NET DEC 2014 PAPER 3 SOLVED PART – 2


PAGES: 1 2 3 4


  1. Consider a triangle represented by A(0, 0), B(1, 1), C(5, 2). The triangle is rotated by 45 degrees about a point P(–1, –1). The co-ordinates of the new triangle obtained after rotation shall be ………………

(A) A'(-1,√2 – 1), B'(-1,2√2 – 1), C'(3/2√2 – 1, 9/2√2 – 1)

(B) A'(√2 – 1, -1), B'(2√2 – 1, -1), C'(3/2√2 – 1, 9/2√2 – 1)

(C) A'(-1, √2 – 1), B'(2√2 – 1, -1), C'(3/2√2 – 1, 9/2√2 – 1)

(D) A'(-1, √2 – 1), B'(2√2 – 1, -1), C'(9/2√2 – 1, 3/2√2 – 1)

Answer: A


  1. In Cyrus-Beck algorithm for line clipping the value of t parameter is computed by the relation :

(Here P1 and P2 are the two end points of the line, f is a point on the boundary, n1 is inner normal)

Answer: B


  1. Match the following : I. Cavalier Projection i. The direction of projection is chosen so that there is no foreshortening of lines perpendicular to the xy plane. II. Cabinet Projection ii. The direction of projection is chosen so that lines perpendicular to the xy planes are foreshortened by half their lengths. III. Isometric Projection iii. The direction of projection makes equal angles with all of the principal axis. IV. Orthographic Projection iv. Projections are characterized by the fact that the direction of projection is perpendicular to the view plane.

Codes :

a b c d

(A) i iii iv ii

(B) ii iii i iv

(C) iv ii iii iUGC net study material

(D) i ii iii iv

Answer: D


  1. Consider the following statements S1, S2 and S3 :

S1 : In call-by-value, anything that is passed into a function call is unchanged in the

caller’s scope when the function returns.

S2 : In call-by-reference, a function receives implicit reference to a variable used as

argument.

S3 : In call-by-reference, caller is unable to see the modified variable used as argument.

(A) S3 and S2 are true. (B) S3 and S1 are true.

(C) S2 and S1 are true. (D) S1, S2, S3 are true.

Answer: C


  1. How many tokens will be generated by the scanner for the following statement ?

x = x * (a + b) – 5;

(A) 12 (B) 11

(C) 10 (D) 07

Answer: A


  1. Which of the following statements is not true ?

(A) MPI_Isend and MPI_Irecv are non-blocking message passing routines of MPI.

(B) MPI_Issend and MPI_Ibsend are non-blocking message passing routines of MPI.

(C) MPI_Send and MPI_Recv are non-blocking message passing routines of MPI.

(D) MPI_Ssend and MPI_Bsend are blocking message passing routines of MPI.

Answer: C


  1. The pushdown automation M = ({q0, q1, q2}, {a, b}, {0, 1}, d, q0, 0, {q0}) with

d (q0, a, 0) = {(q1, 10)}

d (q1, a, 1) = {(q1, 11)}

d (q1, b, 1) = {(q2, l)}UGC net study material

d (q2, b, 1) = {(q2, l)}

d (q2, l, 0) = {(q0, l)}

Accepts the language

(A) L = {an bm | n, m ≥ 0} (B) L = {an bn | n ≥ 0}

(C) L = {an bm | n, m > 0} (D) L = {an bn | n > 0}

Answer: B


  1. Given two languages :

L1 = {(ab)n ak | n > k, k ≥ 0}

L2 = {an bm | n ¹ m}

Using pumping lemma for regular language, it can be shown that

(A) L1 is regular and L2 is not regular.

(B) L1 is not regular and L2 is regular.

(C) L1 is regular and L2 is regular.

(D) L1 is not regular and L2 is not regular.

Answer: D


  1. Regular expression for the complement of language L = {an bm | n ≥ 4, m ≤ 3} is

(A) (a + b)* ba(a + b)*

(B) a* bbbbb*

(C) (l + a + aa + aaa)b* + (a + b)* ba(a + b)*

(D) None of the above

Answer: D


  1. For n devices in a network, ………….. number of duplex-mode links are required for a mesh topology.

(A) n(n + 1) (B) n (n – 1)UGC net study material

(C) n(n + 1)/2 (D) n(n – 1)/2

Answer: D


  1. How many characters per second (7 bits + 1 parity) can be transmitted over a 3200 bps line if the transfer is asynchronous ? (Assuming 1 start bit and 1 stop bit)

(A) 300 (B) 320

(C) 360 (D) 400

Answer: B


  1. Which of the following is not a field in TCP header ?

(A) Sequence number (B) Fragment offset

(C) Checksum (D) Window size

Answer: B


  1. What is the propagation time if the distance between the two points is 48,000 ? Assume the propagation speed to be 2.4 × 108 metre/second in cable.

(A) 0.5 ms (B) 20 ms

(C) 50 ms (D) 200 msUGC net study material

ANSWER IS D

Explanation.

48000km/(2.4*108)= 48*106m/(2.4*108)= 20×10-2

=200×10-3s.=200ms


  1. ………….. is a bit-oriented protocol for communication over point-to-point and multipoint links.

(A) Stop-and-wait (B) HDLC

(C) Sliding window (D) Go-back-N

Answer: B


  1. Which one of the following is true for asymmetric-key cryptography ?

(A) Private key is kept by the receiver and public key is announced to the public.

(B) Public key is kept by the receiver and private key is announced to the public.

(C) Both private key and public key are kept by the receiver.

(D) Both private key and public key are announced to the public.

Answer: A


  1. Any decision tree that sorts n elements has height

(A) W (n) (B) W (lgn)

(C) W (nlgn) (D) W (n2)

Answer: C


  1. Match the following :

List – I List – II

  1. Bucket sort i. O(n3lgn)
  2. Matrix chain multiplication ii. O(n3)
  3. Huffman codes iii. O(nlgn)
  4. All pairs shortest paths iv. O(n)

Codes :

a b c d

(A) iv ii i iii

(B) ii iv i iii

(C) iv ii iii i

(D) iii ii iv i

Answer: C


  1. We can show that the clique problem is NP-hard by proving that

(A) CLIQUE £ P 3-CNF_SAT

(B) CLIQUE £ P VERTEX_COVER

(C) CLIQUE £ P SUBSET_SUM

(D) None of the above

Answer: D


  1. Dijkstra algorithm, which solves the single-source shortest–paths problem, is a ……………., and the Floyd-Warshall algorithm, which finds shortest paths between all pairs of vertices, is a ……………

(A) Greedy algorithm, Divide-conquer algorithm

(B) Divide-conquer algorithm, Greedy algorithm

(C) Greedy algorithm, Dynamic programming algorithm

(D) Dynamic programming algorithm, Greedy algorithm

Answer: C


  1. Consider the problem of a chain <A1, A2, A3> of three matrices. Suppose that the dimensions of the matrices are 10 × 100, 100 × 5 and 5 × 50 respectively. There are two different ways of parenthesization : (i) ((A1 A2)A3) and (ii) (A1(A2 A3)). Computing the product according to the first parenthesization is ……………… times faster in comparison to the second parenthesization.

(A) 5 (B) 10

(C) 20 (D) 100

Answer: B


  1. Suppose that we have numbers between 1 and 1000 in a binary search tree and we want to search for the number 365. Which of the following sequences could not be the sequence of nodes examined ?

(A) 4, 254, 403, 400, 332, 346, 399, 365

(B) 926, 222, 913, 246, 900, 260, 364, 365

(C) 927, 204,913, 242, 914, 247, 365

(D) 4, 401, 389, 221, 268, 384, 383, 280, 365

Answer: C


  1. Which methods are utilized to control the access to an object in multi-threaded programming ?

(A) Asynchronized methods (B) Synchronized methods

(C) Serialized methods (D) None of the above

Answer: B


  1. How to express that some person keeps animals as pets ?

Answer: A


  1. Converting a primitive type data into its corresponding wrapper class object instance is called

(A) Boxing (B) Wrapping

(C) Instantiation (D) Autoboxing

Answer: D


  1. The behaviour of the document elements in XML can be defined by

(A) Using document object

(B) Registering appropriate event handlers

(C) Using element object

(D) All of the above

Answer: D


PAGES: 1 2 3 4


Leave a comment