NTA UGC NET 2019 June – II
How many are there to place 8 indistinguishable balls into four distinguishable bins
8 C 4
Question 1 Explanation:
= C(8+4-1,8) = 11 C 8 = 11! / (8!(11-8)!) = 165
Match List-I with List-II: List-I List-II (Software process Models) (Software System) (a) Waterfall model (i) e-business that starts with only the basic functionality and then moves on to more advanced features. (b) Incremental development (ii) An inventory control system for a supermarket to be developed on a highway (c) Prototyping (iii) A virtual reality system for simulating vehicle navigation on a highway. (d) RAD (iv) Automate the manual system for student record maintenance in a school Choose the correct option from those given below:
Question 2 Explanation:
1. Waterfall model: Automate the manual system for student record maintenance in a school 2. Incremental development: e-business that starts with only the basic functionality and then moves on to more advanced features. 3. Prototyping: A virtual reality system for simulating vehicle navigation in a highway. 4. RAD: An inventory control system for a supermarket to be developed on a highway
A computer has six tape drives with n processes competing for them. Each process may need two drives. What is the maximum value of n for the system to be deadlock-free?
Question 3 Explanation:
Each process needs 2 drives. So for deadlock just give each process one drive. So total 6 processes can be given 1 drive each and can cause deadlock. So to break the deadlock just reduce 1 process. So maximum no. of processes for the system to be deadlock-free is 5.
In the context of 3D computer graphics, which of the following statements is/are TRUE? P: Orthographic transformations keep parallel lines parallel Q: Orthographic transformations are affine transformations Select the correct answer from the options given below:
Both P and Q
Neither P and Q
Which of the following statements are DML statements? (a) Update [tablename] Set [ columnname] = VALUE (b) Delete [tablename] (c) Select * from [tablename]
a and b
a and d
a, b, and c
b and c
Question 5 Explanation:
DML commands: SELECT INSERT UPDATE DELETE MERGE LOCK TABLE
What percentage(%) of the IPv4, IP address space do all class C addresses consume?
Question 6 Explanation:
Class-C: 192 to 223. It means 12.5 %
Which of the following key constraints is required for the functioning of the foreign keys in the context of a relational database?
Question 7 Explanation:
A foreign key is a key whose values depend on the primary key of a relation. So for the functioning of a foreign key in the context of a relational database we need a primary key.
Software Reuse is
The process of analyzing software with the objective of recovering its design and specification.
The process of existing software artifacts and knowledge to build new software.
Concerned with reimplementing legacy systems to make them more maintainable.
The process of analyzing software to create a representation of a higher level of abstraction and breaking software down into its parts to see how it works.
Question 8 Explanation:
Software Reuse is the process of existing software artifacts and knowledge to build new software.
Which of the following is the principal conjunctive normal form for [(pVq) ∧ ~p → ~q]?
Question 9 Explanation:
Match List-I with List-II List-I List-II (a) p → q (i) ¬(q → ¬p) (b) p v q (ii) p ∧ ¬q (c) p ∧ q (iii) ¬p → q (d) ¬(p → q) (iv) ¬p v q Choose the correct option from those given below:
Question 10 Explanation:
There are 97 questions to complete.
My Personal Notes arrow_drop_up