• Courses
  • Tutorials
  • Jobs
  • Practice
  • Contests

UGC NET CS 2015 Jun - II

Question 41

The translator which performs macro calls expansion is called: 
 

  • Macro processor
     

  • Micro pre - processor
     

  • Macro pre - processor
     

  • Dynamic Linker
     

Question 42

Which of the following, in C++, is inherited in a derived class from base class ?
  • constructor
  • destructor
  • data members
  • virtual methods

Question 43

What does the following command do? grep -vn “abc” x
  • It will print all of the lines in the file x that match the search string “abc”.
  • It will print all of the lines in file x that do not match the search string “abc”.
  • It will print the total number of lines in the file x that match the string “abc”.
  • It will print the specific line numbers of the file x in which there is a match for string “abc”.

Question 44

The Unix Kernel maintains two key data structures related to processes, the process table and the user structure. Which of the following information is not the part of user structure ?
  • File descriptor table
  • System call state
  • Scheduling parameters
  • Kernel stack

Question 45

Which of the following algorithms sort n integers, having the range 0 to (n2 - 1), in ascending order in O(n) time ?
  • Selection sort
  • Bubble sort
  • Radix sort
  • Insertion sort

Question 46

Which of the following protocols is an application layer protocol that establishes, manages and terminates multimedia sessions ?
  • Session Maintenance Protocol
  • Real - time Streaming Protocol
  • Real - time Transport Control Protocol
  • Session Initiation Protocol

Question 47

What is the size of the ‘total length’ field in IPv4 datagram?
  • 4 bit
  • 8 bit
  • 16 bit
  • 32 bit

Question 48

Which of the following statements is FALSE about weak entity set?
  • Weak entities can be deleted automatically when their strong entity is deleted.
  • Weak entity set avoids the data duplication and consequent possible inconsistencies caused by duplicating the key of the strong entity.
  • A weak entity set has no primary keys unless attributes of the strong entity set on which it depends are included
  • Tuples in a weak entity set are not partitioned according to their relationship with tuples in a strong entity set.

Question 49

Database applications were built directly on top of file system to overcome the following drawbacks of using file-systems: (i) Data redundancy and inconsistency (ii) Difficulty in accessing Data (iii) Data isolation (iv) Integrity problems
  • (i)
  • (i) and (iv)
  • (i), (ii) and (iii)
  • (i), (ii), (iii) and (iv)

There are 49 questions to complete.

Last Updated :
Take a part in the ongoing discussion