Advertise Here

Thursday 5 November 2015

Wordpress Insert Record Into Table And Get Last Insert Id

In Wordpress, Record insertion into table is quite simple.
1. Create an Object of $wpdb;
2. Set the data in an Array.
3. Set the table name.
4. Use insert function  to insert record.
5. In insert function, first argument is table name and Second argument is array.



See Example Below:
global $wpdb;
$tableName = $wpdb->prefix . "users";
$saveFieldArray=array( 
'user_login' => 'mylogin',
'user_pass'=>'pass',
'user_nicename' => 'Poonam', 
'user_email' => 'email@no-spam.com',
'user_registered' => date('Y-m-d H:i:s',time()),
'user_status' => '1',
'display_name' => 'Arun Kumar');

//Insert Into Database
$wpdb->insert( $tableName, $saveFieldArray);

//get the last inert Id
$lastInsertId = $wpdb->insert_id;  

Saturday 15 August 2015

PHP - A Simple HTML Form

PHP - A Simple HTML Form

PHP form


The example below displays a simple HTML form with two input fields and a submit button:

<html>
<body>

<form action="welcome.php" method="post">
Name: <input type="text" name="name"><br>
E-mail: <input type="text" name="email"><br>
<input type="submit">
</form>

</body>
</html>  


When the user fills out the form above and clicks the submit button, the form data is sent for processing to a PHP file named "welcome.php". The form data is sent with the HTTP POST method.

To display the submitted data you could simply echo all the variables. The "welcome.php" looks like this:

<html>
<body>

Welcome <?php echo $_POST["name"]; ?><br>
Your email address is: <?php echo $_POST["email"]; ?>

</body>
</html> 


The output could be something like this:
Welcome John
Your email address is john.doe@example.com 
The same result could also be achieved using the HTTP GET method:

<html>
<body>

<form action="welcome_get.php" method="get">
Name: <input type="text" name="name"><br>
E-mail: <input type="text" name="email"><br>
<input type="submit">
</form>

</body>
</html>

and "welcome_get.php" looks like this:

<html>
<body>

Welcome <?php echo $_GET["name"]; ?><br>
Your email address is: <?php echo $_GET["email"]; ?>

</body>
</html> 


The code above is quite simple. However, the most important thing is missing. You need to validate form data to protect your script from malicious code.


Video Demonstration



GET vs. POST

Both GET and POST create an array (e.g. array( key => value, key2 => value2, key3 => value3, ...)). This array holds key/value pairs, where keys are the names of the form controls and values are the input data from the user.

Both GET and POST are treated as $_GET and $_POST. These are superglobals, which means that they are always accessible, regardless of scope - and you can access them from any function, class or file without having to do anything special.

$_GET is an array of variables passed to the current script via the URL parameters.
$_POST is an array of variables passed to the current script via the HTTP POST method.

When to use GET?

Information sent from a form with the GET method is visible to everyone (all variable names and values are displayed in the URL). GET also has limits on the amount of information to send. The limitation is about 2000 characters.

However, because the variables are displayed in the URL, it is possible to bookmark the page. This can be useful in some cases.

GET may be used for sending non-sensitive data.
Note: GET should NEVER be used for sending passwords or other sensitive information!

When to use POST?

Information sent from a form with the POST method is invisible to others (all names/values are embedded within the body of the HTTP request) and has no limits on the amount of information to send.

Moreover POST supports advanced functionality such as support for multi-part binary input while uploading files to server.

However, because the variables are not displayed in the URL, it is not possible to bookmark the page.



Friday 18 July 2014

Sets in Discrete Structures

Definition : Sets

A set is an unordered collection of objects.

The objects in a set are called the elements, or members,of the set. A set is said to contain its elements.

Two sets are equal if and only if they have the same elements. That is, if A and Bare sets, then A and B are equal if and only if ∀x(x∈A↔x∈B). We write A=B if A and B are equal sets.

The set A is said to be a subset of B if and only if every element of A is also an element of B. We use the notation A⊆B to indicate that A is a subset of the set B.

Let S be a set. If there are exactly n distinct elements in S where n is a non negative integer, we say that S is a finite set and that n is the cardinality of S. The cardinality of S is denoted by |S|.

A set is said to be infinite if it is not finite.

The Power Set

Given a set S, the power set of S is the set of all subsets of the set S. The power set of S is
denoted by P(S).

Cartesian Products

The ordered n-tuple (a1,a2,...,an) is the ordered collection that has a1 as its first element, a2 as its second element,...,and an as its nth element.

Let A and B be sets. The Cartesian product of A and B, denoted by A×B, is the set of all ordered pairs (a,b), where a∈A and b∈B. Hence, A×B={(a,b) | a ∈ A ∧ b ∈ B}.

The Cartesian product of the sets A1,A2,...,An, denoted by A1×A2× ··· ×An, is the set of ordered n-tuples (a1,a2,...,an), where ai belongs to Ai for i = 1,2,...,n. In other words,
A1×A2× ··· ×An = {(a1,a2,...,an) | ai ∈ Ai for i =1,2,...,n}.




Dynamic Memory Allocation and Dynamic Structures

Dynamic Memory Allocation and Dynamic Structures

Dynamic allocation is a pretty unique feature to C (amongst high level languages). It enables us to create data types and structures of any size and length to suit our programs need within the program.
We will look at two common applications of this:
  • dynamic arrays
  • dynamic data structure e.g. linked lists

Malloc, Sizeof, and Free

The Function malloc is most commonly used to attempt to ``grab'' a continuous portion of memory. It is defined by:
   void *malloc(size_t number_of_bytes)
That is to say it returns a pointer of type void * that is the start in memory of the reserved portion of size number_of_bytes. If memory cannot be allocated a NULL pointer is returned.
Since a void * is returned the C standard states that this pointer can be converted to any type. The size_t argument type is defined in stdlib.h and is an unsigned type.
So:

    char *cp;
   cp = malloc(100);

attempts to get 100 bytes and assigns the start address to cp.
Also it is usual to use the sizeof() function to specify the number of bytes:

    int *ip;
   ip = (int *) malloc(100*sizeof(int));
Some C compilers may require to cast the type of conversion. The (int *) means coercion to an integer pointer. Coercion to the correct pointer type is very important to ensure pointer arithmetic is performed correctly. I personally use it as a means of ensuring that I am totally correct in my coding and use cast all the time.
It is good practice to use sizeof() even if you know the actual size you want -- it makes for device independent (portable) code.
sizeof can be used to find the size of any data type, variable or structure. Simply supply one of these as an argument to the function.
SO:

   int i;
   struct COORD {float x,y,z};
   typedef struct COORD PT;
 
   sizeof(int), sizeof(i),
   sizeof(struct COORD) and
   sizeof(PT) are all ACCEPTABLE

In the above we can use the link between pointers and arrays to treat the reserved memory like an array. i.e we can do things like:
   ip[0] = 100;
or
   for(i=0;i<100;++i) scanf("%d",ip++);


When you have finished using a portion of memory you should always free() it. This allows the memory freed to be aavailable again, possibly for further malloc() calls
The function free() takes a pointer as an argument and frees the memory to which the pointer refers.

Calloc and Realloc

There are two additional memory allocation functions, Calloc() and Realloc(). Their prototypes are given below:
void *calloc(size_t num_elements, size_t element_size};

void *realloc( void *ptr, size_t new_size);
Malloc does not initialise memory (to zero) in any way. If you wish to initialise memory then use calloc. Calloc there is slightly more computationally expensive but, occasionally, more convenient than malloc. Also note the different syntax between calloc and malloc in that calloc takes the number of desired elements, num_elements, and element_size, element_size, as two individual arguments.
Thus to assign 100 integer elements that are all initially zero you would do:

    int *ip;
   ip = (int *) calloc(100, sizeof(int));
Realloc is a function which attempts to change the size of a previous allocated block of memory. The new size can be larger or smaller. If the block is made larger then the old contents remain unchanged and memory is added to the end of the block. If the size is made smaller then the remaining contents are unchanged.
If the original block size cannot be resized then realloc will attempt to assign a new block of memory and will copy the old block contents. Note a new pointer (of different value) will consequently be returned. You must use this new value. If new memory cannot be reallocated then realloc returns NULL.
Thus to change the size of memory allocated to the *ip pointer above to an array block of 50 integers instead of 100, simply do:
   ip = (int *) calloc( ip, 50);

Linked Lists

  Let us now return to our linked list example:

  typedef struct {  int value;
        ELEMENT *next;
     } ELEMENT; 

We can now try to grow the list dynamically:
  link = (ELEMENT *) malloc(sizeof(ELEMENT));
This will allocate memory for a new link.
If we want to deassign memory from a pointer use the free() function:
  free(link)
See Example programs (queue.c) below and try exercises for further practice.

Full Program: queue.c

A queue is basically a special case of a linked list where one data element joins the list at the left end and leaves in a ordered fashion at the other end.
The full listing for queue.c is as follows:
/*            */
/* queue.c            */
/* Demo of dynamic data structures in C                      */

#include <stdio.h>

#define FALSE 0
#define NULL 0

typedef struct {
    int     dataitem;
    struct listelement *link;
}               listelement;

void Menu (int *choice);
listelement * AddItem (listelement * listpointer, int data);
listelement * RemoveItem (listelement * listpointer);
void PrintQueue (listelement * listpointer);
void ClearQueue (listelement * listpointer);

main () {
    listelement listmember, *listpointer;
    int     data,
            choice;

    listpointer = NULL;
    do {
 Menu (&choice);
 switch (choice) {
     case 1: 
  printf ("Enter data item value to add  ");
  scanf ("%d", &data);
  listpointer = AddItem (listpointer, data);
  break;
     case 2: 
  if (listpointer == NULL)
      printf ("Queue empty!\n");
  else
      listpointer = RemoveItem (listpointer);
  break;
     case 3: 
  PrintQueue (listpointer);
  break;

     case 4: 
  break;

     default: 
  printf ("Invalid menu choice - try again\n");
  break;
 }
    } while (choice != 4);
    ClearQueue (listpointer);
}    /* main */

void Menu (int *choice) {

    char    local;

    printf ("\nEnter\t1 to add item,\n\t2 to remove item\n\
\t3 to print queue\n\t4 to quit\n");
    do {
 local = getchar ();
 if ((isdigit (local) == FALSE) && (local != '\n')) {
     printf ("\nyou must enter an integer.\n");
     printf ("Enter 1 to add, 2 to remove, 3 to print, 4 to quit\n");
 }
    } while (isdigit ((unsigned char) local) == FALSE);
    *choice = (int) local - '0';
}

listelement * AddItem (listelement * listpointer, int data) {

    listelement * lp = listpointer;

    if (listpointer != NULL) {
 while (listpointer -> link != NULL)
     listpointer = listpointer -> link;
 listpointer -> link = (struct listelement  *) malloc (sizeof (listelement));
 listpointer = listpointer -> link;
 listpointer -> link = NULL;
 listpointer -> dataitem = data;
 return lp;
    }
    else {
 listpointer = (struct listelement  *) malloc (sizeof (listelement));
 listpointer -> link = NULL;
 listpointer -> dataitem = data;
 return listpointer;
    }
}

listelement * RemoveItem (listelement * listpointer) {

    listelement * tempp;
    printf ("Element removed is %d\n", listpointer -> dataitem);
    tempp = listpointer -> link;
    free (listpointer);
    return tempp;
}

void PrintQueue (listelement * listpointer) {

    if (listpointer == NULL)
 printf ("queue is empty!\n");
    else
 while (listpointer != NULL) {
     printf ("%d\t", listpointer -> dataitem);
     listpointer = listpointer -> link;
 }
    printf ("\n");
}

void ClearQueue (listelement * listpointer) {

    while (listpointer != NULL) {
 listpointer = RemoveItem (listpointer);
    }
}

Exercises

Exercise 12456

Write a program that reads a number that says how many integer numbers are to be stored in an array, creates an array to fit the exact size of the data and then reads in that many numbers into the array.

Exercise 12457

Write a program to implement the linked list as described in the notes above.

Exercise 12458

Write a program to sort a sequence of numbers using a binary tree (Using Pointers). A binary tree is a tree structure with only two (possible) branches from each node (Fig. 10.1). Each branch then represents a false or true decision. To sort numbers simply assign the left branch to take numbers less than the node number and the right branch any other number (greater than or equal to). To obtain a sorted list simply search the tree in a depth first fashion.



 
Fig. 10.1 Example of a binary tree sort Your program should: Create a binary tree structure. Create routines for loading the tree appropriately. Read in integer numbers terminated by a zero. Sort numbers into numeric ascending order. Print out the resulting ordered values, printing ten numbers per line as far as possible.
Typical output should be
    The sorted values are:
     2  4  6  6  7  9 10 11 11 11
    15 16 17 18 20 20 21 21 23 24
    27 28 29 30

Thursday 17 July 2014

Waterfall Model

The Waterfall Model was first Process Model to be introduced. It is also referred to as a linear-sequential life cycle model. It is very simple to understand and use. In a waterfall model, each phase must be completed before the next phase can begin and there is no overlapping in the phases.

Waterfall model is the earliest SDLC approach that was used for software development .
The waterfall Model illustrates the software development process in a linear sequential flow; hence it is also referred to as a linear-sequential life cycle model. This means that any phase in the development process begins only if the previous phase is complete. In waterfall model phases do not overlap.

Waterfall Model design

Waterfall approach was first SDLC Model to be used widely in Software Engineering to ensure success of the project. In "The Waterfall" approach, the whole process of software development is divided into separate phases. In Waterfall model, typically, the outcome of one phase acts as the input for the next phase sequentially.

Following is a diagrammatic representation of different phases of waterfall model.
The sequential phases in Waterfall model are:
  • Requirement Gathering and analysis: All possible requirements of the system to be developed are captured in this phase and documented in a requirement specification doc.
  • System Design: The requirement specifications from first phase are studied in this phase and system design is prepared. System Design helps in specifying hardware and system requirements and also helps in defining overall system architecture.
  • Implementation: With inputs from system design, the system is first developed in small programs called units, which are integrated in the next phase. Each unit is developed and tested for its functionality which is referred to as Unit Testing.
  • Integration and Testing: All the units developed in the implementation phase are integrated into a system after testing of each unit. Post integration the entire system is tested for any faults and failures.
  • Deployment of system: Once the functional and non functional testing is done, the product is deployed in the customer environment or released into the market.
  • Maintenance: There are some issues which come up in the client environment. To fix those issues patches are released. Also to enhance the product some better versions are released. Maintenance is done to deliver these changes in the customer environment.
All these phases are cascaded to each other in which progress is seen as flowing steadily downwards (like a waterfall) through the phases. The next phase is started only after the defined set of goals are achieved for previous phase and it is signed off, so the name "Waterfall Model". In this model phases do not overlap.

Waterfall Model Application

Every software developed is different and requires a suitable SDLC approach to be followed based on the internal and external factors. Some situations where the use of Waterfall model is most appropriate are:
  • Requirements are very well documented, clear and fixed.
  • Product definition is stable.
  • Technology is understood and is not dynamic.
  • There are no ambiguous requirements.
  • Ample resources with required expertise are available to support the product.
  • The project is short.

Waterfall Model Pros & Cons

Advantage

The advantage of waterfall development is that it allows for departmentalization and control. A schedule can be set with deadlines for each stage of development and a product can proceed through the development process model phases one by one.

Development moves from concept, through design, implementation, testing, installation, troubleshooting, and ends up at operation and maintenance. Each phase of development proceeds in strict order.

Disadvantage

The disadvantage of waterfall development is that it does not allow for much reflection or revision. Once an application is in the testing stage, it is very difficult to go back and change something that was not well-documented or thought upon in the concept stage.

The following table lists out the pros and cons of Waterfall model:

ProsCons
  • Simple and easy to understand and use
  • Easy to manage due to the rigidity of the model . each phase has specific deliverables and a review process.
  • Phases are processed and completed one at a time.
  • Works well for smaller projects where requirements are very well understood.
  • Clearly defined stages.
  • Well understood milestones.
  • Easy to arrange tasks.
  • Process and results are well documented.
  • No working software is produced until late during the life cycle.
  • High amounts of risk and uncertainty.
  • Not a good model for complex and object-oriented projects.
  • Poor model for long and ongoing projects.
  • Not suitable for the projects where requirements are at a moderate to high risk of changing. So risk and uncertainty is high with this process model.
  • It is difficult to measure progress within stages.
  • Cannot accommodate changing requirements.
  • No working software is produced until late in the life cycle.
  • Adjusting scope during the life cycle can end a project.
  • Integration is done as a "big-bang. at the very end, which doesn't allow identifying any technological or business bottleneck or challenges early.


Sunday 13 July 2014

2014 June UGC NET Answer Key Paper I

2014 June UGC NET Previous Years Solved Paper I


 

This page will provide solved question papers of previous years or old question paper with answer keys of National Eligibility Test (NET) Examination of University Grants Commission (UGC) June 2014 for paper 1, Test Booklet Code (Set or Series) W. The paper I is the general or compulsory for all subjects with the subject code 00. The question and answer of Set X, Y and Z are not mentioned as they are same with that of Set W.

1. Break-down in verbal communication is described as

(A) Short Circuit

(B) Contradiction

(C) Unevenness

(D) Entropy

Answer: (A)



2. The Telephone Model of Communication was first developed in the area of

(A) Technological theory

(B) Dispersion theory

(C) Minimal effects theory

(D) Information theory

Answer: (A)



3. The Dada Saheb Phalke Award for 2013 has been conferred on

(A) Karan Johar

(B) Amir Khan

(C) Asha Bhonsle

(D) Gulzar

Answer: (D)



4. Photographs are not easy to

(A) Publish

(B) Secure

(C) Decode

(D) Change

Answer: (B)



5. The grains that appear on a television set when operated are also referred to as

(A) Sparks

(B) Green Dots

(C) Snow

(D) Rain Drops

Answer: (C)



6. In circular communication, the encoder becomes a decoder when there is

(A) Noise

(B) Audience

(C) Criticality

(D) Feedback

Answer: (A)



7. In a post-office, stamps of three different denominations of Rs 7, Rs 8, Rs 10 are available. The exact amount for which one cannot buy stamps is

(A) 19

(B) 20

(C) 23

(D) 29

Answer: (A)



8. In certain coding method, the word QUESTION is encoded as DOMESTIC. In this coding, what is the code word for the word RESPONSE?

(A) OMESUCEM

(B) OMESICSM

(C) OMESICEM

(D) OMESISCM

Answer: (C)



9. lf the series 4,5,8,13,14,17,22,........ is continued in the same pattern, which one of the following is not a term of this series?

(A) 31

(B) 32

(C) 33

(D) 35

Answer: (C)



10. Complete the series BB, FE, II, ML, PP: ..:........by choosing one of the following option given :

(A) TS

(B) ST

(C) RS

(D) SR

Answer: (A)



11. A man started walking frorn his house towards south. After walking 6 km, he turned to his left walked 5 Km after. Then he walked further 3 km after turning left. He then turned to his left and continued his walk for 9 km. How far is he away from his house?

(A) 3 km

(B) 4 km

(C) 5 km

(D) 6 km

Answer: (C)



12. One writes all numbers from 50 to 99 without the digits 2 and 7. How many numbers have been written?

(A) 32

(B) 36

(C) 40

(D) 38

Answer: (A)



13. "lf a large diamond is cut up into little bits it will lose its value just as an army is divided up into small units of soldiers. It loses its strength." The argument put above may be called as

(A) Analogical

(B) Deductive

(C) Statistical

(D) Casual

Answer: (A)



14. Given below are some characteristics of logical argument. Select the code which expresses a characteristic which is not of inductive in character.

(A) The conclusion is claimed to follow from its premises.

(B) The conclusion is based on causal relation.

(C) The conclusion conclusively follows from its premises.

(D) The conclusion is based on observation and experiment

Answer: (A)



15. If two propositions having the same subject and predicate terms can both be true but cannot both be false, the relation between those two propositions is called

(A) contradictory

(B) contrary

(C) subcontrary

(D) subaltern

Answer: (C,D)



16. Given below are two premises and four conclusions drawn from those premises. Select the code that expresses conclusion drawn validly from the premises (separately or jointly).

Premises:

(a) All dogs are mammals.

(b) No cats are dogs.

Conclusions:

(i) No cats are mammals

(ii) Some cats are mammals.

(iii) No Dogs are cats

(iv) No dogs are non-mammals.

Codes:

(A) (i) only

(B) (i) and (ii)

(C) (iii) and (iv)

(D) (ii) and (iii)

Answer: (D)



17. Given below is a diagram of three circles A, B & C inter-related with each of Indians. The circle B represents the class of scientists and circle C represents the class of politicians. p,q,r,s... represent different regions. Select the code containing the region that indicates the class of Indian scientists who are not politicians.
June 2014 UGC NET Paper 1

(A) q and s only
(B) s only
(C) s and r only
(D) p, q and s only
Answer: (B)

Read the following table and answer question no 18-22 based on table
Year
Government Canals
Private Canals
Tanks
Tube wells and other wells
Other sources
Total
1997-98
17117
211
2593
32090
3102
55173
1998-99
17093
212
2792
33988
3326
57411
1999-00
16842
194
2535
34623
2915
57109
2000-01
15748
203
2449
33796
2880
55076
2001-02
15031
209
2179
34906
4347
56672
2002-03
13863
206
1802
34250
3657
53778
2003-04
14444
206
1908
35779
4281
56618
2004-05
14696
206
1727
34785
7453
58867
2005-06
15268
207
2034
35372
7314
60196

18. Which of the following sources of Irrigation has registered the largest percentage of decline in Net area under irrigation during 1997-98 and 2005-06 ?
(A) Government Canals
(B) Private Canals
(C) Tanks
(D) Other Sources
Answer: (A)

19. Find out the source of irrigation that has registered the maximum improvement in terms of percentage of Net irrigated area during 2002-03 and 2003-04.
(A) Government Canals
(B) Tanks
(C) Tube Wells and other wells
(D) Other Sources
Answer: (B)

20. In which of the following years, Net irrigation by tanks increased at the highest rate?
(A) 1998-99
(B) 2000-01
(C) 2003-04
(D) 2005-06
Answer: (A)

21. Identify the source of irrigation that has recorded the maximum incidence of negative growth in terms of Net irrigated area during the years given in the table.
(A) Government Canals
(B) Private Canals
(C) Tube Wells and other wells
(D) Other sources
Answer: (A)

22. In which of the following years, share of the tube wells and other wells in the total net irrigated area was the highest?
(A) 1998-99
(B) 2000-01
(C) 2002-03
(D) 2004-05
Answer: (D)

23. The acronym FTP stands for
(A) File Transfer Protocol
(B) Fast Transfer Protocol
(C) File Tracking Protocol
(D) File Transfer Procedure
Answer: (A)

24. Which one of the following is not a/an image/graphic file format?
(A) PNG
(B) GIF
(C) BMP
(D) GUI
Answer: (D)

25. The first Web Browser is
(A) Internet Explorer
(B) Netscape
(C) World Wide Web
(D) Firefox
Answer: (B)

26. When a computer is booting, BIOS is loaded to the memory by
(A) RAM
(B) ROM
(C) CD-ROM
(D) TCP
Answer: (A)

27. Which one of the following is not the same as the other three?
(A) MAC address
(B) Hardware address
(C) Physical address
(D) IP address
Answer: (D)

28. Identify the IP address from the following
(A) 300 .215.317.3
(B) 302.215@417.5
(C) 202.50.20.148
(D) 202-50-20-148
Answer: (C)

29. The population of India is about 1.2 billion. Take the average consumption of energy per person per year in India as 30 Mega Joules. If this consumption is met by carbon based fuels and the rate of carbon emissions per kilojoule is l5 x I06 kgs, the total carbon emissions per year from India will be
(A) 54 million metric tons
(B) 540 million metric tons
(C) 5400 million metric tons
(D) 2400 million metric tons
Answer: (D)

30. Which of the following cities has been worst affected by urban smog in recent times?
(A) Paris
(B) London
(C) Los Angeles
(D) Beijing
Answer: (C)

31. The primary source of organic pollution in fresh water bodies is
(A) run-off urban areas
(B) run-off from agricultural forms
(C) sewage effluents
(D) industrial effluents
Answer: (A,C)

32. 'Lahar' is a natural disaster involving
(A) eruption of large amount of material
(B) strong winds
(C) strong water waves
(D) strong wind and water waves
Answer: (A)

33. In order to avoid catastrophic consequences of climate change, there is general agreement among the countries of the world to limit the rise in average surface temperature of earth compared to that of pre-industrial times by
(A) 1.5 oC to 2 oC
(B) 2.0 oC to 3.5 oC
(C) 0.5 oC to 1.0 oC
(D) 0.25 oC to 0.5 oC
Answer: (A)

34. The National Disaster Management Authority functions under the Union Ministry of
(A) Environment
(B) Water Resources
(C) Home Affairs
(D) Defence
Answer: (C)

35. Match List - I and List - II and select the correct answer from the codes given below:
List – I                                    List - II
(a) Flood                     (1) Lack of rainfall of sufficient duration
(b) Drought                 (2) Tremors produced by the passage of vibratory waves through the rocks of the earth
(c) Earthquake             (3) A vent through which molted substances come out
(d) Valcano                 (4) Excess rain and uneven distribution of water
Codes:
            (a)        (b)        (c)        (d)
(A)       4          1          2          3
(B)       2          3          4          1
(C)       3          4          2          1
(D)       4          3          1          2
Answer: (A)

36. Which one of the following green house gases has the shortest residence time in the atmosphere?
(A) Chlorofluorocarbon
(B) Carbon dioxide
(C) Methane
(D) Nitrous oxide
Answer: (C)

37. Consider the following statements and select the correct answer from the code given below:
(i) Rajasthan receives the highest solar radiation in the country.
(ii) India has the fifth largest installed wind power in the world.
(iii) The maximum amount of wind power is contributed by Tamil Nadu.
(iv) The primary source of uranium in India is Jaduguda.
(A) (i) and (ii)
(B) (i), (ii) and (iii)
(C) (ii) and (iii)
(D) (i) and (iv)
Answer: (B)

38. Who among the following is the defacto executive head of the planning Commission?
(A) Chairman
(B) Deputy Chairman
(C) Minister of State of Planning
(D) Member Secretary
Answer: (B)

39. Education as a subject of legislation figures in the
(A) Union List
(B) State List
(C) Concurrent List
(D) Residuary Powers
Answer: (C)

40. Which of the following are Central Universities?
1. Pondicherry University
2. Vishwa Bharati
3. H.N.B. Garhwal University
4. Kurukshetra University
Select the correct answer from the code given below:
(A) 1, 2 and 3
(B) 1, 3 and 4
(C) 2, 3 and 4
(D) 1, 2 and 4
Answer: (A)

41. Consider the statement which ls followed by two arguments (i) and (ii).
Statement: India should have a very strong and powerful Lokpal.
Arguments: (i) Yes, it will go a long in eliminating corruption in bureaucracy.
(ii) No; it will discourage honest officers from making quick decisions.
Codes:
(A) Only argument (i) is strong.
(B) Only argument (ii) is strong.
(C) Both the arguments are strong.
(D) Neither of the arguments is strong.
Answer: (A)

42. Which of the following universities has adopted the meta university concept?
(A) Assam University
(B) Delhi University
(C) Hyderabad University
(D) Pondicherry University
Answer: (B)

43. Which of the following statements are correct about a Central University?
1. Central University is established under an Act of Parliament.
2. The President of India acts as the visitor of the University.
3. President has the power to nominate some members to the Executive Committee or the Board of Management of the University.
4. The President occasionally presides over the meetings of the Executive Committee or Court.
Select the correct answer from the code given below:
Codes:
(A) 1, 2 and 4
(B) 1, 3 and 4
(C) 1, 2 and 3
(D) 1, 2, 3 and 4
Answer: (C)

44. Which one of the following is considered a sign of motivated teaching?
(A) Students asking questions
(B) Maximum attendance of the students
(C) Pin drop silence in the classroom
(D) Students taking notes
Answer: (A)

45. Which one of the following is the best method of teaching?
(A) Lecture
(B) Discussion
(C) Demonstration
(D) Narration
Answer: (C)

46. Dyslexia is associated with
(A) mental disorder
(B) behavioural disorder
(C) reading disorder
(D) writing disorder
Answer: (C)

47. The e-content generation for undergraduate courses has been assigned by the Ministry of Human Resource Development to
(A) INFLIBNET
(B) Consortium for Educational Communication
(C) National Knowledge Commission
(D) Indira Gandhi National Open University
Answer: (A,B)

48. Classroom communication is normally considered as
(A) effective
(B) cognitive
(C) affective
(D) selective
Answer: (B)

49. Who among the following propounded the concept of paradigm?
(A) Peter Haggett
(B) Von Thunen
(C) Thomas Kuhn
(D) John K. Wright
Answer: (C)

50. In a thesis, figures and tables are included in
(A) The appendix
(B) A separate chapter
(C) The concluding chapter
(D) The text itself
Answer: (D)

51. A thesis statement is
(A) an observation
(B) a fact
(C) an assertion
(D) a discussion
Answer: (A)

52.  The research approach of Max Weber to understand how people create meanings in natural settings is identified as
(A) positive paradigm
(B) critical paradigm
(C) natural paradigm
(D) interpretative paradigm
Answer: (D)

53. Which one of the following is a non probability sampling?
(A) Simple Random
(B) Purposive
(C) Systematic
(D) Stratified
Answer: (B,D)

54. Identify the category of evaluation that assesses the learning progress to provide continuous feedback to the students during instruction.
(A) Placement
(B) Diagnostic
(C) Formative
(D) Summative
Answer: (A,C)

55. The research stream of immediate application is
(A) Conceptual research
(B) Action research
(C) Fundamental research
(D) Empirical research
Answer: (B)

Instructions: Read the following passage carefully and answer questions 56 to 60:
Traditional Indian Values must be viewed both from the angle of the individual and from that of the geographically delimited agglomeration of peoples or groups enjoying a common system of leadership which we call the 'State'. The Indian 'State's' special feature is the peaceful, or perhaps mostly peaceful, co-existence of social groups of various historical provenances which manually adhere in a geographical, economic and political sense, without ever assimilating to each other in social terms, in ways of thinking, or even in language. Modern Indian law will determine certain rules, especially in relation to the regime of the family, upon the basis of hwo the loin-cloth is tied, or how the turban is worn, for this may identify the litigants as members of a regional group, and therefore as participants in it traditional law, though their ancestors left the region three or four centuries earlier. The use of the word 'State' above must not mislead us. There was no such thing as a conflict between the individual and the State, at least before foreign governments became established, just as there was no concept of state 'sovereignty' or of any church-and-state dichotomy.
                   Modem Indian 'secularism' has an admittedly peculiar feature: It requires the state to make a fair distribution of attention amongst all religions. These blessed aspects of India's famed tolerance (Indian kings to rarely persecuted religious groups that the exceptions prove the rule) at once struck Portuguese and other European visitors to the West Coast of India in the sixteenth century, and the impression made upon them in this and other ways gave rise, at one remove, to the basic constitution of Thomas More's Utopia. There is little about modern India that strikes one at once as Utopian but the insistence upon the inculcation of norms, and the absense of bigotry and  institutionalized exploitation of human or natural resources, are two very different features which link the realities of India and her tradition with the essence of all Utopians.

56. Which of the following is a special feature of the Indian state?
(A) peaceful co-existence of people under a common system of leadership
(B) peaceful co-existence of social groups of different historical provenances attached to each other in a geographical, economical and political sense
(C) Social integration of all groups
(D) Cultural assimilation of all social groups
Answer: (B)

57. The author uses the word 'State' to highlight
(A) Antagonistic relationship between the state and the individual throughout the period of history.
(B) Absence of conflict between the state and the individuals upto a point in time.
(C) The concept of state sovereignty
(D) Dependence of religion
Answer: (A)

58. Which one is the peculiar feature of modern Indian 'secularism'?
(A) No discrimination on religious considerations
(B) Total indifference to religion
(C) No space for social identity
(D) Disregard for social law
Answer: (A)

59. The basic construction of Thomas More's Utopia was inspired by
(A) Indian tradition of religious tolerance
(B) Persecution of religious groups by Indian rulers
(C) Social inequality in India
(D) European perception of Indian State
Answer: (A)

60. What is the striking feature of modern India?
(A) A replica of Utopian State
(B) Uniform Laws
(C) Adherance to traditional values
(D) Absense of Bigotry
Answer: (A)