UGC NET Paper 1 December (Pack of 3) - UGC NET PAPER 1 3rd December 2019 Morning Shift

Avatto>>UGC NET PAPER 1>>PREVIOUS YEAR SOLVED PAPERS>>UGC NET Paper 1 December (Pack of 3)>>UGC NET PAPER 1 3rd December 2019 Morning Shift

31. Which of the following is most suitable for being designated as Fourth Generation Language (4GL)?

  • Option : D
  • Explanation : A fourth generation (programming) language (4GL) is a grouping of programming languages that attempt to get closer than 3GLs to human language, form of thinking and conceptualization. Fourth generation languages are commonly used in database programming and scripts examples include Perl, PHP, Python, Ruby, and SQL. Structured Query Language (SQL) is a standard computer language for relational database management and data manipulation. SQL is used to query, insert, update and modify data.
Cancel reply
Cancel reply

34. Biosphere reserves are :
(i) area comprising terrestrial, marine and coastal ecosystems.
(ii) monitored by national governments.
(iii) areas where threatened animals and plants are kept in their habitat.
(iv) wildlife sanctuaries
Choose the correct statements from the options given below :

  • Option : A
  • Explanation : Biosphere reserves are areas comprising terrestrial, marine and coastal ecosystems. Each reserve promotes solutions reconciling the conservation of biodiversity with its sustainable use. These are nominated by national goveroments and remain under the sovereigu jurisdiction of the states where they are located.
Cancel reply
Cancel reply

35. Given below are two statements - one is labelled as Assertion (A) and the other as Reason (R) :
Assertion (A) : Sniffing may be used to steal data or information over a network.
Reason (R) : Sniffing is a process of monitoring and capturing all data packets passing through given network.
In the light of the above stated two statements, Choose the correct option from the choices given below :

  • Option : A
  • Explanation : Sniffing is a process of monitoring and capturing all data packets passing through given network. Sniffers are used by network/system administrator to monitor and troubleshoot network traffic. Sniffing technique is used by network professionals to diagnose network issues, and by malicious users to capture unencrypted data, like passwords and usernames.
Cancel reply
Cancel reply