U.G.C. NET Exam. June 2023 Paper-II (COMPUTER SCIENCE)

Total Questions: 80

1. Given below are two statements: one is labelled as Assertion A and the other is labelled as Reason R.

Assertion A : Validity checks real need of system users
Reason R : Completeness checks system defined requirements.
In the light of the above statements, choose the correct answer from the options given below:

Correct Answer: (b) Both A and R are true but R is NOT the correct explanation of A
Solution:

Validity checks are essential to ensure that the system meets the real needs and requirements of the system users. Completeness checks are indeed about verifying that the system user-defined requirements are fully captured, but this doesn't directly explain the concept of validity checks. So, Assertion A and reason R both are correct but Reason R is not the correct explanation of Assertion A.

2. Consider the following statements about hea sort algorithm :

(A) The MAX-HEAPIFY procedure which runs in O lg(n) time, is the key to maintaining the max heap property.
(B) The BUILD-MAX-HEAP Procedure, which runs in O lg(n) time. Produces maxheap from an unordered input array.
(C) The MAX-HEAP-HEAP-INSERT, which runs in O (lg n) time, implements the insertion operation.
(D) The HEAP-INCREASE-KEY procedure runs in O (nlg n) time, to set the key of new node of its correct value.
Choose the correct answer from the options given below :

Correct Answer: (b) A, C only
Solution:

Analyze the statements :
(A) The MAX-HEAPIFY procedure, which runs in O(lgn) time, is the key to maintaining the max-heap property. So, the statement (A) is correct.
(B) The BUILD- MAX-HEAP procedure, which runs in linear time, produces a max-heap from an unordered input array. So, the statement (B) is incorrect.
(C) The MAX-HEAP-INSERT, HEAP-EXTRACTMAX, HEAP-INCREASE - KEY, and HEAPMAXIMUM procedures, which run in O(lgn) time, allow the heap data structure to be used as a priority queue. So, the statement (C) is correct and statement
(D) is incorrect.

3. Answer the following question

Correct Answer: (a) {1, 4}
Solution:

4. Let (Z, +) denote the group of all integers under addition. Then the number of all automorphisms of (Z, +) is

Correct Answer: (b) 2
Solution:

The number of automorphisms of the group of integers under addition is 2. One is identity automorphism and other is the negation automorphism.

5. Match List I with List II

Correct Answer: (d) A-I B-III C-II D-IV
Solution:

6. Which of the following is used to determine the cost performance index?

Correct Answer: (c) Budgeted cost of work performed ÷ Actual cost of work performed
Solution:

7. ______ is intended to show that a system both conforms to its specifications and meets the expectation of the system customer.

Correct Answer: (d) Software validation
Solution:

Software validation is the process of ensuring that a software system meets the requirement and specifications of its intended users or stakeholders. It involves evaluating the software at the end of the development process to determine whether it satisfies the specified requirements and functions correctly in its intended environment. validation ensures that software fulfills its intended purpose and delivers value to the users.

8. A TCP server application is programmed to listen on port P on host S. A TCP client is connected to the TCP server over the network. Consider that while TCP connection is active the server is crashed and rebooted. Assume that the client does not use TCP keepalive timer.

Which of the following behavior is are possible?
Statement I : The TCP application server on S can listen on P after reboot.
Statement II : If client sends a packet after the server reboot, it will receive the RST segment. In the light of the above statements, choose the correct answer from the options given below.

Correct Answer: (a) Both statement I and Statement II are true
Solution:

The TCP application server on S can listen on P after reboot. when a server crashes and reboots, it loses its existing connections but can start listening on the same port again once its back online. If client sends a packet offer the server reboot. it will receive the RST segment. When the server reboots., its TCP stack might send a RST segment to any incoming packets from the client, indicating that connection is no longer valid. So, the both statement I and II are true.

9. Given below statements: one is labelled as Assertion A and the other is labelled as Reason R.

Assertion A : I/O protection is ensured by a hardware trap
Reason R : I/O interrupt caused by the condition like I/O completion and device malfunction occurring within the I/O devices
In the light of the above statements, choose the correct answer from the options given below.

Correct Answer: (d) A is false but R is true
Solution:

Assertion A is false because I/O protection is typically ensured by operating system mechanisms such as memory protection and privilege levels, rather than hardware traps. Reason R is true. I/O interrupts can indeed occur due to conditions like I/O completion and device malfunction, but they are handled by the operating system rather than being directly related to hardware traps.

10. Match List I with List II

Correct Answer: (c) A-III B-IV C-I D-II
Solution: