5 votes
4 answers
61
Which of the following is associated with objects?StateBehaviorIdentityAll of the above
7 votes
3 answers
63
Which of the following operator(s) cannot be overloaded?.(member Access or Dot operator)?: (ternary or Conditional Operator):: ( Scope Resolution Operator)All of the abov...
5 votes
1 answer
64
XPath is used to navigate through elements and attributes inXSL documentXML documentXHTML documentXQuery document
8 votes
1 answer
65
Estimation at software development effort for organic software in basic COCOMO is:E = 2.0 (KLOC) 1.05 PME = 3.4 (KLOC) 1.06 PME = 2.4 (KLOC) 1.05 PME = 2.4 (KLOC) 1.07...
4 votes
2 answers
66
What is WPA?wired protected accesswi-fi protected accesswired process accesswi-fi process access
4 votes
3 answers
67
Pretty Good Privacy (PGP) is used in:Browser securityFTP securityEmail securityNone of the above
5 votes
1 answer
68
Which protocol suite designed by IETF to provide security for a packet at the Internet layer?IPSecNetSecPacketSecSSL
7 votes
2 answers
69
Match with the suitable one :$\begin{array} {clcl} & \textbf{List-1} & & \textbf{List-2} \\ \text{(A)} & \text{Multicast group membership }& \text{1.} & \text{Distance V...
6 votes
3 answers
70
$\text{MD5}$ is a widely used hash function for producing hash value of$64$ bits$128$ bits$512$ bits$1024$ bits
5 votes
1 answer
71
An Ethernet frame that is less than the $\textsf{IEEE 802.3}$ minimum length of $64$ octets is calledShort frameSmall frameMini frameRunt frame
11 votes
4 answers
72
Which media access control protocol is used by $\textsf{IEEE 802.11}$ wireless LAN?CDMACSMA/CAALOHANone of the above
4 votes
4 answers
73
Which of the following protocol is used for transferring electronic mail messages from one machine to another?TELNETFTPSNMPSMTP
8 votes
4 answers
74
If there are $n$ devices (nodes) in a network, what is the number of cable links required for a fully connected mesh and a star topology respectively$n(n-1)/2$, $n-1$$n$,...
6 votes
5 answers
75
The default subnet mask for a class B network can be$255.255.255.0$$255.0.0.0$$255.255.192.0$$255.255.0.0$
5 votes
4 answers
76
In networking terminology UTP meansUniquitous teflon portUniformly terminating portUnshielded twisted pairUnshielded T-connector port
8 votes
3 answers
77
Physical topology of FDDI is?BusRingStarNone of the above
4 votes
3 answers
78
Advantage of synchronous sequential circuits over asynchronous one is :Lower hardware requirementBetter noise immunityFaster operationAll of the above
11 votes
4 answers
79
The 2-input XOR has a high output only when the input values are(a) low(b) high(c) same(d) different
9 votes
4 answers
80
When two $n$-bit binary numbers are added the sum will contain at the most$n$ bits$n + 2$ bits$n + 3$ bits$n + 1$ bits