UGC NET Computer Science Computer Networks Previous Year Questions (PYQs)

UGC NET Computer Science Computer Networks Previous Year Questions (PYQs)

A Place for Latest Exam wise Questions, Videos, Previous Year Papers,
Study Stuff for MCA Examinations
logo

Match List I with List II
List I List II
A. Count to infinity problem I. Mobile Adhoc Networks
B. IEEE 802.16 II. Distance vector routing
C. IEEE 802.15 III. WiMAX
D. AODV protocol IV. Bluetooth
Choose the correct answer from the options given below:

1
2
3
4

logo

Match List I with List II
List I List II
A. Digital Signature I. Asymmetric encryption algorithm.
B. Hash Function II. Confirms authenticity and integrity.
C. AES III. Produces a fixed-size digest.
D. RSA IV. Symmetric encryption algorithm.

Choose the correct answer from the options given below:


1
2
3
4

logo

The packet sent by a node to the source to inform it of congestion is called:

1
2
3
4

logo

Which of the following are examples of data encoding schemes?
A. Non-Return to Zero (NRZ)
B. Manchester Encoding
C. Amplitude Modulation
D. Hamming code
E. Bipolar AMI

1
2
3
4

logo

Arrange the steps involved when a user enters a URL in a browser and accesses a website.
A. DNS resolution
B. HTTP request sent
C. URL entered in the browser
D. IP address obtained
E. Webpage displayed

1
2
3
4

logo

Which of the following is not the characteristic of packet switching?

1
2
3
4

logo

In a Stop-and-Wait system, the bandwidth of the line is 1 Mbps, and 1 bit takes 30 milliseconds to make a round trip. The bandwidth-delay product is:

1
2
3
4

logo

CB84000D001C001C is the content of a UDP header in hexadecimal format. The source port number is:

1
2
3
4

logo

Which of the following statements are TRUE about encryption techniques?
A. In symmetric key cryptography, the secrecy/protection of the key generating function must be of higher level than the decrypting function.
B. The DES technique works by taking 64-bit chunk value and 56-bit key over a series of transformations.
C. The Twofish symmetric block algorithm works on variable key length of up to 196 bits over a block of 128 bits.
D. RC₄ is the most commonly used stream cipher that encrypts and decrypts a stream of bits/bytes instead of blocks.

1
2
3
4

logo

Which of the following are controlled-access protocols? A. Reservation
B. Polling
C. TDMA
D. Token Passing
E. CSMA/CA Choose the correct answer from the options given below:

1
2
3
4

UGC NET Computer Science


Online Test Series,
Information About Examination,
Syllabus, Notification
and More.

Click Here to
View More

UGC NET Computer Science


Online Test Series,
Information About Examination,
Syllabus, Notification
and More.

Click Here to
View More

Ask Your Question or Put Your Review.

loading...