Computer Science and Application UGC-NET 2008 December Paper II - Q.37 - Q.50
37. An assembly program contains:
(A) Imperative and declarative statements
(B) Imperative statements and assembler directives
(C) Imperative and declarative statements as well as assembler directives
(D) Declarative statements and assembler directives
Ans:C.
Explanation: Assembly program consists of three types of statements. 1. Imperative 2. Declarative and 3. Assembler directives
38. In which addressing mode, the effective address of the operand is generated by adding a constant value to the contents of a register?
(A) Absolute mode (B) immediate mode
(C) indirect mode (D) index mode
Ans: D
39. Which of the following are Assembler directives?
(i) EQU (ii) ORIGIN (iii) START (iv) END
(A) (ii),(iii) and (iv) (B) (i),(iii) and (iv)
(B) (iii) and (iv) (D) (i),(ii),(iii) and (iv)
Ans: D
40. Which of the following OS treats hardware as a file system?
(A) UNIX (B) DOS
(C) Windows NT (D) none of the above
Ans: A.
41. In which of the following, ready to execute processes must be present in RAM?
(A) Multiprocessing (B) multiprogramming
(C) multitasking (D) all of the above
Ans: D
42. If the executing program size is greater than the existing RAM of a computer, it is still possible to execute the program if the OS supports:
(A) Multitasking (B) virtual memory
(C) paging system (D) none of the above
Ans: B
43. Software Quality Assurance (SQA) encompasses:
(A) Verification (B) validation
(C) both verification and validation (D) none of the above
Ans: C
44. Which level is called as “defined” in capability maturity model?
(A) Level 0 (B) level 3
(C) level 4 (D) level 1
Ans: B
45. COCOMO model is used for:
(A) Product quality estimation (B). product complexity estimation
(C) product cost estimation (D) all of the above
Ans: C
46. Font sizes are usually expressed in points. One point is:
(A) 0.0069 inch (B) 0.0138 inch
(C) 0.0207 inch (D) 0.0276 inch
Ans: B.
Explanation: One point is 1/72 of an inch and so we will get the answer 0.0138 inch.
47. Assertion (A): Cellular telephone systems can handle a multitude of users.
Reasoning(R ): Cellular telephone systems permit extensive frequency reuse in a small local area.
(A) Both (A) and (R ) are true and (R ) is the correct explanation for (A)
(B) Both (A) and (R ) are true but (R ) is not the correct explanation
(C) (A) is true but (R ) is false
(D) (A) is false but (R ) is true
Ans:A.
48. E-Commerce involves:
(A)Electronic Data Interchange (B) Electronic mail
(C) Electronic Bulletin boards (D) All of the above
Ans: D.
Explanation : E-commerce involves paperless transactions and usage of EDI(Electronic Data Interchange), electronic mail, bulletin boards, fax transmission and electronic fund transfers.
49. An example of a data mining algorithm which uses squared error score function is:
(A) CART algorithm (B) back propagation algorithm
(C) a priori algorithm (D) vector space algorithm
Ans: B.
Explanation: Back propagation algorithm uses squared error score function. CART algorithm uses cross-validated loss function.
50. (I) Each object in the active directory of windows 2000 has an access control list.
(II) The scheme is a blueprint of all objects in the domain of windows 2000. Which of the following is true?
(A) Only (I) (B) only (II) (C) both (I) and (II) (d) none of the above
Ans: C
37. An assembly program contains:
(A) Imperative and declarative statements
(B) Imperative statements and assembler directives
(C) Imperative and declarative statements as well as assembler directives
(D) Declarative statements and assembler directives
Ans:C.
Explanation: Assembly program consists of three types of statements. 1. Imperative 2. Declarative and 3. Assembler directives
38. In which addressing mode, the effective address of the operand is generated by adding a constant value to the contents of a register?
(A) Absolute mode (B) immediate mode
(C) indirect mode (D) index mode
Ans: D
39. Which of the following are Assembler directives?
(i) EQU (ii) ORIGIN (iii) START (iv) END
(A) (ii),(iii) and (iv) (B) (i),(iii) and (iv)
(B) (iii) and (iv) (D) (i),(ii),(iii) and (iv)
Ans: D
40. Which of the following OS treats hardware as a file system?
(A) UNIX (B) DOS
(C) Windows NT (D) none of the above
Ans: A.
41. In which of the following, ready to execute processes must be present in RAM?
(A) Multiprocessing (B) multiprogramming
(C) multitasking (D) all of the above
Ans: D
42. If the executing program size is greater than the existing RAM of a computer, it is still possible to execute the program if the OS supports:
(A) Multitasking (B) virtual memory
(C) paging system (D) none of the above
Ans: B
43. Software Quality Assurance (SQA) encompasses:
(A) Verification (B) validation
(C) both verification and validation (D) none of the above
Ans: C
44. Which level is called as “defined” in capability maturity model?
(A) Level 0 (B) level 3
(C) level 4 (D) level 1
Ans: B
45. COCOMO model is used for:
(A) Product quality estimation (B). product complexity estimation
(C) product cost estimation (D) all of the above
Ans: C
46. Font sizes are usually expressed in points. One point is:
(A) 0.0069 inch (B) 0.0138 inch
(C) 0.0207 inch (D) 0.0276 inch
Ans: B.
Explanation: One point is 1/72 of an inch and so we will get the answer 0.0138 inch.
47. Assertion (A): Cellular telephone systems can handle a multitude of users.
Reasoning(R ): Cellular telephone systems permit extensive frequency reuse in a small local area.
(A) Both (A) and (R ) are true and (R ) is the correct explanation for (A)
(B) Both (A) and (R ) are true but (R ) is not the correct explanation
(C) (A) is true but (R ) is false
(D) (A) is false but (R ) is true
Ans:A.
48. E-Commerce involves:
(A)Electronic Data Interchange (B) Electronic mail
(C) Electronic Bulletin boards (D) All of the above
Ans: D.
Explanation : E-commerce involves paperless transactions and usage of EDI(Electronic Data Interchange), electronic mail, bulletin boards, fax transmission and electronic fund transfers.
49. An example of a data mining algorithm which uses squared error score function is:
(A) CART algorithm (B) back propagation algorithm
(C) a priori algorithm (D) vector space algorithm
Ans: B.
Explanation: Back propagation algorithm uses squared error score function. CART algorithm uses cross-validated loss function.
50. (I) Each object in the active directory of windows 2000 has an access control list.
(II) The scheme is a blueprint of all objects in the domain of windows 2000. Which of the following is true?
(A) Only (I) (B) only (II) (C) both (I) and (II) (d) none of the above
Ans: C