UGC NET PAPER 2 COMPUTER SCIENCE – SET 34
Period: SEPT 2013
661. Best gate set for parity checking/generation?
Computer Organization and Architecture • Digital Logic • SEPT 2013
662. IEEE single- and double-precision floats use lengths of ______ and ______ bits.
Computer Organization and Architecture • Floating-Point Representation • SEPT 2013
663. Which substitution cipher has one-to-many plaintext‐to‐cipher mappings?
Data Communication and Computer Networks • Classical Ciphers • SEPT 2013
664. Maximum length of CAT-5 UTP cable in Fast Ethernet?
Data Communication and Computer Networks • Ethernet Standards • SEPT 2013
665. In ______ CSMA, after sensing idle, station transmits based on RNG outcome.
Data Communication and Computer Networks • MAC Protocols • SEPT 2013
666. A file downloads over a 56 kbps modem in 2 minutes. Maximum data size?
Data Communication and Computer Networks • Modem Throughput • SEPT 2013
667. A method to provide secure e-mail transmission is called ____.
Data Communication and Computer Networks • Public-Key Cryptography • SEPT 2013
668. The count-to-infinity problem is associated with which routing algorithm?
Data Communication and Computer Networks • Routing Algorithms • SEPT 2013
669. A 10000-char file sent at 2400 bps in 1000-char frames with 48 bits overhead—total overhead time is ________
Data Communication and Computer Networks • Data framing • SEPT 2013
670. Data unit 111111, divisor 1010—CRC dividend sent before division is ________
Data Communication and Computer Networks • Error Detection • SEPT 2013
671. Size of network bits and host bits in Class A IP address?
Data Communication and Computer Networks • IP addressing • SEPT 2013
672. Bit rate of an 8-PSK signal with 2500 Hz bandwidth is ________
Data Communication and Computer Networks • Modulation • SEPT 2013
673. Match: (a) UDP (b) OSPF (c) SMTP (d) HDLC — (i) Message-Transfer Prot (ii) Bit-oriented Prot (iii) Interior Gateway Routing Prot (iv) Connectionless Transport Prot
Data Communication and Computer Networks • Protocol mapping • SEPT 2013
674. If A sends encrypted message to B, plaintext is encrypted with ________
Data Communication and Computer Networks • Public-Key Crypto • SEPT 2013
675. A ______ firewall forwards or blocks based on network & transport headers.
Data Communication and Computer Networks • Security • SEPT 2013
676. Given IP 201.14.78.65 mask 255.255.255.224, subnet address is ________
Data Communication and Computer Networks • Subnetting • SEPT 2013
677. Which TCP header field tells how many bytes may be sent starting at the acknowledged byte?
Data Communication and Computer Networks • Transport protocols • SEPT 2013
678. Program subtracts smaller from larger until x or y zero; prints x. Computes?
Data Structures and Algorithms • Algorithms • SEPT 2013
679. Most efficient structure to insert/delete in a stored set is ___.
Data Structures and Algorithms • Dictionary Structures • SEPT 2013
680. For undirected graph with 100 nodes, max edges while still disconnected = _____.
Data Structures and Algorithms • Graph Connectivity • SEPT 2013
Disclaimer for MCQ Quiz
This quiz is for educational purposes only…