Friday, 9 December 2016

UGC-NET JULY 2016 PAPER 2 QUESTIONS

UGC-NET JULY 2016 PAPER 2 QUESTIONS



Q::21. Consider the following binary search tree :

 If we remove the root node, which of the node from the left subtree will be the new root ?
(1) 11                               (2) 12
(3) 13                               (4) 16

Answer:: (4)

Q::22. Consider the following operations performed on a stack of size 5 : Push (a); Pop() ; Push(b); Push(c); Pop(); Push(d); Pop();Pop(); Push (e)

Which of the following statements is correct ?

(1) Underflow occurs

(2) Stack operations are performed smoothly

(3) Overflow occurs

(4) None of the above

Answer:: (2)

Q::23. Suppose you are given a binary tree with n nodes, such that each node has exactly either zero or two children. The maximum height of the tree will be

 (1)n/2–1                          (2)n/2+ 1
 (3) (n – 1)/2                    (4) (n + 1)/2

Answer::(3)

Q::24. Which of the following is not an inherent application of stack ?

(1) Implementation of recursion

(2) Evaluation of a postfix expression

(3) Job scheduling

(4) Reverse a string

Answer::(3)

Q::25. In how many ways can the string
                            A ∩ B – A ∩ B – A
 be fully parenthesized to yield an infix expression ?

(1) 15                  (2) 14
(3) 13                  (4) 12

Answer::(2)

Q::26. A multiplexer combines four 100-Kbps channels using a time slot of 2 bits. What is the bit rate ?

(1) 100 Kbps                    (2) 200 Kbps
(3) 400 Kbps                    (4) 1000 Kbps

Answer::(3)

Q::27. In a fully-connected mesh network with 10 computers, total ______ number of cables are required and ______ number of ports are required for each device.

(1) 40, 9                    (2) 45, 10
(3) 45, 9                    (4) 50, 10

Answer::(3)

Q::28. In TCP/IP Reference model, the job of _______ layer is to permit hosts to inject packets into any network and travel them independently to the destination.

(1) Physical                      (2) Transport
(3) Application                 (4) Host-to-network

Answer:: Marks to All

Q::29. If there are N people in the world and are using secret key encryption/decryption for privacy purpose, then number of secret keys required will be :

(1) N                                  (2) (N – 1)
(3) N(N – 1)/2                     (4) N(N + 1)/2

Answer::(3)

Q::30. Optical fiber uses reflection to guide light through a channel, in which angle of incidence is ________ the critical angle.

(1) equal to                               (2) less than
(3) greater than                        (4) less than or equal to

Answer::(3)

                                                           1 2 3 4 5 

No comments:

Post a Comment