

MCQOPTIONS
Saved Bookmarks
This section includes 1917 Mcqs, each offering curated multiple-choice questions to sharpen your UGC-NET knowledge and support exam preparation. Choose a topic below to get started.
1851. |
In UNIX, ______________ creates three subdirectories: 'PIS' and two subdirectories 'progs' and data from just created subdirectory 'PIS'. |
A. | mdkir PIS/progs PIS/data PIS |
B. | mkdir PIS progs data |
C. | mkdir PIS PIS/progs PIS/data |
D. | mkdir PIS/progs data |
Answer» D. mkdir PIS/progs data | |
1852. |
Consider the following statements :(a) UNIX provides three types of permissions* Read* Write* Execute(b) UNIX provides three sets of permissions* permission for owner* permission for group* permission for othersWhich of the above statement/s is/are true? |
A. | Only (a) |
B. | Only (b) |
C. | Both (a) and (b) |
D. | Neither (a) nor (b) |
Answer» D. Neither (a) nor (b) | |
1853. |
Which one of the following options is not a shell in UNIX system? |
A. | Bourne Shell |
B. | C Shell |
C. | Net Shell |
D. | Korn Shell |
Answer» D. Korn Shell | |
1854. |
In UNIX operating system, when a process creates a new process using the fork() system call, which of the following state is shared between the parent process and child process? |
A. | Heap |
B. | Stack |
C. | Shared memory segments |
D. | Both Heap and Stack |
Answer» D. Both Heap and Stack | |
1855. |
Which statement is not correct about “init” process in Unix? |
A. | It is generally the parent of the login shell. |
B. | It has PID 1. |
C. | It is the first process in the system. |
D. | Init forks and execs a ‘getty’ process at every port connected to a terminal. |
Answer» D. Init forks and execs a ‘getty’ process at every port connected to a terminal. | |
1856. |
In Unix operating system, special files are used to : |
A. | buffer data received in its input from where a process reads |
B. | provide a mechanism to map physical device to file names |
C. | store list of file names plus pointers associated with i-nodes |
D. | store information entered by a user application program or utility program |
Answer» C. store list of file names plus pointers associated with i-nodes | |
1857. |
What will be the output of the following Unix command ?$rm chap0\[1 - 3\] |
A. | Remove file chap0[1 - 3] |
B. | Remove file chap01, chap02, chap03 |
C. | Remove file chap\[1 - 3\] |
D. | None of the above |
Answer» B. Remove file chap01, chap02, chap03 | |
1858. |
Match the following WINDOWS system calls and UNIX system calls with reference to process control and File manipulation.Windows(a) Create - process ()(b) WaitForSingleObject ()(c) CreateFile ()(d) CloseHandle ()UNIX(i) Open ()(ii) Close ()(iii) Fork ()(iv) Wait ()Code : (a) (b) (c) (d) |
A. | (iii) (iv) (i) (ii) |
B. | (iv) (iii) (i) (ii) |
C. | (iv) (iii) (ii) (i) |
D. | (iii) (iv) (ii) (i) |
Answer» B. (iv) (iii) (i) (ii) | |
1859. |
The Unix Kernel maintains two key data structures related to processes, the progress table and the user structure. Which of following information is not the part of user |
A. | File descriptor table |
B. | System call state |
C. | Scheduling parameters |
D. | Kernel stack |
Answer» D. Kernel stack | |
1860. |
What does the following command do ?grep − vn "abc" x |
A. | It will print all of the lines in the file x that match the search string "abc" |
B. | It will print all of the lines in file x that do not match the search string "abc" |
C. | It will print total no of the lines in file x that match the search string "abc" |
D. | It will print the specific line numbers of file x in which there is a match for the string "abc" |
Answer» B. It will print all of the lines in file x that do not match the search string "abc" | |
1861. |
Which statement is not true about process 0 in the Unix operating system? |
A. | Process 0 is called init process |
B. | Process 0 is not created by fork system call |
C. | After forking process 1, process O becomes swapper process |
D. | Process 0 is a special process created when system boots |
Answer» B. Process 0 is not created by fork system call | |
1862. |
Which or the following commands would return process_id of sleep command? |
A. | Sleep 1 and echo $? |
B. | Sleep 1 and echo # |
C. | Sleep 1 and echo $* |
D. | Sleep 1 and echo $! |
Answer» C. Sleep 1 and echo $* | |
1863. |
Which of the following flags are set when ‘JMP’ instruction is executed ? |
A. | SF and CF |
B. | AF and CF |
C. | All flags |
D. | No flag is set |
Answer» E. | |
1864. |
The directory structure used in Unix file system is called |
A. | Hierarchical directory |
B. | Tree structured directory |
C. | Directed acyclic graph |
D. | Graph structured directory |
Answer» B. Tree structured directory | |
1865. |
In UNIX, which of the following command is used to set the task priority ? |
A. | init |
B. | nice |
C. | kill |
D. | PS |
Answer» C. kill | |
1866. |
In Unix, how do you check that two given strings a and b are equal? |
A. | test $a -eq $b |
B. | test $a -equal $b |
C. | test $a = $b |
D. | both a and c |
Answer» E. | |
1867. |
Linux operating system uses |
A. | Affinity Scheduling |
B. | Fair Preemptive Scheduling |
C. | Hand Shaking |
D. | Highest Penalty Ratio Next |
Answer» C. Hand Shaking | |
1868. |
Everything below the system call interface and above the physical hardware is known as ______. |
A. | Kernel |
B. | Bus |
C. | Shell |
D. | Stub |
Answer» B. Bus | |
1869. |
_________ is an “umbrella” activity that is applied throughout the software engineering process. |
A. | Debugging |
B. | Testing |
C. | Designing |
D. | Software quality assurance |
Answer» E. | |
1870. |
______ establishes information about when, why and by whom changes are made in a software. |
A. | Software Configuration Management |
B. | Change Control |
C. | Version Control |
D. | An Audit Trail |
Answer» E. | |
1871. |
Component level design is concerned with |
A. | Flow oriented analysis |
B. | Class based analysis |
C. | Both of the above |
D. | None of the above |
Answer» D. None of the above | |
1872. |
RAD stands for ______. |
A. | Rapid and Design |
B. | Rapid Aided Development |
C. | Rapid Application Development |
D. | Rapid Application Design |
Answer» D. Rapid Application Design | |
1873. |
Testing of software with actual data and in actual environment is called |
A. | Alpha testing |
B. | Beta testing |
C. | Regression testing |
D. | None of the above |
Answer» C. Regression testing | |
1874. |
Software Configuration Management is the discipline for systematically controlling |
A. | the changes due to the evolution of work products as the project proceeds |
B. | the changes due to defects (bugs) being found and then fixed |
C. | the changes due to requirement changes |
D. | all of the above |
Answer» E. | |
1875. |
The factors that determine the quality of a software system are |
A. | correctness, reliability |
B. | efficiency, usability, maintainability |
C. | testability, portability, accuracy, error tolerances, expandability, access control, audit |
D. | All of the above |
Answer» E. | |
1876. |
The relationship of data elements in a module is called |
A. | Coupling |
B. | Modularity |
C. | Cohesion |
D. | Granularity |
Answer» D. Granularity | |
1877. |
Basis path testing falls under |
A. | system testing |
B. | white box testing |
C. | black box testing |
D. | unit testing |
Answer» C. black box testing | |
1878. |
Which one from the following is false ? |
A. | LALR parser is Bottom - Up parser |
B. | A parsing algorithm which performs a left to right scanning and a right most deviation is RL (1) |
C. | LR parser is Bottom - Up parser |
D. | In LL(1), the 1 indicates that there is a one - symbol look - ahead |
Answer» C. LR parser is Bottom - Up parser | |
1879. |
Which phase of compiler generates stream of atoms ? |
A. | Syntax analysis |
B. | Lexical Analysis |
C. | Code generation |
D. | Code optimization |
Answer» B. Lexical Analysis | |
1880. |
In a two-pass assembler, symbol table is |
A. | Generated in first pass |
B. | Generated in second pass |
C. | Not generated at all |
D. | Generated and used only in second pass |
Answer» D. Generated and used only in second pass | |
1881. |
The process of assigning load addresses to the various parts of the program and adjusting the code and data in the program to reflect the assigned addresses is called __________ |
A. | Symbol resolution |
B. | Parsing |
C. | Assembly |
D. | Relocation |
Answer» E. | |
1882. |
A program P calls two subprograms P1 and P2. P1 can fail 50% times and P2 40% times. Then P can fail |
A. | 50% |
B. | 60% |
C. | 10% |
D. | 70% |
Answer» E. | |
1883. |
Which of the following concepts means adding new concepts to a program as it runs? |
A. | Data hiding |
B. | Dynamic loading |
C. | Dynamic typing |
D. | Dynamic binding |
Answer» C. Dynamic typing | |
1884. |
The translator which performs macro calls expansion is called : |
A. | Macro processor |
B. | Micro pre-processor |
C. | Macro pre-processor |
D. | Dynamic linker |
Answer» D. Dynamic linker | |
1885. |
Which of the following derivations does a top-down parser use while parsing an input string ? The input is scanned from left to right |
A. | Leftmost derivation |
B. | Leftmost derivation traced out in reverse |
C. | Rightmost derivation traced out till reverse |
D. | Rightmost derivation |
Answer» B. Leftmost derivation traced out in reverse | |
1886. |
Match the following:(a) Forward Reference Table (i) Assembler directive(b) Mnemonic Table (ii) Uses array data structure(c) Segment Register Table (iii) Contains machine OP code(d) EQU (iv) Uses linked list data structurecode:(a) (b) (c) (d) |
A. | (ii) (iii) (iv) (i) |
B. | (iii) (iv) (ii) (i) |
C. | (iv) (i) (iii) (ii) |
D. | (iv) (iii) (ii) (i) |
Answer» E. | |
1887. |
In compiler design ‘reducing the strength’ refers to |
A. | reducing the range of values of input variables |
B. | code optimization using cheaper machine instructions |
C. | reducing efficiency of program |
D. | None of the above |
Answer» C. reducing efficiency of program | |
1888. |
Perceptron learning, Delta learning and LMS learning are learning methods which falls under the category of |
A. | Error correction learning - learning with a teacher |
B. | Reinforcement learning - learning with a critic |
C. | Hebbian learning |
D. | Competitive learning - learning without a teacher |
Answer» B. Reinforcement learning - learning with a critic | |
1889. |
If A and B are two fuzzy sets with membership functions:μa(χ) ={0.2,0.5.,0.6,0.1,0.9}μb (χ)= {0.1,0.5,0.2,0.7,0.8}then the value of μa ∩ μb will be |
A. | {0.2,0.5,0.6,0.7,0.9} |
B. | {0.2, 0.5,0.2, 0.1,0.8} |
C. | {0.1, 0.5, 0.6, 0.1,0.8} |
D. | {0.1, 0.5, 0.2, 0.1,0.8} |
Answer» E. | |
1890. |
A __________ point of a fuzzy set A is a point x ∈ X at which µA(x) = 0.5 |
A. | Core |
B. | Support |
C. | Cross-over |
D. | α - cut |
Answer» D. α - cut | |
1891. |
The height h(A) of a fuzzy set A is defined ash(A) = sup A(x) |
A. | h(A) = 0 |
B. | h(A) <0 |
C. | h(A)=1 |
D. | h(A)<1 |
Answer» D. h(A)<1 | |
1892. |
Consider a fuzzy set A defined on the interval X = [0, 10] of integers by the membership Junction μA(x) = x / (x+2)Then the α cut corresponding to α = 0.5 will be |
A. | {0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10} |
B. | {1, 2, 3, 4, 5, 6, 7, 8, 9, 10} |
C. | {2, 3, 4, 5, 6, 7, 8, 9, 10} |
D. | None of the above |
Answer» D. None of the above | |
1893. |
Let R and S be two fuzzy relations defined as follows. Then, the resulting relation, T, which relates elements of universe x to the elements of universe z using max-min composition is given by: |
A. | (1) |
B. | (2) |
C. | (3) |
D. | (4) |
Answer» D. (4) | |
1894. |
Suppose the function y and a fuzzy integer number around -4 for x are given as y= (x-3)2 + 2.Around -4 = {(2, 0.3), (3, 0.6), (4, 1), (5, 0.6), (6, 0.3)} respectively. Then f (Around -4) is given by: |
A. | {(2, 0.6), (3, 0.3), (6, 1), (11, 0.3)} |
B. | {(2, 0.6), (3, 1), (6, 1), (11, 0.3)} |
C. | {(2, 0.6), (3, 1), (6, 0.6), (11, 0.3)} |
D. | {(2, 0.6), (3, 0.3), (6, 0.6), (11, 0.3)} |
Answer» D. {(2, 0.6), (3, 0.3), (6, 0.6), (11, 0.3)} | |
1895. |
Given U = {1,2,3,4,5,6,7} A = {(3, 0.7), (5, 1), (6, 0.8)} then A will be: (where ~ → complement) |
A. | {(4, 0.7), (2,1), (1,0.8)} |
B. | {(4, 0.3.): (5, 0), (6. 0.2) } |
C. | {(l, 1), (2, 1), (3, 0.3), (4, 1), (6,0.2), (7, 1)} |
D. | {(3, 0.3), (6.0.2)} |
Answer» D. {(3, 0.3), (6.0.2)} | |
1896. |
Consider a fuzzy set old as defined below Old = {(20, 0.1), (30, 0.2), (40, 0.4), (50, 0.6), (60, 0.8), (70, 1), (80, 1)} Then the alpha-cut for alpha = 0.4 for the set old will be |
A. | {(40,0.4)} |
B. | {50, 60, 70, 80} |
C. | {(20, 0.1), (30, 0.2)} |
D. | {(20, 0), (30, 0), (40, 1), (50,1), (60, 1), (70, 1), (80, 1)} |
Answer» E. | |
1897. |
What are the following sequence of steps taken in designing a fuzzy logic machine ? |
A. | Fuzzification → Rule evaluation → Defuzzification |
B. | Fuzzification → Defuzzification → Rule evaluation |
C. | Rule evaluation → Fuzzification → Defuzzification |
D. | Rule evaluation → Defuzzification → Fuzzification |
Answer» B. Fuzzification → Defuzzification → Rule evaluation | |
1898. |
If a packet arrive with an M-bit value is '1' and a fragmentation offset value '0', then it is ______ fragment. |
A. | First |
B. | Middle |
C. | Last |
D. | All of the above |
Answer» B. Middle | |
1899. |
The Mobile Application Protocol (MAP) typically runs on top of which protocol ? |
A. | SNMP (Simple Network Management Protocol) |
B. | SMTP (Simple Mail Transfer Protocol) |
C. | SS7 (Signalling System 7) |
D. | HTTP (Hyper Text Transfer Protocol) |
Answer» D. HTTP (Hyper Text Transfer Protocol) | |
1900. |
The ATM cell is |
A. | 48 bytes long |
B. | 53 bytes long |
C. | 64 bytes long |
D. | 69 bytes long |
Answer» C. 64 bytes long | |