adplus-dvertising
frame-decoration

Question

If there are N people in the world and are using secret key encryption/decryption for privacy purpose, then number of secret keys required will be:

a.

N

b.

N-1

c.

N*(N-1)/2

d.

N*(N+1)/2

Answer: (c).N*(N-1)/2

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. If there are N people in the world and are using secret key encryption/decryption for privacy purpose, then number of secret keys required will be:

Similar Questions

Discover Related MCQs

Q. Optical fiber uses reflection to guide light through a channel, in which angle of incedence is _______ the critical angle.

Q. An attacker sits between customer and Banker, and captures the information from the customer and retransmits to the banker by altering the information. This attack is called as ..............

Q. Match the following Layers and Protocols for a user browsing with SSL:

a. Application layer i. TCP
b. Transport layer ii. IP
c. Network layer iii. PPP
d. Datalink layer iv. HTTP

Codes: a b c d

Q. The maximum size of the data that the application layer can pass on to the TCP layer below is .........

Q. A packet whose destination is outside the local TCP/IP network segment is sent to ..............

Q. Distance vector routing algorithm is a dynamic routing algorithm. The routing tables in distance vector routing algorithm are updated ...........

Q. In link state routing algorithm after the construction of link state packets, new routes are computed using:

Q. Suppose there are n stations in a slotted LAN. Each station attempts to transmit with a probability P in each time slot. The probability that only one station transmits in a given slot is ..................

Q. Station A uses 32 byte packets to transmit messages to station B using sliding window protocol. The round trip delay between A and B is 40 milli seconds and the bottleneck bandwidth on the path between A and B is 64 kbps. The optimal window size of A is

Q. Let G(x) be generator polynomial used for CRC checking. The condition that should be satisfied by G(x) to correct odd numbered error bits, will be:

Q. In a packet switching network, if the message size is 48 bytes and each packet contains a header of 3 bytes. If 24 packets are required to transmit the message, the packet size is ................

Q. A node X on a 10 Mbps network is regulated by a token bucket. The token bucket is filled at a rate of 2 Mbps. Token bucket is initially filled with 16 megabits. The maximum duration taken by X to transmit at full rate of 10 Mbps is ............ secs.

Q. Which of the following statements is not true with respect to microwaves?

Q. In a fast Ethernet cabling, 100 Base-TX uses ........... cable and maximum segment size is ............

Q. A network with bandwidth of 10 Mbps can pass only an average of 12,000 frames per minute with each frame carrying an average of 10,000 bits. What is the throughput of this network ?

Q. Match the following:

List – I                           List – II
a. Session layer           i. Virtual terminal software
b. Application layer     ii. Semantics of the information transmitted
c. Presentation layer   iii. Flow control
d. Transport layer         iv. Manage dialogue control

Codes :
      a   b   c   d

Q. Which of the following protocols is used by email server to maintain a central repository that can be accessed from any machine?

Q. An attacker sits between the sender and receiver and captures the information and retransmits to the receiver after some time without altering the information. This attack is called as ..............

Q. Suppose transmission rate of a channel is 32 kbps. If there are ‘8’ routes from source to destination and each packet p contains 8000 bits. Total end to end delay in sending packet P is ................

Q. Consider the following statements :

a. High speed Ethernet works on optic fiber.
b. A point to point protocol over Ethernet is a network protocol for encapsulating PPP frames inside Ethernet frames.
c. High speed Ethernet does not work on optic fiber.
d. A point to point protocol over Ethernet is a network protocol for encapsulating Ethernet frames inside PPP frames.

Which of the following is correct ?