Saturday 14 January 2017

UGC Net Computer Science Paper 1 December 12 , Page 4-Solved

UGC Net Computer Science Paper 1 December 12 , Page 4-Solved

UGC Net Computer Science Paper 1 December 12 , Page 4-Solved

31. Which of the following is a source of methane ?
(A) Wetlands
(B) Foam Industry
(C) Thermal Power Plants
(D) Cement Industry
Answer A

UGC Net Computer Science Paper 1 December 12 , Page 3-Solved

UGC Net Computer Science Paper 1 December 12 , Page 3-Solved
25. ALU stands for
(A) American Logic Unit
(B) Alternate Local Unit
(C) Alternating Logic Unit
(D) Arithmetic Logic Unit
Answer : D


26. A Personal Computer uses a number of chips mounted on a circuit board called
(A) Microprocessor
(B) System Board
(C) Daughter Board
(D) Mother Board
Answer : A

Friday 13 January 2017

UGC Net Computer Science December-12 Paper 3 Page 3 Solved

UGC Net Computer Science December-12 Paper 3 Page 3 Solved

UGC Net Computer Science December-12 Paper 3 Page 3 Solved

21. How many solutions do the following equation have
x1 + x2 + x3 = 11
where x1 ≥ 1, x2 ≥ 2, x3 ≥ 3
(A) C(7, 11)
(B) C(11, 3)
(C) C(14, 11)
(D) C(7, 5)
Answer D
Explanation :-
we can solve this problem by combinition with repetition.
so we need to put 11 similar balls into  x1,x2,x3 types of boxes.
different number of boxes are 3=n
x1≥1, x2≥2, x3≥3 now allocate 1,2,3 from 11 directly . so remaining  ball = 11-(1+2+3) = 5 =k
(n+k-1)Ck  = (3+5-1)C5 =7C5

January 2016 M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN

January 2016 M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN (Solved)


PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most appropriate one and enter in the “OMR” answer sheet supplied with the question paper, following instructions therein. (1x10)
1.1 Protocols are
A) Agreements on how communication components and DTE's are to communicate
B) Logical communication channels for transferring data
C) Physical communication channels sued for transferring data
D) None of the above

View Answer

1.2 Which data communication method is used to transmit the data over a serial communication
link?
A) Simplex
B) Half-duplex
C) Full duplex
D) All of the above

View Answer

Wednesday 11 January 2017

UGC Net Computer Science December-12 Paper 3 Page 2

UGC Net Computer Science December-12 Paper 3 Page 2 Solved

UGC Net Computer Science December-12 Paper 3 Page 2 Solved

11. The time complexities of some standard graph algorithms are given.Match each algorithm with its time complexity ? (n and m are no. of nodes and edges respectively)

a. Bellman Ford algorithm                         1. O (m log n)
b. Kruskals algorithm                                 2. O (n3)       
c. Floyd Warshall algorithm                       3. O(mn)
d. Topological sorting                                4. O(n + m)

Codes :
       a b c d
(A) 3 1 2 4
(B) 2 4 3 1
(C) 3 4 1 2
(D) 2 1 3 4
Answer A

Monday 9 January 2017

UGC Net Computer Science December-12 Paper 3

UGC Net Computer Science December-12 Paper 3 (Solved)

UGC Net Computer Science December-12 Paper 3 (Solved)

1. Eco system is a Frame work for
(A) Building a Computer System
(B) Building Internet Market
(C) Building Offline Market
(D) Building Market
Answer B
Explanation : 

A digital ecosystem is a distributed, adaptive, open socio-technical system with properties of self-organisation, scalability and sustainability inspired from natural ecosystems. Digital ecosystem models are informed by knowledge of natural ecosystems, especially for aspects related to competition and collaboration among diverse entities. The term is used in the computer industry, the entertainment industry, and the World Economic Forum.

VLC crashed on window

vlc-crash-on-windows
VLC crashed on window

Sunday 8 January 2017

UGC Net Computer Science Paper 1 December 12 , Page 2-Solved

UGC Net Computer Science Paper 1 December 12 , Page 2-Solved

UGC Net Computer Science Paper 1 December 12 , Page 2-Solved

11. The sum of the ages of two persons A and B is 50. 5 years ago, the ratio of their ages was 5/3. The present age of A and B are
(A) 30, 20
 (B) 35, 15
(C) 38, 12
 (D) 40, 10
Answer A
Explanation :-
Equations:
a + b = 50
(a-5)/(b-5) = 5/3
-------
For solve this expression we need to change a with b

a = 50-b

(50-b-5)/(b-5) = 5/3
----
3(45-b) = 5(b-5)
135 - 3b = 5b - 25
8b = 160
b = 20
Then a = 30

12. Let a means minus (–), b means multiplied by (x), C means divided by (/) and D means plus (+). The value of 90 D 9 a 29 C 10 b 2 is
(A) 8 
(B) 10
(C) 12 
(D) 14
Answer Incorrect
Explanation :-
a = -
b = *
c = /
d = +

90 D 9 a 29 C 10 b 2

90 + 9 - 29 / 10 * 2
90+9-2.9*2
90+9-5.8
93.2

Friday 6 January 2017

Write a program to check whether a number is perfect or not ?

Question : Write a program to check whether a number is perfect or not ?

(A number said to be  perfect if sum of all factor  less than given number then equal to given number)
Input : 6
Output : Perfect Number

Write a program to check whether given number is Magic or not?

Question : Write a program to check whether given number is Magic or not?

A Magic number said to be a magic when we add each digit until its reached less than 10 after that  if value is 1 then number is Magic.
Example :
    28 = 2+8
         =10
     10= 1+0
         =1 

Write a program to find the following pattern ?

Question : Write a program to find the following pattern?

input : Ashok Kumar Yadav
Output: A.K. Yadav

Write a program that accept two string one for main string and second string will store some word and remove this word form main string?

Question : Write a program that accept two string one for main string and second string will store some word and remove this word form main string?

Input : ram is a good boy
Search string : ram good
Output : is a boy

Solution : 

import java.util.*;

Write a program which accept input from user and print the word which has consecutive repeated Character?

Question : Write a program which accept input from user and print the word which has consecutive repeated Character?

Input  :  An apple is banana and banana is apple.

Output : apple,banana,banana,apple

Solution : 
import java.util.*;

Write a program which accept input of full path of a file and produce following output?

Question : Write a program which accept input of full path of a file and produce following output?

Input : C:/Users/Public/Pictures/SamplePictures/Desert.jpg
Output :
Extension : jpg
File Name : Desert
Path : C:/Users/Public/Pictures/SamplePictures

Solution :

Tuesday 3 January 2017

UGC Net Computer Science Paper II Dec 12,Page 5 (Solve)

UGC Net Computer Science Paper II Dec 12,Page 5 (Solve)
41. Enumeration is a process of
(A) Declaring a set of numbers
(B) Sorting a list of strings
(C) Assigning a legal values possible for a variable
(D) Sequencing a list of operators
Answer C
Explanation : Enumeration is a special datatype which provide an integer number sequence to its member which help to track some common properties with meaning full name instead of number like color names

42. Which of the following mode declaration is used in C++ to open a file for input ?
(A) ios : : app
(B) in : : ios
(C) ios : : file
(D) ios : : in
Answer D
Explanation : ios::in allows input (read operations) from a stream.ios::out allows output (write operations) to a stream.

43. Data Encryption Techniques are particularly used for ______.
(A) protecting data in Data Communication System.
(B) reduce Storage Space Requirement.
(C) enhances Data Integrity.
(D) decreases Data Integrity.
Answer A
Explanation : when we send our data through public network then eavesdropping risk become high So we need some technique which increase security when data is send through public network.

Data encryption translates data into another form, or code, so that only people with access to a secret key (formally called a decryption key) or password can read it. Encrypted data is commonly referred to as ciphertext, while unencrypted data is called plaintext. Currently, encryption is one of the most popular and effective data security methods used by organizations. Two main types of data encryption exist - asymmetric encryption, also known as public-key encryption, and symmet

44. Let L be a set accepted by a non deterministic finite automaton. The number of states in non-deterministic finite automaton is |Q|. The maximum number of states in equivalent finite automaton that accepts L is
(A) |Q|
(B) 2|Q|
(C) 2|Q| – 1
(D) 2|Q|
Answer D
Explanation :In NFA there may be possibility to more than one state transition but in DFA state transition is single direction so about this question if NFA is |Q| then DFA may have 2|Q| state over this type of NFA.

45. What is the result of the following expression ?

(1 & 2) + (3 & 4)

(A) 1
(B) 3
(C) 2
(D) 0
Answer D
Explanation :& is bitmap compare a number at binary level from right to left and operator which return true when all operand is true otherwise false so after evaluate the given expression result become false .
(01 &  10)    +  (011 & 100)

0+0=0

46. Back propagation is a learning technique that adjusts weights in the neural network by propagating weight changes.
(A) Forward from source to sink
(B) Backward from sink to source
(C) Forward from source to hidden nodes
(D) Backward from since to hidden nodes
Answer B

47. Match the following :

a. TTL       1. High fan out
b. ECL      2. Low propagation delay
c. CMOS   3. High power dissipation

Code :
      a    b    c
(A) 3   2    1
(B) 1   2    3
(C) 1   3    2
(D) 3   1    2
Answer A
Explanation : 


a.TTL draws more power => 3
b. ECL has highest speed ; Hence it must have lowest propagation delay =>2
c. CMOS has high fan out =>1

48. ______ is an “umbrella” activity that is applied throughout the software engineering process.

.(A) Debugging
(B) Testing
(C) Designing
(D) Software quality assurance
Answer D
Explanation : 
The umbrella activities in a software development life cycle process include the following:
  • Software Project Management
  • Formal Technical Reviews
  • Software Quality Assurance
  • Software Configuration Management
  • Re-usability Management
  • Risk Management
  • Measurement and Metrics
Document Preparation and Production

49. Identify the operation which is commutative but not associative ?
(A) OR
(B) NOR
(C) EX-OR
(D) NAND

Answer D
Explanation :


1)Every logic gate follows Commutative law.

2)AND,OR,Ex-OR,EX-NOR follows Associative law. NAND,NOR doesn`t follow Associative law.

3)AND ,OR follows Distributive law.Ex-OR,EX-NOR,NAND,NOR doesn`t follow Distributive law.AND operation only distributive on EX-OR operation no other operation is distributive including itself.


50. Given a Relation POSITION (Posting-No, Skill), then query to retrieve all distinct pairs of posting-nos. requiring skill is

 (A) Select p.posting-No, p.posting-No from position p 
         where p.skill = p.skill     and p.posting-No < p.posting-No
(B) Select p1.posting-No, p2.posting-No   from position p1, position p2
       where p1.skill = p2.skill
(C) Select p1.posting-No, p2.posting-No  from position p1, position p2 
       where p1.skill = p2.skill   and p1.posting-No < p2.posting-No
(D) Select p1.posting-No, p2.posting-No   from position p1, position p2
      where p1.skill = p2.skill    and p1.posting-No = p2.posting-No
Answer C

Friday 30 December 2016

CCC Fundamental and Word MCQ/True-False Solve

CCC MCQ Fundamental and word question answer

  CCC TEST PAPER  
Fundamental and Word             
Time: 1HRS                                              M M: 50 MARK

Objective Question:

 1. sesitive device that convert printed material into its equivalent digital form
 (A)scanner
(B)ocr
 ( C)a and b
(D)None of these

2.The basic architecture for digital computer was developed by
 (A)Bill Gates
 (B)Charles Babbage
( C)John Von Neumann
(D)Garden Moore

Wednesday 28 December 2016

UGC Net Computer Science Paper II Dec 12,Page 4 (Solve)

UGC Net Computer Science Paper II Dec 12,Page 4 (Solve)

31. Basis path testing falls under
(A) system testing
(B) white box testing
(C) black box testing
(D) unit testing
Answer : B
Explanation : The basis path testing is same, but it is based on a white box testing method, that defines test cases based on the flows or logical path that can be taken through the program. Basis path testing involves execution of all possible blocks in a program and achieves maximum path coverage with least number of test cases. It is a hybrid of branch testing and path testing methods.

The objective behind basis path testing is that it defines the number of independent paths, thus the number of test cases needed can be defined explicitly (maximizes the coverage of each test case).
     
     int a,b;
     for(a=1,b=2;a<=10;a++)
          printf("\n%d",a*b);

Basis Path Testing Diagram



Basis Path Testing


32. The User Work Area (UWA) is a set of Program variables declared in the host program to communicate the contents of individual records between
(A) DBMS & the Host record
(B) Host program and Host record
(C) Host program and DBMS
(D) Host program and Host language
Answer : C
Explanation :A set of program variables, declared in the host program, to communicate the contents of individual records between the DBMS and the host program.

For each record type in the database schema, a corresponding program variable with the same format should be declared in the host program.

Tuesday 27 December 2016

UGC Net Computer Science Paper II Dec 12,Page 3 (Solve)

GC Net Computer Science Paper II Dec 12

21. Which API is used to draw a circle ?
(A) Circle ( )
(B) Ellipse ( )
(C) Round Rect ( )
(D) Pie ( )
Answer B
Explanation : In mathematics, an ellipse is a curve in a plane surrounding two focal points such that the sum of the distances to the two focal points is constant for every point on the curve. As such, it is a generalization of a circle.
22. In DML, RECONNCT command
cannot be used with
(A) OPTIONAL Set
(B) FIXED Set
(C) MANDATOR Set
(D) All of the above
Answer B
Explanation : The RECONNECT command can be used with both OPTIONAL and MANDATORY sets, but not with FIXED sets. The RECONNECT command moves a member record from one set instance to another set instance of the same set type. It cannot be used with FIXED sets because a member record cannot be moved from one set instance to another under the FIXED constraint.

Monday 26 December 2016

2-D Array Matrix Multiplication

2-D Array Matrix Multiplication Rule

  • Matrix a row must be same as Matrix B column
  • Each Cell of Matrix A multiply by each column of matrix B
2-D Array Matrix Multiplication Rule
Code : 


/*   #################################################
          Girfa : Student Help
          Multiplication of 2-d array
          for more program visit : http://girfahelp.blogspot.in/p/c-language-array-programming.html
     #################################################

Sunday 25 December 2016

UGC Net Computer Science Paper 1 December 12 , Page 1-Solved

UGC Net Computer Science Paper 1 December 12 , Page 1-Solved
1. The English word ‘Communication’ is derived from the words
(A) Communis and Communicare
(B) Communist and Commune
(C) Communism and Communalism
(D) Communion and Common sense
Answer : A

2. Chinese Cultural Revolution leader Mao Zedong used a type of communication to
talk to the masses is known as
(A) Mass line communication
(B) Group communication
(C) Participatory communication
(D) Dialogue communication
Answer : A