Explore topic-wise MCQs in UGC-NET.

This section includes 1917 Mcqs, each offering curated multiple-choice questions to sharpen your UGC-NET knowledge and support exam preparation. Choose a topic below to get started.

201.

Which of the following is the process by which a user’s privileges ascertained ?

A. Authorization
B. Authentication
C. Access Control
D. None of these
Answer» B. Authentication
202.

Tuple in relational algebra refers to:

A. Row
B. Column
C. Table
D. Relation
Answer» B. Column
203.

A recursive foreign key is a:

A. references a relation
B. references a table
C. references its own relation
D. references a foreign key
Answer» D. references a foreign key
204.

Specialization is a ............... process.

A. Top - down
B. Bottom -Up
C. Both a and b
D. None of the above
Answer» B. Bottom -Up
205.

Let R1(a, b, c) and R2(x, y, z) be two relations in which a is the foreign key of R1 that refers to the primary key of R2. Consider following four options.(a) Insert into R1 (b) Insert into R2(c) Delete from R1 (d) Delete from R2Which of the following is correct about the referential integrity constraint with respect to above?

A. Operations (a) and (b) will cause violation.
B. Operations (b) and (c) will cause violation.
C. Operations (c) and (d) will cause violation.
D. Operations (d) and (a) will cause violation.
Answer» E.
206.

Which level of Abstraction describes what data are stored in the Database ?

A. Physical level
B. View level
C. Abstraction level
D. Logical level
Answer» E.
207.

A superkey for an entity consists of:

A. one attribute only
B. at least two attributes
C. at most two attributes
D. one or more attributes
Answer» E.
208.

The “PROJECT” operator of a relational algebra creates a new table that has always

A. More columns than columns in original table
B. More rows than original table
C. Same number of rows as the original table
D. Same number of columns as the original table
Answer» D. Same number of columns as the original table
209.

Which normal form is considered as adequate for usual database design?

A. 2NF
B. 3NF
C. 4NF
D. 5NF
Answer» C. 4NF
210.

Immediate updates as a recovery protocol is preferable, when:

A. Database reads more than writes
B. Writes are more than reads
C. It does not matter as it is good in both the situations
D. There are only writes
Answer» C. It does not matter as it is good in both the situations
211.

The SQL ExpressionSelect distinct T. branch name from branch T, branch S where T. assets > S. assets and S. branch-city = DELHI,finds the name of

A. all branches that have greater asset than any branch located in DELHI.
B. all branches that have greater assets than allocated in DELHI.
C. the branch that has the greatest asset in DELHI.
D. any branch that has greater asset than any branch located in DELHI.
Answer» B. all branches that have greater assets than allocated in DELHI.
212.

Manager's salary details are to be hidden from Employee Table. This Technique is called as

A. Conceptual level Datahiding
B. Physical level Datahiding
C. External level Datahiding
D. Logical level Datahiding
Answer» D. Logical level Datahiding
213.

The completeness constraint has rules:

A. Supertype, Subtype
B. Total specialization, Partial specialization
C. Specialization, Generalization
D. All of the above
Answer» C. Specialization, Generalization
214.

Consider the following schemas :Branch_Schema = (branch_name, assets, city)Customer_Schema = (cutstomer_name, street, city)Deposit_Schema = (branch_name, account_number, customer_name, balance)Borrow_Schema = (branch_name, loan_number, customer_name, amount)Which of the following tuple relational calculus finds all customers who have loan amount more than Rs 12,000 ?

A. {t(customer_name) | t∈borrow[?] t[amount]>12000}
B. {t |t(customer_name) | t∈borrow[?] t[amount]>12000}
C. {t |[?] ∈ borrow (t(customer_name=s(customer_ name))[?] [amount]>12000}
D. {t |[?] ∈ borrow (t(customer_name)[?] s[amount] >12000}
Answer» D. {t |[?] ∈ borrow (t(customer_name)[?] s[amount] >12000}
215.

A relation R = {A, B, C, D, E, F} is given with following set of functional dependencies:F = {A→B, AD→C, B→F, A→E}Which of the following is candidate key ?

A. A
B. AC
C. AD
D. None of these
Answer» D. None of these
216.

Data warehouse contains ............... data that is never found in operational environment.

A. Summary
B. Encoded
C. Encrypted
D. Scripted
Answer» B. Encoded
217.

Suppose R is a relation schema and F is a set of functional dependencies on R. Further, suppose R1 and R2 form a decomposition of R. Then the decomposition is a lossless join decomposition of R provided that:

A. R1∩R2→R1 is in F+
B. R1∩R2→R2 is in F+
C. both R1∩R2→R1 and R1∩R2→R2 functional dependencies are in F+
D. at least one from R1∩R2→R1 and R1∩R2→R2 is in F+
Answer» E.
218.

What is Granularity ?

A. The size of database
B. The size of data item
C. The size of record
D. The size of file
Answer» C. The size of record
219.

Which one of the following is decimal value of a signed binary number 1101010, if it is in  2's complement form?

A. - 42
B. - 22
C. - 21
D. - 106
Answer» C. - 21
220.

The absorption law in Boolean algebra say that

A. X + X = X
B. X . X = X
C. x + x . y = x
D. None of the above
Answer» D. None of the above
221.

The function represented by the kmap given below is

A. A.B
B. AB+BC+CA
C. A.B.C
D. None of the above
Answer» E.
222.

A Boolean operator Ө  is defined as follows:1Ө1=1, 1Ө0=0, 0Ө1=0 and 0Ө0=1What will be the truth value of the expression (xӨy)Өz = xӨ(yӨz)?

A. Always false
B. Always true
C. Sometimes true
D. True when x, y, z are all true
Answer» C. Sometimes true
223.

Simplified Boolean equation for the following truth table is:

A. F = yz’ + y’z
B. F = xy’ + x’y
C. F = x’z + xz’
D. F = x’z + xz’ + xyz
Answer» D. F = x’z + xz’ + xyz
224.

The answer of the operation (10111)2 * (1110)2 in hex equivalence is

A. 150
B. 241
C. 142
D. 101011110
Answer» D. 101011110
225.

If an integer needs two bytes of storage, then the maximum value of a signed integer is

A. 216 – 1
B. 215 – 1
C. 216
D. 215
Answer» C. 216
226.

One of the main features that distinguish microprocessor from micro-computers is

A. words are usually larger in microprocessors
B. words are shorter in microprocessors
C. microprocessor does not contain I/O devices
D. None of the above
Answer» D. None of the above
227.

The Excess-3 decimal code is a self-complementing code because

A. The binary sum of a code and its 9's complement is equal to 9
B. It is a weighted code
C. Complement can be generated by inverting each bit pattern
D. The binary sum of a code and its 10's complement is equal to 9
Answer» D. The binary sum of a code and its 10's complement is equal to 9
228.

A byte addressable computer has a memory capacity of 2m Kbytes and can perform 2n operations. An instruction involving 3 operands and one operator needs a maximum of

A. 3m bits
B. m + n bits
C. 3m + n bits
D. 3m + n + 30 bits
Answer» E.
229.

Which of the following logic operations is performed by the following given combinational circuit ?

A. EXCLUSIVE-OR
B. EXCLUSIVE-NOR
C. NAND
D. NOR
Answer» B. EXCLUSIVE-NOR
230.

Which of the following is the most efficient to perform arithmetic operations on the numbers?

A. Sign-magnitude
B. 1’s complement
C. 2’s complement
D. 9’s complement
Answer» D. 9’s complement
231.

The Karnaugh map for a Boolean function is given below. The simplified Boolean equation for this above Karnaugh Map is

A. AB + CD + AB’ + AD
B. AB + AC + AD + BCD
C. AB + AD + BC + ACD
D. AB + AC + BC + BCD
Answer» C. AB + AD + BC + ACD
232.

The Boolean expression x’y’z+yz+xz is equivalent to:

A. x
B. y
C. z
D. x+y+z
Answer» D. x+y+z
233.

ECL is the fastest of all logic families. High Speed in ECL is possible because transistors are used in difference amplifier configuration, in which they are never driven into __________.

A. Race condition
B. Saturation
C. Delay
D. High impedance
Answer» C. Delay
234.

If an integer needs two bytes of storage, then the maximum value of unsigned integer is

A. 2^16 – 1
B. 2^15 – 1
C. 2^16
D. 2^15
Answer» B. 2^15 – 1
235.

The simplified form of the Boolean expression (X+Y+XY)(X+Z) is

A. X + Y + ZX + Y
B. XY – YZ
C. X + YZ
D. XZ + Y
Answer» D. XZ + Y
236.

The Simplified form of a Boolean equation (AB'+AB'C+Ac)(A'C' +B') is

A. AB'
B. AB'C
C. A'B
D. ABC
Answer» B. AB'C
237.

The IEEE single-precision and double-precision format to represent floating-point numbers, has a length of ................. and ................ respectively.

A. 8 bits and 16 bits
B. 16 bits and 32 bits
C. 32 bits and 64 bits
D. 64 bits and 128 bits
Answer» D. 64 bits and 128 bits
238.

The octal number 326.4 is equivalent to

A. (214.2)10 and (D6.8)16
B. (212.5)10 and (D6.8)16
C. (214.5)10 and (D6.8)16
D. (214.5)10 and (D6.4)16
Answer» D. (214.5)10 and (D6.4)16
239.

What is decimal equivalent of BCD 11011.1100?

A. 22.0
B. 22.2
C. 20.2
D. 21.2
Answer» C. 20.2
240.

The Boolean function [~ (~p˄q)˄~(~p˄~q)]˅(p˄r) is equal to the Boolean function:

A. q
B. p˄r
C. p˅q
D. p
Answer» E.
241.

How many 1’s are present in the binary representation of3 × 512 + 7 × 64 + 5 × 8 + 3

A. 8
B. 9
C. 10
D. 11
Answer» C. 10
242.

Match the following identities/laws to their corresponding name:(a) x + x = xx • x = x                      i. Dominance(b) x + 0 = xx • 1 = x                      ii. Absorption(c) x + 1 = 1x • 0 = 0                      iii. Idempotent(d) x • (x + y) = x           iv. IdentityCodes:     (a)  (b)  (c)  (d)

A. iii   iv     i     ii
B. iv   iii     i     ii
C. iv   iii    ii     i
D. iii   iv    ii     i
Answer» B. iv   iii     i     ii
243.

Which of the following 2 input Boolean logic functions is linearly inseparable?(a) AND             (b) OR(c) NOR             (d) XOR(e) NOT XOR

A. (a) and (b)
B. (b) and (c)
C. (c), (d) and (e)
D. (d) and (e)
Answer» E.
244.

Match the following:List – I                                    List – IIa. Controlled Inverter              i. a circuit that can add 3 bitsb. Full adder                             ii. a circuit that can add two binary numbersc. Half adder                             iii. a circuit that transmits a binary word or its 1’s complementd. Binary adder                        iv. a logic circuit that adds 2 bitsCodes :      a    b    c   d

A. iii    ii    iv   i
B. ii     iv   i    iii
C. iii    iv   i    ii
D. iii    i    iv   ii
Answer» E.
245.

X – = Y + 1 means

A. X = X – Y + 1
B. X = –X – Y – 1
C. X = –X + Y + 1
Answer» B. X = –X – Y – 1
246.

The hexadecimal equivalent of the octal number 2357 is:

A. 2EE
B. 2FF
C. 4EF
D. 4FE
Answer» D. 4FE
247.

How many different Boolean functions of degree 4 are there?

A. 2^4
B. 2^8
C. 2^12
D. 2^16
Answer» E.
248.

Convert the octal number 0.4051 into its equivalent decimal number.

A. 0.5100098
B. 0.2096
C. 0.52
D. 0.4192
Answer» B. 0.2096
249.

The three outputs x1x2x3 from the 8x3 priority encoder are used to provide a vector address of the form 101x1x2x300. What is the second highest priority vector address in hexadecimal if the vector addresses are starting from the one with the highest priority?

A. BC
B. A4
C. BD
D. AC
Answer» C. BD
250.

What will be the output of the following logic diagram?

A. x OR y
B. x AND y
C. x NOR y
D. x XNOR y
Answer» D. x XNOR y