menu
Login
Register
search
Log In
account_circle
Log In
Email or Username
Password
Remember
Log In
Register
I forgot my password
Register
Username
Email
Password
Register
add
Activity
Questions
Unanswered
Tags
Subjects
Users
Ask
Prev
Blogs
New Blog
Exams
Quick search syntax
tags
tag:apple
author
user:martin
title
title:apple
content
content:apple
exclude
-tag:apple
force match
+apple
views
views:100
score
score:10
answers
answers:2
is accepted
isaccepted:true
is closed
isclosed:true
Recent Posts
Barc Interview Experience 2020- CSE stream
JEST 2021 registrations are open
TIFR GS-2021 Online Application portal
IIT Jodhpur Mtech AI - Interview Expierence (Summer Admission)
Interview experience at IIT Tirupati for MS program winter admission
Subjects
All categories
General Aptitude
(2.1k)
Engineering Mathematics
(8.5k)
Digital Logic
(3k)
Programming and DS
(5.1k)
Algorithms
(4.5k)
Theory of Computation
(6.3k)
Compiler Design
(2.2k)
Operating System
(4.7k)
Databases
(4.3k)
CO and Architecture
(3.5k)
Computer Networks
(4.3k)
Non GATE
(1.2k)
Others
(1.3k)
Admissions
(595)
Exam Queries
(838)
Tier 1 Placement Questions
(16)
Job Queries
(71)
Projects
(19)
Unknown Category
(1.1k)
Recent questions tagged computer-networks
Recent Blog Comments
yeah right!
@atulbrk IISc is mentioned only...
@nephron Please share the link of the PDF of the...
I think The JEST website rercently updated the...
hi this pdf have gate prevoius year questions or...
Network Sites
GO Mechanical
GO Electrical
GO Electronics
GO Civil
CSE Doubts
Webpage for Computer Networks:
Recent questions tagged computer-networks
1
vote
1
answer
1
UGCNET-Oct2020-II: 31
Consider a code with only four valid code words: $0000000000$, $0000011111$, $1111100000$, and $1111111111$. This code has distance $5$. If the code word arrived is $0000000111$ then the original code word must be _______ $0000011111$ $0000000000$ $1111100000$ $1111111111$
Consider a code with only four valid code words: $0000000000$, $0000011111$, $1111100000$, and $1111111111$. This code has distance $5$. If the code word arrived is $0000000111$ then the original code word must be _______ $0000011111$ $0000000000$ $1111100000$ $1111111111$
asked
Nov 20, 2020
in
Computer Networks
jothee
110
views
ugcnet-oct2020-ii
computer-networks
hamming-code
0
votes
1
answer
2
UGCNET-Oct2020-II: 32
Using ‘RSA’ public key cryptosystem, if $p=3$, $q=11$ and $d=7$, find the value of $e$ and encrypt the number $’19’$ $20, 19$ $33,11$ $3, 28$ $77, 28$
Using ‘RSA’ public key cryptosystem, if $p=3$, $q=11$ and $d=7$, find the value of $e$ and encrypt the number $’19’$ $20, 19$ $33,11$ $3, 28$ $77, 28$
asked
Nov 20, 2020
in
Computer Networks
jothee
48
views
ugcnet-oct2020-ii
computer-networks
network-security
cryptography
0
votes
1
answer
3
UGCNET-Oct2020-II: 33
Protocols in which the sender sends one frame and then waits for an acknowledgment before proceeding for next frame are called as ______ Simplex protocols Unrestricted simplex protocols Simplex stop and wait protocols Restricted simplex protocols
Protocols in which the sender sends one frame and then waits for an acknowledgment before proceeding for next frame are called as ______ Simplex protocols Unrestricted simplex protocols Simplex stop and wait protocols Restricted simplex protocols
asked
Nov 20, 2020
in
Computer Networks
jothee
59
views
ugcnet-oct2020-ii
computer-networks
network-protocols
0
votes
1
answer
4
UGCNET-Oct2020-II: 54
Which among the following statement(s) is(are) true? A hash function takes a message of arbitrary length and generates a fixed length code A hash function takes a message of fixed length and generates a code of variable length A hash function may give same hash value for distinct messages Choose ... given below: $(a)$ only $(b)$ and $(c)$ only $(a)$ and $(c)$ only $(b)$ only
Which among the following statement(s) is(are) true? A hash function takes a message of arbitrary length and generates a fixed length code A hash function takes a message of fixed length and generates a code of variable length A hash function may give same hash value for distinct messages Choose the correct ... options given below: $(a)$ only $(b)$ and $(c)$ only $(a)$ and $(c)$ only $(b)$ only
asked
Nov 20, 2020
in
Computer Networks
jothee
71
views
ugcnet-oct2020-ii
computer-networks
network-security
cryptography
0
votes
1
answer
5
UGCNET-Oct2020-II: 59
Post office protocol (POP) is a message access protocol which is used to extract message for client. In this regards, which of the following are true? POP has two modes, Delete mode and keep In Delete mode, mail is deleted from mail box after each retrival In Delete mode, mail is deleted from mail box ... $(a)$, $(b)$, $(c)$ and $(d)$ only $(a)$, $(b)$ and $(e)$ only
Post office protocol (POP) is a message access protocol which is used to extract message for client. In this regards, which of the following are true? POP has two modes, Delete mode and keep In Delete mode, mail is deleted from mail box after each retrival In Delete mode, mail is deleted from mail box before each ... $(e)$ only $(a)$, $(b)$, $(c)$ and $(d)$ only $(a)$, $(b)$ and $(e)$ only
asked
Nov 20, 2020
in
Computer Networks
jothee
41
views
ugcnet-oct2020-ii
computer-networks
network-protocols
0
votes
1
answer
6
UGCNET-Oct2020-II: 72
Match $\text{List I}$ with $\text{List II}$ ... $A-III, B-IV, C-II, D-I$ $A-II, B-III, C-IV, D-I$ $A-III, B-I, C-IV, D-II$
Match $\text{List I}$ with $\text{List II}$ ... $A-III, B-IV, C-II, D-I$ $A-II, B-III, C-IV, D-I$ $A-III, B-I, C-IV, D-II$
asked
Nov 20, 2020
in
Computer Networks
jothee
49
views
ugcnet-oct2020-ii
computer-networks
network-protocols
0
votes
1
answer
7
UGCNET-Oct2020-II: 88
Given below are two statements: Statement $I$: The laws of nature put two fundamental limits on data rate of a channel. The H.Nyquist limit restricts the number of independent samples per second to twice the band-width in a Noiseless channel Statement $II$: ... are false Statement $I$ is correct but Statement $II$ is false Statement $I$ is incorrect but Statement $II$ is true
Given below are two statements: Statement $I$: The laws of nature put two fundamental limits on data rate of a channel. The H.Nyquist limit restricts the number of independent samples per second to twice the band-width in a Noiseless channel Statement $II$: Shannon's major ... $II$ are false Statement $I$ is correct but Statement $II$ is false Statement $I$ is incorrect but Statement $II$ is true
asked
Nov 20, 2020
in
Computer Networks
jothee
25
views
ugcnet-oct2020-ii
computer-networks
0
votes
1
answer
8
UGCNET-Oct2020-II: 89
Given below are two statements: Statement $I$: In Ceasar Cipher each letter of Plain text is replaced by another letter for encryption Statement $II$: Diffie-Hellman algorithm is used for exchange of secret key In the light of the above statements, choose the ... false Statement $I$ is correct but Statement $II$ is false Statement $I$ is incorrect but Statement $II$ is true
Given below are two statements: Statement $I$: In Ceasar Cipher each letter of Plain text is replaced by another letter for encryption Statement $II$: Diffie-Hellman algorithm is used for exchange of secret key In the light of the above statements, choose the correct answer ... $I$ is correct but Statement $II$ is false Statement $I$ is incorrect but Statement $II$ is true
asked
Nov 20, 2020
in
Computer Networks
jothee
34
views
ugcnet-oct2020-ii
computer-networks
network-security
0
votes
1
answer
9
NIELIT 2016 MAR Scientist C - Section C: 20
Start and stop bits are used in serial communication for error detection error correction synchronization slowing down the communication
Start and stop bits are used in serial communication for error detection error correction synchronization slowing down the communication
asked
Apr 2, 2020
in
Computer Networks
Lakshman Patel RJIT
174
views
nielit2016mar-scientistc
computer-networks
0
votes
1
answer
10
NIELIT 2016 MAR Scientist C - Section C: 21
Repeaters function in Physical layer Data link layer Network layer Both (A) and (B)
Repeaters function in Physical layer Data link layer Network layer Both (A) and (B)
asked
Apr 2, 2020
in
Computer Networks
Lakshman Patel RJIT
148
views
nielit2016mar-scientistc
computer-networks
0
votes
1
answer
11
NIELIT 2016 MAR Scientist C - Section C: 22
What are the primary characteristics that distinguish a cell from a packet? cells are generally smaller that packets cells do not incorporate physical address all cells have the same fixed length packet cannot be switched
What are the primary characteristics that distinguish a cell from a packet? cells are generally smaller that packets cells do not incorporate physical address all cells have the same fixed length packet cannot be switched
asked
Apr 2, 2020
in
Computer Networks
Lakshman Patel RJIT
125
views
nielit2016mar-scientistc
computer-networks
0
votes
1
answer
12
NIELIT 2016 MAR Scientist C - Section C: 33
In networking terminology UTP means Unshielded Twisted pair Ubiquitious Teflon port Uniformly Terminating port Unshielded T- connector port
In networking terminology UTP means Unshielded Twisted pair Ubiquitious Teflon port Uniformly Terminating port Unshielded T- connector port
asked
Apr 2, 2020
in
Computer Networks
Lakshman Patel RJIT
129
views
nielit2016mar-scientistc
computer-networks
1
vote
1
answer
13
NIELIT 2016 MAR Scientist C - Section C: 38
How many bits are required to encode all twenty six letters, ten symbols, and ten numerals? $5$ $6$ $7$ $46$
How many bits are required to encode all twenty six letters, ten symbols, and ten numerals? $5$ $6$ $7$ $46$
asked
Apr 2, 2020
in
Computer Networks
Lakshman Patel RJIT
135
views
nielit2016mar-scientistc
computer-networks
network-security
0
votes
2
answers
14
NIELIT 2017 OCT Scientific Assistant A (IT) - Section C: 4
Bit stuffing refers to Inserting a $’0’$ in user data stream to differentiate it with a flag Inserting a $’0’$ in flag stream to avoid ambiguity Appending a nibble to the flag sequence Appending a nibble to the user data stream
Bit stuffing refers to Inserting a $’0’$ in user data stream to differentiate it with a flag Inserting a $’0’$ in flag stream to avoid ambiguity Appending a nibble to the flag sequence Appending a nibble to the user data stream
asked
Apr 1, 2020
in
Computer Networks
Lakshman Patel RJIT
271
views
nielit2017oct-assistanta-it
computer-networks
bit-stuffing
0
votes
1
answer
15
NIELIT 2017 OCT Scientific Assistant A (IT) - Section B: 25
The address of a class $B$ Host is to be split into subnets with a $3$-bit subnet number. What is the maximum number of subnets and maximum number of hosts in each subnet? $8$ subnets and $262142$ hosts $6$ subnets and $262142$ hosts $6$ subnets and $1022$ hosts $8$ subnets and $1024$ hosts
The address of a class $B$ Host is to be split into subnets with a $3$-bit subnet number. What is the maximum number of subnets and maximum number of hosts in each subnet? $8$ subnets and $262142$ hosts $6$ subnets and $262142$ hosts $6$ subnets and $1022$ hosts $8$ subnets and $1024$ hosts
asked
Apr 1, 2020
in
Computer Networks
Lakshman Patel RJIT
228
views
nielit2017oct-assistanta-it
computer-networks
subnetting
0
votes
2
answers
16
NIELIT 2017 OCT Scientific Assistant A (IT) - Section B: 32
The maximum data rate of a channel of $3000$-Hz bandwidth and SNR of $30$ db is $60000$ $15000$ $30000$ $3000$
The maximum data rate of a channel of $3000$-Hz bandwidth and SNR of $30$ db is $60000$ $15000$ $30000$ $3000$
asked
Apr 1, 2020
in
Computer Networks
Lakshman Patel RJIT
193
views
nielit2017oct-assistanta-it
computer-networks
0
votes
1
answer
17
NIELIT 2017 OCT Scientific Assistant A (CS) - Section B: 2
Which of the following is minimum error code? Octal Code Binary Code Gray Code Excess-$3$ Code
Which of the following is minimum error code? Octal Code Binary Code Gray Code Excess-$3$ Code
asked
Apr 1, 2020
in
Computer Networks
Lakshman Patel RJIT
202
views
nielit2017oct-assistanta-cs
computer-networks
error-correction
1
vote
4
answers
18
NIELIT 2017 OCT Scientific Assistant A (CS) - Section B: 22
If the original size of data is $40$ then after adding error detection redundancy bit the size of data length is $26$ $36$ $46$ $56$
If the original size of data is $40$ then after adding error detection redundancy bit the size of data length is $26$ $36$ $46$ $56$
asked
Apr 1, 2020
in
Computer Networks
Lakshman Patel RJIT
491
views
nielit2017oct-assistanta-cs
computer-networks
error-detection
0
votes
1
answer
19
NIELIT 2017 OCT Scientific Assistant A (CS) - Section B: 23
Which of the following would not be specified in a communication protocol? Header contents Trailer contents Error Checking Data content of message
Which of the following would not be specified in a communication protocol? Header contents Trailer contents Error Checking Data content of message
asked
Apr 1, 2020
in
Computer Networks
Lakshman Patel RJIT
217
views
nielit2017oct-assistanta-cs
computer-networks
network-protocols
0
votes
2
answers
20
NIELIT 2017 OCT Scientific Assistant A (CS) - Section B: 24
Bit stuffing refers to Inserting a $’0’$ in user data stream to differentiate it with a flag Inserting a $’0’$ in flag stream to avoid ambiguity Appending a nibble to the flag sequence Appending a nibble to the user data stream
Bit stuffing refers to Inserting a $’0’$ in user data stream to differentiate it with a flag Inserting a $’0’$ in flag stream to avoid ambiguity Appending a nibble to the flag sequence Appending a nibble to the user data stream
asked
Apr 1, 2020
in
Computer Networks
Lakshman Patel RJIT
170
views
nielit2017oct-assistanta-cs
computer-networks
bit-stuffing
0
votes
1
answer
21
NIELIT 2017 OCT Scientific Assistant A (CS) - Section B: 26
If the channel is band limited to $6\;kHz$ and signal to noise ratio is $16,$ what would be the capacity of channel? $16.15$ kbps $23.24$ kbps $40.12$ kbps $24.74$ kbps
If the channel is band limited to $6\;kHz$ and signal to noise ratio is $16,$ what would be the capacity of channel? $16.15$ kbps $23.24$ kbps $40.12$ kbps $24.74$ kbps
asked
Apr 1, 2020
in
Computer Networks
Lakshman Patel RJIT
140
views
nielit2017oct-assistanta-cs
computer-networks
1
vote
2
answers
22
NIELIT 2017 DEC Scientific Assistant A - Section B: 1
Correct expression tor UDP user datagram length is length of UDP = length of IP- length of IP header's length of UDP= length of UDP-length of UDP header's length of UDP = length of IP+length of IP header's length of UDP = length of UDP+length of UDP header's
Correct expression tor UDP user datagram length is length of UDP = length of IP- length of IP header's length of UDP= length of UDP-length of UDP header's length of UDP = length of IP+length of IP header's length of UDP = length of UDP+length of UDP header's
asked
Mar 31, 2020
in
Computer Networks
Lakshman Patel RJIT
564
views
nielit2017dec-assistanta
computer-networks
udp
Page:
1
2
3
4
5
6
...
82
next »
...