U.G.C. NET Exam. June, 2020 Paper II (COMPUTER SCIENCE & APPLICATIONS)

Total Questions: 100

51. Which of the following is/are behaviroral testing technique(s) ?

(A) Equivalence partitioning
(B) Graph Based Testing Method
(C) Boundary Value Analysis
(D) Data Flow Testing
(E) Loop Testing
Choose the correct answer from the options given below: 

Correct Answer: (b) (A), (B) and (C) only
Solution:

Black- box testing, also known as behavioral testing, focuses on the software's, functional specifications. In other words, black - box testing allows a software developer to create sets of input conditions that completely exercise all of a program's functional requirements. The methods for behavioral testing are as follows.
(1) graph -based testing methods
(2) Equivalence partitioning
(3) boundary value analysis
(4) Comparison testing
(5) orthogonal array testing

52. The running time of an algorithm is 0(g(n)) if and only if

(A) its worst-case running time is 0(g(x)) and its best case running time is Ω(g(n)).(0 = big 0) (B) its worst-case running time is Ω(g(n)) and its best-case running time is 0 (g(n)).(0 = big 0)
(C) 0(g(n)) = Ω(g()n)(0 = big 0)
(D) 0(g(n)) ∩ ω(g(n)) is non-empty set. (o = small o)
Choose the correct answer from the options given below: 

Correct Answer: (a) (A) only
Solution:

(A) its worst - case running time is O(g(n)) and its best - case running time is
Ω(g(n)). ( O= big O) → True.
Big - oh (O) denotes upper bound or worst case.
Big- omega (Ω) denotes lower bound or best case.
Big - Theta (θ) denotes Average bound or average case.
(B) its worst - case running time is Ω (g(n)) and its bestcase running time is O(g(n)). (O = big O)
false, worst case should be Big-oh and best case should be big - omega.
(C) O (g(n)) = Ω (g(n)) (O= big O) False, cannot cover Big Omega.
(D) O (g(n)) ∩ ω(g(n)) is non-empty set (0 = Small O) false, no such f(n) Exists, i.e. the inter section is indeed the Empty set.

53. Consider the following statements:

(A) Any tree is 2-colorable
(B) A graph G has no cycles of even length it it is bipartite.
(C) A graph G is 2-colorable if is bipartite.
(D) A graph G can be colored with d+1 color if d if the maximum degree of any vertex in the graph G.
(E) A graph G can be colored with O(log |v|) colors if it has O(|v|) edges.
Choose the correct answer from the options given below. 

Correct Answer: (c) (B) and (E) incorrect
Solution:

Any tree is 2- Colourable. True every tree is no loops and a bipartite graph with chromatic number 2. odd levels coloured with one colour and even level coloured with another colour.
• A graph G has no cycles of even length if it is bipartite. false.
• A graph G is 2- Colourable it is bipartite True. A graph K (2,3) set of V1 vertices coloured with one colour and set of V2 vertices Coloured with another colour.
• A graph G can be colour with d+1 colours if d is the maximum degree of any vertex in the graph G. True as the vertex of degree d means it is adjacent to vertices
Hence need a d + 1 different colours required.
• A graph G can be coloured with O(log|v|) Colours if it has O |v| degrees. false as kn has O (n ∧ 2) edges with Chromatic number n So it needs O (√v) Colours.

54. Which among the following statement is (are) true?

(A) A hash function takes a massage of arbitrary length and generates a fixed length code.
(B) A hash function takes a massage if fixed length and generates a code of variable length.
(C) A hash function may give same hash value for distinct massages.
Choose the correct answer from the options given below: 

Correct Answer: (c) (A) and (C) only
Solution:

A Hash function H accepts a variable - length block of data M as input and produces a fixed - size has value h = H (M) In general terms, the principal object of a hash function is data integrity. A change to any bit or bits in m results, with high Probability in a change to the has code.

55. Answer the following question

Correct Answer: (d) (A), (B) and (C)
Solution:

* D = dicidable
*UD = undecidable
According to the above table, rows 3, 4 and 8 it's undecidable.
Hence, the correct answer is (a), (b) and (c).

56. Consider the following languages.

Correct Answer: (d)
Solution:

57. Which of the following grammars in (are) ambiguous ?

(A) s → ss |asb|bsa| λ
(B) s → asbs |bsas| λ
(C) s → aAB
A → bBb
B → A|λ Where λ denotes empty string
Choose the correct answer from the options given below :

Correct Answer: (d) (A) and (B) only
Solution:

• A is ambiguous because λ can be generate using leftmost derivation having two different parse trees with an empty string.


Hence the correct answer is (A) (B) and (C).

58. Which of the following cloud concepts is/are related to pooling and sharing of resources?

(A) Virtual Memory
(B) Service
(C) Virtualization
Choose the correct answer from the options given below: 

Correct Answer: (a) (C) only
Solution:

Virtualization is a technique where multiple operating systems run simultanenously on a single machine virtually.
These machine can be accessed remotely by different users at the same time. Here, the same hardware like memory and CPU are utilized by all the operating systems in a systematic manner.

59. Post Office Protocol (POP) is a massage access protocol which is used to extract message for client. In this regard, which of the following are true ?

(A) POP has two modes, Delete mode and keep
(B) In Delete mode, mail is deleted from mail box after each retrieval.
(C) In Delete mode, mail is deleted from mail box before each retrieval.
(D) In keep mode, mail is deleted before retrieval.
(E) In keep mode, mail remains in mail box after retrieval.
Choose the correct answer form the option given below: 

Correct Answer: (d) (A), (B) and (E) only
Solution:

Statement A :- TRUE-
Post office protocol (POP) is a type of computer networking and Internet standard protocol that has modes, delete mode and keep mode.
Statement -B (TRUE)- In delete mode the mail is deleted from the mail box after each retrieval.
Statement E:- (TRUE) In keep made, mail remains in a mail box after retrieval.
Note:- Delete mode (delete after reading) keep mode (stores ever after reading).

60. Firewall is a device that filters access to the protected network from the outside network. Firewalls can filter the packets on the basis of

(A) Source IP Address
(B) Destination IP Address
(C) TCP Source port
(D) UDP Source port
(E) TCP Destination port
Choose the correct answer from the option given below:

Correct Answer: (d) (A), (B), (C), (D) and (E) only
Solution:

Network layer firewall can filter on source and destination IP address source and Destination port no for both TCP and UDP packet.
• Firewall :- A firewall is a from of cyber security device that filters networks traffic. Network nodes can be separated from external traffic source, Internal traffic sources or even individual applications using firewall.