5 Hours MARATHON-UGC NET-Paper 1 & Computer Science Together| Most Expected Topic & Questions-PYQs

5 Hours MARATHON-UGC NET-Paper 1 & Computer Science Together| Most Expected Topic & Questions-PYQs

TLDR;

Alright, folks, buckle up for a marathon session covering Paper 1 and Computer Science (Paper 2)! The aim is to prep you for tackling both papers together, just like in the exam hall. Remember, every question carries equal weightage, so no slacking on either paper.

  • Questions can be multiple-choice, match the following, or even calculation-based.
  • Key is to recall concepts quickly and use elimination strategies.
  • Don't take any topic lightly, every mark counts.

Research Aptitude Questions [2:50]

First up, Interpretivism contrasts with positivism, focusing on qualitative research. Internal validity threats include maturation, instrumentation, and historical events. When it comes to sampling, empirical-inductive research leans towards non-probability sampling methods. For studying hidden populations, snowball sampling and using key informants are your best bet.

Sampling Techniques [9:10]

In sampling, simple random sampling means each unit has an equal shot at being selected. Systematic sampling involves picking every 'kth' item. Snowball sampling relies on referrals.

Logical Reasoning: Square of Opposition [13:50]

Moving on to logical reasoning, remember the square of opposition and logical equivalences. For example, the logically equivalent statement of "No fishes are mammals" is "No mammals are fishes". To solve these questions, remember the code for A, E, I, O type statements and their equivalences like converse, contrapositive, and obverse.

More Logical Reasoning [18:31]

In logical reasoning, contrary statements can't both be true but can be false. Universal affirmative statements (A type) are contrasted with universal negative statements (E type).

Syllogism: Mood and Figure [24:49]

To identify mood and figure, remember the three-letter combination and middle term placement.

Informal Fallacies [28:14]

Ad hominem is attacking the person instead of the issue. Strawman fallacy is distorting the argument. False cause is mistaking the relation, and red herring is distraction.

Number Systems and Base Conversion [32:04]

Switching gears to ICT, when converting hexadecimal to binary, remember to use 4 bits. For octal, use 3 bits. When dealing with bases, the range is always 0 to base - 1.

Signed Numbers and Gray Code [37:00]

For signed numbers, remember one bit is reserved for the sign. To convert decimal to Gray code, convert decimal to binary first, then perform XOR operations.

Logic Gates and Memory Hierarchy [41:03]

Basic logic gates are NAND and NOR. Remember, in the memory hierarchy, as speed increases, size decreases, and cost increases.

Memory Access Time and RAM Types

Speed is inversely proportional to access time. Static RAM (SRAM) is faster and used for cache, while Dynamic RAM (DRAM) is slower and used for main memory.

Key Registers and Instruction Execution

Key registers: Program Counter (PC) holds the address of the next instruction, Instruction Register (IR) holds the current instruction, Accumulator (ACC) performs operations, and Memory Buffer Register (MBR) stores data temporarily.

Instruction Set Architectures: RISC vs CISC

RISC (Reduced Instruction Set Computer) uses simpler instructions, while CISC (Complex Instruction Set Computer) uses complex instructions.

Error Detection and K-Maps

Two's complement is used for negative numbers. Parity bits are for error detection. Always practice K-maps for simplifying Boolean expressions.

Combinational vs Sequential Circuits and Memory Mapped I/O

Combinational circuits depend on current input, while sequential circuits depend on current and previous inputs. NAND and NOR are basic gates. In memory-mapped I/O, I/O devices and memory share the same address space.

DMA Transfer Modes and Interrupt Handling

DMA (Direct Memory Access) allows data transfer bypassing the CPU. Modes include burst mode, cycle stealing, and interleaving. Interrupt handling involves saving the current state, loading the interrupt routine, executing it, and then restoring the previous state.

Cache Coherence and Memory Policies

Cache coherence ensures data consistency across multiple processors. Write-through updates both cache and memory, while write-back updates only cache initially.

Interrupts and Polling

Interrupts are hardware signals, while polling is a software protocol where the CPU checks for requests.

Instruction Cycle and Addressing Modes

The instruction cycle involves fetching, decoding, calculating the effective address, fetching the operand, and executing the instruction. Addressing modes include immediate, direct, indirect, register direct, and register indirect.

8085 Instructions and Addressing Modes

Know your 8085 instructions and their corresponding addressing modes.

Communication Models: Aristotle, Lasswell, Shannon-Weaver

Aristotle's model focuses on the speaker, speech, audience, occasion, and effect, aiming to persuade. Lasswell's model focuses on "Who says what in which channel to whom with what effect," emphasizing media. Shannon-Weaver's model introduces noise in the communication channel.

Communication Models: Osgood-Schramm, Berlo's SMCR

Osgood-Schramm's model introduces the "field of experience" and feedback. Berlo's SMCR model emphasizes the skills of the communicator and listener.

Key Communication Concepts: Gatekeeping, Persuasion, Entropy

Gatekeeping is related to news, persuasion to advertising, and entropy to confusion in communication.

ICT: Firewalls, Cookies, and Spam

Firewalls isolate networks, cookies store browsing data, and spam is unsolicited advertising.

Perceptual Time and Semiotics

Perceptual time refers to how our brains process nonverbal cues. Semiotics is the study of signs and symbols in communication.

Aristotle's Rhetorical Strategies: Ethos, Pathos, Logos

To persuade, use ethos (ethics), pathos (emotion), and logos (logic).

Networking Devices: Routers, Gateways, Modems, Switches

Routers transfer data between networks, gateways connect networks with different protocols, modems convert signals, and switches operate within a local network.

Communication Types: Interpersonal vs Group

Interpersonal communication offers quicker, more reliable feedback than group communication.

ICT: Tethering, GPS, and Malware

Tethering shares a mobile data connection. GPS is for global positioning. Malware includes Trojans (appear legitimate), worms (self-replicating), ransomware (demands payment), and spyware (monitors activity).

Data Flow and Network Security

Data transmission can be simplex (one-way), half-duplex (both ways, not simultaneously), or full-duplex (both ways simultaneously).

Barriers to Communication

Barriers to communication can be psychological, semantic, organizational, or cultural.

ICT: Printers and Digital Initiatives

Laser printers are non-impact printers using toner. Digital initiatives include NDL (National Digital Library), and SWAYAM (for MOOCs).

Software Types: System, Application, Utility, Communication

System software manages hardware, application software performs specific tasks, utility software maintains the system, and communication software facilitates communication.

Operating Systems: Booting and Process Management

The booting process involves BIOS setup, power-on self-test (POST), loading the OS, system configuration, loading utilities, and user authentication. Processes ready for execution reside in the ready queue.

CPU Scheduling and Memory Management

In preemptive CPU scheduling, a running process can be moved to the ready state. Key memory areas: text (program code), data (global variables), heap (dynamic allocation), and stack (local variables).

Job Pools and Scheduling Algorithms

The job pool resides in primary memory. Scheduling algorithms include FCFS (First-Come, First-Served), SJF (Shortest Job First), and Round Robin.

Real-Time Systems and EDF Scheduling

EDF (Earliest Deadline First) is best for real-time systems.

Memory Management: Paging and Segmentation

Paging and segmentation are memory management techniques. Paging uses fixed-size pages, while segmentation uses variable-size segments.

Page Table Structures and Locality of Reference

Page table structures include clustered, hierarchical, and inverted page tables. Types of locality of reference: temporal (time-based) and spatial (space-based).

Process Synchronization and Mutual Exclusion

Mutual exclusion ensures only one process accesses a critical section at a time.

Spin Locks and Process States

Spin locks use busy-waiting.

Linux System Calls and Fork Programming

Common Linux system calls include fork (creates a new process), exit (terminates a process), and exec (executes a program).

Socket Programming and Kernel Functions

In socket programming, "listen" indicates the server will accept connections.

Distributed Operating Systems and Hypervisors

Distributed operating systems manage multiple computers as a single system. Type 1 hypervisors run directly on hardware, while Type 2 run on top of an OS.

Virtualization Techniques: Full, Para, Containerization

Full virtualization emulates hardware, paravirtualization modifies the guest OS, and containerization isolates multiple instances of an OS kernel.

Operating System Security Levels

Security levels range from Type A (highest) to Type D (lowest).

RAID Levels: 0, 1, 2, 3, 5, 6, 10

RAID (Redundant Array of Independent Disks) levels offer different balances of performance and redundancy. Know the characteristics of RAID 0 (striping), RAID 1 (mirroring), RAID 5 (striping with parity), RAID 6 (striping with dual parity), and RAID 10 (combination of mirroring and striping).

Watch the Video

Date: 12/29/2025 Source: www.youtube.com
Share

Stay Informed with Quality Articles

Discover curated summaries and insights from across the web. Save time while staying informed.

© 2024 BriefRead