Explore topic-wise MCQs in UGC-NET.

This section includes 1917 Mcqs, each offering curated multiple-choice questions to sharpen your UGC-NET knowledge and support exam preparation. Choose a topic below to get started.

401.

Which of the following statements about ERP system is true?

A. Most ERP software implementations fully achieve seamless integration.
B. ERP software packages are themselves combinations of seperate applications for manufacturing, materials, resource planning, general ledger, human resources, procurement and order entry.
C. Integration of ERP systems can be achieved in only one way.
D. An ERP package implemented uniformly throughout an enterprise is likely to contain very flexible connections to allow charges and software variations.
Answer» C. Integration of ERP systems can be achieved in only one way.
402.

A software system crashed 20 times in the year 2017 and for each crash, it took 2 minutes to restart. Approximately, what was the software availability in that year?

A. 96.9924%
B. 97.9924%
C. 98.9924%
D. 99.9924%
Answer» E.
403.

Software Quality Assurance(SQA) encompasses:

A. verification
B. validation
C. both verification and validation
D. none of the above
Answer» D. none of the above
404.

Software engineering primary aims on

A. Reliable software
B. Cost effective software
C. Reliable and cost effective software
D. None of these
Answer» D. None of these
405.

Reliability of software is directly dependent on

A. quality of the design
B. number of errors present
C. software engineers experience
D. user requirement
Answer» C. software engineers experience
406.

A single integrated program may contain

A. Programs that take case of all the basic accounting systems used by a business
B. Word processing, spread sheet processing, graphics and data management
C. An operating system and an application program
D. Both a and b
Answer» E.
407.

Emergency fixes known as patches are result of

A. adaptive maintenance
B. perfective maintenance
C. corrective maintenance
D. none of the above
Answer» D. none of the above
408.

Machine language programs

A. Consist of long sequence of binary numbers
B. Can express the same meaning in fever statements than can BASIC programs
C. Both a and b
D. None of these
Answer» B. Can express the same meaning in fever statements than can BASIC programs
409.

Any error whose cause cannot be identified anywhere within the software system is called …………..

A. Internal error
B. External error
C. Inherent error
D. Logic error
Answer» C. Inherent error
410.

Which one of the following is a object-oriented approaches:

A. The Booch method
B. The Rumbaugh method
C. The Coad and Yomdon method
D. All of the above
Answer» E.
411.

In transform analysis, input portion is called:

A. Afferent branch
B. Efferent branch
C. Central Transform
D. None of the above
Answer» B. Efferent branch
412.

In Software Metrics, McCABE’s cyclomatic number is given by following formula:

A. c=e-n+2p
B. c=e-n-2p
C. c=e+n+2p
D. c=e-n*2p
Answer» B. c=e-n-2p
413.

An error message produced by an interactive system should have:

A. always the error code
B. the list of mistakes done by the user displayed
C. a non-judgemental approach
D. the past records of the occurrence of the same mistake
Answer» C. a non-judgemental approach
414.

Main aim of software engineering is to produce

A. program
B. software
C. within budget
D. software within budget in the given schedule
Answer» E.
415.

The data flow Model of an application mainly shows

A. The underlining data and the relationship among them
B. Processing requirements and the flow of data
C. Decision and control information
D. Communication network structure
Answer» C. Decision and control information
416.

In ...............,modules A and B make use of a common data type, but perhaps perform different operations on it.

A. Data coupling
B. Stamp coupling
C. Control coupling
D. Content coupling
Answer» C. Control coupling
417.

A control structure use to create loops is

A. Sequence
B. Choice
C. Iteration
D. None of these
Answer» D. None of these
418.

Key process areas of CMM level 4 are also classified by a process which is

A. CMM level 2
B. CMM level 3
C. CMM level 5
D. All of the above
Answer» D. All of the above
419.

In a consistent language

A. Similar situations are handled in a similar way
B. Larger program chunks can be broken into smaller modules
C. Multiplication is always performed before addition in all expressions
D. Both a and c
Answer» B. Larger program chunks can be broken into smaller modules
420.

Problems with waterfall model are:1.    Real projects rarely follow this model proposes2.    It is often difficult for the customer3.    Working model is available only in the end4.    Developers are delayed unnecessarily

A. 1 and 4 only
B. 2 and 3 only
C. 1, 2 and 3 only
D. 1, 2, 3 and 4
Answer» E.
421.

Design phase includes

A. Data, architecture and procedural designs only
B. Architectural, Procedural and interface designs only
C. Data, architecture, interface & Procedural designs
D. All of these
Answer» D. All of these
422.

The Function Point (FP) metric is:

A. Calculated from user requirements
B. Calculated from Lines of code
C. Calculated from software’s complexity assessment
D. None of the above
Answer» D. None of the above
423.

Which of the following switching techniques is most suitable for interactive traffic ?

A. Circuit switching
B. Message switching
C. Packet switching
D. All of the above
Answer» D. All of the above
424.

IP address in B class is given by:

A. 125.123.123.2
B. 191.023.21.54
C. 192.128.32.56
D. 10.14.12.34
Answer» C. 192.128.32.56
425.

Which of the following is not a congestion policy at network layer?

A. Flow Control Policy
B. Packet Discard Policy
C. Packet Lifetime Management Policy
D. Routing Algorithm
Answer» B. Packet Discard Policy
426.

An image is 1024∗800 pixels with 3 bytes/pixel. Assume the image is uncompressed. How long does it take to transmit it over a 10-Mbps Ethernet ?

A. 196.6 seconds
B. 19.66 seconds
C. 1.966 seconds
D. 0.1966 seconds
Answer» D. 0.1966 seconds
427.

Match the following :(a) UDP             (i) Message Transfer Protocol(b) OSPF           (ii) Bit-oriented Protocol(c) SMTP           (iii) Interior Gateway Routing Protocol(d) HDLC           (iv) Connectionless Transport ProtocolCodes :      (a)   (b)  (c)  (d)

A. (iii)  (iv)  (ii)  (i)
B. (iv)  (iii)  (ii)  (i)
C. (iv)  (iii)  (i)  (ii)
D. (iii)  (iv)  (i)  (ii)
Answer» D. (iii)  (iv)  (i)  (ii)
428.

The local area network technology used in Ethernet

A. CSMA
B. CSMA/CD
C. CSMA/CA
D. ALOHA
Answer» C. CSMA/CA
429.

The period of a signal is 100 ms. Its frequency is .............

A. 100^3 Hertz
B. 10^−2 KHz
C. 10^−3 KHz
D. 10^5 Hertz
Answer» C. 10^−3 KHz
430.

The LAPB frame structure and the frame structure of SDLC are:

A. Opposite
B. Identical
C. Reversed
D. Non-identical
Answer» C. Reversed
431.

Making sure that all the data packets of a message are delivered to the destination is ................ control.

A. Error
B. Loss
C. Sequence
D. Duplication
Answer» B. Loss
432.

If carrier modulated by a digital bit stream, has one one of the possible phase of 0, 90, 180 and 270 degrees, then modulation called

A. BPSK
B. QPSK
C. QAM
D. MSK
Answer» C. QAM
433.

A bridge has access to ............... address in the same network.

A. Physical
B. Network
C. Datalink
D. Application
Answer» B. Network
434.

.................. do not take their decisions on measurements or estimates of the current traffic and topology.

A. Static algorithms
B. Adaptive algorithms
C. Non - adaptive algorithms
D. Recursive algorithms
Answer» D. Recursive algorithms
435.

Which one of the following media is multidrop?

A. Shielded Twisted pair cable
B. Unshielded Twisted pair cable
C. Thick Coaxial cable
D. Fiber Optic cable
Answer» D. Fiber Optic cable
436.

A secure protocol for personal emails:

A. SSL
B. PGP
C. RSA
D. Kerberos
Answer» C. RSA
437.

The cost of the network is usually determined by:

A. Time complexity
B. Switching complexity
C. Circuit complexity
D. None of these
Answer» C. Circuit complexity
438.

Usually information security in a network is achieved by:

A. Layering
B. Cryptography
C. Grade of service
D. None of the above
Answer» C. Grade of service
439.

Device on one network can communicate with devices on another network via a

A. Hub/Switch
B. Utility server
C. File server
D. Gateway
Answer» E.
440.

Vignere Cipher is a kind of:

A. Stream Cipher
B. Mono alphabetic Cipher
C. Poly alphabetic Cipher
D. Block Cipher
Answer» D. Block Cipher
441.

A station in a network, forward incoming packets by placing them on its shortest output queue. What routing algorithm is being used?

A. Hot potato routing
B. Flooding
C. Static routing
D. Delta routing
Answer» B. Flooding
442.

Object Request Broker (ORB) isI. A software program that runs on the client as well as on the application server.II. A software program that runs on the client side only.III. A software program that runs on the application server, where most of the components reside.

A. I,II and III
B. I & II
C. II & III
D. I only
Answer» E.
443.

Another name of IEEE 802.11a is …………………

A. Wi-Max
B. Fast Ethernet
C. Wi-Fi
D. 802.11 g
Answer» D. 802.11 g
444.

Virtual circuit is associated with a ..................... service.

A. Connectionless
B. Error-free
C. Segmentation
D. Connection-oriented
Answer» E.
445.

Which of the following statement/s is/are true?(i) Firewalls can screen traffic going into or out of an organization.(ii) Virtual private networks can stimulate an old leased network to provide certain desirable properties.Choose the correct answer from the code given below:

A. (i) only
B. (ii) only
C. Both (i) and (ii)
D. Neither (i) nor (ii)
Answer» D. Neither (i) nor (ii)
446.

What is the baud rate of the standard 10 Mbps Ethernet ?

A. 10 megabaud
B. 20 megabaud
C. 30 megabaud
D. 40 megabaud
Answer» C. 30 megabaud
447.

The number of bits used for addressing in Gigabit Ethernet is ...................

A. 32 bits
B. 48 bits
C. 64 bits
D. 128 bits
Answer» C. 64 bits
448.

In order that a code is ‘t’ error correcting, the minimum Hamming distance should be:

A. t
B. 2t-1
C. 2t
D. 2t+1
Answer» E.
449.

What is the transmission signal coding method for a T1 carrier called ?

A. Binary
B. NRZ
C. Bipolar
D. Manchester
Answer» D. Manchester
450.

The ................ is a set of standards that defines how a dynamic web document should be written, how input data should be supplied to the program, and how the output result should be used.

A. Hyper Text Markup Language
B. File Transfer Protocol
C. Hyper Text Transfer Protocol
D. Common Gateway Interface
Answer» E.