## Thursday, 4 August 2016

### UGC Net Computer Science Paper II July 16 page 3

21. Consider the following binary search tree:

If we remove the node, which of the node from the left subtree will be the new root
(1) 11
(2) 12
(3) 13
(4) 16

22. Consider the following operations performed on a stack of size 5:
Push (a): Pop(); Push(b); Push(c); Pop();
Push(d);Pop();Pop();Push(e)
Which of the following statements is correct?
(1) Underflow occurs
(2) Stack operations are performed smoothly
(3) Overflow occurs
(4) None of the above

23. Suppose you are given a binary tree with n nodes , such that each node has exactly either zero or two . The maximum height of the tree will be
(1) n/2-1
(2) n/2 +1
(3) (n-1)/2
(4) (n+1)/2

24.  Which of the following is not an inherent application of stack?
(1) Implementation of recursion
(2) Evaluation of a postfix expression
(3) Job Scheduling
(4) Reverse a string

25. in how many ways can the string
A∩B –A ∩ B-A
Be fully parenthesized to yield an infix expression?
(1) 15
(2) 14
(3) 13
(4) 12

26. A multiplexer combines four 100 kbps channels using a time slot of 2 bits. What is the bit rate?
(1) 100 Kbps
(2) 200 Kbps
(3) 400 Kbps
(4) 1000 Kbps

27. In a fully connected mesh network with 10 computers, total ____ number of cables are required and ________ number of pot are required for each device.
(1) 40,9
(2) 45,10
(3) 45,9
(4) 50,10

28. In TCP/IP reference model, the job of _______ layer is to permit hosts to inject packets into any network and travel them independently to the destination.
(1) Physical
(2) Transport
(3) Application
(4) Host to network
29. if there are N people in the world and are using secrete key encryption/decryption for privacy purpose , then number of secrete keys require  will be:
(1) N
(2) (N-1)
(3) N(N-1)/2
(4) N(N+1)/2
30. Optical fiber uses reflection to guide light through a channel, in which angle of incidence is ____ the critical angle.
(1) equal to
(2) Less than
(3) Greater Than
(4) less than or equal to