Computer Network Subject wise UGC NET Question Analysis-Part-3

Q143➡ | NTA UGC NET December 2015 Paper-3
The combination of an IP address and a port number is known as_____.
i ➥ network number
ii ➥ socket address
iii ➥ subnet mask number
iv ➥ MAC address

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q144➡ | NTA UGC NET December 2015 Paper-2
In a typical mobile phone system with hexagonal cells, it is forbidden to reuse a frequency band in adjacent cells. If 840 frequencies are available, how many can be used in a given cell?
i ➥ 280
ii ➥ 110
iii ➥ 140
iv ➥ 120

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q145➡ | NTA UGC NET December 2015 Paper-2
Using p = 3, q = 13, d = 7 and e = 3 in the RSA algorithm, what is the value of ciphertext for a plain text 5 ?
i ➥ 8
ii ➥ 16
iii ➥ 26
iv ➥ 33

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q146➡ | NTA UGC NET December 2015 Paper-3
A network with a bandwidth of 10 Mbps can pass only an average of 15,000 frames per minute with each frame carrying an average of 8,000 bits. What is the throughput of this network?
i ➥ 2 Mbps
ii ➥ 60 Mbps
iii ➥ 120 Mbps
iv ➥ 10 Mbps

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q147➡ | NTA UGC NET December 2015 Paper-3
Consider a subnet with 720 routers. If a three-level hierarchy is chosen with eight clusters, each containing 9 regions of 10 routers, then the total number of entries in the routing table is__________.
i ➥ 25
ii ➥ 27
iii ➥ 53
iv ➥ 72

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q148➡ | NTA UGC NET December 2015 Paper-3
In a classful addressing, the IP addresses with 0 (zero) as network number :
i ➥ refers to the current network
ii ➥ refers to broadcast on the local network
iii ➥ refers to broadcast on a distant network
iv ➥ refers to loopback testing

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q149➡ | NTA UGC NET December 2015 Paper-3
In electronic mail, which of the following protocols allows the transfer of multimedia messages?
i ➥ IMAP
ii ➥ SMTP
iii ➥ POP 3
iv ➥ MIME

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q150➡ | NTA UGC NET December 2015 Paper-3
A device is sending out data at the rate of 2000 bps. How long does it take to send a file of 1,00,000 characters ?
i ➥ 50
ii ➥ 200
iii ➥ 400
iv ➥ 800

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q151➡ | NTA UGC NET June 2015 Paper-2
Which of the following protocols is an application layer protocol that establishes, manages and terminates multimedia sessions ?
i ➥ Session Maintenance Protocol
ii ➥ Real time Streaming Protocol
iii ➥ Real time Transport Control Protocol
iv ➥ Session Initiation Protocol

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q152➡ | NTA UGC NET June 2015 Paper-2
Match the following port numbers with their uses:
i ➥ (a)-(iv), (b)-(i), (c)-(ii), (d)-(iii)
ii ➥ (a)-(ii), (b)-(i), (c)-(iv), (d)-(iii)
iii ➥ (a)-(ii), (b)-(iv), (c)-(iii), (d)-(i)
iv ➥ (a)-(ii), (b)-(iv), (c)-(i), (d)-(iii)

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q153➡ | NTA UGC NET June 2015 Paper-2
Which of the following is not associated with the session layer ?
i ➥ Dialog control
ii ➥ Token management
iii ➥ Semantics of the information transmitted
iv ➥ Synchronization

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q154➡ | NTA UGC NET June 2015 Paper-2
What is the size of the ‘total length’ field in IPv4 datagram?
i ➥ 4 bit
ii ➥ 8 bit
iii ➥ 16 bit
iv ➥ 32 bit

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q155➡ | NTA UGC NET June 2015 Paper-2
Which of the following is/are restriction(s) in classless addressing?
i ➥ The number of addresses needs to be a power of 2.
ii ➥ The mask needs to be included in the address to define the block.
iii ➥ The starting address must be divisible by the number of addresses in the block.
iv ➥ All of the above

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q156➡ | NTA UGC NET June 2015 Paper-2
The process of dividing an analog signal into a string of discrete outputs, each of constant amplitudes, is called:
i ➥ Strobing
ii ➥ Amplification
iii ➥ Conditioning
iv ➥ Quantization

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q157➡ | NTA UGC NET June 2015 Paper-3
Which transmission technique guarantees that data packets will be received by the receiver in the same order in which they were sent by the sender?
i ➥ Broadcasting
ii ➥ Unicasting
iii ➥ Packet switching
iv ➥ Circuit switching

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q158➡ | NTA UGC NET June 2015 Paper-3
Which of the following control fields in the TCP header is used to specify whether the sender has no more data to transmit?
i ➥ FIN
ii ➥ RST
iii ➥ SYN
iv ➥ PSH

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q159➡ | NTA UGC NET June 2015 Paper-3
Which are the two modes of IP security?
i ➥ Transport and certificate
ii ➥ Transport and tunnel
iii ➥ Certificate and tunnel
iv ➥ Pre Shared and transport

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q160➡ | NTA UGC NET June 2015 Paper-3
A message “COMPUTERNETWORK” encrypted (ignore quotes) using columnar transposition cipher with a key “LAYER”. The encrypted message is :
i ➥ CTTOEWMROPNRUEK
ii ➥ MROUEKCTTPNROEW
iii ➥ OEWPNRCTTUEKMRO
iv ➥ UEKPNRMROOEWCTT

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q161➡ | NTA UGC NET June 2015 Paper-3
Suppose a digitized voice channel is made by digitizing 8 kHz bandwidth analog voice signal. It is required to sample the signal at twice the highest frequency (two samples per hertz). What is the bit rate required, if it is assumed that each sample requires 8 bits?
i ➥ 32 kbps
ii ➥ 64 kbps
iii ➥ 128 kbps
iv ➥ 256 kbps

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q162➡ | NTA UGC NET June 2015 Paper-3
The maximum payload of a TCP segment is:
i ➥ 65,535
ii ➥ 65,515
iii ➥ 65,495
iv ➥ 65,475

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q163➡ | NTA UGC NET December 2014 Paper-2
The period of a signal is 10 ms. What is its frequency in Hertz ?
i ➥ 10
ii ➥ 100
iii ➥ 1000
iv ➥ 10000

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q164➡ | NTA UGC NET December 2014 Paper-2
In a classful addressing, first four bits in Class-A IP address is
i ➥ 1010
ii ➥ 1100
iii ➥ 1011
iv ➥ 1110

Show Answer With Best Explanation

Answer: (Marks to all ) start with ‘0’
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q165➡ | NTA UGC NET December 2014 Paper-2
Which of the following algorithms is not a broadcast routing algorithm ?
i ➥ Flooding
ii ➥ Multi Destination routing
iii ➥ Reverse path forwarding
iv ➥ All of the above

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q166➡ | NTA UGC NET December 2014 Paper-2
An analog signal has a bit rate of 6000 bps and a baud rate of 2000 baud. How many data elements are carried by each signal element ?
i ➥ 0.336 bits/baud
ii ➥ 3 bits/baud
iii ➥ 120,00,000 bits/baud
iv ➥ None of the above

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q167➡ | NTA UGC NET December 2014 Paper-2
How many distinct stages are there in DES algorithm, which is parameterized by a 56-bit key ?
i ➥ 16
ii ➥ 17
iii ➥ 18
iv ➥ 19

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q168➡ | NTA UGC NET December 2014 Paper-2
Match the following:
i ➥ a-iii, b-iv, c-i, d-ii
ii ➥ a-iii, b-i, c-iv, d-ii
iii ➥ a-i, b-ii, c-iii, d-iv
iv ➥ a-iv, b-iii, c-ii, d-i

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q169➡ | NTA UGC NET December 2014 Paper-3
Location transparency allows :
I. Users to treat the data as if it is done at one location.
II. Programmers to treat the data as if it is at one location.
III. Managers to treat the data as if it is at one location.
Which one of the following is correct ?
i ➥ I, II and III
ii ➥ I and II only
iii ➥ II and III only
iv ➥ II only

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q170➡ | NTA UGC NET December 2014 Paper-3
For n devices in a network, __ number of duplex-mode links are required for a mesh topology.
i ➥ n(n + 1)
ii ➥ n (n – 1)
iii ➥ n(n + 1)/2
iv ➥ n(n – 1)/2

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q171➡ | NTA UGC NET December 2014 Paper-3
How many characters per second (7 bits + 1 parity) can be transmitted over a 3200 bps line if the transfer is asynchronous ? (Assuming 1 start bit and 1 stop bit)
i ➥ 300
ii ➥ 320
iii ➥ 360
iv ➥ 400

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q172➡ | NTA UGC NET December 2014 Paper-3
Which of the following is not a field in the TCP header ?
i ➥ Sequence number
ii ➥ Fragment offset
iii ➥ Checksum
iv ➥ Window size

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q173➡ | NTA UGC NET December 2014 Paper-3
What is the propagation time if the distance between the two points is 48,000 ? Assume the propagation speed to be 2.4 × 108 metre/second in cable.
i ➥ 0.5 ms
ii ➥ 20 ms
iii ➥ 50 ms
iv ➥ 200 ms

Show Answer With Best Explanation

Answer: (Marks to all )
Explanation:
Given question is incomplete Unit for distance is not given
but we can solve by unit as KM.
Propagation time(tp) = distance/speed = d/v
so the answer will be (IV)- 200 ms

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q174➡ | NTA UGC NET December 2014 Paper-3
______________is a bit-oriented protocol for communication over point-to-point and multi-point links.
i ➥ Stop-and-wait
ii ➥ HDLC
iii ➥ Sliding window
iv ➥ Go-back-N

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q175➡ | NTA UGC NET December 2014 Paper-3
Which one of the following is true for asymmetric-key cryptography ?
i ➥ Private key is kept by the receiver and public key is announced to the public.
ii ➥ Public key is kept by the receiver and private key is announced to the public.
iii ➥ Both private key and public key are kept by the receiver.
iv ➥ Both private key and public key are announced to the public.

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q176➡ | NTA UGC NET December 2014 Paper-3
A Trojan horse is
i ➥ A program that performs a legitimate function that is known to an operating system or its user and also has a hidden component that can be used for nefarious purposes like attacks on message security or impersonation.
ii ➥ A piece of code that can attach itself to other programs in the system and spread to other systems when programs are copied or transferred.
iii ➥ A program that spreads to other computer systems by exploiting security holes like weaknesses in facilities for creation of remote processes
iv ➥ All of the above

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q177➡ | NTA UGC NET December 2014 Paper-3
Infrared signals can be used for short range communication in a closed area using _ propagation.
i ➥ Ground
ii ➥ Sky
iii ➥ line of sight
iv ➥ Space

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q178➡ | NTA UGC NET June 2014 Paper-2
A bridge has access to________address in the same network.
i ➥ Physical
ii ➥ Network
iii ➥ Datalink
iv ➥ Application

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q179➡ | NTA UGC NET June 2014 Paper-2
The minimum frame length for 10 Mbps Ethernet is___________ bytes and maximum is______ bytes.
i ➥ 64 & 128
ii ➥ 128 & 1518
iii ➥ 1518 & 3036
iv ➥ 64 & 1518

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q180➡ | NTA UGC NET June 2014 Paper-2
The bit rate of a signal is 3000 bps. If each signal unit carries 6 bits, the baud rate of the signal is________.
i ➥ 500 baud/sec
ii ➥ 1000 baud/sec
iii ➥ 3000 baud/sec
iv ➥ 18000 baud/sec.

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q181➡ | NTA UGC NET June 2014 Paper-2
Match the following :
i ➥ a-iv, b-v, c-ii, d-iii, e-i
ii ➥ a-v, b-iv, c-i, d-ii, e-iii
iii ➥ a-i, b-iii, c-ii, d-v, e-iv
iv ➥ a-i, b-ii, c-iv, d-iii, e-v

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q182➡ | NTA UGC NET June 2014 Paper-2
Match the following with respect to the mobile computing technologies:

i ➥ a-iii, b-iv, c-ii, d-i
ii ➥ a-iv, b-i, c-ii, d-iii
iii ➥ a-ii, b-iii, c-iv, d-i
iv ➥ a-ii, b-i, c-iv, d-iii

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q183➡ | NTA UGC NET June 2014 Paper-2
SET, an open encryption and security specification model that is designed for protecting credit card transactions on the internet, stands for
i ➥ Secure Electronic Transaction
ii ➥ Secular Enterprise for Transaction
iii ➥ Security Electronic Transmission
iv ➥ Secured Electronic Termination

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q184➡ | NTA UGC NET June 2014 Paper-3
In a digital transmission, the receiver clock is 0.1 percent faster than the sender clock. How many extra bits per second does the receiver receive if the data rate is 1 Mbps?
i ➥ 10 bps
ii ➥ 100 bps
iii ➥ 1000 bps
iv ➥ 10000 bps

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q185➡ | NTA UGC NET June 2014 Paper-3
Which one of the following is not a Client-Server application ?
i ➥ Internet chat
ii ➥ Web browser
iii ➥ E-mail
iv ➥ Ping

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q186➡ | NTA UGC NET June 2014 Paper-3
Match the following cryptographic algorithms with their design issues :
i ➥ a-ii, b-i, c-iv, d-iii
ii ➥ a-iii, b-i, c-iv, d-ii
iii ➥ a-iii, b-iv, c-ii, d-i
iv ➥ a-iv, b-i, c-ii, d-iii

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q187➡ | NTA UGC NET June 2014 Paper-3
Consider a code with five valid code words of length ten : 0000000000, 0000011111, 1111100000, 1110000011, 1111111111 Hamming distance of the code is?
i ➥ 5
ii ➥ 10
iii ➥ 8
iv ➥ 9

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q188➡ | NTA UGC NET June 2014 Paper-3
Ten signals, each requiring 3000 Hz, are multiplexed on to a single channel using FDM. How much minimum bandwidth is required for the multiplexed channel ? Assume that the guard bands are 300 Hz wide.
i ➥ 30,000
ii ➥ 32,700
iii ➥ 33,000
iv ➥ None of the above

Show Answer With Best Explanation

Answer: II
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q189➡ | NTA UGC NET June 2014 Paper-3
Which of the following is used in the options field of IPv4 ?
i ➥ Strict source routing
ii ➥ Loose source routing
iii ➥ time stamp
iv ➥ All of the above

Show Answer With Best Explanation

Answer: IV
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q190➡ | NTA UGC NET June 2014 Paper-3
Which layers of the OSI reference model are host-to-host layers ?
i ➥ Transport, Session, Presentation, Application
ii ➥ Network, Transport, Session, Presentation
iii ➥ Data-link, Network, Transport, Session
iv ➥ Physical, Data-link, Network, Transport

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q191➡ | NTA UGC NET June 2014 Paper-3
A network on the Internet has a subnet mask of 255.255.240.0. What is the maximum number of hosts it can handle ?
i ➥ 1024
ii ➥ 2048
iii ➥ 4096
iv ➥ 8192

Show Answer With Best Explanation

Answer: (Marks to all ) correct answer is – 4094
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

Q192➡ | NTA UGC NET June 2014 Paper-3
Four bits are used for packed sequence numbering in a sliding window protocol used in a computer network. What is the maximum window size ?
i ➥ 4
ii ➥ 8
iii ➥ 15
iv ➥ 16

Show Answer With Best Explanation

Answer: III
Explanation: Upload Soon

More DiscussionExplanation On YouTubeLearn Topic WiseHelp-Line

error: Content is protected !!
Open chat
1
Hi,how Can We Help You ?