Prep Hub

UGC NET PAPER 2 COMPUTER SCIENCE – SET 34

UGC NET PAPER 2 COMPUTER SCIENCE – SET 34

Period: SEPT 2013


661. Best gate set for parity checking/generation?

Computer Organization and Architecture • Digital Logic • SEPT 2013


662. IEEE single- and double-precision floats use lengths of ______ and ______ bits.

Computer Organization and Architecture • Floating-Point Representation • SEPT 2013


663. Which substitution cipher has one-to-many plaintext‐to‐cipher mappings?

Data Communication and Computer Networks • Classical Ciphers • SEPT 2013


664. Maximum length of CAT-5 UTP cable in Fast Ethernet?

Data Communication and Computer Networks • Ethernet Standards • SEPT 2013


665. In ______ CSMA, after sensing idle, station transmits based on RNG outcome.

Data Communication and Computer Networks • MAC Protocols • SEPT 2013


666. A file downloads over a 56 kbps modem in 2 minutes. Maximum data size?

Data Communication and Computer Networks • Modem Throughput • SEPT 2013


667. A method to provide secure e-mail transmission is called ____.

Data Communication and Computer Networks • Public-Key Cryptography • SEPT 2013


668. The count-to-infinity problem is associated with which routing algorithm?

Data Communication and Computer Networks • Routing Algorithms • SEPT 2013


669. A 10000-char file sent at 2400 bps in 1000-char frames with 48 bits overhead—total overhead time is ________

Data Communication and Computer Networks • Data framing • SEPT 2013


670. Data unit 111111, divisor 1010—CRC dividend sent before division is ________

Data Communication and Computer Networks • Error Detection • SEPT 2013


671. Size of network bits and host bits in Class A IP address?

Data Communication and Computer Networks • IP addressing • SEPT 2013


672. Bit rate of an 8-PSK signal with 2500 Hz bandwidth is ________

Data Communication and Computer Networks • Modulation • SEPT 2013


673. Match: (a) UDP (b) OSPF (c) SMTP (d) HDLC — (i) Message-Transfer Prot (ii) Bit-oriented Prot (iii) Interior Gateway Routing Prot (iv) Connectionless Transport Prot

Data Communication and Computer Networks • Protocol mapping • SEPT 2013


674. If A sends encrypted message to B, plaintext is encrypted with ________

Data Communication and Computer Networks • Public-Key Crypto • SEPT 2013


675. A ______ firewall forwards or blocks based on network & transport headers.

Data Communication and Computer Networks • Security • SEPT 2013


676. Given IP 201.14.78.65 mask 255.255.255.224, subnet address is ________

Data Communication and Computer Networks • Subnetting • SEPT 2013


677. Which TCP header field tells how many bytes may be sent starting at the acknowledged byte?

Data Communication and Computer Networks • Transport protocols • SEPT 2013


678. Program subtracts smaller from larger until x or y zero; prints x. Computes?

Data Structures and Algorithms • Algorithms • SEPT 2013


679. Most efficient structure to insert/delete in a stored set is ___.

Data Structures and Algorithms • Dictionary Structures • SEPT 2013


680. For undirected graph with 100 nodes, max edges while still disconnected = _____.

Data Structures and Algorithms • Graph Connectivity • SEPT 2013



Disclaimer for MCQ Quiz
This quiz is for educational purposes only…

0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
Scroll to Top