UGC NET Paper1 Previous Year Solved Papers - 3rd December 2019 Morning Shift

Avatto > > UGC NET PAPER 1 > > UGC NET Paper1 Previous Year Solved Papers > > 3rd December 2019 Morning Shift

31. Which of the following is most suitable for being designated as Fourth Generation Language (4GL)?

  • Option : D
  • Explanation : A fourth generation (programming) language (4GL) is a grouping of programming languages that attempt to get closer than 3GLs to human language, form of thinking and conceptualization. Fourth generation languages are commonly used in database programming and scripts examples include Perl, PHP, Python, Ruby, and SQL. Structured Query Language (SQL) is a standard computer language for relational database management and data manipulation. SQL is used to query, insert, update and modify data.
Cancel reply

Your email address will not be published. Required fields are marked *


Cancel reply

Your email address will not be published. Required fields are marked *


32. Which of the following tools is a collaboration tool for providing virtual classroom environment?

Cancel reply

Your email address will not be published. Required fields are marked *


Cancel reply

Your email address will not be published. Required fields are marked *


33. Identify the distinctive feature of traditional method of Indian education from the following list:

Cancel reply

Your email address will not be published. Required fields are marked *


Cancel reply

Your email address will not be published. Required fields are marked *


34. Biosphere reserves are :
(i) area comprising terrestrial, marine and coastal ecosystems.
(ii) monitored by national governments.
(iii) areas where threatened animals and plants are kept in their habitat.
(iv) wildlife sanctuaries
Choose the correct statements from the options given below :

  • Option : A
  • Explanation : Biosphere reserves are areas comprising terrestrial, marine and coastal ecosystems. Each reserve promotes solutions reconciling the conservation of biodiversity with its sustainable use. These are nominated by national goveroments and remain under the sovereigu jurisdiction of the states where they are located.
Cancel reply

Your email address will not be published. Required fields are marked *


Cancel reply

Your email address will not be published. Required fields are marked *


35. Given below are two statements - one is labelled as Assertion (A) and the other as Reason (R) :
Assertion (A) : Sniffing may be used to steal data or information over a network.
Reason (R) : Sniffing is a process of monitoring and capturing all data packets passing through given network.
In the light of the above stated two statements, Choose the correct option from the choices given below :

  • Option : A
  • Explanation : Sniffing is a process of monitoring and capturing all data packets passing through given network. Sniffers are used by network/system administrator to monitor and troubleshoot network traffic. Sniffing technique is used by network professionals to diagnose network issues, and by malicious users to capture unencrypted data, like passwords and usernames.
Cancel reply

Your email address will not be published. Required fields are marked *


Cancel reply

Your email address will not be published. Required fields are marked *