42 Current Trends and Technologies

UGC NET

This post consists of 42 questions from Current Trends and Technologies from previous years UGC NET papers. this will help you to understand the pattern of questions comes under this section. Generally 5 out 50 questions comes from Current Trends and Technologies. New syllabus issued by the NTA is given in this post. This post also highlight the questions from each years. Try to solve the questions.

Best of luck for your NTA UGC NET  preparation.

Current Trends and Technologies :

The topics of current interest in Computer Science and Computer Applications shall be covered. The experts shall use their judgement from time to time to include the topics of popular interest, which are expected to be known for an application development software professional, currently, they include :




Parallel Computing :

Parallel virtual machine ( pvm ) and message passing interface ( MPI ) libraries and calls. Advanced architectures. Today’s fastest computers.

Mobile Computing :

Mobile connectivity – Cells, Framework, wireless delivery technology and switching methods, mobile information access devices, mobile data internetworking standards, cellular data communication protocols, mobile computing applications. Mobile databases – protocols, scope, tools and technology. M-business.

E – Technologies :

  • Electronic Commerce : Framework, Media Convergence of Applications, Consumer Applications, Organisation Applications.
  • Electronic Payment Systems : Digital Token, Smart Cards, Credit Cards, Risks in Electronic Payment System, Designing Electronic Payment Systems.
  • Electronic Data Interchange ( EDI ) : Concepts, Applications, ( Legal, Security and Privacy ) issues, EDI and Electronic Commerce, Standardization and EDI, EDI Software Implementation, EDI Envelope for Message Transport, Internet – Based EDI.
  • Digital Libraries and Data Warehousing : Concepts, Types of Digital documents, Issues behind document Infrastructure, Corporate Data Warehouses.
  • Software Agents : Characteristics and Properties of Agents, Technology behind Software Agents ( Applets, Browsers and Software Agents ).
  • Broadband Telecommunications : Concepts, Frame Relay, Cell Relay, Switched Multimegabit Data Service, Asynchronous Transfer Mode.
    Main concepts in Geographical Information System ( GIS ), E – cash, E – Business, ERP packages.
  • Data Warehousing : Data Warehouse environment, architecture of a data warehouse methodology, analysis, design, construction and administration.
  • Data Mining : Extracting models and patterns from large databases, data mining techniques, classification, regression, clustering, summarization, dependency modelling, link analysis, sequencing analysis, mining scientific and business data.

Windows Programming :

Introduction to Windows programming – Win32, Microsoft Foundation Classes ( MFC ), Documents and views, Resources, Message handling in windows.

Simple Applications ( in windows ) : Scrolling, splitting views, docking toolbars, status bars, common dialogs.

Advanced Windows Programming :

Multiple Document Interface ( MDI ), Multithreading. Object linking and Embedding ( OLE ). Active X controls. Active Template Library ( ATL ). Network programming.

 

Dec 2015

  1. _________system is market oriented and is used for data analysis by knowledge workers including Managers, Executives and Analysts.
    (1)     OLTP    2)     OLAP  (3)     Data System       (4)     Market System
  2. _________allows selection of the relevant information necessary for the data warehouse.
    1)     The Top-Down View  (2)     Data Warehouse View
    (3)     Datasource View           (4)     Business Query View
  3. _______uses electronic means to transfer funds directly from one account to another rather than by cheque or cash.
    (1)     M-Banking    2)     E-Banking  (3)     O-Banking    (4)     C-Banking

June 2015

  1. Which of the following statements is incorrect for Parallel Virtual Machine (PVM) ?
    (1) The PVM communication model provides asynchronous blocking send, asynchronous blocking receive, and non-blocking receive function.
    (2) Message buffers are allocated dynamically.
    (3) The PVM communication model assumes that any task can send a message to any other PVM task and that there is no limit to the size or number of such messages.
    4) In PVM model, the message order is not preserved.
  2. Which of the following is not valid with reference to Message Passing Interface (MPI) ?
    (1) MPI can run on any hardware platform.
    (2) The programming model is a distributed memory model.
    3) All parallelism is implicit.
    (4) MPI – Comm – Size returns the total number of MPI processes in specified communication.

Dec 2014

  1. __________ model is designed to bring prices down by increasing the number of customers who buy a particular product at once.
    (A) Economic Order Quantity      (B) Inventory
    (C) Data Mining                              D) Demand-Sensitive Pricing
  2. Match the following :
    List – I                                                         List – II
    a. Call control protocol               i. Interface between Base Transceiver Station (BTS) and Base Station
    Controller (BSC)
    b. A-bis                                        ii. Spread spectrum
    c. BSMAP                                   iii. Connection management
    d. CDMA                                    iv. Works between Mobile Switching Centre (MSC) and Base Station
    Subsystem (BSS)
    Codes :
    a b c d
    (A) iii iv i ii
    B) iii i iv ii
    (C) i ii iii iv
    (D) iv iii ii i

june 2014

  1. Match the following with respect to the mobile computing technologies :
    List-I List-II
    a. GPRS i. An integrated digital radio standard
    b. GSM ii. 3G wireless/Mobile technology
    c. UMTS iii. Nine different schemes for modulation and error correction
    d. EDGE iv. An emerging wireless service that offers g mobile data
    Codes :
    a b c d
    (A) iii iv ii i
    B) iv i ii iii
    (c) ii iii iv i
    (d) ii i iv iii
  2. Object Request Broker (ORB) is
    I. A software program that runs on the client as well as on the application server.
    II. A software program that runs on the client side only.
    III. A software program that runs on the application server, where most of the components reside.
    (A) I, II & III            (B) I&II              (C) II & III                D) I only
  3. A software agent is defined as
    I. A software developed for accomplishing a given task.
    II. A computer program which is capable of acting on behalf of the user in order to accomplish a given computational task.
    III. An open source software for accomplishing a given task.
    (A) I             B) II              (C) III               (D) All of the above
  4. Match the following :
    List -I                                        List – II
    a. Classification                  i. Principal component analysis
    b. Clustering                      ii. Branch and Bound
    c. Feature Extraction      iii. K-nearest neighbor
    d. Feature Selection         iv. K-means
    Codes:
    a b c d
    (A) iii iv ii i
    (B) iv iii i ii
    C) iii iv i ii
    (D) iv iii ii i
  5. SET, an open encryption and security specification model that is designed for protecting credit card transactions on the internet, stands for
    A) Secure Electronic Transaction
    (B) Secular Enterprise for Transaction
    (C) Security Electronic Transmission
    (D) Secured Electronic Termination




Dec 2013

13 Active X controls are Pentium binary programs that can be embedded in ____________
(A) Word pages
(B) URL pages
(C) Script pages
D) Web pages

  1. Match the following :
    List-I                                                           List – II
    a. Wireless Application Environment                 i. HTTP
    b. Wireless Transaction Protocol                       ii. IP
    c. Wireless Datagram Protocol                          iii. Scripts
    d. Wireless                                                            iv. UDP
    Codes :
    a b c d
    (A) ii iv i iii
    (B) iv iii ii i
    (C) iv iii i ii
    D) iii i iv ii
  2. Which of the following is widely used inside the telephone system for long-haul data traffic ?
    (A) ISDN
    B) ATM
    (C) Frame Relay
    (D) ISTN
  3. The document standards for EDI were first developed by large business house during the 1970s and are now under the control of the following standard organisation :
    (A) ISO
    B) ANSI
    (C) ITU-T
    (D) IEEE
  4. Electronic Data Interchange Software consists of the following four layers :
    (A) Business application, Internal format conversion, Network translator, EDI envelope
    B) Business application, Internal format conversion, EDI translator, EDI envelope
    (C) Application layer, Transport layer, EDI translator, EDI envelope
    (D) Application layer, Transport layer, IP layer, EDI envelope

 

June 2013

  1. Repository of information gathered from multiple sources, storing under unified scheme at a single site is called as
    (A) Data mining
    (B) Meta data
    C) Data warehousing
    (D) Database
  2. The task of correcting and pre processing data is called as
    (A) Data streaming
    B) Data cleaning
    (C) Data mining
    (D) Data storming

Dec 2012

  1. Identify the Risk factors which are associated with Electronic payment system.
    (A)    Fraudulent use of Credit Cards.
    (B)    Sending Credit Card details over internet.
    (C)    Remote storage of Credit Card details.
    D)    All of the above

June 2012

  1. Identify the incorrect statement :
    (A) The overall strategy drives the E-Commerce data warehousing strategy.
    (B) Data warehousing in an E-Commerce environment should be done in a classical manner.
    (C) E-Commerce opens up an entirely new world of web server.
    D) E-Commerce security threats can be grouped into three major categories.
  2. Reliability of software is directly dependent on
    (A) quality of the design
    B) number of errors present
    (C) software engineers experience
    (D) user requirement
  3. ______ is not an E-Commerce application.
    (A) House banking
    (B) Buying stocks
    (C) Conducting an auction
    D) Evaluating an employee
  4. ______ is a satellite based tracking system that enables the determination of person’s position.
    (A) Bluetooth
    (B) WAP
    (C) Short Message Service
    D) Global Positioning System

Dec 2011

  1. Enterprise Resource Planning (ERP)
    (A) has existed for over a decade.
    (B) does not integrate well with the functional areas other than operations.
    (C) is inexpensive to implement.
    D) automate and integrates the majority of business processes.
  2. Which of the following is false concerning Enterprise Resource Planning (ERP) ?
    (A) It attempts to automate and integrate the majority of business processes.
    (B) It shares common data and practices across the enterprise.
    C) It is inexpensive to implement.
    (D) It provides and access information in a real-time environment.
  3. To compare, overlay or cross analyze to maps in GIS
    (A) both maps must be in digital form
    (B) both maps must be at the same equivalent scale.
    (C) both maps must be on the same coordinate system
    D) All of the above
  4. Web Mining is not used in which of the following areas ?
    (A) Information filtering
    B) Crime fighting on the internet
    (C) Online transaction processing
    (D) Click stream analysis.

June 2011

  1. Data warehousing refers to
    (A) storing data offline at a separate site
    (B) backing up data regularly
    C) is related to data mining
    (D) uses tape as opposed to disk
  2. Virtual memory is
    (A) related to virtual reality
    (B) a form of ROM
    C) a form of RAM
    (D) None of the above
  3. “M-Commerce” refers to
    (A) a myth which does not exist in reality
    (B) the ability of business to reach potential customers wherever they are
    (C) the ability to have large capacity of memory storage dealing trade and commerce
    D) None of the above
  4. The principal electronic payment systems for electronic commerce is
    (A) Credit Card
    (B) Digital Wallet
    (C) Electronic Cheque
    D) All of the above
  5. Which is the most valuable electronic commerce to the individual customer in long run ?
    (A) Business to Customer
    B) Business to Business
    (C) Customer to Customer
    (D) None of the above

Dec 2010

  1. A data mart may contain
    (A) summarised data
    (B) de-normalized data
    (C) aggregate departmental data
    D) All of the above
  2. Data mining is
    A) the process of extracting valid, previously unknown, comprehensible and actionable information from large databases and using it to make crucial business decisions.
    (B) a tool that allows end users direct access and manipulation of data from within datawarehousing environment without the intervention of customised programming activity.
    (C) a tool that helps end users extract useful business information from large database.
    (D) All of the above
  3. E-Choupal refers to
    (A) calling meeting of Surpanches electronically.
    (B) conducting Panchayat meeting using latest electronic gadgets.
    C) providing window of information to villagers and farmers in NIC network.
    (D) None of the above
  4. The basic concepts of ethics in information society is/are
    (A) Responsibility
    (B) Accountability
    (C) Liability
    D) All of the above
  5. One of the distinguished features of super-computer over other category of computer is
    (A) parallel processing
    (B) highest accuracy level
    C) more speed
    (D) more capacity

June 2010

  1. A leased special high-speed connection from the local telephone carrier for business users that
    transmits at 1.544 mbps is known as ________ carrier.
    A) T1 (B) T2  (C) T3   (D) T4
  2. CDMA Cell uses ________ carriers of 1.25 MHz.
    A) 9 (B) 18  (C) 22   (D) 64
  3. At any given time Parallel Virtual Machine (PVM) has ________ send buffer
    and ________ receive buffer.
    A) one-one (B) one-two  (C) two-two   (D) two-one
  4. Data Mining uses ________, ________ and ________ to build effective predictive model.
    (i) Data set
    (ii) Information set
    (iii) Input set
    (iv) Process set
    (v) Output set
    (vi) Test set
    A) (i), (ii) and (iv)
    (B) (ii), (iv) and (v)
    (C) (i), (v) and (vi)
    (D) (ii), (iii) and (v)




Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.