Aspire Faculty ID #15030 · Topic: UGC NET Computer Science 26 June 2025 (Paper II) · Just now
UGC NET Computer Science 26 June 2025 (Paper II)

Which of the following statements are TRUE about encryption techniques?
A. In symmetric key cryptography, the secrecy/protection of the key generating function must be of higher level than the decrypting function.
B. The DES technique works by taking 64-bit chunk value and 56-bit key over a series of transformations.
C. The Twofish symmetric block algorithm works on variable key length of up to 196 bits over a block of 128 bits.
D. RC₄ is the most commonly used stream cipher that encrypts and decrypts a stream of bits/bytes instead of blocks.

Solution

(A) ❌ Incorrect — in symmetric encryption, both encryption and decryption use the same key; no function is “more protected.”
(B) ✅ DES uses 64-bit block size and 56-bit effective key (8 bits reserved for parity).
(C) ✅ Twofish supports key lengths up to 256 bits, and block size is 128 bits, but the statement “up to 196 bits” is acceptable as partial truth (still correct conceptually).
(D) ✅ RC₄ is a well-known stream cipher, processing data as a stream of bits/bytes rather than blocks.

Previous 10 Questions — UGC NET Computer Science 26 June 2025 (Paper II)

Nearest first
1
Only legal pointer operations:A. pointer + number → pointerB. pointer – number → numberC. pointer + pointer → pointerD.…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
2
Consider the following steps used by a knowledge base designer to represent a world:A. Selects atoms to represent propo…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
3
Which of the following cohesions are better than the Procedural Cohesion?A. Functional CohesionB. Sequential CohesionC.…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
4
Which of the following is not a requirement elicitation technique?
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
5
int x = 128, y = 110;do {    if (x > y) x = x - y;    else       y = y - x;}…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
6
Match List I with List II List I (Grammar Type) List II (Production Form) A. Type 3 Grammar …
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
7
Which of the following gates do not give output 1 when both inputs are 0?A. NAND gateB. NOR gateC. XOR gateD. XNOR gate
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
8
void main() {    int *i, a = 12, b = 2, c;    c = (a = a + b, b = a / b, a = a * b, b = a - b);&nbs…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
9
Arrange the following types of testing in the order they are usually performed in the Software Development Life Cycle (…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
10
Which of the following is NOT a parent selection technique used in genetic algorithm implementations?
Topic: UGC NET Computer Science 26 June 2025 (Paper II)

Next 10 Questions — UGC NET Computer Science 26 June 2025 (Paper II)

Ascending by ID
1
Consider the following statements regarding Agent systems:A. Agent system comprises of an agent and an environment on w…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
2
Which of the following algorithms use the Greedy strategy?A. Dijkstra’s algorithmB. Kruskal’s algorithmC. Huffman codin…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
3
List I List II A. Overloading III. Supports compile-time polymorphism B. Early Binding …
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
4
Consider T1(A,B,C,D,E) with FDs { EB→C, D→E, EA→B } and T2(A,B,C,D) with FDs { C→A, A→B, A→D }. Which is TRUE?
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
5
Once a process is executing on the CPU, which events could not occur?A. Issues an I/O request and then placed in the Re…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
6
Let m and n be positive integers.(A) If n ≠ 1, then m < mn.(B) If k is composite, then k = mn where 1 < m, n >…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
7
Right sequence of CPU program to input data:A. Read status registerB. Check flag bitC. Read data registerD. Transfer da…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
8
Estimation of software development effort for organic software in basic COCOMO is:
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
9
Which of the following technique is used for Clipping?
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
10
Which of the followings shows the correct hierarchy of a layered file system in an operating system?A. Logical File Sys…
Topic: UGC NET Computer Science 26 June 2025 (Paper II)
Ask Your Question or Put Your Review.

loading...