Code360 powered by Coding Ninjas X Naukri.com. Code360 powered by Coding Ninjas X Naukri.com
Table of contents
1.
Introduction
2.
Questions with Solutions
3.
FAQs
3.1.
What is UGC NET?
3.2.
How do we apply for UGC NET?
3.3.
Why do we apply for UGC NET?
3.4.
What are the other exams you can apply to?
3.5.
What is the syllabus of UGC NET?
4.
Conclusion
Last Updated: Mar 27, 2024
Easy

Dec 2012 Paper II - Part 1

Leveraging ChatGPT - GenAI as a Microsoft Data Expert
Speaker
Prerita Agarwal
Data Specialist @
23 Jul, 2024 @ 01:30 PM

Introduction

The UGC NET, also known as the NTA-UGC-NET, is an examination used to determine eligibility for assistant professorships and Junior Research Fellowships at Indian universities and colleges. The National Testing Agency administers the exam on behalf of the University Grants Commission.

Now we will look at some of the questions that came in UGC NET Dec 2012 Paper II..

Questions with Solutions

1. Have a look at the circuit below. Y is at logical 'l' in a specific stable state. What are the potential A, B, and C values?

(A) A = 0, B = 0, C = 1 

(B) A = 0, B = C = 1 

(C) A = 1, B = C = 0 

(D) A = B = 1, C = 1 

Solution) 

(A) A = 0, B = 0, C = 1  or (D) A = B = 1, C = 1 

Explanation)

Assuming f is Y, the last AND gate must have both inputs set to 1 in order to reach the y=1 (stationary) state. As a result, C=1 (choice C is no longer an option), and for the other input to be 1, either B=0 or C=1 (which ensures output of 2nd NAND gate as 1)

or A=1 ensures that the output of the second NAND gate is 0 if the other input is also 1. Now, which is f, which might be 0 or 1, so leave it alone.

i.e. B=0 and A=1 or B=0 and C=1 option A)satisfy, as well as option D)

As a result, the answers should be A and D.


2. The worst-case time complexity of the AVL tree is better in comparison to the binary search tree for 

(A) Search and Insert Operations 

(B) Search and Delete Operations 

(C) Insert and Delete Operations 

(D) Search, Insert and Delete Operations

Solution) (D) Search, Insert and Delete Operations 

Explanation) As previously stated, binary tree and BST search operations have a worst-case temporal complexity of O. (n). The AVL tree, on the other hand, has a worst-case time complexity of O. (logn). As a result, the best solution is (D).


3. The GSM network can be broken down into three major systems:

(A) SS, BSS, OSS 

(B) BSS, BSC, MSC 

(C) CELL, BSC, OSS 

(D) SS, CELL, MSC 

Solution) (A) SS, BSS, OSS

Explanation) The protocols for second-generation (2G) digital cellular networks used by mobile phones are referred to as GSM. GSM allows for up to 9.6 kbps data transfer and voice conversations. It uses the TDMA (time division multiple access) mechanism. The 850MHz, 900MHz, 1800MHz, and 1900MHz frequency bands are currently used by GSM networks.

 

4. The power set of the set {} is 

(A) {} 

(B) {, {}} 

(C) {0} 

(D) {0, , {}}

Solution) (B) {, {}} 

Explanation) The set of all subsets of a set S, including the empty set and S itself, is called the power set of that set.


5. Find the number of disc transfers necessary with FCFS if the disc queue of I/O block requests is 98, 124, 37, 14, 65, and 67 if the disc head is initially situated at 32.

(A) 239 

(B) 310 

(C) 321 

(D) 325 

Solution) (C) 321 

Explanation) (98-32) + (98-37) + (37-14) +(124-14) + (124-65) + (67-65)

= 66+61+23+110+59+2 =321


6. Component level design is concerned with 

(A) Flow oriented analysis 

(B) Class based analysis 

(C) Both of the above 

(D) None of the above 

Solution) (C) Both of the above 

Explanation) The design job is fed by the analysis model, which is manifested through scenario-based, class-based, flow-oriented, and behavioural features.

Design creates a data/class design, an architectural design, an interface design, and a component level design using design notations and procedures.

7. The 'C' language is 

(A) Context-free language 

(B) Context-sensitive language 

(C) Regular language 

(D) None of the above 

Solution) (A) Context free language 

Explanation) C and C++ are context-sensitive languages.

 

8. Which protocol is commonly used to execute the Mobile Application Protocol (MAP)?

(A) SNMP (Simple Network Management Protocol) 

(B) SMTP (Simple Mail Transfer Protocol) 

(C) SS7 (Signalling System 7) 

(D) HTTP (HyperText Transfer Protocol)

Solution) (C) SS7 (Signalling System 7) 

Explanation) The following are the main SS7 functions.

  • Establishing and dismantling circuit-switched connections, such as phone calls.
  • Advanced network functions (calling name/number presentation, Automatic Callback, and so on) are provided by supplemental services.
  • Mobility management is a feature of cellular networks that allows users to roam about while remaining connected to the network, even if they are on a call.
  • Short Message Service (SMS) and Enhanced Messaging Service (EMS) are functions of SS7.
  • Intelligent Network (IN) services such as toll-free (800) calling are supported.
  • ISDN support is available.
  • Subscribers can change their service, service provider, and location without having to change their phone number thanks to Local Number Portability (LNP).

 

9. It is a _____ fragment if a packet arrives with an M-bit value of 'l' and a fragmentation offset value of '0'.

(A) First 

(B) Middle 

(C) Last 

(D) All of the above 

Solution) (A) First 

Explanation) M = 1 denotes that this packet is not the final of all the fragments.

0 Offset This packet contains the 0*8 =0th byte from the original transmission. As a result, the answer is A - First packet.

 

10. The amount of eight-bit strings that either start with a 1 bit or terminate with two bits 00 shall be

(A) 32 

(B) 64 

(C) 128 

(D) 160 

Solution) (D) 160

Explanation) Ending with 00 = 256/4 = 64 numbers

Half of these 64 numbers start with 1, leaving 32.

Assuming starting with 1 and ending with 00 is counted only once:

128 + 32 = 160 numbers

 

11. What does 'reducing the strength' refer to in compiler design?

(A) lowering the range of input variable values

(B) code optimization using cheaper machine instructions. 

(C) reducing the efficiency of the program. 

(D) None of the above

Solution) (B) code optimization using cheaper machine instructions. 

Explanation) Strength reduction is a compiler optimization technique in which expensive operations are replaced with equivalent but less expensive operations in software engineering. The classic example of strength reduction is when "strong" multiplications inside a loop are converted into "weaker" additions, which is common in array addressing.

  • substituting a multiplication within a loop with an addition as an example of a strength decrease
  • a multiplication in place of an exponentiation within a loop



12. The effective address of the operand is formed by adding a constant value to the contents of the register in which addressing mode?

(A) Absolute 

(B) Indirect 

(C) Immediate 

(D) Index 

Solution) (D) Index 

Explanation) The address might be the beginning of an array or vector, and the index could be used to choose a specific array element. The index register can be scaled by the CPU to accommodate the size of each array element.

Note that this is similar to base-plus-offset addressing mode, except that the offset is large enough to target any memory region in this case.

Example: A programmer can declare a string as a local constant or a static variable within a procedure. The string's address is saved in the instruction's literal address. In the index register, the offset (which character of the string to use on this iteration of a loop) is saved.

 

13. Which of the following is true? 

(A) BCNF's relation is always in 3NF. 

(B) 3NF's relation is always in BCNF. 

(C) BCNF and 3NF are the same. 

(D) BCNF's relation is not in 3NF.

Solution) (A) BCNF's relation is always in 3NF. 

Explanation) BCNF is a more powerful version of 3NF. As a result, every BCNF relationship will also exist in 3NF.

 

14. Using the first-fit technique, which memory partition would the process requiring 426 K be placed in, given memory partitions of 100 K, 300 K, 500 K, 200 K, and 600 K (in order) and processes of 212 K, 112 K, 417 K, and 426 K (in order)?

(A) 500 K 

(B) 200 K 

(C) 300 K 

(D) 600 K 

Solution) None of the above

Explanation) First-Fit: 

212K is put in 500K partition. 

417K is put in 600K partition. 

112K is put in 288K partition (new partition 288K = 500K - 212K). 

426K must wait. 

Best-Fit:

212K is put in 300K partition. 

417K is put in 500K partition. 

112K is put in 200K partition. 

426K is put in 600K partition. 

Worst-Fit: 

212K is put in 600K partition. 

417K is put in 500K partition. 

112K is put in 388K partition. 

426K must wait. 

In this example, Best-Fit turns out to be the best.


15. In the Windows Operating System, what is the size of a Unicode character?

(A) 8-Bits 

(B) 16-Bits 

(C) 32-Bits 

(D) 64-Bits 

Solution) (B) 16-Bits 

Explanation) A Unicode character takes up 2 bytes of space so the answer is (B)sixteen bits.

 

16. In which tree does the height of its left subtree and right subtree differ almost by one for every node? 

(A) Binary search tree 

(B) AVL tree 

(C) Threaded Binary Tree 

(D) Complete Binary Tree

Solution) (B) AVL tree 

Explanation) The AVL tree is a tree in which the heights of the left and right subtrees of each node differ by almost one.

 

17. The design issue of the Datalink Layer in the OSI Reference Model is 

(A) Framing 

(B) Representation of bits 

(C) Synchronization of bits 

(D) Connection control 

Solution) (A) Framing

Explanation) (B) and (C) are related to Physical Layer.

(D) is related to Transport Layer.

 

18. Given the following expressions of a grammar E  E * F / F + E / F F  F – F / id Which of the following is true ? 

(A) * has higher precedence than + 

(B) – has higher precedence than * 

(C) + and – have same precedence 

(D) + has higher precedence than *

Solution) (B) – has higher precedence than *

Explanation) Let say i/p is 3*4-5 when we draw parse tree according to grammar

As we can see first ‘- ‘ will be evaluated then ‘ * ‘ is evaluated so ‘ – ‘ has higher precedence then *.

 

19. The maturity levels used to measure a process are 

(A) Initial, Defined, Repeatable, Managed, Optimized. 

(B) Primary, Secondary, Defined, Managed, Optimized. 

(C) Initial, Stating, Defined, Managed, Optimized. 

(D) None of the above

Solution) (A) Initial, Defined, Repeatable, Managed, Optimized. 

Explanation) CMM levels 

Level 1->Initial

Level 2 ->Repetable

Level 3->Defined

Level 4->Managed

Level 5 ->Optimized

 

20. In a general priority scheduling algorithm, the problem of indefinite blockage of low-priority jobs can be overcome by:

(A) Parity bit 

(B) Aging 

(C) Compaction 

(D) Timer

Solution) (B) Aging 

Explanation) Aging is a solution to the problem of low-priority processes being blocked indefinitely. Aging is a method of gradually raising the priority of processes that have been waiting for a long time in the system.

 

21. To draw a circle, which API is used?

(A) Circle ( ) 

(B) Ellipse ( ) 

(C) Round Rect ( ) 

(D) Pie ( ) 

Solution) (B) Ellipse ( ) 

Explanation) Syntax

  • ellipse(a, b, c, d)

A circle is an ellipse with equal width and height. The first two arguments determine the shape's placement by default, while the third and fourth parameters determine the shape's width and height.

 

22. In DML, RECONNECT command cannot be used with 

(A) OPTIONAL Set 

(B) FIXED Set 

(C) MANDATORY Set 

(D) All of the above

Solution) (B) FIXED Set 

Explanation) RECONNECT works with both OPTIONAL and MANDATORY sets, but not with FIXED sets.

 

23. Coaxial cables are classified according to their Radio Government grade and are designed for specific applications. The impedance 75 of category RG-59 was used for

(A) Cable TV 

(B) Ethernet 

(C) Thin Ethernet 

(D) Thick Ethernet

Solution) (A) Cable TV

Explanation) RG-59/U is a type of coaxial cable that is commonly used to link low-power video and RF signals. Consumer electronics such as VCRs and digital cable/satellite receivers are frequently bundled with RG-59 coaxial wire.

 

24.RAD stands for ______. 

(A) Rapid and Design 

(B) Rapid Aided Development 

(C) Rapid Application Development 

(D) Rapid Application Design 

Solution) (C) Rapid Application Development 

Explanation) RAD stands for Rapid Application Development

 

25. Let's say someone sends out a chain letter. Each person who receives the letter is requested to forward it to four additional individuals. Some people do this, while others do not write letters at all. If no one receives more than one letter and the chain letter ends after 100 individuals have read it but not sent it out, how many people have seen it, including the original person? Find out how many people sent the letter out as well.

(A) 122 & 22 

(B) 111 & 11 

(C) 133 & 33 

(D) 144 & 44 

Solution) (C) 133 & 33 

Explanation) Either a person sends to 4 people or he doesn't send it. So, let x be the number of persons who sends to 4 people. 

100 people didn't send any letter. Except 1 (the initial person) all others 

(x+100) must have a sender. So, we can write

No. of receivers=4×No. of senders+1

(Initial person doesn't have a sender)

No. of receivers=4×No. of senders+1(Initial person doesn't have a sender)

x+100=4x+1⟹3x=99

x=33

Get the tech career you deserve, faster!
Connect with our expert counsellors to understand how to hack your way to success
User rating 4.7/5
1:1 doubt support
95% placement record
Akash Pal
Senior Software Engineer
326% Hike After Job Bootcamp
Himanshu Gusain
Programmer Analyst
32 LPA After Job Bootcamp
After Job
Bootcamp

FAQs

What is UGC NET?

The UGC NET, also known as the NTA-UGC-NET, is an examination used to determine eligibility for assistant professorships and Junior Research Fellowships at Indian universities and colleges. The National Testing Agency administers the exam on behalf of the University Grants Commission.

How do we apply for UGC NET?

One needs to follow the following steps to apply for UGC NET,
1. Fill UGC NET registration form
2. Fill UGC NET application form
3. Upload photo and signature
4. Pay UGC NET application fee
5. Download the confirmation page

Why do we apply for UGC NET?

UGC NET is an examination used to determine eligibility for assistant professorships and Junior Research Fellowships at Indian universities and colleges.

What are the other exams you can apply to?

Postgraduate Entrance Examination (PGEE) 
IIIT Delhi M.Tech Entrance Exam 
IIIT Bangalore M.Tech Entrance Exam 
IIIT Bhubaneswar M.Tech Entrance Exam 
Vellore Institute of Technology Master's Entrance Exam (VITMEE) 
SRM Graduate Engineering Test (SRMGEET) 
BITSAT Entrance Exam

What is the syllabus of UGC NET?

In the first paper the questions are based on logical reasoning and mental ability. For the second paper the applicant can choose from a variety of subjects including regional languages.

Conclusion

In this article we have extensively discussed Dec 2012 Paper II.

We hope that this blog of Dec 2012 Paper II has helped you enhance your knowledge regarding UGC NET Dec 2012 Paper II Questions and answers and if you would like to learn more, check out our articles on Dec 2012 Paper II - Part 2GATE Books For CSE and English Part 1.

Refer to our guided paths on Coding Ninjas Studio to learn more about DSA, Competitive Programming, JavaScript, System Design, etc. Enroll in our courses and refer to the mock test and problems available. Take a look at the interview experiences and interview bundle for placement preparations.

Do upvote our blog to help other ninjas grow. 

Happy Learning!

Live masterclass