• Courses
  • Tutorials
  • Jobs
  • Practice
  • Contests

UGC NET CS 2016 July – II

Question 11

Given i = 0, j = 1, k = –1 x = 0.5, y = 0.0 What is the output of the following expression in C language ? x * y < i + j || k
  • -1
  • 0
  • 1
  • 2

Question 12

When a method in a subclass has the same name and type signatures as a method in the superclass, then the method in the subclass _____ the method in the superclass.
  • Overloads
  • Friendships
  • Inherits
  • Overrides

Question 13

What is the value returned by the function f given below when n = 100? int f (int n) { if (n = = 0) then return n; else return n + f(n-2); }
  • 2550
  • 2556
  • 5220
  • 5520

Question 14

In RDBMS, the constraint that no key attribute (column) may be NULL is referred to as:
  • Referential integrity
  • Multi-valued dependency
  • Entity Integrity
  • Functional dependency

Question 15

Which of the following statement(s) is/are FALSE in the context of Relational DBMS ? I. Views in a database system are important because they help with access control by allowing users to see only a particular subset of the data in the database. II. E-R diagrams are useful to logically model concepts. III. An update anomaly is when it is not possible to store information unless some other, unrelated information is stored as well. IV. SQL is a procedural language.
  • I and IV only
  • III and IV only
  • I, II and III only
  • II, III and IV only

Question 16

Consider the following two commands C1 and C2 on the relation R from an SQL database: C1 : drop table R; C2 : delete from R; Which of the following statements is TRUE ? I. Both C1 and C2 delete the schema for R. II. C2 retains relation R, but deletes all tuples in R. III. C1 deletes not only all tuples of R, but also the schema for R.
  • I only
  • I and II only
  • II and III only
  • I, II and III

Question 17

Consider the following database table having A, B, C and D as its four attributes and four possible candidate keys (I, II, III and IV) for this table : 20 I : {B} II : {B, C} III : {A, D} IV : {C, D} If different symbols stand for different values in the table (e.g., d1 is definitely not equal to d2), then which of the above could not be the candidate key for the database table ?
  • I and III only
  • III and IV only
  • II only
  • I only

Question 18

In a relational database model, NULL values can be used for all but which one of the following ?
  • To allow duplicate tuples in the table by filling the primary key column(s) with NULL.
  • To avoid confusion with actual legitimate data values like 0 (zero) for integer columns and ’’ (the empty string) for string columns.
  • To leave columns in a tuple marked as ’’unknown’’ when the actual value is unknown.
  • To fill a column in a tuple when that column does not really ”exist” for that particular tuple.

Question 19

Consider the following binary search tree: 21 If we remove the root node, which of the node from the left subtree will be the new root?
  • 11
  • 12
  • 13
  • 16

Question 20

Consider the following operations performed on a stack of size 5 : Push (a); Pop() ; Push(b); Push(c); Pop(); Push(d); Pop();Pop(); Push (e) Which of the following statements is correct?

  • Underflow occurs

  • Stack operations are performed smoothly

  • Overflow occurs

  • None of the above

There are 50 questions to complete.

Last Updated :
Take a part in the ongoing discussion