Saturday 14 January 2017
UGC Net Computer Science Paper 1 December 12 , Page 4-Solved
A programmer and Founder of Girfa
IT Services, working from 2009.At Starting computer teaching was my full-time job but after 10 years of teaching I chose to programming as a full-time job and teaching become part-time. In real life, I am very lazy and I made it my coding style I always try to make a reusable component that’s my USP for programming which saves my time and extra working both.
UGC Net Computer Science Paper 1 December 12 , Page 3-Solved
A programmer and Founder of Girfa
IT Services, working from 2009.At Starting computer teaching was my full-time job but after 10 years of teaching I chose to programming as a full-time job and teaching become part-time. In real life, I am very lazy and I made it my coding style I always try to make a reusable component that’s my USP for programming which saves my time and extra working both.
Friday 13 January 2017
UGC Net Computer Science December-12 Paper 3 Page 3 Solved
UGC Net Computer Science December-12 Paper 3 Page 3 Solved
21. How many solutions do the following equation have
x1 + x2 + x3 = 11
where x1 ≥ 1, x2 ≥ 2, x3 ≥ 3
(A) C(7, 11)
(B) C(11, 3)
(C) C(14, 11)
(D) C(7, 5)
Answer D
Explanation :-
we can solve this problem by combinition with repetition.
so we need to put 11 similar balls into x1,x2,x3 types of boxes.
different number of boxes are 3=n
x1≥1, x2≥2, x3≥3 now allocate 1,2,3 from 11 directly . so remaining ball = 11-(1+2+3) = 5 =k
(n+k-1)Ck = (3+5-1)C5 =7C5
A programmer and Founder of Girfa
IT Services, working from 2009.At Starting computer teaching was my full-time job but after 10 years of teaching I chose to programming as a full-time job and teaching become part-time. In real life, I am very lazy and I made it my coding style I always try to make a reusable component that’s my USP for programming which saves my time and extra working both.
January 2016 M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN
January 2016 M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN (Solved)
PART ONE
(Answer all the questions)
1. Each question below gives a multiple choice of answers. Choose the most appropriate one and enter in the “OMR” answer sheet supplied with the question paper, following instructions therein. (1x10)
1.1 Protocols are
A) Agreements on how communication components and DTE's are to communicate
B) Logical communication channels for transferring data
C) Physical communication channels sued for transferring data
1.2 Which data communication method is used to transmit the data over a serial communication
link?
A) Simplex
B) Half-duplex
C) Full duplex
A programmer and Founder of Girfa
IT Services, working from 2009.At Starting computer teaching was my full-time job but after 10 years of teaching I chose to programming as a full-time job and teaching become part-time. In real life, I am very lazy and I made it my coding style I always try to make a reusable component that’s my USP for programming which saves my time and extra working both.
Wednesday 11 January 2017
UGC Net Computer Science December-12 Paper 3 Page 2
UGC Net Computer Science December-12 Paper 3 Page 2 Solved
11. The time complexities of some standard graph algorithms are given.Match each algorithm with its time complexity ? (n and m are no. of nodes and edges respectively)
a. Bellman Ford algorithm 1. O (m log n)
b. Kruskals algorithm 2. O (n3)
c. Floyd Warshall algorithm 3. O(mn)
d. Topological sorting 4. O(n + m)
Codes :
a b c d
(A) 3 1 2 4
(B) 2 4 3 1
(C) 3 4 1 2
(D) 2 1 3 4
Answer A
A programmer and Founder of Girfa
IT Services, working from 2009.At Starting computer teaching was my full-time job but after 10 years of teaching I chose to programming as a full-time job and teaching become part-time. In real life, I am very lazy and I made it my coding style I always try to make a reusable component that’s my USP for programming which saves my time and extra working both.
Monday 9 January 2017
UGC Net Computer Science December-12 Paper 3
UGC Net Computer Science December-12 Paper 3 (Solved)
1. Eco system is a Frame work for
(A) Building a Computer System
(B) Building Internet Market
(C) Building Offline Market
(D) Building Market
Answer B
Explanation :
A digital ecosystem is a distributed, adaptive, open socio-technical system with properties of self-organisation, scalability and sustainability inspired from natural ecosystems. Digital ecosystem models are informed by knowledge of natural ecosystems, especially for aspects related to competition and collaboration among diverse entities. The term is used in the computer industry, the entertainment industry, and the World Economic Forum.
A programmer and Founder of Girfa
IT Services, working from 2009.At Starting computer teaching was my full-time job but after 10 years of teaching I chose to programming as a full-time job and teaching become part-time. In real life, I am very lazy and I made it my coding style I always try to make a reusable component that’s my USP for programming which saves my time and extra working both.
VLC crashed on window
A programmer and Founder of Girfa
IT Services, working from 2009.At Starting computer teaching was my full-time job but after 10 years of teaching I chose to programming as a full-time job and teaching become part-time. In real life, I am very lazy and I made it my coding style I always try to make a reusable component that’s my USP for programming which saves my time and extra working both.
Sunday 8 January 2017
UGC Net Computer Science Paper 1 December 12 , Page 2-Solved
UGC Net Computer Science Paper 1 December 12 , Page 2-Solved
11. The sum of the ages of two persons A and B is 50. 5 years ago, the ratio of their ages was 5/3. The present age of A and B are
(A) 30, 20
(B) 35, 15
(C) 38, 12
(D) 40, 10
Answer A
Explanation :-
Answer A
Explanation :-
Equations:
a + b = 50
(a-5)/(b-5) = 5/3
-------
For solve this expression we need to change a with b
a = 50-b
(50-b-5)/(b-5) = 5/3
----
3(45-b) = 5(b-5)
135 - 3b = 5b - 25
8b = 160
b = 20
Then a = 30
a + b = 50
(a-5)/(b-5) = 5/3
-------
For solve this expression we need to change a with b
a = 50-b
(50-b-5)/(b-5) = 5/3
----
3(45-b) = 5(b-5)
135 - 3b = 5b - 25
8b = 160
b = 20
Then a = 30
12. Let a means minus (–), b means multiplied by (x), C means divided by (/) and D means plus (+). The value of 90 D 9 a 29 C 10 b 2 is
(A) 8
(B) 10
(C) 12
(D) 14
Answer Incorrect
Explanation :-
a = -
b = *
c = /
d = +
90 D 9 a 29 C 10 b 2
90 + 9 - 29 / 10 * 2
90+9-2.9*2
90+9-5.8
93.2
Answer Incorrect
Explanation :-
a = -
b = *
c = /
d = +
90 D 9 a 29 C 10 b 2
90 + 9 - 29 / 10 * 2
90+9-2.9*2
90+9-5.8
93.2
A programmer and Founder of Girfa
IT Services, working from 2009.At Starting computer teaching was my full-time job but after 10 years of teaching I chose to programming as a full-time job and teaching become part-time. In real life, I am very lazy and I made it my coding style I always try to make a reusable component that’s my USP for programming which saves my time and extra working both.
Friday 6 January 2017
Write a program to check whether a number is perfect or not ?
Question : Write a program to check whether a number is perfect or not ?
(A number said to be perfect if sum of all factor less than given number then equal to given number)
Input : 6
Output : Perfect Number
Input : 6
Output : Perfect Number
A programmer and Founder of Girfa
IT Services, working from 2009.At Starting computer teaching was my full-time job but after 10 years of teaching I chose to programming as a full-time job and teaching become part-time. In real life, I am very lazy and I made it my coding style I always try to make a reusable component that’s my USP for programming which saves my time and extra working both.
Write a program to check whether given number is Magic or not?
Question : Write a program to check whether given number is Magic or not?
A Magic number said to be a magic when we add each digit until its reached less than 10 after that if value is 1 then number is Magic.
Example :
28 = 2+8
=10
10= 1+0
=1
A programmer and Founder of Girfa
IT Services, working from 2009.At Starting computer teaching was my full-time job but after 10 years of teaching I chose to programming as a full-time job and teaching become part-time. In real life, I am very lazy and I made it my coding style I always try to make a reusable component that’s my USP for programming which saves my time and extra working both.
Write a program to find the following pattern ?
Question : Write a program to find the following pattern?
input : Ashok Kumar Yadav
Output: A.K. Yadav
Output: A.K. Yadav
A programmer and Founder of Girfa
IT Services, working from 2009.At Starting computer teaching was my full-time job but after 10 years of teaching I chose to programming as a full-time job and teaching become part-time. In real life, I am very lazy and I made it my coding style I always try to make a reusable component that’s my USP for programming which saves my time and extra working both.
Write a program that accept two string one for main string and second string will store some word and remove this word form main string?
Question : Write a program that accept two string one for main string and second string will store some word and remove this word form main string?
Input : ram is a good boy
Search string : ram good
Output : is a boy
Solution :
import java.util.*;
A programmer and Founder of Girfa
IT Services, working from 2009.At Starting computer teaching was my full-time job but after 10 years of teaching I chose to programming as a full-time job and teaching become part-time. In real life, I am very lazy and I made it my coding style I always try to make a reusable component that’s my USP for programming which saves my time and extra working both.
Write a program which accept input from user and print the word which has consecutive repeated Character?
Question : Write a program which accept input from user and print the word which has consecutive repeated Character?
Input : An apple is banana and banana is apple.
Output : apple,banana,banana,apple
Solution :
import java.util.*;
A programmer and Founder of Girfa
IT Services, working from 2009.At Starting computer teaching was my full-time job but after 10 years of teaching I chose to programming as a full-time job and teaching become part-time. In real life, I am very lazy and I made it my coding style I always try to make a reusable component that’s my USP for programming which saves my time and extra working both.
Write a program which accept input of full path of a file and produce following output?
Question : Write a program which accept input of full path of a file and produce following output?
Input : C:/Users/Public/Pictures/SamplePictures/Desert.jpg
Output :
Extension : jpg
File Name : Desert
Path : C:/Users/Public/Pictures/SamplePictures
Solution :
A programmer and Founder of Girfa
IT Services, working from 2009.At Starting computer teaching was my full-time job but after 10 years of teaching I chose to programming as a full-time job and teaching become part-time. In real life, I am very lazy and I made it my coding style I always try to make a reusable component that’s my USP for programming which saves my time and extra working both.
Tuesday 3 January 2017
UGC Net Computer Science Paper II Dec 12,Page 5 (Solve)
41. Enumeration is a process of
(A) Declaring a set of numbers
(B) Sorting a list of strings
(C) Assigning a legal values possible for a variable
(D) Sequencing a list of operators
Answer C
Explanation : Enumeration is a special datatype which provide an integer number sequence to its member which help to track some common properties with meaning full name instead of number like color names
42. Which of the following mode declaration is used in C++ to open a file for input ?
(A) ios : : app
(B) in : : ios
(C) ios : : file
(D) ios : : in
Answer D
Explanation : ios::in allows input (read operations) from a stream.ios::out allows output (write operations) to a stream.
43. Data Encryption Techniques are particularly used for ______.
(A) protecting data in Data Communication System.
(B) reduce Storage Space Requirement.
(C) enhances Data Integrity.
(D) decreases Data Integrity.
Answer A
Explanation : when we send our data through public network then eavesdropping risk become high So we need some technique which increase security when data is send through public network.
Data encryption translates data into another form, or code, so that only people with access to a secret key (formally called a decryption key) or password can read it. Encrypted data is commonly referred to as ciphertext, while unencrypted data is called plaintext. Currently, encryption is one of the most popular and effective data security methods used by organizations. Two main types of data encryption exist - asymmetric encryption, also known as public-key encryption, and symmet
44. Let L be a set accepted by a non deterministic finite automaton. The number of states in non-deterministic finite automaton is |Q|. The maximum number of states in equivalent finite automaton that accepts L is
(A) |Q|
(B) 2|Q|
(C) 2|Q| – 1
(D) 2|Q|
Answer D
Explanation :In NFA there may be possibility to more than one state transition but in DFA state transition is single direction so about this question if NFA is |Q| then DFA may have 2|Q| state over this type of NFA.
45. What is the result of the following expression ?
(1 & 2) + (3 & 4)
(A) 1
(B) 3
(C) 2
(D) 0
Answer D
Explanation :& is bitmap compare a number at binary level from right to left and operator which return true when all operand is true otherwise false so after evaluate the given expression result become false .
46. Back propagation is a learning technique that adjusts weights in the neural network by propagating weight changes.
(A) Forward from source to sink
(B) Backward from sink to source
(C) Forward from source to hidden nodes
(D) Backward from since to hidden nodes
Answer B
47. Match the following :
a. TTL 1. High fan out
b. ECL 2. Low propagation delay
c. CMOS 3. High power dissipation
Code :
a b c
(A) 3 2 1
(B) 1 2 3
(C) 1 3 2
(D) 3 1 2
Answer A
Explanation :
a.TTL draws more power => 3
(A) Declaring a set of numbers
(B) Sorting a list of strings
(C) Assigning a legal values possible for a variable
(D) Sequencing a list of operators
Answer C
Explanation : Enumeration is a special datatype which provide an integer number sequence to its member which help to track some common properties with meaning full name instead of number like color names
42. Which of the following mode declaration is used in C++ to open a file for input ?
(A) ios : : app
(B) in : : ios
(C) ios : : file
(D) ios : : in
Answer D
Explanation : ios::in allows input (read operations) from a stream.ios::out allows output (write operations) to a stream.
43. Data Encryption Techniques are particularly used for ______.
(A) protecting data in Data Communication System.
(B) reduce Storage Space Requirement.
(C) enhances Data Integrity.
(D) decreases Data Integrity.
Answer A
Explanation : when we send our data through public network then eavesdropping risk become high So we need some technique which increase security when data is send through public network.
Data encryption translates data into another form, or code, so that only people with access to a secret key (formally called a decryption key) or password can read it. Encrypted data is commonly referred to as ciphertext, while unencrypted data is called plaintext. Currently, encryption is one of the most popular and effective data security methods used by organizations. Two main types of data encryption exist - asymmetric encryption, also known as public-key encryption, and symmet
44. Let L be a set accepted by a non deterministic finite automaton. The number of states in non-deterministic finite automaton is |Q|. The maximum number of states in equivalent finite automaton that accepts L is
(A) |Q|
(B) 2|Q|
(C) 2|Q| – 1
(D) 2|Q|
Answer D
Explanation :In NFA there may be possibility to more than one state transition but in DFA state transition is single direction so about this question if NFA is |Q| then DFA may have 2|Q| state over this type of NFA.
45. What is the result of the following expression ?
(1 & 2) + (3 & 4)
(A) 1
(B) 3
(C) 2
(D) 0
Answer D
Explanation :& is bitmap compare a number at binary level from right to left and operator which return true when all operand is true otherwise false so after evaluate the given expression result become false .
(01 & 10) + (011
& 100)
0+0=0
46. Back propagation is a learning technique that adjusts weights in the neural network by propagating weight changes.
(A) Forward from source to sink
(B) Backward from sink to source
(C) Forward from source to hidden nodes
(D) Backward from since to hidden nodes
Answer B
47. Match the following :
a. TTL 1. High fan out
b. ECL 2. Low propagation delay
c. CMOS 3. High power dissipation
Code :
a b c
(A) 3 2 1
(B) 1 2 3
(C) 1 3 2
(D) 3 1 2
Answer A
Explanation :
a.TTL draws more power => 3
b. ECL has highest speed ; Hence it must have lowest propagation delay =>2
c. CMOS has high fan out =>1
48. ______ is an “umbrella” activity that is applied throughout the software engineering process.
.(A) Debugging
(B) Testing
(C) Designing
(D) Software quality assurance
Answer D
Explanation :
Explanation :
The umbrella activities in a software development life cycle process include the following:
- Software Project Management
- Formal Technical Reviews
- Software Quality Assurance
- Software Configuration Management
- Re-usability Management
- Risk Management
- Measurement and Metrics
49. Identify the operation which is commutative but not associative ?
(A) OR
(B) NOR
(C) EX-OR
(D) NAND
Answer D
Explanation :
1)Every logic gate follows Commutative law.
2)AND,OR,Ex-OR,EX-NOR follows Associative law. NAND,NOR doesn`t follow Associative law.
3)AND ,OR follows Distributive law.Ex-OR,EX-NOR,NAND,NOR doesn`t follow Distributive law.AND operation only distributive on EX-OR operation no other operation is distributive including itself.
50. Given a Relation POSITION (Posting-No, Skill), then query to retrieve all distinct pairs of posting-nos. requiring skill is
(A) Select p.posting-No, p.posting-No from position p
where p.skill = p.skill and p.posting-No < p.posting-No
(B) Select p1.posting-No, p2.posting-No from position p1, position p2
where p1.skill = p2.skill
(C) Select p1.posting-No, p2.posting-No from position p1, position p2
where p1.skill = p2.skill and p1.posting-No < p2.posting-No
(D) Select p1.posting-No, p2.posting-No from position p1, position p2
where p1.skill = p2.skill and p1.posting-No = p2.posting-No
Answer C
A programmer and Founder of Girfa
IT Services, working from 2009.At Starting computer teaching was my full-time job but after 10 years of teaching I chose to programming as a full-time job and teaching become part-time. In real life, I am very lazy and I made it my coding style I always try to make a reusable component that’s my USP for programming which saves my time and extra working both.
Friday 30 December 2016
CCC Fundamental and Word MCQ/True-False Solve
CCC TEST PAPER
Fundamental and Word
Time: 1HRS M
M: 50 MARK
Objective Question:
1. sesitive device that convert printed material
into its equivalent digital form
(A)scanner
(B)ocr
( C)a and b
(D)None of these
2.The basic architecture for
digital computer was developed by
(A)Bill Gates
(B)Charles Babbage
( C)John Von Neumann
(D)Garden Moore
A programmer and Founder of Girfa
IT Services, working from 2009.At Starting computer teaching was my full-time job but after 10 years of teaching I chose to programming as a full-time job and teaching become part-time. In real life, I am very lazy and I made it my coding style I always try to make a reusable component that’s my USP for programming which saves my time and extra working both.
Wednesday 28 December 2016
UGC Net Computer Science Paper II Dec 12,Page 4 (Solve)
31. Basis path testing falls under
(A) system testing
(B) white box testing
(C) black box testing
(D) unit testing
Answer : B
Explanation : The basis path testing is same, but it is based on a white box testing method, that defines test cases based on the flows or logical path that can be taken through the program. Basis path testing involves execution of all possible blocks in a program and achieves maximum path coverage with least number of test cases. It is a hybrid of branch testing and path testing methods.
The objective behind basis path testing is that it defines the number of independent paths, thus the number of test cases needed can be defined explicitly (maximizes the coverage of each test case).
int a,b;
for(a=1,b=2;a<=10;a++)
printf("\n%d",a*b);Basis Path Testing Diagram
32. The User Work Area (UWA) is a set of Program variables declared in the host program to communicate the contents of individual records between
(A) DBMS & the Host record(B) Host program and Host record
(C) Host program and DBMS
(D) Host program and Host language
Answer : C
Explanation :A set of program variables, declared in the host program, to communicate the contents of individual records between the DBMS and the host program.
For each record type in the database schema, a corresponding program variable with the same format should be declared in the host program.
A programmer and Founder of Girfa
IT Services, working from 2009.At Starting computer teaching was my full-time job but after 10 years of teaching I chose to programming as a full-time job and teaching become part-time. In real life, I am very lazy and I made it my coding style I always try to make a reusable component that’s my USP for programming which saves my time and extra working both.
Tuesday 27 December 2016
UGC Net Computer Science Paper II Dec 12,Page 3 (Solve)
21. Which API is used to draw a circle ?
(A) Circle ( )
(B) Ellipse ( )
(C) Round Rect ( )
(D) Pie ( )
Answer B
Explanation : In mathematics, an ellipse is a curve in a plane surrounding two focal points such that the sum of the distances to the two focal points is constant for every point on the curve. As such, it is a generalization of a circle.
22. In DML, RECONNCT command
cannot be used with
(A) OPTIONAL Set
(B) FIXED Set
(C) MANDATOR Set
(D) All of the above
Answer B
Explanation : The RECONNECT command can be used with both OPTIONAL and MANDATORY sets, but not with FIXED sets. The RECONNECT command moves a member record from one set instance to another set instance of the same set type. It cannot be used with FIXED sets because a member record cannot be moved from one set instance to another under the FIXED constraint.
A programmer and Founder of Girfa
IT Services, working from 2009.At Starting computer teaching was my full-time job but after 10 years of teaching I chose to programming as a full-time job and teaching become part-time. In real life, I am very lazy and I made it my coding style I always try to make a reusable component that’s my USP for programming which saves my time and extra working both.
Monday 26 December 2016
2-D Array Matrix Multiplication
2-D Array Matrix Multiplication Rule
- Matrix a row must be same as Matrix B column
- Each Cell of Matrix A multiply by each column of matrix B
Code :
/* #################################################
Girfa : Student Help
Multiplication of 2-d array
for more program visit :
http://girfahelp.blogspot.in/p/c-language-array-programming.html
#################################################
A programmer and Founder of Girfa
IT Services, working from 2009.At Starting computer teaching was my full-time job but after 10 years of teaching I chose to programming as a full-time job and teaching become part-time. In real life, I am very lazy and I made it my coding style I always try to make a reusable component that’s my USP for programming which saves my time and extra working both.
Sunday 25 December 2016
UGC Net Computer Science Paper 1 December 12 , Page 1-Solved
1. The English word ‘Communication’ is derived from the words
(A) Communis and Communicare
(B) Communist and Commune
(C) Communism and Communalism
(D) Communion and Common sense
Answer : A
2. Chinese Cultural Revolution leader Mao Zedong used a type of communication to
talk to the masses is known as
(A) Mass line communication
(B) Group communication
(C) Participatory communication
(D) Dialogue communication
Answer : A
(A) Communis and Communicare
(B) Communist and Commune
(C) Communism and Communalism
(D) Communion and Common sense
Answer : A
2. Chinese Cultural Revolution leader Mao Zedong used a type of communication to
talk to the masses is known as
(A) Mass line communication
(B) Group communication
(C) Participatory communication
(D) Dialogue communication
Answer : A
A programmer and Founder of Girfa
IT Services, working from 2009.At Starting computer teaching was my full-time job but after 10 years of teaching I chose to programming as a full-time job and teaching become part-time. In real life, I am very lazy and I made it my coding style I always try to make a reusable component that’s my USP for programming which saves my time and extra working both.
Subscribe to:
Posts (Atom)