(A), (B), (C)
Qus : 117
UGC NET Computer Science PYQ
4
Consider a relation schema $R = (U, V, W, X, Y, Z)$, on which the following functional dependencies hold:
${U \rightarrow V,; VW \rightarrow X,; Y \rightarrow W,; X \rightarrow U}$
The candidate keys of $R$ are:
1
$UY,; VY$ 2
$UY,; VY,; XY$ 3
$UYZ,; VYZ,; VWZ$ 4
$UYZ,; VYZ,; XYZ$ Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution Functional dependencies:
$U \rightarrow V$
$VW \rightarrow X$
$Y \rightarrow W$
$X \rightarrow U$
Start with $UY$:
$U \rightarrow V$
$Y \rightarrow W$
Thus we get $V,W$
Then
$VW \rightarrow X$
Then
$X \rightarrow U$
So closure:
$UY^+ = {U,V,W,X,Y}$
Add $Z$ to cover all attributes.
Thus minimal key:
$UYZ$
Similarly:
$VYZ$ and $XYZ$
Thus candidate keys:
$UYZ,; VYZ,; XYZ$
Qus : 119
UGC NET Computer Science PYQ
2
Host A (on TCP/IPv4 Networks) send an IP Datagram D to host B (also on TCP/IPv4 network). Assume that no error occurred during transmission of D, when D reaches host B. Which of following header field may differ from that of original datagram D ?
(A) TTL
(B) Checksum
(C) Fragment offset
(D) Source IP
(E) Destination IP
Choose the correct answer from the options given below :
1
(A) and (B) Only 2
(A), (B) and (C) Only 3
(A), (B), (C) and (D) Only 4
(A), (B), (C) and (E) Only Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution (A) TTL → Decreases at every router ✔
(B) Header checksum → Recomputed whenever TTL changes ✔
(C) Fragment offset → May change if fragmentation occurs ✔
(D) Source IP → Does not change ✘
(E) Destination IP → Does not change ✘
Thus fields that may differ:
TTL, Checksum, Fragment offset
Qus : 120
UGC NET Computer Science PYQ
1
Match List I with List II:
List I
List II
A. Address Space
I. Associative Mapping
B. Memory Space
II. Logical address
C. Cache Memory
III. Physical address
D. Segmented Program
IV. Virtual address
Choose the correct answer from the options given below:
1
A-IV, B-III, C-I, D-II 2
A-I, B-II, C-IV, D-III 3
A-III, B-IV, C-I, D-II 4
A-II, B-IV, C-I, D-III Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution
A. Address Space → Virtual Address (IV)
Address space refers to the range of virtual addresses a process can use in memory.
B. Memory Space → Physical Address (III)
Memory space corresponds to the actual physical memory locations in RAM.
C. Cache Memory → Associative Mapping (I)
Cache memory uses mapping techniques such as associative mapping to store data efficiently.
D. Segmented Program → Logical Address (II)
In segmentation, programs are divided into segments, each referenced by logical addresses.
Qus : 121
UGC NET Computer Science PYQ
4
Consider a CSMA/CD network that transmits data at the rate of 100 Mbps over a 1 kilometre cable with no repeater. If the minimum frame size required for this network is 1250 bytes, what is the signal speed (km/sec) in the cable ?
1
8000 2
16000 3
12000 4
20000 Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution Minimum frame size:
$1250 \text{ bytes} = 1250 \times 8 = 10000 \text{ bits}$
Transmission rate:
$100 \text{ Mbps} = 100 \times 10^6 \text{ bits/sec}$
Transmission time:
$T = \frac{10000}{100 \times 10^6}$
$T = 10^{-4} \text{ sec}$
In CSMA/CD:
$T = 2 \times$ propagation delay
So propagation delay:
$\frac{T}{2} = 5 \times 10^{-5}$ sec
Distance = 1 km
Signal speed:
$v = \frac{distance}{time}$
$v = \frac{1}{5 \times 10^{-5}}$
$v = 20000 \text{ km/sec}$
Qus : 122
UGC NET Computer Science PYQ
1
Consider the following table defining the sample inputs and corresponding target values for a perceptron model.
Sample No
x1
x2
target
w1
w2
S1 0 0 0 0 0
S2 0 1 1
S3 1 0 1
S4 1 1 1
What shall be the value of updated weights after applying all the samples S1 to S4 (in the order S1, S2, S3, S4) to this model.
Given that the initial weights w1=0, w2=0, learning rate=0.1 and no bias is involved in the perceptron.
The activation function for this perceptron is given below:
yobserved =
{ 1 if yin > 0
0 if yin < 0 }
w1 = 0.1, w2 = 0.1
w1 = 0.0, w2 = 0.2
w1 = 0.0, w2 = 0.1
w1 = 0.2, w2 = 0.2
1
1 2
2 3
3 4
4 Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution
Using perceptron learning rule:
Δw = η (t − y) x, where y = 1 if yin > 0 else 0.
S1 (0,0,t=0): yin =0 ⇒ y=0 ⇒ no change ⇒ (w1,w2)=(0,0)
S2 (0,1,t=1): yin =0 ⇒ y=0 ⇒ Δw=0.1(1−0)(0,1) ⇒ (w1,w2)=(0,0.1)
S3 (1,0,t=1): yin =0 ⇒ y=0 ⇒ Δw=0.1(1−0)(1,0) ⇒ (w1,w2)=(0.1,0.1)
S4 (1,1,t=1): yin =0.1+0.1=0.2>0 ⇒ y=1 ⇒ no change
Final Weights: w1=0.1, w2=0.1
Answer: (1)
Qus : 123
UGC NET Computer Science PYQ
1
#include<iostream.h>
using namespace std;
void swap(int &x, int &y)
{
int temp = x;
x = y;
y = temp;
}
int main()
{
int a = 5, b = 10;
swap(a,b);
swap(a,b);
cout << a << " " << b;
return 0;
} What will be the output of above code ?
1
5, 10 2
10, 5 3
5, 5 4
10, 10 Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution Initial values
$a = 5,; b = 10$
First call
swap(a,b)
$a = 10,; b = 5$
Second call
swap(a,b)
$a = 5,; b = 10$
Thus final output
5 10
Qus : 124
UGC NET Computer Science PYQ
3
Consider the three-way handshaking process followed during TCP connection establishment between two hosts A and B. Let S and R be two random 32-bit starting sequence numbers chosen by A and B respectively. Suppose A sends a TCP segment having SYN bit = 1, SEQ number = S and ACK bit = 0 and B accepts the connection request.
Which one of the following choices represents the information present in the TCP segment header that is sent by B to A ?
1
SYN bit = 1, SEQ number = S+1, ACK bit = 0, ACK number = R, FIN bit = 0 2
SYN bit = 0, SEQ number = R, ACK bit = 1, ACK number = S+1, FIN bit = 0 3
SYN bit = 1, SEQ number = R, ACK bit = 1, ACK number = S+1, FIN bit = 0 4
SYN bit = 1, SEQ number = R, ACK bit = 1, ACK number = S, FIN bit = 0 Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution TCP 3-way handshake:
Step 1
A → B
SYN = 1
SEQ = S
Step 2
B → A
SYN = 1
ACK = 1
SEQ = R
ACK = S + 1
Thus correct header fields:
SYN = 1
SEQ = R
ACK = 1
ACK = S + 1
Qus : 125
UGC NET Computer Science PYQ
3
Arrange the following steps of file handling in C in the correct order :
(A) Close the file
(B) Read from or write to the file
(C) Open the file
(D) Check for error
Choose the correct answer from the options given below :
1
(A), (C), (D), (B)
2
(D), (B), (C), (A) 3
(C), (D), (B), (A) 4
(B), (D), (A), (C) Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution Correct file handling sequence in C:
Open file
Check for error
Read / Write
Close file
Thus order:
(C) → (D) → (B) → (A)
Qus : 127
UGC NET Computer Science PYQ
2
Match List - I with List - II.
List - I (operating system concepts)
List - II (characteristics)
(A) Paging (I) Evicts least recently used process (B) LRU (Least Recently Used) (II) Extends physical memory (C) C-SCAN (III) Logical to physical mapping (D) Virtual Memory
(IV) Circular disk access
Choose the correct answer from the options given below :
1
(A)-(III), (B)-(IV), (C)-(I), (D)-(II) 2
(A)-(III), (B)-(I), (C)-(IV), (D)-(II) 3
(A)-(I), (B)-(III), (C)-(IV), (D)-(II) 4
(A)-(I), (B)-(IV), (C)-(III), (D)-(II) Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution Paging → Logical to physical address mapping → (III)
LRU → Replace least recently used page → (I)
C-SCAN → Circular disk scheduling → (IV)
Virtual Memory → Extends physical memory → (II)
Thus:
(A)-(III), (B)-(I), (C)-(IV), (D)-(II)
Qus : 128
UGC NET Computer Science PYQ
3
Which of the following statements are TRUE about Process Control Block (PCB) ?
(A) The PCB contains information about the process state, such as whether it is running, waiting or terminated
(B) The PCB includes the program code and data segments of the process
(C) The PCB stores the process’s memory management information, such as page tables and segment tables
(D) The PCB is used to track process scheduling information and CPU registers for process
Choose the correct answer from the options given below :
1
(A), (B) and (C) Only 2
(B), (C) and (D) Only 3
(A), (C) and (D) Only 4
(A) and (B) Only Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution (A) True
PCB stores process state (running, ready, waiting).
(B) False
Program code and data are stored in process memory, not in PCB.
(C) True
PCB stores memory management information (page tables, segment tables).
(D) True
PCB contains CPU registers and scheduling information.
Thus correct statements:
(A), (C), (D)
Qus : 129
UGC NET Computer Science PYQ
2
Arrange the following steps of Feature Driven Development (FDD) process in the correct sequence :
(A) Develop an overall model
(B) Build by feature
(C) Plan by feature
(D) Design by feature
(E) Build a feature list
Choose the correct answer from the options given below :
1
(A), (C), (B), (E), (D) 2
(A), (E), (C), (D), (B) 3
(B), (A), (D), (E), (C) 4
(A), (B), (C), (E), (D) Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution Standard FDD lifecycle steps :
Develop overall model
Build feature list
Plan by feature
Design by feature
Build by feature
Thus order:
(A) → (E) → (C) → (D) → (B)
Qus : 130
UGC NET Computer Science PYQ
1
Match List - I with List - II.
List - I (Recurrence Relations)
List - II (Complexity)
(A) $T(n)=2T(n/2)+n$ (I) $T(n)=\theta(n\log n)$ [exact solution] (B) $T(n)=T(n/2)+1$ (II) $O(n^2)$ (C) $T(n)=2T(n/2)+1$ (III) $T(n)=\theta(n)$ [exact solution] (D) $T(n)=T(n-1)+1$
(IV) $O(\log n)$
Choose the correct answer from the options given below :
1
(A)-(I), (B)-(IV), (C)-(III), (D)-(II) 2
(A)-(IV), (B)-(III), (C)-(I), (D)-(II) 3
(A)-(I), (B)-(III), (C)-(IV), (D)-(II) 4
(A)-(III), (B)-(I), (C)-(IV), (D)-(II) Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution (A) $T(n)=2T(n/2)+n$
Master theorem
$a=2,; b=2,; f(n)=n$
$\Rightarrow T(n)=\theta(n\log n)$
So (A) → (I)
(B) $T(n)=T(n/2)+1$
Divide size halves each step
$\Rightarrow T(n)=O(\log n)$
So (B) → (IV)
(C) $T(n)=2T(n/2)+1$
Master theorem
$\Rightarrow T(n)=\theta(n)$
So (C) → (III)
(D) $T(n)=T(n-1)+1$
Linear recurrence
$\Rightarrow T(n)=O(n)$
Closest option given:
(D) → (II)
Thus matching:
(A)-(I), (B)-(IV), (C)-(III), (D)-(II)
Qus : 133
UGC NET Computer Science PYQ
3
Arrange the following in the increasing order of coupling from lowest coupling to highest coupling.
A. Common Coupling
B. Stamp Coupling
C. Control Coupling
D. External Coupling
E. Content Coupling
Choose the correct answer from the options given below:
1
E, A, C, B, D 2
D, B, A, E, C 3
B, C, D, A, E 4
C, A, B, D, E Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution Increasing coupling (lower → higher):
Stamp coupling (B) : modules share a composite data structure but use only parts of it.
Control coupling (C) : one module controls another via flags/controls.
External coupling (D) : modules depend on externally imposed formats/protocols/devices.
Common coupling (A) : modules share global data.
Content coupling (E) : one module relies on or modifies another’s internal logic (worst).
Qus : 134
UGC NET Computer Science PYQ
1
Which of the following tasks could be attained using syntax trees in compiler design ?
(A) Type Checking
(B) Code Generation
(C) Code Optimization
(D) Error Handling
Choose the correct answer from the options given below :
1
(A), (B), (C) Only 2
(B), (C), (D) Only 3
(A), (C), (D) Only 4
(A), (B), (D) Only Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution Syntax trees (Abstract Syntax Tree – AST) are used in later compiler phases.
(A) Type Checking → Done using syntax tree ✔
(B) Code Generation → Uses syntax tree ✔
(C) Code Optimization → Uses syntax tree representation ✔
(D) Error Handling → Mainly done during lexical / syntax analysis ✘
Thus correct tasks:
(A), (B), (C)
Qus : 135
UGC NET Computer Science PYQ
3
The correct sequence of constructing Huffman tree is
A. Repeat until root formed
B. Create leaf nodes
C. Build priority queue
D. Combine lowest frequency nodes
Choose the correct answer from the options given below:
1
B, C, A, D 2
D, B, A, C 3
B, C, D, A 4
C, A, B, D Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution Create leaf nodes (B) for each character with their frequency.
Build a priority queue (C) (min-heap) based on frequency.
Combine lowest frequency nodes (D) repeatedly to form new internal nodes.
Repeat until root formed (A) — the final remaining node is the root of the Huffman tree.
Hence, the correct order is B → C → D → A.
Qus : 137
UGC NET Computer Science PYQ
1
Consider the following three relations:
Employee(eid, eName), Comp(cid, cName), Own(eid, cid).
Which of the following relational algebra expressions return the set of eids who own all brands?
(1) π_eid( π_eid,cid(Own) ÷ π_cid(Comp) )
(2) π_eid( π_eid(Own) × π_cid(Comp) )
(3) π_eid( π_eid,cid(Own) × π_cid(Comp) )
(4) π_eid( π_eid(Own) × (π_cid,cName(Own) ÷ π_cid(Comp)) )
1
1 2
2 3
3 4
4 Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution Reason: To find employees who own all brands, divide the (eid,cid) pairs in Own by the set of all cids in Comp, then project eid:
π_eid( (Own[eid,cid]) ÷ (Comp[cid]) ).
Qus : 139
UGC NET Computer Science PYQ
2
Match List I with List II
List I
List II
A. Clustered Page Table
III. Useful for sparse address spaces.
B. Hierarchical Page Table
I. Generally considered inappropriate for 64-bit architectures.
C. Segmentation
IV. Supports a user view of the system.
D. Inverted Page Table
II. Has only entry for each real page (or frame) of memory.
Choose the correct answer from the options given below:
1
$A \rightarrow III,\; B \rightarrow I,\; C \rightarrow II,\; D \rightarrow IV$ 2
$A \rightarrow III,\; B \rightarrow I,\; C \rightarrow IV,\; D \rightarrow II$ 3
$A \rightarrow III,\; B \rightarrow III,\; C \rightarrow I,\; D \rightarrow IV$ 4
$A \rightarrow IV,\; B \rightarrow III,\; C \rightarrow II,\; D \rightarrow I$ Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution Explanation:
$A \rightarrow III$ → Clustered Page Table is useful for sparse address spaces .
$B \rightarrow I$ → Hierarchical Page Table is inappropriate for 64-bit architectures .
$C \rightarrow IV$ → Segmentation supports user’s logical view .
$D \rightarrow II$ → Inverted Page Table has only one entry per real page frame .
Qus : 141
UGC NET Computer Science PYQ
3
The longest common subsequence of $\{1,2,3,2,4,1,2\}$ and $\{2,4,3,1,2,1\}$ is
1
$2,1,2,3$ 2
$1,3,2,1$ 3
$2,3,2,1$ 4
$2,3,1,2,1$ Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution Why: The LCS length for the two sequences is $4$.
$2,3,2,1$ is a subsequence of both:
$\{1,\underline{2},3,\underline{2},4,1,\underline{2}\}$ and $\{\underline{2},4,\underline{3},1,\underline{2},\underline{1}\}$.
Option (4) has length $5$ (too long), and (1), (2) are not subsequences of both.
Qus : 144
UGC NET Computer Science PYQ
4
Consider the following relations on ${1,2,3,4}$. Which of the following relations are reflexive ?
(A)
$R_1={(1,1),(1,2),(2,1),(2,2),(3,4),(4,1),(4,4)}$
(B)
$R_2={(1,1),(1,2),(2,1)}$
(C)
$R_3={(1,1),(1,2),(1,4),(2,1),(2,2),(3,3),(4,1),(4,4)}$
(D)
$R_4={(2,1),(3,1),(3,2),(4,1),(4,2),(4,3)}$
(E)
$R_5={(1,1),(1,2),(1,3),(1,4),(2,2),(2,3),(2,4),(3,3),(3,4),(4,4)}$
Choose the correct answer from the options given below :
1
(A), (B) and (C) Only 2
(A), (D) and (E) Only 3
(D) and (E) Only 4
(C) and (E) Only Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution For a relation on ${1,2,3,4}$ to be reflexive, it must contain
$(1,1),(2,2),(3,3),(4,4)$
Check each:
$R_1$ → missing $(3,3)$ ✘
$R_2$ → missing $(3,3),(4,4)$ ✘
$R_3$ → contains $(1,1),(2,2),(3,3),(4,4)$ ✔
$R_4$ → missing all diagonal pairs ✘
$R_5$ → contains all $(1,1),(2,2),(3,3),(4,4)$ ✔
Thus reflexive relations:
$R_3$ and $R_5$
Qus : 145
UGC NET Computer Science PYQ
2
Arrange the process of virtualization in cloud environments.
A. Hypervisor installed on physical server
B. Virtual machines created
C. Resources allocated to Virtual machines
D. Virtual machines run isolated workloads
1
B, C, A, D 2
A, B, C, D 3
A, C, B, D 4
B, C, D, A Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution Step 1 – Install hypervisor on the physical server.
Step 2 – Create virtual machines.
Step 3 – Allocate resources (CPU, RAM, etc.) to each VM.
Step 4 – VMs run isolated workloads.
Qus : 147
UGC NET Computer Science PYQ
2
Considering the following statements:
A. Data transformation is involved in Data mining process.
B. Online database is used in Data warehouse.
C. Classification is a measure of accuracy.
D. K-means clustering algorithm is based on the concept of minimizing the within-cluster variance.
E. Pattern evaluation is a process to identify knowledge based on interestingness measure.
1
B, C, E only 2
B, D, E only 3
A, C, E only 4
A, C, D only Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution B – True: Data warehouses are used for online analytical processing (OLAP).
D – True: K-means minimizes within-cluster sum of squares (variance).
E – True: Pattern evaluation identifies useful patterns using interestingness measures.
A – Data transformation happens before mining (in preprocessing).
C – Classification is a process, not a measure of accuracy.
Qus : 148
UGC NET Computer Science PYQ
2
A coin is tossed successively three times. Find the Probability $(P)$, Event $(E)$, Sample space $(S)$ of getting exactly one head or two heads, where $n$ is number of occurrence.
(A) $n(S)=8$ and $n(E)=4$
(B) $n(E)=6$ and $n(S)=8$
(C) $P(E)=\frac{3}{4}$
(D) $P(E)=\frac{1}{2}$
Choose the correct answer from the options given below :
1
(A), (B), (C) and (D) 2
(B) and (C) Only 3
(A) and (D) Only 4
(C) and (D) Only Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution Sample space for 3 tosses:
$S={HHH,HHT,HTH,HTT,THH,THT,TTH,TTT}$
Thus
$n(S)=8$
Event: exactly 1 head or 2 heads
1 head → ${HTT,THT,TTH}$
2 heads → ${HHT,HTH,THH}$
So
$n(E)=6$
Probability
$P(E)=\frac{6}{8}=\frac{3}{4}$
Thus correct statements:
(B) and (C)
Qus : 149
UGC NET Computer Science PYQ
3
Match List I with List II
List I (Operations on Fuzzy Sets)
List II (Description)
A. Intersection
IV. $\min(\mu_A(x), \mu_B(x))$
B. Bounded Sum
III. $\min(1, \mu_A(x) + \mu_B(x))$
C. Bounded Difference
II. $\max(0, \mu_A(x) - \mu_B(x))$
D. Algebraic Sum
I. $\mu_A(x) + \mu_B(x) - \mu_A(x)\mu_B(x)$
Choose the correct answer from the options given below:
1
A→III, B→I, C→II, D→IV 2
A→III, B→II, C→IV, D→I 3
A→IV, B→III, C→II, D→I 4
A→II, B→I, C→III, D→IV Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution Explanation:
A → IV → Intersection → $\min(\mu_A(x), \mu_B(x))$
B → III → Bounded Sum → $\min(1, \mu_A(x) + \mu_B(x))$
C → II → Bounded Difference → $\max(0, \mu_A(x) - \mu_B(x))$
D → I → Algebraic Sum → $\mu_A(x) + \mu_B(x) - \mu_A(x)\mu_B(x)$
Qus : 150
UGC NET Computer Science PYQ
2
Consider the given number $(45)_y$ where $y$ is the base of the number. Some of the possible values of $y$ are given below.
(A) 5
(B) 6
(C) 7
(D) 8
Choose the correct answer from the options given below :
1
(A), (B) and (C) Only 2
(B), (C) and (D) Only 3
(A), (C) and (D) Only 4
(A), (B), (C) and (D) Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution In base $y$, digits must be less than base .
Number $(45)_y$ has digit 5 .
Thus
$y>5$
Possible bases:
$6,7,8,\dots$
Given options:
6, 7, 8
Thus
(B), (C), (D)
Qus : 152
UGC NET Computer Science PYQ
3
Match List - I with List - II.
List - I
List - II
(A) HTML (I) Allow for dynamic and interactive web pages. (B) DHTML (II) Defines the structure of web pages. (C) XML (III) Object-oriented programming language for web applications. (D) JAVA
(IV) Used for data storage and transport.
Choose the correct answer from the options given below :
1
(A)-(I), (B)-(III), (C)-(II), (D)-(IV) 2
(A)-(II), (B)-(III), (C)-(IV), (D)-(I) 3
(A)-(II), (B)-(I), (C)-(IV), (D)-(III) 4
(A)-(III), (B)-(I), (C)-(IV), (D)-(II) Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution HTML → defines structure of web pages → (II)
DHTML → dynamic interactive web pages → (I)
XML → data storage and transport → (IV)
JAVA → object-oriented programming language → (III)
Thus matching:
(A)-(II), (B)-(I), (C)-(IV), (D)-(III)
Qus : 153
UGC NET Computer Science PYQ
3
List I List II A. Circular Queue III. Dijkstra algorithm B. Priority Queue II. CPU Scheduling C. Double Ended Queue I. Print Queue D. Simple Queue IV. Palindrome checking
Choose the correct answer from the options given below:
1
A–II, B–III, C–I, D–IV 2
A–II, B–III, C–IV, D–I 3
A–III, B–II, C–I, D–IV 4
A–IV, B–II, C–I, D–III Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution
Qus : 154
UGC NET Computer Science PYQ
2
Arrange the following stages of parsing in the correct order as they typically occur in the compilation process.
(A) Lexical Analysis
(B) Semantic Analysis
(C) Syntax Analysis
(D) Intermediate Code Generation
(E) Code Optimization
Choose the correct answer from the options given below :
1
(A), (B), (C), (D), (E) 2
(A), (C), (B), (D), (E) 3
(A), (D), (B), (C), (E) 4
(A), (C), (D), (B), (E) Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution Standard compiler phases:
Lexical Analysis
Syntax Analysis
Semantic Analysis
Intermediate Code Generation
Code Optimization
Thus order:
(A) → (C) → (B) → (D) → (E)
Qus : 155
UGC NET Computer Science PYQ
2
List I (RAID Levels) List II (Description) A. RAID Level 2 IV. Also known as Memory style error correcting code organization B. RAID Level 3 III. Bit interleaved parity C. RAID Level 5 I. Block interleaved distribution parity D. RAID Level 6 II. Also known as P+Q redundancy scheme
Choose the correct answer from the options given below:
1
A→IV, B→III, C→I, D→II 2
A→III, B→IV, C→I, D→II 3
A→I, B→III, C→IV, D→II 4
A→II, B→IV, C→I, D→III Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution A→III, B→IV, C→I, D→II
Qus : 159
UGC NET Computer Science PYQ
3
The computer needs to process each instruction with the following sequence of steps:
A. Calculate the effective address
B. Fetch the instruction from memory
C. Decode the instruction
D. Fetch the operands from the memory
E. Execute the instruction
1
A, B, C, D, E
2
B, A, D, A, E 3
B, C, A, D, E 4
C, B, A, D, E Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution First fetch the instruction (B), then decode it (C). If required, compute the effective address (A), fetch the operands (D), and finally execute the instruction (E).
Qus : 160
UGC NET Computer Science PYQ
3
Match List - I with List - II.
List - I (Algorithms)
List - II (Characteristics)
(A) First Come First Served (FCFS) (I) Each process is assigned a priority (B) Shortest Job First (SJF) (II) Ensures fair allocation of CPU time by assigning time slice (C) Round Robin (RR) (III) Processes are executed in the order they arrive (D) Priority Scheduling
(IV) Select the process for execution with smallest next burst time
Choose the correct answer from the options given below :
1
(A)-(II), (B)-(III), (C)-(IV), (D)-(I) 2
(A)-(II), (B)-(IV), (C)-(III), (D)-(I) 3
(A)-(III), (B)-(IV), (C)-(II), (D)-(I) 4
(A)-(III), (B)-(IV), (C)-(I), (D)-(II) Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution FCFS → executed in order of arrival → (III)
SJF → smallest burst time → (IV)
Round Robin → time slice fairness → (II)
Priority Scheduling → priority based → (I)
Thus:
(A)-(III), (B)-(IV), (C)-(II), (D)-(I)
Qus : 161
UGC NET Computer Science PYQ
4
Consider the following DFA that generates set of strings over Σ = {a, b, c}.
Identify the best description of the language for the DFA.
1
L = (a* + b* + c*)* 2
L = (a + b + c)(abc)(a + b + c)* 3
L = {set of strings, all starting with ‘a, b, c’ but ending with ‘c’} 4
L = {set of strings having even count (including 0) of substring ‘abc’} Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution The automaton has two “phases” connected by the path recognizing a→b→c. Each time the substring “abc” is seen, the DFA moves to the other phase, toggling parity. The start phase (no “abc” yet) is accepting (count 0), and after every additional “abc” the parity flips; therefore the accepting states correspond to an even number of occurrences of “abc”. Options 1 and 2 describe Σ* (all strings), and option 3 does not match the transitions.
Qus : 162
UGC NET Computer Science PYQ
3
Which of the following are typical activities in the software process lifecycle ?
(A) Requirement Analysis
(B) System Design
(C) Code Refactoring
(D) Deployment
(E) Substructure
Choose the correct answer from the options given below :
1
(A), (B), (C) Only 2
(B), (C), (D) Only 3
(A), (B), (D) Only 4
(A), (D), (E) Only Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution Typical Software Development Life Cycle (SDLC) activities:
Requirement Analysis ✔
System Design ✔
Implementation / Testing
Deployment ✔
Check options:
(A) Requirement Analysis → ✔
(B) System Design → ✔
(C) Code Refactoring → maintenance activity, not core lifecycle step ✘
(D) Deployment → ✔
(E) Substructure → not SDLC activity ✘
Thus correct:
(A), (B), (D)
Qus : 164
UGC NET Computer Science PYQ
4
Which of the following are TRUE about constructors in C++ ?
(A) A constructor can be overloaded.
(B) A constructor does not have a return type.
(C) A constructor must be declared as a friend function.
(D) A constructor is called when an object is destroyed.
Choose the correct answer from the options given below :
1
(B), (C), (D) Only 2
(B), (C) Only 3
(A), (B), (C) Only 4
(A), (B) Only Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution (A) True
Constructors can be overloaded.
(B) True
Constructors do not have return type.
(C) False
Constructors are member functions, not friend functions.
(D) False
Destructor is called when object is destroyed.
Thus correct statements:
(A) and (B)
Qus : 165
UGC NET Computer Science PYQ
1
Consider the operators used in C programming given below:
A. &&
B. +=
C. >>
D. >=
E. ?:
Choose among the following the correct order of precedence of the operators given above (higher to lower):
1
C, D, E, B, A 2
C, A, D, E, B 3
C, D, A, E, B 4
D, C, A, B, E Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution Operator precedence (highest → lowest) is:
>> (shift) → >= (relational) → ?: (ternary) → += (assignment) → && (logical AND).
Qus : 166
UGC NET Computer Science PYQ
3
Consider a schema $R(P,Q,R,S)$ and the following functional dependencies
$P \rightarrow Q$
$Q \rightarrow R$
$R \rightarrow S$
$S \rightarrow Q$
The decomposition of $R(P,Q,R,S)$ into $R_1(P,Q)$, $R_2(Q,R)$ and $R_3(Q,S)$ is :
1
Dependency preserving and lossless join 2
Lossless Join but not dependency preserving 3
Dependency preserving but not lossless join 4
Not dependency preserving and not lossless join Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution Check dependency preservation
Given FDs:
$P \rightarrow Q$
$Q \rightarrow R$
$R \rightarrow S$
$S \rightarrow Q$
Decomposed relations:
$R_1(P,Q)$
$R_2(Q,R)$
$R_3(Q,S)$
Each dependency is preserved:
$P \rightarrow Q$ → in $R_1$
$Q \rightarrow R$ → in $R_2$
$R \rightarrow S$ → derived via $Q$ in $R_3$
$S \rightarrow Q$ → in $R_3$
Thus dependency preserving
Check lossless join:
Common attribute between relations is Q, which functionally determines other attributes through dependencies.
Hence not lossless join.
Qus : 167
UGC NET Computer Science PYQ
2
List I (Projection Type) List II (Description) A. Oblique Projection IV. When the angle between the projectors and the plane of projection is not equal to 90°. B. Cavalier Projection II. When the direction of projection is so chosen that there is no foreshortening of lines perpendicular to the plane of projection. C. Cabinet Projection I. When the direction of projection is so chosen that the lines perpendicular to the plane of projection are foreshortened. D. Orthographic Projection III. When the direction of projection is perpendicular to the plane of projection.
1
A–III, B–II, C–IV, D–I 2
A–IV, B–II, C–I, D–III 3
A–II, B–I, C–IV, D–II 4
A–IV, B–I, C–III, D–II Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution A → IV → Oblique projection → projectors not at 90°
B → II → Cavalier projection → no foreshortening (perpendicular lines true length)
C → I → Cabinet projection → foreshortening applied
D → III → Orthographic projection → projectors perpendicular to plane
Qus : 168
UGC NET Computer Science PYQ
3
Arrange the following phases of the Agile process in the correct sequence :
(A) Design
(B) Release
(C) Testing
(D) Development
(E) Planning
Choose the correct answer from the options given below :
1
(A), (B), (D), (E), (C) 2
(A), (D), (E), (B), (C) 3
(E), (A), (D), (C), (B) 4
(E), (D), (A), (C), (B) Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution Typical Agile workflow:
Planning
Design
Development
Testing
Release
Thus order:
(E) → (A) → (D) → (C) → (B)
Qus : 169
UGC NET Computer Science PYQ
2
Which of the following statements are true?
A. In the write-through policy, only the cache is updated
B. In the write-back policy, both cache and main memory are updated
C. Cache coherence problems exist in multiprocessors with private caches because of the need to share writable data
D. Cache coherence problem can be solved by means of hardware-only scheme
1
A, B only 2
B, C only 3
C, D only 4
A, B, C only Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution A is false — In the write-through policy, both cache and main memory are updated simultaneously.
B is true — In write-back policy, data is first written to cache and later updated in main memory when replaced.
C is true — Cache coherence arises in multiprocessors with private caches that share writable data.
D is false — Cache coherence solutions usually need both hardware and software support, not hardware-only.
Qus : 170
UGC NET Computer Science PYQ
4
Consider the following table about processes, their burst time and arrival time
Process Burst Time Arrival Time P1 9 0 P2 30 0 P3 4 0 P4 8 2 P5 11 6
Now, which process finishes second last in the Gantt chart for:
non-preemptive SJF, and
Round Robin (time quantum = 10)?
1
SJF : $P_4$ ; RR : $P_4$ 2
SJF : $P_5$ ; RR : $P_4$ 3
SJF : $P_4$ ; RR : $P_3$ 4
SJF : $P_5$ ; RR : $P_5$ Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution Scheduling Execution order (finish times) Second last finisher Non-preemptive SJF P3(0–4) → P4(4–12) → P1(12–21) → P5(21–32) → P2(32–62) P5 Round Robin, q=10 P1(0–9, finishes) → P2(9–19) → P3(19–23, finishes) → P4(23–31, finishes) → P5(31–41) → P2(41–51) → P5(51–52, finishes) → P2(52–62, finishes) P5
Qus : 171
UGC NET Computer Science PYQ
2
#include<stdio.h>
void main()
{
int arr[]={1, 2, 3, 4, 5};
int *p = arr;
printf("%d", *p++);
printf("%d", *(p+1));
} Find the output of the above code?
1
1 , 2 2
1, 3 3
2, 3 4
1 , 4 Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution Initial:
arr = {1,2,3,4,5}
p → arr[0]
First statement:
*p++
Post-increment
Value printed = *p = 1
Then pointer moves to next element.
Now:
p → arr[1]
Second statement:
*(p+1)
p+1 → arr[2]
Value = 3
Output:
1 3
Qus : 172
UGC NET Computer Science PYQ
1
The right sequence of suboperations that are performed in arithmetic pipeline is –
A. Align the mantissas
B. Add or subtract the mantissas
C. Normalize the result
D. Compare the exponents
1
D, A, B, C 2
D, B, A, C 3
B, C, A, D 4
B, C, D, A Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution The correct order of floating-point arithmetic steps is —
First, compare the exponents (D) to determine alignment.
Then, align the mantissas (A) by shifting.
Next, add or subtract the mantissas (B) .
Finally, normalize the result (C) to adjust exponent and mantissa.
Hence, the sequence is D → A → B → C .
Qus : 173
UGC NET Computer Science PYQ
1
Which of the following properties correctly describe a Regular Grammar ?
(A) All productions rules are of the form $A \rightarrow xB$ or $A \rightarrow x$, where $A$ and $B$ are non terminal symbols and $x$ is a terminal symbol.
(B) Regular grammars are more powerful than context-free grammars and can express any type of language.
(C) There is a direct correspondence between regular grammar and finite automata.
(D) Regular grammars can generate languages that are not recognised by any type of automata.
Choose the correct answer from the options given below :
1
(A) and (C) Only 2
(B) and (C) Only 3
(C) and (D) Only 4
(A) and (C) Only Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution (A) True
Regular grammar productions follow
$A \rightarrow aB$ or $A \rightarrow a$
(B) False
Regular grammar less powerful than CFG
(C) True
Regular grammar ↔ Finite automata equivalence
(D) False
Regular languages are recognized by finite automata
Qus : 177
UGC NET Computer Science PYQ
1
What is the output of code given below :
#include<iostream.h>
using namespace std;
class Base {
public:
Base(){
cout<<"Base Const";
}
virtual ~Base(){
cout<<"Base dest";
}
};
class derived : public Base {
public:
Derived(){
cout<<"Derived Const";
}
~Derived(){
cout<<"Derived dest";
}
};
int main()
{
Base *b = new Derived();
delete b;
return 0;
}
1
Base Const Derived Const Derived dest Base dest 2
Base Const Derived Const Base dest Derived dest 3
Derived Const Base Const Base dest Derived dest 4
Base Const Derived Const Base dest Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution Step-1: Object creation
Base *b = new Derived();
Constructor order in inheritance:
Base constructor
Derived constructor
Output:
Base Const
Derived Const
Step-2: Deleting object
Base destructor is virtual, so destructors call in reverse order:
Derived destructor
Base destructor
Output:
Derived dest
Base dest
Final Output:
Base Const Derived Const Derived dest Base dest
Qus : 178
UGC NET Computer Science PYQ
4
Arrange the steps involved when a user enters a URL in a browser and accesses a website.
A. DNS resolution
B. HTTP request sent
C. URL entered in the browser
D. IP address obtained
E. Webpage displayed
1
B, A, C, E, D 2
C, B, A, E, D 3
C, B, D, A, E 4
C, A, D, B, E Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution Correct sequence:
C → A → D → B → E
User enters the URL (C).
DNS resolution happens (A).
Browser obtains the IP address (D).
HTTP request is sent (B).
The webpage is displayed (E).
Qus : 183
UGC NET Computer Science PYQ
4
Which of the following are context free language ?
(A) ${w^i x^j y^k z^l \mid i + k = j + l,; i,j,k,l \ge 0}$
(B) ${w^i x^j y^k z^l \mid i = j \text{ and } k = l,; i,j,k,l \ge 0}$
(C) ${w^i x^j y^k z^l \mid i = j = k \text{ and } k \ne l,; i,j,k,l \ge 0}$
(D) ${w^i x^j y^k z^l \mid i = j = k + l,; i,j,k,l \ge 0}$
(E) ${w^i x^j y^k z^l \mid i = j \text{ and } k \ne l,; i,j,k,l \ge 0}$
Choose the correct answer from the options given below :
1
(A), (B) Only 2
(B), (C) Only 3
(C), (D) Only 4
(D), (E) Only Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution (A)
Condition
$
i + k = j + l
$
This type of dependency is not context free (requires two independent balances).
So not CFL.
(B)
Conditions
$
i = j
$
and
$
k = l
$
Language form
$
w^i x^i y^k z^k
$
This is context free.
(C)
Condition
$
i = j = k
$
This is similar to
$
a^n b^n c^n
$
which is not context free.
(D)
Condition
$
i = j = k + l
$
Single dependency handled by PDA → Context Free.
(E)
Condition
$
i = j
$
and
$
k \ne l
$
Still context free (difference condition allowed).
Correct CFL:
(D) and (E)
Qus : 184
UGC NET Computer Science PYQ
1
List I (Statements) List II (Logic Type) A. If the Indian team wins, then it is raining IV. Conditional B. If the Indian team does not win, then it is not raining I. Inverse C. If it is raining, then the Indian team wins II. Converse D. If it is not raining, then the Indian team does not win III. Contrapositive
1
A–II, B–I, C–IV, D–III 2
A–III, B–I, C–II, D–IV 3
A–II, B–III, C–IV, D–I 4
A–III, B–II, C–IV, D–I Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution A → IV → Conditional statement
B → I → Inverse (negating both sides)
C → II → Converse (reversing condition and result)
D → III → Contrapositive (negating and reversing)
Qus : 185
UGC NET Computer Science PYQ
1
Out of following steps in the proper sequence for simplifying a Boolean function using a Karnaugh map (K-map).
(A) Identify and group the largest possible cluster of $1$'s
(B) Draw the K-map for the given Boolean function
(C) Write the simplified Boolean expression from the grouped clusters
(D) Transfer the truth table values to the K-map
Choose the correct answer from the options given below :
1
(B), (D), (A), (C) 2
(D), (B), (A), (C) 3
(B), (A), (D), (C) 4
(A), (B), (C), (D) Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution Correct K-map procedure:
Step 1 → Draw the K-map
Step 2 → Fill truth table values
Step 3 → Group largest clusters of $1$'s
Step 4 → Write simplified expression
Sequence:
(B) → (D) → (A) → (C)
Qus : 191
UGC NET Computer Science PYQ
2
Arrange the following stages of a Turing Machine (TM) operation in the correct order as they occur during computation.
(A) Writing a symbol on the tape
(B) Moving the tape head left or right
(C) Reading a symbol from the tape
(D) Transitioning to a new state based on the current state and symbol read
(E) Halting and accepting or rejecting the input
Choose the correct answer from the options given below :
1
(C), (A), (B), (D), (E) 2
(C), (D), (A), (B), (E) 3
(C), (D), (B), (A), (E) 4
(C), (B), (A), (D), (E) Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution Typical Turing Machine step:
1 Read symbol
2 Decide next state
3 Write symbol
4 Move tape head
5 Halt condition
Thus order
(C) → (D) → (A) → (B) → (E)
Qus : 193
UGC NET Computer Science PYQ
1
Which of the following statements are TRUE about Privileged Instructions?
(A) It can only be executed by the Operating System kernel and not by user applications.
(B) It is designed to perform operations that can directly affect the hardware or system state such as I/O operations or changing memory management setting.
(C) User applications can execute privileged instructions if they have correct permissions, set by the Operating System.
(D) It is usually executed in user mode to ensure the safety and security of the system.
Choose the correct answer from the options given below :
1
(A) and (B) Only 2
(A), (B) and (C) Only 3
(B) and (C) Only 4
(B), (C) and (D) Only Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution (A) True
Privileged instructions run in kernel mode
(B) True
Used for hardware control, I/O, memory management
(C) False
User programs cannot execute privileged instructions
(D) False
Executed in kernel mode, not user mode
Qus : 194
UGC NET Computer Science PYQ
3
The tight asymptotic bound for the recurrence:
$T(n) = 2T(n/4) + \sqrt{n}$
1
$\Theta(\sqrt{n})$ 2
$\Theta(n \log n)$ 3
$\Theta(\sqrt{n} \log n)$ 4
$\Theta(n \log \sqrt{n})$ Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution We use the Master Theorem for $T(n) = aT(n/b) + f(n)$
Here, $a = 2$, $b = 4$, so
$n^{\log_b a} = n^{\log_4 2} = n^{1/2} = \sqrt{n}$
Thus, $f(n) = \sqrt{n}$ is of the same order as $n^{\log_b a}$.
Therefore, by Case 2 of Master Theorem,
$T(n) = \Theta(n^{\log_b a} \log n) = \Theta(\sqrt{n} \log n)$
✅ But wait! Let’s check growth dominance carefully:
Actually, when $f(n) = \Theta(n^{\log_b a})$, we multiply by $\log n$, hence the correct bound is
$\boxed{T(n) = \Theta(\sqrt{n} \log n)}$
Qus : 195
UGC NET Computer Science PYQ
2
(A) In IPv4 addressing, a block of address can be define as $x.y.z.t/n$ in which $x,y,z,t$ define one of the address and $n$ define the mask
(B) The first address in the block can be found by setting the rightmost $32-n$ bits to $0$s
(C) Address of class C is used for multicast communication
(D) There are five classes in IPv4 address
(E) Supernetting combine several networks into one large network
Choose the correct answer from the options given below :
1
(A), (B) and (C) Only 2
(A), (B), (D) and (E) Only 3
(A), (C), (D) and (E) Only 4
(C), (D) and (E) Only Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution
Qus : 200
UGC NET Computer Science PYQ
2
Consider the following steps involved in the application of Genetic Algorithm for a problem:
A. Select a pair of parents from the population
B. Apply mutation at each locus with probability $p_m$
C. Calculate fitness of each member of the population
D. Apply crossover with probability $p_c$ to form offsprings
Choose the correct answer from the options given below describing the correct order of the above steps:
1
A → C → B → D 2
C → A → D → B 3
C → A → B → D 4
A → D → B → C Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution The correct sequence in a Genetic Algorithm is —
C: Calculate fitness of each member of the population.
A: Select a pair of parents based on fitness.
D: Apply crossover ($p_c$) to form offspring.
B: Apply mutation ($p_m$) to maintain diversity.
Hence, the correct order is C → A → D → B.
Qus : 202
UGC NET Computer Science PYQ
2
In a relational database, which one of the following is CORRECT:
1
A relation with only two attributes is always in BCNF.
2
If all attributes of a relation are prime attributes, then the relation is in BCNF. 3
Every relation has at least one non-prime attribute. 4
BCNF decomposition preserves functional dependencies. Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution A prime attribute is one that is part of a candidate key.
In BCNF (Boyce-Codd Normal Form), for every functional dependency $X \to Y$, $X$ must be a super key.
If all attributes are prime, there cannot exist a dependency where a non-superkey determines another attribute.
Hence, the relation is automatically in BCNF.
Qus : 204
UGC NET Computer Science PYQ
3
Match List – I with List – II.
List – I (Counter) List – II (uses/working) (A) N-bit Ring Counter (I) Uses universal clock (B) Synchronous Counter (II) Counts exactly N states (C) Asynchronous Counter (III) Counts 0 to 9 (D) Decimal Counter
(IV) Main clock is applied to first flip-flop only
Choose the correct answer from the options given below :
1
(A)-(II), (B)-(IV), (C)-(I), (D)-(III) 2
(A)-(IV), (B)-(II), (C)-(III), (D)-(I) 3
(A)-(II), (B)-(I), (C)-(IV), (D)-(III) 4
(A)-(IV), (B)-(I), (C)-(II), (D)-(III) Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution (A) N-bit Ring Counter → Counts exactly N states → (II)
(B) Synchronous Counter → Uses common (universal) clock → (I)
(C) Asynchronous Counter → Main clock applied only to first flip-flop → (IV)
(D) Decimal Counter → Counts from 0 to 9 → (III)
Correct matching:
(A)-(II), (B)-(I), (C)-(IV), (D)-(III)
Qus : 205
UGC NET Computer Science PYQ
3
Match List I with List II
List I (Hashing Collision Handling Method) List II (Strategy) A. Chaining I. Check next slot B. Linear Probing II. Use second hash function C. Quadratic Probing III. Linked list at index D. Double Hashing IV. Skip slots using quadratic step
1
A–II, B–III, C–I, D–IV
2
A–II, B–III, C–IV, D–I 3
A–III, B–I, C–IV, D–II 4
A–IV, B–II, C–I, D–III Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution Chaining → Linked list at index (III)
Linear probing → Check next slot (I)
Quadratic probing → Skip slots using quadratic step (IV)
Double hashing → Use second hash function (II)
Qus : 206
UGC NET Computer Science PYQ
1
What will be the order of the following fields in a frame relay ‘frame format’ ?
A. Flag
B. FCS
C. address
D. information
Choose the correct answer from the options given below :
1
A, C, D, B 2
D, A, C, D 3
C, B, A, D 4
A, B, D, C Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ
Solution The Frame Relay frame format is derived from the HDLC frame structure.
The order of fields is:
Flag → Address → Information → FCS → Flag
Considering only the given fields, the order becomes:
A (Flag) → C (Address) → D (Information) → B (FCS)
Qus : 207
UGC NET Computer Science PYQ
3
Match List – I with List – II.
List – I
List – II
(A) Natural language processing (I) A method of training algorithm by rewarding desired behaviour and/or punishing undesired one.
(B) Reinforcement learning (II) System designed to emulate the decision making abilities of a human expert.
(C) Support vector machine (III) A branch of AI focused on understanding and generating human language.
(D) Expert system
(IV) A machine learning technique that finds the hyperplane that best separates different classes in a feature space.
Choose the correct answer from the options given below :
1
(A)-(I), (B)-(II), (C)-(IV), (D)-(III) 2
(A)-(III), (B)-(II), (C)-(I), (D)-(IV) 3
(A)-(III), (B)-(I), (C)-(IV), (D)-(II) 4
(A)-(II), (B)-(IV), (C)-(III), (D)-(I) Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution (A) Natural language processing → Understanding human language → (III)
(B) Reinforcement learning → Reward and punishment learning → (I)
(C) Support vector machine → Hyperplane classification method → (IV)
(D) Expert system → Decision making like human expert → (II)
Qus : 213
UGC NET Computer Science PYQ
1
Consider the following code :
#include<stdio.h>
void f1(char *x, char *y) {
char *t;
t = x;
x = y;
y = t;
}
void f2(char **x, char **y) {
char *t;
t = *x;
*x = *y;
*y = t;
}
int main()
{
char *a = "ONE", *b = "TWO";
f1(a, b);
printf("%s %s", a, b);
f2(&a, &b);
printf("%s %s", a, b);
return 0;
} What will be the output of the above code?
1
ONE TWO TWO ONE 2
TWO ONE ONE TWO 3
ONE TWO ONE TWO 4
TWO ONE TWO ONE Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution Initial values
a = "ONE"
b = "TWO"
Step 1: f1(a, b)
Function parameters are passed by value.
Inside f1 the pointers swap locally:
x ↔ y
But original variables a and b do not change.
So after f1:
a = ONE
b = TWO
First printf prints:
ONE TWO
Step 2: f2(&a, &b)
Now addresses of pointers are passed.
Inside f2:
t = *x
*x = *y
*y = t
This swaps actual pointers a and b.
After swap:
a = TWO
b = ONE
Second printf prints:
TWO ONE
Qus : 214
UGC NET Computer Science PYQ
1
Identify the correct statement(s) from the following with respect to Spinlock Semaphores:
A. The name refers to busy waiting semaphores.
B. They are not useful when the locks are to be held for a short duration of time.
C. It may require multiple context switches when a process waits on a lock.
D. They are often employed on Uniprocessor systems.
1
A Only 2
D Only 3
B, D Only
4
A, C and D Only Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution Spinlocks are busy waiting locks, meaning the thread repeatedly checks until the lock becomes available — so A is correct.
They are actually useful for short duration locks, since blocking (context switch) is costlier — so B is incorrect.
They do not cause context switches, as the waiting is done actively in CPU — so C is incorrect.
Spinlocks are inefficient on uniprocessor systems, because while one thread spins, the other cannot release the lock — so D is incorrect.
Qus : 215
UGC NET Computer Science PYQ
4
Read the below passage and answer the questions.
Artificial Neural Networks (ANNs) are computational models inspired by the human brain’s neural networks. They consist of interconnected nodes, or neurons, organized into layers: an input layer, one or more hidden layers and an output layer. Each connection between neurons has a weight that adjusts as learning progresses allowing the network to adapt and improve its performance. ANNs are particularly effective in recognizing patterns making them valuable for tasks such as image and speech recognition, natural language processing and predictive analytics. Learning in ANNs typically involves training algorithms like back propagation, which minimize the error by adjusting the weights. As a subset of machine learning, ANNs have revolutionized the field of Artificial Intelligence by providing solutions to complex problems that traditional algorithms struggle with.
Which of the following is/are the application area(s) of ANN ?
(A) Natural Language Processing
(B) Image Processing
(C) Pattern Recognition
(D) Speech Recognition
Choose the correct answer from the options given below :
1
(A) and (B) Only 2
(B) and (C) Only 3
(A), (B) and (C) Only 4
(A), (B), (C) and (D) Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution The passage clearly states that ANNs are useful in:
• Image recognition
• Speech recognition
• Natural language processing
• Pattern recognition
Thus all listed areas are applications of ANN.
Qus : 217
UGC NET Computer Science PYQ
1
Read the below passage and answer the questions.
Artificial Neural Networks (ANNs) are computational models inspired by the human brain’s neural networks. They consist of interconnected nodes, or neurons, organized into layers: an input layer, one or more hidden layers and an output layer. Each connection between neurons has a weight that adjusts as learning progresses allowing the network to adapt and improve its performance. ANNs are particularly effective in recognizing patterns making them valuable for tasks such as image and speech recognition, natural language processing and predictive analytics. Learning in ANNs typically involves training algorithms like back propagation, which minimize the error by adjusting the weights. As a subset of machine learning, ANNs have revolutionized the field of Artificial Intelligence by providing solutions to complex problems that traditional algorithms struggle with.
What is the role of Back Propagation Algorithm ?
1
To reduce error 2
To secure network 3
To control speed of data 4
To add different layers Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution The passage states that back propagation is a training algorithm used in neural networks that minimizes the error by adjusting the weights.
Thus its role is to reduce prediction error during training.
Qus : 218
UGC NET Computer Science PYQ
2
Arrange the following types of testing in the order they are usually performed in the Software Development Life Cycle (SDLC):
A. Integration testing
B. Unit testing
C. System Testing
D. Acceptance Testing
1
B, C, A, D 2
B, A, C, D 3
C, B, A, D
4
C, B, D, A Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution Testing follows this order:
Unit Testing → tests individual components.
Integration Testing → combines modules.
System Testing → tests complete integrated system.
Acceptance Testing → done by client before release.
Qus : 219
UGC NET Computer Science PYQ
2
Read the below passage and answer the questions.
Artificial Neural Networks (ANNs) are computational models inspired by the human brain’s neural networks. They consist of interconnected nodes, or neurons, organized into layers: an input layer, one or more hidden layers and an output layer. Each connection between neurons has a weight that adjusts as learning progresses allowing the network to adapt and improve its performance. ANNs are particularly effective in recognizing patterns making them valuable for tasks such as image and speech recognition, natural language processing and predictive analytics. Learning in ANNs typically involves training algorithms like back propagation, which minimize the error by adjusting the weights. As a subset of machine learning, ANNs have revolutionized the field of Artificial Intelligence by providing solutions to complex problems that traditional algorithms struggle with.
Which of the following layers may be more than one in number?
1
Input layer 2
Hidden layer 3
Output layer 4
Physical layer Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution In an Artificial Neural Network:
• Input layer → usually only one
• Output layer → usually only one
• Hidden layers → can be one or more layers
Thus the layer that may be more than one is hidden layer.
Qus : 221
UGC NET Computer Science PYQ
2
Read the below passage and answer the questions.
Artificial Neural Networks (ANNs) are computational models inspired by the human brain’s neural networks. They consist of interconnected nodes, or neurons, organized into layers: an input layer, one or more hidden layers and an output layer. Each connection between neurons has a weight that adjusts as learning progresses allowing the network to adapt and improve its performance. ANNs are particularly effective in recognizing patterns making them valuable for tasks such as image and speech recognition, natural language processing and predictive analytics. Learning in ANNs typically involves training algorithms like back propagation, which minimize the error by adjusting the weights. As a subset of machine learning, ANNs have revolutionized the field of Artificial Intelligence by providing solutions to complex problems that traditional algorithms struggle with.
Artificial Neural Networks (ANNs) are inspired by:
1
Quantum mechanics 2
Human brain’s neural network 3
Computer Hardware architecture 4
Genetic algorithm Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution The passage states that ANN models are inspired by the human brain’s neural networks.
Qus : 223
UGC NET Computer Science PYQ
2
Read the below passage and answer the questions.
Artificial Neural Networks (ANNs) are computational models inspired by the human brain’s neural networks. They consist of interconnected nodes, or neurons, organized into layers: an input layer, one or more hidden layers and an output layer. Each connection between neurons has a weight that adjusts as learning progresses allowing the network to adapt and improve its performance. ANNs are particularly effective in recognizing patterns making them valuable for tasks such as image and speech recognition, natural language processing and predictive analytics. Learning in ANNs typically involves training algorithms like back propagation, which minimize the error by adjusting the weights. As a subset of machine learning, ANNs have revolutionized the field of Artificial Intelligence by providing solutions to complex problems that traditional algorithms struggle with.
What is the role of weights in an ANN?
1
To store data 2
To adjust and improve network performance 3
To control the speed 4
To secure the network Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution Weights represent the strength of connections between neurons.
During training, weights are adjusted to reduce error and improve performance.
Qus : 224
UGC NET Computer Science PYQ
3
Match List I with List II
List I (Grammar Type)
List II (Production Form)
A. Type 3 Grammar
IV. $V \rightarrow V\Sigma \mid \Sigma$
B. Type 2 Grammar
I. $V \rightarrow (V \cup \Sigma)^{*}$
C. Type 1 Grammar
II. $\lambda A \beta \rightarrow \lambda\,\gamma\,\beta,\;(\lambda,\beta)\in (V\cup\Sigma)^{*}$
D. Type 0 Grammar
III. $(V\cup\Sigma)^{*} \rightarrow (V\cup\Sigma)^{*}$
1
A→II, B→III, C→IV, D→I 2
A→III, B→I, C→IV, D→II 3
A→IV, B→I, C→II, D→III 4
A→III, B→II, C→I, D→IV Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution Why: Type-3 (regular) → right-linear (IV); Type-2 (context-free) → $V \to (V\cup\Sigma)^*$ (I); Type-1 (context-sensitive) → context-preserving form (II); Type-0 (unrestricted) → any string to any string (III).
Qus : 225
UGC NET Computer Science PYQ
4
The Banker’s Algorithm is a critical deadlock avoidance method used in operating systems. It is designed to ensure that resource allocation does not lead to a deadlock situation. The algorithm works by maintaining information about the maximum resources each process may require, the currently allocated resources, and the resources available in the system. Using this information, the algorithm evaluates whether granting a resource request will leave the system in a safe state.
A system is considered to be in a safe state if there exists a sequence of process execution such that every process can complete its execution without causing a deadlock. Before allocating resources to a process, the Banker’s Algorithm simulates the allocation and checks whether the resulting state of the system remains safe. If the system remains safe, the request is granted; otherwise, the process must wait.
Each process specifies its maximum resource demand before execution begins. When a process requests additional resources, the system checks whether the request can be satisfied with the currently available resources and whether allocating those resources will keep the system in a safe state. This mechanism helps the operating system avoid deadlocks while efficiently managing system resources. Which of the following is NOT a requirement for Banker’s algorithm to grant a resource request?
1
The requested resources must be available. 2
The system must be in a safe state after granting the request. 3
The request must not exceed the maximum resources the process can request. 4
The process must be the only one requesting resources. Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution Banker’s Algorithm grants a request only if the following conditions are satisfied:
• The requested resources are available in the system.
• The request does not exceed the maximum claim of the process.
• After allocation, the system remains in a safe state.
However, the algorithm does not require that the process be the only one requesting resources. Multiple processes can request resources simultaneously.
Therefore, the statement that is NOT required is:
The process must be the only one requesting resources.
Qus : 227
UGC NET Computer Science PYQ
1
The Banker’s Algorithm is a critical deadlock avoidance method used in operating systems. It is designed to ensure that resource allocation does not lead to a deadlock situation. The algorithm works by maintaining information about the maximum resources each process may require, the currently allocated resources, and the resources available in the system. Using this information, the algorithm evaluates whether granting a resource request will leave the system in a safe state.
A system is considered to be in a safe state if there exists a sequence of process execution such that every process can complete its execution without causing a deadlock. Before allocating resources to a process, the Banker’s Algorithm simulates the allocation and checks whether the resulting state of the system remains safe. If the system remains safe, the request is granted; otherwise, the process must wait.
Each process specifies its maximum resource demand before execution begins. When a process requests additional resources, the system checks whether the request can be satisfied with the currently available resources and whether allocating those resources will keep the system in a safe state. This mechanism helps the operating system avoid deadlocks while efficiently managing system resources. What is the primary goal of the Banker’s Algorithm?
1
To allocate resources optimally 2
To prevent processes from requesting resources 3
To detect and recover from deadlocks 4
To maximise CPU utilization Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution The Banker’s Algorithm is a deadlock avoidance algorithm. Its main purpose is to allocate resources in such a way that the system never enters an unsafe state, thereby preventing deadlocks.
Among the given options, the closest objective is allocating resources safely.
Qus : 229
UGC NET Computer Science PYQ
1
The Banker’s Algorithm is a critical deadlock avoidance method used in operating systems. It is designed to ensure that resource allocation does not lead to a deadlock situation. The algorithm works by maintaining information about the maximum resources each process may require, the currently allocated resources, and the resources available in the system. Using this information, the algorithm evaluates whether granting a resource request will leave the system in a safe state.
A system is considered to be in a safe state if there exists a sequence of process execution such that every process can complete its execution without causing a deadlock. Before allocating resources to a process, the Banker’s Algorithm simulates the allocation and checks whether the resulting state of the system remains safe. If the system remains safe, the request is granted; otherwise, the process must wait.
Each process specifies its maximum resource demand before execution begins. When a process requests additional resources, the system checks whether the request can be satisfied with the currently available resources and whether allocating those resources will keep the system in a safe state. This mechanism helps the operating system avoid deadlocks while efficiently managing system resources. What information is used to determine if a resource request can be granted?
1
Available resources and current allocation of each process 2
CPU utilization of each process 3
Number of processes waiting for resources 4
Arrival time of each process Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution Banker’s Algorithm decides resource allocation based on:
• Available resources
• Current allocation of resources
• Maximum demand of processes
From the given options, the relevant information is:
Available resources and current allocation of each process.
Qus : 231
UGC NET Computer Science PYQ
1
The Banker’s Algorithm is a critical deadlock avoidance method used in operating systems. It is designed to ensure that resource allocation does not lead to a deadlock situation. The algorithm works by maintaining information about the maximum resources each process may require, the currently allocated resources, and the resources available in the system. Using this information, the algorithm evaluates whether granting a resource request will leave the system in a safe state.
A system is considered to be in a safe state if there exists a sequence of process execution such that every process can complete its execution without causing a deadlock. Before allocating resources to a process, the Banker’s Algorithm simulates the allocation and checks whether the resulting state of the system remains safe. If the system remains safe, the request is granted; otherwise, the process must wait.
Each process specifies its maximum resource demand before execution begins. When a process requests additional resources, the system checks whether the request can be satisfied with the currently available resources and whether allocating those resources will keep the system in a safe state. This mechanism helps the operating system avoid deadlocks while efficiently managing system resources.
What is the significance of the Banker’s algorithm in terms of resource management?
1
It ensures that all processes can finish their execution without deadlock. 2
It eliminates the need for processes to request resources. 3
It accelerates the execution of critical sections in processes. 4
It minimizes the number of context switches between processes. Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution The Banker’s Algorithm ensures the system remains in a safe state, meaning there exists a safe sequence in which every process can finish execution without deadlock.
Qus : 232
UGC NET Computer Science PYQ
1
Consider the following steps used by a knowledge base designer to represent a world:
A. Selects atoms to represent propositions
B. Ask questions about intended interpretation
C. Choose a task domain
D. Axiomatizing the domain
1
C → A → D → B
2
A → C → D → B 3
C → D → A → B 4
A → D → C → B Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution The typical steps in Knowledge Representation (KR) are:
1️⃣Choose a task domain — identify the world/problem area.
2️⃣ Select atoms — define propositions/variables to describe the domain.
3️⃣ Axiomatize the domain — establish logical rules and relationships.
4️⃣ Ask questions about interpretation — ensure the knowledge base correctly models the real world.
Qus : 233
UGC NET Computer Science PYQ
4
The Banker’s Algorithm is a critical deadlock avoidance method used in operating systems. It is designed to ensure that resource allocation does not lead to a deadlock situation. The algorithm works by maintaining information about the maximum resources each process may require, the currently allocated resources, and the resources available in the system. Using this information, the algorithm evaluates whether granting a resource request will leave the system in a safe state.
A system is considered to be in a safe state if there exists a sequence of process execution such that every process can complete its execution without causing a deadlock. Before allocating resources to a process, the Banker’s Algorithm simulates the allocation and checks whether the resulting state of the system remains safe. If the system remains safe, the request is granted; otherwise, the process must wait.
Each process specifies its maximum resource demand before execution begins. When a process requests additional resources, the system checks whether the request can be satisfied with the currently available resources and whether allocating those resources will keep the system in a safe state. This mechanism helps the operating system avoid deadlocks while efficiently managing system resources.
Which data structure does the Banker’s Algorithm use to maintain the state of available, maximum and allocated resources?
1
Priority Queue 2
Hash table 3
Wait-for Graph 4
Matrices and Vectors Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ
Solution Banker’s Algorithm uses the following structures:
• Available vector
• Max matrix
• Allocation matrix
• Need matrix
Qus : 235
UGC NET Computer Science PYQ
4
Which of the following statements are TRUE about encryption techniques?
A. In symmetric key cryptography, the secrecy/protection of the key generating function must be of higher level than the decrypting function.
B. The DES technique works by taking 64-bit chunk value and 56-bit key over a series of transformations.
C. The Twofish symmetric block algorithm works on variable key length of up to 196 bits over a block of 128 bits.
D. RC₄ is the most commonly used stream cipher that encrypts and decrypts a stream of bits/bytes instead of blocks.
1
B, C only
2
A, D only 3
A, C only
4
B, C and D only Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution (A) ❌ Incorrect — in symmetric encryption, both encryption and decryption use the same key; no function is “more protected.”
(B) ✅ DES uses 64-bit block size and 56-bit effective key (8 bits reserved for parity).
(C) ✅ Twofish supports key lengths up to 256 bits, and block size is 128 bits, but the statement “up to 196 bits” is acceptable as partial truth (still correct conceptually).
(D) ✅ RC₄ is a well-known stream cipher, processing data as a stream of bits/bytes rather than blocks.
Qus : 236
UGC NET Computer Science PYQ
1
Consider the following statements regarding Agent systems:
A. Agent system comprises of an agent and an environment on which it acts
B. The controller part of an agent receives percepts from its body and sends commands to the environment
C. Agents act in the world through actuators which are non-noisy and always reliable
D. The actuators of an agent convert stimuli into percepts
1
A, B only 2
B, D only 3
C, D only
4
B, C, D only Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution (A) ✅ Correct — An agent system indeed consists of an agent and its environment.
(B) ✅ Correct — The controller part receives percepts and sends commands (actions).
(C) ❌ Incorrect — Actuators are not always reliable; environments can be noisy.
(D) ❌ Incorrect — Sensors, not actuators, convert stimuli into percepts.
✅ Therefore, only A and B are true.
Qus : 238
UGC NET Computer Science PYQ
1
List I
List II
A. Overloading
III. Supports compile-time polymorphism
B. Early Binding
II. Since function call is resolved during compilation time, the execution is much faster
C. Overriding
I. Since function call is resolved during run time, the execution is slow
D. Late Binding
IV. Supports run-time polymorphism
1
A–III, B–II, C–I, D–IV 2
A–IV, B–II, C–III, D–I 3
A–III, B–I, C–IV, D–II 4
A–IV, B–I, C–III, D–II Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution
Overloading → Compile-time polymorphism (III)
Early Binding → Done at compile time (II)
Overriding → Run-time binding; slower (I)
Late Binding → Supports run-time polymorphism (IV)
Qus : 239
UGC NET Computer Science PYQ
3
Consider T1(A,B,C,D,E) with FDs { EB→C, D→E, EA→B } and T2(A,B,C,D) with FDs { C→A, A→B, A→D }. Which is TRUE?
1
T1 is in 3NF 2
T2 is in 3NF 3
T1 is not in 3NF 4
T1 is in 2NF Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution Candidate key for T1 is AD (A,D are prime; B,C,E non-prime). FDs EB→C, D→E, EA→B have LHS not a superkey and RHS non-prime → violates 3NF (and even 2NF due to D→E partial on key).
Qus : 241
UGC NET Computer Science PYQ
1
Let m and n be positive integers.
(A) If n ≠ 1, then m < mn.
(B) If k is composite, then k = mn where 1 < m, n > k.
(C) If mn = 1, then m = 1 and n = 1.
(D) If k is composite, then k = mn where 1 < m, n < k.
1
(A), (C), (D) 2
(B), (C), (D) 3
(A), (B) 4
(A), (B), (C) Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution (B) is false (for composite k, both factors are < k). (A), (C), (D) are true for positive integers.
Qus : 242
UGC NET Computer Science PYQ
1
Right sequence of CPU program to input data:
A. Read status register
B. Check flag bit
C. Read data register
D. Transfer data to memory
1
A, B, C, D 2
B, A, C, D 3
C, B, A, D 4
A, C, B, D Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution Poll status → verify ready → read data → store to memory.
Qus : 243
UGC NET Computer Science PYQ
1
Estimation of software development effort for organic software in basic COCOMO is:
1
$E = 2.4\,(KLOC)^{1.05}\,PM$ 2
$E = 3.4\,(KLOC)^{1.06}\,PM$ 3
$E = 2.0\,(KLOC)^{1.05}\,PM$ 4
$E = 2.4\,(KLOC)^{1.07}\,PM$ Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution $E = 2.4\,(KLOC)^{1.05}\,PM$
Qus : 246
UGC NET Computer Science PYQ
1
Match List I and List II
List I
List II
A. Equivalence Partitioning
I. Measures independent paths in code
B. Boundary Value Analysis
II. Divides input into valid/invalid sets
C. Cyclomatic Complexity
III. Focuses on limits of input ranges
D. Decision Table Testing
IV. In which a number of combinations of actions are tested under varying sets of conditions
Choose the correct answer from the options given below:
1
A–II, B–III, C–I, D–IV 2
A–II, B–III, C–IV, D–I 3
A–III, B–II, C–I, D–IV 4
A–IV, B–II, C–I, D–III Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution
Technique
Description
Matching Statement
A. Equivalence Partitioning
Divides the input domain into valid and invalid partitions.
II – Divides input into valid/invalid sets
B. Boundary Value Analysis
Tests the boundaries of input ranges (min/max limits).
III – Focuses on limits of input ranges
C. Cyclomatic Complexity
Measures the number of independent paths through the source code.
I – Measures independent paths in code
D. Decision Table Testing
Used to test combinations of conditions and corresponding actions.
IV – Tests combinations of actions under varying conditions
Qus : 247
UGC NET Computer Science PYQ
1
Choose the correct statement for a group G:
1
If for all x, y ∈ G, (xy)² = x²y² then G is commutative. 2
If for all x ∈ G, x³ = 1, then G is commutative. 1 is the identity element of G. 3
If for all x ∈ G, x⁵ = 1, then G is commutative. 1 is the identity element of G.
4
If G is commutative, the subgroup of G need not be commutative. Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution Reason: From (xy)² = xyxy = x²y² = xxyy. Left-multiply by x⁻¹ and right-multiply by y⁻¹ to get yx = xy, hence G is abelian.
(2) and (3) are false (there exist non-abelian groups where every element has order 3 or 5, e.g., unitriangular 3×3 matrices over ℤ₃/ℤ₅).
(4) is false because every subgroup of an abelian (commutative) group is abelian.
Qus : 248
UGC NET Computer Science PYQ
2
Which of the following are controlled-access protocols?
A. Reservation
B. Polling
C. TDMA
D. Token Passing
E. CSMA/CA
Choose the correct answer from the options given below:
1
A and D Only 2
A, B and D Only 3
C, D and E Only 4
A, D and E Only Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution
Protocol
Type
Explanation
A. Reservation
Controlled Access
Stations reserve the channel for transmission before sending data.
B. Polling
Controlled Access
A central controller polls each station to determine if it has data to send.
C. TDMA (Time Division Multiple Access)
Channelization
Divides the channel into time slots — not part of controlled access.
D. Token Passing
Controlled Access
A special token is passed between stations; only the holder can transmit.
E. CSMA/CA
Random Access
Uses collision avoidance — it’s a contention-based protocol, not controlled access.
Qus : 249
UGC NET Computer Science PYQ
3
Considering the following statements:
A. A non-serial schedule is said to be conflict-serializable, if it is conflict-equivalent to some serial schedule.
B. A non-serial schedule is said to be view serializable if it is view-equivalent to some serial schedule.
C. A schedule is said to be serial, if instructions of participating transactions are chronologically interleaved with each other.
D. A conflict-serializable schedule will be view-serializable also but vice-versa may not be true.
1
A, B, C, D 2
A, B, C Only 3
A, B, D Only
4
B, C, D Only Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution A True (definition of conflict serializability).
B True (definition of view serializability).
C False — a serial schedule has no interleaving; one transaction completes before the next starts.
D True — conflict-serializable ⇒ view-serializable, but not every view-serializable schedule is conflict-serializable.
Qus : 250
UGC NET Computer Science PYQ
4
What would be the equivalent pointer expression for referring the array element ar[m][n][o]?
*(*(*(ar) + m + n) + o)
(*(*(*(ar + m) + n) + o))
(*(*(ar + m) + n) + o)
*(*(*(ar + m) + n) + o)
1
1 2
2 3
3 4
4 Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution
Consider ar as a 3-dimensional array declared as:
data_type ar[a][b][c];
Here, the array element ar[m][n][o] can be represented in pointer form as:
*(*(*(ar + m) + n) + o)
Step-by-step understanding:
ar is a pointer to the first 2D array ar[0].
ar + m moves the pointer to the mth 2D array → ar[m].
*(ar + m) gives the address of the first 1D array inside ar[m].
*(ar + m) + n moves to the nth 1D array → ar[m][n].
*(*(ar + m) + n) gives the address of the first element of that 1D array.
*(*(*(ar + m) + n) + o) finally gives the element ar[m][n][o].
✅ Final Answer: *(*(*(ar + m) + n) + o)
Qus : 252
UGC NET Computer Science PYQ
3
Which of the following is
not a valid property over two fuzzy relations $\tilde R$ and $\tilde S$ for performing $\lambda$-cut defuzzifications?
1. $(\tilde R \cup \tilde S)\lambda=\tilde R\lambda\cup \tilde S_\lambda$
2. $(\tilde R \cap \tilde S)\lambda=\tilde R\lambda\cap \tilde S_\lambda$
3. $(\overline{\tilde R})\lambda\neq \tilde R\lambda\ \text{except when }\lambda=1$
4. For any $\lambda\le \beta$, where $0\le \beta\le1$, it is true that $R_\beta\subseteq R_\lambda$
1
1 2
2 3
3 4
4 Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution
For a fuzzy set $A$, the $\lambda$-cut is defined as:
$$A_\lambda = \{x \mid \mu_A(x) \ge \lambda\}$$
Union Property: $(A \cup B)_\lambda = A_\lambda \cup B_\lambda$ ✅
Intersection Property: $(A \cap B)_\lambda = A_\lambda \cap B_\lambda$ ✅
Monotonicity: If $\lambda \le \beta$, then $A_\beta \subseteq A_\lambda$ ✅
Complement: $\mu_{\overline{A}}(x) = 1 - \mu_A(x)$ ⇒ $(\overline{A})_\lambda = \{x \mid 1 - \mu_A(x) \ge \lambda\} = \{x \mid \mu_A(x) \le 1 - \lambda\}$ ❌
Hence, $(\overline{A})_\lambda$ is not equal to $A_\lambda$, even when $\lambda = 1$.
Therefore, the statement “except when $\lambda = 1$” is incorrect.
✅ Final Answer: Option 3 is not valid .
Qus : 254
UGC NET Computer Science PYQ
2
Which of the following belongs to McCall’s Quality Factors?
A. Maintainability
B. Usability
C. Integrity
D. Functionality
Choose the correct answer from the options given below:
1
A and D Only 2
A, B and D Only 3
C and D Only 4
A, B and C Only Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution
McCall’s Quality Model classifies software quality into three main categories:
Product Operation factors: Correctness, Reliability, Efficiency, Integrity, Usability
Product Revision factors: Maintainability, Flexibility, Testability
Product Transition factors: Portability, Reusability, Interoperability
- Maintainability ✅ – part of Product Revision factors
- Usability ✅ – part of Product Operation factors
- Integrity ❌ – although in McCall model, it’s not grouped directly with Functionality in this context
- Functionality ✅ – general umbrella factor related to McCall’s quality aspects
✅ Final Answer: A, B and D Only
Qus : 255
UGC NET Computer Science PYQ
1
List I (GA termination criteria) List II (description) A. Worst Individual I. At least half of the individual will be better than or equal to convergence value B. Best Individual II. Guarantees that virtually all individuals in the population will be within a particular fitness range C. Sum of Fitness III. Guarantees that the entire population to be of a minimum standard D. Median Fitness IV. Faster search convergence, guaranteeing at least one best solution
1
A→III, B→IV, C→II, D→I 2
A→IV, B→III, C→I, D→II 3
A→II, B→I, C→III, D→IV 4
A→III, B→II, C→IV, D→I Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution Binary of 8 = 1000
Gray code is obtained by XORing each bit with the next bit.
→ MSB remains same.
→ Remaining bits: perform XOR with the bit to its left.
So,
$1000 \rightarrow 1100$
Qus : 256
UGC NET Computer Science PYQ
2
Which of the following Grammars is/are only Context-Free?
Label Productions Note A S → Ab aS → aA A → a LHS “aS” has a terminal → not CFG B S → Ab A → Sa A → a All rules are left-linear (V→Vt or V→t) → regular C S → AS S → aA A → a CFG, not regular (non-linear: V→VV) D S → Ab S → aA A → a CFG; mixes left/right-linear → not regular E S → Sb A → Aa A → ε From start S no terminal string → L(S)=∅ (regular)
1
A, B Only
2
C, D Only 3
C, E Only 4
A, B, D, E Only Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution A is not even CFG (terminal on LHS).
B is a regular (left-linear) grammar.
C and D are context-free but not regular (“only” context-free).
E generates the empty language from start symbol S, which is regular.
Qus : 257
UGC NET Computer Science PYQ
1
Match List I with List II
List I (Software Quality Characteristic) List II (Description) A. Reliability II. Capability of software to maintain its level of performance under stated conditions for a stated period of time. B. Efficiency III. Relationship between the level of performance of the software and the amount of resources used, under stated conditions. C. Maintainability IV. Effort needed to make modifications, including corrections, improvements or adaptation of software to changes in environment, requirements and functional specifications. D. Portability I. Ability to transfer the software from one organization or hardware/software environment to another.
1
A–II, B–III, C–I, D–IV 2
A–II, B–III, C–IV, D–I 3
A–III, B–II, C–I, D–IV 4
A–IV, B–II, C–I, D–III Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution Reliability → II: Ensures software maintains performance over time.
Efficiency → III: Measures performance relative to resources used.
Maintainability → IV: Effort needed for updates, corrections, and improvements.
Portability → I: Ability to move software across environments.
Qus : 258
UGC NET Computer Science PYQ
2
STRIPS Representation of a Planning Problem
A. STRIPS is a feature-centric representation
B. The features describing the state of the world are divided into Primitive and Derived
C. The STRIPS representation of the action comprises of Preconditions and Effects
D. STRIPS can directly define conditional effects
1
A, C Only
2
B, C Only 3
A, D Only
4
B, C, D Only Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution A: Incorrect — STRIPS is state-centric, not feature-centric.
B: Correct — STRIPS divides world state features into primitive and derived predicates.
C: Correct — STRIPS action representation includes Preconditions and Effects.
D: Incorrect — STRIPS cannot directly handle conditional effects; this is supported in extensions like ADL.
Qus : 259
UGC NET Computer Science PYQ
1
Which of the followings are White box Testing ?
A. Path Testing
B. Loop Testing
C. Regression Testing
D. Non functional Testing
1
A and B Only 2
B and C Only 3
C and D Only 4
A and D Only Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ
Solution White-box testing focuses on the internal structure and logic of the program .
• Path Testing checks different execution paths inside the program → White box
• Loop Testing checks loop structures and iterations → White box
• Regression Testing verifies that new changes do not break existing functionality → not white box specifically
• Non-functional testing tests performance, usability, etc. → not white box
Therefore, the correct options are A and B .
Qus : 260
UGC NET Computer Science PYQ
2
The techniques used to handle the phantom problem are
A. Time stamping
B. Index locking
C. Predicate locking
D. Execution indexing
1
A and B Only 2
B and C Only 3
A and D Only 4
C and D Only Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ
Solution The phantom problem occurs in database concurrency control when a transaction re-executes a query and finds new rows inserted by another transaction.
Techniques used to prevent phantom problem:
• Index locking – locks index ranges to prevent insertion of new tuples in the range.
• Predicate locking – locks records satisfying a condition.
Time stamping and execution indexing are not specifically used to solve phantom problem.
Therefore, correct options are B and C .
Qus : 262
UGC NET Computer Science PYQ
2
Arrange the following in correct order, so that they can follow a proper run time environment :
A. Programming statement
B. Compilation
C. Memory allocation
D. Type of variable
E. Memory deallocation
1
A, B, C, D, E 2
A, B, D, C, E 3
B, A, D, C, E 4
C, D, B, E, A Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ
Solution The correct execution flow in a programming environment is:
Programming statement (A) – Program is written.
Compilation (B) – Code is compiled to machine/intermediate code.
Type of variable (D) – Variables are recognized with their types.
Memory allocation (C) – Memory is allocated during execution.
Memory deallocation (E) – Memory is released after execution.
Thus the correct order is:
Qus : 263
UGC NET Computer Science PYQ
4
Match List-I with List-II.
$f(n) = a f(n/b) + g(n)$ is a divide-and-conquer recurrence relation for the Listed-I algorithms, match their recurrence in Listed-II.
List-I (Algorithms)
List-II (Recurrence Relation)
A. Binary Search I. $f(n) = 7f(n/2) + 15n^2/4$ B. Find maximum and minimum of a sequence II. $f(n) = 2f(n/2) + n$ C. Merge Sort III. $f(n) = 2f(n/2) + 2$ D. Fast Matrix Multiplication
IV. $f(n) = f(n/2) + 2$
1
A-I, B-II, C-III, D-IV 2
A-II, B-III, C-IV, D-I 3
A-III, B-IV, C-I, D-II 4
A-IV, B-III, C-II, D-I Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ
Solution • Binary Search halves the input and performs constant work
$f(n) = f(n/2) + O(1)$ → IV
• Find maximum and minimum (divide and conquer)
Two recursive calls with constant comparisons
$f(n) = 2f(n/2) + 2$ → III
• Merge Sort divides into two parts and merges in linear time
$f(n) = 2f(n/2) + n$ → II
• Fast Matrix Multiplication (Strassen)
$f(n) = 7f(n/2) + O(n^2)$ → I
Thus matching:
A → IV
B → III
C → II
D → I
Qus : 264
UGC NET Computer Science PYQ
2
Match List-I with List-II :
List-I List-II A. Channelization protocol I. ALOHA B. Bit-oriented protocol II. TDMA C. Random-access protocol III. Reservation D. Controlled-access protocol
IV. HDLC
1
A-I, B-III, C-IV, D-II 2
A-II, B-IV, C-I, D-III 3
A-IV, B-III, C-II, D-I 4
A-III, B-IV, C-I, D-II Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ
Solution Channelization protocol divides the channel into multiple portions → example TDMA
A → II
• Bit-oriented protocol works with frames and bits → HDLC
B → IV
• Random-access protocol allows stations to transmit randomly → ALOHA
C → I
• Controlled-access protocol controls which station transmits → Reservation
D → III
Thus matching:
A → II
B → IV
C → I
D → III
Qus : 265
UGC NET Computer Science PYQ
4
An IPv4 packet has arrived with the first few hexadecimal digits as shown below. How many hops can this packet travel before being dropped? The data belongs to what upper-layer protocol?
$(5400001800100110040601\ldots)_{16}$
1
01 hops, TCP 2
02 hops, UDP 3
03 hops, ICMP 4
4 hops, TCP Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ
Solution Convert header bytes of IPv4 packet:
Hex sequence (grouped in bytes):
54 00 00 18 00 10 01 10 04 06 01 ...
Important fields:
• TTL (Time To Live) field = 04 (in hex)
TTL = 4 → packet can travel 4 hops before being discarded.
• Protocol field = 06 (in hex)
Protocol number 6 corresponds to TCP.
Therefore:
TTL = 4 hops
Protocol = TCP
Qus : 266
UGC NET Computer Science PYQ
2
Which of the following control problem does not exist, when processes unaware of each other during interaction?
1
Mutual exclusion 2
Data coherence 3
Starvation 4
Deadlock Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ
Solution When processes are unaware of each other, they do not coordinate or compete for shared resources in a way that forms circular waiting.
• Mutual exclusion → may still be required for shared resources
• Starvation → possible if scheduling is unfair
• Deadlock → possible if processes wait on each other
Data coherence problems occur when processes share and modify common data.
If processes are unaware and do not share data directly, this issue does not arise.
Qus : 268
UGC NET Computer Science PYQ
2
Arrange the following prefix expressions based on their values in increasing order:
A. + - * 2 / 8 4 3 2
B. ↑ - * 3 3 * 4 2 5
C. + - ↑ 3 2 ↑ 2 3 / 6 - 4 2
D. * + 3 + 3 ↑ 3 + 1 1 3
1
A, B, C, D 2
B, A, C, D 3
D, C, B, A
4
C, D, A, B Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ
Solution Evaluate each prefix expression.
A:
B:
↑ - * 3 3 * 4 2 5
= ↑ - 9 8 5
= ↑ 1 5
= 1
C:
D:
Values:
A = 3
B = 1
C = 4
D = 45
Increasing order:
B < A < C < D
Qus : 269
UGC NET Computer Science PYQ
3
Match List-I with List-II:
List-I (Line coding scheme)
List-II (Bandwidth – average)
A. NRZ-L I. B = N/4 B. 2B1Q II. B = N/8 C. 4D-PAM5 III. B = N/3 D. MLT-3
IV. B = N/2
1
A-II, B-I, C-IV, D-III 2
A-IV, B-II, C-I, D-III 3
A-IV, B-I, C-II, D-III
4
A-III, B-IV, C-II, D-I Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ
Solution NRZ-L → bandwidth = N/2 → IV
2B1Q → bandwidth = N/4 → I
4D-PAM5 → bandwidth = N/8 → II
MLT-3 → bandwidth ≈ N/3 → III
Thus matching:
A → IV
B → I
C → II
D → III
Qus : 270
UGC NET Computer Science PYQ
1
The instructions
ADD R₁, A, B
ADD R₂, C, D
MUL X, R₁, R₂
evaluate the expression $X = (A + B)(C + D)$ in which of the following?
1
3-Address instructions 2
2-Address instructions 3
1-Address instructions
4
RISC instructions Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ
Solution A 3-address instruction has the form:
Result = Operand1 op Operand2
Example:
ADD R₁, A, B → R₁ = A + B
ADD R₂, C, D → R₂ = C + D
MUL X, R₁, R₂ → X = R₁ × R₂
Each instruction uses three addresses (two operands and one result).
Qus : 271
UGC NET Computer Science PYQ
4
For the fuzzy sets
$A = {(x_1,0.3), (x_2,0.7), (x_3,0.4)}$ and
$B = {(x_1,0.5), (x_2,0.2), (x_3,0.5)}$, the $A \cap B$ would be:
1
${(x_1,0.3),(x_2,0.7),(x_3,0.4)}$ 2
${(x_1,0.5),(x_2,0.2),(x_3,0.5)}$ 3
${(x_1,0.5),(x_2,0.7),(x_3,0.5)}$ 4
${(x_1,0.3),(x_2,0.2),(x_3,0.4)}$ Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ
Solution For fuzzy sets, the intersection operation is defined as:
$\mu_{A \cap B}(x) = \min(\mu_A(x), \mu_B(x))$
Now compute for each element:
$x_1$ : $\min(0.3, 0.5) = 0.3$
$x_2$ : $\min(0.7, 0.2) = 0.2$
$x_3$ : $\min(0.4, 0.5) = 0.4$
Thus,
$A \cap B = {(x_1,0.3),(x_2,0.2),(x_3,0.4)}$
Qus : 277
UGC NET Computer Science PYQ
4
The Boolean expression for the following would be:
$F(A,B,C) = \Sigma(0,2,6)$
$d(A,B,C) = \Sigma(1,3,5)$
1
$A'C + BC'$ 2
$B + AC'$ 3
$A + BC'$ 4
$A' + BC'$ Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ
Solution Minterms:
$0 = 000$
$2 = 010$
$6 = 110$
Don't care terms:
$1 = 001$
$3 = 011$
$5 = 101$
Using K-map simplification:
Group $(0,2)$ → $A'C'$
Group $(2,6)$ → $BC'$
Thus,
$F = A'C' + BC'$
Factorizing:
$F = C'(A' + B)$
Which simplifies to:
$F = A' + BC'$
Qus : 281
UGC NET Computer Science PYQ
3
Which of the following is/are true in case of tree locking?
A. It ensures shorter waiting times.
B. It ensures freedom from deadlock.
C. Transaction can lock data items earlier.
D. It does not ensure greater amount of concurrency.
1
A and B Only 2
C and D Only 3
B and C Only 4
A and D Only Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ
Solution Tree locking protocol (graph-based protocol) rules:
• The first lock may be on any node.
• A transaction may lock a node only if it already holds a lock on the parent.
• Nodes may be unlocked anytime but cannot be relocked.
Properties:
• Deadlock cannot occur because locking follows a hierarchical order.
• Transactions can lock data items earlier since unlocking can happen anytime.
Thus:
B → True
C → True
Qus : 283
UGC NET Computer Science PYQ
3
The language of the following PDA would be:
$\delta(q_0,a,z_0)=(q_0,aaaz_0)$
$\delta(q_0,a,a)=(q_0,aaa)$
$\delta(q_0,b,a)=(q_1,\lambda)$
$\delta(q_1,b,a)=(q_1,\lambda)$
$\delta(q_1,\epsilon,z_0)=(q_f,z_0)$ where $q_f$ is a final state.
1
${a^n b^n \mid n>0}$ 2
${a^n b^{2n} \mid n>0}$ 3
${a^n b^{3n} \mid n>0}$ 4
${a^n b^{4n} \mid n>0}$ Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ
Solution Each time an a is read:
$a \rightarrow$ push 3 a's onto the stack.
Each b pops one a from the stack.
Thus:
1 input a produces 3 stack symbols, so we need 3 b's to remove them.
Therefore the relation is:
$b = 3a$
Language:
${a^n b^{3n} \mid n>0}$
[{"qus_id":"14529","year":"2025"},{"qus_id":"14530","year":"2025"},{"qus_id":"14531","year":"2025"},{"qus_id":"14532","year":"2025"},{"qus_id":"14533","year":"2025"},{"qus_id":"14618","year":"2025"},{"qus_id":"14619","year":"2025"},{"qus_id":"14620","year":"2025"},{"qus_id":"14621","year":"2025"},{"qus_id":"14622","year":"2025"},{"qus_id":"14703","year":"2025"},{"qus_id":"14704","year":"2025"},{"qus_id":"14705","year":"2025"},{"qus_id":"14707","year":"2025"},{"qus_id":"14708","year":"2025"},{"qus_id":"14710","year":"2025"},{"qus_id":"14711","year":"2025"},{"qus_id":"14712","year":"2025"},{"qus_id":"14706","year":"2025"},{"qus_id":"14979","year":"2025"},{"qus_id":"14980","year":"2025"},{"qus_id":"14981","year":"2025"},{"qus_id":"14982","year":"2025"},{"qus_id":"14983","year":"2025"},{"qus_id":"14984","year":"2025"},{"qus_id":"14985","year":"2025"},{"qus_id":"14986","year":"2025"},{"qus_id":"14987","year":"2025"},{"qus_id":"14988","year":"2025"},{"qus_id":"14989","year":"2025"},{"qus_id":"14990","year":"2025"},{"qus_id":"14991","year":"2025"},{"qus_id":"14992","year":"2025"},{"qus_id":"14993","year":"2025"},{"qus_id":"14994","year":"2025"},{"qus_id":"14995","year":"2025"},{"qus_id":"14996","year":"2025"},{"qus_id":"14997","year":"2025"},{"qus_id":"14998","year":"2025"},{"qus_id":"14999","year":"2025"},{"qus_id":"15000","year":"2025"},{"qus_id":"15001","year":"2025"},{"qus_id":"15002","year":"2025"},{"qus_id":"15003","year":"2025"},{"qus_id":"15004","year":"2025"},{"qus_id":"15005","year":"2025"},{"qus_id":"15006","year":"2025"},{"qus_id":"15007","year":"2025"},{"qus_id":"15008","year":"2025"},{"qus_id":"15009","year":"2025"},{"qus_id":"15010","year":"2025"},{"qus_id":"15011","year":"2025"},{"qus_id":"15012","year":"2025"},{"qus_id":"15013","year":"2025"},{"qus_id":"15014","year":"2025"},{"qus_id":"15015","year":"2025"},{"qus_id":"15016","year":"2025"},{"qus_id":"15017","year":"2025"},{"qus_id":"15018","year":"2025"},{"qus_id":"15019","year":"2025"},{"qus_id":"15020","year":"2025"},{"qus_id":"15021","year":"2025"},{"qus_id":"15022","year":"2025"},{"qus_id":"15023","year":"2025"},{"qus_id":"15024","year":"2025"},{"qus_id":"15025","year":"2025"},{"qus_id":"15026","year":"2025"},{"qus_id":"15027","year":"2025"},{"qus_id":"15028","year":"2025"},{"qus_id":"15029","year":"2025"},{"qus_id":"15030","year":"2025"},{"qus_id":"15031","year":"2025"},{"qus_id":"15032","year":"2025"},{"qus_id":"15033","year":"2025"},{"qus_id":"15034","year":"2025"},{"qus_id":"15035","year":"2025"},{"qus_id":"15036","year":"2025"},{"qus_id":"15037","year":"2025"},{"qus_id":"15038","year":"2025"},{"qus_id":"15039","year":"2025"},{"qus_id":"15040","year":"2025"},{"qus_id":"15041","year":"2025"},{"qus_id":"15042","year":"2025"},{"qus_id":"15043","year":"2025"},{"qus_id":"15044","year":"2025"},{"qus_id":"15045","year":"2025"},{"qus_id":"15046","year":"2025"},{"qus_id":"15047","year":"2025"},{"qus_id":"15048","year":"2025"},{"qus_id":"17318","year":"2024"},{"qus_id":"17319","year":"2024"},{"qus_id":"17382","year":"2024"},{"qus_id":"17383","year":"2024"},{"qus_id":"17384","year":"2024"},{"qus_id":"17385","year":"2024"},{"qus_id":"17386","year":"2024"},{"qus_id":"17387","year":"2024"},{"qus_id":"17388","year":"2024"},{"qus_id":"17389","year":"2024"},{"qus_id":"17390","year":"2024"},{"qus_id":"17391","year":"2024"},{"qus_id":"17392","year":"2024"},{"qus_id":"17393","year":"2024"},{"qus_id":"17394","year":"2024"},{"qus_id":"17395","year":"2024"},{"qus_id":"17396","year":"2024"},{"qus_id":"17397","year":"2024"},{"qus_id":"17398","year":"2024"},{"qus_id":"17399","year":"2024"},{"qus_id":"17400","year":"2024"},{"qus_id":"17401","year":"2024"},{"qus_id":"17402","year":"2024"},{"qus_id":"17403","year":"2024"},{"qus_id":"17404","year":"2024"},{"qus_id":"17407","year":"2024"},{"qus_id":"17406","year":"2024"},{"qus_id":"17408","year":"2024"},{"qus_id":"17409","year":"2024"},{"qus_id":"17410","year":"2024"},{"qus_id":"17411","year":"2024"},{"qus_id":"17412","year":"2024"},{"qus_id":"17413","year":"2024"},{"qus_id":"17414","year":"2024"},{"qus_id":"17415","year":"2024"},{"qus_id":"17416","year":"2024"},{"qus_id":"17417","year":"2024"},{"qus_id":"17418","year":"2024"},{"qus_id":"17419","year":"2024"},{"qus_id":"17420","year":"2024"},{"qus_id":"17421","year":"2024"},{"qus_id":"17422","year":"2024"},{"qus_id":"17423","year":"2024"},{"qus_id":"17424","year":"2024"},{"qus_id":"17425","year":"2024"},{"qus_id":"17426","year":"2024"},{"qus_id":"17427","year":"2024"},{"qus_id":"17428","year":"2024"},{"qus_id":"17429","year":"2024"},{"qus_id":"17430","year":"2024"},{"qus_id":"17431","year":"2024"},{"qus_id":"17432","year":"2024"},{"qus_id":"17433","year":"2024"},{"qus_id":"17434","year":"2024"},{"qus_id":"17435","year":"2024"},{"qus_id":"17436","year":"2024"},{"qus_id":"17437","year":"2024"},{"qus_id":"17438","year":"2024"},{"qus_id":"17439","year":"2024"},{"qus_id":"17440","year":"2024"},{"qus_id":"17440","year":"2024"},{"qus_id":"17442","year":"2024"},{"qus_id":"17443","year":"2024"},{"qus_id":"17444","year":"2024"},{"qus_id":"17441","year":"2024"},{"qus_id":"17445","year":"2024"},{"qus_id":"17446","year":"2024"},{"qus_id":"17448","year":"2024"},{"qus_id":"17447","year":"2024"},{"qus_id":"17449","year":"2024"},{"qus_id":"17450","year":"2024"},{"qus_id":"17451","year":"2024"},{"qus_id":"17452","year":"2024"},{"qus_id":"17453","year":"2024"},{"qus_id":"17454","year":"2024"},{"qus_id":"17455","year":"2024"},{"qus_id":"17456","year":"2024"},{"qus_id":"17457","year":"2024"},{"qus_id":"17458","year":"2024"},{"qus_id":"17459","year":"2024"},{"qus_id":"17460","year":"2024"},{"qus_id":"17461","year":"2024"},{"qus_id":"17462","year":"2024"},{"qus_id":"17463","year":"2024"},{"qus_id":"17464","year":"2024"},{"qus_id":"17465","year":"2024"},{"qus_id":"17466","year":"2024"},{"qus_id":"17467","year":"2024"},{"qus_id":"17468","year":"2024"},{"qus_id":"17469","year":"2024"},{"qus_id":"17470","year":"2024"},{"qus_id":"17476","year":"2024"},{"qus_id":"17477","year":"2024"},{"qus_id":"17478","year":"2024"},{"qus_id":"17479","year":"2024"},{"qus_id":"17480","year":"2024"},{"qus_id":"17488","year":"2024"},{"qus_id":"17489","year":"2024"},{"qus_id":"17490","year":"2024"},{"qus_id":"17491","year":"2024"},{"qus_id":"17492","year":"2024"},{"qus_id":"17493","year":"2024"},{"qus_id":"17494","year":"2024"},{"qus_id":"17495","year":"2024"},{"qus_id":"17496","year":"2024"},{"qus_id":"17497","year":"2024"},{"qus_id":"17498","year":"2024"},{"qus_id":"17499","year":"2024"},{"qus_id":"17500","year":"2024"},{"qus_id":"17501","year":"2024"},{"qus_id":"17502","year":"2024"},{"qus_id":"17503","year":"2024"},{"qus_id":"17504","year":"2024"},{"qus_id":"17505","year":"2024"},{"qus_id":"17506","year":"2024"},{"qus_id":"17507","year":"2024"},{"qus_id":"17508","year":"2024"},{"qus_id":"17509","year":"2024"},{"qus_id":"17510","year":"2024"},{"qus_id":"17511","year":"2024"},{"qus_id":"17512","year":"2024"},{"qus_id":"17513","year":"2024"},{"qus_id":"17514","year":"2024"},{"qus_id":"17515","year":"2024"},{"qus_id":"17516","year":"2024"},{"qus_id":"17517","year":"2024"},{"qus_id":"17518","year":"2024"},{"qus_id":"17519","year":"2024"},{"qus_id":"17520","year":"2024"},{"qus_id":"17521","year":"2024"},{"qus_id":"17522","year":"2024"},{"qus_id":"17523","year":"2024"},{"qus_id":"17524","year":"2024"},{"qus_id":"17525","year":"2024"},{"qus_id":"17526","year":"2024"},{"qus_id":"17527","year":"2024"},{"qus_id":"17528","year":"2024"},{"qus_id":"17529","year":"2024"},{"qus_id":"17530","year":"2024"},{"qus_id":"17531","year":"2024"},{"qus_id":"17532","year":"2024"},{"qus_id":"17533","year":"2024"},{"qus_id":"17534","year":"2024"},{"qus_id":"17535","year":"2024"},{"qus_id":"17537","year":"2024"},{"qus_id":"17538","year":"2024"},{"qus_id":"17539","year":"2024"},{"qus_id":"17540","year":"2024"},{"qus_id":"17541","year":"2024"},{"qus_id":"17542","year":"2024"},{"qus_id":"17543","year":"2024"},{"qus_id":"17545","year":"2024"},{"qus_id":"17544","year":"2024"},{"qus_id":"17546","year":"2024"},{"qus_id":"17547","year":"2024"},{"qus_id":"17548","year":"2024"},{"qus_id":"17549","year":"2024"},{"qus_id":"17550","year":"2024"},{"qus_id":"17551","year":"2024"},{"qus_id":"17552","year":"2024"},{"qus_id":"17553","year":"2024"},{"qus_id":"17554","year":"2024"},{"qus_id":"17555","year":"2024"},{"qus_id":"17556","year":"2024"},{"qus_id":"17558","year":"2024"},{"qus_id":"17559","year":"2024"},{"qus_id":"17561","year":"2024"},{"qus_id":"17560","year":"2024"},{"qus_id":"17562","year":"2024"},{"qus_id":"17563","year":"2024"},{"qus_id":"17564","year":"2024"},{"qus_id":"17565","year":"2024"},{"qus_id":"17566","year":"2024"},{"qus_id":"17567","year":"2024"},{"qus_id":"17568","year":"2024"},{"qus_id":"17569","year":"2024"},{"qus_id":"17570","year":"2024"},{"qus_id":"17571","year":"2024"},{"qus_id":"17572","year":"2024"},{"qus_id":"17573","year":"2024"},{"qus_id":"17574","year":"2024"},{"qus_id":"17575","year":"2024"},{"qus_id":"17576","year":"2024"},{"qus_id":"17577","year":"2024"},{"qus_id":"17578","year":"2024"},{"qus_id":"17579","year":"2024"},{"qus_id":"17580","year":"2024"},{"qus_id":"17581","year":"2024"},{"qus_id":"17582","year":"2024"},{"qus_id":"17583","year":"2024"},{"qus_id":"17584","year":"2024"},{"qus_id":"17585","year":"2024"},{"qus_id":"17586","year":"2024"},{"qus_id":"17587","year":"2024"},{"qus_id":"17588","year":"2024"}]