Table of contents
1.
Introduction
2.
July 2018 Paper II Part 2
3.
FAQs
3.1.
What is the UGC NET exam?
3.2.
What is the maximum number of attempts for the UGC NET examination?
3.3.
What is the full form of UGC NET?
3.4.
How can solving PYQs help in my exam preparation?
3.5.
How many papers are there in the UGC NET exam?
4.
Conclusion
Last Updated: Mar 27, 2024
Easy

July 2018 Paper II Part 2

Career growth poll
Do you think IIT Guwahati certified course can help you in your career?

Introduction

UGC NET Exam is a very popular exam in India for people interested in research. Previous Year Questions are an excellent option to learn about the exam pattern. By solving the PYQs, you will get a basic idea about your preparation. 

Refer to July 2018 Paper II Part 1 here.

Refer to July 2018 Paper II Part 3 here.

Refer to July 2018 Paper II Part 4 here.

You can evaluate your weak areas and work on them to perform better in the examination. In this article, we have given the questions of UGC NET July 2018 Paper II. We have also explained every problem adequately to help you learn better.

July 2018 Paper II Part 2

26. A binary search tree in which every non-leaf node has non-empty left and right subtrees is called a strictly binary tree. Such a tree with 19 leaves:

(1) cannot have more than 37 nodes

(2) has exactly 37 nodes

(3) has exactly 35 nodes

(4) cannot have more than 35 nodes

Answer: 2

2(n)-1 where n is the for the leaves nodes. So by that way we have exactly 37 nodes.
 

27. Match the following with respect to algorithm paradigms :

List - I

(a) The 8-Queen’s problem

(b) Single-Source shortest paths

(c) STRASSEN’s Matrix multiplication

(d) Optimal binary search trees

List - II

(i) Dynamic programming

(ii) Divide and conquer

(iii) Greedy approach

(iv) Backtracking

Code:

      (a)  (b)  (c)  (d)

(1) (iv)  (i)   (iii)  (ii)

(2) (iv)  (iii)  (i)   (ii)

(3) (iii)  (iv)  (ii)  (i)

(4) (iv)  (iii)  (ii)  (i)

Answer: 4

The 8-Queen problem is a Backtracking algorithm.

Single-Source shortest paths is a Greedy approach

STRASSEN’s Matrix multiplication is a Divide and conquer

Optimal binary search trees is Dynamic programming.
 

28. The maximum number of comparisons needed to sort 9 items using radix sort is (assume each item is 5 digit octal number):

(1) 45

(2) 72

(3) 360

(4) 450

Answer: 3

Actually radix sort is not a comparison based algorithm. ===> No.of comparissions = 0

So, here comparisons account for the comparisons involved in iterations.

given that, it is 5 digit number ( remember that totally we have 5 iterations due to no. of digits =5 )
 

29. A 5-ary tree is a tree in which every internal node has exactly 5 children. The number of left nodes in such a tree with 8 internal nodes will be:

(1) 30

(2) 33

(3) 45

(4) 125

Answer: Marks to all

Everyone was given marks for the above question due to an unclear statement of the question regarding the number of leaf nodes.
 

30. Consider a Boolean function of ‘n’ variables. The order of an algorithm that determines whether the Boolean function produces a output 1 is:

(1) Logarithmic

(2) Linear

(3) Quadratic

(4) Exponential

Answer: 4

Given, n Boolean variables.

If there are n Boolean variables, the number of Boolean functions possible is 2n.

Suppose we have 4 Boolean variables, so the number of Boolean functions is = 24 = 16

Here, we have to find the order of the algorithm which determines whether the Boolean function produces an output 1.

For this, we need to check each Boolean function one by one in the worst case.

As there are 2n Boolean functions, we have to check all of these in the worst case.

As it is in exponential form. So, the order of the algorithm is also in exponential form.
 

31. Two finite state machines are said to be equivalent if they:

(1) Have the same number of edges

(2) Have the same number of states

(3) Recognize the same set of tokens

(4) Have the same number of states and edges

Answer: 3

Two finite state machines are said to be equivalent if they recognize the same set of tokens.

Having the same number of edges and states doesn’t mean that FA is equivalent.

32. The finite state machine given in the figure below recognizes:

(1) any string of odd number of a’s

(2) any string of odd number of b’s

(3) any string of even number of a’s and odd number of b’s

(4) any string of odd number of a’s and odd number of b’s

Answer: 4

This finite state machine will accept any string of an odd number of a’s and an odd number of b’s.
 

33. A pushdown automaton behaves like a Turing machine when the number of  Auxiliary memory is:

(1) 0

(2) 1

(3) 1 or more

(4) 2 or more

Answer: 4

A pushdown automaton behaves like a Turing machine when the number of auxiliary memory is 2 or more.

PDA with 2 or more auxiliary memory has the same expressive power.

Generally, PDA has one auxiliary memory.
 

34. Pushdown automata can recognize language generated by ................

(1) Only context-free grammar

(2) Only regular grammar

(3) Context-free grammar or regular grammar

(4) Only context-sensitive grammar

Answer: 3

Pushdown Automata can recognize language generated by Context-free grammar or regular grammar.
 

35. To obtain a string of n Terminals from a given Chomsky normal form grammar, the number of productions to be used is:

(1) 2n−1

(2) 2n

(3) n+1

(4) n2

Answer: 1

The number of productions to be used is 2n-1.
 

36. Consider the following two Grammar:

G1: S → SbS | a

G2 : S → aB | ab, A→GAB | a, B→ABb | b

Which of the following option is correct?

(1) Only G1 is ambiguous

(2) Only G2 is ambiguous

(3) Both G1 and G2 are ambiguous

(4) Both G1 and G2 are not ambiguous

Answer: 3

A grammar is said to be ambiguous if we can generate more than one parse for a same given string.

Here both Grammar G1 and G2 are ambiguous For G1 we can generate more than one parse tree for the same string “ababa”.

Since G1 is ambiguous and for G2 we can also generate more than one parse for the string ” ab ” since G2 is also ambiguous.

 

37. Context-sensitive language can be recognized by a:

(1) Finite state machine

(2) Deterministic finite automata

(3) Non-deterministic finite automata

(4) Linear bounded automata

Answer: 4

Context-sensitive language can be recognized by linear bounded automata.

Context-free languages and regular languages are accepted by pushdown automata.
 

38. The set A={ 0n 1n 2n | n=1, 2, 3, ......... } is an example of a grammar that is:

(1) Context-sensitive

(2) Context-free

(3) Regular

(4) None of the above

Answer: 1

The given grammar is context-sensitive.
 

39. A bottom-up parser generates:

(1) Left-most derivation in reverse

(2) Right-most derivation in reverse

(3) Left-most derivation

(4) Right-most derivation

Answer: 2

This corresponds to starting at the leaves of the parse tree also known as shift-reduce parsing.
 

40. Consider the following statements( ):

S1: There exists no algorithm for deciding if any two Turing machines M1 and M2 accept the same language.

S2: The problem of determining whether a Turing machine halts on any input is undecidable.

Which of the following options is correct?

(1) Both S1 and S2 are correct

(2) Both S1 and S2 are not correct

(3) Only S1 is correct

(4) Only S2 is correct

Answer: 1

There exists no algorithm for deciding if any two Turing machines M 1 and M 2 accept the same language. True

The problem of determining whether a Turing machine halts on any input is undecidable.True

Both statements are correct.
 

41. A slotted ALOHA network transmits 200-bit frames using a shared channel with a 200 Kbps bandwidth. Find the throughput of the system, if the system (all stations put together) produces 250 frames per second:

(1) 49

(2) 368

(3) 149

(4) 151

Answer: 1

The frame transmission time=200/200 kbps=1ms

G=1/4

So S=Ge-G = 0.195= 19.5%

This means that the throughput is 250 * 0.195=49 frames.

Only 49 out of 250 frames will survive.
 

42. The period of a signal is 100 ms. Its frequency is .............

(1) 1003 Hertz

(2) 10−2 kHz

(3) 10−3 kHz

(4) 105 Hertz

Answer: 2

We know that:

frequency(f) = 1 / Timeperiod(T)

Given timeperiod(T) = 100 ms

f = 1 / 100ms

f = 1000 / 100000 ms

We know that 1000 ms = 1 sec and we can write 1000 as 1 k

i.e. f = 1k / 100s

f = 10-2 kHz (1 / s = Hz)
 

43. The dotted-decimal notation of the following IPV4 address in binary notation is ...................

10000001 00001011 00001011 11101111

(1) 111.56.45.239

(2) 129.11.10.238

(3) 129.11.11.239

(4) 111.56.11.239

Answer: 3

IPV4 address = 10000001 00001011 00001011 11101111

10000001 = 129

00001011 = 11

00001011 = 11

11101111 = 239

IPV4 address 10000001 00001011 00001011 11101111 is equivalent to 129.11.11.239
 

44. Which of the following statements are true?

(a) Advanced Mobile Phone System (AMPS) is a second-generation cellular phone system.

(b) IS - 95 is a second-generation cellular phone system based on CDMA and DSSS.

(c) The Third generation cellular phone system will provide universal personnel communication.

Code:

(1) (a) and (b) only

(2) (b) and (c) only

(3) (a), (b) and (c)

(4) (a) and (c) only

Answer: 2

Advanced Mobile Phone System (AMPS) is a First generation cellular phone system.

IS – 95 is a second-generation cellular phone system based on CDMA and DSSS.True

The Third generation cellular phone system will provide universal personnel communication. True
 

45. Match the following symmetric block ciphers with corresponding block and key sizes:

List - I

(a) DES

(b) IDEA

(c) BLOW FISH

(d) AES

List - II

(i) block size 64 and key size ranges between 32 and 448

(ii) block size 64 and key size 64

(iii) block size 128 and key sizes 128, 192, 256

(iv) block size 64 and key size 128

Code:

      (a)  (b)  (c)   (d)

(1) (iv)  (ii)   (i)   (iii)

(2) (ii)   (iv)  (i)   (iii)

(3) (ii)   (iv)  (iii)  (i)

(4) (iv)  (ii)   (iii)  (i)

Answer: 2

In DES 64 Bit is Block Size and 64 Bit Key initially, later key gets converted in 56 bits.
 

46. Which of the following statements are true?

(a) Three broad categories of Networks are

(i) Circuit Switched Networks

(ii) Packet Switched Networks

(iii) Message Switched Networks

(b) Circuit Switched Network resources need not be reserved during the set-up phase.

(c) In packet switching there is no resource allocation for packets.

Code:

(1) (a) and (b) only

(2) (b) and (c) only

(3) (a) and (c) only

(4) (a), (b) and (c)

Answer: 3

Three broad categories of Networks are
(i) Circuit Switched Networks
(ii) Packet Switched Networks
(iii) Message Switched Networks True

Circuit Switched Network resources need not be reserved during the set-up phase. False because resources need to be reserved

In packet switching, there is no resource allocation for packets. True
 

47. In Challenge-Response authentication the claimant ...............

(1) Proves that she knows the secret without revealing it

(2) Proves that she doesn’t know the secret

(3) Reveals the secret

(4) Gives a challenge

Answer: 1

Challenge-Response authentication is a computer security protocol in which one party ask a question and another party must provide a valid answer. I.e. she knows the secret without revealing it or will provide the secret when it is asked.
 

48. Decrypt the message “WTAAD” using the Caesar Cipher with key=15.

(1) LIPPS

(2) HELLO

(3) OLLEH

(4) DAATW

Answer: 2

In the Ceaser cypher algorithm encryption and decryption takes place.

During encryption right shift takes place depending upon the key and in decryption left shift takes place depending on the key.

In the given question key value is 15 and decryption is asked:

The given message is WTAAD

Left shift 15 on W is H

Left shift 15 on T is E

Left shift 15 on A is L

Left shift 15 on A is L

Left shift 15 on D is O

The decrypted message will HELLO.
 

49. To guarantee the correction of up to t errors, the minimum Hamming distance dmin is a block code must be ................

(1) t+1

(2) t−2

(3) 2t−1

(4) 2t+1

Answer: 4

To guarantee correction of up to t errors in all cases, the minimum Hamming distance in a block code must be dmin = 2t + 1.

50.    Encrypt the Message “HELLO MY DEARZ” using Transposition Cipher with

(1) HLLEO YM AEDRZ

(2) EHOLL ZYM RAED

(3) ELHL MDOY AZER

(4) ELHL DOMY ZAER

Answer: 3

Given message is “HELLO MY DEARZ” Now arrange thenm in group of 4

I.e. HELL OMYD EARZ

i.e. replace second character in abobe format to the first place and fourth character to the first place, first character to the third place and third character to the

fourth place.

Encrypted message will be ELHL MDOY AZER.

FAQs

What is the UGC NET exam?

UGC NET is a national-level exam organized by UGC to determine the eligibility of the candidates for lectureship and JRF.

What is the maximum number of attempts for the UGC NET examination?

There is no bar on the number of attempts of this examination. Candidates can appear for the examination as long as they are eligible.

What is the full form of UGC NET?

UGC stands for University Grants Commission, and NET stands for National Eligibility Test.

How can solving PYQs help in my exam preparation?

Solving PYQs will give you a good idea about the exam pattern and help you identify your weak topics to prepare them better for the examination.

How many papers are there in the UGC NET exam?

There are two papers, and the candidates get 3 hours for both papers. There are 150 questions in UGC NET combining both papers.

Conclusion

In this article, We have extensively discussed the July 2018 paper II. We hope that this blog has helped you understand the UGC pattern. You can refer to this article for more details on UGC NET 2022.

Refer to July 2018 Paper II Part 1 here.

Refer to July 2018 Paper II Part 3 here.

Refer to July 2018 Paper II Part 4 here.

Refer to our guided paths on Coding Ninjas Studio to learn more about DSA, Competitive Programming, JavaScript, System Design, etc. Enroll in our courses and refer to the mock test and problems available; take a look at the interview experiences and interview bundle for placement preparations.

Do upvote our blog to help other ninjas grow.

Happy Learning!

 

Live masterclass