forum_image

Discussion Forum

Interative Forum for discussing any query literally to UGC-NET Computer Science, GATE Computer Science and Computer Sciene and Technology in general.

ugc_net image

UGC-NET Computer Science

Correspondence Courses and Test Series to prepare for UGC-NET computer science and applications

GATE image

GATE

MCQs, Lecture Notes, Ebooks for GATE preparation

freestuff image
jobs image

Jobs Newsfeed

Timely information of various Recruitments.

NextPrev

Solved Questions Paper-2 UGC-NET Computer Science June 2015

21.Consider the given graph:

Its Minimurn Cost Spanning Tree is --------
A.
B.
C.
D.
View/Hide Ans
Explanation
22.22: The inorder and preorder Traversal of binary Tree are dbeafcg and abdecfg respectively.The post order traversal is ------
A.dbefacg
B.debfagc
C.dbefcga
D.debfgca
View/Hide Ans
Explanation
23.Level order Traversal of a rooted Tree can be done by starting from root and performing -
A.Breadth First Search
B.Depth first search
C.Root search
D.Deep search
View/Hide Ans
Explanation
24.The average case occurs in the Linear Search Algorithm when :
A.The item to be searched is in some where middle of the Array
B.The item to be searched is not in the array
C.The item to be searched is in the last of the array
D.The item to be searclred is either in the last or not in the array
View/Hide Ans
Explanation
25.To determine the efficiency of an algorithm the time factor is measured by
A.Counting micro seconds
B.Counting number of key operations
C.Counting number of statement
D.Counting kilobytes of algorithm
View/Hide Ans
Explanation
26.Which of the following protocols is an application layer protocol that establishes, manages and terminates multimedis sessions?
A.Session Maintenance Protocol
B.Real - time Streaming Protocol
C.Real - time Transport Control Protocol
D.Session Initiation Protocol
View/Hide Ans
Explanation
27.Match the following port numbers with their uses :
List-I List-II
(a) 23 (i) World wide web
(b) 25 (ii) Remote Login
(c) 80 (iii) USENET news
(d) 119 (iv) Email

(a) (b) (c) (d)
A.(iv) (i) (ii) (iii)
B.(ii) (i) (iv) (iii)
C.(ii) (iv) (iii) (i)
D.(ii) (iv) (i) (iii)
View/Hide Ans
Explanation
28.Which of the following is not associated with the session layer ?
A.Dialog control
B.Token management
C.Semantics of the information transmitted
D.Synchronization
View/Hide Ans
Explanation
29. What is the size of the'total length' field in IPv 4 datagram ?
A.4 bits
B.8 bits
C.16 bits
D.32 bits
View/Hide Ans
Explanation
30.Which of the following isf are restriction(s) in classless addressing ?
A.The number of addresses needs to be a power of 2.
B.The mask needs to be included in the address to define the block.
C.The starting address must be divisible by lhe number of addresses in the block.
D.All of the above
View/Hide Ans
Explanation


Author Does Not claim of any answer these answers are as per expert opinion


Pages: 1 2 3 4 5