• Courses
  • Tutorials
  • Jobs
  • Practice
  • Contests

NTA UGC NET 2019 June - II

Question 1

Match List-I with List-II List-I                          List-II (a) p → q                (i) ¬(q → ¬p) (b) p v q                   (ii) p ∧ ¬q (c) p ∧ q                  (iii) ¬p → q (d) ¬(p → q)            (iv) ¬p v q Choose the correct option from those given below:
  • a-ii,b-iii,c-i,d-iv
  • a-ii,b-i,c-iii,d-iv
  • a-iv,b-i,c-iii,d-ii
  • a-iv,b-iii,c-i,d-ii

Question 2

How many are there to place 8 indistinguishable balls into four distinguishable bins

  • 70

  • 165

  • 8 C 4

  • 8P 4T

Question 3

Match List-I with List-II: List-I                                   List-II (Software process Models)                      (Software System) (a) Waterfall model                        (i) e-business that starts with only the basic functionality and then moves on to more advanced features. (b) Incremental development       (ii) An inventory control system for a supermarket to be developed on a highway (c) Prototyping                               (iii) A virtual reality system for simulating vehicle navigation on a highway. (d) RAD                              (iv) Automate the manual system for student record maintenance in a school Choose the correct option from those given below:
  • a-ii,b-iv,c-i,d-iii
  • a-i,b-iii,c-iv,d-ii
  • a-iii,b-ii,c-iv,d-i
  • a-iv,b-i,c-iii,d-ii

Question 4

A computer has six tape drives with n processes competing for them. Each process may need two drives. What is the maximum value of n for the system to be deadlock-free?
  • 5
  • 4
  • 3
  • 6

Question 5

In the context of 3D computer graphics, which of the following statements is/are TRUE? P: Orthographic transformations keep parallel lines parallel Q: Orthographic transformations are affine transformations Select the correct answer from the options given below:
  • Both P and Q
  • Neither P and Q
  • Only P
  • Only Q

Question 6

Which of the following statements are DML statements? (a) Update [tablename] Set [ columnname] = VALUE (b) Delete [tablename] (c) Select * from [tablename]
  • a and b
  • a and d
  • a, b, and c
  • b and c

Question 7

Which of the following key constraints is required for the functioning of the foreign keys in the context of a relational database?
  • Unique Key
  • Primary Key
  • Candidate Key
  • Check key

Question 8

Software Reuse is
  • The process of analyzing software with the objective of recovering its design and specification.
  • The process of existing software artifacts and knowledge to build new software.
  • Concerned with reimplementing legacy systems to make them more maintainable.
  • The process of analyzing software to create a representation of a higher level of abstraction and breaking software down into its parts to see how it works.

Question 9

Which of the following is the principal conjunctive normal form for [(pVq) ∧ ~p → ~q]?
  • pV~q
  • pVq
  • ~pVq
  • ~pV~q

Question 10

Consider the following methods: M​ 1 ​ : mean of maximum M​ 2​ : Centre of area M​ 3​ : Height method Which of the following is/are defuzzification method(s)?
  • Only M1
  • Only M1 and M2
  • Only M2 and M3
  • All M1, M2 and M3

There are 97 questions to complete.

Last Updated :
Take a part in the ongoing discussion