Explore topic-wise MCQs in UGC-NET.

This section includes 1917 Mcqs, each offering curated multiple-choice questions to sharpen your UGC-NET knowledge and support exam preparation. Choose a topic below to get started.

1301.

In Java, when we implement an interface method, it must be declared as :

A. Private
B. Protected
C. Public
D. Friend
Answer» D. Friend
1302.

Which method is called first by an applet program?

A. start()
B. run()
C. init()
D. begin()
Answer» D. begin()
1303.

The document that is used by XSLT to indicate, how to transform the elements of the XML document to another format is

A. HTML page
B. DOC type procedure
C. Style sheet
D. Stored procedure
Answer» D. Stored procedure
1304.

Which is the protocol for performing RPCs between applications In a language and system independent way?

A. Hyper Text Tranmission Protocol (HTTP)
B. Simple Network Management Protocol (SNMP)
C. Simple Object Access Protocol (SOAP)
D. Simple Mail Transfer Protocol (SMTP)
Answer» D. Simple Mail Transfer Protocol (SMTP)
1305.

Match the following with respect to HTML tags and usage.a. CITE                     1. Italic  representationb. EM                       2. Represents output from programmesc. VAR                     3. Represents to other sourced. SAMP                  4. Argument to a programme Codes :a b c d

A. 3 1 4 2
B. 2 3 1 4
C. 4 2 3 1
D. 1 3 4 1
Answer» B. 2 3 1 4
1306.

The behavior of the document elements in XML can be defined by

A. Using document object
B. Registering appropriate event handlers
C. Using element object
D. All of the above
Answer» E.
1307.

Debugger is a program that

A. allows to examine and modify the contents of registers
B. does not allow execution of a segment of program
C. allows to set breakpoints, execute a segment of program and display contents of register
D. All of the above
Answer» D. All of the above
1308.

The Servlet Response interface enables a servlet to formulate a response for a client using the method ___________.

A. void log(Exception e, String s)
B. void destroy()
C. int get ServerPort()
D. void set ContextType(String type)
Answer» E.
1309.

The aspect ratio of an image is defined as

A. The ratio of width to its height measured in unit length
B. The ratio of height to width measured in number of pixels
C. The ratio of depth to width measured in unit length
D. The ratio of width to depth measured in number of pixels
Answer» B. The ratio of height to width measured in number of pixels
1310.

Match the following:     List- I                                       List- IIa. Tablet, Joystick                   i Continuous devicesb. Light Pen, Touch Screen  ii.  Direct devicesc. Locator, Keyboard             iii. Logical devicesd. Data Globe, Sonic Pen    iv. 3D interaction wirescodea   b   c    d

A. ii    i    iv   iii
B. i    iv    iii   ii
C. i    ii   iii   iv
D. iv   iii   ii    i
Answer» E.
1311.

A technique used to approximate halftones without reducing spatial resolution is known as

A. Halftoning
B. Dithering
C. Error diffusion
D. None of the above
Answer» C. Error diffusion
1312.

If the Fourier transform of the function f(x, y) is F(m, n), then the Fourier transform of the function f(2x, 2y) is :

A. 1/4 F(m/2 , n/2)
B. 1/4 F (2m, 2n)
C. 1/4 F (m, n)
D. 1/4 F ( m/4 , n/4)
Answer» B. 1/4 F (2m, 2n)
1313.

Which of the following is not true with respect to a trackball and/or spaceball ?I. A trackball is a two dimensional positioning device while as a spaceball provides six degrees of freedom.II. Unlike the trackball a spaceball does not actually move.Ill. A trackball is a three dimensional positioning device while as a spaceball provides six degrees of freedom.

A. I & II
B. II & III
C. II only
D. III only
Answer» E.
1314.

Which of the following statement(s) is (are) true?I. Two successive translations are additive.II. Two successive rotations are additive.III. Two successive scaling operations are multiplicative

A. I & II
B. only II
C. II & III
D. All the above
Answer» E.
1315.

Given below are three basic rules:I. Squash and StretchII. Slow-in and Slow-outIII. To stage the action properlyThese rules are applied in case of :

A. Rendering
B. Morphing
C. Animation
D. All of the above
Answer» D. All of the above
1316.

The Z-buffer algorithm is used for Hidden surface removal of objects. The maximum number of objects that can be handled by this algorithm shall

A. Depend on the application
B. Arbitrary no. of objects
C. Depend on the memory availability
D. Depend on the processor
Answer» C. Depend on the memory availability
1317.

Which of the following points lies on the same side as the origin  with reference to the line 3x + 7y= 2 ?

A. (3,0)
B. (1,0)
C. (0.5,0.5)
D. (0.5,0)
Answer» E.
1318.

Which of the following categories of languages do not refer to animation languages?

A. Graphical languages
B. General-purpose languages
C. Linear-list notations
D. None of the above
Answer» E.
1319.

Which level of Abstraction describes how data are stored in the data base ?

A. Physical level
B. View level
C. Abstraction level
D. Logical level
Answer» B. View level
1320.

If a relation with a Schema R is decomposed into two relations R1 and R2 such that (R1 ∪ R2) = R1 then which one of the following is to be satisfied for a lossless joint decomposition (---> indicates functional dependency)

A. (R1 ∩ R2) --> R1 or R1 ∩ R2 ---> R2
B. R1  ∩ R2 --> R1
C. R1∩ R2 --> R2
D. R1 ∩ R2 --> R1 and R1 ∩ R2 --> R2
Answer» B. R1  ∩ R2 --> R1
1321.

The student. marks should not be greater than 100. This  is

A. Integrity constraint
B. Referential constraint
C. Overdefined constraint
D. Feasible constraint
Answer» B. Referential constraint
1322.

Which of the following is true ?

A. A relation in BCNF is always in 3NF
B. A relation in 3NF is always in BCNF
C. BCNF and 3NF are same
D. A relation in BCNF is not in 3NF
Answer» B. A relation in 3NF is always in BCNF
1323.

GO BOTTOM and SKIP-3 commands are given one after another in a database file of 30 records. It shifts the control to

A. 28th record
B. 27th record
C. 3rd  record
D. 4th record
Answer» C. 3rd  record
1324.

In DML, RECONNECT command cannot be used with

A. OPTIONAL Set
B. FIXED Set
C. MANDATOR Set
D. All of the above
Answer» C. MANDATOR Set
1325.

Third normal form is based on the concept of ______.

A. Closure Dependency
B. Transitive Dependency
C. Normal Dependency
D. Functional Dependency
Answer» C. Normal Dependency
1326.

A hash function f defined as f (key) = key mod 13, with linear probing is used to insert keys 55, 58, 68, 91, 27, 145. What will be the location of 79 ?

A. 2
B. 3
C. 4
D. 5
Answer» E.
1327.

Given a Relation POSITION (Posting-No, Skill), then query to retrieve all distinct pairs of posting-nos requiring skill is

A. Select p.posting-No, p.posting-No from position p where p.skill = p.skill and p.posting-No < p.posting-No
B. Select p1.posting-No, p2.posting-No from position p1, position p2 where p1.skill = p2.skill
C. Select p1.posting-No, p2.posting-No from position p1, position p2 where p1.skill = p2.skill and p1.posting-No < p2.posting-No
D. Select p1.posting-No, p2.posting-No from position p1, position p2 where p1.skill = p2.skill and p1.posting-No = p2.posting.No
Answer» D. Select p1.posting-No, p2.posting-No from position p1, position p2 where p1.skill = p2.skill and p1.posting-No = p2.posting.No
1328.

The User Work Area (UWA) is a set of Program variables declared in the host program to communicate the contents of individual records between

A. DBMS & the Host record
B. Host program and Host record
C. Host program and DBMS
D. Host program and Host language
Answer» D. Host program and Host language
1329.

Working software is not available until late in the process in

A. Waterfall model
B. Prototyping model
C. Incremental model
D. Evolutionary Development model
Answer» B. Prototyping model
1330.

Regression testing is primarily related to

A. Functional testing
B. Development testing
C. Data flow testing
D. Maintenance testing
Answer» E.
1331.

Equivalence partitioning is a ................ testing method that divides the input domain of a program into classes of data from which test cases can be derived.

A. White box
B. Black box
C. Regression
D. Smoke
Answer» C. Regression
1332.

The .................. of a program or computing system is the structure or structures of the system, which comprise software components, the externally visible properties of these components, and the relationship among them.

A. E-R diagram
B. Data flow diagram
C. Software architecture
D. Software design
Answer» D. Software design
1333.

In function point analysis, the number of complexity adjustment factors is

A. 10
B. 12
C. 14
D. 20
Answer» D. 20
1334.

Improving processing efficiency or performance or restructuring of software to improve changeability is known as

A. Corrective maintenance
B. Perfective maintenance
C. Adaptive maintenance
D. Code maintenance
Answer» C. Adaptive maintenance
1335.

Consider the following characteristics:(i) Correct and unambiguous(ii) Complete and consistent(iii) Ranked for importance and/or stability and verifiable(iv) Modifiable and TraceableWhich of the following is true for a good SRS?

A. (i), (ii) and (iii)
B. (i), (iii) and (iv)
C. (ii), (iii) and (iv)
D. (i), (ii), (iii) and (iv)
Answer» E.
1336.

Equivalence class partitioning approach is used to divide the input domain into a set of equivalence classes, so that if a program works correctly for a value, then it will work correctly for all the other values in that class. This is used .................

A. to partition the program in the form of classes
B. to reduce the number of test cases required
C. for designing test cases in white box testing
D. all of the above
Answer» C. for designing test cases in white box testing
1337.

The principle, a function can always be replaced by its value ⁄ irrespective of the contexts, Without changing the meaning is called

A. Unbinding
B. Orthogonaeality
C. Context – free
D. Referential transparency
Answer» E.
1338.

BNF is a meta – language for

A. Specifying the syntax of a language
B. Describing how programs works
C. Shell programming
D. Real – time programming
Answer» B. Describing how programs works
1339.

Regarding software requirements specifications, the case that is hardest to “fix” is

A. How user – friendly the system should be?
B. How fast the software system should run?
C. What the software system is to do?
D. How accurate the outputs should be?
Answer» D. How accurate the outputs should be?
1340.

Which of the following is case required by top – down design?

A. flow charting
B. step – wise refinement
C. Modularity
D. All of these
Answer» E.
1341.

Which of the following is a dangling reference?

A. Accessing a variable, that is developed but not initialized
B. Accessing a storage that in already disposed at the request of the processor
C. Accessing a storage that is already disposed at the request of the uses
D. All of these
Answer» E.
1342.

Reliability of software is dependent on:

A. Number of errors present in software
B. Documentation
C. Testing suties
D. Development Processes
Answer» B. Documentation
1343.

Data structures include

A. Arrays
B. Exception statements
C. Iteration
D. Both b and c
Answer» B. Exception statements
1344.

Which of these are the 5 generic software engineering framework activities ?

A. Communication, planning, modelling, construction, deployment
B. Communication, risk management, measurement, production, reviewing
C. Analysis, designing, programming, Debugging, maintenance
D. Analysis, planning, designing, programming, testing
Answer» B. Communication, risk management, measurement, production, reviewing
1345.

Top-down design does not require

A. step-wise refinement
B. loop invariants
C. flow charting
D. modularity
Answer» C. flow charting
1346.

A Languages grammar is determined by its

A. Consistency
B. Familiarity
C. Syntax
D. None of these
Answer» D. None of these
1347.

Coupling is a measure of the strength of the interconnections between software modules. Which of the following are correct statements with respect to module coupling?P: Common coupling occurs when one module controls the flow of another module by passing it information on what to do.Q: In data coupling, the complete data structure is passed from one module to another through parameters.R: Stamp coupling occurs when modules share a composite data structure and use only parts of it.

A. P and Q only
B. P and R only
C. Q and R only
D. All of P, Q and R
Answer» D. All of P, Q and R
1348.

Which of the following statements is/are FALSE with respect to software testing?S1 : White-box tests are based on specifications; better at telling whether program meets specification, better at finding errors of ommission.S2 : Black-box tests are based on code; better for finding crashes, out of bounds errors, file not closed errors.S3 : Alpha testing is conducted at the developer’s site by a team of highly skilled testers for software that is developed as a product to be used by many customers.

A. Only S1 and S2 are FALSE.
B. Only S1 and S3 are FALSE.
C. Only S2 and S3 are FALSE.
D. All of S1, S2, and S3 are FALSE.
Answer» B. Only S1 and S3 are FALSE.
1349.

The COCOMO model is used for ..................

A. software design
B. software cost estimation
C. software cost approximation
D. software analysis
Answer» C. software cost approximation
1350.

Relation of COCOMO model is

A. E = a*(KDL) 6
B. E = a* (KDL) 5
C. E = a* (KDL) 7
D. E = a* (KDL) 3
Answer» B. E = a* (KDL) 5