Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Search results for computer-networks+gate
39
votes
12
answers
1
GATE CSE 2017 Set 1 | Question: 44
In a RSA cryptosystem, a participant $A$ uses two prime numbers $p = 13$ and $q = 17$ to generate her public and private keys. If the public key of $A$ is $35$, then the private key of $A$ is __________ .
In a RSA cryptosystem, a participant $A$ uses two prime numbers $p = 13$ and $q = 17$ to generate her public and private keys. If the public key of $A$ is $35$, then the ...
Arjun
23.6k
views
Arjun
asked
Feb 14, 2017
Computer Networks
gatecse-2017-set1
network-security
computer-networks
rsa-security-networks
out-of-gate-syllabus
numerical-answers
normal
+
–
0
votes
0
answers
2
Can anyone provide a list of frequently asked protocols wrt various layers of OSI model, or an authentic source from where I can get the list for the same.
tishhaagrawal
149
views
tishhaagrawal
asked
Dec 12, 2023
Computer Networks
gate-preparation
computer-networks
network-protocols
general-topic-doubt
network-layer
+
–
0
votes
1
answer
3
#syallabus completion
HELLO SIR , SIR I HAVE LEFT WITH TOC, CD , DM AND CN AND I THOUGHT , I SHOULD LEAVE ANY TWO OF THESE SO THAT I CAN FOCUS ON REVISION PROPERLY… SO , I WANT TO KNOW THAT WHICH 2 OF THESE SHOULD LEFT ASIDE .
HELLO SIR , SIR I HAVE LEFT WITH TOC, CD , DM AND CN AND I THOUGHT , I SHOULD LEAVE ANY TWO OF THESE SO THAT I CAN FOCUS ON REVISION PROPERLY… SO , I WANT TO KNOW THAT ...
jaswinder
195
views
jaswinder
asked
Oct 12, 2023
GATE
out-of-gate-syllabus
discrete-mathematics
theory-of-computation
computer-networks
compiler-design
goclasses
+
–
38
votes
6
answers
4
GATE IT 2007 | Question: 61
In the waveform (a) given below, a bit stream is encoded by Manchester encoding scheme. The same bit stream is encoded in a different coding scheme in wave form (b). The bit stream and the ... Manchester respectively $0111101000$ and Differential Manchester respectively $1000010111$ and Integral Manchester respectively $0111101000$ and Integral Manchester respectively
In the waveform (a) given below, a bit stream is encoded by Manchester encoding scheme. The same bit stream is encoded in a different coding scheme in wave form (b). The ...
Ishrat Jahan
17.8k
views
Ishrat Jahan
asked
Oct 30, 2014
Computer Networks
gateit-2007
computer-networks
communication
manchester-encoding
normal
out-of-gate-syllabus
+
–
35
votes
3
answers
5
GATE CSE 2016 Set 2 | Question: 54
For the $\text{IEEE 802.11 MAC}$ protocol for wireless communication, which of the following statements is/are TRUE? At least three non-overlapping channels are available for transmissions. The RTS-CTS mechanism is used for collision detection. Unicast frames are ACKed. All I, II, and III I and III only II and III only II only
For the $\text{IEEE 802.11 MAC}$ protocol for wireless communication, which of the following statements is/are TRUE?At least three non-overlapping channels are available ...
Akash Kanase
16.8k
views
Akash Kanase
asked
Feb 12, 2016
Computer Networks
gatecse-2016-set2
computer-networks
wifi
normal
non-gate
+
–
29
votes
7
answers
6
GATE IT 2008 | Question: 18
How many bytes of data can be sent in $15$ seconds over a serial link with baud rate of $9600$ in asynchronous mode with odd parity and two stop bits in the frame? $10,000$ bytes $12,000$ bytes $15,000$ bytes $27,000$ bytes
How many bytes of data can be sent in $15$ seconds over a serial link with baud rate of $9600$ in asynchronous mode with odd parity and two stop bits in the frame?$10,000...
Ishrat Jahan
15.9k
views
Ishrat Jahan
asked
Oct 27, 2014
Computer Networks
gateit-2008
computer-networks
communication
serial-communication
normal
out-of-gate-syllabus
+
–
0
votes
2
answers
7
GATE CS Applied Course Test Series
In the GO back N ARQ sender is sending the 15 packets to the destination with a window size of 5.Assume every sixth packet while transmission is lost. How many transmissions will there be?
In the GO back N ARQ sender is sending the 15 packets to the destination with a window size of 5.Assume every sixth packet while transmission is lost. How many transmiss...
rsansiya111
1.2k
views
rsansiya111
asked
Nov 2, 2022
Computer Networks
computer-networks
applied-gate-test-series
go-back-n
+
–
24
votes
3
answers
8
GATE CSE 2004 | Question: 22
How many $8-bi$t characters can be transmitted per second over a $9600$ baud serial communication link using asynchronous mode of transmission with one start bit, eight data bits, two stop bits and one parity bit? $600$ $800$ $876$ $1200$
How many $8-bi$t characters can be transmitted per second over a $9600$ baud serial communication link using asynchronous mode of transmission with one start bit, eight d...
Kathleen
15.7k
views
Kathleen
asked
Sep 18, 2014
Computer Networks
gatecse-2004
computer-networks
serial-communication
normal
out-of-gate-syllabus
+
–
29
votes
5
answers
9
GATE IT 2004 | Question: 25
A sender is employing public key cryptography to send a secret message to a receiver. Which one of the following statements is TRUE? Sender encrypts using receiver's public key Sender encrypts using his own public key Receiver decrypts using sender's public key Receiver decrypts using his own public key
A sender is employing public key cryptography to send a secret message to a receiver. Which one of the following statements is TRUE?Sender encrypts using receiver's publi...
Ishrat Jahan
13.3k
views
Ishrat Jahan
asked
Nov 2, 2014
Computer Networks
gateit-2004
computer-networks
network-security
normal
out-of-gate-syllabus
+
–
47
votes
7
answers
10
GATE IT 2004 | Question: 84
Consider a parity check code with three data bits and four parity check bits. Three of the Code Words are $0101011, 1001101$ and $1110001.$ Which of the following are also code words? $0010111$ $0110110$ $1011010$ $0111010$ I and III I, II and III II and IV I, II, III and IV
Consider a parity check code with three data bits and four parity check bits. Three of the Code Words are $0101011, 1001101$ and $1110001.$ Which of the following are als...
Ishrat Jahan
18.6k
views
Ishrat Jahan
asked
Nov 2, 2014
Computer Networks
gateit-2004
computer-networks
network-security
normal
out-of-gate-syllabus
+
–
2
votes
3
answers
11
Virtual Gate Test Series: Computer Networks - Subnet Mask
Which of the following statements are correct regarding subnet mask $255.255.240.0?$ i. Class A network subnet mask$: 4096$ subnets and $4096$ systems per subnetwork ii. Class B network subnet mask$: 16$ subnets and $4096$ systems per ... network subnet mask$: 1$ subnet and $ 256$ systems per subnetwork All are correct i, ii i, iii ii, iii
Which of the following statements are correct regarding subnet mask $255.255.240.0?$i. Class A network subnet mask$: 4096$ subnets and $4096$ systems per subnetworkii. Cl...
Utsav09
896
views
Utsav09
asked
Jan 31, 2018
Computer Networks
computer-networks
subnetting
virtual-gate-test-series
+
–
42
votes
3
answers
12
GATE CSE 2011 | Question: 2
A layer-$4$ firewall (a device that can look at all protocol headers up to the transport layer) CANNOT block entire $\text{HTTP}$ traffic during $9:00PM$ and $5:00AM$ block all $\text{ICMP}$ traffic stop incoming traffic from specific $\text{IP}$ ... same IP address block $\text{TCP}$ traffic from a specific user on a multi-user system during $9:00PM$ to $5:00AM$
A layer-$4$ firewall (a device that can look at all protocol headers up to the transport layer) CANNOTblock entire $\text{HTTP}$ traffic during $9:00PM$ and $5:00AM$block...
go_editor
16.8k
views
go_editor
asked
Sep 29, 2014
Computer Networks
gatecse-2011
computer-networks
network-security
firewall
normal
out-of-gate-syllabus
+
–
13
votes
6
answers
13
GATE CSE 2019 | Question: 54
In an RSA cryptosystem, the value of the public modulus parameter $n$ is $3007$. If it is also known as that $\phi(n)=2880$ where $\phi()$ denotes Euler’s Totient Function, then the prime factor of $n$ which is greater than $50$ is _________
In an RSA cryptosystem, the value of the public modulus parameter $n$ is $3007$. If it is also known as that $\phi(n)=2880$ where $\phi()$ denotes Euler’s Totient Funct...
Arjun
8.8k
views
Arjun
asked
Feb 7, 2019
Computer Networks
gatecse-2019
numerical-answers
computer-networks
network-security
out-of-gate-syllabus
2-marks
+
–
30
votes
3
answers
14
GATE IT 2004 | Question: 45
A serial transmission $T1$ uses $8$ information bits, $2$ start bits, $1$ stop bit and $1$ parity bit for each character. A synchronous transmission $T2$ uses $3$ eight-bit sync characters followed by $30$ eight-bit information characters. If ... $136$ characters/sec $100$ characters/sec, $136$ characters/sec $80$ characters/sec, $153$ characters/sec
A serial transmission $T1$ uses $8$ information bits, $2$ start bits, $1$ stop bit and $1$ parity bit for each character. A synchronous transmission $T2$ uses $3$ eight-b...
Ishrat Jahan
14.0k
views
Ishrat Jahan
asked
Nov 2, 2014
Computer Networks
gateit-2004
computer-networks
serial-communication
normal
out-of-gate-syllabus
+
–
35
votes
6
answers
15
GATE IT 2006 | Question: 65
In the $\text{4B/5B}$ encoding scheme, every $4$ bits of data are encoded in a $5$-bit codeword. It is required that the codewords have at most $1$ leading and at most $1$ trailing zero. How many are such codewords possible? $14$ $16$ $18$ $20$
In the $\text{4B/5B}$ encoding scheme, every $4$ bits of data are encoded in a $5$-bit codeword. It is required that the codewords have at most $1$ leading and at most $1...
Ishrat Jahan
9.9k
views
Ishrat Jahan
asked
Nov 1, 2014
Computer Networks
gateit-2006
computer-networks
encoding
combinatory
normal
out-of-gate-syllabus
+
–
23
votes
3
answers
16
GATE CSE 2013 | Question: 13
Using public key cryptography, $X$ adds a digital signature σ to message $M$, encrypts $\langle M, \sigma \rangle$, and sends it to $Y$, where it is decrypted. Which one of the following sequences of keys is used for the operations? Encryption: $X's$ ... : $X's$ private key followed by $Y's$ public key; Decryption: $Y's$ private key followed by $X's$ public key
Using public key cryptography, $X$ adds a digital signature σ to message $M$, encrypts $\langle M, \sigma \rangle$, and sends it to $Y$, where it is decrypted. Which one...
Arjun
9.0k
views
Arjun
asked
Sep 23, 2014
Computer Networks
gatecse-2013
computer-networks
network-security
normal
out-of-gate-syllabus
+
–
36
votes
3
answers
17
GATE IT 2007 | Question: 18
A firewall is to be configured to allow hosts in a private network to freely open TCP connections and send packets on open connections. However, it will only allow external hosts to send packets on existing open TCP connections or connections ... be that of A combinational circuit A finite automaton A pushdown automaton with one stack A pushdown automaton with two stacks
A firewall is to be configured to allow hosts in a private network to freely open TCP connections and send packets on open connections. However, it will only allow extern...
Ishrat Jahan
6.3k
views
Ishrat Jahan
asked
Oct 29, 2014
Computer Networks
gateit-2007
computer-networks
theory-of-computation
normal
network-security
out-of-gate-syllabus
+
–
21
votes
4
answers
18
GATE IT 2008 | Question: 70
The total number of keys required for a set of $n$ individuals to be able to communicate with each other using secret key and public key cryptosystems, respectively are: $n(n-1)$ and $2n$ $2n$ and $\dfrac{n(n - 1)}{2}$ $\dfrac{n(n - 1)}{2}$ and $2n$ $\dfrac{n(n - 1)}{2}$ and $n$
The total number of keys required for a set of $n$ individuals to be able to communicate with each other using secret key and public key cryptosystems, respectively are:$...
Ishrat Jahan
11.2k
views
Ishrat Jahan
asked
Oct 29, 2014
Computer Networks
gateit-2008
computer-networks
network-security
normal
out-of-gate-syllabus
+
–
39
votes
3
answers
19
GATE CSE 2017 Set 1 | Question: 15
A sender $S$ sends a message $m$ to receiver $R$, which is digitally signed by $S$ with its private key. In this scenario, one or more of the following security violations can take place. $S$ ... with a fraudulent message Which of the following are possible security violations? I and II only I only II only II and III only
A sender $S$ sends a message $m$ to receiver $R$, which is digitally signed by $S$ with its private key. In this scenario, one or more of the following security violation...
Arjun
12.4k
views
Arjun
asked
Feb 14, 2017
Computer Networks
gatecse-2017-set1
computer-networks
cryptography
normal
network-security
out-of-gate-syllabus
+
–
28
votes
3
answers
20
GATE IT 2007 | Question: 70
You are given the following four bytes : $\begin{array}{| c | c | c | c |} \hline 10100011 & 00110111 & 11101001 & 10101011 \\\hline \end{array}$ Which of the following are substrings of the base $64$ encoding of the above four bytes? $\text{zdp}$ $\text{fpq}$ $\text{qwA}$ $\text{oze}$
You are given the following four bytes : $$\begin{array}{| c | c | c | c |} \hline 10100011 & 00110111 & 11101001 & 10101011 \\\hline \end{array}$$ Which of the fol...
Ishrat Jahan
12.0k
views
Ishrat Jahan
asked
Oct 30, 2014
Computer Networks
gateit-2007
computer-networks
network-security
normal
out-of-gate-syllabus
+
–
Page:
1
2
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register