Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Webpage for Computer Networks:
Recent questions tagged computer-networks
2
votes
1
answer
2461
UGC NET CSE | Junet 2015 | Part 3 | Question: 26
Which one of the following control fields in TCP header is used to specify whether the sender has no more data to transmit? FIN RST SYN PSH
Which one of the following control fields in TCP header is used to specify whether the sender has no more data to transmit?FINRSTSYNPSH
go_editor
4.5k
views
go_editor
asked
Jul 31, 2016
Computer Networks
ugcnetcse-june2015-paper3
computer-networks
tcp
+
–
2
votes
1
answer
2462
UGC NET CSE | Junet 2015 | Part 3 | Question: 25
Which transmission technique guarantees that data packets will be received by the receiver in the same order in which they were sent by the sender? Broadcasting Unicasting Packet switching Circuit switching
Which transmission technique guarantees that data packets will be received by the receiver in the same order in which they were sent by the sender?BroadcastingUnicastingP...
go_editor
1.8k
views
go_editor
asked
Jul 31, 2016
Computer Networks
ugcnetcse-june2015-paper3
computer-networks
data-communication
tele-communication
+
–
2
votes
2
answers
2463
UGC NET CSE | Junet 2015 | Part 3 | Question: 15
The process of dividing an analog signal into a string of discrete outputs, each of constant amplitude, is called: Strobing Amplification Conditioning Quantization
The process of dividing an analog signal into a string of discrete outputs, each of constant amplitude, is called:StrobingAmplificationConditioningQuantization
go_editor
1.5k
views
go_editor
asked
Jul 31, 2016
Computer Networks
ugcnetcse-june2015-paper3
analog-&-digital-transmission
computer-networks
+
–
1
votes
1
answer
2464
UGC NET CSE | Junet 2015 | Part 2 | Question: 30
Which of the following is/are restriction(s) in classless addressing? The number of addresses needs to be a power of $2$ The mask needs to be included in the address to define the block The starting address must be divisible by the number of addresses in the block All of the above
Which of the following is/are restriction(s) in classless addressing?The number of addresses needs to be a power of $2$The mask needs to be included in the address to def...
go_editor
2.4k
views
go_editor
asked
Jul 30, 2016
Computer Networks
ugcnetcse-june2015-paper2
computer-networks
classless-addressing
+
–
4
votes
1
answer
2465
UGC NET CSE | Junet 2015 | Part 2 | Question: 29
What is the size of the 'total length' field in $IPv4$ diagram? $4$ bits $8$ bits $16$ bits $32$ bits
What is the size of the 'total length' field in $IPv4$ diagram?$4$ bits$8$ bits$16$ bits$32$ bits
go_editor
1.5k
views
go_editor
asked
Jul 30, 2016
Computer Networks
ugcnetcse-june2015-paper2
computer-networks
ip-addressing
+
–
2
votes
2
answers
2466
UGC NET CSE | Junet 2015 | Part 2 | Question: 28
Which of the following is not associated with the session layer? Dialog control Token management Semantics of the information transmitted synchronization
Which of the following is not associated with the session layer?Dialog controlToken managementSemantics of the information transmittedsynchronization
go_editor
2.6k
views
go_editor
asked
Jul 30, 2016
Computer Networks
ugcnetcse-june2015-paper2
computer-networks
session-layer
+
–
1
votes
1
answer
2467
UGC NET CSE | Junet 2015 | Part 2 | Question: 27
Match the following port numbers with their uses: ... $a-ii, b-i, c-iv, d-iii$ $a-ii, b-iv, c-iii, d-i$ $a-ii, b-iv, c-i, d-iii$
Match the following port numbers with their uses:$\begin{array}{|ll|ll|} \hline & \textbf{List – I} & & \textbf{List – II} \\ \hline \text{a.} & 23 & i. & \text{World...
go_editor
2.0k
views
go_editor
asked
Jul 30, 2016
Computer Networks
ugcnetcse-june2015-paper2
computer-networks
port-numbers
match-the-following
+
–
2
votes
2
answers
2468
UGC NET CSE | Junet 2015 | Part 2 | Question: 26
Which of the following protocols is an application layer protocol that establishes, manages and terminates multimedia sessions? Session Maintenance Protocol Real-time Streaming Protocol Real-time Transport Control Protocol Session Initiation Protocol
Which of the following protocols is an application layer protocol that establishes, manages and terminates multimedia sessions?Session Maintenance ProtocolReal-time Strea...
go_editor
4.7k
views
go_editor
asked
Jul 30, 2016
Computer Networks
ugcnetcse-june2015-paper2
osi-protocol
computer-networks
+
–
2
votes
1
answer
2469
UGC NET CSE | December 2013 | Part 3 | Question: 48
____ is a type of transmission impairment in which the signal looses strength due to the resistance of the transmission medium Attenuation Distortion Noise Decibel
____ is a type of transmission impairment in which the signal looses strength due to the resistance of the transmission mediumAttenuationDistortionNoiseDecibel
go_editor
3.5k
views
go_editor
asked
Jul 29, 2016
Computer Networks
ugcnetcse-dec2013-paper3
computer-networks
communication
non-gate
+
–
2
votes
2
answers
2470
UGC NET CSE | December 2013 | Part 3 | Question: 47
The start and stop bits are used in serial communication for error detection error correction synchronization slowing down the communication
The start and stop bits are used in serial communication forerror detectionerror correctionsynchronizationslowing down the communication
go_editor
4.0k
views
go_editor
asked
Jul 29, 2016
Computer Networks
ugcnetcse-dec2013-paper3
computer-networks
serial-communication
+
–
3
votes
1
answer
2471
UGC NET CSE | December 2013 | Part 3 | Question: 46
A client-server system uses a satellite network, with the satellite at a height of 40,000 kms. What is the best-case delay in response to a request? (Note that the speed of light in air is 3,00,000 km/second) 133.33 m sec 266.67 m sec 400.00 m sec 533.33 m sec
A client-server system uses a satellite network, with the satellite at a height of 40,000 kms. What is the best-case delay in response to a request? (Note that the speed ...
go_editor
6.5k
views
go_editor
asked
Jul 29, 2016
Computer Networks
ugcnetcse-dec2013-paper3
communication
computer-networks
+
–
7
votes
1
answer
2472
UGC NET CSE | December 2013 | Part 3 | Question: 45
Which layer of OSI reference model is responsible for decomposition of messages and generation of sequence numbers to ensure correct re-composition from end to end of the network? Physical Data-link Transport Application
Which layer of OSI reference model is responsible for decomposition of messages and generation of sequence numbers to ensure correct re-composition from end to end of the...
go_editor
3.9k
views
go_editor
asked
Jul 29, 2016
Computer Networks
ugcnetcse-dec2013-paper3
computer-networks
network-layering
+
–
3
votes
2
answers
2473
UGC NET CSE | December 2013 | Part 3 | Question: 44
In IPV 4, the IP address 200.200.200.200 belongs to Class A Class B Class C Class D
In IPV 4, the IP address 200.200.200.200 belongs toClass AClass BClass CClass D
go_editor
4.5k
views
go_editor
asked
Jul 29, 2016
Computer Networks
ugcnetcse-dec2013-paper3
computer-networks
ip-addressing
+
–
2
votes
1
answer
2474
UGC NET CSE | December 2013 | Part 3 | Question: 43
What is the bit rate for transmitting uncompressed 800 $\times$ 600 pixel colour frames with 8 bits/pixel at 40 frames/second? 2.4 Mbps 15.36 Mbps 153.6 Mbps 1536 Mbps
What is the bit rate for transmitting uncompressed 800 $\times$ 600 pixel colour frames with 8 bits/pixel at 40 frames/second?2.4 Mbps15.36 Mbps153.6 Mbps1536 Mbps
go_editor
6.9k
views
go_editor
asked
Jul 29, 2016
Computer Networks
ugcnetcse-dec2013-paper3
computer-networks
communication
+
–
1
votes
1
answer
2475
UGC NET CSE | December 2014 | Part 3 | Question: 30
Which one of the following is true for asymmetric-key cryptography ? Private key is kept by the receiver and public key is announced to the public. Public key is kept by the receiver and private key is announced to the public. Both private key and public key are kept by the receiver. Both private key and public key are announced to the public.
Which one of the following is true for asymmetric-key cryptography ?Private key is kept by the receiver and public key is announced to the public.Public key is kept by th...
makhdoom ghaya
4.8k
views
makhdoom ghaya
asked
Jul 28, 2016
Computer Networks
ugcnetcse-dec2014-paper3
computer-networks
asymmetric-key-cryptography
+
–
3
votes
1
answer
2476
UGC NET CSE | December 2013 | Part 3 | Question: 33
The message 11001001 is to be transmitted using the CRC polynomial $x^3 + 1 $ to protect it from errors. The message that should be transmitted is 110010011001 11001001 110010011001001 11001001011
The message 11001001 is to be transmitted using the CRC polynomial $x^3 + 1 $ to protect it from errors. The message that should be transmitted is110010011001110010011100...
go_editor
2.5k
views
go_editor
asked
Jul 28, 2016
Computer Networks
ugcnetcse-dec2013-paper3
computer-networks
crc-polynomial
+
–
4
votes
1
answer
2477
UGC NET CSE | December 2013 | Part 3 | Question: 32
Find the false statement: In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. The symmetric cipher DES (Data Encryption Standard) was widely used in the industry for security product. The ... of size 56 bits and 124 bits. Public key algorithms use two different keys for Encryption and Decryption
Find the false statement:In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption.The symmetric cipher DES (Data Encryption Standa...
go_editor
2.1k
views
go_editor
asked
Jul 28, 2016
Computer Networks
ugcnetcse-dec2013-paper3
computer-networks
cryptography
+
–
2
votes
1
answer
2478
UGC NET CSE | December 2014 | Part 3 | Question: 29
________ is a bit-oriented protocol for communication over point-to-point and multipoint links. Stop-and-wait HDLC Sliding window Go-back-N
________ is a bit-oriented protocol for communication over point-to-point and multipoint links.Stop-and-waitHDLC Sliding windowGo-back-N
makhdoom ghaya
5.4k
views
makhdoom ghaya
asked
Jul 27, 2016
Computer Networks
ugcnetcse-dec2014-paper3
computer-networks
bit-oriented-protocol
+
–
1
votes
2
answers
2479
UGC NET CSE | December 2014 | Part 3 | Question: 28
What is the propagation time if the distance between the two points is $48,000$ ? Assume the propagation speed to be $2.4 × 10^{8}$ metre/second in cable. $0.5$ ms $20$ ms $50$ ms $200$ ms
What is the propagation time if the distance between the two points is $48,000$ ? Assume the propagation speed to be $2.4 × 10^{8}$ metre/second in cable. $0.5$ ms ...
makhdoom ghaya
6.8k
views
makhdoom ghaya
asked
Jul 27, 2016
Computer Networks
ugcnetcse-dec2014-paper3
computer-networks
propagation-time
+
–
1
votes
1
answer
2480
UGC NET CSE | December 2014 | Part 3 | Question: 27
Which of the following is not a field in $TCP$ header ? Sequence number Fragment offset Checksum Window size
Which of the following is not a field in $TCP$ header ? Sequence numberFragment offsetChecksumWindow size
makhdoom ghaya
4.6k
views
makhdoom ghaya
asked
Jul 27, 2016
Computer Networks
ugcnetcse-dec2014-paper3
computer-networks
tcp-header
+
–
4
votes
1
answer
2481
UGC NET CSE | December 2014 | Part 3 | Question: 26
How many characters per second ($7$ bits + $1$ parity) can be transmitted over a $3200$ bps line if the transfer is asynchronous ? (Assuming $1$ start bit and $1$ stop bit) $300$ $320$ $360$ $400$
How many characters per second ($7$ bits + $1$ parity) can be transmitted over a $3200$ bps line if the transfer is asynchronous ? (Assuming $1$ start bit and $1$ stop bi...
makhdoom ghaya
6.1k
views
makhdoom ghaya
asked
Jul 27, 2016
Computer Networks
ugcnetcse-dec2014-paper3
computer-networks
data-transmission
asynchronous-transmission
+
–
1
votes
1
answer
2482
UGC NET CSE | December 2014 | Part 3 | Question: 25
For $n$ devices in a network, ________ number of duplex-mode links are required for a mesh topology. $n(n + 1)$ $n (n – 1)$ $n(n + 1)/2$ $n(n – 1)/2$
For $n$ devices in a network, ________ number of duplex-mode links are required for a mesh topology.$n(n + 1)$ $n (n – 1)$ $n(n + 1)/2$ $n(n – 1)/2$
makhdoom ghaya
4.4k
views
makhdoom ghaya
asked
Jul 27, 2016
Computer Networks
ugcnetcse-dec2014-paper3
computer-networks
network-topologies
mesh-topology
+
–
1
votes
1
answer
2483
UGC NET CSE | December 2013 | Part 2 | Question: 42
Match the following $:$ ... $\text{a-iv, b-iii, c-i, d-ii}$ $\text{a-iii, b-i, c-iv, d-ii}$
Match the following $:$$\begin{array}{} \text{} & \textbf{List – I} & & & \textbf{List – II} \\ \text{a.} & \text{Wireless Application Environment} & & \text{i.} &...
go_editor
1.5k
views
go_editor
asked
Jul 26, 2016
Computer Networks
ugcnetcse-dec2013-paper2
computer-networks
wireless-protocol
+
–
2
votes
4
answers
2484
Gateforum Correspondence Course ( Page# 187, Q# 01)
Payal Rastogi
706
views
Payal Rastogi
asked
Jul 25, 2016
Computer Networks
computer-networks
tcp
+
–
1
votes
0
answers
2485
MadeEasy Workbook: Computer Networks - Flow Control Methods
If the size of window is N and N # of frames are transmitted and it is supporting cumulative ACK. The Ack no. that is transmitted is ACK p.Then Calculate a)how many frames are received to the receiver b) How many frames are ... it using GOBACKN and my answer is not matching to his answer plus approach is diff. Anybody ??? help me on this.
If the size of window is N and N # of frames are transmitted and it is supporting cumulative ACK. The Ack no. that is transmitted is ACK p.ThenCalculatea)how many frames ...
mohit chawla
670
views
mohit chawla
asked
Jul 25, 2016
Computer Networks
made-easy-test-series
computer-networks
flow-control-methods
+
–
2
votes
1
answer
2486
UGC NET CSE | December 2013 | Part 2 | Question: 5
Using the RSA public key crypto system, if p=13, q=31 and d=7, then the value of e is 101 103 105 107
Using the RSA public key crypto system, if p=13, q=31 and d=7, then the value of e is101103105107
go_editor
6.9k
views
go_editor
asked
Jul 24, 2016
Computer Networks
ugcnetcse-dec2013-paper2
computer-networks
network-security
rsa-public-key
+
–
1
votes
1
answer
2487
UGC NET CSE | December 2013 | Part 2 | Question: 4
The VLF and LF bauds use _____ propagation for communication Ground Sky Line of sight Space
The VLF and LF bauds use _____ propagation for communicationGroundSkyLine of sightSpace
go_editor
3.3k
views
go_editor
asked
Jul 24, 2016
Computer Networks
ugcnetcse-dec2013-paper2
computer-networks
unguided-media
+
–
1
votes
1
answer
2488
UGC NET CSE | December 2013 | Part 2 | Question: 3
An analog signal carries 4 bits in each signal unit. If 1000 signal units are sent per second, then baud rate and bit rate of the signal are _____ and _____ 4000 bauds/sec & 1000 bps 2000 bauds/sec & 1000 bps 1000 bauds/sec & 500 bps 1000 bauds/sec & 4000 bps
An analog signal carries 4 bits in each signal unit. If 1000 signal units are sent per second, then baud rate and bit rate of the signal are _____ and _____4000 bauds/sec...
go_editor
10.1k
views
go_editor
asked
Jul 24, 2016
Computer Networks
ugcnetcse-dec2013-paper2
computer-networks
osi-model
physical-layer
+
–
1
votes
2
answers
2489
UGC NET CSE | December 2013 | Part 2 | Question: 2
Encryption and decryption is the responsibility of ____ Layer Physical Network Application Datalink
Encryption and decryption is the responsibility of ____ LayerPhysicalNetworkApplicationDatalink
go_editor
2.0k
views
go_editor
asked
Jul 24, 2016
Computer Networks
ugcnetcse-dec2013-paper2
computer-networks
osi-model
+
–
1
votes
1
answer
2490
UGC NET CSE | December 2013 | Part 2 | Question: 1
When data and acknowledgement are sent in same frame, this is called as Piggy packing Piggy backing Back packing Good packing
When data and acknowledgement are sent in same frame, this is called as Piggy packingPiggy backingBack packingGood packing
go_editor
3.8k
views
go_editor
asked
Jul 24, 2016
Computer Networks
ugcnetcse-dec2013-paper2
computer-networks
osi-model
+
–
Page:
« prev
1
...
78
79
80
81
82
83
84
85
86
87
88
...
103
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register