Introduction
In India, the UGC NET Exam is a very popular exam for people who want to pursue a career in research. Previous Year Questions are a great way to get a feel for the exam format. You will gain a fundamental understanding of your preparedness by completing the PYQs. You can assess your weak areas and practice on them to improve your exam performance. We have included the UGC NET 2016 July Paper-II questions in this blog. We've also thoroughly detailed each problem to aid your learning.
This article covers the last 25 questions from the January Paper-II, the first 25 questions are provided in its next part July 2016 Paper II - Part 1
Questions 26 to 50
1. A multiplexer combines four 100-Kbps channels using a time slot of 2 bits. What is the bit rate?
(A) 100 Kbps (B) 200 Kbps
(C) 400 kbps (D) 1000 Kbps
Answer: C
Explanation:
4 * 100kbps = 400kbps
100kbps / 2b = 100000bps / 2b = 50000fps
2. In a fully-connected mesh network with 10 computers, a total .............. number of cables are required and ................ number of ports are required for each device.
(A) 40, 9 (B) 45, 10
(C) 45, 9 (D) 50, 10
Answer: C
Explanation:
Since each two host need a cable so n(n-1)/2 cabels needed and n – 1 number of ports are required.
i.e. 10(10 – 1) / 2 = 5 * 9 = 45 cables.
9 number of ports are required for each device.
3. In TCP/IP Reference Model, the job of ............... layer is to permit hosts to inject packets into any network and travel them independently to the destination.
(A) Physical (B) Transport
(C) Application (D) Host-to-network
Answer: Internet Layer
Explanation:
This layer, called the internet layer, is the linchpin that holds the whole architecture together. Its job is to permit hosts to inject packets into any network and have they travel independently to the destination (potentially on a different network).
4. If there are N people in the world and are using secret key encryption/decryption for privacy purpose, then number of secret keys required will be:
(A) N (B) (N-1)
(C) N(N-1)/2 (D) N(N+1)/2
Answer: C
Explanation:
Answer is n(n−1)/2 since every two user have own secret key encryption and decryption.
5. Optical fiber uses reflection to guide light through a channel, in which angle of incidence is ................. the critical angle.
(A) equal to (B) less than
(C) greater than (D) less than or equal to
Answer: C
Explanation:
Optical fiber uses reflection to guide light through a channel, in which angle of incidence is greater than the critical angle.
6. The number of strings of length 4 that are generated by the regular expression (0|∈) 1+2* (3|∈), where | is an alternation character, {+, *} are quantification characters, and ∈ is the null string, is:
(A) 08 (B) 10
(C) 11 (D) 12
Answer: D
Explanation:
Regular expression (0|∈)1+2* (3|∈)
0122, 0123, 1123, 0112, 0113, 1113, 0111, 1222, 1123, 1111, 1223, 1112;
Total 12 strings of lenghth 4 are possible.
7.The content of the accumulator after the execution of the following 8085 assembly language program, is:
MVI A, 42H
MVI B, 05H
UGC: ADD B
DCR B
JNZ UGC
ADI 25H
HLT
(A) 82 H (B) 78 H
(C) 76 H (D) 47 H
Answer: C
Explanation:
A is taking accumulator...
A= 4 * 16 + 2 = 66 in decimal
B= 5 in decimal
Loop runs from B=5 to 1
So 66 + 5 +4 +3+2+1
That is 81 + 25H = 81 + 37 =118
In binary ..
01110110 = 76H
8. In .............., the bodies of the two loops are merged together to form a single loop provided that they do not make any references to each other.
(A) Loop unrolling (B) Strength reduction
(C) Loop concatenation (D) Loop jamming
Answer: D
Explanation:
- The bodies of two loops are merged together to produce a single loop in loop jamming, as long as they don't make any references to one other.
- The bodies of two loops are concatenated together to generate a sequence of loops in loop concatenation. Loop concatenation can sometimes help to reduce complexity.
- We strive to optimise a program's execution time using loop unrolling. It's sometimes referred to as the space–time tradeoff.
- Compilers that optimise for strength reduction replace expensive operations with identical but less expensive processes.
9. Which of the following is not typically a benefit of dynamic linking?
I. Reduction in overall program execution time.
II. Reduction in overall space consumption in memory.
III. Reduction in overall space consumption on disk.
IV. Reduction in the cost of software updates.
(A) I and IV (B) I only
(C) II and III (D) IV only
Answer: B
Explanation:
Dynamic linking is used to reduce space consumption on disk and memory. It also reduce the cost of software update. But it doesn’t reduce program’s time complexity.
10. Which of the following is FALSE ?
(A) The grammar S ⟶ aSb|bSa|SS|∈, where S is the only non-terminal symbol and ∈ is the null string, is ambiguous.
(B) SLR is powerful than LALR.
(C) An LL(1) parser is a top-down parser.
(D) YACC tool is an LALR(1) parser generator.
Answer: B
Explanation:
- The grammar S → a Sb |bSa|SS|∈, where S is the only non-terminal symbol and ∈ is the null string, is ambiguous. When we will try to generate an expression then one string can be generated by more then one parse tree.
- LALR is more powerful then SLR.
- An LL(1) parser is a top-down parser.
- YACC tool is an LALR(1) parser generator.
11. Consider the reference string
0 1 2 3 0 1 4 0 1 2 3 4
If FIFO page replacement algorithm is used, then the number of page faults with three page frames and four page frames are .......... and ........... respectively.
(A) 10, 9 (B) 9, 9
(C) 10, 10 (D) 9, 10
Answer: D
Explanation:
There are 9 page fault in 3 frame FIFO relacement policy and 10 page fault in 3 frame FIFO relacement policy.
Hence the answer is D
12. Suppose there are four processes in execution with 12 instances of a Resource R in a system.
The maximum need of each process and current allocation are given below:
Process |
Max. Need |
Current Allocation |
P1 |
8 |
3 |
P2 |
9 |
4 |
P3 |
5 |
2 |
P4 |
3 |
1 |
With reference to current allocation, is system safe? If so, what is the safe sequence?
(A) No (B) Yes, P1 P2 P3 P4
(C) Yes, P4 P3 P1 P2 (D) Yes, P2 P1 P3 P4
Answer: C
Explanation:
Current allocation of P1P2P3P4 are 3, 4, 2, 1 which is 10 in total.
We have 12 total no of resources and out of them 10 are allocated so, we have only 2 resources.
There is 5, 5, 3, 2 resources are needed for P1P2P3P4 respectively.
So, P4 will run first and free 3 resources after execution. Which are sufficient for P3 So it will execute and do free 5 resources.
Now P1 and P2 both require 5 resources each So we can execute any of them first but we will give priority to P1. The execution order will be P4P3P1P2 .
13. If the Disk head is located initially at track 32, find the number of disk moves required with FCFS scheduling criteria if the disk queue of I/O blocks requests are:
98, 37, 14, 124, 65, 67
(A) 320 (B) 322
(C) 321 (D) 319
Answer: C
Explanation:
Total disk movement = 66 + 61 + 23 + 110 + 2 = 321.
14. In UNIX, ............ creates three subdirectories: 'PIS' and two subdirectories 'progs' and ‘data’ from just created subdirectory 'PIS'.
(A) mdkir PIS/progs PIS/data PIS
(B) mkdir PIS progs data
(C) mkdir PIS PIS/progs PIS/data
(D) mkdir PIS/progs data
Answer: C
Explanation:
In UNIX, mkdir PIS PIS/progs PIS/data creates three subdirectories: ‘PIS’ and two subdirectories ‘progs’ and ‘data’ from just created subdirectory ‘PIS’.
15. A scheduling Algorithm assigns priority proportional to the waiting time of a process. Every process starts with priority zero (lowest priority). The scheduler re-evaluates the process priority for every 'T' time units and decides next process to be scheduled. If the process have no I/O operations and all arrive at time zero, then the scheduler implements .............. criteria.
(A) Priority scheduling (B) Round Robin Scheduling
(C) Shortest Job First (D) FCFS
Answer: B
Explanation:
A scheduling algorithm assigns priority based on how long a process takes to complete. Priority zero is the starting point for all processes (lowest priority). Every 'T' time unit, the scheduler reevaluates the process priority and determines the next process to be scheduled. If there are no I/O operations in the process and they all come at the same time, the scheduler uses Round Robin Scheduling criterion.
16. If S1 is total number of modules defined in the program architecture, S3 is the number of modules whose correct function depends on prior processing then the number of modules not dependent on prior processing is:
(A) 1 + S3/S1 (B) 1 - S3/S1
(C) 1 + S1/S3 (D) 1 - S1/S3
Answer: B
Explanation:
S1 is total number of modules defined in the program architecture.
S2 is total number of modules whose correct function depends on the source of data input or that produces data to be used elsewhere.
S3 is the number of modules whose correct function depends on prior processing.
Program structure (D1) is defined as if architectural design was developed using a distinct method then D1 is 1 otherwise it is zero.
Module independence: D2 = 1 – (S2 / S1)
Module not dependent on prior processing: D3 = 1 – (S3 /S1)
17.The ................ model is preferred for software development when the requirements are not clear.
(A) Rapid Application Development (B) Rational Unified Process
(C) Evolutionary Model (D) WaterfallModel
Answer: C
Explanation:
- When the requirements are unclear, the Evolutionary Model model is preferred for software development.
- Each phase of a Waterfall model must be completed before the next phase can begin.
- Rapid Application Development makes use of the bare minimum in order to create a quick prototype (functionally equivalent component of product)
-
In order to produce a rapid prototype, Rapid Application Development uses the absolute minimum (functionally equivalent component of product)
18. Which of the following is not included in waterfall model ?
(A) Requirement analysis (B) Risk analysis
(C) Design (D) Coding
Answer: B
Explanation:
Waterfall model have following phases:
- Requirement Analysis
- System Design
- Implementation
- Testing
- Deployment
- Maintenance
It doesn’t include Risk analysis.
19. The cyclomatic complexity of a flow graph V(G), in terms of predicate nodes is:
(A) P + 1 (B) P - 1
(C) P - 2 (D) P + 2
Where P is number of predicate nodes in flow graph V(G).
Answer: A
Explanation:
Cyclomatic complexity is a software metric used to measure the complexity of a program. These metric, measures independent paths through program source code.
Mathematically, it is set of independent paths through the graph diagram. The complexity of the program can be defined as –
V(G) = E – N + 2
Where, E – Number of edges
N – Number of Nodes
V (G) = P + 1
Where P = Number of predicate nodes (node that contains condition)
20.The extent to which a software tolerates the unexpected problems, is termed as:
(A) Accuracy (B) Reliability
(C) Correctness (D) Robustness
Answer: D
Explanation:
- The extent to which a software tolerates the unexpected problems, is termed as Robustness.
- Accuracy is the degree to which the result of a measurement, calculation, or specification conforms to the correct value or a standard
- Reliability is the degree to which the result of a measurement, calculation, or specification can be depended on to be accurate.
- Correctnessthe quality or state of being free from error; accuracy.
21.An attacker sits between customer and Banker, and captures the information from the customer and retransmits to the banker by altering the information. This attack is called as ..............
(A) Masquerade Attack (B) Replay Attack
(C) Passive Attack (D) Denial of Service Attack
Answer: B
Explanation:
- An attacker sits between the customer and the lender, capturing information from the customer and modifying it before retransmitting it to the banker. The Replay attack is the name for this type of attack.
- Passive attacks are characterised by the monitoring or eavesdropping of various sorts of signals. In this assault, the attacker attempts to obtain information or the information transmitted in the transmission.
- Masquerade Attacks are a form of network attack in which the attacker impersonates a system's authorised user in order to acquire access.
- DoS is a sort of network assault in which an attacker disables a system or network, rendering it unreachable to its intended users.
22. Consider the following two statements:
(a) Business intelligence and Data warehousing is used for forecasting and Data mining.
(b) Business intelligence and Data warehousing is used for analysis of large volumes of sales data.
Which one of the following options is correct?
(A) (a) is true, (b) is false (B) Both (a) and (b) are true
(C) (a) is false, (b) is true (D) Both (a) and (b) are false
Answer: B
Explanation:
- Business intelligence and Data warehousing is used for forecasting and Data mining.Correct
- Business intelligence and Data warehousing is used for analysis of large volumes of sales data.Correct
23.Pipelining improves performance by:
(A) decreasing instruction latency
(B) eliminating data hazards
(C) exploiting instruction level parallelism
(D) decreasing the cache miss rate
Answer: C
Explanation:
Pipelining improves performance by exploiting instruction level parallelism.
24. Consider the following two statements :
(a) Data scrubling is a process to upgrade the quality of data, before it is moved into Data warehouse.
(b) Data scrubling is a process of rejecting data from data warehouse to create indexes.
Which one of the following options is correct ?
(A) (a) is true, (b) is false (B) (a) is false, (b) is true
(C) Both (a) and (b) are false (D) Both (a) and (b) are true
Answer: A
Explanation:
- Data scrubling is a process to upgrade the quality of data, before it is moved into Data warehouse.Correct
-
Data scrubling is a process of rejecting data from data warehouse to create indexes.Incorrect
25.Given the following statements:
(a) Strategic value of data mining is time stamping
(b) Information collection is an expensive process in building an expert system.
Which of the following options is correct ?
(A) Both (a) and (b) are false (B) Both (a) and (b) are true
(C) (a) is true, (b) is false (D) (a) is false, (b) is true
Answer: B
Explanation:
- Strategic value of data mining is time-stamping.Correct
- Information collection is an expensive process in building an expert system.Correct
FAQs
What is the purpose of the UGC NET Exam?
UGC NET is an abbreviation for University Grants Commission National Eligibility Test. It is a national-level test used to evaluate eligibility for lectureships and Junior Research Fellowships (JRF) in Indian institutions and colleges.
Can I apply for UGC NET after completing a PG diploma?
A PGDM is equivalent to a master's degree. So, if you hold a PG Diploma from a recognized university, you are eligible to apply for the exam.
What is the minimum age for applying to the UGC NET Exam?
According to the UGC NET Eligibility, there is no age limit for assistant professors, but candidates for JRF must be at least 31 years old.
Will distance learning be accepted for the UGC NET?
Yes, distance education is acceptable for the UGC NET Exam, provided you are enrolled in a UGC accredited university/institute.
What is the UGC NET syllabus?
The NTA administers the UGC NET Exam in two parts: General Paper-1 (common to all topics) and Paper-2 (subject-specific). The syllabus for each Paper 2 subject varies. You can view the entire UGC NET Syllabus.